Re: [PATCH] setfiles fails to relabel if selinux not enabled

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On Sep 16, 2009, at 10:02 AM, Stephen Smalley wrote:


What is the best we can do? Should we always attempt to relabel if
selinux is disabled or not?

The patch is the best we can do - we shouldn't exclude any mounts based
on the absence of seclabel in /proc/mounts if SELinux is disabled.
Historically setfiles has always supported relabeling filesystems even
if SELinux was disabled in the host.

There's a fundamental confusion between the act (of labelling) and the use of selinux labels.

The issue shows up when there are multiple (and possibly incompatible)
sets of labels, such as in chroot's, or creating an image for a different
installation.

One can choose to not install labels condition on whether is_selinux_enabled()
consistently and methodically.

Perhaps a simpple example to illustrate:

Should cp(1) always copy security labels or only if is_selinux_enabled ()?

What I'm hearing is "No. cp(1) should copy labels iff is_selinux_senabled() is TRUE."

73 de Jeff

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux