Mounting selinuxfs as read-only inside chroot

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

I'm maybe missing something, but was wondering, what is the benefit of
mounting the selinuxfs in a chroot as read-only vs not mounting it at
all as the user space will anyway report selinux as disabled.

For example, it seems that mock is doing that (looking at the ML
archive it's the primary reasons this has been implemented).

I'm asking this because several tools in debian that are using chroot
to build/test (pbuilder, piuparts,...) .deb are mounting the selinuxfs
r/w and this is causing issues with dpkg if the policy is not installed
in the chroot.

I'm planing to propose to mount the selinuxfs as r/o in the chroot they
are using, but I would like to understand this a bit more first.

Cheers,

Laurent Bigonville
_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux