Re: Mounting selinuxfs as read-only inside chroot

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



As I recall, and it's been a while.  We first check if selinuxfs
exists in /proc/filesystems.  If so, we know that selinux is enabled
(don't know permissive/enforcing, but we know enabled).  We then look
in /proc/mounts to find where it is mounted.  And then use that mount
point to determine enforcing/permissive.  I believe the way things
work we believe that selinuxfs existing, but not mounted at all,
counts as permissive.  Some higher level tools then failed.  (like
loading policy during an rpm updating inside a chroot)

So we decided that mounting selinuxfs r/o meant that things inside the
chroot could not make changes to the state of the system and we made
the libraries believe that r/o meant 'disabled'

Would have been nicer if there was a way to hide selinuxfs in
/proc/filesystems inside a chroot, but it was easier to do the r/o
means disabled....

On Sun, Jan 5, 2014 at 5:45 AM, Laurent Bigonville <bigon@xxxxxxxxxx> wrote:
> Hi,
>
> I'm maybe missing something, but was wondering, what is the benefit of
> mounting the selinuxfs in a chroot as read-only vs not mounting it at
> all as the user space will anyway report selinux as disabled.
>
> For example, it seems that mock is doing that (looking at the ML
> archive it's the primary reasons this has been implemented).
>
> I'm asking this because several tools in debian that are using chroot
> to build/test (pbuilder, piuparts,...) .deb are mounting the selinuxfs
> r/w and this is causing issues with dpkg if the policy is not installed
> in the chroot.
>
> I'm planing to propose to mount the selinuxfs as r/o in the chroot they
> are using, but I would like to understand this a bit more first.
>
> Cheers,
>
> Laurent Bigonville
> _______________________________________________
> Selinux mailing list
> Selinux@xxxxxxxxxxxxx
> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.
_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux