Re: Embedded SELinux: SELinux via NFS with different policies on client and server

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/24/2016 08:14 AM, Ralf Spenneberg wrote:
> Hi
> 
> we are working on SELinux in the embedded area. For development we are
> using a nfsroot based approach. We successfully setup the nfs server
> supporting security labels and are able to boot from the share using
> nfsroot. We would like to label the files from the server so the relabel
> process on the client may be omitted.
> The embedded device requires a different policy that the nfs-server.  We
> are basing our policy on the refpolicy-2.20151208 and only compile the
> required modules.
> 
> When setting any label on the server the client always displays
> unlabeled_t. The same happens if we set the label on the client. The
> server displays unlabeled_t. Is there a way that both might agree on the
> same label?
> By the way: The server is x86_64 (kernel 4.5.7) while the client is
> armv7l 32bit (3.12.10).
> 
> But since the labels are stored in text this should not pose any
> problems, does it?

Correct.  You said that they require a different policy.  Is one running
a MLS-enabled (MCS or MLS) policy, while the other is not?  Or is the
user/role/type you are using in the label defined in both policies?

Look at your dmesg output on both the client and server for messages
from SELinux, e.g.
SELinux: inode=... on dev=... was found to have an invalid context=...
This indicates you may need to relabel the inode or the filesystem in
question.

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux