Am 24.08.2016 um 14:48 schrieb Stephen Smalley: > On 08/24/2016 08:14 AM, Ralf Spenneberg wrote: >> Hi >> >> we are working on SELinux in the embedded area. For development we are >> using a nfsroot based approach. We successfully setup the nfs server >> supporting security labels and are able to boot from the share using >> nfsroot. We would like to label the files from the server so the relabel >> process on the client may be omitted. >> The embedded device requires a different policy that the nfs-server. We >> are basing our policy on the refpolicy-2.20151208 and only compile the >> required modules. >> >> When setting any label on the server the client always displays >> unlabeled_t. The same happens if we set the label on the client. The >> server displays unlabeled_t. Is there a way that both might agree on the >> same label? >> By the way: The server is x86_64 (kernel 4.5.7) while the client is >> armv7l 32bit (3.12.10). >> >> But since the labels are stored in text this should not pose any >> problems, does it? > > Correct. You said that they require a different policy. Is one running > a MLS-enabled (MCS or MLS) policy, while the other is not? Or is the > user/role/type you are using in the label defined in both policies? > > Look at your dmesg output on both the client and server for messages > from SELinux, e.g. > SELinux: inode=... on dev=... was found to have an invalid context=... > This indicates you may need to relabel the inode or the filesystem in > question. > Well, somehow the kernel messages might indicate this: On the server: ]$ ls -lZ /test/ insgesamt 56 -rw-------. 1 root root system_u:object_r:unlabeled_t:s0 55138 24. Aug 13:35 audit.log -rw-r--r--. 1 root root system_u:object_r:bin_t:s0 0 23. Aug 10:45 test -rw-r--r--. 1 root root system_u:object_r:bin_t:s0 0 24. Aug 13:39 test2 On the client: / # mount.nfs4 10.42.0.33:/ /test SELinux: initialized (dev 0:20, type nfs4), uses native labeling / # ls -lZ /test nfs_setsecurity() system_u:object_r:bin_t:s0 27 security_inode_notifysecctx() -22 nfs_setsecurity() system_u:object_r:bin_t:s0 27 security_inode_notifysecctx() -22 -rw------- 1 55138 Aug 24 2016 system_u:object_r:unlabeled_t audit.log -rw-r--r-- 1 0 Aug 23 2016 system_u:object_r:unlabeled_t test -rw-r--r-- 1 0 Aug 24 2016 system_u:object_r:unlabeled_t test2 So I am getting the nfs_setsecurity messages referring to the security_inode_notifysecctx. Looking at the output of the client apparently no MLS is used (missing :s0) I will look into it and get back to you asap. Thanks a lot for the pointer. Kind regards, Ralf -- OpenSource Training Ralf Spenneberg http://www.os-t.de Am Bahnhof 3-5 48565 Steinfurt Germany Fon: +49(0)2552 638 755 Fax: +49(0)2552 638 757 _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.