Bug 190001
Summary: | changes needed for Stateless Linux | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Bill Nottingham <notting> |
Component: | kernel | Assignee: | Eric Paris <eparis> |
Status: | CLOSED RAWHIDE | QA Contact: | Brian Brock <bbrock> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | rawhide | CC: | davej, dwalsh, eparis, jbaron, jmorris, markmc, rvokal, wtogami |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2006-07-13 15:47:17 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 193995 |
Description
Bill Nottingham
2006-04-26 15:34:42 UTC
For reference, the thread this came from: http://www.redhat.com/archives/fedora-selinux-list/2006-April/thread.html#00200 > My best vague and uneducated guess is > > rootcontext=context of the root inode on the fs to be mounted. Correct. This option doesn't exist yet, unlike the others. > fscontext=the type of filesystem it is. in this case tells it is to > label it tmpfs Security context of the superblock object. Does not affect labeling behavior for inodes. Currently incompatible with context= option (since it also currently sets the superblock context, and then inherits from it), but this could be changed. > context=the context of every file on that fs. Correct (and the superblock object too presently). This alters the labeling behavior of the fs to what is called "mountpoint labeling", where the specified context takes precedence over any xattr value or any other behavior specified by fs_use. The context is applied to the superblock object, and then inherited by all inodes from it. There is also: defcontext= default file context to apply to files that lack an xattr value when using xattrs as the labeling behavior. > would I ever want all 3 together? Possibly; they don't necessarily have to conflict. context=A fscontext=B rootcontext=C would mean "label the superblock B, the root directory inode C, and all other inodes A". > And I'm still not to smart on the > associate permission. Which of those 3 would affect associate? What > was it that Russel wanted done with these things? Anything that alters the superblock context affects associate checks (which are between the file contexts and the superblock context, e.g. so that policy can say that partition with type A can only hold data of type A and partition with type B can only hold data of type B, or replace types with levels or whatever). Posted the nsa selinux list. on try 3 hopefully i fixed all the problems... committed in 2.6.18 (but after rc1). Will post a follow up to correct security checks today. Do you know what -gitX (and therefore what built kernel) has these fixes? Seems to work for me with -2380. |