* Adding SElinux support for a service
@ 2025-11-20 20:03 Philip Prindeville
2025-11-20 21:15 ` Stephen Smalley
0 siblings, 1 reply; 4+ messages in thread
From: Philip Prindeville @ 2025-11-20 20:03 UTC (permalink / raw)
To: selinux
Hi,
I'm working on SElinux support for a server that talks to a PCIe GPS card.
Is there a guide to how to port a new service to SElinux, for instance how to give it its own context? Or, in the absence of a guide, what GitHub project can I look at for the supporting commits that were done to achieve the same?
Thanks,
-Philip
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Adding SElinux support for a service
2025-11-20 20:03 Adding SElinux support for a service Philip Prindeville
@ 2025-11-20 21:15 ` Stephen Smalley
2025-11-21 2:48 ` Philip Prindeville
0 siblings, 1 reply; 4+ messages in thread
From: Stephen Smalley @ 2025-11-20 21:15 UTC (permalink / raw)
To: Philip Prindeville; +Cc: selinux
On Thu, Nov 20, 2025 at 3:14 PM Philip Prindeville
<philipp_subx@redfish-solutions.com> wrote:
>
> Hi,
>
> I'm working on SElinux support for a server that talks to a PCIe GPS card.
>
> Is there a guide to how to port a new service to SElinux, for instance how to give it its own context? Or, in the absence of a guide, what GitHub project can I look at for the supporting commits that were done to achieve the same?
Can you elaborate a little on what it is you want to do? Do you have
SELinux enabled and enforcing already on the base system and just want
to add policy for a new service to confine it and/or control what
other processes can talk to it?
Or do you also want the service to be SELinux-aware, aka a userspace
object manager, where it enforces its own security policy over its own
objects and operations?
What's your starting point?
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Adding SElinux support for a service
2025-11-20 21:15 ` Stephen Smalley
@ 2025-11-21 2:48 ` Philip Prindeville
2025-11-21 10:25 ` Petr Lautrbach
0 siblings, 1 reply; 4+ messages in thread
From: Philip Prindeville @ 2025-11-21 2:48 UTC (permalink / raw)
To: Stephen Smalley; +Cc: selinux
> On Nov 20, 2025, at 2:15 PM, Stephen Smalley <stephen.smalley.work@gmail.com> wrote:
>
> On Thu, Nov 20, 2025 at 3:14 PM Philip Prindeville
> <philipp_subx@redfish-solutions.com> wrote:
>>
>> Hi,
>>
>> I'm working on SElinux support for a server that talks to a PCIe GPS card.
>>
>> Is there a guide to how to port a new service to SElinux, for instance how to give it its own context? Or, in the absence of a guide, what GitHub project can I look at for the supporting commits that were done to achieve the same?
>
> Can you elaborate a little on what it is you want to do? Do you have
> SELinux enabled and enforcing already on the base system and just want
> to add policy for a new service to confine it and/or control what
> other processes can talk to it?
> Or do you also want the service to be SELinux-aware, aka a userspace
> object manager, where it enforces its own security policy over its own
> objects and operations?
> What's your starting point?
Yes, I have an SElinux system (RHEL 10.0) and I’m running the daemon on it. I want to package policy rules with the daemon, but yes, I also want to confine the daemon to its own context.
Currently only chronyd or ntpd would talk to it, either by the char device it creates, or else the shared memory segment it creates.
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Adding SElinux support for a service
2025-11-21 2:48 ` Philip Prindeville
@ 2025-11-21 10:25 ` Petr Lautrbach
0 siblings, 0 replies; 4+ messages in thread
From: Petr Lautrbach @ 2025-11-21 10:25 UTC (permalink / raw)
To: Philip Prindeville, Stephen Smalley; +Cc: selinux
Philip Prindeville <philipp_subx@redfish-solutions.com> writes:
>> On Nov 20, 2025, at 2:15 PM, Stephen Smalley <stephen.smalley.work@gmail.com> wrote:
>>
>> On Thu, Nov 20, 2025 at 3:14 PM Philip Prindeville
>> <philipp_subx@redfish-solutions.com> wrote:
>>>
>>> Hi,
>>>
>>> I'm working on SElinux support for a server that talks to a PCIe GPS card.
>>>
>>> Is there a guide to how to port a new service to SElinux, for instance how to give it its own context? Or, in the absence of a guide, what GitHub project can I look at for the supporting commits that were done to achieve the same?
>>
>> Can you elaborate a little on what it is you want to do? Do you have
>> SELinux enabled and enforcing already on the base system and just want
>> to add policy for a new service to confine it and/or control what
>> other processes can talk to it?
>> Or do you also want the service to be SELinux-aware, aka a userspace
>> object manager, where it enforces its own security policy over its own
>> objects and operations?
>> What's your starting point?
>
>
> Yes, I have an SElinux system (RHEL 10.0) and I’m running the daemon on it. I want to package policy rules with the daemon, but yes, I also want to confine the daemon to its own context.
>
> Currently only chronyd or ntpd would talk to it, either by the char device it creates, or else the shared memory segment it creates.
Take a look at https://fedoraproject.org/wiki/SELinux/IndependentPolicy
Also given that this is for rpm based distro using fedora-selinux
policy, selinux@lists.fedoraproject.org might the better place to get a
help.
Petr
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2025-11-21 10:25 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-11-20 20:03 Adding SElinux support for a service Philip Prindeville
2025-11-20 21:15 ` Stephen Smalley
2025-11-21 2:48 ` Philip Prindeville
2025-11-21 10:25 ` Petr Lautrbach
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox