September 2014
Intermediate to advanced
240 pages
5h 53m
English
SELinux-aware applications have more requirements when they run inside a chroot location. They require access to the SELinux subsystem (from within the chroot) and possibly SELinux configuration entries. This includes PAM-enabled services, as user logins on these services might require access to the SELinux user configuration files (such as the seusers file and default contexts).
First, create the regular chroot location as we saw earlier. To update the system to support SELinux-aware applications inside the chroot, complete the following steps:
/sys/fs/selinux/ so that the application can query the SELinux policy:
~# mkdir ...