On Sun, Feb 8, 2015 at 5:26 PM, Stephen Smalley <stephen.smal...@gmail.com> wrote: > > Also, since the rootfs is necessarily unpacked before init is run and > therefore before policy has been loaded, it is unclear exactly what > will happen if they try to set SELinux security contexts at that time.
This is something I've been hoping that we could fix. IIRC, there's a kernel option to embed the policy into the kernel itself, so that it's loaded before any userspace code is run. Unfortunately, I don't know how this works and what it would take to append the policy to the kernel at build time. > In old kernels it would have just failed; in modern kernels, the > deferred security context mapping support might allow it to work > (context string will be saved off at the time of setting; incore inode > will be temporarily treated as unlabeled; when policy load happens, > context strings will be validated and the incore inodes will start > being treated as having that context), but that's not something that > we have ever tested. _______________________________________________ Seandroid-list mailing list Seandroid-list@tycho.nsa.gov To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov. To get help, send an email containing "help" to seandroid-list-requ...@tycho.nsa.gov.