On Sun, Feb 8, 2015 at 5:26 PM, Stephen Smalley
<stephen.smal...@gmail.com> wrote:
>
> Also, since the rootfs is necessarily unpacked before init is run and
> therefore before policy has been loaded, it is unclear exactly what
> will happen if they try to set SELinux security contexts at that time.

This is something I've been hoping that we could fix. IIRC, there's a
kernel option to embed the policy into the kernel itself, so that it's
loaded before any userspace code is run. Unfortunately, I don't know
how this works and what it would take to append the policy to the
kernel at build time.

> In old kernels it would have just failed; in modern kernels, the
> deferred security context mapping support might allow it to work
> (context string will be saved off at the time of setting; incore inode
> will be temporarily treated as unlabeled; when policy load happens,
> context strings will be validated and the incore inodes will start
> being treated as having that context), but that's not something that
> we have ever tested.
_______________________________________________
Seandroid-list mailing list
Seandroid-list@tycho.nsa.gov
To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
To get help, send an email containing "help" to 
seandroid-list-requ...@tycho.nsa.gov.

Reply via email to