It hasn't been of interest for SELinux in typical Linux distributions
since they generally only use the rootfs briefly during initialization
and then pivot the real root into place, hiding the rootfs that was
unpacked from the initramfs.
rootfs is unpacked by the kernel from a cpio-formatted initramfs image
into a ramfs or tmpfs filesystem.  The cpio format known to the cpio
utility and to the kernel does not know about extended attributes.
ramfs also does not support extended attributes except for the
relatively recent change to SELinux to support setting security
labels.  tmpfs does have general xattr support and correct new inode
labeling, but is not the default for rootfs.  Addressing this issue
requires extending cpio format, cpio utility, and kernel side to
support extended attributes.  That work has been done very recently by
the Linux integrity measurement architecture (IMA) developers to
support their extended attributes, and should enable support for all
extended attributes, but I don't believe it is yet in any released
kernel.  Patches and discussion have been ongoing on the
linux-security-module mailing list.

On Sat, Feb 7, 2015 at 9:52 AM, Nick Kralevich <[email protected]> wrote:
> Currently, Android's init.rc supports a seclabel entry for services. This
> allows you to specify an SELinux domain for a service, without relying on
> the transition rules defined by policy.
>
> One of the primary reasons why the seclabel entries exist is because the
> root filesystem doesn't support labeling. Labeling is only done on /system,
> not on rootfs. As a result, we can't rely on SELinux's built in domain
> transition code.
>
> Does anyone recall why the root filesystem doesn't support labeling? Is it
> just something which hasn't been implemented yet, or some more fundamental
> problem?
>
> We support setting the traditional file permissions on rootfs files, but not
> selinux labels, which seems odd to me.
>
> This came up in the context of
> https://android-review.googlesource.com/129923
>
> --
> Nick Kralevich | Android Security | [email protected] | 650.214.4037
>
> _______________________________________________
> Seandroid-list mailing list
> [email protected]
> To unsubscribe, send email to [email protected].
> To get help, send an email containing "help" to
> [email protected].
_______________________________________________
Seandroid-list mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to 
[email protected].

Reply via email to