On Wed, 2004-11-24 at 15:47 -0800, Karsten Wade wrote: > My question about the targeted policy presumes that init re-execs itself > after loading the policy, whereby it picks up the unconfined_t domain > from the policy, as defined by a rule in > /etc/selinux/targeted/src/policy/domains/unconfined.te. > > role system_r types unconfined_t; This just authorizes a role for a type, it doesn't define anything related to init. > What rule tells init to re-exec itself in the targeted policy? Nothing in the policy tells init to re-exec itself; the code just does it. Do you mean, how does init get the unconfined_t type? See: > In the strict policy there is an explicit transition rule for init. The > file programs/misc/kernel.te has this rule: > > domain_auto_trans(kernel_t, init_exec_t, init_t) > > In the targeted policy, kernel.te is in domains/misc/unused, so is not > called into play. Correct? Well, kernel_t is actually an alias for init_t in targeted policy, according to apol. The kernel starts out as unconfined_t, in my reading of initial_sid_contexts: sid kernel user_u:system_r:unconfined_t Thus there is no transition at all in targeted policy.