public inbox for selinux@vger.kernel.org
 help / color / mirror / Atom feed
* RFC systemd-sysext/confext image context mounts
@ 2026-01-06 16:01 Chris PeBenito
  2026-01-06 16:20 ` Stephen Smalley
  2026-01-06 17:01 ` Dominick Grift
  0 siblings, 2 replies; 9+ messages in thread
From: Chris PeBenito @ 2026-01-06 16:01 UTC (permalink / raw)
  To: SELinux mailing list

Systemd provides tools for composing directories like /usr and /opt 
(system extensions, sysext) or /etc (configuration extensions, confext). 
  These tools create an overlayfs at the target location, with the root 
filesystem and extensions.  While they support raw directories, files, 
and mutable filesystems, my current concern is with extending immutable 
distributions at runtime using additional immutable images.

The challenge lies in ensuring proper labeling before deploying an 
image, which is problematic for third-party images lacking labels or 
using incompatible ones.  I haven't made any patches yet, as I want to 
consult this group and the systemd developers first.  My proposal is: 
for internally labeled filesystems (ext4, etc.), have the tools validate 
the image's root directory label.  If validation fails, apply a context= 
mount using the label from the contexts/systemd_contexts file in the 
policy.  I'd probably also add options in sysext.conf(.d) and 
confext.conf(.d) to override this behavior, such as for specifying an 
alternate label for the context mount.

What are your thoughts?


--
Chris PeBenito

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2026-01-07 12:28 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-01-06 16:01 RFC systemd-sysext/confext image context mounts Chris PeBenito
2026-01-06 16:20 ` Stephen Smalley
2026-01-06 16:42   ` Chris PeBenito
2026-01-06 17:08     ` Stephen Smalley
2026-01-06 18:58       ` Chris PeBenito
2026-01-06 17:01 ` Dominick Grift
2026-01-06 18:55   ` Chris PeBenito
2026-01-06 19:37     ` Dominick Grift
2026-01-07 12:28       ` Dominick Grift

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox