diff options
author | Eric Paris <eparis@redhat.com> | 2008-03-31 12:17:33 +1100 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2008-04-18 20:26:11 +1000 |
commit | 64dbf07474d011540ca479a2e87fe998f570d6e3 (patch) | |
tree | 364ae3f3a29f06246dd2097674586fe508c4445f /security/selinux/include | |
parent | 0356357c5158c71d4cbf20196b2f784435dd916c (diff) | |
download | op-kernel-dev-64dbf07474d011540ca479a2e87fe998f570d6e3.zip op-kernel-dev-64dbf07474d011540ca479a2e87fe998f570d6e3.tar.gz |
selinux: introduce permissive types
Introduce the concept of a permissive type. A new ebitmap is introduced to
the policy database which indicates if a given type has the permissive bit
set or not. This bit is tested for the scontext of any denial. The bit is
meaningless on types which only appear as the target of a decision and never
the source. A domain running with a permissive type will be allowed to
perform any action similarly to when the system is globally set permissive.
Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/selinux/include')
-rw-r--r-- | security/selinux/include/security.h | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h index 315b4ec..dd70aa0 100644 --- a/security/selinux/include/security.h +++ b/security/selinux/include/security.h @@ -26,13 +26,14 @@ #define POLICYDB_VERSION_AVTAB 20 #define POLICYDB_VERSION_RANGETRANS 21 #define POLICYDB_VERSION_POLCAP 22 +#define POLICYDB_VERSION_PERMISSIVE 23 /* Range of policy versions we understand*/ #define POLICYDB_VERSION_MIN POLICYDB_VERSION_BASE #ifdef CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX #define POLICYDB_VERSION_MAX CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX_VALUE #else -#define POLICYDB_VERSION_MAX POLICYDB_VERSION_POLCAP +#define POLICYDB_VERSION_MAX POLICYDB_VERSION_PERMISSIVE #endif #define CONTEXT_MNT 0x01 @@ -69,6 +70,8 @@ struct av_decision { u32 seqno; }; +int security_permissive_sid(u32 sid); + int security_compute_av(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd); |