diff options
author | Eric Paris <eparis@redhat.com> | 2008-03-30 21:17:33 -0400 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2008-04-18 06:26:11 -0400 |
commit | 64dbf07474d011540ca479a2e87fe998f570d6e3 (patch) | |
tree | 364ae3f3a29f06246dd2097674586fe508c4445f /security/selinux/ss/services.c | |
parent | 0356357c5158c71d4cbf20196b2f784435dd916c (diff) |
selinux: introduce permissive types
Introduce the concept of a permissive type. A new ebitmap is introduced to
the policy database which indicates if a given type has the permissive bit
set or not. This bit is tested for the scontext of any denial. The bit is
meaningless on types which only appear as the target of a decision and never
the source. A domain running with a permissive type will be allowed to
perform any action similarly to when the system is globally set permissive.
Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/selinux/ss/services.c')
-rw-r--r-- | security/selinux/ss/services.c | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index face5795c760..eefa89ce77a7 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c | |||
@@ -417,6 +417,31 @@ inval_class: | |||
417 | return -EINVAL; | 417 | return -EINVAL; |
418 | } | 418 | } |
419 | 419 | ||
420 | /* | ||
421 | * Given a sid find if the type has the permissive flag set | ||
422 | */ | ||
423 | int security_permissive_sid(u32 sid) | ||
424 | { | ||
425 | struct context *context; | ||
426 | u32 type; | ||
427 | int rc; | ||
428 | |||
429 | POLICY_RDLOCK; | ||
430 | |||
431 | context = sidtab_search(&sidtab, sid); | ||
432 | BUG_ON(!context); | ||
433 | |||
434 | type = context->type; | ||
435 | /* | ||
436 | * we are intentionally using type here, not type-1, the 0th bit may | ||
437 | * someday indicate that we are globally setting permissive in policy. | ||
438 | */ | ||
439 | rc = ebitmap_get_bit(&policydb.permissive_map, type); | ||
440 | |||
441 | POLICY_RDUNLOCK; | ||
442 | return rc; | ||
443 | } | ||
444 | |||
420 | static int security_validtrans_handle_fail(struct context *ocontext, | 445 | static int security_validtrans_handle_fail(struct context *ocontext, |
421 | struct context *ncontext, | 446 | struct context *ncontext, |
422 | struct context *tcontext, | 447 | struct context *tcontext, |