diff options
author | Chad Sellers <csellers@tresys.com> | 2006-11-06 12:38:18 -0500 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2006-11-28 12:04:38 -0500 |
commit | b94c7e677b9d28bd3f9ba4a70df6bfa7942867ca (patch) | |
tree | ea116d586f821526513d32fd5e7c2f8fa6d59485 /Documentation/filesystems/spufs.txt | |
parent | bb242497474da317a7169cc939c741ccf2e79e8c (diff) |
SELinux: validate kernel object classes and permissions
This is a new object class and permission validation scheme that validates
against the defined kernel headers. This scheme allows extra classes
and permissions that do not conflict with the kernel definitions to be
added to the policy. This validation is now done for all policy loads,
not just subsequent loads after the first policy load.
The implementation walks the three structrures containing the defined
object class and permission values and ensures their values are the
same in the policy being loaded. This includes verifying the object
classes themselves, the permissions they contain, and the permissions
they inherit from commons. Classes or permissions that are present in the
kernel but missing from the policy cause a warning (printed to KERN_INFO)
to be printed, but do not stop the policy from loading, emulating current
behavior. Any other inconsistencies cause the load to fail.
Signed-off-by: Chad Sellers <csellers@tresys.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'Documentation/filesystems/spufs.txt')
0 files changed, 0 insertions, 0 deletions