Add SELinux permissive domains to fedora kernels

Stephen Smalley sds at tycho.nsa.gov
Mon Mar 31 18:27:15 UTC 2008


On Mon, 2008-03-31 at 14:07 -0400, Eric Paris wrote:
> I know its way late but I'd like to add a new SELinux concept to the F9
> kernels.  Its going to be a backport of a couple of my changesets headed
> upstream
> 
> http://git.kernel.org/?p=linux/kernel/git/jmorris/selinux-2.6.git;a=commitdiff;h=32021b669089eb9b264e6b26af4d9a47eb50d4f1
> http://git.kernel.org/?p=linux/kernel/git/jmorris/selinux-2.6.git;a=commitdiff;h=70d212ebfdd5e39a9d4fb0f8f7ea5c38486f6b04

The second patch is effectively a bug fix, as otherwise open(2) with
flags 3 will fail ever since the dentry_open hook was added.  So that
one makes sense regardless of the permissive domains patches.

> http://git.kernel.org/?p=linux/kernel/git/jmorris/selinux-2.6.git;a=commitdiff;h=559dbbc87d0a5d2eb88bbbea5f2b66ee2dfd55d6
> 
> Only the third patch is truly interesting.
> 
> A permissive domain is a new concept in which a sysadmin can say that a
> given domain is free to do anything it wants.  Lets say a user seriously
> customized httpd and they want httpd to just be allowed to run wild
> while still keeping enforcing for everything else in the system.  With
> the kernel patch I want to commit and the userspace changes dan has
> already pushed this week they just need a simple policy which says
> "permissive httpd_t" and all their httpd_t denials become allows!
> 
> One of the upstream patches adds a BUG_ON() but I'm still a teensy bit
> scared of it so in the F9 patch I'll probably make it a WARN_ON since it
> isn't really deadly to the kernel...   anyway.  Chances of regression
> here are very very low.
> 
> I would just jam this in myself but we are getting really late and I
> wanted people to be able to tell me no before I did it.  If noone
> strongly objects quickly expect to see a commit message early this
> week....

-- 
Stephen Smalley
National Security Agency




More information about the Fedora-kernel-list mailing list