KaiGai Kohei wrote: > KaiGai Kohei wrote: > >> 4. Permissive domain in userspace >> >> It is an issue got sleep for a few months. >> http://marc.info/?l=selinux&m=122337314619667&w=2 >> > > It was discussed at the past a bit, but left it for several months. > > Now we have a new idea of permissive domain which allows certain > domains to work as if being in permissive mode. > The in-kernel SELinux can handle it well, but userspace object > managers could not handler it because we don't have an interface > to tell what domain is permissive. > > The attached patches are for the kernel and libselinux. > > The kernel patch adds a flags field on av_decision, and returns > it as the sixth parameter on the reply of /selinux/access. > > The libselinux patch enhance libselinux to understand it, and > two new interfaces are added. > - security_compute_av_flags() > - security_compute_av_flags_raw() > It also adds a new flags field on av_decision, but it is not > touched when we use the existing interfaces due to the binary > compatibility. > > The standard userspace avc uses _flags interface, instead of > existing one, so it enables to control permissive domain. > > IIRC, Eamon pointed out that it is preferable to put a new field > of 'permissive' than general purpose 'flags'. But it will require > interface changes, if we need more state in the future. > So, I don't change the implementation. > > Please comment anything. > > Thanks, > Don't have any immediate issues with the libselinux patches. Will wait on kernel acceptance. Some general questions: When the userspace AVC is configured in "enforcing" mode, which overrides the kernel setting, how should permissive domains be treated? When the entire system is in permissive mode, should the permissive flag be returned as true for all domains? /me wonders how long it will be before someone proposes permissive classes, or permissions ("permissive permissions"). Or marking individual tsid,ssid,tclass tuples as permissive. Just think of the problems we could solve. cc'ed Steve. -- Eamon Walsh <ewalsh@xxxxxxxxxxxxx> National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.