linux-hardened/security/selinux/include
KaiGai Kohei d9250dea3f SELinux: add boundary support and thread context assignment
The purpose of this patch is to assign per-thread security context
under a constraint. It enables multi-threaded server application
to kick a request handler with its fair security context, and
helps some of userspace object managers to handle user's request.

When we assign a per-thread security context, it must not have wider
permissions than the original one. Because a multi-threaded process
shares a single local memory, an arbitary per-thread security context
also means another thread can easily refer violated information.

The constraint on a per-thread security context requires a new domain
has to be equal or weaker than its original one, when it tries to assign
a per-thread security context.

Bounds relationship between two types is a way to ensure a domain can
never have wider permission than its bounds. We can define it in two
explicit or implicit ways.

The first way is using new TYPEBOUNDS statement. It enables to define
a boundary of types explicitly. The other one expand the concept of
existing named based hierarchy. If we defines a type with "." separated
name like "httpd_t.php", toolchain implicitly set its bounds on "httpd_t".

This feature requires a new policy version.
The 24th version (POLICYDB_VERSION_BOUNDARY) enables to ship them into
kernel space, and the following patch enables to handle it.

Signed-off-by: KaiGai Kohei <kaigai@ak.jp.nec.com>
Acked-by:  Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: James Morris <jmorris@namei.org>
2008-08-29 00:33:33 +10:00
..
audit.h SELinux: keep the code clean formating and syntax 2008-07-14 15:01:36 +10:00
av_inherit.h
av_perm_to_string.h SELinux: create new open permission 2008-04-18 20:26:06 +10:00
av_permissions.h SELinux: create new open permission 2008-04-18 20:26:06 +10:00
avc.h SELinux: add boundary support and thread context assignment 2008-08-29 00:33:33 +10:00
avc_ss.h SELinux: avc_ss.h whitespace, syntax, and other cleanups 2008-04-28 09:28:58 +10:00
class_to_string.h selinux: support 64-bit capabilities 2008-02-11 20:30:02 +11:00
common_perm_to_string.h
conditional.h
flask.h selinux: support 64-bit capabilities 2008-02-11 20:30:02 +11:00
initial_sid_to_string.h
netif.h SELinux: Convert the netif code to use ifindex values 2008-01-30 08:17:21 +11:00
netlabel.h SELinux: netlabel.h whitespace, syntax, and other cleanups 2008-04-28 09:28:59 +10:00
netnode.h SELinux: Add a network node caching mechanism similar to the sel_netif_*() functions 2008-01-30 08:17:23 +11:00
netport.h SELinux: add netport.[ch] 2008-04-18 20:26:17 +10:00
objsec.h SELinux: remove inherit field from inode_security_struct 2008-07-14 15:01:38 +10:00
security.h SELinux: add boundary support and thread context assignment 2008-08-29 00:33:33 +10:00
xfrm.h LSM: Make the Labeled IPsec hooks more stack friendly 2008-04-12 19:07:52 -07:00