Add SELinux policy capability for always checking packet and peer classes.
authorChris PeBenito <cpebenito@tresys.com>
Fri, 3 May 2013 13:05:39 +0000 (09:05 -0400)
committerEric Paris <eparis@redhat.com>
Thu, 25 Jul 2013 17:03:38 +0000 (13:03 -0400)
commit2be4d74f2fd45460d70d4fe65cc1972ef45bf849
tree5dd4b74ae295dc6ba58f974a3b748fe7a2f06d3c
parentb04eea886409de7460b5727b5931fb0bd417275f
Add SELinux policy capability for always checking packet and peer classes.

Currently the packet class in SELinux is not checked if there are no
SECMARK rules in the security or mangle netfilter tables.  Some systems
prefer that packets are always checked, for example, to protect the system
should the netfilter rules fail to load or if the nefilter rules
were maliciously flushed.

Add the always_check_network policy capability which, when enabled, treats
SECMARK as enabled, even if there are no netfilter SECMARK rules and
treats peer labeling as enabled, even if there is no Netlabel or
labeled IPSEC configuration.

Includes definition of "redhat1" SELinux policy capability, which
exists in the SELinux userpace library, to keep ordering correct.

The SELinux userpace portion of this was merged last year, but this kernel
change fell on the floor.

Signed-off-by: Chris PeBenito <cpebenito@tresys.com>
Signed-off-by: Eric Paris <eparis@redhat.com>
security/selinux/hooks.c
security/selinux/include/security.h
security/selinux/selinuxfs.c
security/selinux/ss/services.c
This page took 0.030801 seconds and 5 git commands to generate.