android_kernel_samsung_msm8976/security
Casey Schaufler 1544623536 smack: limit privilege by label
There have been a number of requests to make the Smack LSM
enforce MAC even in the face of privilege, either capability
based or superuser based. This is not universally desired,
however, so it seems desirable to make it optional. Further,
at least one legacy OS implemented a scheme whereby only
processes running with one particular label could be exempt
from MAC. This patch supports these three cases.

If /smack/onlycap is empty (unset or null-string) privilege
is enforced in the normal way.

If /smack/onlycap contains a label only processes running with
that label may be MAC exempt.

If the label in /smack/onlycap is the star label ("*") the
semantics of the star label combine with the privilege
restrictions to prevent any violations of MAC, even in the
presence of privilege.

Again, this will be independent of the privilege scheme.

Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Reviewed-by: James Morris <jmorris@namei.org>
2008-08-05 10:55:53 +10:00
..
keys keys: remove unused key_alloc_sem 2008-06-06 11:29:11 -07:00
selinux SELinux: Fix a potentially uninitialised variable in SELinux hooks 2008-08-05 10:55:47 +10:00
smack smack: limit privilege by label 2008-08-05 10:55:53 +10:00
capability.c [PATCH] pass MAY_OPEN to vfs_permission() explicitly 2008-07-26 20:53:22 -04:00
commoncap.c security: protect legacy applications from executing with insufficient privilege 2008-07-24 10:47:22 -07:00
device_cgroup.c devcgroup: code cleanup 2008-07-25 10:53:37 -07:00
inode.c Kobject: convert remaining kobject_unregister() to kobject_put() 2008-01-24 20:40:40 -08:00
Kconfig security: filesystem capabilities no longer experimental 2008-07-24 10:47:22 -07:00
Makefile security: remove dummy module 2008-07-14 15:03:04 +10:00
root_plug.c security: remove register_security hook 2008-07-14 15:04:06 +10:00
security.c [patch 3/4] fat: dont call notify_change 2008-07-26 20:53:27 -04:00