Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
2d6dc8b5
Commit
2d6dc8b5
authored
8 years ago
by
Stephen Smalley
Committed by
android-build-merger
8 years ago
Browse files
Options
Downloads
Plain Diff
Define the user namespace capability classes and access vectors. am:
8a003607
am:
60eff1f2
Change-Id: I903b56cbf25dcc5e8da3508874afce151571d976
parents
60bfd5d6
60eff1f2
No related branches found
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
private/access_vectors
+68
-48
68 additions, 48 deletions
private/access_vectors
private/security_classes
+4
-0
4 additions, 0 deletions
private/security_classes
with
72 additions
and
48 deletions
private/access_vectors
+
68
−
48
View file @
2d6dc8b5
...
...
@@ -76,6 +76,60 @@ common ipc
unix_write
}
#
# Define a common for capability access vectors.
#
common cap
{
# The capabilities are defined in include/linux/capability.h
# Capabilities >= 32 are defined in the cap2 common.
# Care should be taken to ensure that these are consistent with
# those definitions. (Order matters)
chown
dac_override
dac_read_search
fowner
fsetid
kill
setgid
setuid
setpcap
linux_immutable
net_bind_service
net_broadcast
net_admin
net_raw
ipc_lock
ipc_owner
sys_module
sys_rawio
sys_chroot
sys_ptrace
sys_pacct
sys_admin
sys_boot
sys_nice
sys_resource
sys_time
sys_tty_config
mknod
lease
audit_write
audit_control
setfcap
}
common cap2
{
mac_override # unused by SELinux
mac_admin # unused by SELinux
syslog
wake_alarm
block_suspend
audit_read
}
#
# Define the access vectors.
#
...
...
@@ -330,59 +384,14 @@ class system
}
#
# Define the access vector interpretation for controling capabilies
# Define the access vector interpretation for control
l
ing capabili
ti
es
#
class capability
{
# The capabilities are defined in include/linux/capability.h
# Capabilities >= 32 are defined in the capability2 class.
# Care should be taken to ensure that these are consistent with
# those definitions. (Order matters)
chown
dac_override
dac_read_search
fowner
fsetid
kill
setgid
setuid
setpcap
linux_immutable
net_bind_service
net_broadcast
net_admin
net_raw
ipc_lock
ipc_owner
sys_module
sys_rawio
sys_chroot
sys_ptrace
sys_pacct
sys_admin
sys_boot
sys_nice
sys_resource
sys_time
sys_tty_config
mknod
lease
audit_write
audit_control
setfcap
}
inherits cap
class capability2
{
mac_override # unused by SELinux
mac_admin # unused by SELinux
syslog
wake_alarm
block_suspend
audit_read
}
inherits cap2
#
# Extended Netlink classes
...
...
@@ -543,6 +552,17 @@ inherits socket
class netlink_crypto_socket
inherits socket
#
# Define the access vector interpretation for controlling capabilities
# in user namespaces
#
class cap_userns
inherits cap
class cap2_userns
inherits cap2
class property_service
{
set
...
...
This diff is collapsed.
Click to expand it.
private/security_classes
+
4
−
0
View file @
2d6dc8b5
...
...
@@ -94,6 +94,10 @@ class netlink_scsitransport_socket
class netlink_rdma_socket
class netlink_crypto_socket
# Capability checks when on a non-init user namespace
class cap_userns
class cap2_userns
# Property service
class property_service # userspace
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment