Skip to content
Snippets Groups Projects
Commit 8d9ef067 authored by Nick Kralevich's avatar Nick Kralevich Committed by Gerrit Code Review
Browse files

Merge "Remove MAC capabilities from unconfined domains."

parents 0cbf06fd 04ee5dfb
No related branches found
No related tags found
No related merge requests found
......@@ -147,6 +147,9 @@ neverallow { domain -relabeltodomain } *:dir_file_class_set relabelto;
### neverallow rules
###
neverallow domain self:capability2 mac_override;
neverallow { domain -recovery } self:capability2 mac_admin;
# Only init should be able to load SELinux policies.
# The first load technically occurs while still in the kernel domain,
# but this does not trigger a denial since there is no policy yet.
......
......@@ -4,6 +4,8 @@ allow recovery rootfs:file entrypoint;
unconfined_domain(recovery)
relabelto_domain(recovery)
allow recovery self:capability2 mac_admin;
allow recovery {fs_type dev_type -kmem_device file_type}:dir_file_class_set relabelto;
allow recovery unlabeled:filesystem mount;
......
......@@ -16,7 +16,8 @@
# The use of this template is discouraged.
######################################################
allow unconfineddomain self:capability_class_set *;
allow unconfineddomain self:capability *;
allow unconfineddomain self:capability2 ~{ mac_override mac_admin };
allow unconfineddomain kernel:security ~{ load_policy setenforce setcheckreqprot };
allow unconfineddomain kernel:system *;
allow unconfineddomain domain:process ~{ execmem execstack execheap ptrace transition dyntransition };
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment