Skip to content
Snippets Groups Projects
Commit e468016b authored by Stephen Smalley's avatar Stephen Smalley
Browse files

zygote requires setpcap in order to drop from its bounding set.


I8560fa5ad125bf31f0d13be513431697bc7d22bb changed the zygote
to limit the bounding capability set to CAP_NET_RAW.  This triggers
a CAP_SETPCAP check by the kernel, which requires SELinux setpcap permission.

Change-Id: Ib910d97dcf708273e2806e2824f4abe9fc239d6d
Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
parent 58b0fb6d
No related branches found
No related tags found
No related merge requests found
...@@ -6,6 +6,8 @@ init_daemon_domain(zygote) ...@@ -6,6 +6,8 @@ init_daemon_domain(zygote)
typeattribute zygote mlstrustedsubject; typeattribute zygote mlstrustedsubject;
# Override DAC on files and switch uid/gid. # Override DAC on files and switch uid/gid.
allow zygote self:capability { dac_override setgid setuid }; allow zygote self:capability { dac_override setgid setuid };
# Drop capabilities from bounding set.
allow zygote self:capability setpcap;
# Switch SELinux context to app domains. # Switch SELinux context to app domains.
allow zygote system:process dyntransition; allow zygote system:process dyntransition;
allow zygote appdomain:process dyntransition; allow zygote appdomain:process dyntransition;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment