• S
    selinux: only invoke capabilities and selinux for CAP_MAC_ADMIN checks · db59000a
    Stephen Smalley 提交于
    SELinux uses CAP_MAC_ADMIN to control the ability to get or set a raw,
    uninterpreted security context unknown to the currently loaded security
    policy. When performing these checks, we only want to perform a base
    capabilities check and a SELinux permission check.  If any other
    modules that implement a capable hook are stacked with SELinux, we do
    not want to require them to also have to authorize CAP_MAC_ADMIN,
    since it may have different implications for their security model.
    Rework the CAP_MAC_ADMIN checks within SELinux to only invoke the
    capabilities module and the SELinux permission checking.
    Signed-off-by: NStephen Smalley <sds@tycho.nsa.gov>
    Signed-off-by: NPaul Moore <paul@paul-moore.com>
    db59000a
hooks.c 164.3 KB