@@ -386,8 +386,13 @@
setkeycreate
setsockcreate
getrlimit
+ nnp_transition
}
+class process2
+{
+ nosuid_transition
+}
#
# Define the access vector interpretation for ipc-related objects
@@ -110,6 +110,9 @@
# Capabilities >= 32
class capability2
+# Process permissions >= 32
+class process2
+
# More SE-X Windows stuff
class x_resource # userspace
class x_event # userspace
@@ -49,7 +49,7 @@
attribute named_filetrans_domain;
# Transitions only allowed from domains to other domains
-neverallow domain ~domain:process { transition dyntransition };
+neverallow domain ~domain:process { transition nnp_transition dyntransition };
# Domains that are unconfined
attribute unconfined_domain_type;
@@ -238,7 +238,7 @@
allow unconfined_domain_type unconfined_domain_type:dbus send_msg;
# Act upon any other process.
-allow unconfined_domain_type domain:process ~{ ptrace transition dyntransition execmem execstack execheap };
+allow unconfined_domain_type domain:process ~{ ptrace transition nnp_transition dyntransition execmem execstack execheap };
tunable_policy(`deny_ptrace',`',`
allow unconfined_domain_type domain:process ptrace;
')
@@ -507,7 +507,7 @@
allow kern_unconfined unlabeled_t:filesystem *;
allow kern_unconfined unlabeled_t:association *;
allow kern_unconfined unlabeled_t:packet *;
-allow kern_unconfined unlabeled_t:process ~{ ptrace transition dyntransition execmem execstack execheap };
+allow kern_unconfined unlabeled_t:process ~{ ptrace transition nnp_transition dyntransition execmem execstack execheap };
gen_require(`
bool secure_mode_insmod;
@@ -72,3 +72,5 @@
# qipcrtr_socket
#
policycap extended_socket_class;
+
+policycap nnp_nosuid_transition;