On 4/6/2016 2:55 PM, Stephen Smalley wrote: > On Wed, Apr 6, 2016 at 11:48 AM, Christopher J. PeBenito > <cpebenito@xxxxxxxxxx> wrote: >> On 4/6/2016 11:57 AM, Stephen Smalley wrote: >>> Distinguish capability checks against a target associated >>> with the init user namespace versus capability checks against >>> a target associated with a non-init user namespace by defining >>> and using separate security classes for the latter. >>> >>> This is needed to support e.g. Chrome usage of user namespaces >>> for the Chrome sandbox without needing to allow Chrome to also >>> exercise capabilities on targets in the init user namespace. >> >> Is there any reason not to define a new pair of commons (cap, cap2) in >> refpolicy? This is more of a question of what you did in the below >> hunks vs. the refpolicy patch you had in the other email which didn't >> have commons. > > Ah, good point. Just wasn't thinking very hard about the refpolicy patch ;) > That should work. In that case, I've got a local patch for refpolicy, using commons, ready to go when this patch set starts making its way upstream. -- Chris PeBenito Tresys Technology, LLC www.tresys.com | oss.tresys.com _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.