Lines Matching +full:full +full:- +full:custom
6 system-wide allowlist. These restrictions also prohibit the given UIDs/GIDs
15 CAP_SETUID is granted to programs running as root or those running as a non-root
22 While it is possible to implement a tree of processes by giving full
24 tree of processes under non-root user(s) in the first place. Specifically,
28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
34 The main use case for this LSM is to allow a non-root program to transition to
35 other untrusted uids without full blown CAP_SETUID capabilities. The non-root
38 of CAP_SETUID since the non-root program cannot take advantage of CAP_SETUID to
40 namespace). The higher level goal is to allow for uid-based sandboxing of system
42 non-root programs can drop to even-lesser-privileged uids. This is especially
43 relevant when one non-root daemon on the system should be allowed to spawn other
45 basically-root-equivalent CAP_SETUID.
52 -------------------------------
60 fork(), parent processes specifying custom environment variables or command line
64 that rely on certain process-spawning semantics in Linux.
67 -------------------
80 that owns the network namespace -- not necessarily the user namespace under
83 initial namespace. This is a deal-breaker for any application that expects to
89 -------------------
90 None of the other in-tree LSMs have the capability to gate setid transitions, or