Skip to content

Commit 8940073

Browse files
committed
Add documentation for new system permissions
These new permissions break up module_load into more granular kernel load related permissions when the object being loaded is not a kernel module. Signed-off-by: Daniel Burgener <[email protected]>
1 parent 778e63e commit 8940073

File tree

1 file changed

+18
-1
lines changed

1 file changed

+18
-1
lines changed

src/object_classes_permissions.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1991,12 +1991,24 @@ Note that while this is defined as a kernel object class, the userspace
19911991

19921992
This is the overall system object and there is only one instance of this object.
19931993

1994-
**Permissions** - 6 unique permissions:
1994+
**Permissions** - 10 unique permissions:
1995+
1996+
*firmware_load*
1997+
1998+
- Load firmware updates through the Linux firmware API.
19951999

19962000
*ipc_info*
19972001

19982002
- Get info about an IPC object.
19992003

2004+
*kexec_image_load*
2005+
2006+
- Load a new kernel image for kexec.
2007+
2008+
*kexec_initramfs_load*
2009+
2010+
- Load an initrd image for use with *kexec --initrd*
2011+
20002012
*module_load*
20012013

20022014
- Required permission when reading a file that is a 'kernel module'.
@@ -2007,6 +2019,11 @@ This is the overall system object and there is only one instance of this object.
20072019

20082020
- Request the kernel to load a module.
20092021

2022+
*policy_load*
2023+
2024+
- Load a policy for a kernel module that takes policy from userspace (besides
2025+
SELinux). Current examples are IMA, loadpin and zram.
2026+
20102027
*syslog_console*
20112028

20122029
- Control output of kernel messages to the console with ***syslog**(2)*.

0 commit comments

Comments
 (0)