2006-02-16 19:32:13 +00:00
|
|
|
## <summary>Multicategory security policy</summary>
|
|
|
|
## <required val="true">
|
|
|
|
## Contains attributes used in MCS policy.
|
|
|
|
## </required>
|
|
|
|
|
2009-10-07 15:48:14 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## This domain is allowed to read files and directories
|
|
|
|
## regardless of their MCS category set.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain target for user exemption.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
## <rolecap/>
|
|
|
|
#
|
|
|
|
interface(`mcs_file_read_all',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcsreadall;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcsreadall;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## This domain is allowed to write files and directories
|
|
|
|
## regardless of their MCS category set.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain target for user exemption.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
## <rolecap/>
|
|
|
|
#
|
|
|
|
interface(`mcs_file_write_all',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcswriteall;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcswriteall;
|
|
|
|
')
|
|
|
|
|
2006-02-16 19:32:13 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## This domain is allowed to sigkill and sigstop
|
2006-07-28 15:13:58 +00:00
|
|
|
## all domains regardless of their MCS category set.
|
2006-02-16 19:32:13 +00:00
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain target for user exemption.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
2006-09-06 22:07:25 +00:00
|
|
|
## <rolecap/>
|
2006-02-16 19:32:13 +00:00
|
|
|
#
|
|
|
|
interface(`mcs_killall',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcskillall;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcskillall;
|
|
|
|
')
|
2006-03-29 16:23:17 +00:00
|
|
|
|
2006-07-28 15:13:58 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## This domain is allowed to ptrace
|
|
|
|
## all domains regardless of their MCS
|
|
|
|
## category set.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain target for user exemption.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`mcs_ptrace_all',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcsptraceall;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcsptraceall;
|
|
|
|
')
|
|
|
|
|
2006-03-29 16:23:17 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Make specified domain MCS trusted
|
|
|
|
## for setting any category set for
|
|
|
|
## the processes it executes.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain target for user exemption.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`mcs_process_set_categories',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcssetcats;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcssetcats;
|
|
|
|
')
|
2010-09-22 20:42:32 +00:00
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Make specified process type MCS untrusted.
|
|
|
|
## </summary>
|
|
|
|
## <desc>
|
|
|
|
## <p>
|
|
|
|
## Make specified process type MCS untrusted. This
|
|
|
|
## prevents this process from sending signals to other processes
|
|
|
|
## with different mcs labels
|
|
|
|
## object.
|
|
|
|
## </p>
|
|
|
|
## </desc>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## The type of the process.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`mcs_untrusted_proc',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcsuntrustedproc;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcsuntrustedproc;
|
|
|
|
')
|
|
|
|
|