selinux-policy/policy/modules/kernel/mcs.if
Dan Walsh 6ed3f15e82 Allow domains with different mcs levels to send each other signals as long as they are not identified as mcsconstrainproc
Allow shutdown to write utmp and search /var/log
Allow mozilla_plugin to send nsplugin signals
Split out samba_run_unconfined_net from unconfined_domain stuff.  TO allow unconfined.pp module to be removed
Allow nrpe to send signal and sigkill to the plugins
Fix up xguest to allow it to read hwdata and gconf_etc_t
Allow initrc_t to manage faillog
2010-09-22 16:42:32 -04:00

132 lines
2.6 KiB
Plaintext

## <summary>Multicategory security policy</summary>
## <required val="true">
## Contains attributes used in MCS policy.
## </required>
########################################
## <summary>
## This domain is allowed to read files and directories
## regardless of their MCS category set.
## </summary>
## <param name="domain">
## <summary>
## Domain target for user exemption.
## </summary>
## </param>
## <rolecap/>
#
interface(`mcs_file_read_all',`
gen_require(`
attribute mcsreadall;
')
typeattribute $1 mcsreadall;
')
########################################
## <summary>
## This domain is allowed to write files and directories
## regardless of their MCS category set.
## </summary>
## <param name="domain">
## <summary>
## Domain target for user exemption.
## </summary>
## </param>
## <rolecap/>
#
interface(`mcs_file_write_all',`
gen_require(`
attribute mcswriteall;
')
typeattribute $1 mcswriteall;
')
########################################
## <summary>
## This domain is allowed to sigkill and sigstop
## all domains regardless of their MCS category set.
## </summary>
## <param name="domain">
## <summary>
## Domain target for user exemption.
## </summary>
## </param>
## <rolecap/>
#
interface(`mcs_killall',`
gen_require(`
attribute mcskillall;
')
typeattribute $1 mcskillall;
')
########################################
## <summary>
## This domain is allowed to ptrace
## all domains regardless of their MCS
## category set.
## </summary>
## <param name="domain">
## <summary>
## Domain target for user exemption.
## </summary>
## </param>
#
interface(`mcs_ptrace_all',`
gen_require(`
attribute mcsptraceall;
')
typeattribute $1 mcsptraceall;
')
########################################
## <summary>
## Make specified domain MCS trusted
## for setting any category set for
## the processes it executes.
## </summary>
## <param name="domain">
## <summary>
## Domain target for user exemption.
## </summary>
## </param>
#
interface(`mcs_process_set_categories',`
gen_require(`
attribute mcssetcats;
')
typeattribute $1 mcssetcats;
')
########################################
## <summary>
## Make specified process type MCS untrusted.
## </summary>
## <desc>
## <p>
## Make specified process type MCS untrusted. This
## prevents this process from sending signals to other processes
## with different mcs labels
## object.
## </p>
## </desc>
## <param name="domain">
## <summary>
## The type of the process.
## </summary>
## </param>
#
interface(`mcs_untrusted_proc',`
gen_require(`
attribute mcsuntrustedproc;
')
typeattribute $1 mcsuntrustedproc;
')