2006-02-16 19:32:13 +00:00
|
|
|
## <summary>Multicategory security policy</summary>
|
|
|
|
## <required val="true">
|
|
|
|
## Contains attributes used in MCS policy.
|
|
|
|
## </required>
|
|
|
|
|
2012-11-28 21:26:05 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Constrain by category access control (MCS).
|
|
|
|
## </summary>
|
|
|
|
## <desc>
|
|
|
|
## <p>
|
|
|
|
## Constrain the specified type by category based
|
|
|
|
## access control (MCS) This prevents this domain from
|
|
|
|
## interacting with subjects and operating on objects
|
|
|
|
## that it otherwise would be able to interact
|
|
|
|
## with or operate on respectively.
|
|
|
|
## </p>
|
|
|
|
## </desc>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Type to be constrained by MCS.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
## <infoflow type="none"/>
|
|
|
|
#
|
|
|
|
interface(`mcs_constrained',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcs_constrained_type;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcs_constrained_type;
|
|
|
|
')
|
|
|
|
|
2009-10-07 15:48:14 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## This domain is allowed to read files and directories
|
|
|
|
## regardless of their MCS category set.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain target for user exemption.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
## <rolecap/>
|
|
|
|
#
|
|
|
|
interface(`mcs_file_read_all',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcsreadall;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcsreadall;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## This domain is allowed to write files and directories
|
|
|
|
## regardless of their MCS category set.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain target for user exemption.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
## <rolecap/>
|
|
|
|
#
|
|
|
|
interface(`mcs_file_write_all',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcswriteall;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcswriteall;
|
|
|
|
')
|
|
|
|
|
2006-02-16 19:32:13 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
2016-12-06 12:28:10 +00:00
|
|
|
## This domain is allowed to sigkill and sigstop
|
2006-07-28 15:13:58 +00:00
|
|
|
## all domains regardless of their MCS category set.
|
2006-02-16 19:32:13 +00:00
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain target for user exemption.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
2006-09-06 22:07:25 +00:00
|
|
|
## <rolecap/>
|
2006-02-16 19:32:13 +00:00
|
|
|
#
|
|
|
|
interface(`mcs_killall',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcskillall;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcskillall;
|
|
|
|
')
|
2006-03-29 16:23:17 +00:00
|
|
|
|
2006-07-28 15:13:58 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## This domain is allowed to ptrace
|
|
|
|
## all domains regardless of their MCS
|
|
|
|
## category set.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain target for user exemption.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`mcs_ptrace_all',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcsptraceall;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcsptraceall;
|
|
|
|
')
|
|
|
|
|
2006-03-29 16:23:17 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Make specified domain MCS trusted
|
|
|
|
## for setting any category set for
|
|
|
|
## the processes it executes.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain target for user exemption.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`mcs_process_set_categories',`
|
|
|
|
gen_require(`
|
|
|
|
attribute mcssetcats;
|
|
|
|
')
|
|
|
|
|
|
|
|
typeattribute $1 mcssetcats;
|
|
|
|
')
|