Research Menu

.
Skip Search Box

SELinux Mailing List

kernel_mls changes

From: dwalsh_at_redhat.com
Date: Wed, 30 May 2007 11:17:21 -0400


Policy used in lspp configurations

  • nsaserefpolicy/policy/modules/kernel/mls.if 2007-05-29 14:10:48.000000000 -0400 +++ serefpolicy-3.0.1/policy/modules/kernel/mls.if 2007-05-30 09:25:53.000000000 -0400 @@ -154,6 +154,26 @@ ######################################## ## <summary> ## Make specified domain MLS trusted
    +## for writing to sockets at any level
    +## that is dominated by the process clearance.
    +## </summary> +## <param name="domain">
    +## <summary>
    +## Domain allowed access.
    +## </summary>
    +## </param> +# +interface(`mls_socket_write_to_clearance',` + gen_require(` + attribute mlsnetwritetoclr; + ') + + typeattribute $1 mlsnetwritetoclr; +') + +######################################## +## <summary>
    +## Make specified domain MLS trusted
    ## for writing to sockets at any level. ## </summary> ## <param name="domain">
  • nsaserefpolicy/policy/modules/kernel/mls.te 2007-05-29 14:10:48.000000000 -0400 +++ serefpolicy-3.0.1/policy/modules/kernel/mls.te 2007-05-30 09:25:53.000000000 -0400 @@ -18,6 +18,7 @@ attribute mlsnetreadtoclr; attribute mlsnetwrite; attribute mlsnetwritetoclr; +attribute mlsnetwriteranged; attribute mlsnetupgrade; attribute mlsnetdowngrade; attribute mlsnetrecvall; @@ -43,6 +44,8 @@ attribute mlsxwinwritecolormap; attribute mlsxwinwritexinput;

+# Object attributes that allow MLS overrides for access by all subjects +attribute mlsrangedobject;
 attribute mlstrustedobject;  

 attribute privrangetrans;

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Wed 30 May 2007 - 13:37:22 EDT
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service