forked from phhusson/sepolicy-inject
-
Notifications
You must be signed in to change notification settings - Fork 1
A fork of selinux-inject ( https://bitbucket.org/joshua_brindle/sepolicy-inject )
seSuperuser/sepolicy-inject
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Injects allow rules into binary SELinux kernel policies Injecting a rule: $ ./sepolicy-inject -s shell -t system -c file -p read -P sepolicy Injecting multiple permissions: $ ./sepolicy-inject -s shell -t system -c file -p read,write,open -P sepolicy Add a type_attribute to a domain: $ ./sepolicy-inject -s su -a mlstrustedsubject -P sepolicy Injecting a permissive domain: $ ./sepolicy-inject -Z shell -P sepolicy Change a permissive domain to non-permissive: $ ./sepolicy-inject -z shell -P sepolicy Test a SELinux type exists: $ ./sepolicy-inject -e -s shell -P sepolicy Test a SELinux class exists: $ ./sepolicy-inject -e -c service_manager -P sepolicy Add a transition: $ ./sepolicy-inject -s su_daemon -f device -c file -t su_device -P sepolicy Add a filename transition: $ ./sepolicy-inject -s su_daemon -f device -c file -g "socket" -t su_device -P sepolicy
About
A fork of selinux-inject ( https://bitbucket.org/joshua_brindle/sepolicy-inject )
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published
Languages
- C 98.5%
- Makefile 1.5%