12
Chapter 2. SELinux Policy Overview
send_msg
name_bind
}
# Define a common prefix for ipc access vectors.
#
common ipc
{
create
destroy
getattr
setattr
read
write
associate
unix_read
unix_write
}
Following the common sets are all the access vector definitions. The definition is structured this way:
class
class_name
[ inherits
common_name
] {
permission_name
... }
.
#
$
#
$
#
$
A good example is the
dir
class, which inherits the permissions from the
file
class, and has
additional permissions on top:
class dir
inherits file
{
add_name
remove_name
reparent
search
rmdir
}
Another example is the class for
tcp_socket
, which inherits the
socket
set plus having its own set
of additional permissions:
class tcp_socket
inherits socket
{
connectto
newconn
acceptfrom
node_bind
}
2.6. TE Rules Attributes
Policy attributes identify as groups sets of security types that have a similar property. These groups
can be controlled by fewer, overarching rules. The relationship is many to many: a type can have any
amount of attributes, and an attribute can be associated with any number of types.
The declarations file
$SELINUX_SRC/attrib.te
is well documented in the comment blocks. The
attribute declaration syntax is:
attribute
identifier
:
#
$
## Samples from $SELINUX_SRC/attrib.te
# The domain attribute identifies every type that can be
footer
Our partners:
PHP: Hypertext Preprocessor Best Web Hosting
Java Web Hosting
Inexpensive Web Hosting
Jsp Web Hosting
Cheapest Web Hosting
Jsp Hosting
Cheap Hosting
Visionwebhosting.net Business web hosting division of Web
Design Plus. All rights reserved