Commit 90ff602e authored by Joshua Brindle's avatar Joshua Brindle

updates to readme

parent 0099ff13
Injects allow rules into binary SELinux kernel policies Injects allow rules into binary SELinux kernel policies
joshua@QuarkZilla:~/sepolicy-inject$ ./sepolicy-inject -s shell -t system -c file -p read -P sepolicy -o sepolicy2 $ ./sepolicy-inject -s shell -t system -c file -p read -P sepolicy -o sepolicy2
libsepol.policydb_index_others: security: 1 users, 2 roles, 518 types, 14 bools libsepol.policydb_index_others: security: 1 users, 2 roles, 518 types, 14 bools
libsepol.policydb_index_others: security: 1 sens, 1024 cats libsepol.policydb_index_others: security: 1 sens, 1024 cats
libsepol.policydb_index_others: security: 84 classes, 4539 rules, 162 cond rules libsepol.policydb_index_others: security: 84 classes, 4539 rules, 162 cond rules
joshua@QuarkZilla:~/sepolicy-inject$ sesearch -A -s shell -t system -c file sepolicy $ sesearch -A -s shell -t system -c file sepolicy
Found 1 semantic av rules: Found 1 semantic av rules:
allow appdomain domain : file { ioctl read getattr lock open } ; allow appdomain domain : file { ioctl read getattr lock open } ;
joshua@QuarkZilla:~/sepolicy-inject$ sesearch -A -s shell -t system -c file sepolicy2 $ sesearch -A -s shell -t system -c file sepolicy2
Found 2 semantic av rules: Found 2 semantic av rules:
allow shell system : file read ; allow shell system : file read ;
allow appdomain domain : file { ioctl read getattr lock open } ; allow appdomain domain : file { ioctl read getattr lock open } ;
TODO:
Insert multiple rules at the same time
Remove rules
Use attributes
Add permissive domains
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment