Injects allow rules into binary SELinux kernel policies Injecting a rule: $ ./sepolicy-inject -s shell -t system -c file -p read -P sepolicy -o sepolicy2 libsepol.policydb_index_others: security: 1 users, 2 roles, 518 types, 14 bools libsepol.policydb_index_others: security: 1 sens, 1024 cats libsepol.policydb_index_others: security: 84 classes, 4539 rules, 162 cond rules $ sesearch -A -s shell -t system -c file sepolicy Found 1 semantic av rules: allow appdomain domain : file { ioctl read getattr lock open } ; $ sesearch -A -s shell -t system -c file sepolicy2 Found 2 semantic av rules: allow shell system : file read ; allow appdomain domain : file { ioctl read getattr lock open } ; Injecting a permissive domain: $ ./sepolicy-inject -Z shell -P sepolicy -o sepolicy2 $ seinfo sepolicy | grep Permissive Permissives: 0 Polcap: 2 $ seinfo sepolicy2 | grep Permissive Permissives: 1 Polcap: 2 TODO: Insert multiple rules at the same time Remove rules Use attributes Get some tutorials from here: http://unix.stackexchange.com/questions/232982/listing-and-editing-the-content-of-sepolicy http://unix.stackexchange.com/questions/233670/selinux-and-chroot-system-call
CNROMS/sepolicy-inject
A fork of selinux-inject ( https://bitbucket.org/joshua_brindle/sepolicy-inject )
C