forked from pool/selinux-policy
Hu
2112d5575b
* Allow coreos-installer-generator manage mdadm_conf_t files * Allow setsebool_t relabel selinux data files * Allow virtqemud relabelfrom virtqemud_var_run_t dirs * Use better escape method for "interface" * Allow init and systemd-logind to inherit fds from sshd * Allow systemd-ssh-generator read sysctl files * Sync modules.conf with Fedora targeted modules * Allow virtqemud relabel user tmp files and socket files * Add missing sys_chroot capability to groupadd policy * Label /run/libvirt/qemu/channel with virtqemud_var_run_t * Allow virtqemud relabelfrom also for file and sock_file * Add virt_create_log() and virt_write_log() interfaces - Sync modules-targeted-contrib.conf with Fedora targeted modules.conf OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=271
20 lines
607 B
Plaintext
20 lines
607 B
Plaintext
#
|
|
# Multi-Category Security translation table for SELinux
|
|
#
|
|
# Uncomment the following to disable translation libary
|
|
# disable=1
|
|
#
|
|
# Objects can be categorized with 0-1023 categories defined by the admin.
|
|
# Objects can be in more than one category at a time.
|
|
# Categories are stored in the system as c0-c1023. Users can use this
|
|
# table to translate the categories into a more meaningful output.
|
|
# Examples:
|
|
# s0:c0=CompanyConfidential
|
|
# s0:c1=PatientRecord
|
|
# s0:c2=Unclassified
|
|
# s0:c3=TopSecret
|
|
# s0:c1,c3=CompanyConfidentialRedHat
|
|
s0=SystemLow
|
|
s0-s0:c0.c1023=SystemLow-SystemHigh
|
|
s0:c0.c1023=SystemHigh
|