Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 1 | ################################################# |
| 2 | # MLS policy constraints |
| 3 | # |
| 4 | |
| 5 | # |
| 6 | # Process constraints |
| 7 | # |
| 8 | |
| 9 | # Process transition: Require equivalence unless the subject is trusted. |
| 10 | mlsconstrain process { transition dyntransition } |
| 11 | ((h1 eq h2 and l1 eq l2) or t1 == mlstrustedsubject); |
| 12 | |
| 13 | # Process read operations: No read up unless trusted. |
| 14 | mlsconstrain process { getsched getsession getpgid getcap getattr ptrace share } |
| 15 | (l1 dom l2 or t1 == mlstrustedsubject); |
| 16 | |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 17 | # Process write operations: Require equivalence unless trusted. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 18 | mlsconstrain process { sigkill sigstop signal setsched setpgid setcap setrlimit ptrace share } |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 19 | (l1 eq l2 or t1 == mlstrustedsubject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 20 | |
| 21 | # |
| 22 | # Socket constraints |
| 23 | # |
| 24 | |
Stephen Smalley | e884872 | 2012-11-13 13:00:05 -0500 | [diff] [blame] | 25 | # Create/relabel operations: Subject must be equivalent to object unless |
| 26 | # the subject is trusted. Sockets inherit the range of their creator. |
| 27 | mlsconstrain socket_class_set { create relabelfrom relabelto } |
| 28 | ((h1 eq h2 and l1 eq l2) or t1 == mlstrustedsubject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 29 | |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 30 | # Datagram send: Sender must be equivalent to the receiver unless one of them |
| 31 | # is trusted. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 32 | mlsconstrain unix_dgram_socket { sendto } |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 33 | (l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedsubject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 34 | |
| 35 | # Stream connect: Client must be equivalent to server unless one of them |
| 36 | # is trusted. |
| 37 | mlsconstrain unix_stream_socket { connectto } |
| 38 | (l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedsubject); |
| 39 | |
| 40 | # |
| 41 | # Directory/file constraints |
| 42 | # |
| 43 | |
| 44 | # Create/relabel operations: Subject must be equivalent to object unless |
| 45 | # the subject is trusted. Also, files should always be single-level. |
| 46 | # Do NOT exempt mlstrustedobject types from this constraint. |
| 47 | mlsconstrain dir_file_class_set { create relabelfrom relabelto } |
| 48 | (l2 eq h2 and (l1 eq l2 or t1 == mlstrustedsubject)); |
| 49 | |
dcashman | 60cfe79 | 2015-03-04 09:50:34 -0800 | [diff] [blame] | 50 | # |
| 51 | # Constraints for app data files only. |
| 52 | # |
| 53 | |
| 54 | # Only constrain open, not read/write. |
| 55 | # Also constrain other forms of manipulation, e.g. chmod/chown, unlink, rename, etc. |
Jeff Vander Stoep | 3aa7ca5 | 2018-04-03 11:22:38 -0700 | [diff] [blame] | 56 | # Subject must dominate object unless the subject is trusted. |
dcashman | 60cfe79 | 2015-03-04 09:50:34 -0800 | [diff] [blame] | 57 | mlsconstrain dir { open search setattr rename add_name remove_name reparent rmdir } |
Nick Kralevich | 23c9d91 | 2018-08-02 15:54:23 -0700 | [diff] [blame] | 58 | ( (t2 != app_data_file and t2 != privapp_data_file ) or l1 dom l2 or t1 == mlstrustedsubject); |
Jeff Vander Stoep | bed2e16 | 2019-01-24 09:48:57 -0800 | [diff] [blame] | 59 | mlsconstrain { file sock_file } { open setattr unlink link rename } |
ji, zhenlong z | fdfa42b | 2018-10-19 13:21:52 +0800 | [diff] [blame] | 60 | ( (t2 != app_data_file and t2 != privapp_data_file and t2 != priv_app_tmpfs) or l1 dom l2 or t1 == mlstrustedsubject); |
Jeff Vander Stoep | bed2e16 | 2019-01-24 09:48:57 -0800 | [diff] [blame] | 61 | # For symlinks in app_data_file, require equivalence in order to manipulate or follow (read). |
| 62 | mlsconstrain { lnk_file } { open setattr unlink link rename read } |
| 63 | ( (t2 != app_data_file) or l1 eq l2 or t1 == mlstrustedsubject); |
| 64 | # For priv_app_data_file, continue to use dominance for symlinks because dynamite relies on this. |
| 65 | # TODO: Migrate to equivalence when it's no longer needed. |
| 66 | mlsconstrain { lnk_file } { open setattr unlink link rename read } |
| 67 | ( (t2 != privapp_data_file and t2 != priv_app_tmpfs) or l1 dom l2 or t1 == mlstrustedsubject); |
dcashman | 60cfe79 | 2015-03-04 09:50:34 -0800 | [diff] [blame] | 68 | |
| 69 | # |
| 70 | # Constraints for file types other than app data files. |
| 71 | # |
| 72 | |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 73 | # Read operations: Subject must dominate object unless the subject |
| 74 | # or the object is trusted. |
| 75 | mlsconstrain dir { read getattr search } |
Nick Kralevich | 23c9d91 | 2018-08-02 15:54:23 -0700 | [diff] [blame] | 76 | (t2 == app_data_file or t2 == privapp_data_file or l1 dom l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 77 | |
dcashman | 60cfe79 | 2015-03-04 09:50:34 -0800 | [diff] [blame] | 78 | mlsconstrain { file lnk_file sock_file chr_file blk_file } { read getattr execute } |
ji, zhenlong z | fdfa42b | 2018-10-19 13:21:52 +0800 | [diff] [blame] | 79 | (t2 == app_data_file or t2 == privapp_data_file or t2 == priv_app_tmpfs or l1 dom l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 80 | |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 81 | # Write operations: Subject must be equivalent to the object unless the |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 82 | # subject or the object is trusted. |
| 83 | mlsconstrain dir { write setattr rename add_name remove_name reparent rmdir } |
Nick Kralevich | 23c9d91 | 2018-08-02 15:54:23 -0700 | [diff] [blame] | 84 | (t2 == app_data_file or t2 == privapp_data_file or l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 85 | |
| 86 | mlsconstrain { file lnk_file sock_file chr_file blk_file } { write setattr append unlink link rename } |
ji, zhenlong z | fdfa42b | 2018-10-19 13:21:52 +0800 | [diff] [blame] | 87 | (t2 == app_data_file or t2 == privapp_data_file or t2 == priv_app_tmpfs or l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 88 | |
| 89 | # Special case for FIFOs. |
| 90 | # These can be unnamed pipes, in which case they will be labeled with the |
| 91 | # creating process' label. Thus we also have an exemption when the "object" |
Stephen Smalley | 7d1b6c8 | 2015-02-20 12:30:31 -0500 | [diff] [blame] | 92 | # is a domain type, so that processes can communicate via unnamed pipes |
| 93 | # passed by binder or local socket IPC. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 94 | mlsconstrain fifo_file { read getattr } |
Stephen Smalley | 7d1b6c8 | 2015-02-20 12:30:31 -0500 | [diff] [blame] | 95 | (l1 dom l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject or t2 == domain); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 96 | |
| 97 | mlsconstrain fifo_file { write setattr append unlink link rename } |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 98 | (l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject or t2 == domain); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 99 | |
| 100 | # |
| 101 | # Binder IPC constraints |
| 102 | # |
| 103 | # Presently commented out, as apps are expected to call one another. |
| 104 | # This would only make sense if apps were assigned categories |
| 105 | # based on allowable communications rather than per-app categories. |
| 106 | #mlsconstrain binder call |
| 107 | # (l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedsubject); |