Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 1 | ################################################# |
| 2 | # MLS policy constraints |
| 3 | # |
| 4 | |
| 5 | # |
| 6 | # Process constraints |
| 7 | # |
| 8 | |
| 9 | # Process transition: Require equivalence unless the subject is trusted. |
| 10 | mlsconstrain process { transition dyntransition } |
| 11 | ((h1 eq h2 and l1 eq l2) or t1 == mlstrustedsubject); |
| 12 | |
| 13 | # Process read operations: No read up unless trusted. |
| 14 | mlsconstrain process { getsched getsession getpgid getcap getattr ptrace share } |
| 15 | (l1 dom l2 or t1 == mlstrustedsubject); |
| 16 | |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 17 | # Process write operations: Require equivalence unless trusted. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 18 | mlsconstrain process { sigkill sigstop signal setsched setpgid setcap setrlimit ptrace share } |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 19 | (l1 eq l2 or t1 == mlstrustedsubject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 20 | |
| 21 | # |
| 22 | # Socket constraints |
| 23 | # |
| 24 | |
Stephen Smalley | e884872 | 2012-11-13 13:00:05 -0500 | [diff] [blame] | 25 | # Create/relabel operations: Subject must be equivalent to object unless |
| 26 | # the subject is trusted. Sockets inherit the range of their creator. |
| 27 | mlsconstrain socket_class_set { create relabelfrom relabelto } |
| 28 | ((h1 eq h2 and l1 eq l2) or t1 == mlstrustedsubject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 29 | |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 30 | # Datagram send: Sender must be equivalent to the receiver unless one of them |
| 31 | # is trusted. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 32 | mlsconstrain unix_dgram_socket { sendto } |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 33 | (l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedsubject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 34 | |
| 35 | # Stream connect: Client must be equivalent to server unless one of them |
| 36 | # is trusted. |
| 37 | mlsconstrain unix_stream_socket { connectto } |
| 38 | (l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedsubject); |
| 39 | |
| 40 | # |
| 41 | # Directory/file constraints |
| 42 | # |
| 43 | |
| 44 | # Create/relabel operations: Subject must be equivalent to object unless |
| 45 | # the subject is trusted. Also, files should always be single-level. |
| 46 | # Do NOT exempt mlstrustedobject types from this constraint. |
| 47 | mlsconstrain dir_file_class_set { create relabelfrom relabelto } |
| 48 | (l2 eq h2 and (l1 eq l2 or t1 == mlstrustedsubject)); |
| 49 | |
dcashman | 60cfe79 | 2015-03-04 09:50:34 -0800 | [diff] [blame] | 50 | # |
Lokesh Gidra | 06edcd8 | 2021-03-11 11:32:47 -0800 | [diff] [blame] | 51 | # Userfaultfd constraints |
| 52 | # |
| 53 | # To enforce that anonymous inodes are self contained in the application's process. |
| 54 | mlsconstrain anon_inode { ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute open execmod } |
| 55 | (l1 eq l2); |
| 56 | |
| 57 | # |
dcashman | 60cfe79 | 2015-03-04 09:50:34 -0800 | [diff] [blame] | 58 | # Constraints for app data files only. |
| 59 | # |
| 60 | |
Alan Stokes | c5773a9 | 2020-11-09 16:53:01 +0000 | [diff] [blame] | 61 | # Only constrain open, not read/write, so already open fds can be used. |
dcashman | 60cfe79 | 2015-03-04 09:50:34 -0800 | [diff] [blame] | 62 | # Also constrain other forms of manipulation, e.g. chmod/chown, unlink, rename, etc. |
Jeff Vander Stoep | 3aa7ca5 | 2018-04-03 11:22:38 -0700 | [diff] [blame] | 63 | # Subject must dominate object unless the subject is trusted. |
Alan Stokes | 9443b2e | 2020-07-16 10:42:58 +0100 | [diff] [blame] | 64 | mlsconstrain dir { open search getattr setattr rename add_name remove_name reparent rmdir } |
Alan Stokes | c5773a9 | 2020-11-09 16:53:01 +0000 | [diff] [blame] | 65 | (t2 != app_data_file_type or l1 dom l2 or t1 == mlstrustedsubject); |
Jeff Vander Stoep | bed2e16 | 2019-01-24 09:48:57 -0800 | [diff] [blame] | 66 | mlsconstrain { file sock_file } { open setattr unlink link rename } |
Alan Stokes | c5773a9 | 2020-11-09 16:53:01 +0000 | [diff] [blame] | 67 | ( (t2 != app_data_file_type and t2 != appdomain_tmpfs) or l1 dom l2 or t1 == mlstrustedsubject); |
| 68 | |
| 69 | # For symlinks in app data files, require equivalence in order to manipulate or follow (read). |
Jeff Vander Stoep | bed2e16 | 2019-01-24 09:48:57 -0800 | [diff] [blame] | 70 | mlsconstrain { lnk_file } { open setattr unlink link rename read } |
Alan Stokes | c5773a9 | 2020-11-09 16:53:01 +0000 | [diff] [blame] | 71 | ( (t2 != app_data_file_type or t2 == privapp_data_file) or l1 eq l2 or t1 == mlstrustedsubject); |
| 72 | # But for priv_app_data_file, continue to use dominance for symlinks because dynamite relies on this. |
Jeff Vander Stoep | bed2e16 | 2019-01-24 09:48:57 -0800 | [diff] [blame] | 73 | # TODO: Migrate to equivalence when it's no longer needed. |
| 74 | mlsconstrain { lnk_file } { open setattr unlink link rename read } |
Jeff Vander Stoep | 9f5d0d9 | 2019-01-29 14:43:45 -0800 | [diff] [blame] | 75 | ( (t2 != privapp_data_file and t2 != appdomain_tmpfs) or l1 dom l2 or t1 == mlstrustedsubject); |
dcashman | 60cfe79 | 2015-03-04 09:50:34 -0800 | [diff] [blame] | 76 | |
| 77 | # |
| 78 | # Constraints for file types other than app data files. |
| 79 | # |
| 80 | |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 81 | # Read operations: Subject must dominate object unless the subject |
| 82 | # or the object is trusted. |
| 83 | mlsconstrain dir { read getattr search } |
Alan Stokes | 8bf8a26 | 2020-11-16 18:10:33 +0000 | [diff] [blame] | 84 | (t2 == app_data_file_type or l1 dom l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject |
Alan Stokes | 7aa4041 | 2020-12-04 14:07:52 +0000 | [diff] [blame] | 85 | or (t1 == mlsvendorcompat and (t2 == system_data_file or t2 == user_profile_root_file) ) ); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 86 | |
dcashman | 60cfe79 | 2015-03-04 09:50:34 -0800 | [diff] [blame] | 87 | mlsconstrain { file lnk_file sock_file chr_file blk_file } { read getattr execute } |
Alan Stokes | c5773a9 | 2020-11-09 16:53:01 +0000 | [diff] [blame] | 88 | (t2 == app_data_file_type or t2 == appdomain_tmpfs or l1 dom l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 89 | |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 90 | # Write operations: Subject must be equivalent to the object unless the |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 91 | # subject or the object is trusted. |
| 92 | mlsconstrain dir { write setattr rename add_name remove_name reparent rmdir } |
Alan Stokes | c5773a9 | 2020-11-09 16:53:01 +0000 | [diff] [blame] | 93 | (t2 == app_data_file_type or l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 94 | |
| 95 | mlsconstrain { file lnk_file sock_file chr_file blk_file } { write setattr append unlink link rename } |
Alan Stokes | c5773a9 | 2020-11-09 16:53:01 +0000 | [diff] [blame] | 96 | (t2 == app_data_file_type or t2 == appdomain_tmpfs or l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 97 | |
| 98 | # Special case for FIFOs. |
| 99 | # These can be unnamed pipes, in which case they will be labeled with the |
| 100 | # creating process' label. Thus we also have an exemption when the "object" |
Stephen Smalley | 7d1b6c8 | 2015-02-20 12:30:31 -0500 | [diff] [blame] | 101 | # is a domain type, so that processes can communicate via unnamed pipes |
| 102 | # passed by binder or local socket IPC. |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 103 | mlsconstrain fifo_file { read getattr } |
Stephen Smalley | 7d1b6c8 | 2015-02-20 12:30:31 -0500 | [diff] [blame] | 104 | (l1 dom l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject or t2 == domain); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 105 | |
| 106 | mlsconstrain fifo_file { write setattr append unlink link rename } |
Stephen Smalley | 025b7df | 2015-03-13 17:07:39 -0400 | [diff] [blame] | 107 | (l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedobject or t2 == domain); |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 108 | |
| 109 | # |
| 110 | # Binder IPC constraints |
| 111 | # |
| 112 | # Presently commented out, as apps are expected to call one another. |
| 113 | # This would only make sense if apps were assigned categories |
| 114 | # based on allowable communications rather than per-app categories. |
| 115 | #mlsconstrain binder call |
| 116 | # (l1 eq l2 or t1 == mlstrustedsubject or t2 == mlstrustedsubject); |