aboutsummaryrefslogtreecommitdiffstats
path: root/zygote.te
diff options
context:
space:
mode:
authorStephen Smalley <sds@tycho.nsa.gov>2014-05-23 11:26:19 -0400
committerStephen Smalley <sds@tycho.nsa.gov>2014-05-23 13:14:22 -0400
commit356f4be679544363466dad93e7bee68b2a6f2cf0 (patch)
treec8546dcc31738c6fac03d7c1ce6ba65665aad45e /zygote.te
parent4fce0ef97c2a4cb6e0ce2adf17c012c8be6252bf (diff)
downloadandroid_external_sepolicy-356f4be679544363466dad93e7bee68b2a6f2cf0.tar.gz
android_external_sepolicy-356f4be679544363466dad93e7bee68b2a6f2cf0.tar.bz2
android_external_sepolicy-356f4be679544363466dad93e7bee68b2a6f2cf0.zip
Restrict requesting contexts other than policy-defined defaults.
Writing to the /proc/self/attr files (encapsulated by the libselinux set*con functions) enables a program to request a specific security context for various operations instead of the policy-defined defaults. The security context specified using these calls is checked by an operation-specific permission, e.g. dyntransition for setcon, transition for setexeccon, create for setfscreatecon or setsockcreatecon, but the ability to request a context at all is controlled by a process permission. Omit these permissions from domain.te and only add them back where required so that only specific domains can even request a context other than the default defined by the policy. Change-Id: I6a2fb1279318625a80f3ea8e3f0932bdbe6df676 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Diffstat (limited to 'zygote.te')
-rw-r--r--zygote.te1
1 files changed, 1 insertions, 0 deletions
diff --git a/zygote.te b/zygote.te
index 4d169f3..da3a037 100644
--- a/zygote.te
+++ b/zygote.te
@@ -9,6 +9,7 @@ allow zygote self:capability { dac_override setgid setuid fowner chown };
# Drop capabilities from bounding set.
allow zygote self:capability setpcap;
# Switch SELinux context to app domains.
+allow zygote self:process setcurrent;
allow zygote system_server:process dyntransition;
allow zygote appdomain:process dyntransition;
# Allow zygote to read app /proc/pid dirs (b/10455872)