Skip to content
Snippets Groups Projects
  1. Dec 06, 2016
    • dcashman's avatar
      sepolicy: add version_policy tool and version non-platform policy. · 2e00e637
      dcashman authored
      In order to support platform changes without simultaneous updates from
      non-platform components, the platform and non-platform policies must be
      split.  In order to provide a guarantee that policy written for
      non-platform objects continues to provide the same access, all types
      exposed to non-platform policy are versioned by converting them and the
      policy using them into attributes.
      
      This change performs that split, the subsequent versioning and also
      generates a mapping file to glue the different policy components
      together.
      
      Test: Device boots and runs.
      Bug: 31369363
      Change-Id: Ibfd3eb077bd9b8e2ff3b2e6a0ca87e44d78b1317
      2e00e637
  2. Oct 06, 2016
    • dcashman's avatar
      Split general policy into public and private components. · cc39f637
      dcashman authored
      Divide policy into public and private components.  This is the first
      step in splitting the policy creation for platform and non-platform
      policies.  The policy in the public directory will be exported for use
      in non-platform policy creation.  Backwards compatibility with it will
      be achieved by converting the exported policy into attribute-based
      policy when included as part of the non-platform policy and a mapping
      file will be maintained to be included with the platform policy that
      maps exported attributes of previous versions to the current platform
      version.
      
      Eventually we would like to create a clear interface between the
      platform and non-platform device components so that the exported policy,
      and the need for attributes is minimal.  For now, almost all types and
      avrules are left in public.
      
      Test: Tested by building policy and running on device.
      
      Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
      cc39f637
  3. Mar 13, 2015
    • Stephen Smalley's avatar
      sepolicy: Clean up mls constraints. · 025b7df2
      Stephen Smalley authored
      
      Require equivalence for all write operations.  We were already
      doing this for app_data_file as a result of restricting open
      rather than read/write, so this makes the model consistent across
      all objects and operations.  It also addresses the scenario where
      we have mixed usage of levelFrom=all and levelFrom=user for
      different apps on the same device where the dominated-by (domby)
      relation may not be sufficiently restrictive.
      
      Drop the System V IPC constraints since System V IPC is never allowed
      by TE and thus these constraints are dead policy.
      
      Change-Id: Ic06a35030c086e3978c02d501c380889af8d21e0
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      025b7df2
  4. Mar 05, 2015
    • dcashman's avatar
      Revert "Drop special handling of app_data_file in mls constraints." · 60cfe79f
      dcashman authored
      This reverts commit 27042f6d.
      
      Managed profiles are represented by new android users which have the ability to
      communicate across profiles as governed by an IntentFilter provisioned by the
      DevicePolicyManager.  This communication includes reading and writing content
      URIs, which is currently obstructed by the mls separation between an owning user
      and its managed profile.
      
      Bug: 19444116
      Bug: 19525465
      Bug: 19540297
      Bug: 19592525
      Change-Id: Id9a97f24081902bceab5a96ddffd9276d751775b
      60cfe79f
  5. Feb 28, 2015
    • dcashman's avatar
      Remove read access from mls constraints. · e8f95b36
      dcashman authored
      Addresses the following denial encountered when sharing photos between personal
      and managed profiles:
      
      Binder_5: type=1400 audit(0.0:236): avc: denied { read } for path="/data/data/com.google.android.apps.plus/cache/media/3/3bbca5f1bcfa7f1-a-nw" dev="dm-0" ino=467800 scontext=u:r:untrusted_app:s0:c529,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=0
      
      Bug: 19540297
      Change-Id: If51108ec5820ca40e066d5ca3e527c7a0f03eca5
      e8f95b36
  6. Feb 20, 2015
    • Stephen Smalley's avatar
      sepolicy: allow cross-user unnamed pipe access · 7d1b6c87
      Stephen Smalley authored
      
      Exempt unnamed pipes from the MLS constraints so that they can
      be used for cross-user communications when passed over binder or
      local socket IPC.
      
      Addresses denials such as:
      avc: denied { read } for path="pipe:[59071]" dev="pipefs" ino=59071 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=fifo_file
      
      Bug: 19087939
      
      Change-Id: I77d494c4a38bf473fec05b728eaf253484deeaf8
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      7d1b6c87
  7. Mar 12, 2014
  8. Nov 27, 2012
    • Stephen Smalley's avatar
      Add policy for run-as program. · e8848726
      Stephen Smalley authored
      
      Add policy for run-as program and label it in file_contexts.
      Drop MLS constraints on local socket checks other than create/relabel
      as this interferes with connections with services, in particular for
      adb forward.
      
      Change-Id: Ib0c4abeb7cbef559e150a620c45a7c31e0531114
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      e8848726
  9. Mar 19, 2012
  10. Jan 04, 2012
Loading