Skip to content
Snippets Groups Projects
  1. Mar 05, 2015
    • dcashman's avatar
      Revert "Drop special handling of app_data_file in mls constraints." · 60cfe79f
      dcashman authored
      This reverts commit 27042f6d.
      
      Managed profiles are represented by new android users which have the ability to
      communicate across profiles as governed by an IntentFilter provisioned by the
      DevicePolicyManager.  This communication includes reading and writing content
      URIs, which is currently obstructed by the mls separation between an owning user
      and its managed profile.
      
      Bug: 19444116
      Bug: 19525465
      Bug: 19540297
      Bug: 19592525
      Change-Id: Id9a97f24081902bceab5a96ddffd9276d751775b
      60cfe79f
  2. Feb 28, 2015
    • dcashman's avatar
      Remove read access from mls constraints. · e8f95b36
      dcashman authored
      Addresses the following denial encountered when sharing photos between personal
      and managed profiles:
      
      Binder_5: type=1400 audit(0.0:236): avc: denied { read } for path="/data/data/com.google.android.apps.plus/cache/media/3/3bbca5f1bcfa7f1-a-nw" dev="dm-0" ino=467800 scontext=u:r:untrusted_app:s0:c529,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=0
      
      Bug: 19540297
      Change-Id: If51108ec5820ca40e066d5ca3e527c7a0f03eca5
      e8f95b36
  3. Feb 20, 2015
    • Stephen Smalley's avatar
      sepolicy: allow cross-user unnamed pipe access · 7d1b6c87
      Stephen Smalley authored
      
      Exempt unnamed pipes from the MLS constraints so that they can
      be used for cross-user communications when passed over binder or
      local socket IPC.
      
      Addresses denials such as:
      avc: denied { read } for path="pipe:[59071]" dev="pipefs" ino=59071 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=fifo_file
      
      Bug: 19087939
      
      Change-Id: I77d494c4a38bf473fec05b728eaf253484deeaf8
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      7d1b6c87
  4. Mar 12, 2014
  5. Nov 27, 2012
    • Stephen Smalley's avatar
      Add policy for run-as program. · e8848726
      Stephen Smalley authored
      
      Add policy for run-as program and label it in file_contexts.
      Drop MLS constraints on local socket checks other than create/relabel
      as this interferes with connections with services, in particular for
      adb forward.
      
      Change-Id: Ib0c4abeb7cbef559e150a620c45a7c31e0531114
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      e8848726
  6. Mar 19, 2012
  7. Jan 04, 2012
Loading