Skip to content
Snippets Groups Projects
  1. Mar 13, 2015
    • Stephen Smalley's avatar
      sepolicy: Clean up mls constraints. · 025b7df2
      Stephen Smalley authored
      
      Require equivalence for all write operations.  We were already
      doing this for app_data_file as a result of restricting open
      rather than read/write, so this makes the model consistent across
      all objects and operations.  It also addresses the scenario where
      we have mixed usage of levelFrom=all and levelFrom=user for
      different apps on the same device where the dominated-by (domby)
      relation may not be sufficiently restrictive.
      
      Drop the System V IPC constraints since System V IPC is never allowed
      by TE and thus these constraints are dead policy.
      
      Change-Id: Ic06a35030c086e3978c02d501c380889af8d21e0
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      025b7df2
  2. Mar 05, 2015
    • dcashman's avatar
      Revert "Drop special handling of app_data_file in mls constraints." · 60cfe79f
      dcashman authored
      This reverts commit 27042f6d.
      
      Managed profiles are represented by new android users which have the ability to
      communicate across profiles as governed by an IntentFilter provisioned by the
      DevicePolicyManager.  This communication includes reading and writing content
      URIs, which is currently obstructed by the mls separation between an owning user
      and its managed profile.
      
      Bug: 19444116
      Bug: 19525465
      Bug: 19540297
      Bug: 19592525
      Change-Id: Id9a97f24081902bceab5a96ddffd9276d751775b
      60cfe79f
  3. Feb 28, 2015
    • dcashman's avatar
      Remove read access from mls constraints. · e8f95b36
      dcashman authored
      Addresses the following denial encountered when sharing photos between personal
      and managed profiles:
      
      Binder_5: type=1400 audit(0.0:236): avc: denied { read } for path="/data/data/com.google.android.apps.plus/cache/media/3/3bbca5f1bcfa7f1-a-nw" dev="dm-0" ino=467800 scontext=u:r:untrusted_app:s0:c529,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=0
      
      Bug: 19540297
      Change-Id: If51108ec5820ca40e066d5ca3e527c7a0f03eca5
      e8f95b36
  4. Feb 20, 2015
    • Stephen Smalley's avatar
      sepolicy: allow cross-user unnamed pipe access · 7d1b6c87
      Stephen Smalley authored
      
      Exempt unnamed pipes from the MLS constraints so that they can
      be used for cross-user communications when passed over binder or
      local socket IPC.
      
      Addresses denials such as:
      avc: denied { read } for path="pipe:[59071]" dev="pipefs" ino=59071 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=fifo_file
      
      Bug: 19087939
      
      Change-Id: I77d494c4a38bf473fec05b728eaf253484deeaf8
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      7d1b6c87
  5. Mar 12, 2014
  6. Nov 27, 2012
    • Stephen Smalley's avatar
      Add policy for run-as program. · e8848726
      Stephen Smalley authored
      
      Add policy for run-as program and label it in file_contexts.
      Drop MLS constraints on local socket checks other than create/relabel
      as this interferes with connections with services, in particular for
      adb forward.
      
      Change-Id: Ib0c4abeb7cbef559e150a620c45a7c31e0531114
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      e8848726
  7. Mar 19, 2012
  8. Jan 04, 2012
Loading