aboutsummaryrefslogtreecommitdiffstats
path: root/mls
Commit message (Collapse)AuthorAgeFilesLines
* sepolicy: Clean up mls constraints.Stephen Smalley2015-03-131-25/+9
| | | | | | | | | | | | | | | | Require equivalence for all write operations. We were already doing this for app_data_file as a result of restricting open rather than read/write, so this makes the model consistent across all objects and operations. It also addresses the scenario where we have mixed usage of levelFrom=all and levelFrom=user for different apps on the same device where the dominated-by (domby) relation may not be sufficiently restrictive. Drop the System V IPC constraints since System V IPC is never allowed by TE and thus these constraints are dead policy. Change-Id: Ic06a35030c086e3978c02d501c380889af8d21e0 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Revert "Drop special handling of app_data_file in mls constraints."dcashman2015-03-041-5/+21
| | | | | | | | | | | | | | | | This reverts commit 27042f6da110b8bef9ff291f724351464958da86. Managed profiles are represented by new android users which have the ability to communicate across profiles as governed by an IntentFilter provisioned by the DevicePolicyManager. This communication includes reading and writing content URIs, which is currently obstructed by the mls separation between an owning user and its managed profile. Bug: 19444116 Bug: 19525465 Bug: 19540297 Bug: 19592525 Change-Id: Id9a97f24081902bceab5a96ddffd9276d751775b
* Remove read access from mls constraints.dcashman2015-02-271-1/+1
| | | | | | | | | | Addresses the following denial encountered when sharing photos between personal and managed profiles: Binder_5: type=1400 audit(0.0:236): avc: denied { read } for path="/data/data/com.google.android.apps.plus/cache/media/3/3bbca5f1bcfa7f1-a-nw" dev="dm-0" ino=467800 scontext=u:r:untrusted_app:s0:c529,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=0 Bug: 19540297 Change-Id: If51108ec5820ca40e066d5ca3e527c7a0f03eca5
* sepolicy: allow cross-user unnamed pipe accessStephen Smalley2015-02-201-3/+4
| | | | | | | | | | | | | | Exempt unnamed pipes from the MLS constraints so that they can be used for cross-user communications when passed over binder or local socket IPC. Addresses denials such as: avc: denied { read } for path="pipe:[59071]" dev="pipefs" ino=59071 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=fifo_file Bug: 19087939 Change-Id: I77d494c4a38bf473fec05b728eaf253484deeaf8 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Drop special handling of app_data_file in mls constraints.Stephen Smalley2014-03-121-20/+4
| | | | | | | | | | | This was a legacy of trying to support per-app level isolation in a compatible manner by blocking direct open but permitting read/write via passing of open files over Binder or local sockets. It is no longer relevant and just confusing to anyone trying to use the mls support for anything else. Change-Id: I6d92a7cc20bd7d2fecd2c9357e470a30f10967a3 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Add policy for run-as program.Stephen Smalley2012-11-271-5/+4
| | | | | | | | | | Add policy for run-as program and label it in file_contexts. Drop MLS constraints on local socket checks other than create/relabel as this interferes with connections with services, in particular for adb forward. Change-Id: Ib0c4abeb7cbef559e150a620c45a7c31e0531114 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Rewrite MLS constraints to only constrain open for app_data_file, not ↵Stephen Smalley2012-03-191-4/+20
| | | | read/write.
* SE Android policy.Stephen Smalley2012-01-041-0/+112