Re: [PATCH 1/1] allocate perms to platformappdomain over system_data_file

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2012-07-27 at 12:33 -0700, Haiqing Jiang wrote:
> Exactly. I was thinking of adding the policy into if (app_ndk). But
> later on I wondered whether it could be generic for platformappdomain.
> So, what is your opinion? Add the permissions to if (app_ndk) or to
> platformappdomain rules? Thanks. 

The latter.  Although this suggests to me that we ought to explore using
different types on the lib directory for platform apps vs. third party
apps, possibly based on seinfo=, so that we can allow platform apps to
execute platform shared objects while blocking execution of any .so
files shipped by a third party app as a safety measure.

> 
> On Fri, Jul 27, 2012 at 11:52 AM, Stephen Smalley <sds@xxxxxxxxxxxxx>
> wrote:
>         On Fri, 2012-07-27 at 11:46 -0700, Haiqing Jiang wrote:
>         > This is the denial information. What is your opinion?
>         Thanks.
>         >
>         >
>         > 5>[ 2978.206604] type=1400 audit(1342634359.195:1155): avc:
>          denied
>         >  { open } for  pid=10393 comm="android.cts.jni"
>         name="libjnitest.so"
>         > dev=mmcblk0p12 ino=578521 scontext=u:r:release_app:s0:c41
>         > tcontext=u:object_r:system_data_file:s0 tclass=file
>         > <5>[12124.019561] type=1400 audit(1342643505.007:1919):
>         avc:  denied
>         > { open } for  pid=24055 comm="ationTestRunner"
>         > name="libctspermission_jni.so" dev=mmcblk0p12 ino=578541
>         > scontext=u:r:release_app:s0:c41
>         > tcontext=u:object_r:system_data_file:s0 tclass=file
>         
>         
>         It is trying to execute a shared object from the lib
>         directory.  So it
>         is the same as app_ndk, except for platformappdomain rather
>         than
>         untrusted_app.
>         
>         >
>         >
>         > On Fri, Jul 27, 2012 at 11:37 AM, Stephen Smalley
>         <sds@xxxxxxxxxxxxx>
>         > wrote:
>         >         On Fri, 2012-07-27 at 11:34 -0700, Haiqing Jiang
>         wrote:
>         >         > ---
>         >         >  app.te |    2 ++
>         >         >  1 files changed, 2 insertions(+), 0 deletions(-)
>         >         >
>         >         > diff --git a/app.te b/app.te
>         >         > index 85de816..dca2e0c 100644
>         >         > --- a/app.te
>         >         > +++ b/app.te
>         >         > @@ -83,6 +83,8 @@ allow platformappdomain
>         >         platform_app_data_file:notdevfile_class_set
>         create_file_
>         >         >  # App sdcard file accesses
>         >         >  allow platformappdomain sdcard:dir
>         create_dir_perms;
>         >         >  allow platformappdomain sdcard:file
>         create_file_perms;
>         >         > +# System data file accesses XXX????
>         >         > +allow platformappdomain system_data_file:file
>         open;
>         >         >
>         >         >  #
>         >         >  # Untrusted apps.
>         >
>         >
>         >         Need to know more about the denial to diagnose.
>         >         Also, enabling syscall audit may help with getting
>         full
>         >         pathnames,
>         >         although you likely need the ARM audit patches for
>         that.
>         >
>         >         --
>         >         Stephen Smalley
>         >         National Security Agency
>         >
>         >
>         >
>         >
>         >
>         > --
>         > -----------------------------------
>         > Haiqing Jiang, PH.D student
>         >
>         >
>         > Computer Science Department, North Carolina State University
>         >
>         >
>         >
>         >
>         
>         --
>         Stephen Smalley
>         National Security Agency
>         
>         
> 
> 
> 
> 
> -- 
> -----------------------------------
> Haiqing Jiang, PH.D student
> 
> 
> Computer Science Department, North Carolina State University
> 
> 
> 

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux