Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The policy to the denials should be: allow untrusted_app {block_device, radio_device, log_device}:lnk_file read; (ignore the syntax error). Do you think it's OK to merge it to: allow appdomain dev_type:dir_file_class_set { getattr read }???? Or we need to add separate policies? (like, allow untrusted_app specific device type:lnk_file read;)

On Mon, Jul 30, 2012 at 10:33 AM, Haiqing Jiang <hqjiang1988@xxxxxxxxx> wrote:
The denial information is shown as below:

<5>[ 2219.393524] type=1400 audit(1342221801.398:17): avc:  denied  { read } for  pid=2687 comm="ationTestRunner" name="mtdblock0" dev=tmpfs ino=2562 scontext=u:r:untrusted_app:s0:c38 tcontext=u:object_r:block_device:s0 tclass=lnk_file

<5>[ 2219.399566] type=1400 audit(1342221801.406:18): avc:  denied  { read } for  pid=2687 comm="ationTestRunner" name="radio" dev=tmpfs ino=2527 scontext=u:r:untrusted_app:s0:c38 tcontext=u:object_r:radio_device:s0 tclass=lnk_file

<5>[ 2005.011016] type=1400 audit(1342224760.046:32): avc:  denied  { read } for  pid=7264 comm="onCtsTestRunner" name="events" dev=tmpfs ino=2902 scontext=u:r:untrusted_app:s0:c38 tcontext=u:object_r:log_device:s0 tclass=chr_file


On Mon, Jul 30, 2012 at 5:14 AM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
On Fri, 2012-07-27 at 15:40 -0700, Haiqing Jiang wrote:
> ---
>  cts.te |    2 +-
>  1 files changed, 1 insertions(+), 1 deletions(-)
>
> diff --git a/cts.te b/cts.te
> index 489be1a..ff8a9f0 100644
> --- a/cts.te
> +++ b/cts.te
> @@ -20,7 +20,7 @@ allow appdomain file_type:dir r_dir_perms;
>  allow appdomain fs_type:dir r_dir_perms;
>  allow appdomain dev_type:dir r_dir_perms;
>  allow appdomain file_type:dir_file_class_set getattr;
> -allow appdomain dev_type:dir_file_class_set getattr;
> +allow appdomain dev_type:dir_file_class_set { getattr read };
>  allow appdomain fs_type:dir_file_class_set getattr;
>
>  # Execute the shell or other system executables.

I don't think you want to allow all app domains to read all devices.
Nor should that be required even for CTS.  Which devices triggered
denials?

--
Stephen Smalley
National Security Agency




--
-----------------------------------
Haiqing Jiang, PH.D student

Computer Science Department, North Carolina State University





--
-----------------------------------
Haiqing Jiang, PH.D student

Computer Science Department, North Carolina State University



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux