[prev in list] [next in list] [prev in thread] [next in thread] 

List:       selinux
Subject:    Re: [PATCH] add read permission over dev_type to appdomain on android_cts enabled
From:       Stephen Smalley <sds () tycho ! nsa ! gov>
Date:       2012-07-30 17:49:25
Message-ID: 1343670565.2346.121.camel () moss-pluto ! epoch ! ncsc ! mil
[Download RAW message or body]

On Mon, 2012-07-30 at 10:46 -0700, Haiqing Jiang wrote:
> The policy to the denials should be: allow untrusted_app
> {block_device, radio_device, log_device}:lnk_file read; (ignore the
> syntax error). Do you think it's OK to merge it to: allow appdomain
> dev_type:dir_file_class_set { getattr read }???? Or we need to add
> separate policies? (like, allow untrusted_app specific device
> type:lnk_file read;)

Merging into the dev_type:dir_class_file_set rule opens up far more
access than is necessary or desired - read access to every device in the
system.  So here you want a more specific rule.  You can still use
appdomain and dev_type attributes, but only for symlinks:
	allow appdomain dev_type:lnk_file read;

And for the log device, a specific rule for its type:
	allow appdomain log_device:chr_file read;

> 
> On Mon, Jul 30, 2012 at 10:33 AM, Haiqing Jiang
> <hqjiang1988@gmail.com> wrote:
>         The denial information is shown as below:
>         
>         
>         <5>[ 2219.393524] type=1400 audit(1342221801.398:17): avc:
>          denied  { read } for  pid=2687 comm="ationTestRunner"
>         name="mtdblock0" dev=tmpfs ino=2562
>         scontext=u:r:untrusted_app:s0:c38
>         tcontext=u:object_r:block_device:s0 tclass=lnk_file
>         
>         <5>[ 2219.399566] type=1400 audit(1342221801.406:18): avc:
>          denied  { read } for  pid=2687 comm="ationTestRunner"
>         name="radio" dev=tmpfs ino=2527
>         scontext=u:r:untrusted_app:s0:c38
>         tcontext=u:object_r:radio_device:s0 tclass=lnk_file
>         
>         <5>[ 2005.011016] type=1400 audit(1342224760.046:32): avc:
>          denied  { read } for  pid=7264 comm="onCtsTestRunner"
>         name="events" dev=tmpfs ino=2902
>         scontext=u:r:untrusted_app:s0:c38
>         tcontext=u:object_r:log_device:s0 tclass=chr_file
>         
>         
>         On Mon, Jul 30, 2012 at 5:14 AM, Stephen Smalley
>         <sds@tycho.nsa.gov> wrote:
>                 On Fri, 2012-07-27 at 15:40 -0700, Haiqing Jiang
>                 wrote:
>                 > ---
>                 >  cts.te |    2 +-
>                 >  1 files changed, 1 insertions(+), 1 deletions(-)
>                 >
>                 > diff --git a/cts.te b/cts.te
>                 > index 489be1a..ff8a9f0 100644
>                 > --- a/cts.te
>                 > +++ b/cts.te
>                 > @@ -20,7 +20,7 @@ allow appdomain file_type:dir
>                 r_dir_perms;
>                 >  allow appdomain fs_type:dir r_dir_perms;
>                 >  allow appdomain dev_type:dir r_dir_perms;
>                 >  allow appdomain file_type:dir_file_class_set
>                 getattr;
>                 > -allow appdomain dev_type:dir_file_class_set
>                 getattr;
>                 > +allow appdomain dev_type:dir_file_class_set
>                 { getattr read };
>                 >  allow appdomain fs_type:dir_file_class_set getattr;
>                 >
>                 >  # Execute the shell or other system executables.
>                 
>                 
>                 I don't think you want to allow all app domains to
>                 read all devices.
>                 Nor should that be required even for CTS.  Which
>                 devices triggered
>                 denials?
>                 
>                 --
>                 Stephen Smalley
>                 National Security Agency
>                 
>         
>         
>         
>         
>         -- 
>         -----------------------------------
>         Haiqing Jiang, PH.D student
>         
>         
>         Computer Science Department, North Carolina State University
>         
>         
>         
>         
> 
> 
> 
> 
> -- 
> -----------------------------------
> Haiqing Jiang, PH.D student
> 
> 
> Computer Science Department, North Carolina State University
> 
> 
> 

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic