All of lore.kernel.org
 help / color / mirror / Atom feed
From: Joshua Brindle <method@manicmethod.com>
To: SE Linux <selinux@tycho.nsa.gov>
Cc: Stephen Smalley <sds@tycho.nsa.gov>
Subject: SEAndroid app data labeling
Date: Wed, 25 Jan 2012 10:12:35 -0500	[thread overview]
Message-ID: <4F201BE3.1020603@manicmethod.com> (raw)

I'm working through some denials with SEAndroid on Galaxy Nexus and I'm confused 
about app data labeling. I thought that the app data would be labeled with the 
same category as the app, so c13 app would have c13 on the files in /data. I see 
the note in seapp_contexts that levelfromUID only works on apps. How do you get 
filesystem separation without labeling the apps with the category?


Also, I'm getting denials like this, which I'm a little confused about since 
trusted_app is part of appdomain and appdomain has create_file_perms on 
app_data_file. I'm not sure how untrusted_app would be able to keep any state 
since everything in /data/data seems to be labeled app_data_file though:

<5>[   25.067932] type=1400 audit(1327503267.632:59): avc:  denied  { add_name } 
for  pid=461 comm="ContactsProvide" name="contacts2.db-mj1A7E80AF" 
scontext=u:r:trusted_app:s0:c0 tcontext=u:object_r:app_data_file:s0 tclass=dir
<5>[   25.148498] type=1400 audit(1327503267.718:60): avc:  denied  { 
remove_name } for  pid=461 comm="ContactsProvide" name="contacts2.db-mj1A7E80AF" 
dev=mmcblk0p12 ino=578665 scontext=u:r:trusted_app:s0:c0 
tcontext=u:object_r:app_data_file:s0 tclass=dir
<5>[   26.209320] type=1400 audit(1327503268.773:61): avc:  denied  { write } 
for  pid=570 comm="viders.calendar" name="calendar.db" dev=mmcblk0p12 ino=578386 
scontext=u:r:trusted_app:s0:c6 tcontext=u:object_r:app_data_file:s0 tclass=file
<5>[   26.263183] type=1400 audit(1327503268.828:62): avc:  denied  { setattr } 
for  pid=570 comm="viders.calendar" name="calendar.db" dev=mmcblk0p12 ino=578386 
scontext=u:r:trusted_app:s0:c6 tcontext=u:object_r:app_data_file:s0 tclass=file

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

             reply	other threads:[~2012-01-25 15:12 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-01-25 15:12 Joshua Brindle [this message]
2012-01-25 18:26 ` SEAndroid app data labeling James Carter
2012-01-25 18:56   ` James Carter
2012-01-25 19:53     ` Joshua Brindle
2012-01-25 20:50       ` Stephen Smalley
2012-01-25 22:03         ` Joshua Brindle

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4F201BE3.1020603@manicmethod.com \
    --to=method@manicmethod.com \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.