On 01/08/2013 02:40 PM, Peck, Michael A wrote:
I'm curious what kinds of per-app compatibility issues have occurred?

Android recently deprecated Context.MODE_WORLD_READABLE and 
MODE_WORLD_WRITABLE, which could help in making an argument that they really 
don't want apps to be able to access the internal storage directories of other 
apps?
http://developer.android.com/reference/android/content/Context.html#MODE_WORLD_READABLE

I did run into an app that shares world readable (and encrypted) files in its 
internal storage directory with other apps -- that would be one example of a 
compatibility issue.  (I'd argue that they should use a Content Provider 
instead.)

We started with levelFromUid=true (now levelFrom=app) for all app domains (user=_app) in seapp_contexts. But CTS testing and code examination indicated numerous cases where apps share files. We tried liberalizing the mls constraints to only constrain open, not read/write, for app data files so that apps could still voluntarily pass around open files via Binder but not access one another's files by pathname. But we saw numerous cases where they do that as well, e.g. for shared_prefs and the like. So we backed off to only applying levelFromUid=true / levelFrom=app to third party apps, the current state of seapp_contexts. Even that is going to run up against examples like the one you describe.

If you have a good test suite of apps, then it might be interesting to see how often that pattern is violated.



--
This message was distributed to subscribers of the seandroid-list mailing list.
If you no longer wish to subscribe, send mail to [email protected] with
the words "unsubscribe seandroid-list" without quotes as the message.

Reply via email to