Commit graph

346 commits

Author SHA1 Message Date
Alex Klyubin
3123b1eef7 SELinux policy for Bluetooth properties.
Properties under bluetooth. and persist.service.bdroid. are
considered Bluetooth-related properties.

Change-Id: Iee937d9a1184c2494deec46f9ed7090c643acda7
2013-05-06 10:18:27 -07:00
Geremy Condra
a3c29c5fe0 Merge "Expand permissions for 3 existing allow policies for rild and a new one for rild." into jb-mr2-dev 2013-05-03 00:58:30 +00:00
William Luh
b4ab72d52a Expand permissions for 3 existing allow policies for rild and a new one for rild.
Change-Id: Iafe68ac1b742e40c1a23a2f6cfd6373ea89cc07b
2013-05-02 17:57:14 -07:00
repo sync
ca326e2c64 Add policy for ping.
Change-Id: I168f681d8c67f470b6e639f0b1bf39346c4eb396
2013-05-02 14:35:41 -07:00
repo sync
49dca3f0a4 Add rule to allow system to write to the adbd socket.
Change-Id: I56e3ddae08b0c3d5e6b2492a6754899cc4e25a21
2013-05-01 10:57:15 -07:00
repo sync
9504a50740 Allow ADB to interact extensively with system_data_files.
Long term this should be scoped down.

Change-Id: I261f05568566cca38bc5c43fbfa7ff1c816e5846
2013-04-30 18:18:31 -07:00
William Luh
e855c3b490 Allow rild to create, bind, read, write to itself through a netlink socket.
Change-Id: Ia7457e3fd4f1100bbee821f412e80ba17fede5ec
2013-04-25 18:29:26 -07:00
William Luh
aca2f5ebd2 Stop breaking build by defining sysfs_devices_system_cpu.
Change-Id: Ie96d573be971b2dcc3d60614794ba9ca13b31471
2013-04-25 16:32:57 -07:00
William Luh
638bf3271b Allow system to search the /sys/devices/system/cpu directory.
Change-Id: Iaa8fb6fa8726d083ee3c49edbbd398f0e8f33a37
2013-04-25 15:37:15 -07:00
Nick Kralevich
1e25b98074 Revert "Add the sysrq_file special file and give ADB write access."
This rule doesn't work, as /proc/sysrq-trigger isn't properly labeled.
Revert this change for now.

This reverts commit bb2591e56f.
2013-04-25 14:46:36 -07:00
Ben Murdoch
a3f6568590 Revert "DO NOT MERGE Split some device nodes out from device."
This reverts commit 69fbbdd54b.
2013-04-25 12:01:37 +01:00
repo sync
dc1946838a Merge "DO NOT MERGE Split some device nodes out from device." into jb-mr2-dev 2013-04-25 05:11:15 +00:00
repo sync
69fbbdd54b DO NOT MERGE Split some device nodes out from device.
Some of these will get factored out into device-specific
configs later.

Change-Id: I359915e2607b56112bb22456d28e06c162fcbdff
2013-04-24 22:09:13 -07:00
Geremy Condra
0259932950 Revert "Revert "Revert "Split some device nodes out from device."""
This reverts commit e7e54fac10

Change-Id: I26b577cf46a0eaccf6adf7ae851383a10bf03b4b
2013-04-25 02:34:58 +00:00
Geremy Condra
e7e54fac10 Revert "Revert "Split some device nodes out from device.""
This reverts commit 1c101164c0

Restoring now that the conflict with tuna has passed.

Change-Id: I587dab8d7102c913fc03825a006e96d76680858d
2013-04-25 00:37:22 +00:00
Geremy Condra
1c101164c0 Revert "Split some device nodes out from device."
This reverts commit f51e900724

Looks like this caused a build breakage in master, may have a duplicate rule from AOSP.

Change-Id: I4ea83a47baec4ffa2840b5fe50b6f55e1eeda53c
2013-04-24 18:33:37 +00:00
repo sync
f51e900724 Split some device nodes out from device.
Some of these will get factored out into device-specific
configs later.

Change-Id: I7ea9c22a666b13bca2d867e5bcc7084ed7129de3
2013-04-23 17:05:11 -07:00
Geremy Condra
bb2591e56f Add the sysrq_file special file and give ADB write access.
Change-Id: Ief2d412dddf4cefdf43a26538c4be060df4cc787
2013-04-05 13:13:52 -07:00
Geremy Condra
bfb26e7b07 Add downloaded file policy.
Change-Id: I6f68323cddcf9e13b2a730b8d6b8730587fb4366
2013-04-05 13:13:44 -07:00
Geremy Condra
d381b97e13 Give the drmserver the ability to connect to the tee.
Bug: 8539042
Change-Id: I6a9c3247688f49bed4a1637c728e77c2e865afd2
2013-04-05 13:13:34 -07:00
Geremy Condra
207c709e3a Allow drmserver to interact with apk_data_file sock_files.
Bug: 8539042
Change-Id: I255930759ce0612f6ec9b931bfe545342ef808fc
2013-04-05 13:13:26 -07:00
Geremy Condra
03d436a473 Give drmserver the ability to interact with apk_data_file dirs.
Bug: 8539042
Change-Id: I87165fd83b1abef9eb7bf4c403714150aaefed6e
2013-04-05 13:13:16 -07:00
Geremy Condra
8ee49795e3 Allow drmserver to read the wv keys.
Bug: 8539042
Change-Id: I31e7a3ae6ba783b78c3b38756966950a20f2f2aa
2013-04-05 13:13:05 -07:00
Geremy Condra
47020462ad Allow dhcpd to interact with ttys.
Bug: 8539042
Change-Id: I27bcc4a485b031d54e17b03164642821d546e62f
2013-04-05 13:12:53 -07:00
William Roberts
7bb2a55c47 Give domains read access to security_file domain.
/data/security is another location that policy
files can reside. In fact, these policy files
take precedence over their rootfs counterparts
under certain circumstances. Give the appropriate
players the rights to read these policy files.

Change-Id: I9951c808ca97c2e35a9adb717ce5cb98cda24c41
2013-04-05 13:11:23 -07:00
Stephen Smalley
74ba8c8613 run-as policy fixes.
- Remove dac_read_search as it is no longer required by run-as.
- Introduce a separate type for /dev/tty so that we can allow use of own tty for
for a run-as shell without allowing access to other /dev/tty[0-9]* nodes.
- Allow sigchld notifications for death of run-as and its descendants by adbd.
- Drop redundant rules for executing shell or system commands from untrusted_app;
now covered by rules in app.te.

Change-Id: Ic3bf7bee9eeabf9ad4a20f61fbb142a64bb37c6c
2013-04-05 13:11:12 -07:00
Robert Craig
ffd8c441a5 Add new domains for private apps.
/data/app-private is used when making an
app purchase or forward locking. Provide a
new label for the directory as well as the
tmp files that appear under it.

Change-Id: I910cd1aa63538253e10a8d80268212ad9fc9fca5
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
2013-04-05 13:10:57 -07:00
Stephen Smalley
142480a8ac Drop SELinux management rules from AOSP.
As AOSP does not support the device admin API or the older
SEManager system app, just drop the allow rules associated with
permitting SELinux management via device admin or a system app.

Change-Id: Icdf40c9e6d343b19c156e4c7aea4cfb8c5f234ad
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:10:45 -07:00
Stephen Smalley
10a2ac24f2 Document the relevant tests associated with specific rules.
Change-Id: I09b4e33b1c9ea201a96d2f07cb74bdb804b5aad2
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:10:36 -07:00
Stephen Smalley
a019e4f12f Do not allow reading all directories for the CTS.
The test gracefully handles unreadable directories, so
we do not need to allow this for all file types.

Change-Id: Ib5f5be7cacc3f0270b72c046200cc3d21f3fc374
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:10:24 -07:00
Stephen Smalley
0e856a02cb Allow all domains to read /dev symlinks.
Change-Id: I448a5553937a98775178b94f289ccb45ae862876
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:10:05 -07:00
Stephen Smalley
62508bf498 Allow apps to execute the shell or system commands unconditionally.
Change-Id: I54af993bd478d6b8d0462d43950bb1a991131c82
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:09:20 -07:00
Stephen Smalley
0141ccd060 Remove unnecessary rules.
Redundant with other rules or not required for untrusted app.

Change-Id: Idb5d50326cc14696423cf133508c0d013c5928a6
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:08:27 -07:00
Stephen Smalley
0677cb2ebd Allow fstat of platform app /data/data files.
Change-Id: I8d46a809c08cd21b0d6c3173998035ab3cc79ada
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:07:45 -07:00
Stephen Smalley
b5f6977a28 Coalesce rules for allowing execution of shared objects by app domains.
Change-Id: I809738e7de038ad69905a77ea71fda4f25035d09
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:07:36 -07:00
Stephen Smalley
9de4c69202 Strip unnecessary trailing semicolon on macro calls.
Change-Id: I013e08bcd82a9e2311a958e1c98931f53f6720c9
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:07:26 -07:00
Stephen Smalley
81fe5f7c0f Allow all domains to read the log devices.
Read access to /dev/log/* is no longer restricted.
Filtering on reads is performed per-uid by the kernel logger driver.

Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:07:16 -07:00
Stephen Smalley
4e0e74ed95 Allow ueventd to relabel sysfs nodes.
Required for If8b8d66120453123c1371ce063b6f20e8b96b6ef .

Change-Id: I98871b957db8b291cbbb827b5eb39b4279ce4194
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:07:07 -07:00
Robert Craig
507304c20b Remove unneeded device type.
timerirq_device has been removed in favor
of using the existing sensors_device domain.

Change-Id: I503e4a511c2901890356559c0afb971392b4ec6f
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
2013-04-05 13:06:55 -07:00
Stephen Smalley
b86d472fe3 Increase policy version to 26.
Increase the SELinux policy version to 26.  This is needed
for name-based transitions used by the manta sepolicy.
Requires kernel 3.0 or higher.

Change-Id: I046fa9f7122f77506c70b2c735345bc0194935df
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:06:43 -07:00
Geremy Condra
404fc4fa69 Merge "Add the sys_resource capability to sdcardd." into jb-mr2-dev 2013-04-03 21:16:37 +00:00
Geremy Condra
2c831009a5 Fix various SELinux denials.
Change-Id: I73a2b841ab3399b7528b8084a5c4736e6ecea48a
2013-04-03 12:00:41 -07:00
Geremy Condra
1ac712f74c Add the sys_resource capability to sdcardd.
Change-Id: I0b2ecdbddbed3d5ea1617c9ae9af7f8b1c9ace93
2013-03-29 16:30:15 -07:00
Geremy Condra
4387956f26 Add the ability to stat files under /cache for media_app.
This feels like a hidden bug- it shouldn't be trying to
stat everything under /cache anyways- but allowing for now.

Change-Id: Ib5ddfbb408c9f0b6c6218c78a678fcdb09360ccd
2013-03-29 16:30:06 -07:00
Geremy Condra
06575ee40c Add remount capability to Zygote.
This is a consequence of https://googleplex-android-review.googlesource.com/#/c/278069/

Change-Id: I9b310860534a80e7145950f6c632cf5ba0ad56a7
2013-03-29 16:29:54 -07:00
Geremy Condra
020b5ff631 Add a key directory argument to insertkeys.py
This allows us to better integrate key selection with our existing
build process.

Change-Id: I6e3eb5fbbfffb8e31c5edcf16f74df7c38abe537
2013-03-29 16:29:43 -07:00
Geremy Condra
8abf01ac33 Drop MLS separation for compatibility.
Change-Id: I555361d732b8f1bdc90c231a3183a85526a5a558
2013-03-29 16:29:06 -07:00
Geremy Condra
c529c66f2c Add policy for __properties__ device.
Change-Id: Ie9b391283362fb6930f1ae858f0a879835c91e32
2013-03-29 12:59:21 -07:00
Geremy Condra
7c8e6d4a96 am f4d5f3e1: Merge "Add missing seinfo tag from mac_permissions.xml policy."
* commit 'f4d5f3e1f6db56c80959428591bb3dbbe685b010':
  Add missing seinfo tag from mac_permissions.xml policy.
2013-03-28 14:29:25 -07:00
Geremy Condra
f4d5f3e1f6 Merge "Add missing seinfo tag from mac_permissions.xml policy." 2013-03-28 21:10:11 +00:00