Stephen Smalley
81fe5f7c0f
Allow all domains to read the log devices.
...
Read access to /dev/log/* is no longer restricted.
Filtering on reads is performed per-uid by the kernel logger driver.
Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:07:16 -07:00
Stephen Smalley
4e0e74ed95
Allow ueventd to relabel sysfs nodes.
...
Required for If8b8d66120453123c1371ce063b6f20e8b96b6ef .
Change-Id: I98871b957db8b291cbbb827b5eb39b4279ce4194
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:07:07 -07:00
Robert Craig
507304c20b
Remove unneeded device type.
...
timerirq_device has been removed in favor
of using the existing sensors_device domain.
Change-Id: I503e4a511c2901890356559c0afb971392b4ec6f
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
2013-04-05 13:06:55 -07:00
Stephen Smalley
b86d472fe3
Increase policy version to 26.
...
Increase the SELinux policy version to 26. This is needed
for name-based transitions used by the manta sepolicy.
Requires kernel 3.0 or higher.
Change-Id: I046fa9f7122f77506c70b2c735345bc0194935df
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:06:43 -07:00
William Roberts
6c4c27e626
Give domains read access to security_file domain.
...
/data/security is another location that policy
files can reside. In fact, these policy files
take precedence over their rootfs counterparts
under certain circumstances. Give the appropriate
players the rights to read these policy files.
Change-Id: I9951c808ca97c2e35a9adb717ce5cb98cda24c41
2013-04-05 19:34:30 +00:00
Stephen Smalley
cd516a3266
run-as policy fixes.
...
- Remove dac_read_search as it is no longer required by run-as.
- Introduce a separate type for /dev/tty so that we can allow use of own tty for
for a run-as shell without allowing access to other /dev/tty[0-9]* nodes.
- Allow sigchld notifications for death of run-as and its descendants by adbd.
- Drop redundant rules for executing shell or system commands from untrusted_app;
now covered by rules in app.te.
Change-Id: Ic3bf7bee9eeabf9ad4a20f61fbb142a64bb37c6c
2013-04-05 14:22:27 -04:00
Robert Craig
ccbc251e01
am 0ebd1280
: am 8bb30801
: Add new domains for private apps.
...
* commit '0ebd12809aa4882c06efd1b3575890b9f759f1bb':
Add new domains for private apps.
2013-04-04 23:46:50 -07:00
Geremy Condra
86c3f98490
am d998ffe6
: am 0bca1578
: Merge "Drop SELinux management rules from AOSP."
...
* commit 'd998ffe6f700ddfdb437515b82bdffaeb25f9364':
Drop SELinux management rules from AOSP.
2013-04-04 23:46:50 -07:00
Stephen Smalley
377cb25ddf
am 1804dcbf
: am 4ac4bc05
: Document the relevant tests associated with specific rules.
...
* commit '1804dcbf1c0fcc31dc2d105ebfd621e8e1d56e44':
Document the relevant tests associated with specific rules.
2013-04-04 23:46:49 -07:00
Stephen Smalley
09fe57d0f2
am 5323c1da
: am 4b60cc30
: Do not allow reading all directories for the CTS.
...
* commit '5323c1da58717f630b8ea8b0347ae49bbb83d1e6':
Do not allow reading all directories for the CTS.
2013-04-04 23:46:49 -07:00
Stephen Smalley
e0e6860147
am 2d01809e
: am 33da6091
: Allow all domains to read /dev symlinks.
...
* commit '2d01809e23952a369543edbd5b344afaa34ab857':
Allow all domains to read /dev symlinks.
2013-04-04 23:46:49 -07:00
Stephen Smalley
d5d5ca1216
am 95d9f19d
: am c37856c4
: Remove unnecessary rules.
...
* commit '95d9f19d7e6728709e608151af5847ed4910ad3f':
Remove unnecessary rules.
2013-04-04 23:46:49 -07:00
Stephen Smalley
f3819c79a5
am 752007dc
: am cfd9b6ba
: Allow apps to execute the shell or system commands unconditionally.
...
* commit '752007dc0dd68682ce6059815755d13c3e999f14':
Allow apps to execute the shell or system commands unconditionally.
2013-04-04 23:46:48 -07:00
Stephen Smalley
2298e615ab
am 67bd56ec
: am ab0cd211
: Allow fstat of platform app /data/data files.
...
* commit '67bd56ecfa38ff2de28569d53c9a7d709f06a2b3':
Allow fstat of platform app /data/data files.
2013-04-04 23:46:48 -07:00
Stephen Smalley
ab8c95a49b
am ca3dcebd
: am b0957fa8
: Coalesce rules for allowing execution of shared objects by app domains.
...
* commit 'ca3dcebd0b278a99c3aeb604cd2d6e2ecba19715':
Coalesce rules for allowing execution of shared objects by app domains.
2013-04-04 23:46:48 -07:00
Stephen Smalley
f17aab0d34
am cd00d636
: am 80c9ba52
: Strip unnecessary trailing semicolon on macro calls.
...
* commit 'cd00d636afd3f131919ff226b3c0480fa280c552':
Strip unnecessary trailing semicolon on macro calls.
2013-04-04 23:46:47 -07:00
Stephen Smalley
b7a7f9ddeb
am b9355565
: am 2b732237
: Allow all domains to read the log devices.
...
* commit 'b935556567d1faa858d800814021f7202f820109':
Allow all domains to read the log devices.
2013-04-04 23:46:47 -07:00
Robert Craig
0ebd12809a
am 8bb30801
: Add new domains for private apps.
...
* commit '8bb308016f9eda71178d62b9b0e51fd4454bddb6':
Add new domains for private apps.
2013-04-04 23:42:07 -07:00
Geremy Condra
d998ffe6f7
am 0bca1578
: Merge "Drop SELinux management rules from AOSP."
...
* commit '0bca1578b71b7b7980cd346d11fe4ffd226b375b':
Drop SELinux management rules from AOSP.
2013-04-04 23:42:06 -07:00
Stephen Smalley
1804dcbf1c
am 4ac4bc05
: Document the relevant tests associated with specific rules.
...
* commit '4ac4bc05843a8718893b86a920f9185f47a47576':
Document the relevant tests associated with specific rules.
2013-04-04 23:42:04 -07:00
Stephen Smalley
5323c1da58
am 4b60cc30
: Do not allow reading all directories for the CTS.
...
* commit '4b60cc3033d0dfdc5955a55bd8d671aca04caa65':
Do not allow reading all directories for the CTS.
2013-04-04 23:42:04 -07:00
Stephen Smalley
2d01809e23
am 33da6091
: Allow all domains to read /dev symlinks.
...
* commit '33da609157619eed21a136226e6883ca1d20105b':
Allow all domains to read /dev symlinks.
2013-04-04 23:42:04 -07:00
Stephen Smalley
95d9f19d7e
am c37856c4
: Remove unnecessary rules.
...
* commit 'c37856c4d223f798908c5bde46a8aa37d2b6ffbc':
Remove unnecessary rules.
2013-04-04 23:42:02 -07:00
Stephen Smalley
752007dc0d
am cfd9b6ba
: Allow apps to execute the shell or system commands unconditionally.
...
* commit 'cfd9b6ba0bfdd7dc1319b3ca3c527518f4167658':
Allow apps to execute the shell or system commands unconditionally.
2013-04-04 23:42:02 -07:00
Stephen Smalley
67bd56ecfa
am ab0cd211
: Allow fstat of platform app /data/data files.
...
* commit 'ab0cd2119d8643d7efa1ad355265fc0d8bfc2ae4':
Allow fstat of platform app /data/data files.
2013-04-04 23:42:01 -07:00
Stephen Smalley
ca3dcebd0b
am b0957fa8
: Coalesce rules for allowing execution of shared objects by app domains.
...
* commit 'b0957fa86d25c40c9f28c27ad0dfd2eb283e9506':
Coalesce rules for allowing execution of shared objects by app domains.
2013-04-04 23:42:01 -07:00
Stephen Smalley
cd00d636af
am 80c9ba52
: Strip unnecessary trailing semicolon on macro calls.
...
* commit '80c9ba5267f1a6ceffcf979471d101948b520ad6':
Strip unnecessary trailing semicolon on macro calls.
2013-04-04 23:42:01 -07:00
Stephen Smalley
b935556567
am 2b732237
: Allow all domains to read the log devices.
...
* commit '2b732237d1f8c49b6e93f7e90b0d0aa5b07e1a90':
Allow all domains to read the log devices.
2013-04-04 23:42:00 -07:00
Geremy Condra
ae317c7e15
Add the sysrq_file special file and give ADB write access.
...
Change-Id: Ief2d412dddf4cefdf43a26538c4be060df4cc787
2013-04-04 14:02:21 -07:00
Robert Craig
8bb308016f
Add new domains for private apps.
...
/data/app-private is used when making an
app purchase or forward locking. Provide a
new label for the directory as well as the
tmp files that appear under it.
Change-Id: I910cd1aa63538253e10a8d80268212ad9fc9fca5
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
2013-04-04 20:03:56 +00:00
Geremy Condra
0bca1578b7
Merge "Drop SELinux management rules from AOSP."
2013-04-04 19:55:11 +00:00
Stephen Smalley
4ac4bc0584
Document the relevant tests associated with specific rules.
...
Change-Id: I09b4e33b1c9ea201a96d2f07cb74bdb804b5aad2
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:22:36 -04:00
Stephen Smalley
4b60cc3033
Do not allow reading all directories for the CTS.
...
The test gracefully handles unreadable directories, so
we do not need to allow this for all file types.
Change-Id: Ib5f5be7cacc3f0270b72c046200cc3d21f3fc374
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:21:33 -04:00
Stephen Smalley
33da609157
Allow all domains to read /dev symlinks.
...
Change-Id: I448a5553937a98775178b94f289ccb45ae862876
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:21:06 -04:00
Stephen Smalley
c37856c4d2
Remove unnecessary rules.
...
Redundant with other rules or not required for untrusted app.
Change-Id: Idb5d50326cc14696423cf133508c0d013c5928a6
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:20:33 -04:00
Stephen Smalley
cfd9b6ba0b
Allow apps to execute the shell or system commands unconditionally.
...
Change-Id: I54af993bd478d6b8d0462d43950bb1a991131c82
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:20:11 -04:00
Stephen Smalley
ab0cd2119d
Allow fstat of platform app /data/data files.
...
Change-Id: I8d46a809c08cd21b0d6c3173998035ab3cc79ada
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:19:54 -04:00
Stephen Smalley
b0957fa86d
Coalesce rules for allowing execution of shared objects by app domains.
...
Change-Id: I809738e7de038ad69905a77ea71fda4f25035d09
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:19:26 -04:00
Stephen Smalley
80c9ba5267
Strip unnecessary trailing semicolon on macro calls.
...
Change-Id: I013e08bcd82a9e2311a958e1c98931f53f6720c9
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:18:13 -04:00
Stephen Smalley
2b732237d1
Allow all domains to read the log devices.
...
Read access to /dev/log/* is no longer restricted.
Filtering on reads is performed per-uid by the kernel logger driver.
Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:17:23 -04:00
Stephen Smalley
88ae55951d
Drop SELinux management rules from AOSP.
...
As AOSP does not support the device admin API or the older
SEManager system app, just drop the allow rules associated with
permitting SELinux management via device admin or a system app.
Change-Id: Icdf40c9e6d343b19c156e4c7aea4cfb8c5f234ad
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:16:27 -04:00
Geremy Condra
66ff05950b
Merge "Add downloaded file policy."
2013-04-04 05:08:50 +00:00
Geremy Condra
3d98620ada
Add downloaded file policy.
...
Change-Id: I6f68323cddcf9e13b2a730b8d6b8730587fb4366
2013-04-03 22:01:25 -07:00
Stephen Smalley
cfd0bc5094
am ac860ce1
: am cebe6a65
: Allow ueventd to relabel sysfs nodes.
...
* commit 'ac860ce1553f50586a3e605a3c7d9761af29ea00':
Allow ueventd to relabel sysfs nodes.
2013-04-03 18:14:05 -07:00
Stephen Smalley
ac860ce155
am cebe6a65
: Allow ueventd to relabel sysfs nodes.
...
* commit 'cebe6a653b96b4726d9cf68995651a56a4cf9be1':
Allow ueventd to relabel sysfs nodes.
2013-04-03 18:08:35 -07:00
Geremy Condra
53d7059115
Merge "Give the drmserver the ability to connect to the tee."
2013-04-03 23:10:29 +00:00
Geremy Condra
e59bb5c45b
Merge "Allow drmserver to interact with apk_data_file sock_files."
2013-04-03 23:10:22 +00:00
Geremy Condra
7130719c39
Merge "Give drmserver the ability to interact with apk_data_file dirs."
2013-04-03 23:10:13 +00:00
Geremy Condra
bad5ca2216
Merge "Allow drmserver to read the wv keys."
2013-04-03 23:10:03 +00:00
Geremy Condra
ee1c0e6312
Merge "Allow dhcpd to interact with ttys."
2013-04-03 23:09:54 +00:00