Commit graph

589 commits

Author SHA1 Message Date
Stephen Smalley
81fe5f7c0f Allow all domains to read the log devices.
Read access to /dev/log/* is no longer restricted.
Filtering on reads is performed per-uid by the kernel logger driver.

Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:07:16 -07:00
Stephen Smalley
4e0e74ed95 Allow ueventd to relabel sysfs nodes.
Required for If8b8d66120453123c1371ce063b6f20e8b96b6ef .

Change-Id: I98871b957db8b291cbbb827b5eb39b4279ce4194
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:07:07 -07:00
Robert Craig
507304c20b Remove unneeded device type.
timerirq_device has been removed in favor
of using the existing sensors_device domain.

Change-Id: I503e4a511c2901890356559c0afb971392b4ec6f
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
2013-04-05 13:06:55 -07:00
Stephen Smalley
b86d472fe3 Increase policy version to 26.
Increase the SELinux policy version to 26.  This is needed
for name-based transitions used by the manta sepolicy.
Requires kernel 3.0 or higher.

Change-Id: I046fa9f7122f77506c70b2c735345bc0194935df
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-05 13:06:43 -07:00
William Roberts
6c4c27e626 Give domains read access to security_file domain.
/data/security is another location that policy
files can reside. In fact, these policy files
take precedence over their rootfs counterparts
under certain circumstances. Give the appropriate
players the rights to read these policy files.

Change-Id: I9951c808ca97c2e35a9adb717ce5cb98cda24c41
2013-04-05 19:34:30 +00:00
Stephen Smalley
cd516a3266 run-as policy fixes.
- Remove dac_read_search as it is no longer required by run-as.
- Introduce a separate type for /dev/tty so that we can allow use of own tty for
for a run-as shell without allowing access to other /dev/tty[0-9]* nodes.
- Allow sigchld notifications for death of run-as and its descendants by adbd.
- Drop redundant rules for executing shell or system commands from untrusted_app;
now covered by rules in app.te.

Change-Id: Ic3bf7bee9eeabf9ad4a20f61fbb142a64bb37c6c
2013-04-05 14:22:27 -04:00
Robert Craig
ccbc251e01 am 0ebd1280: am 8bb30801: Add new domains for private apps.
* commit '0ebd12809aa4882c06efd1b3575890b9f759f1bb':
  Add new domains for private apps.
2013-04-04 23:46:50 -07:00
Geremy Condra
86c3f98490 am d998ffe6: am 0bca1578: Merge "Drop SELinux management rules from AOSP."
* commit 'd998ffe6f700ddfdb437515b82bdffaeb25f9364':
  Drop SELinux management rules from AOSP.
2013-04-04 23:46:50 -07:00
Stephen Smalley
377cb25ddf am 1804dcbf: am 4ac4bc05: Document the relevant tests associated with specific rules.
* commit '1804dcbf1c0fcc31dc2d105ebfd621e8e1d56e44':
  Document the relevant tests associated with specific rules.
2013-04-04 23:46:49 -07:00
Stephen Smalley
09fe57d0f2 am 5323c1da: am 4b60cc30: Do not allow reading all directories for the CTS.
* commit '5323c1da58717f630b8ea8b0347ae49bbb83d1e6':
  Do not allow reading all directories for the CTS.
2013-04-04 23:46:49 -07:00
Stephen Smalley
e0e6860147 am 2d01809e: am 33da6091: Allow all domains to read /dev symlinks.
* commit '2d01809e23952a369543edbd5b344afaa34ab857':
  Allow all domains to read /dev symlinks.
2013-04-04 23:46:49 -07:00
Stephen Smalley
d5d5ca1216 am 95d9f19d: am c37856c4: Remove unnecessary rules.
* commit '95d9f19d7e6728709e608151af5847ed4910ad3f':
  Remove unnecessary rules.
2013-04-04 23:46:49 -07:00
Stephen Smalley
f3819c79a5 am 752007dc: am cfd9b6ba: Allow apps to execute the shell or system commands unconditionally.
* commit '752007dc0dd68682ce6059815755d13c3e999f14':
  Allow apps to execute the shell or system commands unconditionally.
2013-04-04 23:46:48 -07:00
Stephen Smalley
2298e615ab am 67bd56ec: am ab0cd211: Allow fstat of platform app /data/data files.
* commit '67bd56ecfa38ff2de28569d53c9a7d709f06a2b3':
  Allow fstat of platform app /data/data files.
2013-04-04 23:46:48 -07:00
Stephen Smalley
ab8c95a49b am ca3dcebd: am b0957fa8: Coalesce rules for allowing execution of shared objects by app domains.
* commit 'ca3dcebd0b278a99c3aeb604cd2d6e2ecba19715':
  Coalesce rules for allowing execution of shared objects by app domains.
2013-04-04 23:46:48 -07:00
Stephen Smalley
f17aab0d34 am cd00d636: am 80c9ba52: Strip unnecessary trailing semicolon on macro calls.
* commit 'cd00d636afd3f131919ff226b3c0480fa280c552':
  Strip unnecessary trailing semicolon on macro calls.
2013-04-04 23:46:47 -07:00
Stephen Smalley
b7a7f9ddeb am b9355565: am 2b732237: Allow all domains to read the log devices.
* commit 'b935556567d1faa858d800814021f7202f820109':
  Allow all domains to read the log devices.
2013-04-04 23:46:47 -07:00
Robert Craig
0ebd12809a am 8bb30801: Add new domains for private apps.
* commit '8bb308016f9eda71178d62b9b0e51fd4454bddb6':
  Add new domains for private apps.
2013-04-04 23:42:07 -07:00
Geremy Condra
d998ffe6f7 am 0bca1578: Merge "Drop SELinux management rules from AOSP."
* commit '0bca1578b71b7b7980cd346d11fe4ffd226b375b':
  Drop SELinux management rules from AOSP.
2013-04-04 23:42:06 -07:00
Stephen Smalley
1804dcbf1c am 4ac4bc05: Document the relevant tests associated with specific rules.
* commit '4ac4bc05843a8718893b86a920f9185f47a47576':
  Document the relevant tests associated with specific rules.
2013-04-04 23:42:04 -07:00
Stephen Smalley
5323c1da58 am 4b60cc30: Do not allow reading all directories for the CTS.
* commit '4b60cc3033d0dfdc5955a55bd8d671aca04caa65':
  Do not allow reading all directories for the CTS.
2013-04-04 23:42:04 -07:00
Stephen Smalley
2d01809e23 am 33da6091: Allow all domains to read /dev symlinks.
* commit '33da609157619eed21a136226e6883ca1d20105b':
  Allow all domains to read /dev symlinks.
2013-04-04 23:42:04 -07:00
Stephen Smalley
95d9f19d7e am c37856c4: Remove unnecessary rules.
* commit 'c37856c4d223f798908c5bde46a8aa37d2b6ffbc':
  Remove unnecessary rules.
2013-04-04 23:42:02 -07:00
Stephen Smalley
752007dc0d am cfd9b6ba: Allow apps to execute the shell or system commands unconditionally.
* commit 'cfd9b6ba0bfdd7dc1319b3ca3c527518f4167658':
  Allow apps to execute the shell or system commands unconditionally.
2013-04-04 23:42:02 -07:00
Stephen Smalley
67bd56ecfa am ab0cd211: Allow fstat of platform app /data/data files.
* commit 'ab0cd2119d8643d7efa1ad355265fc0d8bfc2ae4':
  Allow fstat of platform app /data/data files.
2013-04-04 23:42:01 -07:00
Stephen Smalley
ca3dcebd0b am b0957fa8: Coalesce rules for allowing execution of shared objects by app domains.
* commit 'b0957fa86d25c40c9f28c27ad0dfd2eb283e9506':
  Coalesce rules for allowing execution of shared objects by app domains.
2013-04-04 23:42:01 -07:00
Stephen Smalley
cd00d636af am 80c9ba52: Strip unnecessary trailing semicolon on macro calls.
* commit '80c9ba5267f1a6ceffcf979471d101948b520ad6':
  Strip unnecessary trailing semicolon on macro calls.
2013-04-04 23:42:01 -07:00
Stephen Smalley
b935556567 am 2b732237: Allow all domains to read the log devices.
* commit '2b732237d1f8c49b6e93f7e90b0d0aa5b07e1a90':
  Allow all domains to read the log devices.
2013-04-04 23:42:00 -07:00
Geremy Condra
ae317c7e15 Add the sysrq_file special file and give ADB write access.
Change-Id: Ief2d412dddf4cefdf43a26538c4be060df4cc787
2013-04-04 14:02:21 -07:00
Robert Craig
8bb308016f Add new domains for private apps.
/data/app-private is used when making an
app purchase or forward locking. Provide a
new label for the directory as well as the
tmp files that appear under it.

Change-Id: I910cd1aa63538253e10a8d80268212ad9fc9fca5
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
2013-04-04 20:03:56 +00:00
Geremy Condra
0bca1578b7 Merge "Drop SELinux management rules from AOSP." 2013-04-04 19:55:11 +00:00
Stephen Smalley
4ac4bc0584 Document the relevant tests associated with specific rules.
Change-Id: I09b4e33b1c9ea201a96d2f07cb74bdb804b5aad2
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:22:36 -04:00
Stephen Smalley
4b60cc3033 Do not allow reading all directories for the CTS.
The test gracefully handles unreadable directories, so
we do not need to allow this for all file types.

Change-Id: Ib5f5be7cacc3f0270b72c046200cc3d21f3fc374
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:21:33 -04:00
Stephen Smalley
33da609157 Allow all domains to read /dev symlinks.
Change-Id: I448a5553937a98775178b94f289ccb45ae862876
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:21:06 -04:00
Stephen Smalley
c37856c4d2 Remove unnecessary rules.
Redundant with other rules or not required for untrusted app.

Change-Id: Idb5d50326cc14696423cf133508c0d013c5928a6
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:20:33 -04:00
Stephen Smalley
cfd9b6ba0b Allow apps to execute the shell or system commands unconditionally.
Change-Id: I54af993bd478d6b8d0462d43950bb1a991131c82
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:20:11 -04:00
Stephen Smalley
ab0cd2119d Allow fstat of platform app /data/data files.
Change-Id: I8d46a809c08cd21b0d6c3173998035ab3cc79ada
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:19:54 -04:00
Stephen Smalley
b0957fa86d Coalesce rules for allowing execution of shared objects by app domains.
Change-Id: I809738e7de038ad69905a77ea71fda4f25035d09
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:19:26 -04:00
Stephen Smalley
80c9ba5267 Strip unnecessary trailing semicolon on macro calls.
Change-Id: I013e08bcd82a9e2311a958e1c98931f53f6720c9
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:18:13 -04:00
Stephen Smalley
2b732237d1 Allow all domains to read the log devices.
Read access to /dev/log/* is no longer restricted.
Filtering on reads is performed per-uid by the kernel logger driver.

Change-Id: Ia986cbe66b84f3898e858c60f12c7f3d63ac47cf
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:17:23 -04:00
Stephen Smalley
88ae55951d Drop SELinux management rules from AOSP.
As AOSP does not support the device admin API or the older
SEManager system app, just drop the allow rules associated with
permitting SELinux management via device admin or a system app.

Change-Id: Icdf40c9e6d343b19c156e4c7aea4cfb8c5f234ad
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-04-04 12:16:27 -04:00
Geremy Condra
66ff05950b Merge "Add downloaded file policy." 2013-04-04 05:08:50 +00:00
Geremy Condra
3d98620ada Add downloaded file policy.
Change-Id: I6f68323cddcf9e13b2a730b8d6b8730587fb4366
2013-04-03 22:01:25 -07:00
Stephen Smalley
cfd0bc5094 am ac860ce1: am cebe6a65: Allow ueventd to relabel sysfs nodes.
* commit 'ac860ce1553f50586a3e605a3c7d9761af29ea00':
  Allow ueventd to relabel sysfs nodes.
2013-04-03 18:14:05 -07:00
Stephen Smalley
ac860ce155 am cebe6a65: Allow ueventd to relabel sysfs nodes.
* commit 'cebe6a653b96b4726d9cf68995651a56a4cf9be1':
  Allow ueventd to relabel sysfs nodes.
2013-04-03 18:08:35 -07:00
Geremy Condra
53d7059115 Merge "Give the drmserver the ability to connect to the tee." 2013-04-03 23:10:29 +00:00
Geremy Condra
e59bb5c45b Merge "Allow drmserver to interact with apk_data_file sock_files." 2013-04-03 23:10:22 +00:00
Geremy Condra
7130719c39 Merge "Give drmserver the ability to interact with apk_data_file dirs." 2013-04-03 23:10:13 +00:00
Geremy Condra
bad5ca2216 Merge "Allow drmserver to read the wv keys." 2013-04-03 23:10:03 +00:00
Geremy Condra
ee1c0e6312 Merge "Allow dhcpd to interact with ttys." 2013-04-03 23:09:54 +00:00