Geremy Condra
862909f730
am acea73d5
: Merge "Drop shell from having access to dmesg"
...
* commit 'acea73d5dc42c4475f4f474343041765b558c5d4':
Drop shell from having access to dmesg
2013-03-19 20:08:18 -07:00
Geremy Condra
acea73d5dc
Merge "Drop shell from having access to dmesg"
2013-03-20 02:26:32 +00:00
Stephen Smalley
f4c8ca6b7d
am 38084146
: Generalize levelFromUid support.
...
* commit '38084146e0fd665b68c8c4ff131cae9d07ef5993':
Generalize levelFromUid support.
2013-03-19 19:01:39 -07:00
Geremy Condra
36c87bbdb8
am ae0fcf1f
: Merge "watchdog security policy."
...
* commit 'ae0fcf1fb60de1d63fc1944111398497b655224b':
watchdog security policy.
2013-03-19 19:01:39 -07:00
Geremy Condra
9050e3696c
am 566553e3
: Merge "Update binder-related policy."
...
* commit '566553e3080c2f07a1a14dbf0ccdca8454492a6a':
Update binder-related policy.
2013-03-19 19:01:38 -07:00
Stephen Smalley
38084146e0
Generalize levelFromUid support.
...
Introduce a levelFrom=none|app|user|all syntax for specifying
per-app, per-user, or per-combination level assignment.
levelFromUid=true|false remains valid syntax but is deprecated.
levelFromUid=true is equivalent to levelFrom=app.
Update check_seapp to accept the new syntax.
Update seapp_contexts to document the new syntax and switch
from levelFromUid=true to levelFrom=app. No change in behavior.
Change-Id: Ibaddeed9bc3e2586d524efc2f1faa5ce65dea470
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-03-20 01:39:25 +00:00
Geremy Condra
ae0fcf1fb6
Merge "watchdog security policy."
2013-03-20 01:38:03 +00:00
Geremy Condra
566553e308
Merge "Update binder-related policy."
2013-03-20 01:36:22 +00:00
Geremy Condra
b5b4377f11
am 1446e714
: Revert "Dynamic insertion of pubkey to mac_permissions.xml"
...
* commit '1446e714af0b0c358b5ecf37c5d704c96c72cf7c':
Revert "Dynamic insertion of pubkey to mac_permissions.xml"
2013-03-19 16:51:25 -07:00
William Roberts
b4014d3939
am 5a2988fc
: Remove duplicate paths from sepolicy_replace_paths
...
* commit '5a2988fcb5f1b76c87d9bf8e671c38d1b03188ab':
Remove duplicate paths from sepolicy_replace_paths
2013-03-19 16:51:25 -07:00
Stephen Smalley
45ed43dd56
am 1f5939a9
: Allow search of tmpfs mount for /storage/emulated.
...
* commit '1f5939a97647bb71414588be8f26114773edceaf':
Allow search of tmpfs mount for /storage/emulated.
2013-03-19 16:51:25 -07:00
Stephen Smalley
c6bfb5c835
am 61362840
: Permit fstat of property mapping.
...
* commit '61362840813c3a396339a7f7b5d73ca825a83748':
Permit fstat of property mapping.
2013-03-19 16:51:24 -07:00
Stephen Smalley
cb6b5afd34
am aeb512d2
: Disable debugfs access by default.
...
* commit 'aeb512d2edda496eb768d4b84a7c7fc2e7d09202':
Disable debugfs access by default.
2013-03-19 16:51:24 -07:00
Stephen Smalley
9709395b61
am c8106f12
: Only allow read/write not open on platform_app_data_file.
...
* commit 'c8106f12c09dfffebebcff6b435d4974e6b2a9d7':
Only allow read/write not open on platform_app_data_file.
2013-03-19 16:51:24 -07:00
Geremy Condra
1d7081e3cc
am d06104d8
: Merge "property_contexts checks added to checkfc."
...
* commit 'd06104d873a4256f8a6fb66ee0f930abbc15f8a1':
property_contexts checks added to checkfc.
2013-03-19 16:51:24 -07:00
Geremy Condra
e0c0ad2949
Revert "Dynamic insertion of pubkey to mac_permissions.xml"
...
This reverts commit 22fc04103b
Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
2013-03-19 16:40:08 -07:00
William Roberts
767abc077e
Drop shell from having access to dmesg
...
In normal, user builds, shell doesn't have the required
DAC permissions to acess the kernel log.
Change-Id: I001e6d65f508e07671bdb71ca2c0e1d53bc5b970
2013-03-19 23:09:22 +00:00
Geremy Condra
1446e714af
Revert "Dynamic insertion of pubkey to mac_permissions.xml"
...
This reverts commit 22fc04103b
Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
2013-03-19 22:56:46 +00:00
William Roberts
5a2988fcb5
Remove duplicate paths from sepolicy_replace_paths
...
Change-Id: I5d5362ad0055275052b0c2ba535b599a8e26112e
2013-03-19 22:49:13 +00:00
rpcraig
bac9992e86
watchdog security policy.
...
Initial policy for software watchdog daemon
which is started by init.
Change-Id: I042a5b1698bf53ce2e50ea06851c374e5123ee2c
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
2013-03-19 22:48:38 +00:00
Stephen Smalley
9ce99e3908
Update binder-related policy.
...
The binder_transfer_binder hook was changed in the kernel, obsoleting
the receive permission and changing the target of the transfer permission.
Update the binder-related policy to match the revised permission checking.
Change-Id: I1ed0dadfde2efa93296e967eb44ca1314cf28586
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-03-19 22:48:17 +00:00
Stephen Smalley
1f5939a976
Allow search of tmpfs mount for /storage/emulated.
...
Change-Id: Ie79ff3fb9c0a893e348c4adb2f457cae42d7800f
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-03-19 22:47:20 +00:00
Stephen Smalley
6136284081
Permit fstat of property mapping.
...
Change-Id: Ie58185519252dad29a23d0d3d54b1cbafea83a83
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-03-19 22:46:42 +00:00
Stephen Smalley
aeb512d2ed
Disable debugfs access by default.
...
Change-Id: I8265e34a76913a76eedd2d7a6fe3b14945fde924
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-03-19 22:45:53 +00:00
Stephen Smalley
c8106f12c0
Only allow read/write not open on platform_app_data_file.
...
Change-Id: Iad4ad43ce7ba3c00b69b7aac752b40bc2d3be002
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-03-19 22:45:12 +00:00
Geremy Condra
a74dd1f0ea
am 6d6c617f
: Merge "Whitespace and doxygen fix"
...
* commit '6d6c617f6d6644c71bd83a0a17d258b4041c98cf':
Whitespace and doxygen fix
2013-03-19 15:43:58 -07:00
Stephen Smalley
85f5972c4b
am ee80bfb9
: Add policy assertions (neverallow rules).
...
* commit 'ee80bfb9cf5727ce9938f76d88ac50833edee48c':
Add policy assertions (neverallow rules).
2013-03-19 15:43:57 -07:00
Geremy Condra
8b206260b4
am c0890c89
: Merge "Allow domain to random_device"
...
* commit 'c0890c899f572785b6a14a91bae6122b72db4416':
Allow domain to random_device
2013-03-19 15:43:57 -07:00
William Roberts
9a35a01401
am 6a64897a
: Do not allow access to device:chr_file for system
...
* commit '6a64897a4b098e834f7b6679c0c5b85fdbb752b2':
Do not allow access to device:chr_file for system
2013-03-19 15:43:57 -07:00
rpcraig
842a9dce5a
am 1c8464e1
: App data backup security policy.
...
* commit '1c8464e1365950538e9e4647a4f220910f79ab1e':
App data backup security policy.
2013-03-19 15:43:56 -07:00
Geremy Condra
2886640128
am c57dbccb
: Merge "Change security policy so all apps can read /dev/xt_qtaguid."
...
* commit 'c57dbccb50ff804f2e002df8bd6db54b0477b877':
Change security policy so all apps can read /dev/xt_qtaguid.
2013-03-19 15:43:56 -07:00
Geremy Condra
2b7e767cc9
am 5988bbf8
: Merge "Dynamic insertion of pubkey to mac_permissions.xml"
...
* commit '5988bbf8a2b6c4b7f329ee007e75004269d71817':
Dynamic insertion of pubkey to mac_permissions.xml
2013-03-19 15:43:56 -07:00
Geremy Condra
61dddba79f
am 04598de8
: Merge "Replaceable mac_permission.xml support"
...
* commit '04598de87251c433594f1073ebcd8116cee49345':
Replaceable mac_permission.xml support
2013-03-19 15:43:56 -07:00
Geremy Condra
62495abcdc
am 669f6792
: Merge "mediaserver.te refactor"
...
* commit '669f679243431084adaaacd6e4857e2eed92b93a':
mediaserver.te refactor
2013-03-19 15:43:55 -07:00
Geremy Condra
cc32a792c0
am eeafabde
: Merge "Label persist audio properties"
...
* commit 'eeafabde6188a21d7df741fa93ab5156e1c10414':
Label persist audio properties
2013-03-19 15:43:55 -07:00
Geremy Condra
d06104d873
Merge "property_contexts checks added to checkfc."
2013-03-19 22:42:19 +00:00
Geremy Condra
6d6c617f6d
Merge "Whitespace and doxygen fix"
2013-03-19 22:35:44 +00:00
Stephen Smalley
ee80bfb9cf
Add policy assertions (neverallow rules).
...
Change-Id: I384ea9516a5ed2369f7fa703499e284e29a2c0eb
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-03-19 22:30:03 +00:00
Geremy Condra
c0890c899f
Merge "Allow domain to random_device"
2013-03-19 22:29:32 +00:00
Robert Craig
d98d26ef3c
property_contexts checks added to checkfc.
...
Change-Id: If361ea93fabd343728196eed2663fd572ecaa70b
Signed-off-by: Robert Craig <rpcraig@tycho.ncsc.mil>
2013-03-19 22:28:46 +00:00
William Roberts
6a64897a4b
Do not allow access to device:chr_file for system
...
Also labels /dev/mpu and /dev/mpuirq as gps device.
mpu is motion processing unit and is resposible for
gyroscope functionality.
Change-Id: If7f1a5752c550b72fac681566e1052f09e139ff0
2013-03-19 22:27:03 +00:00
rpcraig
1c8464e136
App data backup security policy.
...
Policy covers:
* backup_data_file type for labeling all
files/dirs under /data dealing with
backup mechanism.
* cache_backup_file type for labeling all
files/dirs under /cache dealing with
backup mechanism. This also covers the
the use of LocalTransport for local archive
and restore testing.
* the use of 'adb shell bmgr' to initiate
backup mechanism from shell.
* the use of 'adb backup/restore' to archive
and restore the device's data.
Change-Id: I700a92d8addb9bb91474bc07ca4bb71eb4fc840e
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
2013-03-19 22:22:10 +00:00
Geremy Condra
c57dbccb50
Merge "Change security policy so all apps can read /dev/xt_qtaguid."
2013-03-19 22:21:49 +00:00
Geremy Condra
5988bbf8a2
Merge "Dynamic insertion of pubkey to mac_permissions.xml"
2013-03-19 22:17:29 +00:00
Geremy Condra
04598de872
Merge "Replaceable mac_permission.xml support"
2013-03-19 22:17:10 +00:00
Geremy Condra
669f679243
Merge "mediaserver.te refactor"
2013-03-19 22:16:49 +00:00
Geremy Condra
eeafabde61
Merge "Label persist audio properties"
2013-03-19 22:16:31 +00:00
Stephen Smalley
17e91e8915
am e468016b
: zygote requires setpcap in order to drop from its bounding set.
...
* commit 'e468016b1bd79b505e62fd410f59a03bad8bbe06':
zygote requires setpcap in order to drop from its bounding set.
2013-02-19 12:28:38 -08:00
Stephen Smalley
e468016b1b
zygote requires setpcap in order to drop from its bounding set.
...
I8560fa5ad125bf31f0d13be513431697bc7d22bb changed the zygote
to limit the bounding capability set to CAP_NET_RAW. This triggers
a CAP_SETPCAP check by the kernel, which requires SELinux setpcap permission.
Change-Id: Ib910d97dcf708273e2806e2824f4abe9fc239d6d
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-02-19 13:20:55 -05:00
William Roberts
40356b993a
Allow domain to random_device
...
Change-Id: I1a728cbc78e30c0b43309acc125169528d352f11
2013-01-30 10:40:58 -08:00