Skip to content
Snippets Groups Projects
Select Git revision
  • 2d425de9f47f8b4eaf0432cf2b9336ab8e1ede6c
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

tee.te

Blame
    • Stephen Smalley's avatar
      16011320
      Clean up socket rules. · 16011320
      Stephen Smalley authored
      
      Replace * or any permission set containing create with
      create_socket_perms or create_stream_socket_perms.
      
      Add net_domain() to all domains using network sockets and
      delete rules already covered by domain.te or net.te.
      
      For netlink_route_socket, only nlmsg_write needs to be separately
      granted to specific domains that are permitted to modify the routing
      table.   Clarification:  read/write permissions are just ability to
      perform read/recv() or write/send() on the socket, whereas nlmsg_read/
      nlmsg_write permissions control ability to observe or modify the
      underlying kernel state accessed via the socket.
      See security/selinux/nlmsgtab.c in the kernel for the mapping of
      netlink message types to nlmsg_read or nlmsg_write.
      
      Delete legacy rule for b/12061011.
      
      This change does not touch any rules where only read/write were allowed
      to a socket created by another domain (inherited across exec or
      received across socket or binder IPC).  We may wish to rewrite some or all
      of those rules with the rw_socket_perms macro but that is a separate
      change.
      
      Change-Id: Ib0637ab86f6d388043eff928e5d96beb02e5450e
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      16011320
      History
      Clean up socket rules.
      Stephen Smalley authored
      
      Replace * or any permission set containing create with
      create_socket_perms or create_stream_socket_perms.
      
      Add net_domain() to all domains using network sockets and
      delete rules already covered by domain.te or net.te.
      
      For netlink_route_socket, only nlmsg_write needs to be separately
      granted to specific domains that are permitted to modify the routing
      table.   Clarification:  read/write permissions are just ability to
      perform read/recv() or write/send() on the socket, whereas nlmsg_read/
      nlmsg_write permissions control ability to observe or modify the
      underlying kernel state accessed via the socket.
      See security/selinux/nlmsgtab.c in the kernel for the mapping of
      netlink message types to nlmsg_read or nlmsg_write.
      
      Delete legacy rule for b/12061011.
      
      This change does not touch any rules where only read/write were allowed
      to a socket created by another domain (inherited across exec or
      received across socket or binder IPC).  We may wish to rewrite some or all
      of those rules with the rw_socket_perms macro but that is a separate
      change.
      
      Change-Id: Ib0637ab86f6d388043eff928e5d96beb02e5450e
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
    Makefile 3.00 KiB
    #
    # Makefile for the kernel pcmcia subsystem (c/o David Hinds)
    #
    
    pcmcia_core-y					+= cs.o socket_sysfs.o
    pcmcia_core-$(CONFIG_CARDBUS)			+= cardbus.o
    obj-$(CONFIG_PCCARD)				+= pcmcia_core.o
    
    pcmcia-y					+= ds.o pcmcia_resource.o cistpl.o pcmcia_cis.o
    obj-$(CONFIG_PCMCIA)				+= pcmcia.o
    
    pcmcia_rsrc-y					+= rsrc_mgr.o
    pcmcia_rsrc-$(CONFIG_PCCARD_NONSTATIC)		+= rsrc_nonstatic.o
    pcmcia_rsrc-$(CONFIG_PCCARD_IODYN)		+= rsrc_iodyn.o
    obj-$(CONFIG_PCCARD)				+= pcmcia_rsrc.o
    
    
    # socket drivers
    
    obj-$(CONFIG_YENTA) 				+= yenta_socket.o
    
    obj-$(CONFIG_PD6729)				+= pd6729.o
    obj-$(CONFIG_I82365)				+= i82365.o
    obj-$(CONFIG_I82092)				+= i82092.o
    obj-$(CONFIG_TCIC)				+= tcic.o
    obj-$(CONFIG_PCMCIA_M8XX)			+= m8xx_pcmcia.o
    obj-$(CONFIG_PCMCIA_SOC_COMMON)			+= soc_common.o
    obj-$(CONFIG_PCMCIA_SA11XX_BASE)		+= sa11xx_base.o
    obj-$(CONFIG_PCMCIA_SA1100)			+= sa1100_cs.o
    obj-$(CONFIG_PCMCIA_SA1111)			+= sa1111_cs.o
    obj-$(CONFIG_M32R_PCC)				+= m32r_pcc.o
    obj-$(CONFIG_M32R_CFC)				+= m32r_cfc.o
    obj-$(CONFIG_PCMCIA_BCM63XX)			+= bcm63xx_pcmcia.o
    obj-$(CONFIG_PCMCIA_VRC4171)			+= vrc4171_card.o
    obj-$(CONFIG_PCMCIA_VRC4173)			+= vrc4173_cardu.o
    obj-$(CONFIG_OMAP_CF)				+= omap_cf.o
    obj-$(CONFIG_BFIN_CFPCMCIA)			+= bfin_cf_pcmcia.o
    obj-$(CONFIG_AT91_CF)				+= at91_cf.o
    obj-$(CONFIG_ELECTRA_CF)			+= electra_cf.o
    obj-$(CONFIG_PCMCIA_ALCHEMY_DEVBOARD)		+= db1xxx_ss.o
    
    sa1111_cs-y					+= sa1111_generic.o
    sa1111_cs-$(CONFIG_ASSABET_NEPONSET)		+= sa1111_neponset.o
    sa1111_cs-$(CONFIG_SA1100_BADGE4)		+= sa1111_badge4.o
    sa1111_cs-$(CONFIG_SA1100_JORNADA720)		+= sa1111_jornada720.o
    sa1111_cs-$(CONFIG_ARCH_LUBBOCK)		+= sa1111_lubbock.o
    
    sa1100_cs-y					+= sa1100_generic.o
    sa1100_cs-$(CONFIG_SA1100_ASSABET)		+= sa1100_assabet.o
    sa1100_cs-$(CONFIG_SA1100_CERF)			+= sa1100_cerf.o
    sa1100_cs-$(CONFIG_SA1100_COLLIE)		+= pxa2xx_sharpsl.o
    sa1100_cs-$(CONFIG_SA1100_H3600)		+= sa1100_h3600.o
    sa1100_cs-$(CONFIG_SA1100_NANOENGINE)		+= sa1100_nanoengine.o
    sa1100_cs-$(CONFIG_SA1100_SHANNON)		+= sa1100_shannon.o
    sa1100_cs-$(CONFIG_SA1100_SIMPAD)		+= sa1100_simpad.o
    
    pxa2xx_cm_x2xx_cs-y				+= pxa2xx_cm_x2xx.o pxa2xx_cm_x255.o pxa2xx_cm_x270.o
    pxa2xx-obj-$(CONFIG_MACH_MAINSTONE)		+= pxa2xx_mainstone.o
    pxa2xx-obj-$(CONFIG_PXA_SHARPSL)		+= pxa2xx_sharpsl.o
    pxa2xx-obj-$(CONFIG_MACH_ARMCORE)		+= pxa2xx_cm_x2xx_cs.o
    pxa2xx-obj-$(CONFIG_ARCOM_PCMCIA)		+= pxa2xx_viper.o
    pxa2xx-obj-$(CONFIG_TRIZEPS_PCMCIA)		+= pxa2xx_trizeps4.o
    pxa2xx-obj-$(CONFIG_MACH_PALMTX)		+= pxa2xx_palmtx.o
    pxa2xx-obj-$(CONFIG_MACH_PALMTC)		+= pxa2xx_palmtc.o
    pxa2xx-obj-$(CONFIG_MACH_PALMLD)		+= pxa2xx_palmld.o
    pxa2xx-obj-$(CONFIG_MACH_E740)			+= pxa2xx_e740.o
    pxa2xx-obj-$(CONFIG_MACH_STARGATE2)		+= pxa2xx_stargate2.o
    pxa2xx-obj-$(CONFIG_MACH_VPAC270)		+= pxa2xx_vpac270.o
    pxa2xx-obj-$(CONFIG_MACH_BALLOON3)		+= pxa2xx_balloon3.o
    pxa2xx-obj-$(CONFIG_MACH_COLIBRI)		+= pxa2xx_colibri.o
    pxa2xx-obj-$(CONFIG_MACH_COLIBRI320)		+= pxa2xx_colibri.o
    pxa2xx-obj-$(CONFIG_MACH_H4700)			+= pxa2xx_hx4700.o
    
    obj-$(CONFIG_PCMCIA_PXA2XX)			+= pxa2xx_base.o $(pxa2xx-obj-y)
    
    obj-$(CONFIG_PCMCIA_XXS1500)			+= xxs1500_ss.o