Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

blkid_untrusted.te

Blame
    • Nick Kralevich's avatar
      35a14514
      Replace "neverallow domain" by "neverallow *" · 35a14514
      Nick Kralevich authored
      Modify many "neverallow domain" rules to be "neverallow *" rules
      instead. This will catch more SELinux policy bugs where a label
      is assigned an irrelevant rule, as well as catch situations where
      a domain attribute is not assigned to a process.
      
      Change-Id: I5b83a2504c13b384f9dff616a70ca733b648ccdf
      35a14514
      History
      Replace "neverallow domain" by "neverallow *"
      Nick Kralevich authored
      Modify many "neverallow domain" rules to be "neverallow *" rules
      instead. This will catch more SELinux policy bugs where a label
      is assigned an irrelevant rule, as well as catch situations where
      a domain attribute is not assigned to a process.
      
      Change-Id: I5b83a2504c13b384f9dff616a70ca733b648ccdf
    blkid_untrusted.te 1.08 KiB
    # blkid for untrusted block devices
    type blkid_untrusted, domain, domain_deprecated;
    
    # Allowed read-only access to vold block devices to extract UUID/label
    allow blkid_untrusted block_device:dir search;
    allow blkid_untrusted vold_device:blk_file r_file_perms;
    
    # Allow stdin/out back to vold
    allow blkid_untrusted vold:fd use;
    allow blkid_untrusted vold:fifo_file { read write getattr };
    
    # For blkid launched through popen()
    allow blkid_untrusted blkid_exec:file rx_file_perms;
    
    ###
    ### neverallow rules
    ###
    
    # Untrusted blkid should never be run on block devices holding sensitive data
    neverallow blkid_untrusted {
      boot_block_device
      frp_block_device
      metadata_block_device
      recovery_block_device
      root_block_device
      swap_block_device
      system_block_device
      userdata_block_device
      cache_block_device
      dm_device
    }:blk_file no_rw_file_perms;
    
    # Only allow entry from vold via blkid binary
    neverallow { domain -vold } blkid_untrusted:process transition;
    neverallow * blkid_untrusted:process dyntransition;
    neverallow blkid_untrusted { file_type fs_type -blkid_exec -shell_exec }:file entrypoint;