Skip to content
Snippets Groups Projects
Commit 278658c2 authored by Jeffrey Vander Stoep's avatar Jeffrey Vander Stoep Committed by Android Git Automerger
Browse files

am 6f7de297: Merge "Do not allow apps to access network address file"

* commit '6f7de297':
  Do not allow apps to access network address file
parents 4fe55e1e 6f7de297
No related branches found
No related tags found
No related merge requests found
...@@ -25,6 +25,7 @@ type sysfs_writable, fs_type, sysfs_type, mlstrustedobject; ...@@ -25,6 +25,7 @@ type sysfs_writable, fs_type, sysfs_type, mlstrustedobject;
type sysfs_bluetooth_writable, fs_type, sysfs_type, mlstrustedobject; type sysfs_bluetooth_writable, fs_type, sysfs_type, mlstrustedobject;
type sysfs_nfc_power_writable, fs_type, sysfs_type, mlstrustedobject; type sysfs_nfc_power_writable, fs_type, sysfs_type, mlstrustedobject;
type sysfs_wake_lock, fs_type, sysfs_type; type sysfs_wake_lock, fs_type, sysfs_type;
type sysfs_mac_address, fs_type, sysfs_type;
# /sys/devices/system/cpu # /sys/devices/system/cpu
type sysfs_devices_system_cpu, fs_type, sysfs_type; type sysfs_devices_system_cpu, fs_type, sysfs_type;
# /sys/module/lowmemorykiller # /sys/module/lowmemorykiller
......
...@@ -153,6 +153,7 @@ selinux_check_access(system_server) ...@@ -153,6 +153,7 @@ selinux_check_access(system_server)
allow system_server sysfs:file rw_file_perms; allow system_server sysfs:file rw_file_perms;
allow system_server sysfs_nfc_power_writable:file rw_file_perms; allow system_server sysfs_nfc_power_writable:file rw_file_perms;
allow system_server sysfs_devices_system_cpu:file w_file_perms; allow system_server sysfs_devices_system_cpu:file w_file_perms;
allow system_server sysfs_mac_address:file r_file_perms;
# Access devices. # Access devices.
allow system_server device:dir r_dir_perms; allow system_server device:dir r_dir_perms;
......
...@@ -154,3 +154,6 @@ neverallow untrusted_app mlstrustedsubject:process fork; ...@@ -154,3 +154,6 @@ neverallow untrusted_app mlstrustedsubject:process fork;
# bugs, so we want to ensure untrusted_app never has this # bugs, so we want to ensure untrusted_app never has this
# capability. # capability.
neverallow untrusted_app file_type:file link; neverallow untrusted_app file_type:file link;
# Do not allow untrusted_app to access network MAC address file
neverallow untrusted_app sysfs_mac_address:file no_rw_file_perms;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment