Skip to content
Snippets Groups Projects
Commit 722583fb authored by Bartosz Fabianowski's avatar Bartosz Fabianowski Committed by android-build-merger
Browse files

Revert "SELinux policy for secure persistent netd storage" am: 06486796 am: edcfb2e1

am: 0f52004b

Change-Id: I5df1b7411cc87c6b983d80d716d9ec05f1ba9339
parents d6da377a 0f52004b
No related branches found
No related tags found
No related merge requests found
...@@ -50,7 +50,6 @@ persist.logd.logpersistd u:object_r:logpersistd_logging_prop:s0 ...@@ -50,7 +50,6 @@ persist.logd.logpersistd u:object_r:logpersistd_logging_prop:s0
logd.logpersistd u:object_r:logpersistd_logging_prop:s0 logd.logpersistd u:object_r:logpersistd_logging_prop:s0
persist.log.tag u:object_r:log_tag_prop:s0 persist.log.tag u:object_r:log_tag_prop:s0
persist.mmc. u:object_r:mmc_prop:s0 persist.mmc. u:object_r:mmc_prop:s0
persist.netd. u:object_r:netd_prop:s0
persist.sys. u:object_r:system_prop:s0 persist.sys. u:object_r:system_prop:s0
persist.sys.safemode u:object_r:safemode_prop:s0 persist.sys.safemode u:object_r:safemode_prop:s0
ro.sys.safemode u:object_r:safemode_prop:s0 ro.sys.safemode u:object_r:safemode_prop:s0
......
...@@ -62,7 +62,6 @@ allow netd dnsmasq:process signal; ...@@ -62,7 +62,6 @@ allow netd dnsmasq:process signal;
allow netd clatd:process signal; allow netd clatd:process signal;
set_prop(netd, ctl_mdnsd_prop) set_prop(netd, ctl_mdnsd_prop)
set_prop(netd, netd_prop)
# Allow netd to publish a binder service and make binder calls. # Allow netd to publish a binder service and make binder calls.
binder_use(netd) binder_use(netd)
...@@ -109,11 +108,3 @@ neverallow netd { app_data_file system_data_file }:dir_file_class_set write; ...@@ -109,11 +108,3 @@ neverallow netd { app_data_file system_data_file }:dir_file_class_set write;
neverallow { domain -system_server -dumpstate -netd } netd_service:service_manager find; neverallow { domain -system_server -dumpstate -netd } netd_service:service_manager find;
neverallow { domain -system_server -dumpstate } netd:binder call; neverallow { domain -system_server -dumpstate } netd:binder call;
neverallow netd { domain -system_server -servicemanager userdebug_or_eng(`-su') }:binder call; neverallow netd { domain -system_server -servicemanager userdebug_or_eng(`-su') }:binder call;
# persist.netd.stable_secret contains RFC 7217 secret key which should never be
# leaked to other processes. Make sure it never leaks.
neverallow { domain -netd -init } netd_prop:file r_file_perms;
# We want to ensure that no other process ever tries tampering with persist.netd.stable_secret,
# the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
neverallow { domain -netd -init } netd_prop:property_service set;
...@@ -31,7 +31,6 @@ type log_tag_prop, property_type, log_property_type; ...@@ -31,7 +31,6 @@ type log_tag_prop, property_type, log_property_type;
type mmc_prop, property_type; type mmc_prop, property_type;
type net_dns_prop, property_type; type net_dns_prop, property_type;
type net_radio_prop, property_type, core_property_type; type net_radio_prop, property_type, core_property_type;
type netd_prop, property_type;
type nfc_prop, property_type, core_property_type; type nfc_prop, property_type, core_property_type;
type overlay_prop, property_type; type overlay_prop, property_type;
type pan_result_prop, property_type, core_property_type; type pan_result_prop, property_type, core_property_type;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment