Skip to content
Snippets Groups Projects
Commit d4150426 authored by Joel Scherpelz's avatar Joel Scherpelz Committed by android-build-merger
Browse files

SELinux policy for secure persistent netd storage am: ef1fd98b am: 9381cb3d am: 36efd0c4

am: d6da377a

Change-Id: Id608af3667c5ba9e60dd4630f9b718bc84ff96d0
parents 119de898 d6da377a
No related branches found
No related tags found
No related merge requests found
...@@ -50,6 +50,7 @@ persist.logd.logpersistd u:object_r:logpersistd_logging_prop:s0 ...@@ -50,6 +50,7 @@ persist.logd.logpersistd u:object_r:logpersistd_logging_prop:s0
logd.logpersistd u:object_r:logpersistd_logging_prop:s0 logd.logpersistd u:object_r:logpersistd_logging_prop:s0
persist.log.tag u:object_r:log_tag_prop:s0 persist.log.tag u:object_r:log_tag_prop:s0
persist.mmc. u:object_r:mmc_prop:s0 persist.mmc. u:object_r:mmc_prop:s0
persist.netd. u:object_r:netd_prop:s0
persist.sys. u:object_r:system_prop:s0 persist.sys. u:object_r:system_prop:s0
persist.sys.safemode u:object_r:safemode_prop:s0 persist.sys.safemode u:object_r:safemode_prop:s0
ro.sys.safemode u:object_r:safemode_prop:s0 ro.sys.safemode u:object_r:safemode_prop:s0
......
...@@ -62,6 +62,7 @@ allow netd dnsmasq:process signal; ...@@ -62,6 +62,7 @@ allow netd dnsmasq:process signal;
allow netd clatd:process signal; allow netd clatd:process signal;
set_prop(netd, ctl_mdnsd_prop) set_prop(netd, ctl_mdnsd_prop)
set_prop(netd, netd_prop)
# Allow netd to publish a binder service and make binder calls. # Allow netd to publish a binder service and make binder calls.
binder_use(netd) binder_use(netd)
...@@ -108,3 +109,11 @@ neverallow netd { app_data_file system_data_file }:dir_file_class_set write; ...@@ -108,3 +109,11 @@ neverallow netd { app_data_file system_data_file }:dir_file_class_set write;
neverallow { domain -system_server -dumpstate -netd } netd_service:service_manager find; neverallow { domain -system_server -dumpstate -netd } netd_service:service_manager find;
neverallow { domain -system_server -dumpstate } netd:binder call; neverallow { domain -system_server -dumpstate } netd:binder call;
neverallow netd { domain -system_server -servicemanager userdebug_or_eng(`-su') }:binder call; neverallow netd { domain -system_server -servicemanager userdebug_or_eng(`-su') }:binder call;
# persist.netd.stable_secret contains RFC 7217 secret key which should never be
# leaked to other processes. Make sure it never leaks.
neverallow { domain -netd -init } netd_prop:file r_file_perms;
# We want to ensure that no other process ever tries tampering with persist.netd.stable_secret,
# the RFC 7217 secret key managed by netd. Doing so could compromise user privacy.
neverallow { domain -netd -init } netd_prop:property_service set;
...@@ -31,6 +31,7 @@ type log_tag_prop, property_type, log_property_type; ...@@ -31,6 +31,7 @@ type log_tag_prop, property_type, log_property_type;
type mmc_prop, property_type; type mmc_prop, property_type;
type net_dns_prop, property_type; type net_dns_prop, property_type;
type net_radio_prop, property_type, core_property_type; type net_radio_prop, property_type, core_property_type;
type netd_prop, property_type;
type nfc_prop, property_type, core_property_type; type nfc_prop, property_type, core_property_type;
type overlay_prop, property_type; type overlay_prop, property_type;
type pan_result_prop, property_type, core_property_type; type pan_result_prop, property_type, core_property_type;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment