Skip to content
Snippets Groups Projects
  1. Oct 06, 2016
    • dcashman's avatar
      Split general policy into public and private components. · cc39f637
      dcashman authored
      Divide policy into public and private components.  This is the first
      step in splitting the policy creation for platform and non-platform
      policies.  The policy in the public directory will be exported for use
      in non-platform policy creation.  Backwards compatibility with it will
      be achieved by converting the exported policy into attribute-based
      policy when included as part of the non-platform policy and a mapping
      file will be maintained to be included with the platform policy that
      maps exported attributes of previous versions to the current platform
      version.
      
      Eventually we would like to create a clear interface between the
      platform and non-platform device components so that the exported policy,
      and the need for attributes is minimal.  For now, almost all types and
      avrules are left in public.
      
      Test: Tested by building policy and running on device.
      
      Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
      cc39f637
  2. Sep 13, 2016
    • Jeff Vander Stoep's avatar
      Define and group ppp socket ioctls · 3650ea9b
      Jeff Vander Stoep authored
      Needed for legacy VPN access.
      
      Note that ioctl whitelisting only uses the type and command fields
      of the ioctl so only the last two bytes are necessary, thus 0x40047438
      and 0x7438 are treated the same.
      
      Bug: 30154346
      Change-Id: I45bdc77ab666e05707729a114d933900655ba48b
      3650ea9b
  3. Aug 29, 2016
  4. Jul 15, 2016
    • Jeff Vander Stoep's avatar
      Define and group ppp socket ioctls · cbde7f9f
      Jeff Vander Stoep authored
      Needed for legacy VPN access.
      
      Note that ioctl whitelisting only uses the type and command fields
      of the ioctl so only the last two bytes are necessary, thus 0x40047438
      and 0x7438 are treated the same.
      
      Bug: 30154346
      Change-Id: I45bdc77ab666e05707729a114d933900655ba48b
      cbde7f9f
  5. Apr 21, 2016
    • Jeff Vander Stoep's avatar
      Define more ioctl types · 9a6f8f77
      Jeff Vander Stoep authored
      Define SIOCKILLADDR.
      
      Define wireless extension private types between SIOCIWFIRSTPRIV-
      SIOCIWLASTPRIV SIOCPROTOPRIVATE-SIOCPROTOPRIVLAST and
      SIOCDEVPRIVATE-SIOCDEVPRIVLAST
      
      Change-Id: I0237dec9e3ffb030ce6573dfa9b81835b7f4f95e
      9a6f8f77
  6. Jan 05, 2016
    • Jeff Vander Stoep's avatar
      disallow unprivileged access to rmnet · 84a61cc5
      Jeff Vander Stoep authored
      Enforce via neverallow rule by adding WAN_IOC_ADD_FLT_RULE
      and WAN_IOC_ADD_FLT_RULE_INDEX to neverallow macro.
      
      Bug: 26324307
      Change-Id: I5350d9339e45ddeefd5423c3fe9a0ea14fe877b2
      84a61cc5
  7. Jan 04, 2016
    • Jeff Vander Stoep's avatar
      Reduce socket ioctl perms · cbaa2b7d
      Jeff Vander Stoep authored
      Reduce the socket ioctl commands available to untrusted/isolated apps.
      Neverallow accessing sensitive information or setting of network parameters.
      Neverallow access to device private ioctls i.e. device specific
      customizations as these are a common source of driver bugs.
      
      Define common ioctl commands in ioctl_defines.
      
      Bug: 26267358
      Change-Id: Ic5c0af066e26d4cb2867568f53a3e65c5e3b5a5d
      cbaa2b7d
Loading