- Dec 05, 2013
-
-
Robert Craig authored
This label was originally used for Motorola Xoom devices. nvmap is the tegra gpu memory manager and the various nvhost drivers are for tegra graphics related functionality, i.e. display serial interface, image signal processor, or media processing stuff. Only grouper and tilapia presently need this policy. Change-Id: I2a7000f69abf3185724d88d428e8237e0ca436ec
-
Nick Kralevich authored
-
- Dec 02, 2013
-
-
Stephen Smalley authored
Also make su and shell permissive in non-user builds to allow use of setenforce without violating the neverallow rule. Change-Id: Ie76ee04e90d5a76dfaa5f56e9e3eb7e283328a3f Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I10006f43c142f07168e2ea0f4f5f7af68d03e504 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Nick Kralevich authored
-
Stephen Smalley authored
Otherwise sockets that have no specific entry match the /dev(/.*) entry instead, leaving them in device type rather than socket_device type. Every socket should get its own entry regardless, but this at least puts it into a more specific type by default. Change-Id: I97f7999af7f9f83484d3a51440dda791d3726f1a Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: I11be7d1713dd7cb35b8046503a09e42567e53d86 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Nov 27, 2013
-
-
Nick Kralevich authored
Allow tmpfs_domains the ability to write to ashmem allocated regions. At least one Google internal app does this, and switching untrusted_app into enforcing causes the following denial: <5>[ 291.791423] type=1400 audit(1385587240.320:79): avc: denied { write } for pid=3774 comm="XXXXXXXXXXXX" path=2F6465762F6173686D656D202864656C6574656429 dev="tmpfs" ino=16937 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:untrusted_app_tmpfs:s0 tclass=file path=/dev/ashmem (deleted) Bug: 11891764 Change-Id: I64d414c055cd02481ebf69994fad65d777d8381d
-
- Nov 23, 2013
-
-
Stephen Smalley authored
* commit '043b9027': Confine watchdogd, but leave it permissive for now.
-
- Nov 22, 2013
-
-
The Android Open Source Project authored
-
- Nov 21, 2013
-
-
Stephen Smalley authored
Change-Id: If2285e927cb886956b3314dd18384145a1ebeaa9 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Nov 19, 2013
-
-
Nick Kralevich authored
* commit '1ed3caf7': Add support for duplicate allow rule detection (-D / --dups).
-
Nick Kralevich authored
-
Stephen Smalley authored
Usage: sepolicy-analyze -D -P out/target/product/<board>/root/sepolicy Displays duplicate allow rules, i.e. pairs of allow rules that grant the same permissions where one allow rule is written directly in terms of individual types and the other is written in terms of attributes associated with those same types. The rule with individual types is a candidate for removal. The rule with individual types may be directly represented in the source policy or may be a result of expansion of a type negation (e.g. domain -foo -bar is expanded to individual allow rules by the policy compiler). Domains with unconfineddomain will typically have such duplicate rules as a natural side effect and can be ignored. Also add a tools/README with a description of all of the tools. Change-Id: I07838dbd22c5cc8a4a65b57003ccae38129050f5 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Nov 18, 2013
-
-
Nick Kralevich authored
* commit '006260e5': Confine hostapd, but leave it permissive for now.
-
Nick Kralevich authored
-
Nick Kralevich authored
* commit '2b939e8c': Confine ping, but leave it permissive for now.
-
Nick Kralevich authored
-
Stephen Smalley authored
Change-Id: I23a2c568e9fdd51c6c09c6c80a7ce9f2b5bd4966 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Nov 14, 2013
-
-
Nick Kralevich authored
* commit 'ae49e7a3': Confine tee, but leave it permissive for now.
-
Nick Kralevich authored
-
Nick Kralevich authored
* commit '6ce3d60c': Confine rild, but leave it permissive for now.
-
Stephen Smalley authored
* commit 'b1cb3205': Confine wpa_supplicant, but leave it permissive for now.
-
Nick Kralevich authored
-
- Nov 13, 2013
-
-
Stephen Smalley authored
Change-Id: I6df9981b2af0150c6379a0ebdbe0a8597c994f4a Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: Id69b1fe80746429a550448b9168ac7e86c38aa9f Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
Change-Id: Iaa4ed5428d1c49cb4cff3a39c48800cb108f2ac3 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Nick Kralevich authored
* commit '91ebcf33': netd: allow tcp_socket name_connect
-
Nick Kralevich authored
The patch in 36a5d109 wasn't sufficient to address DNS over TCP. We also need to allow name_connect. Fixes the following denial: <5>[ 82.120746] type=1400 audit(1830030.349:5): avc: denied { name_connect } for pid=1457 comm="netd" dest=53 scontext=u:r:netd:s0 tcontext=u:object_r:port:s0 tclass=tcp_socket Public Bug: https://code.google.com/p/android/issues/detail?id=62196 Bug: 11097631 Change-Id: I688d6923b78782e2183a9d69b7e74f95d6e3f893
-
Nick Kralevich authored
* commit '36a5d109': netd: allow tcp connections.
-
Nick Kralevich authored
DNS can use TCP connections, in addition to UDP connections. Allow TCP connections. Addresses the following denial: [ 1831.586826] type=1400 audit(1384129166.563:173): avc: denied { create } for pid=11406 comm="netd" scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=tcp_socket Public Bug: https://code.google.com/p/android/issues/detail?id=62196 Change-Id: Ia542a9df3e466a8d409955bab6a23a524ff3d07b Bug: 11097631
-
- Nov 12, 2013
-
-
Stephen Smalley authored
* commit '8510d31e': Rename camera_calibration_file and audio_firmware_file.
-
Stephen Smalley authored
Use more general type names for the contents of /data/misc/camera and /data/misc/audio. These were the names used in our policy until 4.3 was released, at which point we switched to be consistent with AOSP. However, the Galaxy S4 4.2.2 image, Galaxy S4 4.3 image, and Galaxy Note 3 4.3 image all shipped with policies using _data_file names because they were based on our older policy. So we may as well switch AOSP to these names. Not sure if in fact these could be all coalesced to the new media_data_file type for /data/misc/media introduced by Ic374488f8b62bd4f8b3c90f30da0e8d1ed1a7343. Options to fix already existing devices, which would only apply to Nexus devices with 4.3 or 4.4 at this point: 1) Add restorecon_recursive /data/misc/audio /data/misc/camera to either the system/core init.rc or to the device-specific init.*.rc files. -or- 2) Add a typealias declaration in the policy to remap the old type names. to the new ones. Then existing types on persistent storage will be remapped internally to the new ones. -or- 3) Some sort of relabeld. Option #2 is implemented by this change. Change-Id: Id36203f5bb66b5200efc1205630b5b260ef97496 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Nick Kralevich authored
* commit 'bc1388d3': Make kernel / init enforcing
-
Nick Kralevich authored
* commit '56f39193': Confine debuggerd, but leave it permissive for now.
-
Nick Kralevich authored
-
Nick Kralevich authored
-
- Nov 11, 2013
-
-
Stephen Smalley authored
* commit 'af47ebb6': Label /dev/fscklogs and allow system_server access to it.
-
Stephen Smalley authored
Otherwise you get denials such as: type=1400 audit(1383590310.430:623): avc: denied { getattr } for pid=1629 comm="Thread-78" path="/dev/fscklogs/log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=file type=1400 audit(1383590310.430:624): avc: denied { open } for pid=1629 comm="Thread-78" name="log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=file type=1400 audit(1383590310.430:625): avc: denied { write } for pid=1629 comm="Thread-78" name="fscklogs" dev="tmpfs" ino=1628 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=dir type=1400 audit(1383590310.430:625): avc: denied { remove_name } for pid=1629 comm="Thread-78" name="log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=dir type=1400 audit(1383590310.430:625): avc: denied { unlink } for pid=1629 comm="Thread-78" name="log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=file Change-Id: Ia7ae06a6d4cc5d2a59b8b85a5fb93cc31074fd37 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Nick Kralevich authored
* commit '00739e3d': Make the ueventd domain enforcing.
-