- Jun 28, 2013
-
-
Nick Kralevich authored
This change does several things: 1) Restore domain.te to the version present at cd516a32 . This is the version currently being distributed in AOSP. 2) Add "allow domain properties_device:file r_file_perms;" to domain.te, to allow all domains to read /dev/__properties__ . This change was missing from AOSP. 3) Restore netd.te to the version present at 80c9ba52 . This is the version currently being distributed in AOSP. 4) Remove anything involving module loading from netd.te. CTS enforces that Android kernels can't have module loading enabled. 5) Add several new capabilities, plus data file rules, to netd.te, since netd needs to write to files owned by wifi. 6) Add a new unconfined domain called dnsmasq.te, and allow transitions from netd to that domain. Over time, we'll tighten up the dnsmasq.te domain. 7) Add a new unconfined domain called hostapd.te, and allow transitions from netd to that domain. Over time, we'll tighten up the hostapd.te domain. The net effect of these changes is to re-enable SELinux protections for netd. The policy is FAR from perfect, and allows a lot of wiggle room, but we can improve it over time. Testing: as much as possible, I've exercised networking related functionality, including turning on and off wifi, entering airplane mode, and enabling tethering and portable wifi hotspots. It's quite possible I've missed something, and if we experience problems, I can roll back this change. Bug: 9618347 Change-Id: I23ff3eebcef629bc7baabcf6962f25f116c4a3c0
-
- Jun 27, 2013
-
-
Nick Kralevich authored
In the process of taking a bugreport, "dumpstate -B" will instruct zygote to fire up com.android.shell, which runs as UID=2000. This transition was not included in seapp_contexts, so zygote didn't know how to properly set the context for the shell user. Add an entry to allow zygote to know what to do with UID=2000 requests. Bug: 9588981 Change-Id: I2e726be8d58437ef1de3bcbad3b897a97ed18e22
-
- Jun 24, 2013
-
-
Nick Kralevich authored
System server needs to be able to tell Zygote to create processes with differing ids, capabilities, and SELinux security information. Allow it. These rules are not in unconfined.te, and as a result, are not automatically allowed by SELinux in enforcing mode. Change-Id: I010eaa2b0e0cee5d995e08e6c785cc5e01b2c974
-
- May 24, 2013
-
-
gcondra@google.com authored
* commit '95c960de': Clean up remaining denials.
-
gcondra@google.com authored
* commit '274d2927': Clean up remaining denials.
-
- May 22, 2013
-
-
repo sync authored
Bug: 8424461 Change-Id: I8f0b01cdb19b4a479d5de842f4e4844aeab00622
-
- May 20, 2013
-
-
Geremy Condra authored
Change-Id: Ide4d5d28e9a1673775b944780677d8c2eb4d7cd6
-
gcondra@google.com authored
* commit 'eb2dc6d0': Revert "Add the selinux policy version number."
-
gcondra@google.com authored
* commit '77d4731e': Make all domains unconfined.
-
gcondra@google.com authored
* commit '42cabf34': Revert "Add the selinux policy version number."
-
repo sync authored
This prevents denials from being generated by the base policy. Over time, these rules will be incrementally tightened to improve security. Change-Id: I4be1c987a5d69ac784a56d42fc2c9063c402de11
-
- May 17, 2013
-
- May 15, 2013
-
-
gcondra@google.com authored
* commit '92b8f148': Move domains into per-domain permissive mode.
-
gcondra@google.com authored
* commit '50e37b93': Move domains into per-domain permissive mode.
-
gcondra@google.com authored
* commit 'a77daf87': Add the selinux policy version number.
-
gcondra@google.com authored
* commit 'b77b3aff': Add the selinux policy version number.
-
repo sync authored
Bug: 4070557 Change-Id: I027f76cff6df90e9909711cb81fbd17db95233c1
-
- May 14, 2013
-
-
repo sync authored
Bug: 8841348 Change-Id: I1acf355b8e700500eeb0ddcbb8203a4769bde3bc
-
- May 10, 2013
-
-
Geremy Condra authored
* commit '28dde094': Revert "Add a policy version."
-
Alex Klyubin authored
* commit 'd0a5e06d': SELinux policy: let vold write to device:dir.
-
Geremy Condra authored
* commit '92f35dcc': Revert "Add a policy version."
-
Geremy Condra authored
-
Alex Klyubin authored
* commit 'c25023e1': SELinux policy: let vold write to device:dir.
-
Geremy Condra authored
Faugh. Typo. This reverts commit adb481dd Change-Id: Id1ccc0a59cc79b8ad7171fcb6b3d8cb3aaf29bee
-
Alex Klyubin authored
-
gcondra@google.com authored
* commit '06dab1bf': Add a policy version.
-
gcondra@google.com authored
* commit 'bd77ab31': Add a policy version.
-
repo sync authored
-
repo sync authored
Bug: 8841348 Change-Id: I83497c9b5346ba3b35e4e288190fc217a26be505
-
Geremy Condra authored
* commit '31083f90': SELinux policy: let vold create /data/tmp_mnt
-
Torne (Richard Coles) authored
Manual merge to get automerger going again. Conflicts: adbd.te Change-Id: Ibf8db0306b421a3426e925cf9c8f253bbcd500b3
-
Geremy Condra authored
* commit '1adb7ca3': SELinux policy: let vold create /data/tmp_mnt
-
Alex Klyubin authored
* commit '3b9fd5ff': SELinux policy: let adbd drop Linux capabilities.
-
Geremy Condra authored
-
Alex Klyubin authored
Change-Id: I40f3ccd9813e0a337ced0a44e686ab489277d78b
-
Alex Klyubin authored
Change-Id: Id41891b89c7b067919cbda06ab97d5eff2ad044f
-
Alex Klyubin authored
I have no idea what vold is doing when this operation is attempted (when a full-disk encrypted device is booting up). Thus, I don't know if there is a better way of restricting the policy. Change-Id: I537b70b1abb73c36e5abf0357b766292f625e1af
-
- May 09, 2013
-
-
Alex Klyubin authored
* commit 'e5e98aef': SELinux policy for users of libcutils klog_write.
-
Alex Klyubin authored
Change-Id: Ia9f34580a35d3f5ff7ea0ac9a3784d2650e61b6a
-
Alex Klyubin authored
klog_write/init create /dev/__kmsg__ backed by a kernel character device, keep the file descriptor, and then immediately unlink the file. Change-Id: I729d224347a003eaca29299d216a53c99cc3197c
-