Skip to content
Snippets Groups Projects
  1. Jun 28, 2013
    • Nick Kralevich's avatar
      Enable SELinux protections for netd. · dbd28d91
      Nick Kralevich authored
      This change does several things:
      
      1) Restore domain.te to the version present at
      cd516a32 . This is the version
      currently being distributed in AOSP.
      
      2) Add "allow domain properties_device:file r_file_perms;" to
      domain.te, to allow all domains to read /dev/__properties__ .
      This change was missing from AOSP.
      
      3) Restore netd.te to the version present at
      80c9ba52 . This is the version
      currently being distributed in AOSP.
      
      4) Remove anything involving module loading from netd.te. CTS
      enforces that Android kernels can't have module loading enabled.
      
      5) Add several new capabilities, plus data file rules, to
      netd.te, since netd needs to write to files owned by wifi.
      
      6) Add a new unconfined domain called dnsmasq.te, and allow
      transitions from netd to that domain. Over time, we'll tighten up
      the dnsmasq.te domain.
      
      7) Add a new unconfined domain called hostapd.te, and allow
      transitions from netd to that domain. Over time, we'll tighten up
      the hostapd.te domain.
      
      The net effect of these changes is to re-enable SELinux protections
      for netd. The policy is FAR from perfect, and allows a lot of wiggle
      room, but we can improve it over time.
      
      Testing: as much as possible, I've exercised networking related
      functionality, including turning on and off wifi, entering airplane
      mode, and enabling tethering and portable wifi hotspots. It's quite
      possible I've missed something, and if we experience problems, I
      can roll back this change.
      
      Bug: 9618347
      Change-Id: I23ff3eebcef629bc7baabcf6962f25f116c4a3c0
      dbd28d91
  2. May 15, 2013
  3. May 09, 2013
  4. May 02, 2013
  5. Apr 25, 2013
  6. Apr 24, 2013
  7. Apr 05, 2013
    • Geremy Condra's avatar
      Add the sysrq_file special file and give ADB write access. · bb2591e5
      Geremy Condra authored
      Change-Id: Ief2d412dddf4cefdf43a26538c4be060df4cc787
      bb2591e5
    • Geremy Condra's avatar
      Add downloaded file policy. · bfb26e7b
      Geremy Condra authored
      Change-Id: I6f68323cddcf9e13b2a730b8d6b8730587fb4366
      bfb26e7b
    • Stephen Smalley's avatar
      run-as policy fixes. · 74ba8c86
      Stephen Smalley authored
      - Remove dac_read_search as it is no longer required by run-as.
      - Introduce a separate type for /dev/tty so that we can allow use of own tty for
      for a run-as shell without allowing access to other /dev/tty[0-9]* nodes.
      - Allow sigchld notifications for death of run-as and its descendants by adbd.
      - Drop redundant rules for executing shell or system commands from untrusted_app;
      now covered by rules in app.te.
      
      Change-Id: Ic3bf7bee9eeabf9ad4a20f61fbb142a64bb37c6c
      74ba8c86
    • Robert Craig's avatar
      Add new domains for private apps. · ffd8c441
      Robert Craig authored
      
      /data/app-private is used when making an
      app purchase or forward locking. Provide a
      new label for the directory as well as the
      tmp files that appear under it.
      
      Change-Id: I910cd1aa63538253e10a8d80268212ad9fc9fca5
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      ffd8c441
    • Stephen Smalley's avatar
      run-as policy fixes. · cd516a32
      Stephen Smalley authored
      - Remove dac_read_search as it is no longer required by run-as.
      - Introduce a separate type for /dev/tty so that we can allow use of own tty for
      for a run-as shell without allowing access to other /dev/tty[0-9]* nodes.
      - Allow sigchld notifications for death of run-as and its descendants by adbd.
      - Drop redundant rules for executing shell or system commands from untrusted_app;
      now covered by rules in app.te.
      
      Change-Id: Ic3bf7bee9eeabf9ad4a20f61fbb142a64bb37c6c
      cd516a32
  8. Apr 04, 2013
  9. Mar 29, 2013
  10. Mar 27, 2013
  11. Mar 26, 2013
  12. Mar 23, 2013
  13. Mar 22, 2013
  14. Mar 20, 2013
    • Colin Cross's avatar
      sepolicy: add /vendor to file_contexts · 46495241
      Colin Cross authored
      /vendor has the same permissions as /system/vendor for devices
      that have a separate vendor partition.
      
      Bug: 8341435
      Change-Id: If0c78b31f8a6e8e5680f1d076c323d1628fb07b2
      46495241
  15. Mar 19, 2013
    • rpcraig's avatar
      watchdog security policy. · bac9992e
      rpcraig authored
      
      Initial policy for software watchdog daemon
      which is started by init.
      
      Change-Id: I042a5b1698bf53ce2e50ea06851c374e5123ee2c
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      bac9992e
    • William Roberts's avatar
      Do not allow access to device:chr_file for system · 6a64897a
      William Roberts authored
      Also labels /dev/mpu and /dev/mpuirq as gps device.
      mpu is motion processing unit and is resposible for
      gyroscope functionality.
      
      Change-Id: If7f1a5752c550b72fac681566e1052f09e139ff0
      6a64897a
    • rpcraig's avatar
      App data backup security policy. · 1c8464e1
      rpcraig authored
      
      Policy covers:
      
       * backup_data_file type for labeling all
         files/dirs under /data dealing with
         backup mechanism.
      
       * cache_backup_file type for labeling all
         files/dirs under /cache dealing with
         backup mechanism. This also covers the
         the use of LocalTransport for local archive
         and restore testing.
      
       * the use of 'adb shell bmgr' to initiate
         backup mechanism from shell.
      
       * the use of 'adb backup/restore' to archive
         and restore the device's data.
      
      Change-Id: I700a92d8addb9bb91474bc07ca4bb71eb4fc840e
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      1c8464e1
  16. Jan 11, 2013
    • Stephen Smalley's avatar
      Fix invalid specification for adb_keys. · 58b0fb6d
      Stephen Smalley authored
      
      A prior change added an entry for adb_keys without any security context,
      yielding warnings like the following during build:
      out/target/product/manta/root/file_contexts:  line 7 is missing fields, skipping
      
      This adds the missing security context field.
      
      Change-Id: If48731c8aa7d22a3f547d0854f288ff68f9006da
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      58b0fb6d
  17. Dec 21, 2012
    • Colin Cross's avatar
      add file_contexts entries for root filesystem · 92b9aa0e
      Colin Cross authored
      It may be useful to generate an ext4 image of the root filesystem
      instead of using a ramdisk.  Whitelist entries in file_contexts to
      support selinux labeling a root filesystem image.
      
      Change-Id: I91a38d0aee4408c46cbfe5dc5e6eda198572e90f
      92b9aa0e
  18. Nov 27, 2012
    • Stephen Smalley's avatar
      Add policy for run-as program. · e8848726
      Stephen Smalley authored
      
      Add policy for run-as program and label it in file_contexts.
      Drop MLS constraints on local socket checks other than create/relabel
      as this interferes with connections with services, in particular for
      adb forward.
      
      Change-Id: Ib0c4abeb7cbef559e150a620c45a7c31e0531114
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      e8848726
  19. Nov 19, 2012
    • Stephen Smalley's avatar
      Update policy for Android 4.2 / latest master. · 61c80d5e
      Stephen Smalley authored
      
      Update policy for Android 4.2 / latest master.
      Primarily this consists of changes around the bluetooth subsystem.
      The zygote also needs further permissions to set up /storage/emulated.
      adbd service now gets a socket under /dev/socket.
      keystore uses the binder.
      
      Change-Id: I8c5aeb8d100313c75169734a0fa614aa974b3bfc
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      61c80d5e
  20. Oct 22, 2012
  21. Oct 17, 2012
  22. Sep 26, 2012
Loading