Skip to content
Snippets Groups Projects
  1. Nov 08, 2013
  2. Oct 30, 2013
    • Nick Kralevich's avatar
      Move sysfs_devices_system_cpu to the central policy. · 967f39a6
      Nick Kralevich authored
      Every device has a CPU. This is not device specific.
      
      Allow every domain to read these files/directories.
      For unknown reasons, these files are accessed by A LOT
      of processes.
      
      Allow ueventd to write to these files. This addresses
      the following denials seen on mako:
      
      <5>[    4.935602] type=1400 audit(1383167737.512:4): avc:  denied  { read } for  pid=140 comm="ueventd" name="cpu0" dev="sysfs" ino=3163 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=dir
      <5>[    4.935785] type=1400 audit(1383167737.512:5): avc:  denied  { open } for  pid=140 comm="ueventd" name="cpu0" dev="sysfs" ino=3163 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=dir
      <5>[    4.935937] type=1400 audit(1383167737.512:6): avc:  denied  { search } for  pid=140 comm="ueventd" name="cpu0" dev="sysfs" ino=3163 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=dir
      <5>[    4.936120] type=1400 audit(1383167737.512:7): avc:  denied  { write } for  pid=140 comm="ueventd" name="uevent" dev="sysfs" ino=3164 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=file
      <5>[    4.936303] type=1400 audit(1383167737.512:8): avc:  denied  { open } for  pid=140 comm="ueventd" name="uevent" dev="sysfs" ino=3164 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=file
      
      Change-Id: I4766dc571762d8fae06aa8c26828c070b80f5936
      967f39a6
  3. Oct 08, 2013
    • William Roberts's avatar
      Start confining ueventd · 85c5fc21
      William Roberts authored
      * Keep ueventd in permissive
      * Drop unconfined macro to collect logs
      * Restore allow rules to current NSA maintained policy
      
      Change-Id: Ic4ee8e24ccd8887fed151ae1e4f197512849f57b
      85c5fc21
  4. May 20, 2013
    • repo sync's avatar
      Make all domains unconfined. · 77d4731e
      repo sync authored
      This prevents denials from being generated by the base policy.
      Over time, these rules will be incrementally tightened to improve
      security.
      
      Change-Id: I4be1c987a5d69ac784a56d42fc2c9063c402de11
      77d4731e
  5. May 15, 2013
  6. May 09, 2013
  7. Apr 05, 2013
  8. Apr 03, 2013
  9. Mar 23, 2013
    • rpcraig's avatar
      New dev_types and other minor adjustments. · 41e53901
      rpcraig authored
      
      Add new dev_type:
      - ump_device : Unified Memory Provider driver.
             The file_contexts entry should be
             described on a per device basis.
      
      Minor adjustments:
      - tee needs netlink socket access.
      - ueventd needs to grant file operations.
      
      Change-Id: I915304da687d3a2b9aa417e6f91ea915bd697676
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      41e53901
  10. Jun 07, 2012
  11. Mar 07, 2012
  12. Jan 12, 2012
  13. Jan 04, 2012
Loading