aboutsummaryrefslogtreecommitdiffstats
path: root/file.te
Commit message (Collapse)AuthorAgeFilesLines
...
* Rename camera_calibration_file and audio_firmware_file.Stephen Smalley2013-11-121-2/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Use more general type names for the contents of /data/misc/camera and /data/misc/audio. These were the names used in our policy until 4.3 was released, at which point we switched to be consistent with AOSP. However, the Galaxy S4 4.2.2 image, Galaxy S4 4.3 image, and Galaxy Note 3 4.3 image all shipped with policies using _data_file names because they were based on our older policy. So we may as well switch AOSP to these names. Not sure if in fact these could be all coalesced to the new media_data_file type for /data/misc/media introduced by Ic374488f8b62bd4f8b3c90f30da0e8d1ed1a7343. Options to fix already existing devices, which would only apply to Nexus devices with 4.3 or 4.4 at this point: 1) Add restorecon_recursive /data/misc/audio /data/misc/camera to either the system/core init.rc or to the device-specific init.*.rc files. -or- 2) Add a typealias declaration in the policy to remap the old type names. to the new ones. Then existing types on persistent storage will be remapped internally to the new ones. -or- 3) Some sort of relabeld. Option #2 is implemented by this change. Change-Id: Id36203f5bb66b5200efc1205630b5b260ef97496 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Label /data/misc/media and allow mediaserver access to it.Stephen Smalley2013-11-071-0/+1
| | | | | | | | | | | | | | Otherwise we get denials like these on 4.4: type=1400 audit(1383590170.360:29): avc: denied { write } for pid=61 comm="mediaserver" name="media" dev="mtdblock1" ino=6416 scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir type=1400 audit(1383590170.360:29): avc: denied { add_name } for pid=61 comm="mediaserver" name="emulator.camera.hotplug.0" scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir type=1400 audit(1383590170.360:29): avc: denied { create } for pid=61 comm="mediaserver" name="emulator.camera.hotplug.0" scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=file type=1400 audit(1383590170.360:29): avc: denied { write open } for pid=61 comm="mediaserver" name="emulator.camera.hotplug.0" dev="mtdblock1" ino=6431 scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=file type=1400 audit(1383590255.100:231): avc: denied { write } for pid=832 comm="mediaserver" name="emulator.camera.hotplug.0" dev="mtdblock1" ino=6431 scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=file type=1400 audit(1383590255.100:231): avc: denied { open } for pid=832 comm="mediaserver" name="emulator.camera.hotplug.0" dev="mtdblock1" ino=6431 scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=file Change-Id: Ic374488f8b62bd4f8b3c90f30da0e8d1ed1a7343 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Move audio_firmware_file and /data/misc/audio entry to core sepolicy.Stephen Smalley2013-11-061-0/+1
| | | | | Change-Id: Ib8c96ab9e19d34e8e34a4c859528345763be4906 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* sysfs_devices_system_cpu should be a sysfs_typeNick Kralevich2013-10-231-2/+2
| | | | | | | | | | | | | | | | | | | | | Otherwise the following denials occur on mako: <5>[ 2.494246] type=1400 audit(1382544550.200:4): avc: denied { associate } for pid=1 comm="init" name="time_in_state" dev="sysfs" ino=17444 scontext=u:object_r:sy sfs_devices_system_cpu:s0 tcontext=u:object_r:sysfs:s0 tclass=filesystem <5>[ 2.494735] type=1400 audit(1382544550.200:5): avc: denied { associate } for pid=1 comm="init" name="total_trans" dev="sysfs" ino=17443 scontext=u:object_r:sysf s_devices_system_cpu:s0 tcontext=u:object_r:sysfs:s0 tclass=filesystem <5>[ 2.495162] type=1400 audit(1382544550.200:6): avc: denied { associate } for pid=1 comm="init" name="stats" dev="sysfs" ino=17442 scontext=u:object_r:sysfs_devi ces_system_cpu:s0 tcontext=u:object_r:sysfs:s0 tclass=filesystem <5>[ 2.495620] type=1400 audit(1382544550.200:7): avc: denied { associate } for pid=1 comm="init" name="scaling_governor" dev="sysfs" ino=17435 scontext=u:object_r :sysfs_devices_system_cpu:s0 tcontext=u:object_r:sysfs:s0 tclass=filesystem <5>[ 2.496047] type=1400 audit(1382544550.200:8): avc: denied { associate } for pid=1 comm="init" name="cpuinfo_transition_latency" dev="sysfs" ino=17429 scontext= u:object_r:sysfs_devices_system_cpu:s0 tcontext=u:object_r:sysfs:s0 tclass=filesystem <5>[ 2.496505] type=1400 audit(1382544550.200:9): avc: denied { associate } for pid=1 comm="init" name="scaling_available_frequencies" dev="sysfs" ino=17439 sconte xt=u:object_r:sysfs_devices_system_cpu:s0 tcontext=u:object_r:sysfs:s0 tclass=filesystem <5>[ 2.496963] type=1400 audit(1382544550.200:10): avc: denied { associate } for pid=1 comm="init" name="scaling_driver" dev="sysfs" ino=17436 scontext=u:object_r: sysfs_devices_system_cpu:s0 tcontext=u:object_r:sysfs:s0 tclass=filesystem Change-Id: I584a1cf61cb871a38be4d3b308cef03e64cfda8e
* Introduce controls on wake lock interfaceWilliam Roberts2013-10-031-0/+1
| | | | Change-Id: Ie0ee266e9e6facb2ab2abd652f68765239a41af1
* Label adb keys file and allow access to it.Stephen Smalley2013-10-011-0/+1
| | | | | | | | | | | | | | The /adb_keys entry will only take effect if a restorecon is applied by init.rc on a kernel that includes the rootfs labeling support, but does no harm otherwise. The /data/misc/adb labeling ensures correct labeling of the adb_keys file created if the device has ro.adb.secure=1 set. Allow adbd to read the file. Change-Id: I97b3d86a69681330bba549491a2fb39df6cf20ef Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Label and allow access to /data/system/ndebugsocket.Stephen Smalley2013-09-271-0/+1
| | | | | | | | | | Otherwise it defaults to the label of /data/system and cannot be distinguished from any other socket in that directory. Also adds allow rule required for pre-existing wpa_socket transition to function without unconfined_domain. Change-Id: I57179aa18786bd56d247f397347e546cca978e41 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Allow file types to be associated with the rootfs.Stephen Smalley2013-09-201-0/+1
| | | | | | | | This is now possible due to the kernel change to support setting security contexts on rootfs inodes. Change-Id: I2a9aac1508eceabb92c3ae8eb5c63a16b28dda6f Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Label /dev/socket/mdns with its own type.Stephen Smalley2013-09-191-0/+1
| | | | | | | | | | | Otherwise it gets left in the general device type, and we get denials such as: type=1400 msg=audit(1379617262.940:102): avc: denied { write } for pid=579 comm="mDnsConnector" name="mdns" dev="tmpfs" ino=3213 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=sock_file This of course only shows up if using a confined system_server. Change-Id: I2456dd7aa4d72e6fd15b55c251245186eb54a80a Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Remove dbusd policy; dbusd is no more.Stephen Smalley2013-09-131-1/+0
| | | | | Change-Id: I9652284bd34d07bd47e2e7df66fcbe5db185ab3f Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Remove bluetoothd policy; bluetoothd is no more.Stephen Smalley2013-09-131-1/+0
| | | | | Change-Id: I153b0aa8a747d6c79839d06fc04b3923eacfa213 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Stop breaking build by defining sysfs_devices_system_cpu.William Luh2013-04-251-0/+2
| | | | Change-Id: Ie96d573be971b2dcc3d60614794ba9ca13b31471
* Revert "Add the sysrq_file special file and give ADB write access."Nick Kralevich2013-04-251-2/+0
| | | | | | | This rule doesn't work, as /proc/sysrq-trigger isn't properly labeled. Revert this change for now. This reverts commit bb2591e56f0b88570e8bed0008b932bf7c51f533.
* Add the sysrq_file special file and give ADB write access.Geremy Condra2013-04-051-0/+2
| | | | Change-Id: Ief2d412dddf4cefdf43a26538c4be060df4cc787
* Add downloaded file policy.Geremy Condra2013-04-051-0/+2
| | | | Change-Id: I6f68323cddcf9e13b2a730b8d6b8730587fb4366
* Add new domains for private apps.Robert Craig2013-04-051-0/+3
| | | | | | | | | | /data/app-private is used when making an app purchase or forward locking. Provide a new label for the directory as well as the tmp files that appear under it. Change-Id: I910cd1aa63538253e10a8d80268212ad9fc9fca5 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
* Various policy updates.Robert Craig2013-03-271-0/+1
| | | | | | | | | | | | | Assortment of policy changes include: * Bluetooth domain to talk to init and procfs. * New device node domains. * Allow zygote to talk to its executable. * Update system domain access to new device node domains. * Create a post-process sepolicy with dontaudits removed. * Allow rild to use the tty device. Change-Id: Ibb96b590d0035b8f6d1606cd5e4393c174d10ffb Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
* racoon policy.Robert Craig2013-03-221-0/+1
| | | | | | | Initial policy for racoon (IKE key management). Signed-off-by: Robert Craig <rpcraig@tycho.ncsc.mil> Change-Id: If1e344f39ea914e42afbaa021b272ba1b7113479
* Split internal and external sdcardsWilliam Roberts2013-03-221-1/+2
| | | | | | | | | | | | | | | Two new types are introduced: sdcard_internal sdcard_external The existing type of sdcard, is dropped and a new attribute sdcard_type is introduced. The boolean app_sdcard_rw has also been changed to allow for controlling untrusted_app domain to use the internal and external sdcards. Change-Id: Ic7252a8e1703a43cb496413809d01cc6cacba8f5
* Move policy filesWilliam Roberts2013-03-221-1/+2
| | | | | | | | Update the file_contexts for the new location of the policy files, as well as update the policy for the management of these types. Change-Id: Idc475901ed437efb325807897e620904f4ff03e9
* App data backup security policy.rpcraig2013-03-191-0/+5
| | | | | | | | | | | | | | | | | | | | | | | Policy covers: * backup_data_file type for labeling all files/dirs under /data dealing with backup mechanism. * cache_backup_file type for labeling all files/dirs under /cache dealing with backup mechanism. This also covers the the use of LocalTransport for local archive and restore testing. * the use of 'adb shell bmgr' to initiate backup mechanism from shell. * the use of 'adb backup/restore' to archive and restore the device's data. Change-Id: I700a92d8addb9bb91474bc07ca4bb71eb4fc840e Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
* Add policy for run-as program.Stephen Smalley2012-11-271-1/+1
| | | | | | | | | | Add policy for run-as program and label it in file_contexts. Drop MLS constraints on local socket checks other than create/relabel as this interferes with connections with services, in particular for adb forward. Change-Id: Ib0c4abeb7cbef559e150a620c45a7c31e0531114 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Update policy for Android 4.2 / latest master.Stephen Smalley2012-11-191-0/+2
| | | | | | | | | | | Update policy for Android 4.2 / latest master. Primarily this consists of changes around the bluetooth subsystem. The zygote also needs further permissions to set up /storage/emulated. adbd service now gets a socket under /dev/socket. keystore uses the binder. Change-Id: I8c5aeb8d100313c75169734a0fa614aa974b3bfc Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Add SELinux policy for asec containers.rpcraig2012-10-221-1/+4
| | | | | | | | | | | Creates 2 new types: - asec_apk_file : files found under /mnt/asec when the asec images are mounted - asec_image_file : the actual encrypted apks under /data/app-asec Change-Id: I963472add1980ac068d3a6d36a24f27233022832 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
* Correct spelling mistakeWilliam Roberts2012-09-061-1/+1
| | | | Change-Id: If4deccfe740c8de6b88929a0d0439667c3ea340d
* New asec container labeling.rpcraig2012-07-301-0/+1
| | | | This patchset covers the /mnt/asec variety only.
* Only enforce per-app process and file isolation via SELinux for third party ↵Stephen Smalley2012-07-271-0/+1
| | | | | | | | | | | apps, not platform apps. Platform (any of the apps signed by build keys, i.e. platform|release|shared|media) apps expect to be able to share files with each other or with third party apps by passing open files or pathnames over Binder. Therefore, we switch to only enforcing the per-app process and file isolation via SELinux on third party apps, not platform apps. Make the platform app domains mlstrustedsubjects so that they can access any files created by third party apps. Introduce a new platform_app_data_file type for platform apps so that we can mark it as a mlstrustedobject and allow third party apps to read/write files created by the platform apps. Specify this new type for the platform app entries in seapp_contexts. Remove levelFromUid=true for the platform apps in seapp_contexts since we are no longer enforcing per-app separation among them.
* Target the denials/policies over qtaguid file and device: 1. Relabel ↵hqjiang2012-07-191-1/+1
| | | | | | | /proc/net/xt_qtaguid/ctrl from "qtaguid" to "qtaguid_proc"; 2. Label /dev/xt_qtaguid with "qtaguid_device"; 3. Allow mediaserver read/[write] to qtaguid_proc and qtaguid_device; 4. Allow media apps read/[write] to qtaguid_proc and qtaguid_device; 5. Allow system read/[write] to qtaguid_proc and qtaguid_device. Actually, some of policies related to qtaguid have been there already, but we refind existing ones and add new ones.
* allow camera calibrationhqjiang2012-07-191-0/+1
|
* Corrected denials for LocationManager when accessing gps over uart.hqjiang2012-07-121-0/+3
|
* Allow apps to write to /proc/net/xt_qtaguid/ctrl.Stephen Smalley2012-06-271-0/+1
|
* Make wallpaper_file a mlstrustedobject to permit writes from any app level.Stephen Smalley2012-06-271-1/+1
|
* Policy for hci_attach service.William Roberts2012-05-311-0/+5
|
* Allow apps to write to anr_data_file for /data/anr/traces.txt.Stephen Smalley2012-04-041-1/+1
|
* Integrate nfc_power and rild rules from tuna sepolicy by Bryan Hinton.Stephen Smalley2012-03-191-0/+1
|
* Introduce a separate wallpaper_file type for the wallpaper file.Stephen Smalley2012-03-191-0/+2
|
* Introduce a separate apk_tmp_file type for the vmdl.*\.tmp files.Stephen Smalley2012-03-191-1/+2
|
* Policy changes to support running the latest CTS.Stephen Smalley2012-03-071-0/+2
|
* SE Android policy.Stephen Smalley2012-01-041-0/+75