Commit Graph

9 Commits

Author SHA1 Message Date
followmsi 35a1e8206f flo: Update sepolicies 2020-11-26 20:51:48 +01:00
Jeff Vander Stoep 96b92e3361 deprecate domain_deprecated
Move device specific policy to a local device_domain_deprecated attribute
to focus effort on core policy.

Bug: 28760354
Change-Id: Id08cc74a3a2c7b8ff242b3c6f26bd514e6855a48
2017-09-20 20:56:38 +00:00
Jeff Vander Stoep 46ffda988c Grant all processes the domain_deprecated attribute
Bug: 25433265
Change-Id: I28965b310dd8a721662e02bd585985ab43ba57a3
2015-11-03 15:53:39 -08:00
Stephen Smalley 078640e521 Only allow toolbox exec where /system exec was already allowed.
When the toolbox domain was introduced, we allowed all domains to exec it
to avoid breakage.  However, only domains that were previously allowed the
ability to exec /system files would have been able to do this prior to the
introduction of the toolbox domain.  Remove the rule from domain.te and add
rules to all domains that are already allowed execute_no_trans to system_file.
Requires coordination with device-specific policy changes with the same Change-Id.

Change-Id: Ie46209f0412f9914857dc3d7c6b0917b7031aae5
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2015-08-25 11:47:23 -04:00
Nick Kralevich fd58583439 flo: updates for SELinux
* Move binaries from /system/etc to /system/bin. That's the proper
place for binaries, and avoids having to preface each service entry
with /system/bin/sh

* Drop seclabel statements and rely on automatic domain transitions.

* remove call to init.qcom.class_main.sh , which doesn't exist.
This gets rid of the following unnecessary errors:
  <3>[    5.286834] init: Warning!  Service qcom-c_main-sh needs a SELinux domain defined; please fix!
  <5>[    5.288970] type=1400 audit(1425327865.651:5): avc:  denied  { execute_no_trans } for  pid=191 comm="init" path="/system/bin/sh" dev="mmcblk0p22" ino=341 scontext=u:r:init:s0 tcontext=u:object_r:shell_exec:s0 tclass=file

Fix some other minor policy issues.

Change-Id: Ib47d49b6c239ab7a2ebe6159465deb98b4b8cecb
2015-04-01 15:20:41 -07:00
Robert Craig 1a5c4ac50a Make conn_init domain enforcing.
Change-Id: I52d22c9551e3608bf920d67c1debf15c505de4d2
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
2014-02-20 22:24:12 +00:00
Nick Kralevich 4088242582 Make conn_init an init_daemon_domain
Change-Id: Ief3c1167379cfb5383073fa33c9a95710a883b29
2014-01-24 20:31:42 -08:00
Nick Kralevich b35de50e3c Use permissive_or_unconfined.
please see external/sepolicy commit 623975fa5aece708032aaf29689d73e1f3a615e7
for details.

Change-Id: I23175a2982d7bdb962182b9b667d3767533b78d1
2014-01-13 15:49:07 -08:00
Robert Craig 9d6624a0b5 Add to selinux policy.
Bring policy over from the mako board which
has a lot of similar domains and services.
mako is also a Qualcomm board which allows
a lot of that policy to be directly brought
over and applied.

Included in this are some radio specific
pieces. Though not directly applicable to
flo, the deb board inherits this policy.

Change-Id: I6b294c7dc830189c08f1f981a239234a2c3f577f
2013-11-15 14:24:59 -05:00