Commit Graph

10 Commits

Author SHA1 Message Date
followmsi 35a1e8206f flo: Update sepolicies 2020-11-26 20:51:48 +01:00
followmsi e9d3739c75 sepolicy: Pie (bring up) 2019-01-20 01:22:07 +01:00
Jeff Vander Stoep 165b4ae091 Enforce ioctl command whitelisting on all sockets
Remove the ioctl permission for most socket types. For others, such as
tcp/udp/rawip/unix_dgram/unix_stream set a default unprivileged whitelist
that individual domains may extend (except where neverallowed like
untrusted_app). Enforce via a neverallowxperm rule.

Change-Id: I7573fdb24f9c53ad169bce2aeab1baac8b2a11ea
2017-09-20 20:56:43 +00:00
Jeff Vander Stoep 96b92e3361 deprecate domain_deprecated
Move device specific policy to a local device_domain_deprecated attribute
to focus effort on core policy.

Bug: 28760354
Change-Id: Id08cc74a3a2c7b8ff242b3c6f26bd514e6855a48
2017-09-20 20:56:38 +00:00
Jeff Vander Stoep 46ffda988c Grant all processes the domain_deprecated attribute
Bug: 25433265
Change-Id: I28965b310dd8a721662e02bd585985ab43ba57a3
2015-11-03 15:53:39 -08:00
Stephen Smalley 5a2b02c069 Allow thermald dac_override.
Addresses denials such as:
avc: denied { dac_override } for comm="thermald" capability=1 scontext=u:r:thermald:s0 tcontext=u:r:thermald:s0 tclass=capability

Also add an auditallow rule to track this permission for further analysis.
We already allow this on hammerhead.

Change-Id: I02b15e9725f42d4c9d9f829982a5a00175160af2
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-06-11 10:35:42 -04:00
Stephen Smalley 33f9d6358e Allow thermald to connect to mpdecision.
Addresses denials such as:
 avc:  denied  { write } for  pid=1519 comm="thermal-engine-" name="mpdecision" dev="tmpfs" ino=8778 scontext=u:r:thermald:s0 tcontext=u:object_r:mpdecision_socket:s0 tclass=sock_file

Change-Id: Ib8d420fe04bb2e0bca3ad4d3849ec59e9de54a91
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-03-26 11:03:10 -04:00
Robert Craig ba571057fa Move SELinux diag_device policy to userdebug/eng.
Also just remove all specific domain access and instead
allow diag_device access for all domains on the
userdebug/user builds.

Change-Id: I2dc79eb47e05290902af2dfd61a361336ebc8bca
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
2014-02-20 20:20:53 -05:00
Robert Craig be1065dfbd Drop permissive constraint from thermald policy.
Change-Id: Ie4f658964a9e374dfbec38b57cc9f2db8940fcea
2013-11-25 08:41:23 -05:00
Robert Craig 9d6624a0b5 Add to selinux policy.
Bring policy over from the mako board which
has a lot of similar domains and services.
mako is also a Qualcomm board which allows
a lot of that policy to be directly brought
over and applied.

Included in this are some radio specific
pieces. Though not directly applicable to
flo, the deb board inherits this policy.

Change-Id: I6b294c7dc830189c08f1f981a239234a2c3f577f
2013-11-15 14:24:59 -05:00