History log of /external/sepolicy/tee.te
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
1601132086b054adc70e7f8f38ed24574c90bc37 24-Feb-2014 Stephen Smalley <sds@tycho.nsa.gov> Clean up socket rules.

Replace * or any permission set containing create with
create_socket_perms or create_stream_socket_perms.

Add net_domain() to all domains using network sockets and
delete rules already covered by domain.te or net.te.

For netlink_route_socket, only nlmsg_write needs to be separately
granted to specific domains that are permitted to modify the routing
table. Clarification: read/write permissions are just ability to
perform read/recv() or write/send() on the socket, whereas nlmsg_read/
nlmsg_write permissions control ability to observe or modify the
underlying kernel state accessed via the socket.
See security/selinux/nlmsgtab.c in the kernel for the mapping of
netlink message types to nlmsg_read or nlmsg_write.

Delete legacy rule for b/12061011.

This change does not touch any rules where only read/write were allowed
to a socket created by another domain (inherited across exec or
received across socket or binder IPC). We may wish to rewrite some or all
of those rules with the rw_socket_perms macro but that is a separate
change.

Change-Id: Ib0637ab86f6d388043eff928e5d96beb02e5450e
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/sepolicy/tee.te
549550760eca90119a1540e37c5ed4a4684dc88f 06-Dec-2013 Stephen Smalley <sds@tycho.nsa.gov> Make tee enforcing.

Change-Id: I5db2b0897aa43ccefad51b1b7fcfd0d643249384
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/sepolicy/tee.te
72a4745919f8eb2fae998450935ed1f1d0e3bb2a 29-Oct-2013 Stephen Smalley <sds@tycho.nsa.gov> Confine tee, but leave it permissive for now.

Change-Id: Id69b1fe80746429a550448b9168ac7e86c38aa9f
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/sepolicy/tee.te
353c72e3b0b4d7d729af20f0c9a13c976baa8753 21-Oct-2013 Nick Kralevich <nnk@google.com> Move unconfined domains out of permissive mode.

This change removes the permissive line from unconfined
domains. Unconfined domains can do (mostly) anything, so moving
these domains into enforcing should be a no-op.

The following domains were deliberately NOT changed:
1) kernel
2) init

In the future, this gives us the ability to tighten up the
rules in unconfined, and have those tightened rules actually
work.

When we're ready to tighten up the rules for these domains,
we can:

1) Remove unconfined_domain and re-add the permissive line.
2) Submit the domain in permissive but NOT unconfined.
3) Remove the permissive line
4) Wait a few days and submit the no-permissive change.

For instance, if we were ready to do this for adb, we'd identify
a list of possible rules which allow adbd to work, re-add
the permissive line, and then upload those changes to AOSP.
After sufficient testing, we'd then move adb to enforcing.
We'd repeat this for each domain until everything is enforcing
and out of unconfined.

Change-Id: If674190de3262969322fb2e93d9a0e734f8b9245
/external/sepolicy/tee.te
274d2927a7ccbfd266c83d6da5e9e2772805fbd5 22-May-2013 repo sync <gcondra@google.com> Clean up remaining denials.

Bug: 8424461
Change-Id: I8f0b01cdb19b4a479d5de842f4e4844aeab00622
/external/sepolicy/tee.te
77d4731e9d30c8971e076e2469d6957619019921 18-May-2013 repo sync <gcondra@google.com> Make all domains unconfined.

This prevents denials from being generated by the base policy.
Over time, these rules will be incrementally tightened to improve
security.

Change-Id: I4be1c987a5d69ac784a56d42fc2c9063c402de11
/external/sepolicy/tee.te
50e37b93ac97631dcac6961285b92af5026557af 15-May-2013 repo sync <gcondra@google.com> Move domains into per-domain permissive mode.

Bug: 4070557
Change-Id: I027f76cff6df90e9909711cb81fbd17db95233c1
/external/sepolicy/tee.te
41e539010df1fa58abf6b57959ea30a05ff80102 04-Dec-2012 rpcraig <rpcraig@tycho.ncsc.mil> New dev_types and other minor adjustments.

Add new dev_type:
- ump_device : Unified Memory Provider driver.
The file_contexts entry should be
described on a per device basis.

Minor adjustments:
- tee needs netlink socket access.
- ueventd needs to grant file operations.

Change-Id: I915304da687d3a2b9aa417e6f91ea915bd697676
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/external/sepolicy/tee.te
e07b8a56b9ce87733024797018543c7faf7e6aa2 13-Aug-2012 rpcraig <rpcraig@tycho.ncsc.mil> Trusted Execution Environment policy.
/external/sepolicy/tee.te