Skip to content
Snippets Groups Projects
  1. Mar 11, 2015
    • Nick Kralevich's avatar
      system_server: neverallow blk_file read/write · acc0842c
      Nick Kralevich authored
      With the exception of the factory reset protection block device,
      don't allow system_server to read or write to any other block
      devices. This helps protect against a system->root escalation
      when system_server has the ability to directly minipulate raw
      block devices / partitions / partition tables.
      
      This change adds a neverallow rule, which is a compile time
      assertion that no SELinux policy is written which allows this
      access. No new rules are added or removed.
      
      Change-Id: I388408423097ef7cf4950197b79d4be9d666362c
      acc0842c
  2. Nov 05, 2014
    • Nick Kralevich's avatar
      recovery.te: add /data neverallow rules · a17a266e
      Nick Kralevich authored
      Recovery should never be accessing files from /data.
      In particular, /data may be encrypted, and the files within
      /data will be inaccessible to recovery, because recovery doesn't
      know the decryption key.
      
      Enforce write/execute restrictions on recovery. We can't tighten
      it up further because domain.te contains some /data read-only
      access rules, which shouldn't apply to recovery but do.
      
      Create neverallow_macros, used for storing permission macros
      useful for neverallow rules. Standardize recovery.te and
      property_data_file on the new macros.
      
      Change-Id: I02346ab924fe2fdb2edc7659cb68c4f8dffa1e88
      a17a266e
Loading