Skip to content
Snippets Groups Projects
  1. Oct 03, 2013
  2. Oct 01, 2013
    • Stephen Smalley's avatar
      Label adb keys file and allow access to it. · 55540755
      Stephen Smalley authored
      
      The /adb_keys entry will only take effect if a restorecon is
      applied by init.rc on a kernel that includes the rootfs labeling
      support, but does no harm otherwise.
      
      The /data/misc/adb labeling ensures correct labeling of the adb_keys
      file created if the device has ro.adb.secure=1 set.
      
      Allow adbd to read the file.
      
      Change-Id: I97b3d86a69681330bba549491a2fb39df6cf20ef
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      55540755
  3. Sep 30, 2013
    • Stephen Smalley's avatar
      Restore netdomain allow rules. · ca0759b1
      Stephen Smalley authored
      
      Change I4be1c987a5d69ac784a56d42fc2c9063c402de11 removed all
      netdomain allow rules at the same time domains were made unconfined.
      Prior to that change, any domain that used the net_domain() macro
      would be granted permissions required to use the network via these rules.
      The change made the netdomain attribute unused in any rules, thereby
      rendering the net_domain() calls pointless and requiring the allow
      rules to be duplicated for any domain requiring network access. There
      are two ways to resolve this inconsistency:
      1.  Restore the netdomain rules as in this change.  In that case,
      some rules in app.te can be removed as they are redundant with these rules.
      -or-
      2.  Completely remove the netdomain attribute, the net_domain() macro,
      and all calls to it.  In that case, each domain that requires network
      access will need to duplicate these rules or the necessary subset in order
      to function.
      
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      
      Change-Id: Ia54f0cd0bbda5c510423b1046626bd50f79ed7b6
      ca0759b1
    • Stephen Smalley's avatar
      Except the shell domain from the transition neverallow rule. · 57085446
      Stephen Smalley authored
      
      Shell domain can transition to other domains for runas, ping, etc.
      
      Change-Id: If9aabb4f51346dc00a89d03efea25499505f278d
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      57085446
  4. Sep 28, 2013
  5. Sep 27, 2013
  6. Sep 26, 2013
  7. Sep 23, 2013
  8. Sep 20, 2013
  9. Sep 19, 2013
    • Stephen Smalley's avatar
      Label /dev/socket/mdns with its own type. · 4caf8c99
      Stephen Smalley authored
      
      Otherwise it gets left in the general device type, and we get denials such
      as:
      type=1400 msg=audit(1379617262.940:102): avc:  denied  { write } for  pid=579 comm="mDnsConnector" name="mdns" dev="tmpfs" ino=3213 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=sock_file
      
      This of course only shows up if using a confined system_server.
      
      Change-Id: I2456dd7aa4d72e6fd15b55c251245186eb54a80a
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      4caf8c99
  10. Sep 18, 2013
  11. Sep 17, 2013
    • Alex Klyubin's avatar
      2/2: Rename domain "system" to "system_server". · 4103b3f2
      Alex Klyubin authored
      This CL completes the renaming of domain system to system_server by
      removing the "system" typealias that was temporarily added to avoid
      breaking the build while the rename CLs are landing.
      
      Change-Id: I05d11571f0e3d639026fcb9341c3476d44c54fca
      4103b3f2
    • Alex Klyubin's avatar
      1/2: Rename domain "system" to "system_server". · 1fdee11d
      Alex Klyubin authored
      This is a follow-up CL to the extraction of "system_app" domain
      from the "system" domain which left the "system" domain encompassing
      just the system_server.
      
      Since this change cannot be made atomically across different
      repositories, it temporarily adds a typealias "server" pointing to
      "system_server". Once all other repositories have been switched to
      "system_server", this alias will be removed.
      
      Change-Id: I90a6850603dcf60049963462c5572d36de62bc00
      1fdee11d
  12. Sep 13, 2013
  13. Sep 12, 2013
    • Stephen Smalley's avatar
      Extend to check indirect allow rules and conditional rules. · 640991bb
      Stephen Smalley authored
      
      $ sepolicy-check -s untrusted_app -t mediaserver -c binder -p call -P out/target/product/manta/root/sepolicy
      Match found!
      
      Also removed loading of initial SIDs as that is not required for
      this functionality and it leaks memory as it is never freed.
      valgrind now reports no leaks.
      
      Change-Id: Ic7a26fd01c57914e4e96db504d669f5367542a35
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      640991bb
    • Nick Kralevich's avatar
      Allow apps to execute app_data_files · a24a991d
      Nick Kralevich authored
      Fixes the following denial:
      
      <5>[28362.335293] type=1400 audit(1378991198.292:24): avc:  denied  { execute } for  pid=1640 comm="facebook.katana" path="/data/data/com.facebook.katana/app_libs/libfb_jpegturbo.so" dev="mmcblk0p23" ino=652556 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:app_data_file:s0 tclass=file
      
      Change-Id: I4a515610149f06f0c49194feb6bc96e9b3080c12
      a24a991d
  14. Sep 10, 2013
Loading