Skip to content
Snippets Groups Projects
  1. Oct 19, 2015
    • Jeffrey Vander Stoep's avatar
      1b52ad6b
    • Jeff Vander Stoep's avatar
      grant priv_app access to /dev/mtp_usb · bcbb32e7
      Jeff Vander Stoep authored
      android.process.media needs access to mtp_usb when MTP is enabled.
      
      Bug: 25074672
      Change-Id: Ic48a3ba8e4395104b0b957f7a9bad69f0e5ee38e
      bcbb32e7
    • Jeff Vander Stoep's avatar
      Remove untrusted_app access to tmp apk files · a910a287
      Jeff Vander Stoep authored
      Verifier has moved to the priv_app domain. Neverallow app domain
      access to tmp apk files with exceptions for platform and priv app
      domains.
      
      Change-Id: I68a2fa39ebc7dc0bfa278fe7d092655f21a5225d
      a910a287
    • Jeffrey Vander Stoep's avatar
      f1203bf0
    • Jeff Vander Stoep's avatar
      Policy for priv_app domain · 7f09a945
      Jeff Vander Stoep authored
      Verifier needs access to apk files.
      avc: denied { search } for pid=11905 comm="ackageinstaller" name="vmdl2040420713.tmp" dev="dm-2" ino=13647 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:apk_tmp_file:s0 tclass=dir permissive=0
      
      Give bluetooth_manager_service and trust_service the app_api_service
      attribute.
      avc:  denied  { find } for service=bluetooth_manager pid=7916 uid=10058 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:bluetooth_manager_service:s0 tclass=service_manager permissive=0
      avc:  denied  { find } for service=trust pid=25664 uid=10069 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=0
      
      Bug: 25066911
      Change-Id: I6be695546f8a951e3329c1ec412936b8637e5835
      7f09a945
  2. Oct 17, 2015
    • Jeff Vander Stoep's avatar
      Give services app_api_service attribute · 734e4d7c
      Jeff Vander Stoep authored
      avc:  denied  { find } for service=network_management pid=4503 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:network_management_service:s0 tclass=service_manager
      avc:  denied  { find } for service=netstats pid=4503 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=0
      
      Bug: 25022496
      Change-Id: Ib6eac76b680fed3eca7e4942c6b0e375f12b6496
      734e4d7c
  3. Oct 16, 2015
  4. Oct 15, 2015
  5. Oct 14, 2015
  6. Oct 13, 2015
    • Nick Kralevich's avatar
      Remove ptrace from app.te · de11f501
      Nick Kralevich authored
      Remove ptrace from app.te, and only add it to the app domains
      which explicitly require it.
      
      Change-Id: I327aabd154ae07ce90e3529dee2b324ca125dd16
      de11f501
  7. Oct 10, 2015
  8. Oct 08, 2015
    • Johan Redestig's avatar
      Allow bluetooth to find the drmservice · 32e5e31a
      Johan Redestig authored
      Address the following denial:
        SELinux  E  avc:  denied  { find } for service=drm.drmManager scontext=u:r:bluetooth:s0 tcontext=u:object_r:drmserver_service:s0
      
      This denial is triggered by Bluetooth when MmsFileProvider.java is
      using the PduPersister which in turn is using DRM.
      
      Change-Id: I4c077635f8afa39e6bc5e10178c3a7ae3cb6a9ea
      32e5e31a
  9. Oct 07, 2015
    • Nick Kralevich's avatar
      delete procrank SELinux domain. · 9e6effa1
      Nick Kralevich authored
      Simplify SELinux policy by deleting the procrank SELinux domain.
      procrank only exists on userdebug/eng builds, and anyone wanting
      to run procrank can just su to root.
      
      Bug: 18342188
      Change-Id: I71adc86a137c21f170d983e320ab55be79457c16
      9e6effa1
    • Jeff Vander Stoep's avatar
      Do not allow untrusted_app to open tun_device · de53051a
      Jeff Vander Stoep authored
      Third party vpn apps must receive open tun fd from the framework
      for device traffic.
      
      neverallow untrusted_app open perm and auditallow bluetooth
      access to see if the neverallow rule can be expanded to include
      all of appdomain.
      
      Bug: 24677682
      Change-Id: I68685587228a1044fe1e0f96d4dc08c2adbebe78
      de53051a
    • David Zeuthen's avatar
      Move update_engine policy to AOSP. · a10f789d
      David Zeuthen authored
      The update_engine daemon from Brillo is expected to be used also in
      Android so move its selinux policy to AOSP.
      
      Put update_engine in the whitelist (currently only has the recovery
      there) allowing it to bypass the notallow for writing to partititions
      labeled as system_block_device.
      
      Also introduce the misc_block_device dev_type as update_engine in some
      configurations may need to read/write the misc partition. Start
      migrating uncrypt to use this instead of overly broad
      block_device:blk_file access.
      
      Bug: 23186405
      Test: Manually tested with Brillo build.
      
      Change-Id: Icf8cdb4133d4bbdf14bacc6c0fa7418810ac307a
      a10f789d
  10. Oct 06, 2015
    • Nick Kralevich's avatar
      remove "allow vold block_device:blk_file create_file_perms;" · 7e86e19d
      Nick Kralevich authored
      vold hasn't use the generic "block_device" label since
      commit 273d7ea4 (Sept 2014), and
      the auditallow statement in vold hasn't triggered since that time.
      
      Remove the rule which allows vold access to the generic block_device
      label, and remove the vold exception.
      
      Thanks to jorgelo for reminding me about this.
      
      Change-Id: Idd6cdc20f5be9a40c5c8f6d43bbf902a475ba1c9
      7e86e19d
  11. Oct 03, 2015
  12. Oct 01, 2015
Loading