- Jul 29, 2015
-
-
Daniel Micay authored
The device-independent code only needs read access to sysfs, and this appears to be enough for at least some devices (Nexus 5). Bug: 22827371 Change-Id: I3b7b068e98f11f9133f0bdea8ece363e4bd89ae8
-
Daniel Rosenberg authored
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Bug: 18068520 Bug: 21852542 Change-Id: I876b37ac31dd44201ea1c1400a7c2c16c6a10049
-
- Jul 28, 2015
-
-
Jeffrey Vander Stoep authored
-
Jeffrey Vander Stoep authored
This reverts commit 2dabf174. Change-Id: I7e35a6ea1b8d5958c65eb04a7c9a04ba807b1181
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Bug: 18068520 Bug: 21852542 Change-Id: I080547c61cbaacb18e003a9b2366e2392a6521ff
-
Daniel Rosenberg authored
Change-Id: I9496af008aa3ad1bf33fb5911c8dd711af219440
-
- Jul 27, 2015
-
-
Daniel Rosenberg authored
Change-Id: I08aaf89e2ef23f9528d107a1c9d66c1c9979b3ac
-
- Jul 24, 2015
-
-
William Roberts authored
Allow device builders to pass arbitrary m4 definitions during the build via make variable BOARD_SEPOLICY_M4DEFS. This enables OEMs to define their own static policy build conditionals. Change-Id: Ibea1dbb7b8615576c5668e47f16ed0eedfa0b73c Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Jul 17, 2015
-
-
Colin Cross authored
Improve incremental ninja builds by keeping the command line the same across builds. Change-Id: Iedbaa40c9f816f91afc8f073a9ed7f9ffd5d9a53
-
- Jul 16, 2015
-
-
Nick Kralevich authored
-
William Roberts authored
Change-Id: Iae3edba40a94f78e78c0cc89a03e3f5a098d3909 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Jul 15, 2015
-
-
dcashman authored
Change-Id: I34db8855a55426f6a590a89cc6c157e1ccd50ff9
-
- Jul 14, 2015
-
-
Evgenii Stepanov authored
This is in addition to /data/lib. Only affects SANITIZE_TARGET=address builds. Bug: 21785137 Change-Id: Id1983cabb9479ae2d38fb23691de3eba236fe9cb
-
Nick Kralevich authored
Init never uses / add service manager services. It doesn't make sense to allow these rules to init. Adding a rule of this type is typically caused by a process inappropriately running in init's SELinux domain, and the warning message: Warning! Service %s needs a SELinux domain defined; please fix! is ignored. In addition, add neverallow rules to domain.te which prevent nonsense SELinux service_manager rules from being added. Change-Id: Id04a50d1826fe451a9ed216aa7ab249d0393cc57
-
- Jul 13, 2015
-
-
dcashman authored
-
dcashman authored
Domains have the ability to read normal tmpfs files but not symlinks. Grant this ability. In particular, allow domains to read /mnt/sdcard. Addresses the following denial: type=1400 audit(0.0:19):avc: denied { read } for comm=4173796E635461736B202333 name="sdcard" dev="tmpfs" ino=7475 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:tmpfs:s0 tclass=lnk_file permissive=0 Bug: 20755029 Change-Id: I0268eb00e0eb43feb2d5bca1723b87b7a44f31a9
-
dcashman authored
/proc/iomem is currently given the proc label but contains system information which should not be available to all processes. Bug: 22008387 Change-Id: I4f1821f40113a743ad986d13d8d130ed8b8abf2f
-
- Jul 10, 2015
-
-
William Roberts authored
Lowercase local variables and clear them to be consistent with other recipes and prevent polluting Make's global name space with set variables. Change-Id: If455cd4f33d5babbea985867a711e8a10c21a00f Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Jeff Vander Stoep authored
-
Jeff Vander Stoep authored
avc: denied { write } for pid=14742 comm="procrank" path="/data/data/com.android.shell/files/bugreports/bugreport-2015-07-02-22-17-43.txt.tmp" dev="dm-2" ino=44479 scontext=u:r:procrank:s0 tcontext=u:object_r:shell_data_file:s0 tclass=file permissive=0 Bug: 22400298 Change-Id: Ibf5dcf9f7edf416e977577afc32bbbef62e50974
-
- Jul 08, 2015
-
-
William Roberts authored
To help reduce code injection paths, a neverallow is placed to prevent domain, sans untrusted_app and shell, execute on data_file_type. A few data_file_type's are also exempt from this rule as they label files that should be executable. Additional constraints, on top of the above, are placed on domains system_server and zygote. They can only execute data_file_type's of type dalvikcache_data_file. Change-Id: I15dafbce80ba2c85a03c23128eae4725703d5f02 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Jul 07, 2015
-
-
William Roberts authored
Change-Id: I040904b69b98c49d60546f024f5ace5b7c6f7d5e Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Jun 30, 2015
-
-
William Roberts authored
Change-Id: Ie800ebf9d8e68680ec377e8c51f7cd7717f3c755 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Jun 29, 2015
-
-
William Roberts authored
Change-Id: Ibd22582deb24fde49cdb71b8754446f3948db36c Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
William Roberts authored
Produce a list of neverallow assertions from seapp_contexts into a separate file, general_seapp_context_neverallows, to be used during CTS neverallow checking. Change-Id: I171ed43cf4ae4961f66d5d8f56695345493f1261 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Jun 27, 2015
-
-
William Roberts authored
Change-Id: If944d8bd1e324f6500920ee3c5d44611ec7f8af9 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Jun 25, 2015
-
-
William Roberts authored
Introduce "neverallow" rules for seapp_contexts. A neverallow rule is similar to the existing key-value-pair entries but the line begins with "neverallow". A neverallow violation is detected when all keys, both inputs and outputs are matched. The neverallow rules value parameter (not the key) can contain regular expressions to assist in matching. Neverallow rules are never output to the generated seapp_contexts file. Also, unless -o is specified, checkseapp runs in silent mode and outputs nothing. Specifying - as an argument to -o outputs to stdout. Sample Output: Error: Rule in File "external/sepolicy/seapp_contexts" on line 87: "user=fake domain=system_app type=app_data_file" violates neverallow in File "external/sepolicy/seapp_contexts" on line 57: "user=((?!system).)* domain=system_app" Change-Id: Ia4dcbf02feb774f2e201bb0c5d4ce385274d8b8d Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Daniel Cashman authored
-
- Jun 23, 2015
-
-
William Roberts authored
rule_map_free() took as a parameter a boolean menu rule_map_switch that was used to determine if it should free the key pointer that is also in the table. On GLIBC variants, calls to hdestroy do not free the key pointer, on NON-GLIBC variants, it does. The original patch was meant to correct this, however, it always passes "destroy" as the rule_map_switch. On GLIBC variants this is fine, however on NON-GLIBC variants, that free was compiled out, and the free() was handled by hdestroy. In cases of failure where the rule_map was not in the htable, those key's were not properly free'd. Change-Id: Ifdf616e09862bca642a4d31bf0cb266168170e50 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Stephen Smalley authored
Despite removing these from AOSP policy they seem to still be present in device policies. Prohibit them via neverallow. We would also like to minimize execmem to only app domains and others using ART, but that will first require eliminating it from device-specific service domains (which may only have it due to prior incorrect handling of text relocations). Change-Id: Id1f49566779d9877835497d8ec7537abafadadc4 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Jeff Vander Stoep authored
Change-Id: I2aef01ba72cae028d5e05deddbdeff674f9a534d
-
Daniel Cashman authored
-
Daniel Cashman authored
-
William Roberts authored
Change-Id: I00aa4eeaf569c8108a7b6aab190be68e53b46597 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Nick Kralevich authored
Allow vold, healthd, slideshow, and watchdogd access to /dev/kmsg. These processes log to the kernel dmesg ring buffer, so they need write access to that file. Addresses the following denials: avc: denied { write } for pid=134 comm="watchdogd" name="kmsg" dev="tmpfs" ino=9248 scontext=u:r:watchdogd:s0 tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0 avc: denied { write } for pid=166 comm="healthd" name="kmsg" dev="tmpfs" ino=9248 scontext=u:r:healthd:s0 tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0 avc: denied { write } for pid=180 comm="vold" name="kmsg" dev="tmpfs" ino=9248 scontext=u:r:vold:s0 tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0 These denials were triggered by the change in https://android-review.googlesource.com/151209 . Prior to that change, any code which called klog_init would (unnecessarily) create the device node themselves, rather than using the already existing device node. Drop special /dev/__null__ handling from watchdogd. As of https://android-review.googlesource.com/148288 , watchdogd no longer creates it's own /dev/null device, so it's unnecessary for us to allow for it. Drop mknod from healthd, slideshow, and watchdogd. healthd and slideshow only needed mknod to create /dev/__kmsg__, which is now obsolete. watchdogd only needed mknod to create /dev/__kmsg__ and /dev/__null__, which again is now obsolete. (cherry picked from e2651972) Bug: 21242418 Change-Id: If01c8001084575e7441253f0fa8b4179ae33f534
-
- Jun 19, 2015
-
-
Stephen Smalley authored
Run idmap in its own domain rather than leaving it in installd's domain. This prevents misuse of installd's permissions by idmap. zygote also needs to run idmap. For now, just run it in zygote's domain as it was previously since that is what is done for dex2oat invocation by zygote. zygote appears to run idmap with system uid while installd runs it with app UIDs, so using different domains seems appropriate. Remove system_file execute_no_trans from both installd and zygote; this should no longer be needed with explicit labels for dex2oat and idmap. Change-Id: If47e2c1326b84c20e94a20f5e699300dce12bdfe Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
William Roberts authored
When an error occured it was erroneously being indicated that he file was the output file, not the input file. Before: Error: Could not find selinux type "fake_app" on line: 51 in file: out/target/product/flo/obj/ETC/seapp_contexts_intermediates/seapp_contexts Error: Could not validate Error: reading out/target/product/flo/obj/ETC/seapp_contexts_intermediates/seapp_contexts.tmp, line 51, name levelFrom, value user After: Error: Could not find selinux type "fake_app" on line: 51 in file: out/target/product/flo/obj/ETC/seapp_contexts_intermediates/seapp_contexts.tmp Error: Could not validate Error: reading out/target/product/flo/obj/ETC/seapp_contexts_intermediates/seapp_contexts.tmp, line 51, name levelFrom, value user Change-Id: Ib0e01f1f0ef563a2a150a0a3b4012e6e15d736bb Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-