- Jul 16, 2014
-
-
Colin Cross authored
Addresses the following selinux denials: type=1400 audit(1405383429.107:22): avc: denied { remove_name } for pid=137 comm="lmkd" name="uid_10060" dev="cgroup" ino=18368 scontext=u:r:lmkd:s0 tcontext=u:object_r:cgroup:s0 tclass=dir permissive=0 type=1400 audit(1405383794.109:6): avc: denied { sys_nice } for pid=1619 comm="lmkd" capability=23 scontext=u:r:lmkd:s0 tcontext=u:r:lmkd:s0 tclass=capability permissive=0 (cherry picked from commit 53297318) Change-Id: I7b6e5a396bf345c4768defd7b39af2435631a35b
-
- Jul 15, 2014
-
-
Nick Kralevich authored
1) Remove explicit allow statements. Since su is in permmissive, there's no need to ever specify allow statements for su. 2) Remove unconfined_domain(su). Su is already permissive, so there's no need to join the unconfined domain, and it just makes getting rid of unconfined more difficult. 3) Put su into app_domain(). This addresses, in a roundabout sorta way, the following denial: type=1400 audit(0.0:4): avc: denied { setsched } for scontext=u:r:system_server:s0 tcontext=u:r:su:s0 tclass=process permissive=0 which comes up while testing media processes as root. We already put the shell user into this domain, so adding su to this domain ensures other processes can communicate consistently with su spawned processes. Bug: 16261280 Bug: 16298582 (cherry picked from commit 213bb45b) Change-Id: If9c3483184ecdf871efee394c0b696e30f61d15d
-
Riley Spahn authored
Add SELinux MAC for the service manager actions list and find. Add the list and find verbs to the service_manager class. Add policy requirements for service_manager to enforce policies to binder_use macro. (cherry picked from commit b8511e0d) Change-Id: I980d4a8acf6a0c6e99a3a7905961eb5564b1be15
-
Nick Kralevich authored
Addresses the following denial: W/system_server( 2697): type=1400 audit(0.0:9): avc: denied { execute } for name="dex2oat" dev="mmcblk0p31" ino=118 scontext=u:r:system_server:s0 tcontext=u:object_r:dex2oat_exec:s0 tclass=file permissive=0 Bug: 16317188 Change-Id: I168842b3e281efcb0632049632ed3817c2025e4d
-
Ed Heyl authored
Change-Id: Ic9dde806a30d3e7b9c4a066f247a9207fe9b94b4
-
Ed Heyl authored
Change-Id: Ic8ee83ed6ffef02bddd17e1175416fc2481db7b2
-
Ed Heyl authored
Change-Id: I35be7a7df73325fba921b8a354659b2b2a3e06e7
-
Ed Heyl authored
Change-Id: Idcd252e39b2c4829201c93b6c99cf368adcb405e
-
- Jul 14, 2014
-
-
Nick Kralevich authored
Force any experimental SELinux domains (ones tagged with "permissive_or_unconfined") into unconfined. This flag is intended to be flipped when we're preparing a release, to eliminate inconsistencies between user and userdebug devices, and to ensure that we're enforcing a minimal set of rules for all SELinux domains. Without this change, our user builds will behave differently than userdebug builds, complicating testing. Change-Id: I52fd5fbe30a7f52f1143f176915ce55fb6a33f87
-
- Jul 11, 2014
-
-
Sreeram Ramachandran authored
* commit '2f91ce55':
-
Nick Kralevich authored
* commit '1c7463ac':
-
Nick Kralevich authored
* commit 'ddfaf822':
-
Jeff Sharkey authored
* commit '554a8a3d':
-
Sreeram Ramachandran authored
* commit 'e4409728': Allow netd to create data files in /data/misc/net/.
-
Nick Kralevich authored
* commit 'd27aeb21': recovery: allow read access to fuse filesystem
-
Nick Kralevich authored
* commit 'd86b0a81': New domain "install_recovery"
-
Jeff Sharkey authored
* commit 'e900e573': Rules to allow installing package directories.
-
- Jul 10, 2014
-
-
Doug Zongker authored
Support opening the ffs-based interface for adbd in recovery. (Copied from adbd.te.) Bug: 16183878 Change-Id: I714ccb34f60d1413d2b184dae9b561cd06bc6b45
-
Nick Kralevich authored
* commit 'a2933b66': install_recovery: start enforcing SELinux rules
-
Nick Kralevich authored
* commit '2b3c5de2': install_recovery: start enforcing SELinux rules
-
Nick Kralevich authored
* commit '5b347a60': allow ueventd sysfs_type lnk_file
-
Nick Kralevich authored
* commit '1d2ff869': allow ueventd sysfs_type lnk_file
-
Nick Kralevich authored
ueventd is allowed to change files and directories in /sys, but not symbolic links. This is, at a minimum, causing the following denial: type=1400 audit(0.0:5): avc: denied { getattr } for comm="ueventd" path="/sys/devices/tegradc.0/driver" dev=sysfs ino=3386 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_devices_tegradc:s0 tclass=lnk_file Allow ueventd to modify labeling / attributes of symlinks. Change-Id: If641a218e07ef479d1283f3171b2743f3956386d
-
Nick Kralevich authored
* commit '5b5ba50f': Drop sys_rawio neverallow for tee
-
Nick Kralevich authored
* commit 'b59dc27a': Drop sys_rawio neverallow for tee
-
Nick Kralevich authored
The new Nexus 5 tee implementation requires raw block I/O for anti-rollback protection. Bug: 15777869 Change-Id: I57691a9d06b5a51e2699c240783ed56e3a003396
-
Nick Kralevich authored
* commit '7e953e77': Don't use don't
-
Nick Kralevich authored
* commit 'f5835666': Don't use don't
-
Nick Kralevich authored
* commit 'f7cf7a4b': ensure that untrusted_app can't set properties
-
Nick Kralevich authored
* commit '99d86c7a': ensure that untrusted_app can't set properties
-
Nick Kralevich authored
Single quotes sometimes mess up m4 parsing Change-Id: Ic53cf0f9b45b2173cbea5c96048750f6a582a535
-
Nick Kralevich authored
Bug: 10243159 Change-Id: I9409fe8898c446a33515f1bee2990f36a2e11535
-
Colin Cross authored
* commit 'bfd4eac7': sepolicy: allow system server to remove cgroups
-
Andres Morales authored
* commit 'aaaeb02e': Typedef+rules for SysSer to access persistent block device
-
Jeff Sharkey authored
* commit '568443bc': Let DCS read staged APK clusters.
-
Colin Cross authored
* commit '5d60f04e': sepolicy: allow system server to remove cgroups
-
Andres Morales authored
* commit '2cd9c9bd': Typedef+rules for SysSer to access persistent block device
-
Jeff Sharkey authored
* commit 'd3356826': Let DCS read staged APK clusters.
-
Colin Cross authored
Bug: 15313911 Change-Id: Ib7d39561a0d52632929d063a7ab97b6856f28ffe
-
- Jul 09, 2014
-
-
Jeff Sharkey authored
DCS is DefaultContainerService. avc: denied { getattr } for path="/data/app/vmdl2.tmp" dev="mmcblk0p28" ino=162910 scontext=u:r:platform_app:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=dir Bug: 14975160 Change-Id: Ifca9afb4e74ebbfbeb8c01e1e9ea65f5b55e9375
-