Skip to content
Snippets Groups Projects
  1. Oct 01, 2015
  2. Sep 29, 2015
  3. Sep 28, 2015
  4. Sep 22, 2015
    • dcashman's avatar
      Remove mediaserver sysfs write permissions. · 6c451da4
      dcashman authored
      Mediaserver no longer appears, and maybe never did, need write
      permission to sysfs files.
      commit: 1de9c492 added auditing to
      make sure this is the case, and such access has not been observed.
      Remove the permissions and the associated auditallow rule to further
      confine the mediaserver sandbox.
      
      Bug: 22827371
      Change-Id: I44ca1521b9791db027300aa84e54c074845aa735
      6c451da4
    • Jeff Vander Stoep's avatar
      Enforce no persistent logging on user builds · 483fd267
      Jeff Vander Stoep authored
      For userdebug and eng builds enforce that:
      
       - only logd and shell domains may access logd files
      
       - logd is only allowed to write to /data/misc/logd
      
      Change-Id: Ie909cf701fc57109257aa13bbf05236d1777669a
      483fd267
  5. Sep 18, 2015
  6. Sep 16, 2015
  7. Sep 15, 2015
  8. Sep 14, 2015
  9. Sep 09, 2015
    • Lorenzo Colitti's avatar
      Allow system_server to bind ping sockets. · c3712143
      Lorenzo Colitti authored
      This allows NetworkDiagnostics to send ping packets from specific
      source addresses in order to detect reachability problems on the
      reverse path.
      
      This addresses the following denial:
      
      [  209.744636] type=1400 audit(1441805730.510:14): avc: denied { node_bind } for pid=8347 comm="Thread-202" saddr=2400:xxxx:xxxx:xxxx:40b1:7e:a1d7:b3ae scontext=u:r:system_server:s0 tcontext=u:object_r:node:s0 tclass=rawip_socket permissive=0
      
      Bug: 23661687
      Change-Id: Ia93c14bc7fec17e2622e1b48bfbf591029d84be2
      c3712143
  10. Sep 04, 2015
  11. Sep 02, 2015
  12. Sep 01, 2015
    • Jeff Vander Stoep's avatar
      system_server.te: remove policy load permissions · 0243e5cf
      Jeff Vander Stoep authored
      Remove system server's permission to dynamically update SELinux
      policy on the device.
      
      1) This functionality has never been used, so we have no idea if
      it works or not.
      
      2) If system_server is compromised, this functionality allows a
      complete bypass of the SELinux policy on the device. In particular,
      an attacker can force a regression of the following patch
        * https://android-review.googlesource.com/138510
      see also https://code.google.com/p/android/issues/detail?id=181826
      
      3) Dynamic policy update can be used to bypass neverallow protections
      enforced in CTS, by pushing a policy to the device after certification.
      Such an updated policy could bring the device out of compliance or
      deliberately introduce security weaknesses.
      
      Bug: 22885422
      Bug: 8949824
      Change-Id: I3c64d64359060561102e1587531836b69cfeef00
      0243e5cf
    • Daniel Micay's avatar
      auditallow gpu_device execute access · 73bdbd98
      Daniel Micay authored
      This permission appears to be unnecessary on some (most?) devices such
      as the Nexus 5. It should be moved to the device policy if it's truly
      required by the driver.
      
      Change-Id: I531dc82ba9030b805db2b596e145be2afb324492
      73bdbd98
    • Robert Craig's avatar
      Drop the default stanza from mac_permissions.xml · 008d7f14
      Robert Craig authored
      
      All non matching apps will simply receive the seinfo
      label of "default" implicitly. No need to further
      clarify things anymore with an explicit default stanza.
      
      Change-Id: Ib7b01ee004775f24db9a69340a31784b967ce030
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      008d7f14
  13. Aug 28, 2015
    • Nick Kralevich's avatar
      install_recovery: drop toolbox auditallow · 2cc94205
      Nick Kralevich authored
      Toolbox is definitely used from install_recovery. Addresses
      the following denials:
      
        type=1400 audit(0.0:7): avc: granted { execute } for comm="install-recover" name="toolbox" dev="mmcblk0p41" ino=463 scontext=u:r:install_recovery:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        type=1400 audit(0.0:6): avc: granted { getattr } for comm="install-recover" path="/system/bin/toolbox" dev="mmcblk0p41" ino=463 scontext=u:r:install_recovery:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        type=1400 audit(0.0:13): avc: granted { read } for comm="log" path="/system/bin/toolbox" dev="mmcblk0p41" ino=463 scontext=u:r:install_recovery:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        type=1400 audit(0.0:9): avc: granted { read open } for comm="install-recover" path="/system/bin/toolbox" dev="mmcblk0p41" ino=463 scontext=u:r:install_recovery:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
      
      Change-Id: I51d6e474f34afe1f33ea8294a344aa71e41deead
      2cc94205
  14. Aug 27, 2015
    • Samuel Tan's avatar
      sepolicy: Apply dhcpcd sepolicy to dhcpcd-6.8.2 · 72388335
      Samuel Tan authored
      Apply the same sepolicy used on dhcpcd to dhcpcd-6.8.2,
      which is have it run with the dhcp context, and have its
      data files possess the dhcp_data_file context.
      
      BUG: 22956197
      Change-Id: I7915b694038bb309d93691ef5d4d293593ef3b5e
      72388335
  15. Aug 25, 2015
  16. Aug 24, 2015
  17. Aug 22, 2015
  18. Aug 15, 2015
    • Nick Kralevich's avatar
      allow domain adbd:unix_stream_socket ioctl; · f4d39ca1
      Nick Kralevich authored
      https://android-review.googlesource.com/166419 changed the handling
      of non-interactive adb shells to use a socket instead of a PTY.
      When the stdin/stdout/stderr socket is received by /system/bin/sh,
      the code runs isatty() (ioctl TCGETS) to determine how to handle the
      file descriptor. This is denied by SELinux.
      
      Allow it for all domains.
      
      Addresses the following denial:
      
        avc: denied { ioctl } for pid=4394 comm="sh" path="socket:[87326]" dev="sockfs" ino=87326 ioctlcmd=5401 scontext=u:r:shell:s0 tcontext=u:r:adbd:s0 tclass=unix_stream_socket permissive=0
      
      TODO: When kernels are publicly available which support SELinux ioctl
      filtering, limit this just to ioctl 5401 (TCGETS) instead of all ioctls.
      
      Bug: 21215503
      Change-Id: I5c9394f27b8f198d96df14eac4b0c46ecb9b0898
      f4d39ca1
  19. Aug 14, 2015
    • Nick Kralevich's avatar
      mediaserver: remove /system/bin/toolbox exec access · bf65c7ef
      Nick Kralevich authored
      In Android 5.1, mediaserver couldn't execute any file on
      /system. This slightly regressed due to
      8a0c25ef, which granted mediaserver
      access to execute /system/bin/toolbox and /system/bin/toybox
      
      Revoke that unneeded access and add a neverallow rule to prevent
      regressions.
      
      TODO: Remove toolbox_exec:file execute permissions from domain.te
      and add it back to the specific domains that need it.
      
      Change-Id: Ia7bc6028a9ffb723d4623d91cbe15c8c1bbb2eb9
      bf65c7ef
  20. Aug 13, 2015
  21. Aug 12, 2015
Loading