- Aug 29, 2014
-
-
Brian Carlstrom authored
Bug: 16875245 Change-Id: I2487a80896a4a923fb1fa606f537df9f6ad4220a
-
- Aug 27, 2014
-
-
dcashman authored
-
dcashman authored
Also enable global reading of kernel policy file. Motivation for this is to allow read access to the kernel version of the binary selinux policy. Bug: 17288791 Change-Id: I1eefb457cea1164a8aa9eeb7683b3d99ee56ca99
-
Nick Kralevich authored
The kernel, when it creates a loop block device, starts a new kernel thread "loop0" (drivers/block/loop.c). This kernel thread, which performs writes on behalf of other processes, needs read/write privileges to the sdcard. Allow it. Steps to reproduce: 0) Get device with external, removable sdcard 1) Run: "adb install -s foo.apk" Expected: APK installs successfully. Actual: APK fails to install. Error message: Vold E Failed to write superblock (I/O error) loop0 W type=1400 audit(0.0:3123): avc: denied { read } for path="/mnt/secure/asec/smdl1645334795.tmp.asec" dev="mmcblk1p1" ino=528 scontext=u:r:kernel:s0 tcontext=u:object_r:vfat:s0 tclass=file permissive=0 PackageHelper E Failed to create secure container smdl1645334795.tmp DefContainer E Failed to create container smdl1645334795.tmp Bug: 17158723 (cherry picked from commit 4c6b1350) Change-Id: Iea727ac7958fc31d85a037ac79badbe9c85693bd
-
dcashman authored
Address: type=1400 audit(0.0:103): avc: denied { read } for name="arm" dev="mmcblk0p28" ino=195471 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:apk_data_file:s0 tclass=dir Bug: 16204150 Change-Id: I8bf0172b26b780c110c0d95c691785143acd7dd2
-
- Aug 19, 2014
-
-
dcashman authored
Addresses the following denial when debuggerd attempts to stat Webview mmap'd shared relro files on process crash. Full read permissions may not be necessary: W/debuggerd( 185): type=1400 audit(0.0:97): avc: denied { search } for name="shared_relro" dev="mmcblk0p28" ino=618955 scontext=u:r:debuggerd:s0 tcontext=u:object_r:shared_relro_file:s0 tclass=dir Bug: 17101854 Change-Id: I11eea85668ba033c554e5aab99b70a454fb75164
-
- Aug 15, 2014
-
-
Stephen Smalley authored
The boot-time restorecon_recursive("/sys") occurs while still in the kernel domain, but init.rc files may nonetheless perform restorecon_recursive of parts of /sys created later and therefore require this permission. Required for: https://android-review.googlesource.com/#/c/101800/ Change-Id: I68dc2c6019a1f9deae3eec5c2f068365ce2372e5 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Aug 06, 2014
-
-
dcashman authored
-
- Aug 07, 2014
-
-
dcashman authored
Before actual installation, apks are put in a staging area where they are scanned by a verifier before completing the install flow. This verifier runs as a priv-app, which is in the untrusted_app domain. Allow untrusted_app read-access to these files. Bug: 16515815 Change-Id: Ifedc12a33b1f53b62f45013e7b253dbc79b02a4e
-
- Aug 06, 2014
-
-
Alex Light authored
Add patchoat selinux rules. Bug: 15358152 (cherry picked from commit fbc8ec2e) Change-Id: Ic84a370548393be62db740092e8393b662bcf345
-
- Jul 30, 2014
-
-
Stephen Smalley authored
Fix two neverallow rules that yield Invalid SELinux context warnings from the CTS SELinuxTest. For transitions from app domains, we only need to check { domain -appdomain } (i.e. domains other than app domains), not ~appdomain (i.e. all types other than app domains). Otherwise SELinuxTest tries to generate contexts with the r role and non-domain types for testing since the target class is process, and such contexts are invalid. For keeping file_type and fs_type exclusive, we only need to check associate permission, not all filesystem permissions, as only associate takes a file type as the source context. Otherwise SELinuxTest tries to generate contexts with the r role and non-domain types for testing filesystem permissions other than associate, since the source of such checks is normally a process context. Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov> (cherry picked from commit 21ada26d) Change-Id: I3346584da9b89f352864dcc30dde06d6bf42e98e
-
- Jul 29, 2014
-
-
Ye Wen authored
b/16324360 Change-Id: I4adacdb1d87badfaa109da200aae91869b9786a8
-
- Jul 28, 2014
-
-
Sreeram Ramachandran authored
This is needed for http://ag/512212 to work. Bug: 15409819 Change-Id: If91fc6891d7ce04060362c6cde8c57462394c4e8
-
Vinit Deshpande authored
Looks like system server doesn't let you start a service without white listing anymore. Bug: 16628456 Change-Id: I0f6df8fd2afa24f4a1758a90cb5f8e451e0edb6a
-
- Jul 25, 2014
-
-
Narayan Kamath authored
This reverts commit 10370f5f. The underlying issue has been fixed and the system_server will now go via installd to get stuff compiled, if required. bug: 16317188 Change-Id: I77a07748a39341f7082fb9fc9792c4139c90516d
-
Nick Kralevich authored
As described in the system/core commit with the same Change-Id, there's a race condition between installd and sdcard when it comes to accessing /data/media. Resolve the race by checking /data/.layout_version to make sure the filesystem has been upgraded. Maybe indirectly fixes the following SELinux denial: sdcard : type=1400 audit(0.0:3): avc: denied { write } for name="media" dev="mmcblk0p17" ino=102753 scontext=u:r:sdcardd:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir Bug: 16329437 Change-Id: I5e164f08009c1036469f8734ec07cbae9c5e262b
-
- Jul 24, 2014
-
-
Christopher Ferris authored
Change-Id: Iad32cfb4d5b69176fc551b8339d84956415a4fe7
-
- Jul 22, 2014
- Jul 18, 2014
-
-
Ye Wen authored
-
- Jul 21, 2014
-
-
Ye Wen authored
b/16324360 Change-Id: If79f293a547deef570a80a5569ff8eb973ce29be
-
Stephen Smalley authored
Augment the already existing neverallow on loading executable content from file types other than /system with one on loading executable content from filesystem types other than the rootfs. Include exceptions for appdomain and recovery as required by current policy. Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov> (cherry picked from commit 4644ac48) Change-Id: I5e2609a128d1bf982a7a5c3fa3140d1e9346c621
-
Colin Cross authored
Addresses the denial in charger mode: [ 17.993733] type=1400 audit(1405412231.119:4): avc: denied { search } for pid=123 comm="charger" name="/" dev="pstore" ino=10287 scontext=u:r:healthd:s0 tcontext=u:object_r:pstorefs:s0 tclass=dir permissive=0 (cherry picked from commit bb96bffc) Change-Id: I2dde6adc3ff99df99409d4da3ef32c3987228801
-
- Jul 18, 2014
-
-
Riley Spahn authored
Remove the audit_allow rules from lmp-dev because we will not be tightening any further so these logs will not be useful. Change-Id: Ibd0e4bf4e8f4f5438c3dbb9114addaadac9ef8c9
-
Riley Spahn authored
Further refined auditallow statements associated with service_manager and added dumpstate to the service_manager_local_audit_domain. (cherry picked from commit 603bc205) Change-Id: Ib8894aa70aa300c14182a6c934dd56c08c82b05f
-
- Jul 17, 2014
-
-
Riley Spahn authored
Add adbd as a service_manager_local_audit_domain and negate surfaceflinger_service in its auditallow. Negate keystore_service and radio_service in the system_app auditallow. (cherry picked from commit 88157ea3) Change-Id: I25354db2add3135335c80be2c2d350e526137572
-
Riley Spahn authored
Add com.android.net.IProxyService as a system_server_service to service_contexts. Bug: 16369427 (cherry picked from commit 26d6371c) Change-Id: I3e58681971683bdc7f26a1d130c8bcf8ffcb89e2
-
Nick Kralevich authored
https://android-review.googlesource.com/94851 added an LD_PRELOAD line to init.environ.rc.in. This has the effect of loading libsigchain.so into every process' memory space, regardless of whether it wants it or not. For lmkd, it doesn't need libsigchain, so it doesn't make any sense to load it and keep it locked in memory. Disable noatsecure for lmkd. This sets AT_SECURE=1, which instructs the linker to not honor security sensitive environment variables such as LD_PRELOAD. This prevents libsigchain.so from being loaded into lmkd's memory. (cherry picked from commit 8a5b28d2) Change-Id: I39baaf62058986d35ad43de708aaa3daf93b2df4
-
Michael Wright authored
-
- Jul 16, 2014
-
-
Michael Wright authored
Change-Id: I66a88b5dafc295e6daa9f4c0225aa593c97fe187
-
Nick Kralevich authored
dex2oat fails when upgrading unlabeled asec containers. Steps to reproduce: 1) Install a forward locked app on Android 4.1 adb install -l foo.apk 2) Upgrade to tip-of-tree Addresses the following denial: <4>[ 379.886665] type=1400 audit(1405549869.210:4): avc: denied { read } for pid=2389 comm="dex2oat" path="/mnt/asec/jackpal.androidterm-1/pkg.apk" dev=dm-0 ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:unlabeled:s0 tclass=file (cherry picked from commit 270be6e8) Change-Id: I58dc6ebe61a5b5840434077a55f1afbeed602137
-
Nick Kralevich authored
addresses the following denial: type=1400 audit(1.871:3): avc: denied { ipc_lock } for pid=1406 comm="lmkd" capability=14 scontext=u:r:lmkd:s0 tcontext=u:r:lmkd:s0 tclass=capability Bug: 16236289 (cherry picked from commit 6a1405d7) Change-Id: I560f1e52eac9360d10d81fc8a9f60eba907a8466
-
Torne (Richard Coles) authored
Define the service context for "webviewupdate", a new service that will run in the system server. Bug: 13005501 Change-Id: I841437c59b362fda88d130be2f2871aef87d9231
-
Nick Kralevich authored
dex2oat can't access file descriptors associated with asec_apk_files. This breaks installing forward locked apps, and generates the following denial: type=1400 audit(0.0:18): avc: denied { read } for path="/mnt/asec/com.example.android.simplejni-1/pkg.apk" dev="dm-0" ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:asec_apk_file:s0 tclass=file Steps to reproduce: $ adb install -r -l SimpleJNI.apk Expected: app installs Actual: app fails to install. Bug: 16328233 (cherry picked from commit 5259c5e6) Change-Id: I1969b9ae8d2187f4860587f7ff42d16139657b5b
-
Riley Spahn authored
system_server auditallow statements were causing logspam and there is not a good way to negate services from specific devices so as a fix we are removing all system_server auditallows. These logs may not be useful anyway because I suspsect that system_server will probe for most all services anyway. (cherry picked from commit 5a25fbf7) Change-Id: Ibadf1ce5e66f279fc49fd8fa20dfc64c960dd57f
-
Riley Spahn authored
Change untrusted_app to not auditallow radio_service find requests to cut down on log spam. (cherry picked from commit af8d7ca9) Change-Id: Ibfcc1abe927b6114af5a3a82188bf9f1e009d7f7
-
Colin Cross authored
Addresses the following selinux denials: type=1400 audit(1405383429.107:22): avc: denied { remove_name } for pid=137 comm="lmkd" name="uid_10060" dev="cgroup" ino=18368 scontext=u:r:lmkd:s0 tcontext=u:object_r:cgroup:s0 tclass=dir permissive=0 type=1400 audit(1405383794.109:6): avc: denied { sys_nice } for pid=1619 comm="lmkd" capability=23 scontext=u:r:lmkd:s0 tcontext=u:r:lmkd:s0 tclass=capability permissive=0 (cherry picked from commit 53297318) Change-Id: I7b6e5a396bf345c4768defd7b39af2435631a35b
-
- Jul 15, 2014
-
-
Nick Kralevich authored
1) Remove explicit allow statements. Since su is in permmissive, there's no need to ever specify allow statements for su. 2) Remove unconfined_domain(su). Su is already permissive, so there's no need to join the unconfined domain, and it just makes getting rid of unconfined more difficult. 3) Put su into app_domain(). This addresses, in a roundabout sorta way, the following denial: type=1400 audit(0.0:4): avc: denied { setsched } for scontext=u:r:system_server:s0 tcontext=u:r:su:s0 tclass=process permissive=0 which comes up while testing media processes as root. We already put the shell user into this domain, so adding su to this domain ensures other processes can communicate consistently with su spawned processes. Bug: 16261280 Bug: 16298582 (cherry picked from commit 213bb45b) Change-Id: If9c3483184ecdf871efee394c0b696e30f61d15d
-
Riley Spahn authored
Add SELinux MAC for the service manager actions list and find. Add the list and find verbs to the service_manager class. Add policy requirements for service_manager to enforce policies to binder_use macro. (cherry picked from commit b8511e0d) Change-Id: I980d4a8acf6a0c6e99a3a7905961eb5564b1be15
-
Nick Kralevich authored
Addresses the following denial: W/system_server( 2697): type=1400 audit(0.0:9): avc: denied { execute } for name="dex2oat" dev="mmcblk0p31" ino=118 scontext=u:r:system_server:s0 tcontext=u:object_r:dex2oat_exec:s0 tclass=file permissive=0 Bug: 16317188 Change-Id: I168842b3e281efcb0632049632ed3817c2025e4d
-