Skip to content
Snippets Groups Projects
  1. Jul 21, 2014
  2. Jul 17, 2014
  3. Jul 18, 2014
  4. Jul 17, 2014
    • Riley Spahn's avatar
      Refine service_manager find auditallow statements. · 88157ea3
      Riley Spahn authored
      Add adbd as a service_manager_local_audit_domain and negate
      surfaceflinger_service in its auditallow. Negate keystore_service
      and radio_service in the system_app auditallow.
      
      Change-Id: I05ea2a3e853b692f151182202f1b30786b44f1fb
      88157ea3
    • Riley Spahn's avatar
      Add com.android.net.IProxyService to service_contexts. · 26d6371c
      Riley Spahn authored
      Add com.android.net.IProxyService as a system_server_service
      to service_contexts.
      
      Bug: 16369427
      Change-Id: I29ac87babe393f2fe3ce91c2d5eba9673d5a1be3
      26d6371c
    • Nick Kralevich's avatar
      lmkd: avoid locking libsigchain into memory · 8a5b28d2
      Nick Kralevich authored
      https://android-review.googlesource.com/94851 added an LD_PRELOAD
      line to init.environ.rc.in. This has the effect of loading
      libsigchain.so into every process' memory space, regardless of
      whether it wants it or not.
      
      For lmkd, it doesn't need libsigchain, so it doesn't make any sense
      to load it and keep it locked in memory.
      
      Disable noatsecure for lmkd. This sets AT_SECURE=1, which instructs the
      linker to not honor security sensitive environment variables such
      as LD_PRELOAD. This prevents libsigchain.so from being loaded into
      lmkd's memory.
      
      Change-Id: I6378ba28ff3a1077747fe87c080e1f9f7ca8132e
      8a5b28d2
  5. Jul 16, 2014
  6. Jul 15, 2014
  7. Jul 16, 2014
    • Riley Spahn's avatar
      Remove auditallow from system_server. · 5a25fbf7
      Riley Spahn authored
      system_server auditallow statements were causing logspam and
      there is not a good way to negate services from specific devices
      so as a fix we are removing all system_server auditallows. These
      logs may not be useful anyway because I suspsect that system_server
      will probe for most all services anyway.
      
      Change-Id: I27a05761c14def3a86b0749cdb895190bdcf9d71
      5a25fbf7
    • Nick Kralevich's avatar
      dex2oat: fix forward locked apps · 5259c5e6
      Nick Kralevich authored
      dex2oat can't access file descriptors associated with asec_apk_files.
      This breaks installing forward locked apps, and generates the following
      denial:
      
        type=1400 audit(0.0:18): avc: denied { read } for path="/mnt/asec/com.example.android.simplejni-1/pkg.apk" dev="dm-0" ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:asec_apk_file:s0 tclass=file
      
      Steps to reproduce:
      
        $ adb install -r -l SimpleJNI.apk
      
      Expected:
      
        app installs
      
      Actual:
      
        app fails to install.
      
      Change-Id: I5a468508014e9963460d13d78e1c4867187322b3
      Bug: 16328233
      5259c5e6
  8. Jul 15, 2014
  9. Jul 14, 2014
    • Nick Kralevich's avatar
      Tweak rules for su domain. · 213bb45b
      Nick Kralevich authored
      1) Remove explicit allow statements. Since su is in permmissive,
      there's no need to ever specify allow statements for su.
      
      2) Remove unconfined_domain(su). Su is already permissive, so there's
      no need to join the unconfined domain, and it just makes getting
      rid of unconfined more difficult.
      
      3) Put su into app_domain(). This addresses, in a roundabout sorta
      way, the following denial:
      
        type=1400 audit(0.0:4): avc: denied { setsched } for scontext=u:r:system_server:s0 tcontext=u:r:su:s0 tclass=process permissive=0
      
      which comes up while testing media processes as root. We already put
      the shell user into this domain, so adding su to this domain ensures
      other processes can communicate consistently with su spawned processes.
      
      Bug: 16261280
      Bug: 16298582
      Change-Id: I30b6d3cc186bda737a23c25f4fa2a577c2afd4d7
      213bb45b
    • Nick Kralevich's avatar
      fix system_server dex2oat exec · 8395bb4a
      Nick Kralevich authored
      Addresses the following denial:
      
        W/system_server( 2697): type=1400 audit(0.0:9): avc: denied { execute } for name="dex2oat" dev="mmcblk0p31" ino=118 scontext=u:r:system_server:s0 tcontext=u:object_r:dex2oat_exec:s0 tclass=file permissive=0
      
      Change-Id: I168842b3e281efcb0632049632ed3817c2025e4d
      8395bb4a
    • Riley Spahn's avatar
      Add access control for each service_manager action. · b8511e0d
      Riley Spahn authored
      Add SELinux MAC for the service manager actions list
      and find. Add the list and find verbs to the
      service_manager class. Add policy requirements for
      service_manager to enforce policies to binder_use
      macro.
      
      Change-Id: I224b1c6a6e21e3cdeb23badfc35c82a37558f964
      b8511e0d
  10. Jul 10, 2014
  11. Jul 11, 2014
  12. Jul 10, 2014
  13. Jul 09, 2014
  14. Jul 10, 2014
    • Nick Kralevich's avatar
      allow ueventd sysfs_type lnk_file · 1d2ff869
      Nick Kralevich authored
      ueventd is allowed to change files and directories in /sys,
      but not symbolic links. This is, at a minimum, causing the
      following denial:
      
      type=1400 audit(0.0:5): avc: denied { getattr } for comm="ueventd" path="/sys/devices/tegradc.0/driver" dev=sysfs ino=3386 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_devices_tegradc:s0 tclass=lnk_file
      
      Allow ueventd to modify labeling / attributes of symlinks.
      
      Change-Id: If641a218e07ef479d1283f3171b2743f3956386d
      1d2ff869
    • Nick Kralevich's avatar
      Drop sys_rawio neverallow for tee · b59dc27a
      Nick Kralevich authored
      The new Nexus 5 tee implementation requires raw block I/O
      for anti-rollback protection.
      
      Bug: 15777869
      Change-Id: I57691a9d06b5a51e2699c240783ed56e3a003396
      b59dc27a
    • Nick Kralevich's avatar
      Don't use don't · f5835666
      Nick Kralevich authored
      Single quotes sometimes mess up m4 parsing
      
      Change-Id: Ic53cf0f9b45b2173cbea5c96048750f6a582a535
      f5835666
    • Nick Kralevich's avatar
      ensure that untrusted_app can't set properties · 99d86c7a
      Nick Kralevich authored
      Bug: 10243159
      Change-Id: I9409fe8898c446a33515f1bee2990f36a2e11535
      99d86c7a
    • Colin Cross's avatar
      sepolicy: allow system server to remove cgroups · 5d60f04e
      Colin Cross authored
      Bug: 15313911
      Change-Id: Ib7d39561a0d52632929d063a7ab97b6856f28ffe
      5d60f04e
  15. Jul 09, 2014
  16. Jul 08, 2014
    • Sreeram Ramachandran's avatar
      Allow dumpstate to read the list of routing tables. · d2d172a3
      Sreeram Ramachandran authored
      Change-Id: I55475c08c5e43bcf61af916210e680c47480ac32
      d2d172a3
    • Stephen Smalley's avatar
      Rename sdcard_internal/external types. · 374b2a19
      Stephen Smalley authored
      
      Rename sdcard_internal/external types to fuse and vfat
      respectively to make it clear that they are assigned to any
      fuse or vfat filesystem by default (absent a context= mount option)
      and do not necessarily represent the SDcard.
      
      The sdcard_type attribute is still assigned to both types and
      can still be used in allow rules to permit access to either the
      internal or external SDcard.
      
      Define type aliases for the old names to preserve compatibility
      on policy reload and for device-specific policies that may not yet
      be updated.
      
      Change-Id: I8d91a8c4c1342b94e4f1bb62ca7ffd2ca4b06ba1
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      374b2a19
    • Sreeram Ramachandran's avatar
      Allow netd to create data files in /data/misc/net/. · 65edb75d
      Sreeram Ramachandran authored
      This will be used to populate rt_tables (a mapping from routing table numbers to
      table names) that's read by the iproute2 utilities.
      
      Change-Id: I69deb1a64d5d6647470823405bf0cc55b24b22de
      65edb75d
Loading