- Jun 23, 2015
-
-
William Roberts authored
rule_map_free() took as a parameter a boolean menu rule_map_switch that was used to determine if it should free the key pointer that is also in the table. On GLIBC variants, calls to hdestroy do not free the key pointer, on NON-GLIBC variants, it does. The original patch was meant to correct this, however, it always passes "destroy" as the rule_map_switch. On GLIBC variants this is fine, however on NON-GLIBC variants, that free was compiled out, and the free() was handled by hdestroy. In cases of failure where the rule_map was not in the htable, those key's were not properly free'd. Change-Id: Ifdf616e09862bca642a4d31bf0cb266168170e50 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Jeff Vander Stoep authored
Change-Id: I2aef01ba72cae028d5e05deddbdeff674f9a534d
-
Daniel Cashman authored
-
Daniel Cashman authored
-
William Roberts authored
Change-Id: I00aa4eeaf569c8108a7b6aab190be68e53b46597 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Nick Kralevich authored
Allow vold, healthd, slideshow, and watchdogd access to /dev/kmsg. These processes log to the kernel dmesg ring buffer, so they need write access to that file. Addresses the following denials: avc: denied { write } for pid=134 comm="watchdogd" name="kmsg" dev="tmpfs" ino=9248 scontext=u:r:watchdogd:s0 tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0 avc: denied { write } for pid=166 comm="healthd" name="kmsg" dev="tmpfs" ino=9248 scontext=u:r:healthd:s0 tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0 avc: denied { write } for pid=180 comm="vold" name="kmsg" dev="tmpfs" ino=9248 scontext=u:r:vold:s0 tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0 These denials were triggered by the change in https://android-review.googlesource.com/151209 . Prior to that change, any code which called klog_init would (unnecessarily) create the device node themselves, rather than using the already existing device node. Drop special /dev/__null__ handling from watchdogd. As of https://android-review.googlesource.com/148288 , watchdogd no longer creates it's own /dev/null device, so it's unnecessary for us to allow for it. Drop mknod from healthd, slideshow, and watchdogd. healthd and slideshow only needed mknod to create /dev/__kmsg__, which is now obsolete. watchdogd only needed mknod to create /dev/__kmsg__ and /dev/__null__, which again is now obsolete. (cherry picked from e2651972) Bug: 21242418 Change-Id: If01c8001084575e7441253f0fa8b4179ae33f534
-
- Jun 19, 2015
-
-
Stephen Smalley authored
Run idmap in its own domain rather than leaving it in installd's domain. This prevents misuse of installd's permissions by idmap. zygote also needs to run idmap. For now, just run it in zygote's domain as it was previously since that is what is done for dex2oat invocation by zygote. zygote appears to run idmap with system uid while installd runs it with app UIDs, so using different domains seems appropriate. Remove system_file execute_no_trans from both installd and zygote; this should no longer be needed with explicit labels for dex2oat and idmap. Change-Id: If47e2c1326b84c20e94a20f5e699300dce12bdfe Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
William Roberts authored
When an error occured it was erroneously being indicated that he file was the output file, not the input file. Before: Error: Could not find selinux type "fake_app" on line: 51 in file: out/target/product/flo/obj/ETC/seapp_contexts_intermediates/seapp_contexts Error: Could not validate Error: reading out/target/product/flo/obj/ETC/seapp_contexts_intermediates/seapp_contexts.tmp, line 51, name levelFrom, value user After: Error: Could not find selinux type "fake_app" on line: 51 in file: out/target/product/flo/obj/ETC/seapp_contexts_intermediates/seapp_contexts.tmp Error: Could not validate Error: reading out/target/product/flo/obj/ETC/seapp_contexts_intermediates/seapp_contexts.tmp, line 51, name levelFrom, value user Change-Id: Ib0e01f1f0ef563a2a150a0a3b4012e6e15d736bb Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Jun 18, 2015
-
-
Stephen Smalley authored
To reduce the likelihood of malicious symlink attacks, neverallow read access to shell- and app-writable symlinks. Change-Id: I0dea1e6e4f0ce34531100696d230294e1b8a5500 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Jun 16, 2015
-
-
Nick Kralevich authored
-
Stephen Smalley authored
Prohibit all but a specific set of whitelisted domains from writing to /data/dalvik-cache. This is to prevent code injection into apps, zygote, or system_server. Inspired by: https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/ which depended on system UID apps having write access to /data/dalvik-cache (not allowed in AOSP policy but evidently in those device policies). Prevent this from recurring. Change-Id: I282c7bf998421d794883e432b091ad1dcf9da67e Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Erik Kline authored
clatd's environment may not have a sufficiently large memlock ulimit; it needs >=1MB but values much lower can be encountered. The mmap() is performed while clatd is still root, before dropping privileges; allow this to succeed. Bug: 21736319 Change-Id: I8171e077046566924c769e855144ae5fac634d4c
-
- Jun 15, 2015
-
-
Evgenii Stepanov authored
-
- Jun 13, 2015
-
-
Evgenii Stepanov authored
SANITIZE_TARGET adds shared libraries in /data/lib. Bug: 21785137 Change-Id: I8ac3d059d88d57d24ed762ffc6202a4ce5a42333
-
- Jun 12, 2015
-
-
William Roberts authored
If a duplicate entry is found, rule_map_cmp() incorrectly assumes that the lengths of the key value pairs should be equal, when this is not true. The duplicate detection is done on the input parameters, thus the lengths can be different. This resulted in a duplicate error string message of "do not match", instead of "match on all inputs". Also, the file name printed that contained the error was the output file, not the input file that contained it. Change-Id: I9b3f99fa4aa3454849de55f18b198b0b56e44320 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Jun 11, 2015
-
-
Than McIntosh authored
-
- Jun 10, 2015
-
-
Than McIntosh authored
Bug: http://b/19483574 Change-Id: Ie620011cb1d2c05fdfd4f2da375a57e47140b98f
-
dcashman authored
Point to external/selinux/libsepol instead of external/libsepol. Change-Id: I09c33a4cbd7b4cd3ef2341c042259b96c0b59372
-
Tao Bao authored
- Jun 09, 2015
-
-
Jeff Vander Stoep authored
Point to external/selinux/libsepol instead of external/libsepol Change-Id: If6dc1e9261f397d801ba2376ab60c5dc5b5d86e4
- Jun 08, 2015
-
-
dcashman authored
service_manager_local_audit_domain was used to fine tune the service_manager auditallow rules when introducing the service_manager SELinux rules. This is no longer needed. Bug: 21656807 Change-Id: Ia042a887e7bf9eb2a2b08b8d831e68dfe6395f75
-
- Jun 02, 2015
-
-
Mark Salyzyn authored
- Enable logpersistd to write to /data/misc/logd - Enable logpersistd to read from pstore to help complete any content lost by reboot disruption - Enable shell readonly ability logpersistd files in /data/misc/logd - Enable logcat -f when placed into logd context to act as a logpersistd (nee logcatd) agent, restrict access to run only in userdebug or eng Bug: 19608716 Change-Id: I3209582bc796a1093c325c90068a48bf268e5ab5
-
- May 28, 2015
-
-
dcashman authored
SystemPropPoker in settings app lists and communicates with every service on the system on property change, which is not currently allowed for all services. This occurs, for instance, when toggling Developer options -> Monitoring -> Profile GPU Rendering -> On scren as bars. Addresses the following denials: SELinux : avc: denied { find } for service=samplingprofiler scontext=u:r:system_app:s0 tcontext=u:object_r:samplingprofiler_service:s0 tclass=service_manager SELinux : avc: denied { find } for service=DockObserver scontext=u:r:system_app:s0 tcontext=u:object_r:DockObserver_service:s0 tclass=service_manager SELinux : avc: denied { find } for service=devicestoragemonitor scontext=u:r:system_app:s0 tcontext=u:object_r:devicestoragemonitor_service:s0 tclass=service_manager SELinux : avc: denied { find } for service=media.camera.proxy scontext=u:r:system_app:s0 tcontext=u:object_r:cameraproxy_service:s0 tclass=service_manager SELinux : avc: denied { find } for service=scheduling_policy scontext=u:r:system_app:s0 tcontext=u:object_r:scheduling_policy_service:s0 tclass=service_manager SELinux : avc: denied { find } for service=battery scontext=u:r:system_app:s0 tcontext=u:object_r:battery_service:s0 tclass=service_manager SELinux : avc: denied { find } for service=processinfo scontext=u:r:system_app:s0 tcontext=u:object_r:processinfo_service:s0 tclass=service_manager SELinux : avc: denied { find } for service=batteryproperties scontext=u:r:system_app:s0 tcontext=u:object_r:healthd_service:s0 tclass=service_manager SELinux : avc: denied { find } for service=drm.drmManager scontext=u:r:system_app:s0 tcontext=u:object_r:drmserver_service:s0 tclass=service_manager SELinux : avc: denied { find } for service=commontime_management scontext=u:r:system_app:s0 tcontext=u:object_r:commontime_management_service:s0 tclass=service_manager Bug: 20762975 Bug: 21446739 Change-Id: I92b7629077eb5aabffb72170f4ef71f574ebb95c
-
- May 26, 2015
-
-
Stephen Smalley authored
These are all userspace security class definitions that are unused in Android; they are only meaningful in Linux distributions. Change-Id: I99738752da996d9a1c7793eea049d937ffe4255b Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
Stephen Smalley authored
All uses were removed by I1c925d7facf19b3953b5deb85d992415344c4c9f; this is just a dead definition. Change-Id: Id6b08b624c9eea824f5a55d99b7a4ebf9c9f207e Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- May 22, 2015
-
-
Bill Yi authored
Change-Id: Ic5935f8a6ab55c1aa02a0e5753c3baf4b948eda7
-
- May 21, 2015
- May 18, 2015
-
-
dcashman authored
Grant access to system_server, as it is used by AlarmManagerService. Change-Id: I4f099fe30ba206db07d636dd454d43d3df9d3015
-
Nick Kralevich authored
-
- May 15, 2015
-
-
Jeffrey Vander Stoep authored
-
William Roberts authored
Change-Id: I45002cfd05e4e184bfc66039b3ae9a4af057adb1 Signed-off-by:
William Roberts <william.c.roberts@linux.intel.com>
-
- May 14, 2015
-
-
Chad Brubaker authored
Keystore is going through an API cleanup to make names more clear and remove unclear methods. Change-Id: I06354ccd0a9a73fd20168bfce9350c451cfaced3
-
William Roberts authored
Encourage the use of set_prop macro by making existing unix_socket_connect(domain, property, init) calls warn at compile time. When encountering one of these macros, m4 will emit a deprecated message as follows: m4: external/sepolicy/adbd.te: 97: deprecated: unix_socket_connect(adbd, property, init) Please use set_prop(adbd, <property name>) instead. Change-Id: I997fed75d2683933e08db8b9efeecea71523c7c3 Signed-off-by:
William Roberts <william.c.roberts@linux.intel.com>
-
Than McIntosh authored
-
Than McIntosh authored
Bug: http://b/19483574 Change-Id: Id39a5aaf531d2a75a22647bdafb34a6ef18201c8
-
William Roberts authored
Only a few daemons need transition to shell. Prevent misuse and over-privileging of shell domain. Change-Id: Ib1a5611e356d7a66c2e008232c565035e3fc4956 Signed-off-by:
William Roberts <william.c.roberts@linux.intel.com>
-