Skip to content
Snippets Groups Projects
  1. Sep 29, 2015
  2. Sep 28, 2015
  3. Sep 22, 2015
    • dcashman's avatar
      Remove mediaserver sysfs write permissions. · 6c451da4
      dcashman authored
      Mediaserver no longer appears, and maybe never did, need write
      permission to sysfs files.
      commit: 1de9c492 added auditing to
      make sure this is the case, and such access has not been observed.
      Remove the permissions and the associated auditallow rule to further
      confine the mediaserver sandbox.
      
      Bug: 22827371
      Change-Id: I44ca1521b9791db027300aa84e54c074845aa735
      6c451da4
    • Jeff Vander Stoep's avatar
      Enforce no persistent logging on user builds · 483fd267
      Jeff Vander Stoep authored
      For userdebug and eng builds enforce that:
      
       - only logd and shell domains may access logd files
      
       - logd is only allowed to write to /data/misc/logd
      
      Change-Id: Ie909cf701fc57109257aa13bbf05236d1777669a
      483fd267
  4. Sep 18, 2015
  5. Sep 16, 2015
  6. Sep 15, 2015
  7. Sep 14, 2015
  8. Sep 09, 2015
    • Lorenzo Colitti's avatar
      Allow system_server to bind ping sockets. · c3712143
      Lorenzo Colitti authored
      This allows NetworkDiagnostics to send ping packets from specific
      source addresses in order to detect reachability problems on the
      reverse path.
      
      This addresses the following denial:
      
      [  209.744636] type=1400 audit(1441805730.510:14): avc: denied { node_bind } for pid=8347 comm="Thread-202" saddr=2400:xxxx:xxxx:xxxx:40b1:7e:a1d7:b3ae scontext=u:r:system_server:s0 tcontext=u:object_r:node:s0 tclass=rawip_socket permissive=0
      
      Bug: 23661687
      Change-Id: Ia93c14bc7fec17e2622e1b48bfbf591029d84be2
      c3712143
  9. Sep 04, 2015
  10. Sep 02, 2015
  11. Sep 01, 2015
    • Jeff Vander Stoep's avatar
      system_server.te: remove policy load permissions · 0243e5cf
      Jeff Vander Stoep authored
      Remove system server's permission to dynamically update SELinux
      policy on the device.
      
      1) This functionality has never been used, so we have no idea if
      it works or not.
      
      2) If system_server is compromised, this functionality allows a
      complete bypass of the SELinux policy on the device. In particular,
      an attacker can force a regression of the following patch
        * https://android-review.googlesource.com/138510
      see also https://code.google.com/p/android/issues/detail?id=181826
      
      3) Dynamic policy update can be used to bypass neverallow protections
      enforced in CTS, by pushing a policy to the device after certification.
      Such an updated policy could bring the device out of compliance or
      deliberately introduce security weaknesses.
      
      Bug: 22885422
      Bug: 8949824
      Change-Id: I3c64d64359060561102e1587531836b69cfeef00
      0243e5cf
    • Daniel Micay's avatar
      auditallow gpu_device execute access · 73bdbd98
      Daniel Micay authored
      This permission appears to be unnecessary on some (most?) devices such
      as the Nexus 5. It should be moved to the device policy if it's truly
      required by the driver.
      
      Change-Id: I531dc82ba9030b805db2b596e145be2afb324492
      73bdbd98
    • Robert Craig's avatar
      Drop the default stanza from mac_permissions.xml · 008d7f14
      Robert Craig authored
      
      All non matching apps will simply receive the seinfo
      label of "default" implicitly. No need to further
      clarify things anymore with an explicit default stanza.
      
      Change-Id: Ib7b01ee004775f24db9a69340a31784b967ce030
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      008d7f14
  12. Aug 28, 2015
    • Nick Kralevich's avatar
      install_recovery: drop toolbox auditallow · 2cc94205
      Nick Kralevich authored
      Toolbox is definitely used from install_recovery. Addresses
      the following denials:
      
        type=1400 audit(0.0:7): avc: granted { execute } for comm="install-recover" name="toolbox" dev="mmcblk0p41" ino=463 scontext=u:r:install_recovery:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        type=1400 audit(0.0:6): avc: granted { getattr } for comm="install-recover" path="/system/bin/toolbox" dev="mmcblk0p41" ino=463 scontext=u:r:install_recovery:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        type=1400 audit(0.0:13): avc: granted { read } for comm="log" path="/system/bin/toolbox" dev="mmcblk0p41" ino=463 scontext=u:r:install_recovery:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
        type=1400 audit(0.0:9): avc: granted { read open } for comm="install-recover" path="/system/bin/toolbox" dev="mmcblk0p41" ino=463 scontext=u:r:install_recovery:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file
      
      Change-Id: I51d6e474f34afe1f33ea8294a344aa71e41deead
      2cc94205
  13. Aug 27, 2015
    • Samuel Tan's avatar
      sepolicy: Apply dhcpcd sepolicy to dhcpcd-6.8.2 · 72388335
      Samuel Tan authored
      Apply the same sepolicy used on dhcpcd to dhcpcd-6.8.2,
      which is have it run with the dhcp context, and have its
      data files possess the dhcp_data_file context.
      
      BUG: 22956197
      Change-Id: I7915b694038bb309d93691ef5d4d293593ef3b5e
      72388335
  14. Aug 25, 2015
  15. Aug 24, 2015
  16. Aug 22, 2015
  17. Aug 15, 2015
    • Nick Kralevich's avatar
      allow domain adbd:unix_stream_socket ioctl; · f4d39ca1
      Nick Kralevich authored
      https://android-review.googlesource.com/166419 changed the handling
      of non-interactive adb shells to use a socket instead of a PTY.
      When the stdin/stdout/stderr socket is received by /system/bin/sh,
      the code runs isatty() (ioctl TCGETS) to determine how to handle the
      file descriptor. This is denied by SELinux.
      
      Allow it for all domains.
      
      Addresses the following denial:
      
        avc: denied { ioctl } for pid=4394 comm="sh" path="socket:[87326]" dev="sockfs" ino=87326 ioctlcmd=5401 scontext=u:r:shell:s0 tcontext=u:r:adbd:s0 tclass=unix_stream_socket permissive=0
      
      TODO: When kernels are publicly available which support SELinux ioctl
      filtering, limit this just to ioctl 5401 (TCGETS) instead of all ioctls.
      
      Bug: 21215503
      Change-Id: I5c9394f27b8f198d96df14eac4b0c46ecb9b0898
      f4d39ca1
  18. Aug 14, 2015
    • Nick Kralevich's avatar
      mediaserver: remove /system/bin/toolbox exec access · bf65c7ef
      Nick Kralevich authored
      In Android 5.1, mediaserver couldn't execute any file on
      /system. This slightly regressed due to
      8a0c25ef, which granted mediaserver
      access to execute /system/bin/toolbox and /system/bin/toybox
      
      Revoke that unneeded access and add a neverallow rule to prevent
      regressions.
      
      TODO: Remove toolbox_exec:file execute permissions from domain.te
      and add it back to the specific domains that need it.
      
      Change-Id: Ia7bc6028a9ffb723d4623d91cbe15c8c1bbb2eb9
      bf65c7ef
  19. Aug 13, 2015
  20. Aug 12, 2015
    • Stephen Smalley's avatar
      checkfc: add support for comparing two file_contexts files. · 13b6b7e8
      Stephen Smalley authored
      
      Extend checkfc to support comparing two file_contexts or
      file_contexts.bin files.  This is for use by the CTS
      SELinuxHostTest to compare the AOSP general_file_contexts
      with the device file_contexts.bin file.
      
      Depends on I0fe63e0c7f11ae067b5aac2f468f7842e5d76986.
      
      Change-Id: I2fff2f8cf87690a76219ddf4cf38939650f34782
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      13b6b7e8
    • Richard Haines's avatar
      Update Android.mk to support file_contexts.bin · c2d01914
      Richard Haines authored
      
      This change supports external/libselinux changes to implement
      PCRE formatted binary file_contexts and general_file_contexts.bin
      files.
      
      The $(intermediates) directory will contain the original text file
      (that is no longer used on the device) with a .tmp extension as well
      as the .bin file to aid analysis.
      
      A CleanSpec.mk file is added to remove the old file_contexts file.
      
      Change-Id: I75a781100082c23536f70ce3603f7de42408b5ba
      Signed-off-by: default avatarRichard Haines <richard_c_haines@btinternet.com>
      c2d01914
  21. Aug 11, 2015
    • Dan Willemsen's avatar
      Don't assume ordering of $(wildcard ...) · bc2a49f2
      Dan Willemsen authored
      There are no guarantees on the order of the results from a call to the
      wildcard function. In fact, the order usually changes between make 3.81
      and make 4.0 (and kati).
      
      Instead, sort the results of wildcard in each sepolicy directory, so
      that directory order is preserved, but content ordering is reliable.
      
      Change-Id: I1620f89bbdd2b2902f2e0c40526e893ccf5f7775
      bc2a49f2
  22. Jul 30, 2015
  23. Jul 29, 2015
Loading