Skip to content
Snippets Groups Projects
  1. Feb 06, 2015
  2. Feb 05, 2015
    • Nick Kralevich's avatar
      appdomain: relax netlink_socket neverallow rule · 87f3802a
      Nick Kralevich authored
      Relax the neverallow netlink restrictions for app domains.
      In particular, some non-AOSP app domains may use netlink sockets
      to communicate with a kernel driver.
      
      Continue to neverallow generic netlink sockets for untrusted_app.
      The intention here is that only app domains which explicitly need
      this functionality should be able to request it.
      
      This change does not add or remove any SELinux rules. Rather, it
      just changes SELinux compile time assertions, as well as allowing
      this behavior in CTS.
      
      Modify other neverallow rules to use "domain" instead of "self".
      Apps shouldn't be able to handle netlink sockets, even those
      created in other SELinux domains.
      
      (cherry picked from commit d31936f8)
      
      Change-Id: I4763cb0c9510220693c506636dbb7584712b67e2
      87f3802a
    • Stephen Smalley's avatar
      Add neverallow checking to sepolicy-analyze. · c423b1aa
      Stephen Smalley authored
      
      See NEVERALLOW CHECKING in tools/README for documentation.
      
      Depends on change I45b3502ff96b1d093574e1fecff93a582f8d00bd
      for libsepol to support reporting all neverallow failures.
      
      Cherry-pick of commit: 59906bf8
      with build-fix from commit: 74bbf703
      added manually.
      
      Bug: 19191637
      
      Change-Id: I1c18fa854b3c5f5e05d5dc42d9006c5fdacebdc3
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      c423b1aa
  3. Jan 29, 2015
    • Nick Kralevich's avatar
      appdomain: relax netlink_socket neverallow rule · bf626ce9
      Nick Kralevich authored
      Relax the neverallow netlink restrictions for app domains.
      In particular, some non-AOSP app domains may use netlink sockets
      to communicate with a kernel driver.
      
      Continue to neverallow generic netlink sockets for untrusted_app.
      The intention here is that only app domains which explicitly need
      this functionality should be able to request it.
      
      This change does not add or remove any SELinux rules. Rather, it
      just changes SELinux compile time assertions, as well as allowing
      this behavior in CTS.
      
      Modify other neverallow rules to use "domain" instead of "self".
      Apps shouldn't be able to handle netlink sockets, even those
      created in other SELinux domains.
      
      (cherry picked from commit d31936f8)
      
      Bug: 19198997
      Change-Id: Icfed1ee66f082df1117b090341f62981f01bc849
      bf626ce9
  4. Jan 16, 2015
  5. Dec 12, 2014
  6. Dec 11, 2014
  7. Dec 09, 2014
  8. Dec 08, 2014
  9. Dec 04, 2014
    • Nick Kralevich's avatar
      allow untrusted_app read /data/anr/traces.txt · e2547c3b
      Nick Kralevich authored
      The GMS core feedback agent runs as untrusted_app, and needs
      the ability to read /data/anr/traces.txt to report ANR information.
      
      Allow all untrusted_apps to read /data/anr/traces.txt so that GMS core
      can access it.
      
      Longer term, we need to move GMS core into it's own domain, but that's
      a longer term change.
      
      Addresses the following denial:
      
      W/ndroid.feedback(17825): type=1400 audit(0.0:68004): avc: denied { read } for name="traces.txt" dev="mmcblk0p28" ino=325762 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:anr_data_file:s0 tclass=file
      
      Bug: 18504118
      Bug: 18340553
      Change-Id: Ia9fac599befc3a3b6e5282be15ec8fd04bb23385
      e2547c3b
  10. Nov 26, 2014
    • Nick Kralevich's avatar
      Allow dex2oat to work on /oem APKs · adbabeeb
      Nick Kralevich authored
      Dex2oat needs the ability to read from already open file descriptors
      in /oem so that apps from that location can be installed. Allow it.
      
      Addresses the following denials:
      
        avc: denied { read } for comm="dex2oat" path="/oem/app/TabletInfo.apk" dev="mmcblk0p12" ino=20 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/AskMe_android_one.apk" dev="mmcblk0p12" ino=14 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/PartnerRegulatoryInfo.apk" dev="mmcblk0p12" ino=19 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/PartnerLauncherProvider.apk" dev="mmcblk0p12" ino=18 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/Amazon_Mobile_com.apk" dev="mmcblk0p12" ino=13 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/PartnerBookmarksProvider.apk" dev="mmcblk0p12" ino=17 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/Hike.apk" dev="mmcblk0p12" ino=15 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
        avc: denied { read } for comm="dex2oat" path="/oem/app/MiLive_embedded_IndiaGames_version4.0_android1.apk" dev="mmcblk0p12" ino=16 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0
      
      Bug: 18539205
      Change-Id: I92bd91c66befc5a1060dd189324b2c046bba0258
      adbabeeb
  11. Nov 19, 2014
  12. Nov 13, 2014
  13. Nov 12, 2014
  14. Nov 11, 2014
  15. Nov 10, 2014
  16. Nov 07, 2014
  17. Nov 05, 2014
  18. Nov 03, 2014
  19. Oct 31, 2014
    • Nick Kralevich's avatar
      allow coredump functionality · d7e004eb
      Nick Kralevich authored
      Change-Id: I7993698ac96f21db0039681275280dbd43ff61ba
      d7e004eb
    • Igor Murashkin's avatar
      zygote/dex2oat: Grant additional symlink permissions · f7ccfd00
      Igor Murashkin authored
      * zygote needs to be able to symlink from dalvik cache to system
        to avoid having to copy boot.oat
        (when the boot.oat file was built with --compile-pic)
      * dex2oat needs to be able to read the symlink in the dalvik cache
        (the one that zygote creates)
      
      (cherry-picked from AOSP master
      83c5612e)
      
      Bug: 18035729
      Change-Id: Ie1acad81a0fd8b2f24e1f3f07a06e6fdb548be62
      f7ccfd00
  20. Oct 24, 2014
  21. Oct 23, 2014
    • Nick Kralevich's avatar
      am 683ac49d: recovery: allow changing unlabeled symbolic links · 87bb4f68
      Nick Kralevich authored
      * commit '683ac49d':
        recovery: allow changing unlabeled symbolic links
      87bb4f68
    • Nick Kralevich's avatar
      recovery: allow changing unlabeled symbolic links · 683ac49d
      Nick Kralevich authored
      Currently, recovery is allowed write access to the following three
      file labels:
      
      * system_file (directories, files, and symbolic links)
      * exec_type (directories, files, and symbolic links)
      * unlabeled (directory and files)
      
      system_file is the default label on all files in /system. exec_type
      is the attribute used to mark executables on /system.
      
      The third file type, "unlabeled", refers to filesystem objects where
      the label hasn't been set, or a label is set but isn't defined by the
      currently loaded policy.
      
      The current policy only allows unlabeled files or directories to
      be modified. Symbolic links were accidentally excluded. This causes
      problems when trying to fix up labels/permissions on unlabeled
      symbolic links.
      
      Allow unlabeled symbolic link modifications.
      
      Bug: 18079773
      Change-Id: I8e5c33602cdc38ec9a95b4e83f9ccbb06fe9da7c
      683ac49d
    • Robin Lee's avatar
Loading