Skip to content
Snippets Groups Projects
  1. Mar 14, 2014
    • Stephen Smalley's avatar
      Allow system_server to read from log daemon. · bafbf813
      Stephen Smalley authored
      
      Addresses denials such as:
      avc:  denied  { write } for  pid=1797 comm="logcat" name="logdr" dev="tmpfs" ino=7523 scontext=u:r:system_server:s0 tcontext=u:object_r:logdr_socket:s0 tclass=sock_file
      avc:  denied  { connectto } for  pid=1797 comm="logcat" path="/dev/socket/logdr" scontext=u:r:system_server:s0 tcontext=u:r:logd:s0 tclass=unix_stream_socket
      
      Change-Id: Idc4f48519ca3d81125102e8f15f68989500f5e9e
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      bafbf813
  2. Mar 13, 2014
    • Stephen Smalley's avatar
      Silence /proc/pid denials. · 6fe899a0
      Stephen Smalley authored
      
      system_server components such as ActivityManager and CpuTracker
      try to access all /proc/pid directories, triggering denials on
      domains that are not explicitly allowed to the system_server.
      Silence these denials to avoid filling the logs with noise
      and overwriting actual useful messages in the kernel ring buffer.
      
      Change-Id: Ifd6f2fd63e945647570ed61c67a6171b89878617
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      6fe899a0
    • Stephen Smalley's avatar
      Audit attempts by rild to create/write to system_data_file. · 64c0ff00
      Stephen Smalley authored
      
      Audit attempts by rild to create/write to system_data_file
      with avc:  granted messages so that we can identify any such
      instances and put such directories/files into radio_data_file or
      some other type and then remove these rules.
      
      Change-Id: Ice20fed1733a3f4208d541a4baaa8b6c6f44fbb0
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      64c0ff00
    • Nick Kralevich's avatar
      rild: move to enforcing · 599e71a9
      Nick Kralevich authored
      Move the rild domain into SELinux enforcing mode. This will
      start enforcing SELinux rules; security policy violations will
      return EPERM.
      
      Change-Id: Iadb51616ecf6f56148ce076d47f04511810de94c
      599e71a9
  3. Mar 12, 2014
  4. Mar 11, 2014
  5. Mar 10, 2014
  6. Mar 08, 2014
  7. Mar 07, 2014
    • Stephen Smalley's avatar
      Clean up, unify, and deduplicate app domain rules. · b0db712b
      Stephen Smalley authored
      
      Coalesce a number of allow rules replicated among multiple
      app domains.
      
      Get rid of duplicated rules already covered by domain, appdomain,
      or platformappdomain rules.
      
      Split the platformappdomain rules to their own platformappdomain.te
      file, document them more fully, and note the inheritance in each
      of the relevant *_app.te files.
      
      Generalize isolated app unix_stream_socket rules to all app domains
      to resolve denials such as:
      
      avc:  denied  { read write } for  pid=11897 comm="Binder_2" path="socket:[203881]" dev="sockfs" ino=203881 scontext=u:r:release_app:s0 tcontext=u:r:untrusted_app:s0 tclass=unix_stream_socket
      
      avc:  denied  { getattr } for  pid=11990 comm=4173796E635461736B202334 path="socket:[203881]" dev="sockfs" ino=203881 scontext=u:r:release_app:s0 tcontext=u:r:untrusted_app:s0 tclass=unix_stream_socket
      
      avc:  denied  { getopt } for  pid=11990 comm=4173796E635461736B202334 scontext=u:r:release_app:s0 tcontext=u:r:untrusted_app:s0 tclass=unix_stream_socket
      
      avc:  denied  { read write } for  pid=6890 comm="Binder_10" path="socket:[205010]" dev="sockfs" ino=205010 scontext=u:r:release_app:s0 tcontext=u:r:media_app:s0 tclass=unix_stream_socket
      
      avc:  denied  { getattr } for  pid=11990 comm=4173796E635461736B202334 path="socket:[205010]" dev="sockfs" ino=205010 scontext=u:r:release_app:s0 tcontext=u:r:media_app:s0 tclass=unix_stream_socket
      
      avc:  denied  { getopt } for  pid=11990 comm=4173796E635461736B202334 scontext=u:r:release_app:s0 tcontext=u:r:media_app:s0 tclass=unix_stream_socket
      
      Change-Id: I770d7d51d498b15447219083739153265d951fe5
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      b0db712b
    • Stephen Smalley's avatar
      Make mtp enforcing. · a5ef97a3
      Stephen Smalley authored
      
      Change-Id: I3b5e605ddcb601ae9958066ea20410dfe4c4bdf3
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      a5ef97a3
    • Stephen Smalley's avatar
      Address dnsmasq denials. · 17859404
      Stephen Smalley authored
      
      Address dnsmasq denials such as:
      
       avc:  denied  { use } for  pid=9145 comm="dnsmasq" path="pipe:[29234]" dev="pipefs" ino=29234 scontext=u:r:dnsmasq:s0 tcontext=u:r:netd:s0 tclass=fd
       avc:  denied  { read } for  pid=9145 comm="dnsmasq" path="pipe:[29234]" dev="pipefs" ino=29234 scontext=u:r:dnsmasq:s0 tcontext=u:r:netd:s0 tclass=fifo_file
       avc:  denied  { read write } for  pid=9145 comm="dnsmasq" path="socket:[7860]" dev="sockfs" ino=7860 scontext=u:r:dnsmasq:s0 tcontext=u:r:netd:s0 tclass=netlink_kobject_uevent_socket
       avc:  denied  { read write } for  pid=9145 comm="dnsmasq" path="socket:[8221]" dev="sockfs" ino=8221 scontext=u:r:dnsmasq:s0 tcontext=u:r:netd:s0 tclass=unix_stream_socket
       avc:  denied  { read write } for  pid=9523 comm="dnsmasq" path="socket:[7860]" dev="sockfs" ino=7860 scontext=u:r:dnsmasq:s0 tcontext=u:r:netd:s0 tclass=netlink_kobject_uevent_socket
       avc:  denied  { read write } for  pid=9523 comm="dnsmasq" path="socket:[7862]" dev="sockfs" ino=7862 scontext=u:r:dnsmasq:s0 tcontext=u:r:netd:s0 tclass=netlink_route_socket
       avc:  denied  { net_raw } for  pid=9607 comm="dnsmasq" capability=13  scontext=u:r:dnsmasq:s0 tcontext=u:r:dnsmasq:s0 tclass=capability
       avc:  denied  { net_admin } for  pid=9607 comm="dnsmasq" capability=12  scontext=u:r:dnsmasq:s0 tcontext=u:r:dnsmasq:s0 tclass=capability
      
      Change-Id: I2bd1eaf22879f09df76a073028cc282362eebeee
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      17859404
    • Stephen Smalley's avatar
      Make dhcp enforcing. · c797ea04
      Stephen Smalley authored
      
      Change-Id: I9355cd9bcbfeb55a7bebe580c0e5764263a5f5ab
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      c797ea04
    • Stephen Smalley's avatar
      Make clatd enforcing. · de9ebc2a
      Stephen Smalley authored
      
      Change-Id: I764086a83d89d5c94c13400cab590933727d261b
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      de9ebc2a
  8. Mar 06, 2014
    • Stephen Smalley's avatar
      Allow mediaserver to connect to tee service. · ba745673
      Stephen Smalley authored
      
      Resolves denials such as:
      
      avc:  denied  { connectto } for  pid=7028 comm="wfd_looper" path=006D636461656D6F6E scontext=u:r:mediaserver:s0 tcontext=u:r:tee:s0 tclass=unix_stream_socket
      
      This is a socket in the abstract namespace so no socket file is involved.
      
      Change-Id: Ia0e384c08063466cfd0f17af3bccf294c7f9dbbd
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      ba745673
    • Stephen Smalley's avatar
      Deduplicate and rationalize system_server /proc/pid access. · c1812181
      Stephen Smalley authored
      
      The system_server has duplicate/overlapping rules regarding
      /proc/pid access as well as a lack of clarity on the reason
      for the different rules.  Deduplicate the rules and clarify
      the purpose of different sets of rules.
      
      Replace the rules granting /proc/pid access for all domains with
      specific rules only for domains that we know should be accessible
      by the system_server, i.e. all apps (appdomain) and the set of
      native processes listed in com.android.server.Watchdog.NATIVE_STACKS_OF_INTEREST.
      
      Change-Id: Idae6fc87e19e1700cdc4bdbde521d35caa046d74
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      c1812181
    • Robert Craig's avatar
      Move wpa_supplicant.te to wpa.te. · d9cec19b
      Robert Craig authored
      
      The filename should be the same as the
      domain with all the .te files.
      
      Change-Id: Ib05eb84f881c680eb5bb43a4814cfb038fbff339
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      d9cec19b
Loading