Skip to content
Snippets Groups Projects
  1. Nov 12, 2013
  2. Nov 11, 2013
    • Stephen Smalley's avatar
      am af47ebb6: Label /dev/fscklogs and allow system_server access to it. · a9ccd7dc
      Stephen Smalley authored
      * commit 'af47ebb6':
        Label /dev/fscklogs and allow system_server access to it.
      a9ccd7dc
    • Stephen Smalley's avatar
      Label /dev/fscklogs and allow system_server access to it. · af47ebb6
      Stephen Smalley authored
      
      Otherwise you get denials such as:
      type=1400 audit(1383590310.430:623): avc:  denied  { getattr } for  pid=1629 comm="Thread-78" path="/dev/fscklogs/log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=file
      type=1400 audit(1383590310.430:624): avc:  denied  { open } for  pid=1629 comm="Thread-78" name="log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=file
      type=1400 audit(1383590310.430:625): avc:  denied  { write } for  pid=1629 comm="Thread-78" name="fscklogs" dev="tmpfs" ino=1628 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=dir
      type=1400 audit(1383590310.430:625): avc:  denied  { remove_name } for  pid=1629 comm="Thread-78" name="log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=dir
      type=1400 audit(1383590310.430:625): avc:  denied  { unlink } for  pid=1629 comm="Thread-78" name="log" dev="tmpfs" ino=1642 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=file
      
      Change-Id: Ia7ae06a6d4cc5d2a59b8b85a5fb93cc31074fd37
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      af47ebb6
    • Nick Kralevich's avatar
      am 00739e3d: Make the ueventd domain enforcing. · c1468d45
      Nick Kralevich authored
      * commit '00739e3d':
        Make the ueventd domain enforcing.
      c1468d45
  3. Nov 08, 2013
    • Nick Kralevich's avatar
      Make kernel / init enforcing · b1d81645
      Nick Kralevich authored
      Start running in enforcing mode for kernel / init.
      This should be mostly a no-op, as the kernel / init
      is in the unconfined domain.
      
      Change-Id: I8273d936c9a4eecb50b78ae93490a4dd52f59eb6
      b1d81645
    • Nick Kralevich's avatar
      Make the ueventd domain enforcing. · 00739e3d
      Nick Kralevich authored
      All (known) denials have been addressed.
      
      Change-Id: Ic12ed190a2efb7f20be589137a27b95d03dde25a
      00739e3d
    • Stephen Smalley's avatar
      am a7716718: Label /data/misc/media and allow mediaserver access to it. · b53788de
      Stephen Smalley authored
      * commit 'a7716718':
        Label /data/misc/media and allow mediaserver access to it.
      b53788de
    • Stephen Smalley's avatar
      Label /data/misc/media and allow mediaserver access to it. · a7716718
      Stephen Smalley authored
      
      Otherwise we get denials like these on 4.4:
      
      type=1400 audit(1383590170.360:29): avc:  denied  { write } for  pid=61 comm="mediaserver" name="media" dev="mtdblock1" ino=6416 scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      type=1400 audit(1383590170.360:29): avc:  denied  { add_name } for  pid=61 comm="mediaserver" name="emulator.camera.hotplug.0" scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      type=1400 audit(1383590170.360:29): avc:  denied  { create } for  pid=61 comm="mediaserver" name="emulator.camera.hotplug.0" scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      type=1400 audit(1383590170.360:29): avc:  denied  { write open } for  pid=61 comm="mediaserver" name="emulator.camera.hotplug.0" dev="mtdblock1" ino=6431 scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      type=1400 audit(1383590255.100:231): avc:  denied  { write } for  pid=832 comm="mediaserver" name="emulator.camera.hotplug.0" dev="mtdblock1" ino=6431 scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      type=1400 audit(1383590255.100:231): avc:  denied  { open } for  pid=832 comm="mediaserver" name="emulator.camera.hotplug.0" dev="mtdblock1" ino=6431 scontext=u:r:mediaserver:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      
      Change-Id: Ic374488f8b62bd4f8b3c90f30da0e8d1ed1a7343
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      a7716718
    • Geremy Condra's avatar
      am ddf98fa8: Neverallow access to the kmem device from userspace. · eac6e590
      Geremy Condra authored
      * commit 'ddf98fa8':
        Neverallow access to the kmem device from userspace.
      eac6e590
    • Geremy Condra's avatar
      Neverallow access to the kmem device from userspace. · ddf98fa8
      Geremy Condra authored
      Change-Id: If26baa947ff462f5bb09b75918a4130097de5ef4
      ddf98fa8
  4. Nov 07, 2013
    • Nick Kralevich's avatar
      am 0ea4ac8a: Merge "Move goldfish-specific rules to their own directory." · 7bc576d5
      Nick Kralevich authored
      * commit '0ea4ac8a':
        Move goldfish-specific rules to their own directory.
      7bc576d5
    • Nick Kralevich's avatar
    • Nick Kralevich's avatar
      am 842a1111: Merge "Confine healthd, but leave it permissive for now." · 289fe68b
      Nick Kralevich authored
      * commit '842a1111':
        Confine healthd, but leave it permissive for now.
      289fe68b
    • Nick Kralevich's avatar
    • Nick Kralevich's avatar
      am fec3c5ad: Merge "Make the keystore domain enforcing." · 6b754790
      Nick Kralevich authored
      * commit 'fec3c5ad':
        Make the keystore domain enforcing.
      6b754790
    • Nick Kralevich's avatar
      fec3c5ad
    • Elliott Hughes's avatar
      am aaac2468: /system/bin/ash and /system/bin/mksh are dead. · 1e38a555
      Elliott Hughes authored
      * commit 'aaac2468':
        /system/bin/ash and /system/bin/mksh are dead.
      1e38a555
    • Elliott Hughes's avatar
      /system/bin/ash and /system/bin/mksh are dead. · aaac2468
      Elliott Hughes authored
      Long live /system/bin/sh!
      
      Change-Id: I5af63c1bdc3585835ee273ed9995d8fac14792da
      aaac2468
    • Stephen Smalley's avatar
      Confine healthd, but leave it permissive for now. · 2a604adf
      Stephen Smalley authored
      
      Remove unconfined_domain() and add the allow rules required for
      operation of healthd.  Restore the permissive declaration until
      I8a3e0db15ec5f4eb05d455a57e8446a8c2b484c2 is applied to the 3.4
      kernel.
      
      Resolves the following denials in 4.4:
      type=1400 audit(1383590167.750:14): avc:  denied  { read } for  pid=49 comm="healthd" path="/sbin/healthd" dev="rootfs" ino=1232 scontext=u:r:healthd:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      type=1400 audit(1383590167.750:15): avc:  denied  { mknod } for  pid=49 comm="healthd" capability=27  scontext=u:r:healthd:s0 tcontext=u:r:healthd:s0 tclass=capability
      type=1400 audit(1383590167.750:16): avc:  denied  { create } for  pid=49 comm="healthd" scontext=u:r:healthd:s0 tcontext=u:r:healthd:s0 tclass=netlink_kobject_uevent_socket
      type=1400 audit(1383590167.750:17): avc:  denied  { setopt } for  pid=49 comm="healthd" scontext=u:r:healthd:s0 tcontext=u:r:healthd:s0 tclass=netlink_kobject_uevent_socket
      type=1400 audit(1383590167.750:17): avc:  denied  { net_admin } for  pid=49 comm="healthd" capability=12  scontext=u:r:healthd:s0 tcontext=u:r:healthd:s0 tclass=capability
      type=1400 audit(1383590167.750:18): avc:  denied  { bind } for  pid=49 comm="healthd" scontext=u:r:healthd:s0 tcontext=u:r:healthd:s0 tclass=netlink_kobject_uevent_socket
      shell@generic:/ $ type=1400 audit(1383590168.800:21): avc:  denied  { call } for  pid=49 comm="healthd" scontext=u:r:healthd:s0 tcontext=u:r:servicemanager:s0 tclass=binder
      type=1400 audit(1383590168.800:22): avc:  denied  { transfer } for  pid=49 comm="healthd" scontext=u:r:healthd:s0 tcontext=u:r:servicemanager:s0 tclass=binder
      type=1400 audit(1383590168.800:23): avc:  denied  { 0x10 } for  pid=49 comm="healthd" capability=36  scontext=u:r:healthd:s0 tcontext=u:r:healthd:s0 tclass=capability2
      type=1400 audit(1383590168.800:24): avc:  denied  { read } for  pid=49 comm="healthd" scontext=u:r:healthd:s0 tcontext=u:r:healthd:s0 tclass=netlink_kobject_uevent_socket
      type=1400 audit(1383590212.320:161): avc:  denied  { call } for  pid=376 comm="system_server" scontext=u:r:system_server:s0 tcontext=u:r:healthd:s0 tclass=binder
      type=1400 audit(1383590212.320:161): avc:  denied  { transfer } for  pid=376 comm="system_server" scontext=u:r:system_server:s0 tcontext=u:r:healthd:s0 tclass=binder
      type=1400 audit(1383590212.320:162): avc:  denied  { call } for  pid=49 comm="healthd" scontext=u:r:healthd:s0 tcontext=u:r:system_server:s0 tclass=binder
      type=1400 audit(1383590275.930:463): avc:  denied  { call } for  pid=49 comm="healthd" scontext=u:r:healthd:s0 tcontext=u:r:system_server:s0 tclass=binder
      
      Change-Id: Iacd058edfa1e913a8f24ce8937d2d76c928d6740
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      2a604adf
    • Nick Kralevich's avatar
      am f232f25b: Merge "Move audio_firmware_file and /data/misc/audio entry to core sepolicy." · a74edc15
      Nick Kralevich authored
      * commit 'f232f25b':
        Move audio_firmware_file and /data/misc/audio entry to core sepolicy.
      a74edc15
  5. Nov 06, 2013
  6. Nov 05, 2013
    • Nick Kralevich's avatar
      Revert "Make the keystore domain enforcing." · 2d8dcb73
      Nick Kralevich authored
      This is causing runtime restarts on flo/deb when uninstalling
      some APKs. Revert while I investigate it.
      
      11-04 21:52:41.487   687   704 I ActivityManager: Force stopping com.android.development appid=10078 user=-1: uninstall pkg
      11-04 21:52:41.487   687   712 W PackageManager: Couldn't delete native library directory /data/app-lib/com.android.development
      11-04 21:52:41.557   687   712 W dalvikvm: threadid=20: thread exiting with uncaught exception (group=0x959dfae8)
      11-04 21:52:41.557   687   712 E AndroidRuntime: *** FATAL EXCEPTION IN SYSTEM PROCESS: PackageManager
      11-04 21:52:41.557   687   712 E AndroidRuntime: java.lang.NullPointerException
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at android.security.KeyStore.clearUid(KeyStore.java:327)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at com.android.server.pm.PackageManagerService.removeKeystoreDataIfNeeded(PackageManagerService.java:9787)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at com.android.server.pm.PackageManagerService.removePackageDataLI(PackageManagerService.java:9384)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at com.android.server.pm.PackageManagerService.deleteInstalledPackageLI(PackageManagerService.java:9503)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at com.android.server.pm.PackageManagerService.deletePackageLI(PackageManagerService.java:9612)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at com.android.server.pm.PackageManagerService.deletePackageX(PackageManagerService.java:9239)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at com.android.server.pm.PackageManagerService.access$4100(PackageManagerService.java:178)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at com.android.server.pm.PackageManagerService$7.run(PackageManagerService.java:9173)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at android.os.Handler.handleCallback(Handler.java:733)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at android.os.Handler.dispatchMessage(Handler.java:95)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at android.os.Looper.loop(Looper.java:136)
      11-04 21:52:41.557   687   712 E AndroidRuntime:        at android.os.HandlerThread.run(HandlerThread.java:61)
      11-04 21:52:41.567   687   712 I Process : Sending signal. PID: 687 SIG: 9
      
      and
      
      [    7.324554] type=1400 audit(1383601030.823:5): avc:  denied  { read write } for  pid=192 comm="keystore" name="qseecom" dev="tmpfs" ino=7521 scontext=u:r:keystore:s0 tcontext=u:object_r:device:s0 tclass=chr_file
      
      This reverts commit 709d7183.
      
      Bug: 11518274
      2d8dcb73
  7. Nov 04, 2013
  8. Nov 01, 2013
Loading