Skip to content
Snippets Groups Projects
  1. Aug 06, 2014
  2. Aug 05, 2014
  3. Aug 01, 2014
    • Stephen Smalley's avatar
      Allow dumpstate to dump backtraces of certain native processes. · 77a236c9
      Stephen Smalley authored
      
      The list of processes comes from frameworks/native/cmds/dumpstate/utils.c.
      dumpstate calls dump_backtrace_to_file() for each such process, which
      asks debuggerd to dump the backtrace.
      
      Resolves denials such as:
       avc:  denied  { dump_backtrace } for  scontext=u:r:dumpstate:s0 tcontext=u:r:surfaceflinger:s0 tclass=debuggerd
       avc:  denied  { dump_backtrace } for  scontext=u:r:dumpstate:s0 tcontext=u:r:drmserver:s0 tclass=debuggerd
       avc:  denied  { dump_backtrace } for  scontext=u:r:dumpstate:s0 tcontext=u:r:mediaserver:s0 tclass=debuggerd
       avc:  denied  { dump_backtrace } for  scontext=u:r:dumpstate:s0 tcontext=u:r:sdcardd:s0 tclass=debuggerd
      
      Change-Id: Idbfb0fef0aac138073b7217b7dbad826a1193098
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      77a236c9
    • dcashman's avatar
      3fe1bcbb
  4. Jul 29, 2014
    • Stephen Smalley's avatar
      Fix neverallow rules to eliminate CTS SELinuxTest warnings. · 21ada26d
      Stephen Smalley authored
      
      Fix two neverallow rules that yield Invalid SELinux context
      warnings from the CTS SELinuxTest.
      
      For transitions from app domains, we only need to check
      { domain -appdomain } (i.e. domains other than app domains),
      not ~appdomain (i.e. all types other than app domains).  Otherwise
      SELinuxTest tries to generate contexts with the r role and
      non-domain types for testing since the target class is process,
      and such contexts are invalid.
      
      For keeping file_type and fs_type exclusive, we only need to
      check associate permission, not all filesystem permissions, as
      only associate takes a file type as the source context.  Otherwise
      SELinuxTest tries to generate contexts with the r role and
      non-domain types for testing filesystem permissions other than
      associate, since the source of such checks is normally a process
      context.
      
      Change-Id: I6c2f63f4786d75294a6938613ba14b64212fc802
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      21ada26d
    • dcashman's avatar
      Generate selinux_policy.xml as part of CTS build. · 704741a5
      dcashman authored
      Bug: 16563899
      Bug: 14251916
      Change-Id: Id3172b73f10186ba361caf6b7333e5d2a0648475
      704741a5
  5. Jul 28, 2014
  6. Jul 25, 2014
    • Nick Kralevich's avatar
      Allow sdcardd to read /data/.layout_version · 1a61fb3b
      Nick Kralevich authored
      As described in the system/core commit with the same Change-Id,
      there's a race condition between installd and sdcard when it
      comes to accessing /data/media. Resolve the race by checking
      /data/.layout_version to make sure the filesystem has been upgraded.
      
      Maybe indirectly fixes the following SELinux denial:
      
        sdcard  : type=1400 audit(0.0:3): avc: denied { write } for name="media" dev="mmcblk0p17" ino=102753 scontext=u:r:sdcardd:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      
      (cherrypicked from commit 792d8650)
      
      Bug: 16329437
      Change-Id: I5e164f08009c1036469f8734ec07cbae9c5e262b
      1a61fb3b
  7. Jul 24, 2014
  8. Jul 23, 2014
  9. Jul 24, 2014
  10. Jul 23, 2014
  11. Jul 22, 2014
  12. Jul 21, 2014
  13. Jul 17, 2014
  14. Jul 18, 2014
  15. Jul 17, 2014
    • Riley Spahn's avatar
      Refine service_manager find auditallow statements. · 88157ea3
      Riley Spahn authored
      Add adbd as a service_manager_local_audit_domain and negate
      surfaceflinger_service in its auditallow. Negate keystore_service
      and radio_service in the system_app auditallow.
      
      Change-Id: I05ea2a3e853b692f151182202f1b30786b44f1fb
      88157ea3
    • Riley Spahn's avatar
      Add com.android.net.IProxyService to service_contexts. · 26d6371c
      Riley Spahn authored
      Add com.android.net.IProxyService as a system_server_service
      to service_contexts.
      
      Bug: 16369427
      Change-Id: I29ac87babe393f2fe3ce91c2d5eba9673d5a1be3
      26d6371c
    • Nick Kralevich's avatar
      lmkd: avoid locking libsigchain into memory · 8a5b28d2
      Nick Kralevich authored
      https://android-review.googlesource.com/94851 added an LD_PRELOAD
      line to init.environ.rc.in. This has the effect of loading
      libsigchain.so into every process' memory space, regardless of
      whether it wants it or not.
      
      For lmkd, it doesn't need libsigchain, so it doesn't make any sense
      to load it and keep it locked in memory.
      
      Disable noatsecure for lmkd. This sets AT_SECURE=1, which instructs the
      linker to not honor security sensitive environment variables such
      as LD_PRELOAD. This prevents libsigchain.so from being loaded into
      lmkd's memory.
      
      Change-Id: I6378ba28ff3a1077747fe87c080e1f9f7ca8132e
      8a5b28d2
  16. Jul 16, 2014
  17. Jul 15, 2014
  18. Jul 16, 2014
    • Riley Spahn's avatar
      Remove auditallow from system_server. · 5a25fbf7
      Riley Spahn authored
      system_server auditallow statements were causing logspam and
      there is not a good way to negate services from specific devices
      so as a fix we are removing all system_server auditallows. These
      logs may not be useful anyway because I suspsect that system_server
      will probe for most all services anyway.
      
      Change-Id: I27a05761c14def3a86b0749cdb895190bdcf9d71
      5a25fbf7
    • Nick Kralevich's avatar
      dex2oat: fix forward locked apps · 5259c5e6
      Nick Kralevich authored
      dex2oat can't access file descriptors associated with asec_apk_files.
      This breaks installing forward locked apps, and generates the following
      denial:
      
        type=1400 audit(0.0:18): avc: denied { read } for path="/mnt/asec/com.example.android.simplejni-1/pkg.apk" dev="dm-0" ino=12 scontext=u:r:dex2oat:s0 tcontext=u:object_r:asec_apk_file:s0 tclass=file
      
      Steps to reproduce:
      
        $ adb install -r -l SimpleJNI.apk
      
      Expected:
      
        app installs
      
      Actual:
      
        app fails to install.
      
      Change-Id: I5a468508014e9963460d13d78e1c4867187322b3
      Bug: 16328233
      5259c5e6
  19. Jul 15, 2014
  20. Jul 14, 2014
    • Nick Kralevich's avatar
      Tweak rules for su domain. · 213bb45b
      Nick Kralevich authored
      1) Remove explicit allow statements. Since su is in permmissive,
      there's no need to ever specify allow statements for su.
      
      2) Remove unconfined_domain(su). Su is already permissive, so there's
      no need to join the unconfined domain, and it just makes getting
      rid of unconfined more difficult.
      
      3) Put su into app_domain(). This addresses, in a roundabout sorta
      way, the following denial:
      
        type=1400 audit(0.0:4): avc: denied { setsched } for scontext=u:r:system_server:s0 tcontext=u:r:su:s0 tclass=process permissive=0
      
      which comes up while testing media processes as root. We already put
      the shell user into this domain, so adding su to this domain ensures
      other processes can communicate consistently with su spawned processes.
      
      Bug: 16261280
      Bug: 16298582
      Change-Id: I30b6d3cc186bda737a23c25f4fa2a577c2afd4d7
      213bb45b
    • Nick Kralevich's avatar
      fix system_server dex2oat exec · 8395bb4a
      Nick Kralevich authored
      Addresses the following denial:
      
        W/system_server( 2697): type=1400 audit(0.0:9): avc: denied { execute } for name="dex2oat" dev="mmcblk0p31" ino=118 scontext=u:r:system_server:s0 tcontext=u:object_r:dex2oat_exec:s0 tclass=file permissive=0
      
      Change-Id: I168842b3e281efcb0632049632ed3817c2025e4d
      8395bb4a
    • Riley Spahn's avatar
      Add access control for each service_manager action. · b8511e0d
      Riley Spahn authored
      Add SELinux MAC for the service manager actions list
      and find. Add the list and find verbs to the
      service_manager class. Add policy requirements for
      service_manager to enforce policies to binder_use
      macro.
      
      Change-Id: I224b1c6a6e21e3cdeb23badfc35c82a37558f964
      b8511e0d
  21. Jul 10, 2014
  22. Jul 11, 2014
  23. Jul 10, 2014
    • Nick Kralevich's avatar
      Put dex2oat in it's own sandbox · 75d63fcf
      Nick Kralevich authored
      Currently, dex2oat runs in the installd sandbox, and has
      all the SELinux capabilities that installd does. That's too
      excessive.
      
      dex2oat handles untrusted user data, so we want to put it in
      it's own tighter sandbox.
      
      Bug: 15358102
      Change-Id: I08083b84b9769e24d6dad6dbd12401987cb006be
      75d63fcf
    • Nick Kralevich's avatar
      Remove domain:process from unconfined · a7c04dcd
      Nick Kralevich authored
      Prune down unconfined so it doesn't allow process access
      to all other domains. Use domain_trans() for transitions to
      seclabeled domains.
      
      Change-Id: I8e88a49e588b6b911e1f7172279455838a06091d
      a7c04dcd
    • Doug Zongker's avatar
      support newer-style adbd interface in recovery · bad4e91d
      Doug Zongker authored
      Support opening the ffs-based interface for adbd in recovery.  (Copied
      from adbd.te.)
      
      Bug: 16183878
      Change-Id: Ib80e5b910d9ad4252cb80e7ce2f85e478cd94816
      bad4e91d
Loading