Skip to content
Snippets Groups Projects
  1. Jul 15, 2014
  2. Jul 14, 2014
    • Nick Kralevich's avatar
      Tweak rules for su domain. · 213bb45b
      Nick Kralevich authored
      1) Remove explicit allow statements. Since su is in permmissive,
      there's no need to ever specify allow statements for su.
      
      2) Remove unconfined_domain(su). Su is already permissive, so there's
      no need to join the unconfined domain, and it just makes getting
      rid of unconfined more difficult.
      
      3) Put su into app_domain(). This addresses, in a roundabout sorta
      way, the following denial:
      
        type=1400 audit(0.0:4): avc: denied { setsched } for scontext=u:r:system_server:s0 tcontext=u:r:su:s0 tclass=process permissive=0
      
      which comes up while testing media processes as root. We already put
      the shell user into this domain, so adding su to this domain ensures
      other processes can communicate consistently with su spawned processes.
      
      Bug: 16261280
      Bug: 16298582
      Change-Id: I30b6d3cc186bda737a23c25f4fa2a577c2afd4d7
      213bb45b
    • Nick Kralevich's avatar
      fix system_server dex2oat exec · 8395bb4a
      Nick Kralevich authored
      Addresses the following denial:
      
        W/system_server( 2697): type=1400 audit(0.0:9): avc: denied { execute } for name="dex2oat" dev="mmcblk0p31" ino=118 scontext=u:r:system_server:s0 tcontext=u:object_r:dex2oat_exec:s0 tclass=file permissive=0
      
      Change-Id: I168842b3e281efcb0632049632ed3817c2025e4d
      8395bb4a
    • Riley Spahn's avatar
      Add access control for each service_manager action. · b8511e0d
      Riley Spahn authored
      Add SELinux MAC for the service manager actions list
      and find. Add the list and find verbs to the
      service_manager class. Add policy requirements for
      service_manager to enforce policies to binder_use
      macro.
      
      Change-Id: I224b1c6a6e21e3cdeb23badfc35c82a37558f964
      b8511e0d
  3. Jul 10, 2014
  4. Jul 11, 2014
  5. Jul 10, 2014
  6. Jul 09, 2014
  7. Jul 10, 2014
    • Nick Kralevich's avatar
      allow ueventd sysfs_type lnk_file · 1d2ff869
      Nick Kralevich authored
      ueventd is allowed to change files and directories in /sys,
      but not symbolic links. This is, at a minimum, causing the
      following denial:
      
      type=1400 audit(0.0:5): avc: denied { getattr } for comm="ueventd" path="/sys/devices/tegradc.0/driver" dev=sysfs ino=3386 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_devices_tegradc:s0 tclass=lnk_file
      
      Allow ueventd to modify labeling / attributes of symlinks.
      
      Change-Id: If641a218e07ef479d1283f3171b2743f3956386d
      1d2ff869
    • Nick Kralevich's avatar
      Drop sys_rawio neverallow for tee · b59dc27a
      Nick Kralevich authored
      The new Nexus 5 tee implementation requires raw block I/O
      for anti-rollback protection.
      
      Bug: 15777869
      Change-Id: I57691a9d06b5a51e2699c240783ed56e3a003396
      b59dc27a
    • Nick Kralevich's avatar
      Don't use don't · f5835666
      Nick Kralevich authored
      Single quotes sometimes mess up m4 parsing
      
      Change-Id: Ic53cf0f9b45b2173cbea5c96048750f6a582a535
      f5835666
    • Nick Kralevich's avatar
      ensure that untrusted_app can't set properties · 99d86c7a
      Nick Kralevich authored
      Bug: 10243159
      Change-Id: I9409fe8898c446a33515f1bee2990f36a2e11535
      99d86c7a
    • Colin Cross's avatar
      sepolicy: allow system server to remove cgroups · 5d60f04e
      Colin Cross authored
      Bug: 15313911
      Change-Id: Ib7d39561a0d52632929d063a7ab97b6856f28ffe
      5d60f04e
  8. Jul 09, 2014
  9. Jul 08, 2014
    • Sreeram Ramachandran's avatar
      Allow dumpstate to read the list of routing tables. · d2d172a3
      Sreeram Ramachandran authored
      Change-Id: I55475c08c5e43bcf61af916210e680c47480ac32
      d2d172a3
    • Stephen Smalley's avatar
      Rename sdcard_internal/external types. · 374b2a19
      Stephen Smalley authored
      
      Rename sdcard_internal/external types to fuse and vfat
      respectively to make it clear that they are assigned to any
      fuse or vfat filesystem by default (absent a context= mount option)
      and do not necessarily represent the SDcard.
      
      The sdcard_type attribute is still assigned to both types and
      can still be used in allow rules to permit access to either the
      internal or external SDcard.
      
      Define type aliases for the old names to preserve compatibility
      on policy reload and for device-specific policies that may not yet
      be updated.
      
      Change-Id: I8d91a8c4c1342b94e4f1bb62ca7ffd2ca4b06ba1
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      374b2a19
    • Sreeram Ramachandran's avatar
      Allow netd to create data files in /data/misc/net/. · 65edb75d
      Sreeram Ramachandran authored
      This will be used to populate rt_tables (a mapping from routing table numbers to
      table names) that's read by the iproute2 utilities.
      
      Change-Id: I69deb1a64d5d6647470823405bf0cc55b24b22de
      65edb75d
    • Nick Kralevich's avatar
      recovery: allow read access to fuse filesystem · e9d97b74
      Nick Kralevich authored
      adb sideload depends on the ability to access the fuse
      directory. Flipping recovery into enforcing started triggering
      the following denial:
      
        type=1400 audit(17964905.699:7): avc:  denied  { search } for  pid=132 comm="recovery" name="/" dev="fuse" ino=1 scontext=u:r:recovery:s0 tcontext=u:object_r:sdcard_internal:s0 tclass=dir
      
      Change-Id: I27ee0295fa2e2d0449bfab4f95bfbc076e92cf59
      e9d97b74
    • Nick Kralevich's avatar
      New domain "install_recovery" · 9f6af083
      Nick Kralevich authored
      Create a new domain for the one-shot init service flash_recovery.
      
      This domain is initially in permissive_or_unconfined() for
      testing. Any SELinux denials won't be enforced for now.
      
      Change-Id: I7146dc154a5c78b6f3b4b6fb5d5855a05a30bfd8
      9f6af083
  10. Jul 07, 2014
    • Jeff Sharkey's avatar
      77e85289
    • Jeff Sharkey's avatar
      Rules to allow installing package directories. · be092af0
      Jeff Sharkey authored
      Earlier changes had extended the rules, but some additional changes
      are needed.
      
      avc: denied { relabelfrom } for name="vmdl-723825123.tmp"
          dev="mmcblk0p28" ino=162910 scontext=u:r:system_server:s0
          tcontext=u:object_r:apk_data_file:s0 tclass=dir
      
      Bug: 14975160
      Change-Id: I875cfc3538d4b098d27c7c7b756d1868a54cc976
      be092af0
    • Nick Kralevich's avatar
      recovery: start enforcing SELinux rules · c2ba5ed9
      Nick Kralevich authored
      Start enforcing SELinux rules for recovery. I've been monitoring
      denials, and I haven't seen anything which would indicate a problem.
      We can always roll this back if something goes wrong.
      
      Change-Id: I7d3a147f8b9000bf8181d2aa32520f15f291a6f3
      c2ba5ed9
    • Nick Kralevich's avatar
      fix build. · 3508d611
      Nick Kralevich authored
        libsepol.check_assertion_helper: neverallow on line 166 of external/sepolicy/domain.te (or line 5056 of policy.conf) violated by allow recovery unlabeled:file { create };
        Error while expanding policy
        make: *** [out/target/product/generic/obj/ETC/sepolicy.recovery_intermediates/sepolicy.recovery] Error 1
      
      Change-Id: Iddf2cb8d0de2ab445e54a727f01be0b992b45ba5
      3508d611
    • Nick Kralevich's avatar
      recovery: allow relabelto unlabeled and other unlabeled rules · 558710cd
      Nick Kralevich authored
      The recovery script may ask to label a file with a label not
      known to the currently loaded policy. Allow it.
      
      Addresses the following denials:
      
        avc:  denied  { relabelto } for  pid=143 comm="update_binary" name="vdc" dev="mmcblk0p25" ino=212 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
        avc:  denied  { setattr } for  pid=143 comm="update_binary" name="vdc" dev="mmcblk0p25" ino=212 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
      
      Change-Id: Iafcc7b0b3aaea5a272adb1264233978365648f94
      558710cd
    • Nick Kralevich's avatar
    • Riley Spahn's avatar
      Add neverallow rules further restricing service_manager. · 76206abc
      Riley Spahn authored
      Add a neverallow rule that prevents domain from adding a
      default_android_service. Add a neverallow rule that prevents
      untrusted_app from ever adding a service through
      servicemanager.
      
      Change-Id: I963671fb1224147bb49ec8f0b6be0dcc91c23156
      76206abc
    • Nick Kralevich's avatar
      ueventd: Add policy support for ueventd labeling changes · b8bdfde3
      Nick Kralevich authored
      Currently, ueventd only modifies the SELinux label on a file
      if the entry exists in /ueventd.rc. Add policy support to enable
      an independent restorecon_recursive whenever a uevent message occurs.
      
      Change-Id: I0ccb5395ec0be9282095b844a5022e8c0d8903ac
      b8bdfde3
  11. Jul 02, 2014
  12. Jul 04, 2014
    • Nick Kralevich's avatar
      system_server: bring back sdcard_type neverallow rule · d00eff47
      Nick Kralevich authored
      We had disabled the neverallow rule when system_server was
      in permissive_or_unconfined(), but forgot to reenable it.
      Now that system_server is in enforcing/confined, bring it
      back.
      
      Change-Id: I6f74793d4889e3da783361c4d488b25f804ac8ba
      d00eff47
    • Nick Kralevich's avatar
      Remove -unconfineddomain from neverallow rules · be660697
      Nick Kralevich authored
      Many of the neverallow rules have -unconfineddomain. This was
      intended to allow us to support permissive_or_unconfined(), and
      ensure that all domains were enforcing at least a minimal set of
      rules.
      
      Now that all the app domains are in enforcing / confined, there's
      no need to allow for these exceptions. Remove them.
      
      Change-Id: Ieb29872dad415269f7fc2fe5be5a3d536d292d4f
      be660697
  13. Jul 02, 2014
Loading