- Oct 29, 2015
-
-
dcashman authored
binderservicedomain services often expose their methods to untrusted clients and rely on permission checks for access control. Allow these services to query the permission service for access decisions. (cherry-pick of commit: 32d207e0) Bug: 25282923 Change-Id: I39bbef479de3a0df63e0cbca956f3546e13bbb9b
-
Jeffrey Vander Stoep authored
am: 6fc134e3 * commit '6fc134e3': audit mtp sync permission
-
Jeffrey Vander Stoep authored
-
Nick Kralevich authored
am: e9d261ff * commit 'e9d261ff': Create a new SELinux type for /data/nativetest
-
Nick Kralevich authored
1) Don't use the generic "system_data_file" for the files in /data/nativetest. Rather, ensure it has it's own special label. This allows us to distinguish these files from other files in SELinux policy. 2) Allow the shell user to execute files from /data/nativetest, on userdebug or eng builds only. 3) Add a neverallow rule (compile time assertion + CTS test) that nobody is allowed to execute these files on user builds, and only the shell user is allowed to execute these files on userdebug/eng builds. Bug: 25340994 Change-Id: I3e292cdd1908f342699d6c52f8bbbe6065359413
- Oct 28, 2015
-
-
Jeff Vander Stoep authored
Determine if the following rule can be removed: allow kernel untrusted_app:fd use Bug: 25331459 Change-Id: I4ef9f376d7fc1d2bdfba69b2fb3e24d49ac136ad
-
Nick Kralevich authored
am: 89424bf9 * commit '89424bf9': Update text relocation neverallow assertions
-
Nick Kralevich authored
1) Don't allow any SELinux domain to attempt to perform a text relocation on a file from the /system partition. It's not supported and should never be attempted. 2) Completely block any non-app SELinux domains from using text relocations, regardless of the source. Bug: 20013628 Change-Id: I82573398d0d5586264a717a1e400a3dbc7793fe3
-
- Oct 27, 2015
-
-
Bruce Beare authored
am: 59019fd7 * commit '59019fd7': Define the i2C device policy
-
Bruce Beare authored
Change-Id: I93d9cfea2f2148bb042d1cb8af3649524ad31034 Signed-off-by:
Bruce Beare <bruce.j.beare@intel.com>
-
Jeff Vander Stoep authored
am: 9ba8ade5 * commit '9ba8ade5': Fix MTP sync
-
Jeff Vander Stoep authored
Address the following denial: avc: denied { use } for path="/storage/emulated/0/305512.pdf" dev="fuse" ino=239 scontext=u:r:kernel:s0 tcontext=u:r:priv_app:s0:c512,c768 tclass=fd permissive=0 Bug: 25068662 Change-Id: Ic29d9569ff387dfd411363db751c3642572c8e85
-
- Oct 23, 2015
-
-
Jeff Vander Stoep authored
am: 7b8f9f15 * commit '7b8f9f15': audit untrusted_app access to mtp_device
-
Jeff Vander Stoep authored
am: 0fc831c3 * commit '0fc831c3': Temporarily downgrade to policy version number
-
Jeff Vander Stoep authored
android.process.media moved to priv_app. Add audit rule to test if untrusted_app still requires access or if some/all permissions may be removed. Bug: 25085347 Change-Id: I13bae9c09bd1627b2c06ae84b069778984f9bd5d
-
Jeff Vander Stoep authored
Temporarily move from policy version 30 to 29 until device kernels and prebuilts are all upgraded to the accepted upstream version of the selinux ioctl command whitelisting code. (cherry picked from commit 89765083) Bug: 22846070 Change-Id: I31d1e80aaee164cf41a2f01c6ca846a000898ef4
-
- Oct 19, 2015
-
-
Jeffrey Vander Stoep authored
* commit '1b52ad6b': grant priv_app access to /dev/mtp_usb
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
android.process.media needs access to mtp_usb when MTP is enabled. Bug: 25074672 Change-Id: Ic48a3ba8e4395104b0b957f7a9bad69f0e5ee38e
-
Jeff Vander Stoep authored
* commit 'a910a287': Remove untrusted_app access to tmp apk files
-
Jeff Vander Stoep authored
Change-Id: I7f17a87595a05967879ccc33326eb80d7bd00251
-
Jeff Vander Stoep authored
Verifier has moved to the priv_app domain. Neverallow app domain access to tmp apk files with exceptions for platform and priv app domains. Change-Id: I68a2fa39ebc7dc0bfa278fe7d092655f21a5225d
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
* commit '7f09a945': Policy for priv_app domain
-
Jeff Vander Stoep authored
Verifier needs access to apk files. avc: denied { search } for pid=11905 comm="ackageinstaller" name="vmdl2040420713.tmp" dev="dm-2" ino=13647 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:apk_tmp_file:s0 tclass=dir permissive=0 Give bluetooth_manager_service and trust_service the app_api_service attribute. avc: denied { find } for service=bluetooth_manager pid=7916 uid=10058 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:bluetooth_manager_service:s0 tclass=service_manager permissive=0 avc: denied { find } for service=trust pid=25664 uid=10069 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=0 Bug: 25066911 Change-Id: I6be695546f8a951e3329c1ec412936b8637e5835
-
- Oct 18, 2015
-
-
Jeff Vander Stoep authored
* commit '734e4d7c': Give services app_api_service attribute
-
- Oct 17, 2015
-
-
Jeff Vander Stoep authored
avc: denied { find } for service=network_management pid=4503 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:network_management_service:s0 tclass=service_manager avc: denied { find } for service=netstats pid=4503 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=0 Bug: 25022496 Change-Id: Ib6eac76b680fed3eca7e4942c6b0e375f12b6496
-
- Oct 16, 2015
-
-
Jeffrey Vander Stoep authored
* commit 'b1eced68': grant webviewupdate_service app_api_service attribute
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
avc: denied { find } for service=webviewupdate pid=11399 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:webviewupdate_service:s0 tclass=service_manager permissive=0 Bug: 25018574 Change-Id: I26a7846d1c80c1ab3842813f4148528030b1106a
-
Jeff Vander Stoep authored
neverallow access to untrusted_app and isolated app Access to cache is a system|signature permission. Only priv/system/platform apps should be allowed access. Change-Id: I7ebd38ce6d39950e74c0a164479bc59e694c852d
-
Jeffrey Vander Stoep authored
* commit '63613805': Privileged apps require access to cache
-
Jeffrey Vander Stoep authored
-
- Oct 15, 2015
-
-
Jeff Vander Stoep authored
gmscore uses cache for updates Bug: 24977552 Change-Id: I45a713fcfc70b71a2de712e77b64fb9feab67dd7
-
Nick Kralevich authored
* commit '745b4406': bluetooth.te: Relax bluetooth neverallow rule.
-
Nick Kralevich authored
Bug: 24866874 (cherry picked from commit 33a779fe) Change-Id: I0a9d4a30859b384cb3621c80568ef9da06ad44f6
-
Nick Kralevich authored
* commit '43cd0cce': allow shell self:process ptrace;
-
Nick Kralevich authored
Allow the non-privileged adb shell user to run strace. Without this patch, the command "strace /system/bin/ls" fails with the following error: shell@android:/ $ strace /system/bin/ls strace: ptrace(PTRACE_TRACEME, ...): Permission denied +++ exited with 1 +++ Change-Id: I207fe0f71941bff55dbeb6fe130e636418f333ee
-
Jeffrey Vander Stoep authored
* commit '1d2eaf92': Allow bluetooth to find the drmservice
-