Skip to content
Snippets Groups Projects
  1. Oct 29, 2015
    • Nick Kralevich's avatar
      Create a new SELinux type for /data/nativetest · e9d261ff
      Nick Kralevich authored
      1) Don't use the generic "system_data_file" for the files in /data/nativetest.
      Rather, ensure it has it's own special label. This allows us to distinguish
      these files from other files in SELinux policy.
      
      2) Allow the shell user to execute files from /data/nativetest, on
      userdebug or eng builds only.
      
      3) Add a neverallow rule (compile time assertion + CTS test) that nobody
      is allowed to execute these files on user builds, and only the shell user
      is allowed to execute these files on userdebug/eng builds.
      
      Bug: 25340994
      Change-Id: I3e292cdd1908f342699d6c52f8bbbe6065359413
      e9d261ff
  2. Oct 28, 2015
    • Nick Kralevich's avatar
      Update text relocation neverallow assertions · 89424bf9
      Nick Kralevich authored
      1) Don't allow any SELinux domain to attempt to perform a text
      relocation on a file from the /system partition. It's not supported
      and should never be attempted.
      
      2) Completely block any non-app SELinux domains from using text
      relocations, regardless of the source.
      
      Bug: 20013628
      Change-Id: I82573398d0d5586264a717a1e400a3dbc7793fe3
      89424bf9
  3. Oct 27, 2015
    • Bruce Beare's avatar
      Define the i2C device policy · 59019fd7
      Bruce Beare authored
      
      Change-Id: I93d9cfea2f2148bb042d1cb8af3649524ad31034
      Signed-off-by: default avatarBruce Beare <bruce.j.beare@intel.com>
      59019fd7
    • Jeff Vander Stoep's avatar
      Fix MTP sync · 9ba8ade5
      Jeff Vander Stoep authored
      Address the following denial:
      avc: denied { use } for path="/storage/emulated/0/305512.pdf" dev="fuse"
      ino=239 scontext=u:r:kernel:s0 tcontext=u:r:priv_app:s0:c512,c768 tclass=fd
      permissive=0
      
      Bug: 25068662
      Change-Id: Ic29d9569ff387dfd411363db751c3642572c8e85
      9ba8ade5
  4. Oct 23, 2015
    • Jeff Vander Stoep's avatar
      audit untrusted_app access to mtp_device · 7b8f9f15
      Jeff Vander Stoep authored
      android.process.media moved to priv_app. Add audit rule to test if
      untrusted_app still requires access or if some/all permissions may
      be removed.
      
      Bug: 25085347
      Change-Id: I13bae9c09bd1627b2c06ae84b069778984f9bd5d
      7b8f9f15
    • Jeff Vander Stoep's avatar
      Temporarily downgrade to policy version number · 0fc831c3
      Jeff Vander Stoep authored
      Temporarily move from policy version 30 to 29 until device kernels
      and prebuilts are all upgraded to the accepted upstream version of
      the selinux ioctl command whitelisting code.
      
      (cherry picked from commit 89765083)
      
      Bug: 22846070
      
      Change-Id: I31d1e80aaee164cf41a2f01c6ca846a000898ef4
      0fc831c3
  5. Oct 19, 2015
    • Jeffrey Vander Stoep's avatar
      1b52ad6b
    • Jeff Vander Stoep's avatar
      grant priv_app access to /dev/mtp_usb · bcbb32e7
      Jeff Vander Stoep authored
      android.process.media needs access to mtp_usb when MTP is enabled.
      
      Bug: 25074672
      Change-Id: Ic48a3ba8e4395104b0b957f7a9bad69f0e5ee38e
      bcbb32e7
    • Jeff Vander Stoep's avatar
      Remove untrusted_app access to tmp apk files · a910a287
      Jeff Vander Stoep authored
      Verifier has moved to the priv_app domain. Neverallow app domain
      access to tmp apk files with exceptions for platform and priv app
      domains.
      
      Change-Id: I68a2fa39ebc7dc0bfa278fe7d092655f21a5225d
      a910a287
    • Jeffrey Vander Stoep's avatar
      f1203bf0
    • Jeff Vander Stoep's avatar
      Policy for priv_app domain · 7f09a945
      Jeff Vander Stoep authored
      Verifier needs access to apk files.
      avc: denied { search } for pid=11905 comm="ackageinstaller" name="vmdl2040420713.tmp" dev="dm-2" ino=13647 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:apk_tmp_file:s0 tclass=dir permissive=0
      
      Give bluetooth_manager_service and trust_service the app_api_service
      attribute.
      avc:  denied  { find } for service=bluetooth_manager pid=7916 uid=10058 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:bluetooth_manager_service:s0 tclass=service_manager permissive=0
      avc:  denied  { find } for service=trust pid=25664 uid=10069 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=0
      
      Bug: 25066911
      Change-Id: I6be695546f8a951e3329c1ec412936b8637e5835
      7f09a945
  6. Oct 17, 2015
    • Jeff Vander Stoep's avatar
      Give services app_api_service attribute · 734e4d7c
      Jeff Vander Stoep authored
      avc:  denied  { find } for service=network_management pid=4503 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:network_management_service:s0 tclass=service_manager
      avc:  denied  { find } for service=netstats pid=4503 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=0
      
      Bug: 25022496
      Change-Id: Ib6eac76b680fed3eca7e4942c6b0e375f12b6496
      734e4d7c
  7. Oct 16, 2015
  8. Oct 15, 2015
  9. Oct 14, 2015
  10. Oct 13, 2015
    • Nick Kralevich's avatar
      Remove ptrace from app.te · de11f501
      Nick Kralevich authored
      Remove ptrace from app.te, and only add it to the app domains
      which explicitly require it.
      
      Change-Id: I327aabd154ae07ce90e3529dee2b324ca125dd16
      de11f501
  11. Oct 10, 2015
  12. Oct 08, 2015
    • Johan Redestig's avatar
      Allow bluetooth to find the drmservice · 32e5e31a
      Johan Redestig authored
      Address the following denial:
        SELinux  E  avc:  denied  { find } for service=drm.drmManager scontext=u:r:bluetooth:s0 tcontext=u:object_r:drmserver_service:s0
      
      This denial is triggered by Bluetooth when MmsFileProvider.java is
      using the PduPersister which in turn is using DRM.
      
      Change-Id: I4c077635f8afa39e6bc5e10178c3a7ae3cb6a9ea
      32e5e31a
  13. Oct 07, 2015
    • Nick Kralevich's avatar
      delete procrank SELinux domain. · 9e6effa1
      Nick Kralevich authored
      Simplify SELinux policy by deleting the procrank SELinux domain.
      procrank only exists on userdebug/eng builds, and anyone wanting
      to run procrank can just su to root.
      
      Bug: 18342188
      Change-Id: I71adc86a137c21f170d983e320ab55be79457c16
      9e6effa1
    • Jeff Vander Stoep's avatar
      Do not allow untrusted_app to open tun_device · de53051a
      Jeff Vander Stoep authored
      Third party vpn apps must receive open tun fd from the framework
      for device traffic.
      
      neverallow untrusted_app open perm and auditallow bluetooth
      access to see if the neverallow rule can be expanded to include
      all of appdomain.
      
      Bug: 24677682
      Change-Id: I68685587228a1044fe1e0f96d4dc08c2adbebe78
      de53051a
    • David Zeuthen's avatar
      Move update_engine policy to AOSP. · a10f789d
      David Zeuthen authored
      The update_engine daemon from Brillo is expected to be used also in
      Android so move its selinux policy to AOSP.
      
      Put update_engine in the whitelist (currently only has the recovery
      there) allowing it to bypass the notallow for writing to partititions
      labeled as system_block_device.
      
      Also introduce the misc_block_device dev_type as update_engine in some
      configurations may need to read/write the misc partition. Start
      migrating uncrypt to use this instead of overly broad
      block_device:blk_file access.
      
      Bug: 23186405
      Test: Manually tested with Brillo build.
      
      Change-Id: Icf8cdb4133d4bbdf14bacc6c0fa7418810ac307a
      a10f789d
  14. Oct 06, 2015
    • Nick Kralevich's avatar
      remove "allow vold block_device:blk_file create_file_perms;" · 7e86e19d
      Nick Kralevich authored
      vold hasn't use the generic "block_device" label since
      commit 273d7ea4 (Sept 2014), and
      the auditallow statement in vold hasn't triggered since that time.
      
      Remove the rule which allows vold access to the generic block_device
      label, and remove the vold exception.
      
      Thanks to jorgelo for reminding me about this.
      
      Change-Id: Idd6cdc20f5be9a40c5c8f6d43bbf902a475ba1c9
      7e86e19d
  15. Oct 03, 2015
  16. Oct 01, 2015
Loading