Skip to content
Snippets Groups Projects
  1. Jul 10, 2014
  2. Jul 09, 2014
  3. Jul 08, 2014
    • Sreeram Ramachandran's avatar
      Allow dumpstate to read the list of routing tables. · d2d172a3
      Sreeram Ramachandran authored
      Change-Id: I55475c08c5e43bcf61af916210e680c47480ac32
      d2d172a3
    • Sreeram Ramachandran's avatar
      Allow netd to create data files in /data/misc/net/. · 65edb75d
      Sreeram Ramachandran authored
      This will be used to populate rt_tables (a mapping from routing table numbers to
      table names) that's read by the iproute2 utilities.
      
      Change-Id: I69deb1a64d5d6647470823405bf0cc55b24b22de
      65edb75d
    • Nick Kralevich's avatar
      recovery: allow read access to fuse filesystem · e9d97b74
      Nick Kralevich authored
      adb sideload depends on the ability to access the fuse
      directory. Flipping recovery into enforcing started triggering
      the following denial:
      
        type=1400 audit(17964905.699:7): avc:  denied  { search } for  pid=132 comm="recovery" name="/" dev="fuse" ino=1 scontext=u:r:recovery:s0 tcontext=u:object_r:sdcard_internal:s0 tclass=dir
      
      Change-Id: I27ee0295fa2e2d0449bfab4f95bfbc076e92cf59
      e9d97b74
    • Nick Kralevich's avatar
      New domain "install_recovery" · 9f6af083
      Nick Kralevich authored
      Create a new domain for the one-shot init service flash_recovery.
      
      This domain is initially in permissive_or_unconfined() for
      testing. Any SELinux denials won't be enforced for now.
      
      Change-Id: I7146dc154a5c78b6f3b4b6fb5d5855a05a30bfd8
      9f6af083
  4. Jul 07, 2014
    • Jeff Sharkey's avatar
      77e85289
    • Jeff Sharkey's avatar
      Rules to allow installing package directories. · be092af0
      Jeff Sharkey authored
      Earlier changes had extended the rules, but some additional changes
      are needed.
      
      avc: denied { relabelfrom } for name="vmdl-723825123.tmp"
          dev="mmcblk0p28" ino=162910 scontext=u:r:system_server:s0
          tcontext=u:object_r:apk_data_file:s0 tclass=dir
      
      Bug: 14975160
      Change-Id: I875cfc3538d4b098d27c7c7b756d1868a54cc976
      be092af0
    • Nick Kralevich's avatar
      recovery: start enforcing SELinux rules · c2ba5ed9
      Nick Kralevich authored
      Start enforcing SELinux rules for recovery. I've been monitoring
      denials, and I haven't seen anything which would indicate a problem.
      We can always roll this back if something goes wrong.
      
      Change-Id: I7d3a147f8b9000bf8181d2aa32520f15f291a6f3
      c2ba5ed9
    • Nick Kralevich's avatar
      fix build. · 3508d611
      Nick Kralevich authored
        libsepol.check_assertion_helper: neverallow on line 166 of external/sepolicy/domain.te (or line 5056 of policy.conf) violated by allow recovery unlabeled:file { create };
        Error while expanding policy
        make: *** [out/target/product/generic/obj/ETC/sepolicy.recovery_intermediates/sepolicy.recovery] Error 1
      
      Change-Id: Iddf2cb8d0de2ab445e54a727f01be0b992b45ba5
      3508d611
    • Nick Kralevich's avatar
      recovery: allow relabelto unlabeled and other unlabeled rules · 558710cd
      Nick Kralevich authored
      The recovery script may ask to label a file with a label not
      known to the currently loaded policy. Allow it.
      
      Addresses the following denials:
      
        avc:  denied  { relabelto } for  pid=143 comm="update_binary" name="vdc" dev="mmcblk0p25" ino=212 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
        avc:  denied  { setattr } for  pid=143 comm="update_binary" name="vdc" dev="mmcblk0p25" ino=212 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
      
      Change-Id: Iafcc7b0b3aaea5a272adb1264233978365648f94
      558710cd
    • Nick Kralevich's avatar
    • Riley Spahn's avatar
      Add neverallow rules further restricing service_manager. · 76206abc
      Riley Spahn authored
      Add a neverallow rule that prevents domain from adding a
      default_android_service. Add a neverallow rule that prevents
      untrusted_app from ever adding a service through
      servicemanager.
      
      Change-Id: I963671fb1224147bb49ec8f0b6be0dcc91c23156
      76206abc
    • Nick Kralevich's avatar
      ueventd: Add policy support for ueventd labeling changes · b8bdfde3
      Nick Kralevich authored
      Currently, ueventd only modifies the SELinux label on a file
      if the entry exists in /ueventd.rc. Add policy support to enable
      an independent restorecon_recursive whenever a uevent message occurs.
      
      Change-Id: I0ccb5395ec0be9282095b844a5022e8c0d8903ac
      b8bdfde3
  5. Jul 02, 2014
  6. Jul 04, 2014
    • Nick Kralevich's avatar
      system_server: bring back sdcard_type neverallow rule · d00eff47
      Nick Kralevich authored
      We had disabled the neverallow rule when system_server was
      in permissive_or_unconfined(), but forgot to reenable it.
      Now that system_server is in enforcing/confined, bring it
      back.
      
      Change-Id: I6f74793d4889e3da783361c4d488b25f804ac8ba
      d00eff47
    • Nick Kralevich's avatar
      Remove -unconfineddomain from neverallow rules · be660697
      Nick Kralevich authored
      Many of the neverallow rules have -unconfineddomain. This was
      intended to allow us to support permissive_or_unconfined(), and
      ensure that all domains were enforcing at least a minimal set of
      rules.
      
      Now that all the app domains are in enforcing / confined, there's
      no need to allow for these exceptions. Remove them.
      
      Change-Id: Ieb29872dad415269f7fc2fe5be5a3d536d292d4f
      be660697
  7. Jul 02, 2014
  8. Jul 01, 2014
  9. Jun 30, 2014
    • Riley Spahn's avatar
      Remove catchall for unregistered services. · 28b71808
      Riley Spahn authored
      Remove the allow rule for default services in
      binderservicedomain.te so we will need to whitelist any
      services to be registered.
      
      Change-Id: Ibca98b96a3c3a2cbb3722dd33b5eb52cb98cb531
      28b71808
  10. Jun 26, 2014
  11. Jun 30, 2014
    • Sérgio Faria's avatar
      Allow setopt on bluetooth's unix_stream_socket. · 536ddba8
      Sérgio Faria authored
      
      This is extremely useful as it allows timeouts on the socket.
      Since ioctl is allowed, setopt shouldn't be a problem.
      
      Resolves denials, in 3rd party apps, such as:
      
      avc:  denied  { setopt } for  pid=18107 comm="AudioRouter-6"
      scontext=u:r:untrusted_app:s0 tcontext=u:r:bluetooth:s0
      tclass=unix_stream_socket
      
      Change-Id: I6f38d7b86983c517575b735f43b62a2ed811e81c
      Signed-off-by: default avatarSérgio Faria <sergio91pt@gmail.com>
      536ddba8
  12. Jun 27, 2014
    • Nick Kralevich's avatar
      isolated_app: allow app_data_file execute · ad891591
      Nick Kralevich authored
      Chrome renderer processes dlopen() a shared library from
      gmscore. Open and read on app data file is already allowed,
      but execute isn't, so the dlopen() fails. This is a regression
      from K, where the dlopen succeeded.
      
      Longer term, there's questions about whether this is appropriate
      behavior for an isolated app. For now, allow the behavior.
      See the discussion in b/15902433 for details.
      
      Addresses the following denial:
      
        I/auditd  ( 5087): type=1400 audit(0.0:76): avc:  denied  { execute } for  comm="CrRendererMain" path="/data/data/com.google.android.gms/files/libAppDataSearchExt_armeabi_v7a.so" dev="mmcblk0p28" ino=83196 scontext=u:r:isolated_app:s0 tcontext=u:object_r:app_data_file:s0 tclass=file
      
      Bug: 15902433
      Change-Id: Ie98605d43753be8c31a6fe510ef2dde0bdb52678
      ad891591
    • Riley Spahn's avatar
      Preemptively adding services for pending commits. · 182498e8
      Riley Spahn authored
      Adding services to service_contexts for the
      pending commits Icf5997dd6a6ba5e1de675cf5f4334c78c2c037f1
      and Ibe79be30b80c18ec45ff69db7527c7a4adf0ee08.
      
      Change-Id: Ie898866d1ab3abba6211943e87bcec77ba568567
      182498e8
  13. Jun 26, 2014
  14. Jun 25, 2014
    • Nick Kralevich's avatar
      dumpstate: transition into vdc domain · c0d14767
      Nick Kralevich authored
      dumpstate uses vdc to collect asec lists and do a vold dump.
      Force a transition into the vdc domain when this occurs.
      
      Addresses the following denial:
      
        <4>[ 1099.623572] type=1400 audit(1403716545.565:7): avc: denied { execute } for pid=6987 comm="dumpstate" name="vdc" dev="mmcblk0p8" ino=222 scontext=u:r:dumpstate:s0 tcontext=u:object_r:vdc_exec:s0 tclass=file permissive=0
      
      Change-Id: I4bd9f3ad83480f8c9f9843ffe136295c582f96fe
      c0d14767
    • Nick Kralevich's avatar
      Allow system_server to read all /proc files · 8c6552ac
      Nick Kralevich authored
      system_server scans through /proc to keep track of process
      memory and CPU usage. It needs to do this for all processes,
      not just appdomain processes, to properly account for CPU and
      memory usage.
      
      Allow it.
      
      Addresses the following errors which have been showing up
      in logcat:
      
        W/ProcessCpuTracker(12159): Skipping unknown process pid 1
        W/ProcessCpuTracker(12159): Skipping unknown process pid 2
        W/ProcessCpuTracker(12159): Skipping unknown process pid 3
      
      Bug: 15862412
      Change-Id: I0a75314824404e060c6914c06a371f2ff2e80512
      8c6552ac
Loading