1. 28 Oct, 2014 1 commit
  2. 23 Oct, 2014 3 commits
  3. 22 Oct, 2014 3 commits
  4. 21 Oct, 2014 5 commits
    • Nick Kralevich's avatar
      remove init_shell · f37d6b57
      Nick Kralevich authored
      This domain was originally intended to be a place to hold rules for
      all init.*.rc shell scripts. However, it's now recommended that every
      init service have it's own SELinux domain, and the use of init_shell
      is to be avoided.
      
      Delete init_shell. No policy is using it anymore, and it's causing
      confusion for people implementing device specific SELinux policy.
      
      Bug: 18062250
      Change-Id: I7c90851784b233443642ea69722f3281fd457621
      f37d6b57
    • Stephen Smalley's avatar
      Remove -unconfineddomain from neverallow rules. · 0d08d472
      Stephen Smalley authored
      
      With the sepolicy-analyze neverallow checking, attribute
      expansion is performed against the device policy and therefore
      we do not want our neverallow rules to exempt domains from
      consideration based on an attribute (e.g. -unconfineddomain).
      Otherwise, device policy could pass the neverallow check just
      by adding more domains to unconfineddomain.  We could of course
      add a CTS test to check the list of unconfineddomains against
      a whitelist, but it seems desirable regardless to narrow these
      neverallow rules to only the specific domains required.
      
      There are three such neverallow rules in current policy: one
      on creating unlabeled files, one on accessing /dev/hw_random, and
      one on accessing a character device without a specific type.  The
      only domain in unconfineddomain that appears to have a legitimate
      need for any of these permissions is the init domain.  Replace
      -unconfineddomain with -init in these neverallow rules, exclude these
      permissions from unconfineddomain, and add these permissions to init if
      not already explicitly allowed.  auditallow accesses by init to files
      and character devices left in the generic device type so we can monitor
      what is being left there, although it is not necessarily a problem unless
      the file or device should be accessible to others.
      
      Change-Id: If6ee1b1a337c834971c6eb21dada5810608babcf
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      0d08d472
    • Nick Kralevich's avatar
      Merge "Allow adbd to write to /data/adb" · 06985b1d
      Nick Kralevich authored
      06985b1d
    • Nick Kralevich's avatar
      Allow adbd to write to /data/adb · 973877db
      Nick Kralevich authored
      adbd writes debugging information to /data/adb
      when persist.adb.trace_mask is set. Allow it.
      
      Bug: https://code.google.com/p/android/issues/detail?id=72895
      Change-Id: Ia5af09045e9f72a95325b429c30a5ae78e104bdc
      973877db
    • Stephen Smalley's avatar
      Remove block_device:blk_file access from fsck. · 3da1ffba
      Stephen Smalley authored
      
      Now that we have assigned specific types to userdata and cache
      block devices, we can remove the ability of fsck to run on other
      block devices.
      
      Change-Id: I8cfb3dc0e4ebe6b73346ff291ecb11397bb0c2d0
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      3da1ffba
  5. 20 Oct, 2014 4 commits
    • Nick Kralevich's avatar
      am beb279c7: allow init swapon() · d0b1a44e
      Nick Kralevich authored
      * commit 'beb279c7':
        allow init swapon()
      d0b1a44e
    • Nick Kralevich's avatar
      allow init swapon() · beb279c7
      Nick Kralevich authored
      swapon(2) requires write access to the underlying block device.
      Allow it.
      
      Addresses the following denial:
      
         avc:  denied  { write } for  pid=1 comm="init" name="zram0" dev="tmpfs" ino=6267 scontext=u:r:init:s0 tcontext=u:object_r:swap_block_device:s0 tclass=blk_file permissive=0
      
      Change-Id: Id1a4f51038d0b6ce7351294698a0ff146d6e4643
      beb279c7
    • Nick Kralevich's avatar
      am 57a17d14: add support for fsck.f2fs · 61027bc5
      Nick Kralevich authored
      * commit '57a17d14':
        add support for fsck.f2fs
      61027bc5
    • Nick Kralevich's avatar
      add support for fsck.f2fs · 57a17d14
      Nick Kralevich authored
      The Nexus 9 uses f2fs for /data. Make sure to properly label
      /system/bin/fsck.f2fs so that the appropriate domain transition occurs.
      Add support for getattr on devpts, required for fsck.f2fs.
      
      Addresses the following denials:
      
        avc:  denied  { execute_no_trans } for  pid=172 comm="init" path="/system/bin/fsck.f2fs" dev="dm-0" ino=272 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
        avc:  denied  { getattr } for  pid=170 comm="fsck.f2fs" path="/dev/pts/0" dev="devpts" ino=3 scontext=u:r:fsck:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1
      
      Change-Id: I34b3f91374d1eb3fb4ba76abce14ff67db259f96
      57a17d14
  6. 18 Oct, 2014 3 commits
  7. 17 Oct, 2014 4 commits
  8. 16 Oct, 2014 5 commits
    • Stephen Smalley's avatar
      Exclude isolated_app from ptrace self. · e9623d8f
      Stephen Smalley authored
      
      Change-Id: I29136a805d2329806afc9d5d81af934a1803d8e0
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      e9623d8f
    • Nick Kralevich's avatar
      Fix compile time / CTS gps_data_files neverallow assertion · 38936af0
      Nick Kralevich authored
      Currently, zygote spawned apps are prohibited from modifying GPS
      data files. If someone tries to allow GPS access to any app domain,
      it generates a compile time / CTS exception.
      
      Relax the rules slightly for system_app. These apps run with UID=system,
      and shouldn't be banned from handling gps data files.
      
      This change doesn't add or remove any SELinux rules. Rather, it just
      relaxes a compile time assertion, allow partners to create SELinux
      rules allowing the access if they desire.
      
      (cherrypick from commit 480374e4)
      
      Bug: 18021422
      Change-Id: Iad0c6a3627efe129246e2c817f6f71d2735eba93
      38936af0
    • Nick Kralevich's avatar
      Fix compile time / CTS gps_data_files neverallow assertion · 480374e4
      Nick Kralevich authored
      Currently, zygote spawned apps are prohibited from modifying GPS
      data files. If someone tries to allow GPS access to any app domain,
      it generates a compile time / CTS exception.
      
      Relax the rules slightly for system_app. These apps run with UID=system,
      and shouldn't be banned from handling gps data files.
      
      This change doesn't add or remove any SELinux rules. Rather, it just
      relaxes a compile time assertion, allow partners to create SELinux
      rules allowing the access if they desire.
      
      Bug: 18021422
      Change-Id: Iad0c6a3627efe129246e2c817f6f71d2735eba93
      480374e4
    • Mark Salyzyn's avatar
      am 664ef57b: logd: Add klogd · a8be8853
      Mark Salyzyn authored
      * commit '664ef57b':
        logd: Add klogd
      a8be8853
    • Mark Salyzyn's avatar
      logd: Add klogd · 664ef57b
      Mark Salyzyn authored
      Change-Id: Ib9bc89b05771a12c6bb9a25cf59ea51afd22ae15
      664ef57b
  9. 15 Oct, 2014 4 commits
    • Robin Lee's avatar
      resolved conflicts for merge of 51bfecf4 to lmp-dev-plus-aosp · 5871d1bc
      Robin Lee authored
      Change-Id: I8ea400354e33a01d3223b4efced6db76ba00aed6
      5871d1bc
    • Robin Lee's avatar
      Pull keychain-data policy out of system-data · 51bfecf4
      Robin Lee authored
      Migrators should be allowed to write to /data/misc/keychain in order
      to remove it. Similarly /data/misc/user should be writable by system
      apps.
      
      TODO: Revoke zygote's rights to read from /data/misc/keychain on
      behalf of some preloaded security classes.
      
      Bug: 17811821
      Change-Id: I9e9c6883cff1dca3755732225404909c16a0e547
      51bfecf4
    • Nick Kralevich's avatar
      am 74bbf703: maybe fix mac build. · ca582ac9
      Nick Kralevich authored
      * commit '74bbf703':
        maybe fix mac build.
      ca582ac9
    • Nick Kralevich's avatar
      maybe fix mac build. · 74bbf703
      Nick Kralevich authored
        1 warning generated.
        external/sepolicy/tools/sepolicy-analyze.c:446:27: error: implicit declaration of function 'isspace' is invalid in C99 [-Werror,-Wimplicit-function-declaration]
                while (p < end && isspace(*p))
                                ^
        1 error generated.
        make: *** [out/host/darwin-x86/obj32/EXECUTABLES/sepolicy-analyze_intermediates/sepolicy-analyze.o] Error 1
        make: *** Waiting for unfinished jobs....
      
      Change-Id: I250dcef7c726d5b66835dc51c057e472b801aa2c
      74bbf703
  10. 14 Oct, 2014 5 commits
  11. 12 Oct, 2014 1 commit
  12. 10 Oct, 2014 2 commits
    • Nick Kralevich's avatar
      am ebfd9f87: allow oemfs:dir search · 4d237292
      Nick Kralevich authored
      * commit 'ebfd9f87':
        allow oemfs:dir search
      4d237292
    • Nick Kralevich's avatar
      allow oemfs:dir search · ebfd9f87
      Nick Kralevich authored
      mediaserver and drmserver both have permission to read oemfs
      related files. However, there are no search permissions on the
      directory, so the files would be unreachable.
      
      Grant search permissions on the oemfs directory, so that the files
      within that directory can be read.
      
      Bug: 17954291
      Change-Id: I9e36dc7b940bd46774753c1fa07b0f47c36ff0db
      ebfd9f87