1. 27 May, 2016 2 commits
    • Nick Kralevich's avatar
      Remove generic socket access from untrusted processes · abf0663e
      Nick Kralevich authored
      SELinux defines various classes for various socket types, including
      tcp_socket, udp_socket, rawip_socket, netlink_socket, etc. Socket
      classes not known to the SELinux kernel code get lumped into the generic
      "socket" class. In particular, this includes the AF_MSM_IPC socket
      class.
      
      Bluetooth using apps were granted access to this generic socket class at
      one point in 2012. In 16011320,
      a TODO was added indicating that this access was likely unnecessary. In
      cb835a28, an auditallow was added to
      test to see if this rule was actually used, and in master branch
      d0113ae0, this rule was completely
      deleted.
      
      Revoke access to the generic socket class for isolated_app,
      untrusted_app, and shell for older Android releases. This is
      conceptually a backport of d0113ae0, but
      affecting fewer domains to avoid potential breakage.
      
      Add a neverallow rule asserting that this rule isn't present for the
      untrusted domains. Contrary to our usual conventions, the neverallow
      rule is placed in bluetooth.te, to avoid merge conflicts and simplify
      patching.
      
      Bug: 28612709
      Bug: 25768265
      Change-Id: Ibfbb67777e448784bb334163038436f3c4dc1b51
      abf0663e
    • Jeff Vander Stoep's avatar
      Further restrict socket ioctls available to apps · 556bb0f5
      Jeff Vander Stoep authored
      Restrict unix_dgram_socket and unix_stream_socket to a whitelist
      for all domains. Remove ioctl permission for netlink_selinux_socket and
      netlink_route_socket for netdomain.
      
      Bug: 28171804
      Bug: 27424603
      Change-Id: I650639115b8179964ae690a39e4766ead0032d2e
      556bb0f5
  2. 27 Feb, 2016 1 commit
  3. 30 Oct, 2015 1 commit
    • dcashman's avatar
      Enable permission checking by binderservicedomain. · 9acda2f3
      dcashman authored
      binderservicedomain services often expose their methods to untrusted
      clients and rely on permission checks for access control.  Allow these
      services to query the permission service for access decisions.
      
      Bug: 25282923
      Change-Id: I39bbef479de3a0df63e0cbca956f3546e13bbb9b
      9acda2f3
  4. 19 Oct, 2015 2 commits
  5. 14 Oct, 2015 3 commits
  6. 15 Sep, 2015 1 commit
  7. 14 Sep, 2015 1 commit
    • Lorenzo Colitti's avatar
      Allow system_server to bind ping sockets. · 16c36f68
      Lorenzo Colitti authored
      This allows NetworkDiagnostics to send ping packets from specific
      source addresses in order to detect reachability problems on the
      reverse path.
      
      This addresses the following denial:
      
      [  209.744636] type=1400 audit(1441805730.510:14): avc: denied { node_bind } for pid=8347 comm="Thread-202" saddr=2400:xxxx:xxxx:xxxx:40b1:7e:a1d7:b3ae scontext=u:r:system_server:s0 tcontext=u:object_r:node:s0 tclass=rawip_socket permissive=0
      
      Bug: 23661687
      
      (cherry picked from commit c3712143)
      
      Change-Id: Ia93c14bc7fec17e2622e1b48bfbf591029d84be2
      16c36f68
  8. 10 Sep, 2015 1 commit
    • dcashman's avatar
      Allow untrusted_app to list services. · 0b764ae9
      dcashman authored
      CTS relies on the ability to see all services on the system to make sure
      the dump permission is properly enforced on all services.  Allow this.
      
      Bug: 23476772
      Change-Id: I144b825c3a637962aaca59565c9f567953a866e8
      0b764ae9
  9. 28 Aug, 2015 28 commits