1. 08 Jan, 2016 2 commits
    • Jeff Vander Stoep's avatar
      grant appdomain rw perms to tun_device · 2b935cd7
      Jeff Vander Stoep authored
      Previously granted to only untrusted_app, allow all apps except
      isolated_app read write permissions to tun_device.
      
      avc: denied { read write } for path="/dev/tun" dev="tmpfs" ino=8906 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:tun_device:s0 tclass=chr_file
      
      Bug: 26462997
      Change-Id: Id6f5b09cda26dc6c8651eb76f6791fb95640e4c7
      2b935cd7
    • Johan Redestig's avatar
      Neverallow isolated and untrusted apps to write system properties · 0d8e9adf
      Johan Redestig authored
      and as a consequence open up for other appdomains (e.g. platform_app)
      to write system properties.
      
      Change-Id: Ie6ad4d17247165564456e5b0d78f705a82cdcde7
      0d8e9adf
  2. 06 Jan, 2016 1 commit
    • Jeff Vander Stoep's avatar
      untrusted_app: remove mtp_device perms · 956ca4c5
      Jeff Vander Stoep authored
      No longer necessary after android.process.media moved to the
      priv_app domain. Verified no new denials via audit2allow rule.
      
      Bug: 25085347
      Change-Id: I2d9498d5d92e79ddabd002b4a5c6f918e1eb9bcc
      956ca4c5
  3. 04 Jan, 2016 1 commit
    • Felipe Leme's avatar
      Creates a new permission for /cache/recovery · 549ccf77
      Felipe Leme authored
      This permission was created mostly for dumpstate (so it can include
      recovery files on bugreports when an OTA fails), but it was applied to
      uncrypt and recovery as well (since it had a wider access before).
      
      Grant access to cache_recovery_file where we previously granted access
      to cache_file. Add auditallow rules to determine if this is really
      needed.
      
      BUG: 25351711
      Change-Id: I07745181dbb4f0bde75694ea31b3ab79a4682f18
      549ccf77
  4. 18 Dec, 2015 1 commit
    • Nick Kralevich's avatar
      neverallow debugfs access · 96b1c9ca
      Nick Kralevich authored
      Don't allow access to the generic debugfs label. Instead, force
      relabeling to a more specific type. system_server and dumpstate
      are excluded from this until I have time to fix them.
      
      Tighten up the neverallow rules for untrusted_app. It should never
      be reading any file on /sys/kernel/debug, regardless of the label.
      
      Change-Id: Ic7feff9ba3aca450f1e0b6f253f0b56c7918d0fa
      96b1c9ca
  5. 08 Dec, 2015 2 commits
  6. 03 Dec, 2015 1 commit
    • Jeff Vander Stoep's avatar
      Further restrict access to tun_device · e555f4b9
      Jeff Vander Stoep authored
      Remove bluetooth's access to tun_device. Auditallow rule demonstrates
      that it's not used.
      
      Strengthen the neverallow on opening tun_device to include all Apps.
      
      Bug: 24744295
      Change-Id: Iba85ba016b1e24c6c12d5b33e46fe8232908aac1
      e555f4b9
  7. 03 Nov, 2015 1 commit
    • Jeff Vander Stoep's avatar
      Create attribute for moving perms out of domain · d22987b4
      Jeff Vander Stoep authored
      Motivation: Domain is overly permissive. Start removing permissions
      from domain and assign them to the domain_deprecated attribute.
      Domain_deprecated and domain can initially be assigned to all
      domains. The goal is to not assign domain_deprecated to new domains
      and to start removing domain_deprecated where it is not required or
      reassigning the appropriate permissions to the inheriting domain
      when necessary.
      
      Bug: 25433265
      Change-Id: I8b11cb137df7bdd382629c98d916a73fe276413c
      d22987b4
  8. 23 Oct, 2015 2 commits
    • Jeff Vander Stoep's avatar
      audit untrusted_app access to mtp_device · 7b8f9f15
      Jeff Vander Stoep authored
      android.process.media moved to priv_app. Add audit rule to test if
      untrusted_app still requires access or if some/all permissions may
      be removed.
      
      Bug: 25085347
      Change-Id: I13bae9c09bd1627b2c06ae84b069778984f9bd5d
      7b8f9f15
    • Jeff Vander Stoep's avatar
      Temporarily downgrade to policy version number · 0fc831c3
      Jeff Vander Stoep authored
      Temporarily move from policy version 30 to 29 until device kernels
      and prebuilts are all upgraded to the accepted upstream version of
      the selinux ioctl command whitelisting code.
      
      (cherry picked from commit 89765083)
      
      Bug: 22846070
      
      Change-Id: I31d1e80aaee164cf41a2f01c6ca846a000898ef4
      0fc831c3
  9. 19 Oct, 2015 2 commits
  10. 16 Oct, 2015 1 commit
    • Jeff Vander Stoep's avatar
      Remove untrusted_app access to cache · 68748c21
      Jeff Vander Stoep authored
      neverallow access to untrusted_app and isolated app
      
      Access to cache is a system|signature permission. Only
      priv/system/platform apps should be allowed access.
      
      Change-Id: I7ebd38ce6d39950e74c0a164479bc59e694c852d
      68748c21
  11. 14 Oct, 2015 1 commit
    • Jeff Vander Stoep's avatar
      Remove permissions for untrusted_app · 0d186fcf
      Jeff Vander Stoep authored
      Privileged apps now run in the priv_app domain. Remove permissions
      from untrusted_app that were originaly added for GMS core, Finsky, and
      Play store.
      
      Bug: 22033466
      Change-Id: Ibdce72ad629bfab47de92ac19542e8902e02c8be
      0d186fcf
  12. 13 Oct, 2015 1 commit
    • Nick Kralevich's avatar
      Remove ptrace from app.te · de11f501
      Nick Kralevich authored
      Remove ptrace from app.te, and only add it to the app domains
      which explicitly require it.
      
      Change-Id: I327aabd154ae07ce90e3529dee2b324ca125dd16
      de11f501
  13. 07 Oct, 2015 1 commit
    • Jeff Vander Stoep's avatar
      Do not allow untrusted_app to open tun_device · de53051a
      Jeff Vander Stoep authored
      Third party vpn apps must receive open tun fd from the framework
      for device traffic.
      
      neverallow untrusted_app open perm and auditallow bluetooth
      access to see if the neverallow rule can be expanded to include
      all of appdomain.
      
      Bug: 24677682
      Change-Id: I68685587228a1044fe1e0f96d4dc08c2adbebe78
      de53051a
  14. 10 Sep, 2015 1 commit
    • dcashman's avatar
      Allow untrusted_app to list services. · 0b764ae9
      dcashman authored
      CTS relies on the ability to see all services on the system to make sure
      the dump permission is properly enforced on all services.  Allow this.
      
      Bug: 23476772
      Change-Id: I144b825c3a637962aaca59565c9f567953a866e8
      0b764ae9
  15. 29 Jul, 2015 1 commit
  16. 28 Jul, 2015 2 commits
  17. 05 Jun, 2015 1 commit
    • Jeff Vander Stoep's avatar
      restrict app access to socket ioctls · de9b5301
      Jeff Vander Stoep authored
      Create a macro of unprivileged ioctls including
      - All common socket ioctls except MAC address
      - All wireless extensions ioctls except get/set ESSID
      - Some commonly used tty ioctls
      
      Bug: 21657002
      Change-Id: Ib08be9cb70d08c1fa2c8bddbae519e7c2df5293c
      de9b5301
  18. 19 May, 2015 1 commit
    • Jeff Sharkey's avatar
      Allow MediaProvider to traverse /mnt/media_rw. · 6e1f405c
      Jeff Sharkey authored
      As an optimization, platform components like MediaProvider may choose
      to shortcut past the FUSE daemon and return open file descriptors
      directly pointing at the underlying storage device.
      
      Now that we have a specific label for /mnt/media_rw, we need to grant
      search access to untrusted apps like MediaProvider.  The actual
      access control is still managed by POSIX permissions on that
      directory.
      
      avc: denied { search } for name="media_rw" dev="tmpfs" ino=4150 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0
      
      Bug: 21017105
      Change-Id: I6d51939668b39b43b91b1f0c24c98bc2205bf511
      6e1f405c
  19. 15 May, 2015 1 commit
  20. 13 May, 2015 1 commit
  21. 06 May, 2015 2 commits
  22. 05 May, 2015 1 commit
  23. 29 Apr, 2015 2 commits
    • Alex Klyubin's avatar
      Expand access to gatekeeperd. · ab5cf668
      Alex Klyubin authored
      This enables access to gatekeeperd for anybody who invokes Android
      framework APIs. This is necessary because the AndroidKeyStore
      abstraction offered by the framework API occasionally communicates
      with gatekeeperd from the calling process.
      
      (cherry picked from commit effcac7d)
      
      Bug: 20526234
      Change-Id: I450242cd085259b3f82f36f359ee65ff27bebd13
      ab5cf668
    • Alex Klyubin's avatar
      Expand access to gatekeeperd. · effcac7d
      Alex Klyubin authored
      This enables access to gatekeeperd for anybody who invokes Android
      framework APIs. This is necessary because the AndroidKeyStore
      abstraction offered by the framework API occasionally communicates
      with gatekeeperd from the calling process.
      
      Bug: 20526234
      Change-Id: I3362ba07d1a7e5f1c47fe7e9ba6aec5ac3fec747
      effcac7d
  24. 18 Apr, 2015 1 commit
  25. 09 Apr, 2015 1 commit
    • dcashman's avatar
      Enforce more specific service access. · bd7f5803
      dcashman authored
      Move the remaining services from tmp_system_server_service to appropriate
      attributes and remove tmp_system_server and associated logging:
      
      registry
      restrictions
      rttmanager
      scheduling_policy
      search
      sensorservice
      serial
      servicediscovery
      statusbar
      task
      textservices
      telecom_service
      trust_service
      uimode
      updatelock
      usagestats
      usb
      user
      vibrator
      voiceinteraction
      wallpaper
      webviewupdate
      wifip2p
      wifi
      window
      
      Bug: 18106000
      Change-Id: Ia0a6d47099d82c53ba403af394537db6fbc71ca0
      bd7f5803
  26. 08 Apr, 2015 1 commit
    • dcashman's avatar
      Enforce more specific service access. · 03a6f64f
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      network_management
      network_score
      notification
      package
      permission
      persistent
      power
      print
      processinfo
      procstats
      
      Bug: 18106000
      Change-Id: I9dfb41fa41cde72ef0059668410a2e9eb1af491c
      03a6f64f
  27. 07 Apr, 2015 3 commits
    • dcashman's avatar
      Enforce more specific service access. · 91b7c67d
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      jobscheduler
      launcherapps
      location
      lock_settings
      media_projection
      media_router
      media_session
      mount
      netpolicy
      netstats
      
      Bug: 18106000
      Change-Id: Ia82d475ec41f658851f945173c968f4abf57e7e1
      91b7c67d
    • dcashman's avatar
      Enforce more specific service access. · 3cc6fc5f
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      diskstats
      display
      dreams
      dropbox
      ethernet
      fingerprint
      graphicstats
      hardware
      hdmi_control
      input_method
      input_service
      
      Bug: 18106000
      Change-Id: Iadd8aab9e78d9d39fb00cf0b5a95fa1927d02095
      3cc6fc5f
    • dcashman's avatar
      Enforce more specific service access. · d4c78f4b
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      battery
      bluetooth_manager
      clipboard
      commontime_management
      connectivity
      content
      country_detector
      device_policy
      deviceidle
      
      Bug: 18106000
      Change-Id: I0d0f2a075c0509a783631d88ba453ac13399cdf2
      d4c78f4b
  28. 06 Apr, 2015 1 commit
    • dcashman's avatar
      Assign app_api_service attribute to services. · 4cdea7fc
      dcashman authored
      Assign the alarm, appwidget, assetatlas, audio, backup and batterystats services
      the appropriate service access levels and move into enforcing.
      
      Bug: 18106000
      Change-Id: If3210bb25f3076edfdb6eec36ef6521ace1bd8d7
      4cdea7fc
  29. 03 Apr, 2015 2 commits
    • dcashman's avatar
      Assign app_api_service attribute to services. · b075338d
      dcashman authored
      Move accessibility, account, appops and activity services into enforcing with
      app_api_service level of access, with additional grants to mediaserver and
      isolated app.
      
      Bug: 18106000
      Change-Id: I1d5a79b9223026415f1690e8e9325ec4c270e3dd
      b075338d
    • dcashman's avatar
      Add system_api_service and app_api_service attributes. · d12993f0
      dcashman authored
      System services differ in designed access level.  Add attributes reflecting this
      distinction and label services appropriately.  Begin moving access to the newly
      labeled services by removing them from tmp_system_server_service into the newly
      made system_server_service attribute.  Reflect the move of system_server_service
      from a type to an attribute by removing access to system_server_service where
      appropriate.
      
      Change-Id: I7fd06823328daaea6d6f96e4d6bd00332382230b
      d12993f0
  30. 01 Apr, 2015 1 commit
    • dcashman's avatar
      Record observed service accesses. · 8af4e9cb
      dcashman authored
      Get ready to switch system_server service lookups into enforcing.
      
      Bug: 18106000
      Change-Id: Iefd4b2eee6cdd680f5ab423d15cc72a2a30e27cf
      8af4e9cb