1. 17 Oct, 2014 2 commits
  2. 16 Oct, 2014 4 commits
    • Nick Kralevich's avatar
      Fix compile time / CTS gps_data_files neverallow assertion · 38936af0
      Nick Kralevich authored
      Currently, zygote spawned apps are prohibited from modifying GPS
      data files. If someone tries to allow GPS access to any app domain,
      it generates a compile time / CTS exception.
      
      Relax the rules slightly for system_app. These apps run with UID=system,
      and shouldn't be banned from handling gps data files.
      
      This change doesn't add or remove any SELinux rules. Rather, it just
      relaxes a compile time assertion, allow partners to create SELinux
      rules allowing the access if they desire.
      
      (cherrypick from commit 480374e4)
      
      Bug: 18021422
      Change-Id: Iad0c6a3627efe129246e2c817f6f71d2735eba93
      38936af0
    • Nick Kralevich's avatar
      Fix compile time / CTS gps_data_files neverallow assertion · 480374e4
      Nick Kralevich authored
      Currently, zygote spawned apps are prohibited from modifying GPS
      data files. If someone tries to allow GPS access to any app domain,
      it generates a compile time / CTS exception.
      
      Relax the rules slightly for system_app. These apps run with UID=system,
      and shouldn't be banned from handling gps data files.
      
      This change doesn't add or remove any SELinux rules. Rather, it just
      relaxes a compile time assertion, allow partners to create SELinux
      rules allowing the access if they desire.
      
      Bug: 18021422
      Change-Id: Iad0c6a3627efe129246e2c817f6f71d2735eba93
      480374e4
    • Mark Salyzyn's avatar
      am 664ef57b: logd: Add klogd · a8be8853
      Mark Salyzyn authored
      * commit '664ef57b':
        logd: Add klogd
      a8be8853
    • Mark Salyzyn's avatar
      logd: Add klogd · 664ef57b
      Mark Salyzyn authored
      Change-Id: Ib9bc89b05771a12c6bb9a25cf59ea51afd22ae15
      664ef57b
  3. 15 Oct, 2014 4 commits
    • Robin Lee's avatar
      resolved conflicts for merge of 51bfecf4 to lmp-dev-plus-aosp · 5871d1bc
      Robin Lee authored
      Change-Id: I8ea400354e33a01d3223b4efced6db76ba00aed6
      5871d1bc
    • Robin Lee's avatar
      Pull keychain-data policy out of system-data · 51bfecf4
      Robin Lee authored
      Migrators should be allowed to write to /data/misc/keychain in order
      to remove it. Similarly /data/misc/user should be writable by system
      apps.
      
      TODO: Revoke zygote's rights to read from /data/misc/keychain on
      behalf of some preloaded security classes.
      
      Bug: 17811821
      Change-Id: I9e9c6883cff1dca3755732225404909c16a0e547
      51bfecf4
    • Nick Kralevich's avatar
      am 74bbf703: maybe fix mac build. · ca582ac9
      Nick Kralevich authored
      * commit '74bbf703':
        maybe fix mac build.
      ca582ac9
    • Nick Kralevich's avatar
      maybe fix mac build. · 74bbf703
      Nick Kralevich authored
        1 warning generated.
        external/sepolicy/tools/sepolicy-analyze.c:446:27: error: implicit declaration of function 'isspace' is invalid in C99 [-Werror,-Wimplicit-function-declaration]
                while (p < end && isspace(*p))
                                ^
        1 error generated.
        make: *** [out/host/darwin-x86/obj32/EXECUTABLES/sepolicy-analyze_intermediates/sepolicy-analyze.o] Error 1
        make: *** Waiting for unfinished jobs....
      
      Change-Id: I250dcef7c726d5b66835dc51c057e472b801aa2c
      74bbf703
  4. 14 Oct, 2014 5 commits
  5. 12 Oct, 2014 1 commit
  6. 10 Oct, 2014 4 commits
  7. 06 Oct, 2014 3 commits
  8. 03 Oct, 2014 1 commit
  9. 02 Oct, 2014 5 commits
  10. 01 Oct, 2014 1 commit
    • Nick Kralevich's avatar
      isolated_app: remove app_data_file execute · 94f9ff87
      Nick Kralevich authored
      In commit ad891591, we allowed
      isolated processes to execute files from /data/data/APPNAME.
      
      I'm pretty sure all the necessary linker changes have been made
      so that this functionality isn't required anymore. Remove the
      allow rule.
      
      This is essentially a revert of ad891591.
      
      Change-Id: I1b073916f66f4965dfc53c0ea2b624bbb2fe8816
      94f9ff87
  11. 30 Sep, 2014 7 commits
  12. 29 Sep, 2014 1 commit
  13. 28 Sep, 2014 2 commits
    • Stephen Smalley's avatar
      Do not allow init to execute anything without changing domains. · 8a0c25ef
      Stephen Smalley authored
      
      Remove the ability of init to execute programs from / or /system
      without changing domains.  This forces all helper programs and
      services invoked by init to be assigned their own domain.
      
      Introduce separate domains for running the helper programs
      executed from the fs_mgr library by init.  This requires a domain
      for e2fsck (named fsck for generality) and a domain for running
      mkswap (named toolbox since mkswap is just a symlink to the toolbox
      binary and the domain transition occurs on executing the binary, not
      based on the symlink in any way).
      
      e2fsck is invoked on any partitions marked with the check mount
      option in the fstab file, typically userdata and cache but never
      system.  We allow it to read/write the userdata_block_device and
      cache_block_device types but also allow it to read/write the default
      block_device type until we can get the more specific types assigned
      in all of the device-specific policies.
      
      mkswap is invoked on any swap partition defined in the fstab file.
      We introduce a new swap_block_device type for this purpose, to be
      assigned to any such block devices in the device-specific policies,
      and only allow it to read/write such block devices.  As there seem to be
      no devices in AOSP with swap partitions in their fstab files, this does
      not appear to risk any breakage for existing devices.
      
      With the introduction of these domains, we can de-privilege init to
      only having read access to block devices for mounting filesystems; it
      no longer needs direct write access to such devices AFAICT.
      
      To avoid breaking execution of toolbox by system services, apps, or the shell,
      we allow all domains other than kernel and init the ability to
      run toolbox in their own domain.  This is broader than strictly required;
      we could alternatively only add it to those domains that already had
      x_file_perms to system_file but this would require a coordinated change
      with device-specific policy.
      
      Change-Id: Ib05de2d2bc2781dad48b70ba385577cb855708e4
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      8a0c25ef
    • Stephen Smalley's avatar
      am 54e9bc45: Dependencies for new goldfish service domains. · 95ee35f8
      Stephen Smalley authored
      * commit '54e9bc45':
        Dependencies for new goldfish service domains.
      95ee35f8