- 26 May, 2016 1 commit
-
-
Nick Kralevich authored
SELinux defines various classes for various socket types, including tcp_socket, udp_socket, rawip_socket, netlink_socket, etc. Socket classes not known to the SELinux kernel code get lumped into the generic "socket" class. In particular, this includes the AF_MSM_IPC socket class. Bluetooth using apps were granted access to this generic socket class at one point in 2012. In 16011320, a TODO was added indicating that this access was likely unnecessary. In cb835a28, an auditallow was added to test to see if this rule was actually used, and in master branch d0113ae0, this rule was completely deleted. Revoke access to the generic socket class for isolated_app, untrusted_app, and shell for older Android releases. This is conceptually a backport of d0113ae0, but affecting fewer domains to avoid potential breakage. Add a neverallow rule asserting that this rule isn't present for the untrusted domains. Contrary to our usual conventions, the neverallow rule is placed in bluetooth.te, to avoid merge conflicts and simplify patching. Bug: 28612709 Bug: 25768265 Change-Id: Ibfbb67777e448784bb334163038436f3c4dc1b51
-
- 09 Feb, 2015 1 commit
-
-
The Android Automerger authored
-
- 06 Feb, 2015 4 commits
-
-
dcashman authored
Change-Id: I093d7ecf48e9137b974047cd7d0fd2209792b748
-
dcashman authored
Also, divide each sepolicy-analyze function into its own component for simplified command-line parsing and potentially eventual modularization. Bug: 18005561 Cherry-pick of commit: ef4fd306 with commit: 47c14611 squashed in. Bug: 19191637 Change-Id: Id66cad549b7311a6bbd92fd64b6ec2c60d0433a4
-
Nick Kralevich authored
* commit '87f3802a': appdomain: relax netlink_socket neverallow rule
-
dcashman authored
-
- 05 Feb, 2015 2 commits
-
-
Nick Kralevich authored
Relax the neverallow netlink restrictions for app domains. In particular, some non-AOSP app domains may use netlink sockets to communicate with a kernel driver. Continue to neverallow generic netlink sockets for untrusted_app. The intention here is that only app domains which explicitly need this functionality should be able to request it. This change does not add or remove any SELinux rules. Rather, it just changes SELinux compile time assertions, as well as allowing this behavior in CTS. Modify other neverallow rules to use "domain" instead of "self". Apps shouldn't be able to handle netlink sockets, even those created in other SELinux domains. (cherry picked from commit d31936f8) Change-Id: I4763cb0c9510220693c506636dbb7584712b67e2
-
Stephen Smalley authored
See NEVERALLOW CHECKING in tools/README for documentation. Depends on change I45b3502ff96b1d093574e1fecff93a582f8d00bd for libsepol to support reporting all neverallow failures. Cherry-pick of commit: 59906bf8 with build-fix from commit: 74bbf703 added manually. Bug: 19191637 Change-Id: I1c18fa854b3c5f5e05d5dc42d9006c5fdacebdc3 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- 02 Feb, 2015 1 commit
-
-
The Android Automerger authored
-
- 29 Jan, 2015 1 commit
-
-
Nick Kralevich authored
Relax the neverallow netlink restrictions for app domains. In particular, some non-AOSP app domains may use netlink sockets to communicate with a kernel driver. Continue to neverallow generic netlink sockets for untrusted_app. The intention here is that only app domains which explicitly need this functionality should be able to request it. This change does not add or remove any SELinux rules. Rather, it just changes SELinux compile time assertions, as well as allowing this behavior in CTS. Modify other neverallow rules to use "domain" instead of "self". Apps shouldn't be able to handle netlink sockets, even those created in other SELinux domains. (cherry picked from commit d31936f8) Bug: 19198997 Change-Id: Icfed1ee66f082df1117b090341f62981f01bc849
-
- 21 Jan, 2015 1 commit
-
-
The Android Automerger authored
-
- 16 Jan, 2015 1 commit
-
-
Nick Kralevich authored
Chrome team recommends reverting this patch and introducing it into a future version of Android, to avoid potential compatibility issues. This reverts commit 9de62d6f. Bug: 17471434 Bug: 18609318 Change-Id: I3086cb8a8d7142b1eadce622f7e87a4c3426b6bf
-
- 22 Dec, 2014 1 commit
-
-
The Android Automerger authored
-
- 12 Dec, 2014 3 commits
-
-
Nick Kralevich authored
-
Stephen Smalley authored
Addresses denials such as: type=1400 : avc: denied { lock } for comm="PushCheckSendS" path="socket:[1834573]" dev="sockfs" ino=X scontext=u:r:untrusted_app:s0 tcontext=u:r:untrusted_app:s0 tclass=tcp_socket Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov> (cherry picked from commit 2c759185) Bug: 18730521 Change-Id: Ie68955c26ddedb3acd7b7aa18afbf8b35c2c2f78
-
Pawit Pornkitprasan authored
Required for Settings to show name/icon of apps on sd card (permission copied from untrusted_app) Also removed duplicate permission (from domain) in untrusted_app (cherry picked from commit c06ed8f7) Bug: 18730865 Change-Id: I725d088d1d4a1256e3bfe49bc32796a54889f925
-
- 11 Dec, 2014 2 commits
-
-
The Android Automerger authored
-
Brian Carlstrom authored
Bug: 18485243 (cherry picked from commit fc6214bf) Change-Id: I1b9e2705383bd0a3bae75b35906110e490f8785d
-
- 10 Dec, 2014 1 commit
-
-
The Android Automerger authored
-
- 09 Dec, 2014 2 commits
-
-
Patrick Tjin authored
Bug: 18642766 Change-Id: I97d6ab0b76b69d99dcc1928232c8961437e1e68c Signed-off-by:
Patrick Tjin <pattjin@google.com>
-
Santos Cordon authored
Bug: 18112269 Change-Id: I801a3ecb42a2636b15612ff19a55150d06786363
-
- 08 Dec, 2014 1 commit
-
-
Santos Cordon authored
Bug: 18112269 Change-Id: I801a3ecb42a2636b15612ff19a55150d06786363
-
- 04 Dec, 2014 2 commits
-
-
The Android Automerger authored
-
Nick Kralevich authored
The GMS core feedback agent runs as untrusted_app, and needs the ability to read /data/anr/traces.txt to report ANR information. Allow all untrusted_apps to read /data/anr/traces.txt so that GMS core can access it. Longer term, we need to move GMS core into it's own domain, but that's a longer term change. Addresses the following denial: W/ndroid.feedback(17825): type=1400 audit(0.0:68004): avc: denied { read } for name="traces.txt" dev="mmcblk0p28" ino=325762 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:anr_data_file:s0 tclass=file Bug: 18504118 Bug: 18340553 Change-Id: Ia9fac599befc3a3b6e5282be15ec8fd04bb23385
-
- 27 Nov, 2014 1 commit
-
-
The Android Automerger authored
-
- 26 Nov, 2014 1 commit
-
-
Nick Kralevich authored
Dex2oat needs the ability to read from already open file descriptors in /oem so that apps from that location can be installed. Allow it. Addresses the following denials: avc: denied { read } for comm="dex2oat" path="/oem/app/TabletInfo.apk" dev="mmcblk0p12" ino=20 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0 avc: denied { read } for comm="dex2oat" path="/oem/app/AskMe_android_one.apk" dev="mmcblk0p12" ino=14 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0 avc: denied { read } for comm="dex2oat" path="/oem/app/PartnerRegulatoryInfo.apk" dev="mmcblk0p12" ino=19 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0 avc: denied { read } for comm="dex2oat" path="/oem/app/PartnerLauncherProvider.apk" dev="mmcblk0p12" ino=18 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0 avc: denied { read } for comm="dex2oat" path="/oem/app/Amazon_Mobile_com.apk" dev="mmcblk0p12" ino=13 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0 avc: denied { read } for comm="dex2oat" path="/oem/app/PartnerBookmarksProvider.apk" dev="mmcblk0p12" ino=17 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0 avc: denied { read } for comm="dex2oat" path="/oem/app/Hike.apk" dev="mmcblk0p12" ino=15 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0 avc: denied { read } for comm="dex2oat" path="/oem/app/MiLive_embedded_IndiaGames_version4.0_android1.apk" dev="mmcblk0p12" ino=16 scontext=u:r:dex2oat:s0 tcontext=u:object_r:oemfs:s0 tclass=file permissive=0 Bug: 18539205 Change-Id: I92bd91c66befc5a1060dd189324b2c046bba0258
-
- 24 Nov, 2014 1 commit
-
-
The Android Automerger authored
-
- 20 Nov, 2014 1 commit
-
-
The Android Automerger authored
-
- 19 Nov, 2014 3 commits
-
-
dcashman authored
Also, divide each sepolicy-analyze function into its own component for simplified command-line parsing and potentially eventual modularization. Bug: 18005561 Cherry-pick from: https://android-review.googlesource.com/#/c/111626/ Change-Id: I751a99feffe820308ec58514fdba4cdef184d964
-
Nick Kralevich authored
-
Nick Kralevich authored
Some devices leave "ro.build.fingerprint" undefined at build time, since they need to build it from the components at runtime. See https://android.googlesource.com/platform/frameworks/base/+/5568772e8161205b86905d815783505fd3d461d8 for details. Allow system_server to set ro.build.fingerprint Addresses the following denial/error: avc: denied { set } for property=build.fingerprint scontext=u:r:system_server:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service init: sys_prop: permission denied uid:1000 name:ro.build.fingerprint Bug: 18188956 (cherry picked from commit c48971f6) Change-Id: I24bc1b3405f60c9d4e16e5a995e987e54692b6aa
-
- 13 Nov, 2014 2 commits
-
-
Stephen Smalley authored
See NEVERALLOW CHECKING in tools/README for documentation. Depends on change I45b3502ff96b1d093574e1fecff93a582f8d00bd for libsepol to support reporting all neverallow failures. Change-Id: I47c16ccb910ac730c092cb3ab977c59cb8197ce0 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
The Android Automerger authored
-
- 12 Nov, 2014 2 commits
-
-
Jeff Hao authored
Bug: 18035729 Change-Id: Ib60f9cd59a7a185ae99761ad29358a735ae2ad26
- 11 Nov, 2014 2 commits
-
-
The Android Automerger authored
-
- 10 Nov, 2014 3 commits
-
-
Jeff Hao authored
-
Nick Kralevich authored
* commit 'b7934922': allow run-as to access /data/local/tmp
-
Igor Murashkin authored
* zygote needs to be able to symlink from dalvik cache to system to avoid having to copy boot.oat (when the boot.oat file was built with --compile-pic) * dex2oat needs to be able to read the symlink in the dalvik cache (the one that zygote creates) (cherry-picked from AOSP master 83c5612e) Bug: 18035729 (cherry picked from commit f7ccfd00) Change-Id: I5dca27241f46f481515b96e968fb2bef7866c89b
-