Commit graph

6190 commits

Author SHA1 Message Date
Erik Kline
12aac02185 Merge "Permit bluetooth to run DhcpClient" into nyc-dev 2016-02-23 00:05:09 +00:00
Sami Tolvanen
f40afcb1b4 Allow logd.auditd to reboot to safe mode
Bug: 26902605
Change-Id: Ica825cf2af74f5624cf4091544bd24bb5482dbe7
(cherry picked from commit 9c168711d5)
2016-02-22 13:57:59 -08:00
Jeffrey Vander Stoep
60185758dd Merge "ioctls: move commonly used tty ioctls to macro" into nyc-dev 2016-02-22 20:47:18 +00:00
Jeff Vander Stoep
8d9eb644dc ioctls: move commonly used tty ioctls to macro
Remove from unpriv_socket_ioctls but grant each user of unpriv_socket_ioctls
use of unpriv_tty_ioctls

Bug: 26990688
Change-Id: I998e09091de5a7234ad0049758d5dad0b35722f7
2016-02-22 12:31:57 -08:00
Tao Bao
11727c9912 Merge "Add recovery service." into nyc-dev 2016-02-22 19:24:25 +00:00
Tao Bao
45f8e4af03 Add recovery service.
RecoverySystemService is separated from PowerManagerService as a
dedicated system service to handle recovery related requests (such as
invoking uncrypt to uncrypt an OTA package on /data or to set up /
clear the bootloader control block (i.e. /misc) and etc).

The matching CL in frameworks/base is in:
  Change-Id: Ic606fcf5b31c54ce54f0ab12c1768fef0fa64560.

Bug: 26830925
Change-Id: Iee0583c458f784bfa422d0f7af5d1f2681d9609e
(cherry picked from commit 65b5fde912)
2016-02-22 10:39:18 -08:00
Calin Juravle
56baf61f84 Merge "Update permissions for the dedicated profile folders" into nyc-dev 2016-02-22 11:42:02 +00:00
Polina Bondarenko
7a8b34a0d1 Merge "Allow gatekeeper to find hardwareproperties service." into nyc-dev 2016-02-22 09:27:21 +00:00
Erik Kline
5fba8e11a9 Permit bluetooth to run DhcpClient
Requires net_raw and net_bind_service.

Bug: 26991160
Change-Id: I4cdd23f0d0c94c9b5126c821464aadc67cdb90c9
2016-02-22 16:31:13 +09:00
Calin Juravle
89625c9a64 Update permissions for the dedicated profile folders
Bug: 26719109
Bug: 26563023

Change-Id: Ie0ca764467c874c061752cbbc73e1bacead9b995
2016-02-19 13:40:33 +00:00
Christopher Tate
2e1556dc76 Track wallpaper API changes
Bug 25454162

Change-Id: I3cd299ce28bf6235605265c47762969851845b78
2016-02-18 22:56:42 +00:00
Jeffrey Vander Stoep
db8d34495f Merge "mediaserver: Allow finding cameraserver" into nyc-dev 2016-02-17 20:45:36 +00:00
Chien-Yu Chen
bf624c14a7 mediaserver: Allow finding cameraserver
Bug: 27221797
Change-Id: Ie490eac5e7581ce21ca5377c3b46b48c647a335b
2016-02-17 11:54:55 -08:00
Polina Bondarenko
8a6bbb1ffe Allow gatekeeper to find hardwareproperties service.
Bug: 26945055
Change-Id: I5745d02be9889f6a0e02de12bd8d8f2808de9ce0
2016-02-17 14:23:56 +01:00
Andreas Gampe
5c5d6cd881 dex2oat/patchoat: Add rights for A/B OTA
Give dex2oat/patchoat link rights in /data/ota to produce a patched
image.

Give zygote rights to relabel links. Also give the zygote rights to
unlink, which is required when relabeling fails (to clean up the
dalvik-cache).

Bug: 25612095
Change-Id: I28bfb9cbeabe93b1f68ada9bcaf29f4f60028c2f
2016-02-17 03:39:02 +00:00
Lorenzo Colitti
71a6a3ef52 Allow netd to use NETLINK_SOCK_DIAG.
This is needed to kill sockets using the new SOCK_DESTROY
operation instead of using SIOCKILLADDR.

Bug: 26976388

(cherry picked from commit b38e279094)

Change-Id: Id80c6278f19f9fd20fe8d4fca72f84bff9249ed8
2016-02-16 15:57:36 +09:00
Jeff Tinker
0d5bac13e1 Add mediadrm service
Part of media security hardening

This is an intermediate step toward moving
mediadrm to a new service separate from mediaserver.
This first step allows mediadrmservice to run based
on the system property media.mediadrmservice.enable
so it can be selectively enabled on devices that
support using native_handles for secure buffers.

bug: 22990512
Change-Id: I2208c1e87a6bd8d5bfaed06b1fdcb0509c11cff2
2016-02-12 19:38:22 -08:00
Chien-Yu Chen
9f9444c5e9 cameraserver: allow scheduling_policy_service
scheduling_policy_service is needed for high speed video recording.

Bug: 26982110
Change-Id: I377516c9d86d68e7024a67d04742baa841ff8907
2016-02-11 18:05:14 -08:00
Chien-Yu Chen
d2b36b2f3e Merge "cameraserver: Build up least privileged policy" into nyc-dev 2016-02-11 21:56:29 +00:00
Robb Glasser
8e15da7195 Merge "elinux: Update access rules for codec process" into nyc-dev 2016-02-11 19:04:31 +00:00
Robb Glasser
b7a76e9b34 elinux: Update access rules for codec process
Add rule to address dir search violation for video_device

bug:27115708
Change-Id: I14bad283af1ddda725e41d0100a09e6066519846
2016-02-11 10:33:57 -08:00
Daniel Cashman
9441467208 Merge "Auditallow untrusted_app procfs access." into nyc-dev 2016-02-11 15:10:58 +00:00
dcashman
a8a1faae7b Auditallow untrusted_app procfs access.
Access to proc is being removed but there are still some consumers.  Add
an auditallow to identify them and adjust labels appropriately before
removal.

Change-Id: I853b79bf0f22a71ea5c6c48641422c2daf247df5
2016-02-10 17:05:23 -08:00
Jeffrey Vander Stoep
f3d2e02f01 Merge "mediaserver remove kernel module loading perm" into nyc-dev 2016-02-10 23:14:44 +00:00
Jeff Vander Stoep
8f62670381 mediaserver remove kernel module loading perm
Bug: 27065131
Change-Id: I15c058eb46981ea3e03eccb4da132055ecae7efb
2016-02-10 15:10:50 -08:00
Daniel Cashman
2fedc4b723 Merge "Remove appdomain sysfs auditallow." into nyc-dev 2016-02-10 20:39:13 +00:00
dcashman
1af6091686 Remove appdomain sysfs auditallow.
Large numbers of denials have been collected.  Remove from logging until
further action is taken to address existing denials and remove sysfs
access from additional appdomains.

(cherry-pick from commit: 0b80f4dc8a)

Change-Id: I11b9b159702fb2d50d4352f9cd8b68503d07222a
2016-02-10 12:35:17 -08:00
William Roberts
d7eedeb89c checkseapp: remove .data = NULL assignments
Remove the .data=NULL assignments that were pushing the
static keymap mapping horizontal.

(cherry picked from commit 29adea51ed)

Change-Id: I2e6e78930ac8d1d8b9bd61d9dedb59f4859ea13c
Signed-off-by: William Roberts <william.c.roberts@intel.com>
2016-02-10 19:37:20 +00:00
William Roberts
0593e848fa checkseapp: remove data types form static map
Data type tracking is no longer needed now that per
key validation routines are supported.

(cherry picked from commit c92dae9807)

Change-Id: I2f1d0d5b1713e0477996479b0f279a58f43f15c7
Signed-off-by: William Roberts <william.c.roberts@intel.com>
2016-02-10 19:37:05 +00:00
William Roberts
7bbdaefc7f checkseapp: generalize input validation
Input validation was hard-coded into a validation routine
that would check against type and key names in a scattered,
order dependent conditional code block.

This makes it harder than it should be to add new key value
pairs and types into checkseapp.

To correct this, we add a validation callback into the
static mapping. If the validation callback is set, the
existing validation routine will call this for input
validation. On failure, a validation specific error message
is returned to be displayed.

(cherry picked from commit 696a66ba20)

Change-Id: I92cf1cdf4ddbcfae19168b621f47169a3cf551ac
Signed-off-by: William Roberts <william.c.roberts@intel.com>
2016-02-10 19:36:48 +00:00
William Roberts
d5c3e50009 checkseapp: update error message output
Change the final error message to be consistent with the others.

From:
Error: reading /home/wcrobert/workspace/aosp/external/sepolicy/seapp_contexts, line 82, name domain, value system_server

To:
Error: Reading file: "/home/wcrobert/workspace/aosp/external/sepolicy/seapp_contexts" line: 82 name: "domain" value: "system_server"

(cherry picked from commit efebf97e23)

Change-Id: Idf791d28fbba95fbeed8b9ccec9a296eea33afb9
Signed-off-by: William Roberts <william.c.roberts@intel.com>
2016-02-10 19:36:21 +00:00
William Roberts
ffd053ba93 checkseapp: declare internal function as static
(cherry picked from commit 25528cf4a5)

Change-Id: Ic4dc59650ca849b950cb145fedafdf4fc250f009
Signed-off-by: William Roberts <william.c.roberts@intel.com>
2016-02-10 19:24:00 +00:00
dcashman
8f5a891ff8 Make voiceinteractionservice app_api_service.
Address the following denial from 3rd party voice interaction test:
SELinux : avc:  denied  { find } for service=voiceinteraction pid=30281 uid=10139 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=0

Bug: 27105570
Change-Id: Ib87d364673cbc883df017bcda7fe1e854a76654f
2016-02-10 10:24:24 -08:00
Marco Nelissen
d21987702e Merge "selinux rules for codec process" into nyc-dev 2016-02-10 05:46:34 +00:00
Jeff Vander Stoep
4541687be5 cameraserver: Build up least privileged policy
Remove all permissions not observed during testing.

Remove domain_deprecated.

Bug: 26982110
Change-Id: I33f1887c95bdf378c945319494378225b41db215
2016-02-09 18:00:59 -08:00
Andreas Gampe
816448d825 Merge "Sepolicy: Give zygote rights needed for A/B OTAs" into nyc-dev 2016-02-10 00:34:53 +00:00
Tao Bao
cdab09c735 Merge "update_engine: Allow to access bootctrl_block_device." into nyc-dev 2016-02-10 00:05:57 +00:00
Tao Bao
79db4e47b3 update_engine: Allow to access bootctrl_block_device.
update_engine needs to access bootctrl_block_device to get and set the slot to boot.
avc: denied { write } for name="mmcblk0boot1" dev="tmpfs" ino=1266 scontext=u:r:update_engine:s0 tcontext=u:object_r:bootctrl_block_device:s0 tclass=blk_file
avc: denied { open } for path="/dev/block/mmcblk0boot1" dev="tmpfs" ino=1266 scontext=u:r:update_engine:s0 tcontext=u:object_r:bootctrl_block_device:s0 tclass=blk_file

Also track the name change of the native binder service.
avc:  denied  { add } for service=android.os.UpdateEngineService pid=210 uid=0 scontext=u:r:update_engine:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager

Bug: 27106053
Change-Id: Idbfef18578489db33fead0721e8f26d63db5ce09
(cherry picked from commit 3ec34ceb43)
2016-02-09 15:59:07 -08:00
Andreas Gampe
f4bd8b30e3 Sepolicy: Give zygote rights needed for A/B OTAs
The zygote is reponsible for moving ART A/B OTA artifacts over to
the regular dalvik-cache.

Bug: 25612095
Change-Id: I838d9ec6ee5a0f0af5f379a4696abda69cea51ca
2016-02-09 14:52:07 -08:00
Marco Nelissen
c3ba2e5130 selinux rules for codec process
Bug: 22775369

Change-Id: Ic6abe3d0e18ba6f7554d027e0ec05fd19011709b
2016-02-09 14:13:13 -08:00
William Roberts
db664c9ed3 untrusted_app: confine filesystem creation to sandbox
untrusted_apps could be allowed to create/unlink files in world
accessible /data locations. These applications could create
files in a way that would need cap dac_override to remove from
the system when they are uninstalled and/or leave orphaned
data behind.

Keep untrusted_app file creation to sandbox, sdcard and media
locations.

Signed-off-by: William Roberts <william.c.roberts@intel.com>

(cherry picked from commit bd0768cc93)

Change-Id: Ideb275f696606882d8a5d8fdedb48545a34de887
2016-02-09 13:40:51 -08:00
Marco Nelissen
66855fcaf3 Merge "Trim media related nfc permissions" 2016-02-06 20:11:41 +00:00
Daichi Hirono
4e6d20c7ba Merge "Add SELinux label for app fuse." am: e3965aa295
am: 52719ea514

* commit '52719ea514f534743052eaf0986961a1eaa39c88':
  Add SELinux label for app fuse.
2016-02-06 07:23:32 +00:00
Daichi Hirono
52719ea514 Merge "Add SELinux label for app fuse."
am: e3965aa295

* commit 'e3965aa29581ea5c567bfd892854576a953faa96':
  Add SELinux label for app fuse.
2016-02-06 07:21:47 +00:00
Daichi Hirono
e3965aa295 Merge "Add SELinux label for app fuse." 2016-02-06 07:16:58 +00:00
Marco Nelissen
710d0a715f Trim media related nfc permissions
Change-Id: I5863c56a53419d2327ab62a7189034711cda7fcc
2016-02-05 21:31:50 -08:00
dcashman
fb0c52ad4e Allow domain to read proc dirs. am: abf31acb01
am: eb3480b70f

* commit 'eb3480b70fdf0d9ea539b0834dd7d39443fc55e4':
  Allow domain to read proc dirs.
2016-02-05 23:44:07 +00:00
Nick Kralevich
7898352245 Replace "neverallow domain" by "neverallow *" am: 35a1451430
am: 8f611b6eda

* commit '8f611b6edaedc317af63035df0ccca31a5a69c14':
  Replace "neverallow domain" by "neverallow *"
2016-02-05 23:44:02 +00:00
dcashman
eb3480b70f Allow domain to read proc dirs.
am: abf31acb01

* commit 'abf31acb01f85ade4b97b05f9893d270b915b7b6':
  Allow domain to read proc dirs.
2016-02-05 23:22:49 +00:00
dcashman
abf31acb01 Allow domain to read proc dirs.
Ability to read all of proc was placed in domain_deprecated with the
intention of reducing information leaking from proc.  Many processes try
to read proc dirs, though.  Allow this with the belief that information
leakage is from the proc files themselves rather than dir structure.

Address the following denial:
avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=dir permissive=0

Bug: 26833472
Change-Id: I975ae022c093e1cf80de21487dc11e49f938e5a3
2016-02-05 15:16:51 -08:00