Nick Kralevich
2cfe1fa0a6
am 7e953e77
: am f5835666
: Don\'t use don\'t
...
* commit '7e953e77026650ef0468118fd553da5a9f7fb3bb':
Don't use don't
2014-07-10 02:59:01 +00:00
Nick Kralevich
7e953e7702
am f5835666
: Don\'t use don\'t
...
* commit 'f58356661632d4c08870122f2cf944ea4edfe810':
Don't use don't
2014-07-10 02:55:28 +00:00
Nick Kralevich
eec3c7cd86
am f7cf7a4b
: am 99d86c7a
: ensure that untrusted_app can\'t set properties
...
* commit 'f7cf7a4be5e3eb5d415fc564d180761cc90d0442':
ensure that untrusted_app can't set properties
2014-07-10 02:11:16 +00:00
Nick Kralevich
f7cf7a4be5
am 99d86c7a
: ensure that untrusted_app can\'t set properties
...
* commit '99d86c7a77d402a106a1b3fe57af06dbb231c750':
ensure that untrusted_app can't set properties
2014-07-10 02:07:46 +00:00
Nick Kralevich
f583566616
Don't use don't
...
Single quotes sometimes mess up m4 parsing
Change-Id: Ic53cf0f9b45b2173cbea5c96048750f6a582a535
2014-07-09 19:03:47 -07:00
Nick Kralevich
99d86c7a77
ensure that untrusted_app can't set properties
...
Bug: 10243159
Change-Id: I9409fe8898c446a33515f1bee2990f36a2e11535
2014-07-09 18:58:04 -07:00
Colin Cross
88a65e2495
am bfd4eac7
: am 5d60f04e
: sepolicy: allow system server to remove cgroups
...
* commit 'bfd4eac7f90e7b4b1bc095e9ed2a7e474f1f18ae':
sepolicy: allow system server to remove cgroups
2014-07-10 00:50:17 +00:00
Andres Morales
efcb5947f9
am aaaeb02e
: am 2cd9c9bd
: Merge "Typedef+rules for SysSer to access persistent block device"
...
* commit 'aaaeb02eb8891ac9cffaee2d5226a3c7ed3f4af4':
Typedef+rules for SysSer to access persistent block device
2014-07-10 00:42:54 +00:00
Jeff Sharkey
389ac06387
am 568443bc
: am d3356826
: Let DCS read staged APK clusters.
...
* commit '568443bc93f39cbee48d800c859211b54f43b0ae':
Let DCS read staged APK clusters.
2014-07-10 00:42:54 +00:00
Colin Cross
bfd4eac7f9
am 5d60f04e
: sepolicy: allow system server to remove cgroups
...
* commit '5d60f04e5d43d084992d59c38a631a034b88e715':
sepolicy: allow system server to remove cgroups
2014-07-10 00:21:56 +00:00
Andres Morales
aaaeb02eb8
am 2cd9c9bd
: Merge "Typedef+rules for SysSer to access persistent block device"
...
* commit '2cd9c9bd3fa54ca78d0847763df4bca5fe940dcf':
Typedef+rules for SysSer to access persistent block device
2014-07-10 00:16:07 +00:00
Jeff Sharkey
568443bc93
am d3356826
: Let DCS read staged APK clusters.
...
* commit 'd33568264f0843feafc2d17c38e863f914f1fc57':
Let DCS read staged APK clusters.
2014-07-10 00:16:07 +00:00
Colin Cross
5d60f04e5d
sepolicy: allow system server to remove cgroups
...
Bug: 15313911
Change-Id: Ib7d39561a0d52632929d063a7ab97b6856f28ffe
2014-07-09 17:02:10 -07:00
Jeff Sharkey
d33568264f
Let DCS read staged APK clusters.
...
DCS is DefaultContainerService.
avc: denied { getattr } for path="/data/app/vmdl2.tmp"
dev="mmcblk0p28" ino=162910 scontext=u:r:platform_app:s0
tcontext=u:object_r:apk_tmp_file:s0 tclass=dir
Bug: 14975160
Change-Id: Ifca9afb4e74ebbfbeb8c01e1e9ea65f5b55e9375
2014-07-09 15:18:32 -07:00
Andres Morales
254953d9fe
am 9c52a78c
: am e844113b
: Allow SystemServer to start PersistentDataBlockService
...
* commit '9c52a78c6062a472f2dff96019a6a50f44bd0034':
Allow SystemServer to start PersistentDataBlockService
2014-07-09 17:57:55 +00:00
Andres Morales
9c52a78c60
am e844113b
: Allow SystemServer to start PersistentDataBlockService
...
* commit 'e844113bc114484339b0c74a978c0fa5cfa250e1':
Allow SystemServer to start PersistentDataBlockService
2014-07-09 17:44:04 +00:00
Andres Morales
2cd9c9bd3f
Merge "Typedef+rules for SysSer to access persistent block device"
2014-07-09 14:45:53 +00:00
Andres Morales
d8447fdfe1
Typedef+rules for SysSer to access persistent block device
...
Defines new device type persistent_data_block_device
This block device will allow storage of data that
will live across factory resets.
Gives rw and search access to SystemServer.
Change-Id: I298eb40f9a04c16e90dcc1ad32d240ca84df3b1e
2014-07-09 16:08:16 -07:00
Sreeram Ramachandran
43613e6b70
am 5e476c36
: am d2d172a3
: Allow dumpstate to read the list of routing tables.
...
* commit '5e476c361f45a56a594112a72dedd4ee02c7d0b8':
Allow dumpstate to read the list of routing tables.
2014-07-09 12:26:46 +00:00
Andres Morales
e844113bc1
Allow SystemServer to start PersistentDataBlockService
...
Change-Id: I0e8433c4fcbce04e2693a0f8cf1dd89c95684c24
2014-07-08 17:57:34 -07:00
Sreeram Ramachandran
5e476c361f
am d2d172a3
: Allow dumpstate to read the list of routing tables.
...
* commit 'd2d172a33ec747299961649e3cdb3095a38eef01':
Allow dumpstate to read the list of routing tables.
2014-07-08 23:52:04 +00:00
Sreeram Ramachandran
d2d172a33e
Allow dumpstate to read the list of routing tables.
...
Change-Id: I55475c08c5e43bcf61af916210e680c47480ac32
2014-07-08 15:46:52 -07:00
Sreeram Ramachandran
d9cb5eaaa3
am e4409728
: am 65edb75d
: Allow netd to create data files in /data/misc/net/.
...
* commit 'e440972845371fa8a2727c563237cd705ca96b2d':
Allow netd to create data files in /data/misc/net/.
2014-07-08 19:22:28 +00:00
Sreeram Ramachandran
e440972845
am 65edb75d
: Allow netd to create data files in /data/misc/net/.
...
* commit '65edb75d530058ec3c8cb86d6d3e28f9394740ba':
Allow netd to create data files in /data/misc/net/.
2014-07-08 19:18:07 +00:00
Sreeram Ramachandran
65edb75d53
Allow netd to create data files in /data/misc/net/.
...
This will be used to populate rt_tables (a mapping from routing table numbers to
table names) that's read by the iproute2 utilities.
Change-Id: I69deb1a64d5d6647470823405bf0cc55b24b22de
2014-07-08 19:06:28 +00:00
Nick Kralevich
0cbdd20a3d
am d27aeb21
: am e9d97b74
: recovery: allow read access to fuse filesystem
...
* commit 'd27aeb218089360ecd17fabe0cefb953374dc33a':
recovery: allow read access to fuse filesystem
2014-07-08 18:17:43 +00:00
Nick Kralevich
d27aeb2180
am e9d97b74
: recovery: allow read access to fuse filesystem
...
* commit 'e9d97b744e95307020d461fd16f756323f25bba7':
recovery: allow read access to fuse filesystem
2014-07-08 18:12:43 +00:00
Nick Kralevich
e9d97b744e
recovery: allow read access to fuse filesystem
...
adb sideload depends on the ability to access the fuse
directory. Flipping recovery into enforcing started triggering
the following denial:
type=1400 audit(17964905.699:7): avc: denied { search } for pid=132 comm="recovery" name="/" dev="fuse" ino=1 scontext=u:r:recovery:s0 tcontext=u:object_r:sdcard_internal:s0 tclass=dir
Change-Id: I27ee0295fa2e2d0449bfab4f95bfbc076e92cf59
2014-07-08 10:52:05 -07:00
Nick Kralevich
31739880e2
am d86b0a81
: am 9f6af083
: New domain "install_recovery"
...
* commit 'd86b0a81ab10cc48c4a2c52f27e8cdbfc927a52f':
New domain "install_recovery"
2014-07-08 16:33:06 +00:00
Nick Kralevich
d86b0a81ab
am 9f6af083
: New domain "install_recovery"
...
* commit '9f6af083e8a31c9b5a9f9ac21885dfc3c0dc14b2':
New domain "install_recovery"
2014-07-08 16:30:42 +00:00
Nick Kralevich
9f6af083e8
New domain "install_recovery"
...
Create a new domain for the one-shot init service flash_recovery.
This domain is initially in permissive_or_unconfined() for
testing. Any SELinux denials won't be enforced for now.
Change-Id: I7146dc154a5c78b6f3b4b6fb5d5855a05a30bfd8
2014-07-08 16:22:14 +00:00
Jeff Sharkey
7deb1b0130
am e900e573
: am 77e85289
: Merge "Rules to allow installing package directories."
...
* commit 'e900e57385fddb558e784089ba3c145d9dfbd659':
Rules to allow installing package directories.
2014-07-08 10:30:38 +00:00
Jeff Sharkey
e900e57385
am 77e85289
: Merge "Rules to allow installing package directories."
...
* commit '77e8528912a157d62243d81b95c4297648a3d222':
Rules to allow installing package directories.
2014-07-08 10:21:17 +00:00
Jeff Sharkey
c02c98d327
Rules to allow installing package directories.
...
Earlier changes had extended the rules, but some additional changes
are needed.
avc: denied { relabelfrom } for name="vmdl-723825123.tmp"
dev="mmcblk0p28" ino=162910 scontext=u:r:system_server:s0
tcontext=u:object_r:apk_data_file:s0 tclass=dir
Bug: 14975160
Change-Id: Ia644c73ec10460a2a529fe197ade6afe46694651
2014-07-08 00:49:06 -07:00
Nick Kralevich
0c9a873a78
am 51ad2ad3
: am c2ba5ed9
: recovery: start enforcing SELinux rules
...
* commit '51ad2ad3aa9ad88c958b4c63bbdf4a4452c65087':
recovery: start enforcing SELinux rules
2014-07-07 23:09:40 +00:00
Nick Kralevich
51ad2ad3aa
am c2ba5ed9
: recovery: start enforcing SELinux rules
...
* commit 'c2ba5ed90876e7c3f105ed658788557c68ab72b8':
recovery: start enforcing SELinux rules
2014-07-07 23:03:42 +00:00
Nick Kralevich
c2ba5ed908
recovery: start enforcing SELinux rules
...
Start enforcing SELinux rules for recovery. I've been monitoring
denials, and I haven't seen anything which would indicate a problem.
We can always roll this back if something goes wrong.
Change-Id: I7d3a147f8b9000bf8181d2aa32520f15f291a6f3
2014-07-07 22:05:28 +00:00
Nick Kralevich
094f399e5c
am b23905e5
: am 3508d611
: fix build.
...
* commit 'b23905e54cd2e03156a13af72256fa71693dfd0f':
fix build.
2014-07-07 21:08:49 +00:00
Nick Kralevich
b23905e54c
am 3508d611
: fix build.
...
* commit '3508d611cc661730bdf0e706d2f1fd1814cd8c60':
fix build.
2014-07-07 21:05:18 +00:00
Nick Kralevich
48ffa6fe1f
fix build.
...
libsepol.check_assertion_helper: neverallow on line 166 of external/sepolicy/domain.te (or line 5056 of policy.conf) violated by allow recovery unlabeled:file { create };
Error while expanding policy
make: *** [out/target/product/generic/obj/ETC/sepolicy.recovery_intermediates/sepolicy.recovery] Error 1
(cherry picked from commit 3508d611cc
)
Change-Id: I5efa1f2040fc40df1df44ed1b8e84b6080cb8f74
2014-07-07 14:02:26 -07:00
Nick Kralevich
3508d611cc
fix build.
...
libsepol.check_assertion_helper: neverallow on line 166 of external/sepolicy/domain.te (or line 5056 of policy.conf) violated by allow recovery unlabeled:file { create };
Error while expanding policy
make: *** [out/target/product/generic/obj/ETC/sepolicy.recovery_intermediates/sepolicy.recovery] Error 1
Change-Id: Iddf2cb8d0de2ab445e54a727f01be0b992b45ba5
2014-07-07 13:55:28 -07:00
Nick Kralevich
bb2a06a7c8
am e9f1c019
: am 558710cd
: recovery: allow relabelto unlabeled and other unlabeled rules
...
* commit 'e9f1c019060a97017454309be05f31edae6d0850':
recovery: allow relabelto unlabeled and other unlabeled rules
2014-07-07 20:44:12 +00:00
Nick Kralevich
e9f1c01906
am 558710cd
: recovery: allow relabelto unlabeled and other unlabeled rules
...
* commit '558710cdcc619682ef600d281f09ab4dad221692':
recovery: allow relabelto unlabeled and other unlabeled rules
2014-07-07 20:41:26 +00:00
Nick Kralevich
558710cdcc
recovery: allow relabelto unlabeled and other unlabeled rules
...
The recovery script may ask to label a file with a label not
known to the currently loaded policy. Allow it.
Addresses the following denials:
avc: denied { relabelto } for pid=143 comm="update_binary" name="vdc" dev="mmcblk0p25" ino=212 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
avc: denied { setattr } for pid=143 comm="update_binary" name="vdc" dev="mmcblk0p25" ino=212 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
Change-Id: Iafcc7b0b3aaea5a272adb1264233978365648f94
2014-07-07 13:23:30 -07:00
Nick Kralevich
0cac452cb9
am 04aabbac
: am c0088b80
: Merge "Add neverallow rules further restricing service_manager."
...
* commit '04aabbace8f23ace6def032d21f9d7bd9652037d':
Add neverallow rules further restricing service_manager.
2014-07-07 20:08:46 +00:00
Nick Kralevich
04aabbace8
am c0088b80
: Merge "Add neverallow rules further restricing service_manager."
...
* commit 'c0088b8064318210e775555ff4634994f7ab9e34':
Add neverallow rules further restricing service_manager.
2014-07-07 20:02:53 +00:00
Nick Kralevich
f43595382d
am 7b7a25ea
: am b8bdfde3
: ueventd: Add policy support for ueventd labeling changes
...
* commit '7b7a25eaa526197290f2190fc39c7dd81dd9b1a8':
ueventd: Add policy support for ueventd labeling changes
2014-07-07 19:51:05 +00:00
Nick Kralevich
7b7a25eaa5
am b8bdfde3
: ueventd: Add policy support for ueventd labeling changes
...
* commit 'b8bdfde3d0d23f4730155bba807276eb06a3aa48':
ueventd: Add policy support for ueventd labeling changes
2014-07-07 19:48:19 +00:00
Nick Kralevich
b8bdfde3d0
ueventd: Add policy support for ueventd labeling changes
...
Currently, ueventd only modifies the SELinux label on a file
if the entry exists in /ueventd.rc. Add policy support to enable
an independent restorecon_recursive whenever a uevent message occurs.
Change-Id: I0ccb5395ec0be9282095b844a5022e8c0d8903ac
2014-07-07 12:13:27 -07:00
Jeff Sharkey
77e8528912
Merge "Rules to allow installing package directories."
2014-07-07 18:07:41 +00:00