Nick Kralevich
eb6656ce0d
priv_app.te: refine cache_recovery_file auditallow rules
...
priv_app reads from /cache/recovery, but I'm still not sure if
it writes. Eliminate the read auditallow rules and allow the
writes to show up (if any).
Eliminates the following auditallow messages:
avc: granted { search } for comm="IntentService[S" name="recovery" dev="mmcblk0p38" ino=12 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir
avc: granted { getattr } for comm="Thread-1" path="/cache/recovery/last_install" dev="mmcblk0p27" ino=29891 scontext=u:r:priv_app:s0:c525,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=file
avc: granted { read open } for comm="Thread-1" name="recovery" dev="mmcblk0p27" ino=29889 scontext=u:r:priv_app:s0:c525,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir
Change-Id: Ibc0640f5366aae50e3fd09d17657374390b24a5c
2016-01-07 16:13:59 -08:00
Nick Kralevich
841a7a2b8a
Merge "su.te: drop domain_deprecated and app auditallow rules." am: e288cfa120
...
am: 516a0093ec
* commit '516a0093ecd1d116fe788e1b21b19a4f3ff96cfa':
su.te: drop domain_deprecated and app auditallow rules.
2016-01-08 00:09:45 +00:00
Nick Kralevich
516a0093ec
Merge "su.te: drop domain_deprecated and app auditallow rules."
...
am: e288cfa120
* commit 'e288cfa1206702401d736e5aa8fbdb2f3f6afbc3':
su.te: drop domain_deprecated and app auditallow rules.
2016-01-08 00:07:02 +00:00
Daniel Cashman
f9b7ecbd75
Merge "Allow domain to read symlinks in /sys." am: 1bd0712e7c
...
am: e784bada8d
* commit 'e784bada8ddafe32652724fa8a8d7d6b014772fc':
Allow domain to read symlinks in /sys.
2016-01-08 00:07:02 +00:00
Daniel Cashman
e784bada8d
Merge "Allow domain to read symlinks in /sys."
...
am: 1bd0712e7c
* commit '1bd0712e7c73e14dd8519a13567904d65b1fe6a6':
Allow domain to read symlinks in /sys.
2016-01-08 00:05:03 +00:00
Nick Kralevich
e288cfa120
Merge "su.te: drop domain_deprecated and app auditallow rules."
2016-01-08 00:03:35 +00:00
Daniel Cashman
1bd0712e7c
Merge "Allow domain to read symlinks in /sys."
2016-01-08 00:01:12 +00:00
Nick Kralevich
0af2aa0be3
su.te: drop domain_deprecated and app auditallow rules.
...
su is in permissive all the time. We don't want SELinux log
spam from this domain.
Addresses the following logspam:
avc: granted { getattr } for comm="lsof" path="/sys/devices/virtual/graphics/fb0/vsync_event" dev="sysfs" ino=10815 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
avc: granted { getattr } for comm="lsof" path="/sys/devices/virtual/thermal/thermal_zone2/temp" dev="sysfs" ino=15368 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
avc: granted { read } for comm="sh" name="emmc_therm" dev="sysfs" ino=17583 scontext=u:r:su:s0 tcontext=u:object_r:sysfs:s0 tclass=file
Change-Id: I8e17d3814e41b497b25ce00cd72698f0d22b3ab0
2016-01-07 15:59:28 -08:00
dcashman
cee729240e
Allow domain to read symlinks in /sys.
...
Address the following denial:
avc: denied { read } for name="battery" dev="sysfs" ino=17945 scontext=u:r:shell:s0 tcontext=u:object_r:sysfs:s0 tclass=lnk_file permissive=0
Bug: 26219114
Change-Id: I862b40a6514bffaa455dd7f06368acf9bcdc4782
2016-01-07 15:54:56 -08:00
Jeff Vander Stoep
824da638f4
app: remove permission to execute gpu_device am: 1911c27ff0
...
am: 8e53bb8d9a
* commit '8e53bb8d9a8f1ed4eb8ca29ef5e80a72a4d9442e':
app: remove permission to execute gpu_device
2016-01-07 23:39:09 +00:00
Jeff Vander Stoep
8e53bb8d9a
app: remove permission to execute gpu_device
...
am: 1911c27ff0
* commit '1911c27ff002880962fb04429fac950381a795de':
app: remove permission to execute gpu_device
2016-01-07 23:36:28 +00:00
Jeff Vander Stoep
1911c27ff0
app: remove permission to execute gpu_device
...
Not actually needed as demonstrated by the auditallow rule.
Change-Id: Ia92c82ec237ab3490a1d51fa3371778e43e09504
2016-01-07 23:30:18 +00:00
Bertrand SIMONNET
34e4da5fa9
Allows init to send signals.
...
This will allow init to terminate services cleanly (SIGTERM, wait,
SIGKILL) when needed.
Bug: 26216447
Test: manual: init is able to send a SIGTERM signal without denials.
Change-Id: Id2471ca08c0b011be64a36956628e965bc999bc6
2016-01-07 15:15:29 -08:00
Nick Kralevich
dd4fa22fd6
Remove cache_recovery_file symlink read am: dc37ea7393
...
am: f4c70b7ca7
* commit 'f4c70b7ca74b815f8592c2716d966db3d39c3bd3':
Remove cache_recovery_file symlink read
2016-01-07 21:13:24 +00:00
Nick Kralevich
f4c70b7ca7
Remove cache_recovery_file symlink read
...
am: dc37ea7393
* commit 'dc37ea73932f8d1c401695366284b4e8869e2127':
Remove cache_recovery_file symlink read
2016-01-07 21:11:43 +00:00
Nick Kralevich
dc37ea7393
Remove cache_recovery_file symlink read
...
auditallow shows no hits.
Change-Id: I5ae33d34cd4bfa48f4384926fcafd84bec60e899
2016-01-07 12:56:54 -08:00
William Roberts
29d146887e
fc_sort: initial commit
...
Ordering matters in fc files; the last match wins. In builds where
many BOARD_SEPOLICY_DIRS are set, the order of that list becomes
increasingly important in order to maintain a cohesive built
file_contexts.
To correct this, we sort the device specific file_contexts entries
with the upstream fc_sort tool.
Change-Id: Id79cc6f434c41179d5c0d0d739c4718918b0b1dc
Signed-off-by: William Roberts <william.c.roberts@intel.com>
2016-01-07 10:11:52 -08:00
Jeffrey Vander Stoep
7015004953
Merge "audio/mediaserver: Restrict to unprivileged socket ioctls"
2016-01-06 20:42:45 +00:00
Jeffrey Vander Stoep
3b70d69c86
Merge "shell: remove redundant ioctl perms"
2016-01-06 20:28:52 +00:00
Jeff Vander Stoep
7105d048d5
shell: remove redundant ioctl perms
...
These permissions are already inherited from appdomain.
Change-Id: I1de57f656bea26da3d8105045c3d109094f6f917
2016-01-06 12:11:32 -08:00
Jeff Vander Stoep
0fd910ecfd
audio/mediaserver: Restrict to unprivileged socket ioctls
...
Neverallow access to privileged commands.
Change-Id: I443be5bbcd8cdf55e23c2c4d8fee93c4ebf30e55
2016-01-06 11:34:02 -08:00
Mark Salyzyn
8c0ca87aa4
Settings: switch to using ctl.start property instead of exec logcat am: ea0da78589
...
am: ac2b7d09a4
* commit 'ac2b7d09a437cde5f64fed4effa8583630770b6a':
Settings: switch to using ctl.start property instead of exec logcat
2016-01-06 19:21:53 +00:00
Mark Salyzyn
ac2b7d09a4
Settings: switch to using ctl.start property instead of exec logcat
...
am: ea0da78589
* commit 'ea0da7858933101690d4992b3d47d72a14f11314':
Settings: switch to using ctl.start property instead of exec logcat
2016-01-06 19:19:31 +00:00
Jeffrey Vander Stoep
ef0b7b1ae5
Merge "app: expand socket ioctl restrictions to all apps"
2016-01-06 18:51:00 +00:00
Jeff Vander Stoep
bb1ece494f
app: expand socket ioctl restrictions to all apps
...
Exempt bluetooth which has net_admin capability.
Allow Droidguard to access the MAC address - droidguard runs in
priv_app domain.
Change-Id: Ia3cf07f4a96353783b2cfd7fc4506b7034daa2f1
2016-01-06 10:22:05 -08:00
Mark Salyzyn
ea0da78589
Settings: switch to using ctl.start property instead of exec logcat
...
- Moves policy of what to do with buffer size changes to logd
Bug: 23685592
Change-Id: I0b12c452e01b94d264d12b30f9040f646e609340
2016-01-06 10:20:48 -08:00
Nick Kralevich
3873c31fa6
domain_deprecated.te: Exclude recovery from auditallow for /cache/recovery am: 829a749351
...
am: 1ae69e4f38
* commit '1ae69e4f389075ec7e7bd1ed5607a38bb49afab9':
domain_deprecated.te: Exclude recovery from auditallow for /cache/recovery
2016-01-06 17:49:18 +00:00
Nick Kralevich
1ae69e4f38
domain_deprecated.te: Exclude recovery from auditallow for /cache/recovery
...
am: 829a749351
* commit '829a7493515b463c84cc0d42b2a95d4fbcce1520':
domain_deprecated.te: Exclude recovery from auditallow for /cache/recovery
2016-01-06 17:47:32 +00:00
Nick Kralevich
829a749351
domain_deprecated.te: Exclude recovery from auditallow for /cache/recovery
...
Recovery uses /cache/recovery. Exclude it from auditallow coverage.
Addresses the following SELinux log spam:
avc: granted { search } for pid=323 comm="recovery" name="recovery" dev="mmcblk0p38" ino=12 scontext=u:r:recovery:s0 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir
avc: granted { read } for pid=323 comm="recovery" name="block.map" dev="mmcblk0p38" ino=26 scontext=u:r:recovery:s0 tcontext=u:object_r:cache_recovery_file:s0 tclass=file
avc: granted { getattr } for pid=323 comm="recovery" path="/cache/recovery/block.map" dev="mmcblk0p38" ino=26 scontext=u:r:recovery:s0 tcontext=u:object_r:cache_recovery_file:s0 tclass=file
Change-Id: Ib6c7b44ac23fccaf2ea506429fb760ee85e87c76
2016-01-06 09:37:13 -08:00
Jeff Vander Stoep
4eb8d39db6
untrusted_app: remove mtp_device perms am: 956ca4c504
...
am: e139b40f0c
* commit 'e139b40f0c339654bdfa92f04f11fc6ed326b2fa':
untrusted_app: remove mtp_device perms
2016-01-06 17:15:09 +00:00
Jeff Vander Stoep
e139b40f0c
untrusted_app: remove mtp_device perms
...
am: 956ca4c504
* commit '956ca4c504889bcb06e8c07ce7580449dc014ef3':
untrusted_app: remove mtp_device perms
2016-01-06 17:13:21 +00:00
Jeff Vander Stoep
956ca4c504
untrusted_app: remove mtp_device perms
...
No longer necessary after android.process.media moved to the
priv_app domain. Verified no new denials via audit2allow rule.
Bug: 25085347
Change-Id: I2d9498d5d92e79ddabd002b4a5c6f918e1eb9bcc
2016-01-06 17:05:28 +00:00
dcashman
e235283e4e
resolve merge conflicts of 8cac951328
to master.
...
Change-Id: Ide2e832ab1ce7af98d735992d11be176f96f1f3f
2016-01-05 18:17:44 -08:00
Daniel Cashman
8cac951328
Merge "Add sysfs_batteryinfo label."
...
am: f02db47bc2
* commit 'f02db47bc2024a871a48f4afc5e73bd2eab1226e':
Add sysfs_batteryinfo label.
2016-01-06 01:23:03 +00:00
Daniel Cashman
f02db47bc2
Merge "Add sysfs_batteryinfo label."
2016-01-06 01:16:15 +00:00
Josh Gao
63d08d8f3e
Merge "debuggerd.te: allow debuggerd to drop root." am: 751c007570
...
am: 4706a0880d
* commit '4706a0880d7d4fdf10d9f5f2e8bcbe3a111bccc2':
debuggerd.te: allow debuggerd to drop root.
2016-01-06 00:07:13 +00:00
Josh Gao
4706a0880d
Merge "debuggerd.te: allow debuggerd to drop root."
...
am: 751c007570
* commit '751c0075709539892ac611dc36b9c9607d4dd90e':
debuggerd.te: allow debuggerd to drop root.
2016-01-06 00:05:27 +00:00
Josh Gao
751c007570
Merge "debuggerd.te: allow debuggerd to drop root."
2016-01-06 00:01:09 +00:00
dcashman
a31755fa1c
Add sysfs_batteryinfo label.
...
Shell user needs to be able to get current device battery_level via
/sys/class/power_supply/battery/capacity. Create a global label and
corresponding policy for accessing this. Rely on each device to label
the appropriate sysfs entry.
Bug: 26219114
Change-Id: I2c5ef489a9db2fdf7bbd5afd04278214b814351c
2016-01-05 15:54:05 -08:00
Josh Gao
2b93db7795
debuggerd.te: allow debuggerd to drop root.
...
Bug: http://b/25195825
Change-Id: I70257d5e40332f315020547baaa77a92fdfc58b0
2016-01-05 15:25:11 -08:00
Jeff Vander Stoep
57531cacb4
DO NOT MERGE: Further restrict access to socket ioctl commands
...
Remove untrusted/isolated app access to device private commands.
Only allow shell user to access unprivileged socket ioctl commands.
Bug: 26324307
Bug: 26267358
Change-Id: Iddf1171bc05c7600e0292f925d18d748f13a98f2
2016-01-05 21:24:20 +00:00
dcashman
fea761b464
Log app access to sysfs for removal. am: f226b0c945
...
am: 36dabd9637
* commit '36dabd9637b38b8b854591510c4697123d5b8afc':
Log app access to sysfs for removal.
2016-01-05 20:12:04 +00:00
dcashman
36dabd9637
Log app access to sysfs for removal.
...
am: f226b0c945
* commit 'f226b0c9456ac07309a378e03e86add0e3badfb0':
Log app access to sysfs for removal.
2016-01-05 20:10:08 +00:00
dcashman
f226b0c945
Log app access to sysfs for removal.
...
Bug: 22032619
Change-Id: Ic160e0beef353c6dc5fb5e2d6a09a5628f067fe3
2016-01-05 12:05:06 -08:00
Jeffrey Vander Stoep
ccc8e4f992
Merge "mediaextractor: neverallow network access"
2016-01-05 17:49:56 +00:00
Jeff Vander Stoep
1fd0aa2bf1
mediaextractor: neverallow network access
...
Disallow access to all sockets other than unix_stream and unix_dgram
Change-Id: Ie8ff80db7051ce57e56ef0365a4873aacdd5b652
2016-01-05 09:47:36 -08:00
Jeff Vander Stoep
a8d89c3102
expand scope of priv_sock_ioctls neverallows
...
From self to domain
Change-Id: I97aeea67a6b66bc307715a050cf7699e5be9715e
2016-01-05 09:36:12 -08:00
Jeffrey Vander Stoep
ca76be74f2
Merge "disallow unprivileged access to rmnet"
2016-01-05 17:10:20 +00:00
Jeff Vander Stoep
84a61cc535
disallow unprivileged access to rmnet
...
Enforce via neverallow rule by adding WAN_IOC_ADD_FLT_RULE
and WAN_IOC_ADD_FLT_RULE_INDEX to neverallow macro.
Bug: 26324307
Change-Id: I5350d9339e45ddeefd5423c3fe9a0ea14fe877b2
2016-01-05 16:45:55 +00:00
Jeff Vander Stoep
89e379e9a9
shell: Reduce socket ioctl perms
...
Only allow shell to access the same subset of ioctl commands as
untrusted_app. This reduces the attack surface of the kernel
available to a local attacker.
Bug: 26324307
Bug: 26267358
Change-Id: Ib8ecb9546af5fb480d2622149d4e00ec50cd4cde
2016-01-05 16:15:54 +00:00