Commit graph

859 commits

Author SHA1 Message Date
Nick Kralevich
ce07748490 am a24a991d: Allow apps to execute app_data_files
* commit 'a24a991dd59fe03cdc681aadcb6bbca1ffac9b7b':
  Allow apps to execute app_data_files
2013-09-12 12:43:32 -07:00
Nick Kralevich
a24a991dd5 Allow apps to execute app_data_files
Fixes the following denial:

<5>[28362.335293] type=1400 audit(1378991198.292:24): avc:  denied  { execute } for  pid=1640 comm="facebook.katana" path="/data/data/com.facebook.katana/app_libs/libfb_jpegturbo.so" dev="mmcblk0p23" ino=652556 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:app_data_file:s0 tclass=file

Change-Id: I4a515610149f06f0c49194feb6bc96e9b3080c12
2013-09-12 12:19:31 -07:00
Alex Klyubin
bf9c61458e am a2477056: Permit writing to /dev/random and /dev/urandom.
* commit 'a2477056ae6a702e7e71b671cd0c47afc1c7da8a':
  Permit writing to /dev/random and /dev/urandom.
2013-09-10 12:09:29 -07:00
Alex Klyubin
a2477056ae Permit writing to /dev/random and /dev/urandom.
Apps attempting to write to /dev/random or /dev/urandom currently
succeed, but a policy violation is logged. These two Linux RNG
devices are meant to be written to by arbitrary apps. Thus, there's
no reason to deny this capability.

Bug: 10679705

Change-Id: Ife401f1dd2182889471eef7e90fcc92e96f9c4d6
2013-09-10 12:01:15 -07:00
Alex Klyubin
7ca560be77 am 34a8e121: Permit installd to unlink all types of data_file_type.
* commit '34a8e121124c79e8daa60aebb065377280335bcc':
  Permit installd to unlink all types of data_file_type.
2013-09-10 11:59:48 -07:00
Alex Klyubin
34a8e12112 Permit installd to unlink all types of data_file_type.
This enables installd to uninstall or clear data of installed apps
whose data directory contains unusual file types, such as FIFO.

Bug: 10680357

(cherry picked from commit 839af9edb5)

Change-Id: I5715f7d6d3214896ad0456d614b052cf5fb79eef
2013-09-10 11:48:03 -07:00
Stephen Smalley
a473e29de0 write_klog also requires write permission to the directory.
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-09-10 11:10:02 -04:00
Stephen Smalley
79e084fcc9 Allow access to /data/security/current symbolic link.
Change-Id: Ic500af7b9dac6a9b6401e99c3d162913e9989d9b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2013-09-10 11:09:15 -04:00
William Roberts
aade7d74f8 am 9af6f1bd: Drop -d option on insertkeys.py in Android.mk
* commit '9af6f1bd59ee2fb0622db8ff25c4806c5527a0b3':
  Drop -d option on insertkeys.py in Android.mk
2013-09-06 09:16:23 -07:00
William Roberts
9af6f1bd59 Drop -d option on insertkeys.py in Android.mk
This breaks the ability for users to have certs in many
directories. Currently the design is to allow keys.conf
to specify arbitrary locations for pem files, relative to
the root of the Android tree. If users want to have a
common prefix on all the keys, then they can export
DEFAULT_SYSTEM_DEV_CERTIFICATE, and make that an environment
variable in their keys.conf file.

Signed-off-by: William Roberts <wroberts@tresys.com>

Change-Id: I23455b891206cab6eca7db08ff3c28283f87c640
Signed-off-by: William Roberts <wroberts@tresys.com>
2013-09-06 09:51:27 +00:00
Geremy Condra
0c42bb0a90 am 21d13e9b: Merge "Fix more long-tail denials."
* commit '21d13e9b667bbd3c1837881e0febe7e7d0931ed9':
  Fix more long-tail denials.
2013-09-05 16:51:52 -07:00
Geremy Condra
21d13e9b66 Merge "Fix more long-tail denials." 2013-09-05 23:49:51 +00:00
Geremy Condra
217f8afc18 Fix more long-tail denials.
For additional context-

The denials related to init_tmpfs are of the form:

denied  { read } for  pid=12315 comm=""dboxed_process0"" path=2F6465762F6173686D656D2F64616C76696B2D68656170202864656C6574656429 dev=""tmpfs"" ino=9464 scontext=u:r:isolated_app:s0 tcontext=u:object_r:init_tmpfs:s0 tclass=file

(the path above is "/dev/ashmem/dalvik-heap (deleted)")

The denials related to executing things from the dalvik cache are of the form:

enied  { execute } for  pid=3565 comm=""dboxed_process0"" path=""/data/dalvik-cache/system@app@Chrome.apk@classes.dex"" dev=""mmcblk0p28"" ino=105983 scontext=u:r:isolated_app:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file

The denials related to isolated_app and the init socket are:

denied  { getattr } for  pid=3824 comm=""Binder_2"" path=""socket:[14059]"" dev=""sockfs"" ino=14059 scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket

The getopt denials for the aforementioned socket are:

denied  { getopt } for  pid=3824 comm=""Binder_2"" path=""/dev/socket/dumpstate"" scontext=u:r:isolated_app:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket

Change-Id: I3c57702e2af5a779a7618da9aa40930e7f12ee49
2013-09-05 16:45:04 -07:00
Geremy Condra
a4df1d159d am 66826d5e: Merge "Fix miscellaneous long-tail denials."
* commit '66826d5e15cbaae5a0ecd613f5148003927e79ab':
  Fix miscellaneous long-tail denials.
2013-09-04 16:27:51 -07:00
Geremy Condra
66826d5e15 Merge "Fix miscellaneous long-tail denials." 2013-09-04 23:26:12 +00:00
Nick Kralevich
6bcca1c818 am 2f40a17a: Revert "Add the ability to write shell files to the untrusted_app domain."
* commit '2f40a17a42d19b6d92944c78c1d6a9c9517a725b':
  Revert "Add the ability to write shell files to the untrusted_app domain."
2013-09-04 16:18:24 -07:00
Nick Kralevich
2f40a17a42 Revert "Add the ability to write shell files to the untrusted_app domain."
At this point, we still don't understand the root cause of
bug 10290009, or if it's even a real bug.  Rollback
29d0d40668 so we an get a device
in this state and figure out the root cause of this problem.

This reverts commit 29d0d40668.

Bug: 10290009
2013-09-04 16:12:33 -07:00
Geremy Condra
d615ef3477 Fix miscellaneous long-tail denials.
Change-Id: Ie0947f79c63f962220d3c9316c5d5d82f677821f
2013-09-04 16:09:50 -07:00
Geremy Condra
9ac921c03a am fc2bd01b: Give Zygote the ability to write app data files.
* commit 'fc2bd01b601b00bf682c313d1e859d86ce030b67':
  Give Zygote the ability to write app data files.
2013-08-30 15:54:01 -07:00
Geremy Condra
fc2bd01b60 Give Zygote the ability to write app data files.
This fixes another bug encountered while taking bugreports.

Bug: 10498304
Change-Id: Ie33e869ccd28c5461f4f3736c078b2a865aa7cdd
2013-08-30 15:48:56 -07:00
Geremy Condra
0e9a29ef40 am 81560733: Fix denials encountered while getting bugreports.
* commit '81560733a47633036133ce548bf638bc3d91f5cf':
  Fix denials encountered while getting bugreports.
2013-08-30 15:14:42 -07:00
Geremy Condra
81560733a4 Fix denials encountered while getting bugreports.
Bug: 10498304
Change-Id: I312665a2cd09fa16ae3f3978aebdb0da99cf1f74
2013-08-30 15:10:17 -07:00
Ed Heyl
706b5b2f8f merge mirror-aosp-master in one step 2013-08-29 17:32:30 -07:00
Geremy Condra
0f2cdd8745 am 17a41bdb: Drop MLS separation for compatibility.
* commit '17a41bdb65a7d1bca9a01667f4c61b0af341af10':
  Drop MLS separation for compatibility.
2013-08-29 16:22:10 -07:00
dcashman
765e95f99f Merge "quash SELinux denial for healthd" 2013-08-29 20:51:59 +00:00
Geremy Condra
3fada57ab4 am cec3c1e4: am e0362602: Add capabilities to Zygote to fix valgrind.
* commit 'cec3c1e44677c790de00cfa7f8901bcbe8a59c82':
  Add capabilities to Zygote to fix valgrind.
2013-08-28 16:42:25 -07:00
Geremy Condra
cec3c1e446 am e0362602: Add capabilities to Zygote to fix valgrind.
* commit 'e03626021e341b48665ae55a34493cafafd1a08d':
  Add capabilities to Zygote to fix valgrind.
2013-08-28 16:40:21 -07:00
dcashman
758d033583 quash SELinux denial for healthd
Change-Id: I898bb4ee8fdb95b48e58c98bffdb381b03c719bb
2013-08-28 15:32:35 -07:00
Geremy Condra
e03626021e Add capabilities to Zygote to fix valgrind.
Bug: 10455872
Change-Id: I98885e8cd1e4f9ab0d3e2af6d79b078a000db539
2013-08-27 18:47:08 -07:00
Geremy Condra
2b8512cc59 Merge "Add sepolicy-check, a utility for auditing selinux policy." 2013-08-23 19:01:23 +00:00
Geremy Condra
01aaeb6a82 Add sepolicy-check, a utility for auditing selinux policy.
This is based on Joshua Brindle's sepolicy-inject.

Change-Id: Ie75bd56a2996481592dcfe7ad302b52f381d5b18
2013-08-23 11:57:42 -07:00
Richard Haines
7d7ab56e7d am 81cdd6c6: am 1b46b2fe: Fix insertkeys.py to resolve keys.conf path entries in a portable way
* commit '81cdd6c6b7979baf30c4ae12421ece70ea9628ea':
  Fix insertkeys.py to resolve keys.conf path entries in a portable way
2013-08-20 14:05:47 -07:00
Richard Haines
81cdd6c6b7 am 1b46b2fe: Fix insertkeys.py to resolve keys.conf path entries in a portable way
* commit '1b46b2fe4723b0dda74c2f66a09df8259508fd4b':
  Fix insertkeys.py to resolve keys.conf path entries in a portable way
2013-08-20 14:01:54 -07:00
Geremy Condra
bcefbf569b am 553bafef: am 29d0d406: Add the ability to write shell files to the untrusted_app domain.
* commit '553bafeff944973e04a8b09d8b373e539aad6fff':
  Add the ability to write shell files to the untrusted_app domain.
2013-08-16 17:17:08 -07:00
Geremy Condra
553bafeff9 am 29d0d406: Add the ability to write shell files to the untrusted_app domain.
* commit '29d0d40668e686adc91cdfbf0d083e71ed82bac6':
  Add the ability to write shell files to the untrusted_app domain.
2013-08-16 17:14:13 -07:00
Geremy Condra
29d0d40668 Add the ability to write shell files to the untrusted_app domain.
Bug: 10290009
Change-Id: Ic794299261672b36a2b630893b65ab176c3eee6b
(cherry picked from commit eaa4e844e4c8549c9b4808a1272876a6995ca5a7)
2013-08-16 23:09:02 +00:00
The Android Open Source Project
1e9081af0a am b74efd33: (-s ours) Reconcile with klp-release - do not merge
* commit 'b74efd33f79702495dc41f7662515f15e3f079dd':
  Move isolated_app.te / untrusted_app.te into permissive
  Grant fsetid Linux capability to vold.
  Add "shell" to seapp_contexts
2013-08-14 15:14:30 -07:00
The Android Open Source Project
b74efd33f7 Reconcile with klp-release - do not merge
Change-Id: If9a2d360a37a8641a70fb475c7f5422d0cf8b900
2013-08-14 15:10:12 -07:00
Richard Haines
1b46b2fe47 Fix insertkeys.py to resolve keys.conf path entries in a portable way
Currently a path to a key in keys.conf must be fully qualified or have
the -d option appended. This fix will allow paths to have environment
variables that will be expanded. This will give portability to the
entries. For example the following entry will now be resolved correctly:
[@NET_APPS]
ALL : $ANDROID_BUILD_TOP/device/demo_vendor/demo_dev/security/net_apps.x509.pem

Change-Id: If4f169d9ed4f37b6ebd062508de058f3baeafead
Signed-off-by: Richard Haines <richard_c_haines@btinternet.com>
2013-08-08 15:13:29 +01:00
The Android Automerger
6db3c2d16e merge in klp-release history after reset to master 2013-08-06 08:17:21 -07:00
Lorenzo Colitti
ab7dfabb61 Fix clatd, broken by selinux policing /dev/tun
Bug: 10175701
Change-Id: I185df22bdbaafd56725760ec6c71340b67455046
2013-08-05 19:53:23 +09:00
The Android Automerger
3411f7855a merge in klp-release history after reset to master 2013-07-30 11:09:43 -07:00
Todd Poynor
32c0dbd212 Merge "healthd: add sepolicy" 2013-07-26 20:42:56 +00:00
The Android Automerger
ebdbc2fe51 merge in klp-release history after reset to master 2013-07-17 06:00:24 -07:00
Alex Klyubin
7cda86eb46 Permit apps to bind TCP/UDP sockets to a hostname
Change-Id: Ided2cf793e94bb58529789c3075f8480c0d0cf4e
2013-07-16 13:45:53 -07:00
Nick Kralevich
08711d34e4 Move isolated_app.te / untrusted_app.te into permissive
OTAs aren't properly labeling /system, which is causing SELinux
breakage. Temporarily put isolated_app.te and untrusted_app.te
into permissive.

Bug: 9878561
Change-Id: Icaf674ad6b3d59cbca3ae796c930c98ab67cae9c
2013-07-16 11:48:25 -07:00
Nick Kralevich
24617fc3b8 Move isolated_app.te / untrusted_app.te into permissive
OTAs aren't properly labeling /system, which is causing SELinux
breakage. Temporarily put isolated_app.te and untrusted_app.te
into permissive.

Bug: 9878561
Change-Id: Icaf674ad6b3d59cbca3ae796c930c98ab67cae9c
2013-07-16 11:34:08 -07:00
Nick Kralevich
59faed058d Allow apps to create listening ports
Bug: 9872463
Change-Id: I47eabeace3387afd24c0fd4bee70e77c0a3586d5
2013-07-16 09:03:58 -07:00
The Android Automerger
73e859c6c3 merge in klp-release history after reset to master 2013-07-16 06:01:08 -07:00
Nick Kralevich
2637198f92 Only init should be able to load a security policy
Bug: 9859477
Change-Id: Iadd26cac2f318b81701310788bed795dadfa5b6b
2013-07-15 17:16:08 -07:00