Commit graph

2328 commits

Author SHA1 Message Date
Nick Kralevich
7e953e7702 am f5835666: Don\'t use don\'t
* commit 'f58356661632d4c08870122f2cf944ea4edfe810':
  Don't use don't
2014-07-10 02:55:28 +00:00
Nick Kralevich
f7cf7a4be5 am 99d86c7a: ensure that untrusted_app can\'t set properties
* commit '99d86c7a77d402a106a1b3fe57af06dbb231c750':
  ensure that untrusted_app can't set properties
2014-07-10 02:07:46 +00:00
Nick Kralevich
f583566616 Don't use don't
Single quotes sometimes mess up m4 parsing

Change-Id: Ic53cf0f9b45b2173cbea5c96048750f6a582a535
2014-07-09 19:03:47 -07:00
Nick Kralevich
99d86c7a77 ensure that untrusted_app can't set properties
Bug: 10243159
Change-Id: I9409fe8898c446a33515f1bee2990f36a2e11535
2014-07-09 18:58:04 -07:00
Colin Cross
bfd4eac7f9 am 5d60f04e: sepolicy: allow system server to remove cgroups
* commit '5d60f04e5d43d084992d59c38a631a034b88e715':
  sepolicy: allow system server to remove cgroups
2014-07-10 00:21:56 +00:00
Andres Morales
aaaeb02eb8 am 2cd9c9bd: Merge "Typedef+rules for SysSer to access persistent block device"
* commit '2cd9c9bd3fa54ca78d0847763df4bca5fe940dcf':
  Typedef+rules for SysSer to access persistent block device
2014-07-10 00:16:07 +00:00
Jeff Sharkey
568443bc93 am d3356826: Let DCS read staged APK clusters.
* commit 'd33568264f0843feafc2d17c38e863f914f1fc57':
  Let DCS read staged APK clusters.
2014-07-10 00:16:07 +00:00
Colin Cross
5d60f04e5d sepolicy: allow system server to remove cgroups
Bug: 15313911
Change-Id: Ib7d39561a0d52632929d063a7ab97b6856f28ffe
2014-07-09 17:02:10 -07:00
Jeff Sharkey
d33568264f Let DCS read staged APK clusters.
DCS is DefaultContainerService.

avc: denied { getattr } for path="/data/app/vmdl2.tmp"
    dev="mmcblk0p28" ino=162910 scontext=u:r:platform_app:s0
    tcontext=u:object_r:apk_tmp_file:s0 tclass=dir

Bug: 14975160
Change-Id: Ifca9afb4e74ebbfbeb8c01e1e9ea65f5b55e9375
2014-07-09 15:18:32 -07:00
Andres Morales
9c52a78c60 am e844113b: Allow SystemServer to start PersistentDataBlockService
* commit 'e844113bc114484339b0c74a978c0fa5cfa250e1':
  Allow SystemServer to start PersistentDataBlockService
2014-07-09 17:44:04 +00:00
Andres Morales
2cd9c9bd3f Merge "Typedef+rules for SysSer to access persistent block device" 2014-07-09 14:45:53 +00:00
Andres Morales
d8447fdfe1 Typedef+rules for SysSer to access persistent block device
Defines new device type persistent_data_block_device

This block device will allow storage of data that
will live across factory resets.

Gives rw and search access to SystemServer.

Change-Id: I298eb40f9a04c16e90dcc1ad32d240ca84df3b1e
2014-07-09 16:08:16 -07:00
Andres Morales
e844113bc1 Allow SystemServer to start PersistentDataBlockService
Change-Id: I0e8433c4fcbce04e2693a0f8cf1dd89c95684c24
2014-07-08 17:57:34 -07:00
Sreeram Ramachandran
5e476c361f am d2d172a3: Allow dumpstate to read the list of routing tables.
* commit 'd2d172a33ec747299961649e3cdb3095a38eef01':
  Allow dumpstate to read the list of routing tables.
2014-07-08 23:52:04 +00:00
Sreeram Ramachandran
d2d172a33e Allow dumpstate to read the list of routing tables.
Change-Id: I55475c08c5e43bcf61af916210e680c47480ac32
2014-07-08 15:46:52 -07:00
Sreeram Ramachandran
e440972845 am 65edb75d: Allow netd to create data files in /data/misc/net/.
* commit '65edb75d530058ec3c8cb86d6d3e28f9394740ba':
  Allow netd to create data files in /data/misc/net/.
2014-07-08 19:18:07 +00:00
Sreeram Ramachandran
65edb75d53 Allow netd to create data files in /data/misc/net/.
This will be used to populate rt_tables (a mapping from routing table numbers to
table names) that's read by the iproute2 utilities.

Change-Id: I69deb1a64d5d6647470823405bf0cc55b24b22de
2014-07-08 19:06:28 +00:00
Nick Kralevich
d27aeb2180 am e9d97b74: recovery: allow read access to fuse filesystem
* commit 'e9d97b744e95307020d461fd16f756323f25bba7':
  recovery: allow read access to fuse filesystem
2014-07-08 18:12:43 +00:00
Nick Kralevich
e9d97b744e recovery: allow read access to fuse filesystem
adb sideload depends on the ability to access the fuse
directory. Flipping recovery into enforcing started triggering
the following denial:

  type=1400 audit(17964905.699:7): avc:  denied  { search } for  pid=132 comm="recovery" name="/" dev="fuse" ino=1 scontext=u:r:recovery:s0 tcontext=u:object_r:sdcard_internal:s0 tclass=dir

Change-Id: I27ee0295fa2e2d0449bfab4f95bfbc076e92cf59
2014-07-08 10:52:05 -07:00
Nick Kralevich
d86b0a81ab am 9f6af083: New domain "install_recovery"
* commit '9f6af083e8a31c9b5a9f9ac21885dfc3c0dc14b2':
  New domain "install_recovery"
2014-07-08 16:30:42 +00:00
Nick Kralevich
9f6af083e8 New domain "install_recovery"
Create a new domain for the one-shot init service flash_recovery.

This domain is initially in permissive_or_unconfined() for
testing. Any SELinux denials won't be enforced for now.

Change-Id: I7146dc154a5c78b6f3b4b6fb5d5855a05a30bfd8
2014-07-08 16:22:14 +00:00
Jeff Sharkey
e900e57385 am 77e85289: Merge "Rules to allow installing package directories."
* commit '77e8528912a157d62243d81b95c4297648a3d222':
  Rules to allow installing package directories.
2014-07-08 10:21:17 +00:00
Nick Kralevich
51ad2ad3aa am c2ba5ed9: recovery: start enforcing SELinux rules
* commit 'c2ba5ed90876e7c3f105ed658788557c68ab72b8':
  recovery: start enforcing SELinux rules
2014-07-07 23:03:42 +00:00
Nick Kralevich
c2ba5ed908 recovery: start enforcing SELinux rules
Start enforcing SELinux rules for recovery. I've been monitoring
denials, and I haven't seen anything which would indicate a problem.
We can always roll this back if something goes wrong.

Change-Id: I7d3a147f8b9000bf8181d2aa32520f15f291a6f3
2014-07-07 22:05:28 +00:00
Nick Kralevich
b23905e54c am 3508d611: fix build.
* commit '3508d611cc661730bdf0e706d2f1fd1814cd8c60':
  fix build.
2014-07-07 21:05:18 +00:00
Nick Kralevich
3508d611cc fix build.
libsepol.check_assertion_helper: neverallow on line 166 of external/sepolicy/domain.te (or line 5056 of policy.conf) violated by allow recovery unlabeled:file { create };
  Error while expanding policy
  make: *** [out/target/product/generic/obj/ETC/sepolicy.recovery_intermediates/sepolicy.recovery] Error 1

Change-Id: Iddf2cb8d0de2ab445e54a727f01be0b992b45ba5
2014-07-07 13:55:28 -07:00
Nick Kralevich
e9f1c01906 am 558710cd: recovery: allow relabelto unlabeled and other unlabeled rules
* commit '558710cdcc619682ef600d281f09ab4dad221692':
  recovery: allow relabelto unlabeled and other unlabeled rules
2014-07-07 20:41:26 +00:00
Nick Kralevich
558710cdcc recovery: allow relabelto unlabeled and other unlabeled rules
The recovery script may ask to label a file with a label not
known to the currently loaded policy. Allow it.

Addresses the following denials:

  avc:  denied  { relabelto } for  pid=143 comm="update_binary" name="vdc" dev="mmcblk0p25" ino=212 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0 tclass=file
  avc:  denied  { setattr } for  pid=143 comm="update_binary" name="vdc" dev="mmcblk0p25" ino=212 scontext=u:r:recovery:s0 tcontext=u:object_r:unlabeled:s0 tclass=file

Change-Id: Iafcc7b0b3aaea5a272adb1264233978365648f94
2014-07-07 13:23:30 -07:00
Nick Kralevich
04aabbace8 am c0088b80: Merge "Add neverallow rules further restricing service_manager."
* commit 'c0088b8064318210e775555ff4634994f7ab9e34':
  Add neverallow rules further restricing service_manager.
2014-07-07 20:02:53 +00:00
Nick Kralevich
7b7a25eaa5 am b8bdfde3: ueventd: Add policy support for ueventd labeling changes
* commit 'b8bdfde3d0d23f4730155bba807276eb06a3aa48':
  ueventd: Add policy support for ueventd labeling changes
2014-07-07 19:48:19 +00:00
Nick Kralevich
b8bdfde3d0 ueventd: Add policy support for ueventd labeling changes
Currently, ueventd only modifies the SELinux label on a file
if the entry exists in /ueventd.rc. Add policy support to enable
an independent restorecon_recursive whenever a uevent message occurs.

Change-Id: I0ccb5395ec0be9282095b844a5022e8c0d8903ac
2014-07-07 12:13:27 -07:00
Jeff Sharkey
77e8528912 Merge "Rules to allow installing package directories." 2014-07-07 18:07:41 +00:00
Jeff Sharkey
be092af039 Rules to allow installing package directories.
Earlier changes had extended the rules, but some additional changes
are needed.

avc: denied { relabelfrom } for name="vmdl-723825123.tmp"
    dev="mmcblk0p28" ino=162910 scontext=u:r:system_server:s0
    tcontext=u:object_r:apk_data_file:s0 tclass=dir

Bug: 14975160
Change-Id: I875cfc3538d4b098d27c7c7b756d1868a54cc976
2014-07-07 15:41:14 -07:00
Nick Kralevich
c0088b8064 Merge "Add neverallow rules further restricing service_manager." 2014-07-07 17:50:18 +00:00
Riley Spahn
76206abc9f Add neverallow rules further restricing service_manager.
Add a neverallow rule that prevents domain from adding a
default_android_service. Add a neverallow rule that prevents
untrusted_app from ever adding a service through
servicemanager.

Change-Id: I963671fb1224147bb49ec8f0b6be0dcc91c23156
2014-07-07 12:47:07 -07:00
Nick Kralevich
80e22de8c5 am 5b2ed833: Merge "system_server: bring back sdcard_type neverallow rule"
* commit '5b2ed833571ec039490d6f8359a50a03fd96e0fe':
  system_server: bring back sdcard_type neverallow rule
2014-07-07 15:37:09 +00:00
Nick Kralevich
185de52893 am be660697: Remove -unconfineddomain from neverallow rules
* commit 'be66069765b019257ed3bf1ca1285e643360a998':
  Remove -unconfineddomain from neverallow rules
2014-07-07 15:37:08 +00:00
Nick Kralevich
be66069765 Remove -unconfineddomain from neverallow rules
Many of the neverallow rules have -unconfineddomain. This was
intended to allow us to support permissive_or_unconfined(), and
ensure that all domains were enforcing at least a minimal set of
rules.

Now that all the app domains are in enforcing / confined, there's
no need to allow for these exceptions. Remove them.

Change-Id: Ieb29872dad415269f7fc2fe5be5a3d536d292d4f
2014-07-04 10:12:13 -07:00
Nick Kralevich
5b2ed83357 Merge "system_server: bring back sdcard_type neverallow rule" 2014-07-02 20:51:20 +00:00
Nick Kralevich
d00eff47fe system_server: bring back sdcard_type neverallow rule
We had disabled the neverallow rule when system_server was
in permissive_or_unconfined(), but forgot to reenable it.
Now that system_server is in enforcing/confined, bring it
back.

Change-Id: I6f74793d4889e3da783361c4d488b25f804ac8ba
2014-07-04 11:45:49 -07:00
Doug Zongker
9523f237ed am 93d849b6: recovery: allow creating and reading fuse filesystems
* commit '93d849b674d0f6783eebf554256d4c10afda3891':
  recovery: allow creating and reading fuse filesystems
2014-07-02 19:43:56 +00:00
Doug Zongker
93d849b674 recovery: allow creating and reading fuse filesystems
The new sideloading mechanism in recovery needs to create a fuse
filesystem and read files from it.

Change-Id: I22e1f7175baf401d2b75c4be6673ae4b75a0ccbf
2014-07-02 10:28:20 -07:00
Nick Kralevich
b5a39ee190 am 4be31900: Trivial change to support different SELinux policies for third party apps
* commit '4be31900a480b1c71d77cf6da02349c72a876daa':
  Trivial change to support different SELinux policies for third party apps
2014-07-01 21:20:17 +00:00
Nick Kralevich
4be31900a4 Trivial change to support different SELinux policies for third party apps
Needed to support https://android-review.googlesource.com/80871

Change-Id: Iba569c046135c0e81140faf6296c5da26a243037
2014-07-01 14:02:38 -07:00
Sharvil Nanavati
016e7f71ea am 77eb3526: Grant Bluetooth CAP_WAKE_ALARM so it can use the POSIX timer API for wake alarms.
* commit '77eb35263f40607e36fdcd85d95050a4ecedb6b8':
  Grant Bluetooth CAP_WAKE_ALARM so it can use the POSIX timer API for wake alarms.
2014-07-01 20:02:37 +00:00
Sharvil Nanavati
77eb35263f Grant Bluetooth CAP_WAKE_ALARM so it can use the POSIX timer API for wake alarms.
Change-Id: Ic7b25e79116b90378e5e89a879d8e6b87e4f052e
2014-07-01 11:58:30 -07:00
Riley Spahn
3602071c33 am 596bcc76: Remove keystore auditallow statements from system.
* commit '596bcc768758f38534a537a3fb54875225417f2c':
  Remove keystore auditallow statements from system.
2014-07-01 18:34:16 +00:00
Riley Spahn
596bcc7687 Remove keystore auditallow statements from system.
Remove the auditallow statements related to keystore
in system_app and system_server.

Change-Id: I1fc25ff475299ee020ea19f9b6b5811f8fd17c28
2014-07-01 18:25:02 +00:00
Riley Spahn
0d9cefbb77 am 22e0c414: Remove auditallow statements causing log spam.
* commit '22e0c414a50feed2f0475ab0d75301dce3488873':
  Remove auditallow statements causing log spam.
2014-07-01 17:15:16 +00:00
Riley Spahn
22e0c414a5 Remove auditallow statements causing log spam.
Remove the auditallow statements from app.te and
binderservicedomain.te which were causing log spam.

Change-Id: If1c33d1612866df9f338e6d8c19d73950ee028eb
2014-07-01 09:48:58 -07:00