Commit graph

2328 commits

Author SHA1 Message Date
Stephen Smalley
65ad808685 am f0ffff0b: Make the mediaserver domain enforcing.
* commit 'f0ffff0bc9b00df985aecba77334af65b06e65c6':
  Make the mediaserver domain enforcing.
2014-06-13 01:02:57 +00:00
Stephen Smalley
f0ffff0bc9 Make the mediaserver domain enforcing.
Change-Id: Ib693b563c2db6abc02cf7dbeb12ed61c09734fa8
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-06-12 23:41:13 +00:00
Nick Kralevich
2c8b50b88f am 86703051: Remove world-read access to /data/dalvik-cache/profiles
* commit '867030517724036b64fcaf39deaba1b27f3ca77e':
  Remove world-read access to /data/dalvik-cache/profiles
2014-06-12 23:12:43 +00:00
Nick Kralevich
8670305177 Remove world-read access to /data/dalvik-cache/profiles
Remove /data/dalvik-cache/profiles from domain. Profiling information
leaks data about how people interact with apps, so we don't want
the data to be available in all SELinux domains.

Add read/write capabilities back to app domains, since apps need to
read/write profiling data.

Remove restorecon specific rules. The directory is now created by
init, not installd, so installd doesn't need to set the label.

Change-Id: Ic1b44009faa30d704855e97631006c4b990a4ad3
2014-06-12 14:56:05 -07:00
Nick Kralevich
8eb63f24bb am b0ee91a4: Merge "Add SELinux rules for service_manager."
* commit 'b0ee91a418a899dbd39678711ea65ed60418154e':
  Add SELinux rules for service_manager.
2014-06-12 21:06:37 +00:00
Stephen Smalley
db4af52df9 am a2e4e265: Allow shell to read/search /dev/input directory.
* commit 'a2e4e2656bfdd0bb002123c0e1da893831a47b82':
  Allow shell to read/search /dev/input directory.
2014-06-12 15:03:57 +00:00
Stephen Smalley
a2e4e2656b Allow shell to read/search /dev/input directory.
Resolves denials such as:
avc: denied { read } for pid=16758 comm="getevent" name="input" dev="tmpfs" ino=6018 scontext=u:r:shell:s0 tcontext=u:object_r:input_device:s0 tclass=dir

Change-Id: I709bd20a03a5271382b191393d55a34b0b8e4e0c
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-06-12 09:50:00 -04:00
Nick Kralevich
b0ee91a418 Merge "Add SELinux rules for service_manager." 2014-06-12 05:34:11 +00:00
Riley Spahn
f90c41f6e8 Add SELinux rules for service_manager.
Add a service_mananger class with the verb add.
Add a type that groups the services for each of the
processes that is allowed to start services in service.te
and an attribute for all services controlled by the service
manager. Add the service_contexts file which maps service
name to target label.

Bug: 12909011
Change-Id: I017032a50bc90c57b536e80b972118016d340c7d
2014-06-12 20:46:07 +00:00
Mark Salyzyn
848109c0b9 Merge "selinux: logd Development settings" 2014-06-12 03:32:07 +00:00
Mark Salyzyn
9e7bbf61de selinux: logd Development settings
- logd Development Settings failed to access persist.logd.size

Change-Id: I0732b44fcbffbf3c187bcb23df2db807fa3e8fde
2014-06-12 13:08:13 -07:00
Nick Kralevich
fc10f2a759 Merge "runas: allow pipe communication from the shell" 2014-06-12 03:32:07 +00:00
Nick Kralevich
6c9c58884a runas: allow pipe communication from the shell
run-as won't communicate with shell via pipes. Allow it.

  nnk@nnk:~$ adb shell "cat /dev/zero | run-as com.google.foo sh -c 'cat'"
  /system/bin/sh: cat: <stdout>: Broken pipe

  <4>[ 1485.483517] type=1400 audit(1402623577.085:25): avc: denied { read } for pid=6026 comm="run-as" path="pipe:[29823]" dev="pipefs" ino=29823 scontext=u:r:runas:s0 tcontext=u:r:shell:s0 tclass=fifo_file

read is definitely needed. Not sure about write, but adding it just
in case.

Change-Id: Ifdf838b0df79a5f1e9559af57c2d1fdb8c41a201
2014-06-12 18:54:10 -07:00
Nick Kralevich
224be2c21a am 62af8381: Merge "Allow installd to chown/chmod app data files."
* commit '62af83810baa7a6c07a8673136c1cdf5a6763b48':
  Allow installd to chown/chmod app data files.
2014-06-11 14:21:43 +00:00
Stephen Smalley
ad44208285 am 7c11bdc4: Allow dnsmasq to inherit/use netd UDP socket.
* commit '7c11bdc414e10d0e570ff35394d209784a647105':
  Allow dnsmasq to inherit/use netd UDP socket.
2014-06-11 14:21:42 +00:00
Stephen Smalley
7c11bdc414 Allow dnsmasq to inherit/use netd UDP socket.
Addresses denials such as:
avc: denied { read write } for comm="dnsmasq" path="socket:[1054090]" dev="sockfs" ino=1054090 scontext=u:r:dnsmasq:s0 tcontext=u:r:netd:s0 tclass=udp_socket
This may not be needed (need to check netd to see if it should be closing
all of these sockets before exec'ing other programs), but should be harmless.

Change-Id: I77c7af5e050e039fd48322914eeabbcb8a716040
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-06-11 14:16:36 +00:00
Stephen Smalley
d352fba1b9 am 42fb824c: Refactor the shell domains.
* commit '42fb824ca9f3e46b4419f05083f2694ac67a8229':
  Refactor the shell domains.
2014-06-11 13:10:30 +00:00
Stephen Smalley
42fb824ca9 Refactor the shell domains.
Originally we used the shell domain for ADB shell only and
the init_shell domain for the console service, both transitioned
via automatic domain transitions on sh.  So they originally
shared a common set of rules.  Then init_shell started to be used
for sh commands invoked by init.<board>.rc files, and we switched
the console service to just use the shell domain via seclabel entry
in init.rc.  Even most of the sh command instances in init.<board>.rc
files have been converted to use explicit seclabel options with
more specific domains (one lingering use is touch_fw_update service
in init.grouper.rc).  The primary purpose of init_shell at this point
is just to shed certain permissions from the init domain when init invokes
a shell command.  And init_shell and shell are quite different in
their permission requirements since the former is used now for
uid-0 processes spawned by init whereas the latter is used for
uid-shell processes spawned by adb or init.

Given these differences, drop the shelldomain attribute and take those
rules directly into shell.te.  init_shell was an unconfined_domain(),
so it loses nothing from this change.  Also switch init_shell to
permissive_or_unconfined() so that we can see its actual denials
in the future in userdebug/eng builds.

Change-Id: I6e7e45724d1aa3a6bcce8df676857bc8eef568f0
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-06-11 07:31:34 -04:00
Nick Kralevich
2be9c64f85 Merge "Make inputflinger enforcing." 2014-06-11 08:41:21 +00:00
Stephen Smalley
701aebb59c Make inputflinger enforcing.
Change-Id: I99f93e4dd5dc1f43291c46f6ed07e51097613689
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-06-13 12:14:10 +00:00
Ruchi Kandoi
0bcbc6c470 am 13d58863: system_server: Adds permission to system_server to write sysfs file
* commit '13d5886363675915e5115ccc0a95ca5d7776730b':
  system_server: Adds permission to system_server to write sysfs file
2014-06-10 23:51:12 +00:00
Ruchi Kandoi
13d5886363 system_server: Adds permission to system_server to write sysfs file
Need this for changing the max_cpufreq and min_cpufreq for the low power
mode.

Denials:
type=1400 audit(1402431554.756:14): avc: denied { write } for pid=854
comm="PowerManagerSer" name="scaling_max_freq" dev="sysfs" ino=9175
scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0
tclass=file

Change required for Change-Id: I1cf458c4f128818ad1286e5a90b0d359b6913bb8

Change-Id: Ic5ce3c8327e973bfa1d53f298c07dcea1550b646
Signed-off-by: Ruchi Kandoi<kandoiruchi@google.com>
2014-06-10 23:43:33 +00:00
Lorenzo Colitti
b32448c90f Merge "Allow clatd to read from packet sockets and write to raw sockets" 2014-06-10 22:38:27 +00:00
Lorenzo Colitti
6cd57a43d2 Allow clatd to read from packet sockets and write to raw sockets
This addresses the following denials that occur when switching
clatd from an IPv6 tun interface to packet and raw sockets:

avc: denied { net_raw } for pid=3540 comm="clatd" capability=13 scontext=u:r:clatd:s0 tcontext=u:r:clatd:s0 tclass=capability
avc: denied { create } for pid=3540 comm="clatd" scontext=u:r:clatd:s0 tcontext=u:r:clatd:s0 tclass=packet_socket
avc: denied { bind } for pid=3540 comm="clatd" scontext=u:r:clatd:s0 tcontext=u:r:clatd:s0 tclass=packet_socket
avc: denied { setopt } for pid=3540 comm="clatd" scontext=u:r:clatd:s0 tcontext=u:r:clatd:s0 tclass=packet_socket
avc: denied { read } for pid=3540 comm="clatd" path="socket:[19117]" dev="sockfs" ino=19117 scontext=u:r:clatd:s0 tcontext=u:r:clatd:s0 tclass=packet_socket

Bug: 15340961
Change-Id: I3c06e8e3e0cfc0869a7b73c803bbffe28369ee5e
2014-06-12 23:45:52 +09:00
Nick Kralevich
62af83810b Merge "Allow installd to chown/chmod app data files." 2014-06-10 22:15:14 +00:00
Stephen Smalley
89b9ff7e87 Allow installd to chown/chmod app data files.
Addresses denials such as:
avc: denied { setattr } for comm="installd" name="com.android.calendar_preferences_no_backup.xml" dev="mmcblk0p28" ino=1499393 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0 tclass=file                                        avc: denied { setattr } for comm="installd" name="calendar_alerts.xml" dev="mmcblk0p28" ino=1499463 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0 tclass=file
avc: denied { setattr } for comm="installd" name="_has_set_default_values.xml" dev="mmcblk0p28" ino=1499428 scontext=u:r:installd:s0 tcontext=u:object_r:app_data_file:s0 tclass=file

Change-Id: I0622f1a9d2b10e28be2616f91edf33bc048b4ac7
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-06-11 14:16:43 +00:00
Nick Kralevich
aa15a5002c am f4e69028: recovery: don\'t use single quote
* commit 'f4e690285022ff80381d6e371d2e7747b6894fcd':
  recovery: don't use single quote
2014-06-10 13:06:14 +00:00
Nick Kralevich
f4e6902850 recovery: don't use single quote
single quotes make the m4 parser think it's at the end of
a block, and generates the following compile time warning:

  external/sepolicy/recovery.te:9:WARNING 'unrecognized character' at token ''' on line 7720:

Change-Id: I2502f16f0d9ec7528ec0fc2ee65ad65635d0101b
2014-06-09 20:36:59 -07:00
Nick Kralevich
71eecd330a am a8281adf: dumpstate: allow pstore access
* commit 'a8281adf994623c6e1404d3102915a93eb0b70aa':
  dumpstate: allow pstore access
2014-06-10 01:14:56 +00:00
Nick Kralevich
a8281adf99 dumpstate: allow pstore access
Dumpstate reads from /sys/fs/pstore/console-ramoops when generating
a bug report. Allow it.

Addresses the following denials:
  <12>[ 2187.362750] type=1400 audit(1402346777.139:9): avc: denied { search } for pid=4155 comm="dumpstate" name="/" dev="pstore" ino=9954 scontext=u:r:dumpstate:s0 tcontext=u:object_r:pstorefs:s0 tclass=dir permissive=1
  <12>[ 2187.363025] type=1400 audit(1402346777.139:10): avc: denied { getattr } for pid=4155 comm="dumpstate" path="/sys/fs/pstore/console-ramoops" dev="pstore" ino=9955 scontext=u:r:dumpstate:s0 tcontext=u:object_r:pstorefs:s0 tclass=file permissive=1
  <12>[ 2187.363185] type=1400 audit(1402346777.139:11): avc: denied { read } for pid=4155 comm="dumpstate" name="console-ramoops" dev="pstore" ino=9955 scontext=u:r:dumpstate:s0 tcontext=u:object_r:pstorefs:s0 tclass=file permissive=1
  <12>[ 2187.363321] type=1400 audit(1402346777.139:12): avc: denied { open } for pid=4155 comm="dumpstate" path="/sys/fs/pstore/console-ramoops" dev="pstore" ino=9955 scontext=u:r:dumpstate:s0 tcontext=u:object_r:pstorefs:s0 tclass=file permissive=1

Change-Id: Ia20b7a03ed8e0c61b023eea93415a50af82e1bbf
2014-06-09 13:46:38 -07:00
Nick Kralevich
75927265f5 am b2ed044f: dumpstate: allow gpu_device access
* commit 'b2ed044f8d6ed31acd814f5346148e762f3a5751':
  dumpstate: allow gpu_device access
2014-06-09 20:19:34 +00:00
Nick Kralevich
b2ed044f8d dumpstate: allow gpu_device access
dumpstate calls screencap to take a screenshot. screencap
requires the ability to access the gpu device. Allow it.

Bug: 15514427
Change-Id: Iad8451b6108786653146de471f6be2d26b0e3297
2014-06-09 12:52:01 -07:00
Nick Kralevich
3e7eddf70e am 7fd03e9c: Merge "remove shell_data_file from unconfined."
* commit '7fd03e9c83cf60d8864bb2a0d6090fb85de2aed6':
  remove shell_data_file from unconfined.
2014-06-09 19:32:08 +00:00
Nick Kralevich
7fd03e9c83 Merge "remove shell_data_file from unconfined." 2014-06-09 19:24:45 +00:00
Nick Kralevich
a8890f9381 am ac23ff9e: Merge "label usbfs"
* commit 'ac23ff9ea8b11fff0e75c618a34e996e6e59f9e2':
  label usbfs
2014-06-09 16:24:48 +00:00
Nick Kralevich
ac23ff9ea8 Merge "label usbfs" 2014-06-09 16:18:05 +00:00
Nick Kralevich
d7bedd6078 am e79433d8: Merge "add attach_queue to tun_socket"
* commit 'e79433d8574993a7857a2406ea312bfa1f65a59f':
  add attach_queue to tun_socket
2014-06-09 15:52:09 +00:00
Nick Kralevich
6db62fd50b am ddc90255: Merge "Refine recovery domain."
* commit 'ddc902553d55c2cddec1aea010bf943b0e7e6252':
  Refine recovery domain.
2014-06-09 15:52:09 +00:00
Nick Kralevich
d37603dcd7 am 442b6f10: Merge "allow adb push to create directories."
* commit '442b6f10532cc6a03bcfbb7940a18a23d480e098':
  allow adb push to create directories.
2014-06-09 15:52:09 +00:00
Nick Kralevich
62ab866ad4 am 7ada3bdf: Merge "surfaceflinger: remove unconfined domain reference."
* commit '7ada3bdf976acae90fb3004a38f44bd1e6ef4dd3':
  surfaceflinger: remove unconfined domain reference.
2014-06-09 15:52:08 +00:00
Nick Kralevich
e79433d857 Merge "add attach_queue to tun_socket" 2014-06-09 15:43:23 +00:00
Nick Kralevich
ddc902553d Merge "Refine recovery domain." 2014-06-09 15:43:11 +00:00
Nick Kralevich
442b6f1053 Merge "allow adb push to create directories." 2014-06-09 15:42:52 +00:00
Nick Kralevich
7ada3bdf97 Merge "surfaceflinger: remove unconfined domain reference." 2014-06-09 15:42:42 +00:00
Nick Kralevich
5a5fb85f1e label usbfs
Right now usbfs doesn't have any labels, generating the
following kernel warnings:

<7>[    3.009582] SELinux: initialized (dev usbfs, type usbfs), not configured for labeling

and the occasional SELinux unlabeled auditallow logs:

<4>[  285.579254] type=1400 audit(1402010345.094:16): avc: granted { search } for pid=371 comm="qcks" name="/" dev="usbfs" ino=15794 scontext=u:r:kickstart:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir
<4>[  285.632354] type=1400 audit(1402010345.154:18): avc: granted { search } for pid=371 comm="qcks" name="001" dev="usbfs" ino=15796 scontext=u:r:kickstart:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir

Make sure usbfs is assigned via genfscon

Change-Id: I7191f2584014ba55a3c3a98e7efd0350dc958782
2014-06-09 08:36:14 -07:00
Nick Kralevich
5eafefd112 am a1cd65b8: Make dumpstate domain enforcing.
* commit 'a1cd65b81021645835123ccddd8b8998d05b21b1':
  Make dumpstate domain enforcing.
2014-06-09 08:30:18 +00:00
Stephen Smalley
57b4399055 am d1591224: Make system_app enforcing.
* commit 'd1591224818092e5f4abad7ba5b71cd2137ffd02':
  Make system_app enforcing.
2014-06-09 08:30:17 +00:00
Nick Kralevich
a1cd65b810 Make dumpstate domain enforcing.
Change-Id: I74bf300c1b80e94e5acf9ba00ab443dfabad7408
2014-06-09 05:48:31 +00:00
Nick Kralevich
b53e84a723 surfaceflinger: remove unconfined domain reference.
surfaceflinger has been enforcing for a while now. Remove
the reference to the unconfined domain.

Change-Id: Ia86a0553e9c2db3c89f93e26179c79278d1d3bed
2014-06-08 22:30:58 -07:00
Stephen Smalley
d159122481 Make system_app enforcing.
Change-Id: I9c3ff0a79d947a14084638772451d06298c43e47
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2014-06-09 05:27:11 +00:00