Jeffrey Vander Stoep
299e1d5a85
Merge "zygote: grant perms from domain_deprecated"
...
am: 4115beae63
* commit '4115beae6375b3b7c1cb777d342e0e7cd6028995':
zygote: grant perms from domain_deprecated
2016-01-27 18:13:20 +00:00
Jeffrey Vander Stoep
4115beae63
Merge "zygote: grant perms from domain_deprecated"
2016-01-27 18:08:01 +00:00
Jeffrey Vander Stoep
01afbb4c61
Merge "autoplay_app: cgroup write perms moved to domain"
2016-01-27 18:07:55 +00:00
Jeff Vander Stoep
e52fff83a1
zygote: grant perms from domain_deprecated
...
In preparation of removing permissions from domain_deprecated.
Addresses:
avc: denied { read } for name="ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
avc: denied { open } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
avc: denied { getattr } for path="/proc/220/net/ipv6_route" dev="proc" ino=4026536875 scontext=u:r:zygote:s0 tcontext=u:object_r:proc_net:s0 tclass=file
Change-Id: I5b505ad386a445113bc0a1bb35d4f88f7761c048
2016-01-27 09:57:25 -08:00
Marco Nelissen
87a79cf9dd
Merge "selinux rules for codec process"
2016-01-27 17:46:47 +00:00
Jeff Vander Stoep
00fdd71185
autoplay_app: cgroup write perms moved to domain
...
Remove from autoplay
Change-Id: Ic9f019f69e5f2dff5e2b8d03d39052486660d791
2016-01-27 09:27:16 -08:00
Narayan Kamath
3acd7eb8e7
Merge "Revert "Remove domain_deprecated from sdcard domains"" am: c4121add28
...
am: 2e97539602
* commit '2e975396026fe074b074f126309e5f4a88702a2c':
Revert "Remove domain_deprecated from sdcard domains"
2016-01-27 15:45:11 +00:00
Narayan Kamath
2e97539602
Merge "Revert "Remove domain_deprecated from sdcard domains""
...
am: c4121add28
* commit 'c4121add28c75ab12d634d2aa7570417ebb4e043':
Revert "Remove domain_deprecated from sdcard domains"
2016-01-27 15:43:26 +00:00
Sylvain Chouleur
9a28f90d6a
init: allow to access console-ramoops with newer kernels
...
Since linux 3.18, commit 68c4a4f8abc60c9440ede9cd123d48b78325f7a3 has
been integrated and requires syslog_read capability a process accessing
console-ramoops file.
sepolicy must be adapted to this new requirement.
Change-Id: Ib4032a6bd96b1828a0154edc8fb510e3c1d3bdc2
Signed-off-by: Sylvain Chouleur <sylvain.chouleur@intel.com>
2016-01-27 16:42:31 +01:00
Narayan Kamath
c4121add28
Merge "Revert "Remove domain_deprecated from sdcard domains""
2016-01-27 15:39:28 +00:00
Narayan Kamath
f4d7eef731
Revert "Remove domain_deprecated from sdcard domains"
...
This reverts commit 0c7bc58e91
.
bug: 26807309
Change-Id: I8a7b0e56a0d6f723508d0fddceffdff76eb0459a
2016-01-27 15:39:05 +00:00
Jeff Vander Stoep
448952b617
domain: grant write perms to cgroups am: be0616baf0
...
am: 7676d3d985
* commit '7676d3d9854879830c8bc78c80ede981e937044c':
domain: grant write perms to cgroups
2016-01-27 03:35:14 +00:00
Jeff Vander Stoep
7676d3d985
domain: grant write perms to cgroups
...
am: be0616baf0
* commit 'be0616baf0c0caf8e1c8a4fdc9b488839f6af27d':
domain: grant write perms to cgroups
2016-01-27 03:33:26 +00:00
Jeff Vander Stoep
be0616baf0
domain: grant write perms to cgroups
...
Was moved to domain_deprecated. Move back to domain.
Files in /acct/uid/*/tasks are well protected by unix permissions.
No information is leaked with write perms.
Change-Id: I8017e906950cba41ce350bc0892a36269ade8d53
2016-01-27 03:00:50 +00:00
dcashman
e458f9abd4
Restore untrusted_app proc_net access. am: 5833e3f5ca
...
am: a321dde852
* commit 'a321dde852731f320e24f93347f39278bcf0b58b':
Restore untrusted_app proc_net access.
2016-01-27 01:26:57 +00:00
dcashman
a321dde852
Restore untrusted_app proc_net access.
...
am: 5833e3f5ca
* commit '5833e3f5ca04e88629e3bd76331fa0ab42d568f4':
Restore untrusted_app proc_net access.
2016-01-27 01:25:05 +00:00
dcashman
5833e3f5ca
Restore untrusted_app proc_net access.
...
Address the following denial:
type=1400 audit(0.0:853): avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=dir permissive=0
Bug: 26806629
Change-Id: Ic2ad91aadac00dc04d7e04f7460d5681d81134f4
2016-01-26 16:56:24 -08:00
SimHyunYong
001b10bdff
remove access_kmsg macro, because it to be more explicit.
...
This macro does not give us anything to it.
Change-Id: Ie0b56716cc0144f0a59849647cad31e06a25acf1
2016-01-27 08:56:30 +09:00
SimHyunYong
f7f49b80a3
Using r_dir_file macro in domain.te am: 093ea6fb9a
...
am: fa46a7375b
* commit 'fa46a7375bf36ea5dcc08cfdb92cbc463a2d471c':
Using r_dir_file macro in domain.te
2016-01-26 23:48:42 +00:00
SimHyunYong
fa46a7375b
Using r_dir_file macro in domain.te
...
am: 093ea6fb9a
* commit '093ea6fb9a284acbce10641f8743de24abd70734':
Using r_dir_file macro in domain.te
2016-01-26 23:46:45 +00:00
dcashman
aedf223656
Reduce accessibility of voiceinteraction_service.
...
The services under this label are not meant to be exposed to all apps.
Currently only priv_app needs access.
Bug: 26799206
Change-Id: I07c60752d6ba78f27f90bf5075bcab47eba90b55
2016-01-26 15:12:08 -08:00
Jeffrey Vander Stoep
e449446548
Merge "Remove domain_deprecated from sdcard domains" am: cdae042a07
...
am: dd55b44d08
* commit 'dd55b44d08d6e4be36f110c35bc69c8309c0161e':
Remove domain_deprecated from sdcard domains
2016-01-26 23:02:58 +00:00
Jeffrey Vander Stoep
dd55b44d08
Merge "Remove domain_deprecated from sdcard domains"
...
am: cdae042a07
* commit 'cdae042a07cda569f2366cb8f6b0b036f0a8c634':
Remove domain_deprecated from sdcard domains
2016-01-26 22:56:07 +00:00
SimHyunYong
093ea6fb9a
Using r_dir_file macro in domain.te
...
r_dir_file(domain, self)
allow domain self:dir r_dir_perms;
allow domain self:lnk_file r_file_perms;
allow domain self:file r_file_perms;
te_macros
define(`r_dir_file', `
allow $1 $2:dir r_dir_perms;
allow $1 $2:{ file lnk_file } r_file_perms;
')
Change-Id: I7338f63a1eaa8ca52cd31b51ce841e3dbe46ad4f
2016-01-27 07:54:47 +09:00
Jeffrey Vander Stoep
cdae042a07
Merge "Remove domain_deprecated from sdcard domains"
2016-01-26 22:44:14 +00:00
James Hawkins
327da659be
Merge "bootstat: Fix the SELinux policy after removing domain_deprecated." am: ae29dea8b7
...
am: c119fab939
* commit 'c119fab9392cc8a7d95d88417ff8a1c2a521566f':
bootstat: Fix the SELinux policy after removing domain_deprecated.
2016-01-26 21:54:59 +00:00
Jeff Vander Stoep
59e47dd5de
resolve merge conflicts of ef9a0be598
to master.
...
Change-Id: I65d7c0bb306f61dfe0ad2a5581f28dbc2942a1eb
2016-01-26 13:38:03 -08:00
James Hawkins
c119fab939
Merge "bootstat: Fix the SELinux policy after removing domain_deprecated."
...
am: ae29dea8b7
* commit 'ae29dea8b7580478bd18f4354adeff38b1de1476':
bootstat: Fix the SELinux policy after removing domain_deprecated.
2016-01-26 21:31:19 +00:00
James Hawkins
ae29dea8b7
Merge "bootstat: Fix the SELinux policy after removing domain_deprecated."
2016-01-26 21:26:37 +00:00
Arunesh Mishra
7a17cf5c95
Merge "Allow "soundtrigger" system service to run."
2016-01-26 21:16:37 +00:00
SimHyunYong
ef9a0be598
Delete policy it is alread included in binder_call macros.
...
am: 7171232c02
* commit '7171232c02d27e777ad2267f1a8b5246b3aabc8d':
Delete policy it is alread included in binder_call macros.
2016-01-26 20:08:55 +00:00
Arunesh Mishra
400266bfae
Allow "soundtrigger" system service to run.
...
In the same process as voiceinteraction.
Please see related CL ag/852049
Bug: 22860713
Change-Id: I43ebfdba2aafb151dd7db0814570027e1164508a
2016-01-26 11:27:46 -08:00
James Hawkins
2e8d71c3be
bootstat: Fix the SELinux policy after removing domain_deprecated.
...
* Allow reading /proc.
type=1400 audit(1453834004.239:7): avc: denied { read } for pid=1305
comm="bootstat" name="uptime" dev="proc" ino=4026536600
scontext=u:r:bootstat:s0 tcontext=u:object_r:proc:s0 tclass=file
permissive=0
* Define domain for the /system/bin/bootstat file.
init: Service exec 4 (/system/bin/bootstat) does not have a SELinux
domain defined.
Bug: 21724738
Change-Id: I4baa2fa7466ac35a1ced79776943c07635ec9804
2016-01-26 18:52:58 +00:00
SimHyunYong
7171232c02
Delete policy it is alread included in binder_call macros.
...
define(`binder_call', `
allow $1 $2:binder { call transfer };
allow $2 $1:binder transfer;
allow $1 $2:fd use;
')
binder_call(surfaceflinger, appdomain)
binder_call(surfaceflinger, bootanim)
it is alread include these policy.. so I can delete these policy!
allow surfaceflinger appdomain:fd use;
allow surfaceflinger bootanim:fd use;
2016-01-26 16:33:44 +09:00
Jeffrey Vander Stoep
912be4319e
Merge "Delete duplicated policy, it is already include in app.te." am: 0220b345b3
...
am: c37b0c330f
* commit 'c37b0c330fb08b59351b097cf52816b0a9b20f11':
Delete duplicated policy, it is already include in app.te.
2016-01-26 06:24:22 +00:00
Jeffrey Vander Stoep
c37b0c330f
Merge "Delete duplicated policy, it is already include in app.te."
...
am: 0220b345b3
* commit '0220b345b39fa7781e3a352ecf84f45bc29016ab':
Delete duplicated policy, it is already include in app.te.
2016-01-26 06:22:11 +00:00
Jeffrey Vander Stoep
0220b345b3
Merge "Delete duplicated policy, it is already include in app.te."
2016-01-26 06:17:32 +00:00
Tao Bao
51523e59da
resolve merge conflicts of 42baca019b
to master.
...
Change-Id: I7fe13cbe563dcd2f286696010f0a5034dfee0202
2016-01-25 21:03:36 -08:00
Tao Bao
42baca019b
Merge "Allow update_engine to use Binder IPC."
...
am: 6899e0a38b
* commit '6899e0a38b14047f561493e87341b72dfbf3fe8a':
Allow update_engine to use Binder IPC.
2016-01-26 04:52:53 +00:00
Tao Bao
6899e0a38b
Merge "Allow update_engine to use Binder IPC."
2016-01-26 04:33:51 +00:00
SimHyunYong
5ba9af2390
Delete duplicated policy, it is already include in app.te.
...
allow appdomain keychain_data_file:dir r_dir_perms;
allow appdomain keychain_data_file:file r_file_perms;
2016-01-26 11:13:29 +09:00
dcashman
d357760531
Add adbd socket perms to system_server. am: b037a6c94b
...
am: c37fa20383
* commit 'c37fa2038327c8879e297b6fa9b76ba45ddcf67c':
Add adbd socket perms to system_server.
2016-01-26 01:44:45 +00:00
dcashman
c37fa20383
Add adbd socket perms to system_server.
...
am: b037a6c94b
* commit 'b037a6c94b357c9a85d13dde548f5799c592c6ac':
Add adbd socket perms to system_server.
2016-01-26 01:42:44 +00:00
Tao Bao
dce317cf43
Allow update_engine to use Binder IPC.
...
Register service with servicemanager and name the context.
avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:servicemanager:s0 tclass=binder
avc: denied { add } for service=android.os.IUpdateEngine scontext=u:r:update_engine:s0 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
Also allow priv_app to communicate with update_engine.
avc: denied { find } for service=android.os.IUpdateEngine scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:update_engine_service:s0 tclass=service_manager
avc: denied { call } for scontext=u:r:priv_app:s0:c512,c768 tcontext=u:r:update_engine:s0 tclass=binder
avc: denied { call } for scontext=u:r:update_engine:s0 tcontext=u:r:priv_app:s0 tclass=binder
Change-Id: Ib4498717c1a72f5faab5ea04c636924ee4eb412c
2016-01-25 16:42:38 -08:00
dcashman
b037a6c94b
Add adbd socket perms to system_server.
...
Commit 2fdeab3789
added ability to debug
over adbd for zygote-spawned apps, required by removal of domain_deprecated
from untrusted_app. This functionality is a core debugabble component
of the android runtime, so it is needed by system_server as well.
Bug: 26458796
Change-Id: I29f5390122b3644449a5c3dcf4db2d0e969f6a9a
2016-01-25 16:09:01 -08:00
Jeff Vander Stoep
dfd82ecbbf
app: connect to adbd am: 2fdeab3789
...
am: 97ebf96aba
* commit '97ebf96aba44f9cf14b975051b240bade5841053':
app: connect to adbd
2016-01-25 23:29:18 +00:00
Jeff Vander Stoep
97ebf96aba
app: connect to adbd
...
am: 2fdeab3789
* commit '2fdeab3789ec6e5ec6f7424abf41a9aaa73564b0':
app: connect to adbd
2016-01-25 23:27:33 +00:00
Jeff Vander Stoep
2fdeab3789
app: connect to adbd
...
Permission to connect to adb was removed from untrusted_app when
the domain_deprecated attribute was removed. Add it back to support
debugging of apps. Grant to all apps as eventually
domain_deprecated will be removed from everything.
Bug: 26458796
Change-Id: I4356e6d011094cdb6829210dd0eec443b21f8496
2016-01-25 15:20:05 -08:00
Jeff Vander Stoep
042d37c3a4
domain: allow dir search in selinuxfs am: 45517a7547
...
am: cfa5d76fb8
* commit 'cfa5d76fb8c9ec4d68d1664c540ebe2f03e09d49':
domain: allow dir search in selinuxfs
2016-01-25 18:31:12 +00:00
Jeff Vander Stoep
cfa5d76fb8
domain: allow dir search in selinuxfs
...
am: 45517a7547
* commit '45517a7547de0a9f0c13b5907c243456ec61bf04':
domain: allow dir search in selinuxfs
2016-01-25 18:28:59 +00:00