Commit graph

4073 commits

Author SHA1 Message Date
Nick Kralevich
8b50638c81 am 77e19521: am 0f0324cc: domain.te: allow /proc/net/psched access
* commit '77e195210f34747ef2955e13652eaa6fe8bcac77':
  domain.te: allow /proc/net/psched access
2015-01-22 20:55:39 +00:00
Nick Kralevich
77e195210f am 0f0324cc: domain.te: allow /proc/net/psched access
* commit '0f0324cc826afb9beefda802d496befe823a081e':
  domain.te: allow /proc/net/psched access
2015-01-22 20:47:12 +00:00
Nick Kralevich
0f0324cc82 domain.te: allow /proc/net/psched access
external/sepolicy commit 99940d1af5
(https://android-review.googlesource.com/123331) removed /proc/net
access from domain.te.

Around the same time, system/core commit
9a20e67fa62c1e0e0080910deec4be82ebecc922
(https://android-review.googlesource.com/123531) was checked in.
This change added libnl as a dependency of libsysutils.

external/libnl/lib/utils.c has a function called get_psched_settings(),
which is annotated with __attribute__((constructor)). This code
gets executed when the library is loaded, regardless of whether or
not other libnl code is executed.

By adding the libnl dependency, even code which doesn't use the
network (such as vold and logd) ends up accessing /proc/net/psched.

For now, allow this behavior. However, in the future, it would be
better to break this dependency so the additional code isn't loaded
into processes which don't need it.

Addresses the following denials:

  avc: denied { read } for  pid=148 comm="logd" name="psched" dev="proc" ino=4026536508 scontext=u:r:logd:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0
  avc: denied { read } for pid=152 comm="vold" name="psched" dev="proc" ino=4026536508 scontext=u:r:vold:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0
  avc: denied { read } for pid=930 comm="wpa_supplicant" name="psched" dev="proc" ino=4026536508 scontext=u:r:wpa:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=0

Bug: 19079006
Change-Id: I1b6d2c144534d3f70f0028ef54b470a75bace1cf
2015-01-22 10:59:21 -08:00
Sharif Inamdar
3a1f6cceaf am d9966044: am 99b40521: Allow system_app to access /data/data link files
* commit 'd99660444d6ded85a0da7030423a71887e004414':
  Allow system_app to access /data/data link files
2015-01-22 00:14:18 +00:00
Nick Kralevich
e8d614b268 am 90b8471e: am 9dc5956f: Merge "Revert "isolated_app: Do not allow access to the gpu_device.""
* commit '90b8471e5a1eeb74032fdb192b0bc4b99196c3d4':
  Revert "isolated_app: Do not allow access to the gpu_device."
2015-01-22 00:14:18 +00:00
Christopher Ferris
e655777eb7 am a48dd6c1: am c21e9cc1: Merge "Allow debuggerd to redirect requests."
* commit 'a48dd6c107b4f3333fbfcf3dad271c943e708d0b':
  Allow debuggerd to redirect requests.
2015-01-22 00:13:28 +00:00
Sharif Inamdar
d99660444d am 99b40521: Allow system_app to access /data/data link files
* commit '99b40521266450dca66a5375e8134bb1d3d5fbe0':
  Allow system_app to access /data/data link files
2015-01-21 23:12:31 +00:00
Nick Kralevich
90b8471e5a am 9dc5956f: Merge "Revert "isolated_app: Do not allow access to the gpu_device.""
* commit '9dc5956f09ad98f1f49b0d538b48443c2eb158a2':
  Revert "isolated_app: Do not allow access to the gpu_device."
2015-01-21 23:12:30 +00:00
Sharif Inamdar
99b4052126 Allow system_app to access /data/data link files
system_app tries to access files in /data/data (lnk_files).
But due to permission issue it is not able to access the
link files.

Change-Id: I2959d899f5e3ab9caa219d684541d36587a6c059
2015-01-21 23:08:20 +00:00
Nick Kralevich
9dc5956f09 Merge "Revert "isolated_app: Do not allow access to the gpu_device."" 2015-01-21 23:05:52 +00:00
Christopher Ferris
a48dd6c107 am c21e9cc1: Merge "Allow debuggerd to redirect requests."
* commit 'c21e9cc1fc6ef69cdca1829e7a78cb68badd631f':
  Allow debuggerd to redirect requests.
2015-01-21 22:58:12 +00:00
Christopher Ferris
c21e9cc1fc Merge "Allow debuggerd to redirect requests." 2015-01-21 18:39:29 +00:00
Nick Kralevich
2ada7f3c10 Revert "isolated_app: Do not allow access to the gpu_device."
Chrome team recommends reverting this patch and introducing
it into a future version of Android, to avoid potential
compatibility issues.

This reverts commit 9de62d6ffe.

Bug: 17471434
Bug: 18609318
Change-Id: I9adaa9d0e4cb6a592011336e442e9d414dbac470
2015-01-20 16:20:42 -08:00
Nick Kralevich
665c06e4c7 resolved conflicts for merge of 7ef348b1 to lmp-mr1-dev-plus-aosp
Change-Id: I0f1dd74fc8aee74c930cbfdd8d497cad7710d780
2015-01-20 15:51:53 -08:00
Christopher Ferris
b51c4dd39a Allow debuggerd to redirect requests.
On 64 bit systems, all requests will first go to the 64 bit debuggerd
which will redirect to the 32 bit debuggerd if necessary. This avoids
any permissions problems where a java process needs to be able to
read the elf data for executables. Instead the permissions are granted
to debuggerd instead.

Also remove the permissions to read the /system/bin executables from
dumpstate since they aren't necessary any more.

Bug: https://code.google.com/p/android/issues/detail?id=97024
Change-Id: I80ab1a177a110aa7381c2a4b516cfe71ef2a4808
2015-01-20 15:15:27 -08:00
dcashman
854ad128c9 am a5119ee7: am 566e8fe2: Record service accesses.
* commit 'a5119ee7900d511278b12d04f436ed25110556cf':
  Record service accesses.
2015-01-20 15:47:20 +00:00
dcashman
a5119ee790 am 566e8fe2: Record service accesses.
* commit '566e8fe2580ce7d6a8ef76ffce6b457b4e71dd63':
  Record service accesses.
2015-01-20 15:41:43 +00:00
dcashman
566e8fe258 Record service accesses.
Reduce logspam and record further observed service connections.

Bug: 18106000
Change-Id: I9a57e4bb8f1c8e066861719fb208c691498842a8
2015-01-16 17:27:25 -08:00
dcashman
5e5452c8e9 am 11daf6d6: am 7d1deec4: Record surfaceflinger power_service access.
* commit '11daf6d6a37fb4ec21a52dee32af8b47f6af246c':
  Record surfaceflinger power_service access.
2015-01-17 00:09:26 +00:00
dcashman
11daf6d6a3 am 7d1deec4: Record surfaceflinger power_service access.
* commit '7d1deec4c48a5c15a12249aa841ec5dabab6f814':
  Record surfaceflinger power_service access.
2015-01-17 00:03:44 +00:00
dcashman
7d1deec4c4 Record surfaceflinger power_service access.
Address the following log entry:
SELinux : avc:  granted  { find } for service=power scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:power_service:s0 tclass=service_manager

Change-Id: Id750ba9f99c622351fb3206ad007eae8a713adea
2015-01-16 15:52:01 -08:00
dcashman
6f25eefeeb am 3e7900ff: am d3205254: Merge "Allow shell to read /proc."
* commit '3e7900ff65a19d1e146885ad2f196ed3e4b7df6d':
  Allow shell to read /proc.
2015-01-16 23:22:06 +00:00
dcashman
3e7900ff65 am d3205254: Merge "Allow shell to read /proc."
* commit 'd3205254bbe4dcfe4c7451b40ed5711ccc6d1a18':
  Allow shell to read /proc.
2015-01-16 23:15:07 +00:00
dcashman
d3205254bb Merge "Allow shell to read /proc." 2015-01-16 23:09:51 +00:00
dcashman
25fef2e197 Allow shell to read /proc.
Grant shell read access to /proc taken away by
commit: 0d3f7ddc70

Addresses the following denials encountered when running ps or top.

Bug: 18799966
Change-Id: If764adeade562d884c3d710f1cd1cb34011efe89
2015-01-16 13:39:59 -08:00
Nick Kralevich
7ef348b1ba Revert "isolated_app: Do not allow access to the gpu_device."
Chrome team recommends reverting this patch and introducing
it into a future version of Android, to avoid potential
compatibility issues.

This reverts commit 9de62d6ffe.

Bug: 17471434
Bug: 18609318
Change-Id: I3086cb8a8d7142b1eadce622f7e87a4c3426b6bf
2015-01-16 11:59:21 -08:00
Jeff Sharkey
a1529cb181 am 12731855: am 33bf0538: Rules to let netd read packets from NFLOG target.
* commit '12731855e6bc64773d1ec519063c9213b4e5bd3d':
  Rules to let netd read packets from NFLOG target.
2015-01-16 01:49:07 +00:00
Jeff Sharkey
12731855e6 am 33bf0538: Rules to let netd read packets from NFLOG target.
* commit '33bf053826e38b4ea666a41d9f89512f7e950451':
  Rules to let netd read packets from NFLOG target.
2015-01-16 01:33:45 +00:00
dcashman
7dc1417b62 am c1142451: am 0d16b5ac: Merge "Remove known system_server service accesses from auditing."
* commit 'c1142451d9d91fba3f4f3910ecbfd0b2263c445d':
  Remove known system_server service accesses from auditing.
2015-01-16 00:03:54 +00:00
Jeff Sharkey
33bf053826 Rules to let netd read packets from NFLOG target.
avc: denied { create } for scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=netlink_socket permissive=1
avc: denied { setopt } for scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=netlink_socket permissive=1
avc: denied { bind } for scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=netlink_socket permissive=1
avc: denied { getopt } for scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=netlink_socket permissive=1
avc: denied { write } for scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=netlink_socket permissive=1
avc: denied { read } for scontext=u:r:netd:s0 tcontext=u:r:netd:s0 tclass=netlink_socket permissive=1

Bug: 18335678
Change-Id: I7c03d55b4719d0fd8057507bf8ac1cf573e4744a
2015-01-15 15:59:39 -08:00
dcashman
c1142451d9 am 0d16b5ac: Merge "Remove known system_server service accesses from auditing."
* commit '0d16b5ac49135e1bd40119ce17f23e6451ae4f48':
  Remove known system_server service accesses from auditing.
2015-01-15 23:57:55 +00:00
dcashman
0d16b5ac49 Merge "Remove known system_server service accesses from auditing." 2015-01-15 23:54:24 +00:00
dcashman
c631ede7dc Remove known system_server service accesses from auditing.
Address observed  audit logs of the form:
granted  { find } for service=XXX scontext=u:r:YYY:s0:c512,c768 tcontext=u:object_r:XXX_service:s0 tclass=service_manager

in order to record existing relationships with services.

Bug: 18106000
Change-Id: I99a68f329c17ba67ebf3b87729b8405bdc925ef4
2015-01-15 15:12:18 -08:00
dcashman
e3eb8905b3 am 51590ed6: am 7818711a: Allow nfc nfc and radio service access.
* commit '51590ed603a2160693410b63baf6ef3570e4f38f':
  Allow nfc nfc and radio service access.
2015-01-15 22:27:37 +00:00
dcashman
51590ed603 am 7818711a: Allow nfc nfc and radio service access.
* commit '7818711ab9ac68e8865a35ed0440b3a2b3dad3bb':
  Allow nfc nfc and radio service access.
2015-01-15 22:21:52 +00:00
dcashman
7818711ab9 Allow nfc nfc and radio service access.
Address the following denials:
SELinux : avc:  denied  { find } for service=phone scontext=u:r:nfc:s0 tcontext=u:object_r:radio_service:s0 tclass=service_manager
SELinux : avc:  denied  { find } for service=nfc scontext=u:r:nfc:s0 tcontext=u:object_r:nfc_service:s0 tclass=service_manager

Bug: 18929632

Change-Id: I54c3d194f9401eb5dc6f2114ebddea241c433f71
2015-01-15 14:00:47 -08:00
Nick Kralevich
5585c30ace am acf209e8: am 99940d1a: remove /proc/net read access from domain.te
* commit 'acf209e8c38e2a2ed7510551961a5812f63a4935':
  remove /proc/net read access from domain.te
2015-01-15 21:34:34 +00:00
Nick Kralevich
acf209e8c3 am 99940d1a: remove /proc/net read access from domain.te
* commit '99940d1af5719f1622fa2a17f8daf6cb21de3ad1':
  remove /proc/net read access from domain.te
2015-01-15 21:29:23 +00:00
dcashman
61e82a2cfc resolved conflicts for merge of e55f2b81 to lmp-mr1-dev-plus-aosp
Change-Id: If8473c40d1b3da93d1f0f74d24f40633b2209f5e
2015-01-14 15:05:04 -08:00
Nick Kralevich
99940d1af5 remove /proc/net read access from domain.te
SELinux domains wanting read access to /proc/net need to
explicitly declare it.

TODO: fixup the ListeningPortsTest cts test so that it's not
broken.

Bug: 9496886
Change-Id: Ia9f1214348ac4051542daa661d35950eb271b2e4
2015-01-14 22:18:24 +00:00
dcashman
e55f2b8197 am 4a89cdfa: Make system_server_service an attribute.
* commit '4a89cdfa89448c8660308a31bfcb517fffaa239e':
  Make system_server_service an attribute.
2015-01-14 22:12:05 +00:00
Mark Salyzyn
59dd755363 am 63406341: am 34d32ea1: selinux: add pstore
* commit '63406341e3a958c74c6da74f610e457814ce2773':
  selinux: add pstore
2015-01-14 21:57:04 +00:00
dcashman
4a89cdfa89 Make system_server_service an attribute.
Temporarily give every system_server_service its own
domain in preparation for splitting it and identifying
special services or classes of services.

Change-Id: I81ffbdbf5eea05e0146fd7fd245f01639b1ae0ef
2015-01-14 13:54:26 -08:00
Mark Salyzyn
63406341e3 am 34d32ea1: selinux: add pstore
* commit '34d32ea1647655ee8dbf4faa19992a8a625c40d9':
  selinux: add pstore
2015-01-14 20:47:49 +00:00
Mark Salyzyn
34d32ea164 selinux: add pstore
Used to record the Android log messages, then on reboot
provide a means to triage user-space actitivies leading
up to a panic. A companion to the pstore console logs.

Change-Id: I9b94ee3d5e94e0c4590ba8453b4ac1ebdfc7603f
2015-01-14 12:34:20 -08:00
dcashman
96550ed453 am 6b111e47: am 3b0988c5: Merge "Adjust sepolicy-analyze to reflect libsepol changes."
* commit '6b111e4761bf960e9f0010a7e9320eab83ca052e':
  Adjust sepolicy-analyze to reflect libsepol changes.
2015-01-13 23:26:10 +00:00
dcashman
6b111e4761 am 3b0988c5: Merge "Adjust sepolicy-analyze to reflect libsepol changes."
* commit '3b0988c59b3bd72113f88e482b0aa8f443d19074':
  Adjust sepolicy-analyze to reflect libsepol changes.
2015-01-13 23:20:25 +00:00
dcashman
3b0988c59b Merge "Adjust sepolicy-analyze to reflect libsepol changes." 2015-01-13 21:52:44 +00:00
Nick Kralevich
6c47592fd7 am 070e72be: am b5ffbb7e: restore shared_relro functionality
* commit '070e72be612237f7d69d5afd38a6b9b18e34f564':
  restore shared_relro functionality
2015-01-07 23:53:03 +00:00
Nick Kralevich
070e72be61 am b5ffbb7e: restore shared_relro functionality
* commit 'b5ffbb7eeb55092350af3bf576c0092e240f8c60':
  restore shared_relro functionality
2015-01-07 23:46:45 +00:00