Commit graph

5426 commits

Author SHA1 Message Date
Jeff Vander Stoep
94ee59bc4a audit mtp sync permission
Determine if the following rule can be removed:

allow kernel untrusted_app:fd use

Bug: 25331459
Change-Id: I4ef9f376d7fc1d2bdfba69b2fb3e24d49ac136ad
2015-10-28 08:57:40 -07:00
Nick Kralevich
27743c0ffe Update text relocation neverallow assertions am: 89424bf947
am: 984b0030a1

* commit '984b0030a1e26ecfc5451845e3a3dfe03c72a30e':
  Update text relocation neverallow assertions
2015-10-28 01:25:23 +00:00
Nick Kralevich
984b0030a1 Update text relocation neverallow assertions
am: 89424bf947

* commit '89424bf9470931df90afa4f6d141b3696ad5a632':
  Update text relocation neverallow assertions
2015-10-28 01:21:01 +00:00
Nick Kralevich
89424bf947 Update text relocation neverallow assertions
1) Don't allow any SELinux domain to attempt to perform a text
relocation on a file from the /system partition. It's not supported
and should never be attempted.

2) Completely block any non-app SELinux domains from using text
relocations, regardless of the source.

Bug: 20013628
Change-Id: I82573398d0d5586264a717a1e400a3dbc7793fe3
2015-10-27 17:15:34 -07:00
Bruce Beare
4516643186 Define the i2C device policy am: 59019fd72a
am: 5a3132bbeb

* commit '5a3132bbeb16107e637890b6abc7ccc1cf648771':
  Define the i2C device policy
2015-10-28 00:05:06 +00:00
Bruce Beare
5a3132bbeb Define the i2C device policy
am: 59019fd72a

* commit '59019fd72a46bb4d1fa4e14e15122f56841f2e0d':
  Define the i2C device policy
2015-10-27 23:54:11 +00:00
Bruce Beare
59019fd72a Define the i2C device policy
Change-Id: I93d9cfea2f2148bb042d1cb8af3649524ad31034
Signed-off-by: Bruce Beare <bruce.j.beare@intel.com>
2015-10-27 16:40:54 -07:00
Jeff Vander Stoep
fa6169ade8 Fix MTP sync am: 9ba8ade5d2
am: 34d81d9152

* commit '34d81d9152cd2adc8758f84aca0e36bac64e99c0':
  Fix MTP sync
2015-10-27 04:01:25 +00:00
Jeff Vander Stoep
34d81d9152 Fix MTP sync
am: 9ba8ade5d2

* commit '9ba8ade5d2b24bd1f9083e8a51e7d586e609e28a':
  Fix MTP sync
2015-10-27 03:58:36 +00:00
Jeff Vander Stoep
9ba8ade5d2 Fix MTP sync
Address the following denial:
avc: denied { use } for path="/storage/emulated/0/305512.pdf" dev="fuse"
ino=239 scontext=u:r:kernel:s0 tcontext=u:r:priv_app:s0:c512,c768 tclass=fd
permissive=0

Bug: 25068662
Change-Id: Ic29d9569ff387dfd411363db751c3642572c8e85
2015-10-26 20:32:49 -07:00
Jeff Vander Stoep
ad32785689 audit untrusted_app access to mtp_device am: 7b8f9f153e
am: 775dda1fb3

* commit '775dda1fb3641e3ea2be4124a9a77cb236648d6f':
  audit untrusted_app access to mtp_device
2015-10-23 18:12:32 +00:00
Jeff Vander Stoep
4b1c3de99a Temporarily downgrade to policy version number am: 0fc831c3b0
am: 312c2511f7

* commit '312c2511f7dfbebf110f1372db55d811bc1ad29f':
  Temporarily downgrade to policy version number
2015-10-23 18:12:28 +00:00
Jeff Vander Stoep
775dda1fb3 audit untrusted_app access to mtp_device
am: 7b8f9f153e

* commit '7b8f9f153edf7c8bbefe3d472c86419d8048e5dd':
  audit untrusted_app access to mtp_device
2015-10-23 18:05:09 +00:00
Jeff Vander Stoep
312c2511f7 Temporarily downgrade to policy version number
am: 0fc831c3b0

* commit '0fc831c3b0b8d9a4e10d0931131a0eed06cd4275':
  Temporarily downgrade to policy version number
2015-10-23 18:05:05 +00:00
Jeff Vander Stoep
7b8f9f153e audit untrusted_app access to mtp_device
android.process.media moved to priv_app. Add audit rule to test if
untrusted_app still requires access or if some/all permissions may
be removed.

Bug: 25085347
Change-Id: I13bae9c09bd1627b2c06ae84b069778984f9bd5d
2015-10-23 18:03:01 +00:00
Jeff Vander Stoep
0fc831c3b0 Temporarily downgrade to policy version number
Temporarily move from policy version 30 to 29 until device kernels
and prebuilts are all upgraded to the accepted upstream version of
the selinux ioctl command whitelisting code.

(cherry picked from commit 89765083f7)

Bug: 22846070

Change-Id: I31d1e80aaee164cf41a2f01c6ca846a000898ef4
2015-10-23 10:16:00 -07:00
Anthony Hugh
d19b20c30c Merge "Revert "Update sepolicy to allow ThermalObserver system service"" into cw-e-dev
am: 753148a869

* commit '753148a8691b7b5d29ee0ebab400c1eb7b2a7c27':
  Revert "Update sepolicy to allow ThermalObserver system service"
2015-10-22 22:27:54 +00:00
Anthony Hugh
753148a869 Merge "Revert "Update sepolicy to allow ThermalObserver system service"" into cw-e-dev 2015-10-22 22:22:44 +00:00
Anthony Hugh
2d8c2d9779 Revert "Update sepolicy to allow ThermalObserver system service"
This reverts commit cda36e31d1.
This will be moved to a device specific file.

BUG: 24555181

Change-Id: I0eb543211245c37da77bbf42449f70ff3fdf79ec
2015-10-22 21:58:51 +00:00
Bill Yi
4acb1b20c0 Merge remote-tracking branch \'goog/mnc-cts-release\' into HEAD am: 7d20f40879 am: a8bbe96d8b am: 5eac92174c
am: 4bb2bdc1b0

* commit '4bb2bdc1b01f04f824bf13dafb66411e48aa2275':
2015-10-21 17:18:59 +00:00
Bill Yi
4bb2bdc1b0 Merge remote-tracking branch \'goog/mnc-cts-release\' into HEAD am: 7d20f40879 am: a8bbe96d8b
am: 5eac92174c

* commit '5eac92174c8a036e088337c1c44f1ea84ab59b0f':
2015-10-21 17:01:14 +00:00
Bill Yi
5eac92174c Merge remote-tracking branch \'goog/mnc-cts-release\' into HEAD am: 7d20f40879
am: a8bbe96d8b

* commit 'a8bbe96d8b3fc76bd36e7f6582b79c94a7ecaa80':
2015-10-21 16:52:44 +00:00
Bill Yi
a8bbe96d8b Merge remote-tracking branch \'goog/mnc-cts-release\' into HEAD
am: 7d20f40879

* commit '7d20f40879d1cdcc39dc6e876371020c258d5a86':
2015-10-21 16:46:48 +00:00
Bill Yi
7d20f40879 Merge remote-tracking branch 'goog/mnc-cts-release' into HEAD 2015-10-21 09:33:42 -07:00
Jeffrey Vander Stoep
ded068b5a8 am beb002ce: am 1b52ad6b: Merge "grant priv_app access to /dev/mtp_usb"
* commit 'beb002cef031d5c7eba68bc8fe10e936c94873b4':
  grant priv_app access to /dev/mtp_usb
2015-10-19 21:39:41 +00:00
Jeffrey Vander Stoep
beb002cef0 am 1b52ad6b: Merge "grant priv_app access to /dev/mtp_usb"
* commit '1b52ad6be1263a6165536b681e239105e7dfa135':
  grant priv_app access to /dev/mtp_usb
2015-10-19 14:33:51 -07:00
Jeffrey Vander Stoep
1b52ad6be1 Merge "grant priv_app access to /dev/mtp_usb" 2015-10-19 21:31:05 +00:00
Nick Kralevich
2736e7d6f9 am 40367ad8: Merge "untrusted_apps: Allow untrusted apps to find healthd_service." into mnc-dr-dev am: 6ab438dc8b
* commit '40367ad87e084f78e310b33963aa3da4309442e8':
  untrusted_apps: Allow untrusted apps to find healthd_service.
2015-10-19 21:08:41 +00:00
Nick Kralevich
40367ad87e Merge "untrusted_apps: Allow untrusted apps to find healthd_service." into mnc-dr-dev
am: 6ab438dc8b

* commit '6ab438dc8b4c8b661c8209ecfb66b626b8bdc532':
  untrusted_apps: Allow untrusted apps to find healthd_service.
2015-10-19 20:59:28 +00:00
Nick Kralevich
6ab438dc8b Merge "untrusted_apps: Allow untrusted apps to find healthd_service." into mnc-dr-dev 2015-10-19 20:42:33 +00:00
Ruchi Kandoi
ac8b5750b0 untrusted_apps: Allow untrusted apps to find healthd_service.
This allows apps to find the healthd service which is used to query
battery properties.

Bug: 24759218
Change-Id: I72ce5a28b2ffd57aa424faeb2d039b6c92f9597d
Signed-off-by: Ruchi Kandoi <kandoiruchi@google.com>
2015-10-19 13:33:23 -07:00
Jeff Vander Stoep
bcbb32e763 grant priv_app access to /dev/mtp_usb
android.process.media needs access to mtp_usb when MTP is enabled.

Bug: 25074672
Change-Id: Ic48a3ba8e4395104b0b957f7a9bad69f0e5ee38e
2015-10-19 13:07:15 -07:00
Jeff Vander Stoep
5d7bd5849a am 5f34265c: am a910a287: Remove untrusted_app access to tmp apk files
* commit '5f34265c5af472042c338780a39145661cca0e09':
  Remove untrusted_app access to tmp apk files
2015-10-19 19:09:37 +00:00
Jeff Vander Stoep
3912943b98 am e9aaae4f: resolved conflicts for f1203bf0 to stage-aosp-master
* commit 'e9aaae4ffbe6f549aa724891affb176b2f7b465e':
  Remove untrusted_app access to cache
2015-10-19 19:04:08 +00:00
Jeff Vander Stoep
5f34265c5a am a910a287: Remove untrusted_app access to tmp apk files
* commit 'a910a287d81bf5e9885af9e5be60ed444964a86a':
  Remove untrusted_app access to tmp apk files
2015-10-19 12:02:56 -07:00
Jeff Vander Stoep
e9aaae4ffb resolved conflicts for f1203bf0 to stage-aosp-master
Change-Id: I7f17a87595a05967879ccc33326eb80d7bd00251
2015-10-19 11:39:59 -07:00
Jeff Vander Stoep
a910a287d8 Remove untrusted_app access to tmp apk files
Verifier has moved to the priv_app domain. Neverallow app domain
access to tmp apk files with exceptions for platform and priv app
domains.

Change-Id: I68a2fa39ebc7dc0bfa278fe7d092655f21a5225d
2015-10-19 18:19:31 +00:00
Jeffrey Vander Stoep
f1203bf05f Merge "Remove untrusted_app access to cache" 2015-10-19 18:06:38 +00:00
Jeff Vander Stoep
408e8da507 am d77deee4: am 7f09a945: Policy for priv_app domain
* commit 'd77deee44fc4d3f0c60f5ed9ab15ba166375c381':
  Policy for priv_app domain
2015-10-19 17:47:10 +00:00
Jeff Vander Stoep
d77deee44f am 7f09a945: Policy for priv_app domain
* commit '7f09a94596be98415d0546d927c8a4bc15867621':
  Policy for priv_app domain
2015-10-19 10:42:34 -07:00
Jeff Vander Stoep
7f09a94596 Policy for priv_app domain
Verifier needs access to apk files.
avc: denied { search } for pid=11905 comm="ackageinstaller" name="vmdl2040420713.tmp" dev="dm-2" ino=13647 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:apk_tmp_file:s0 tclass=dir permissive=0

Give bluetooth_manager_service and trust_service the app_api_service
attribute.
avc:  denied  { find } for service=bluetooth_manager pid=7916 uid=10058 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:bluetooth_manager_service:s0 tclass=service_manager permissive=0
avc:  denied  { find } for service=trust pid=25664 uid=10069 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:trust_service:s0 tclass=service_manager permissive=0

Bug: 25066911
Change-Id: I6be695546f8a951e3329c1ec412936b8637e5835
2015-10-19 10:35:20 -07:00
Jeff Vander Stoep
b8985782c6 am 59bb0d4b: am 734e4d7c: Give services app_api_service attribute
* commit '59bb0d4bc5316044721d3c16be90d3d9f21e3957':
  Give services app_api_service attribute
2015-10-18 16:21:20 +00:00
Jeff Vander Stoep
59bb0d4bc5 am 734e4d7c: Give services app_api_service attribute
* commit '734e4d7c5015a510ab20bfbc3c5a84667378764f':
  Give services app_api_service attribute
2015-10-18 09:15:25 -07:00
Jeff Vander Stoep
734e4d7c50 Give services app_api_service attribute
avc:  denied  { find } for service=network_management pid=4503 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:network_management_service:s0 tclass=service_manager
avc:  denied  { find } for service=netstats pid=4503 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=0

Bug: 25022496
Change-Id: Ib6eac76b680fed3eca7e4942c6b0e375f12b6496
2015-10-17 19:24:11 +00:00
Jeffrey Vander Stoep
3588221547 am 6bbe728c: am b1eced68: Merge "grant webviewupdate_service app_api_service attribute"
* commit '6bbe728ce8780d3c0e3fabed6fd5c927160a2610':
  grant webviewupdate_service app_api_service attribute
2015-10-16 22:08:38 +00:00
Jeffrey Vander Stoep
6bbe728ce8 am b1eced68: Merge "grant webviewupdate_service app_api_service attribute"
* commit 'b1eced68d2dc0823e70729db66b16463289986a8':
  grant webviewupdate_service app_api_service attribute
2015-10-16 15:02:08 -07:00
Jeffrey Vander Stoep
b1eced68d2 Merge "grant webviewupdate_service app_api_service attribute" 2015-10-16 21:56:59 +00:00
Jeff Vander Stoep
7813cc8de0 grant webviewupdate_service app_api_service attribute
avc:  denied  { find } for service=webviewupdate pid=11399 uid=10070 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:webviewupdate_service:s0 tclass=service_manager permissive=0

Bug: 25018574
Change-Id: I26a7846d1c80c1ab3842813f4148528030b1106a
2015-10-16 14:53:11 -07:00
Jeff Vander Stoep
68748c2166 Remove untrusted_app access to cache
neverallow access to untrusted_app and isolated app

Access to cache is a system|signature permission. Only
priv/system/platform apps should be allowed access.

Change-Id: I7ebd38ce6d39950e74c0a164479bc59e694c852d
2015-10-16 14:51:55 -07:00
Jeffrey Vander Stoep
08faa8e03b am b663e28b: am 63613805: Merge "Privileged apps require access to cache"
* commit 'b663e28b14d1b39c18228eaa59a2b45c8e88a697':
  Privileged apps require access to cache
2015-10-16 00:17:47 +00:00