Skip to content
Snippets Groups Projects
  1. Feb 09, 2016
  2. Jan 28, 2016
  3. Jan 27, 2016
    • Chien-Yu Chen's avatar
      selinux: Update policies for cameraserver · e0378303
      Chien-Yu Chen authored
      Update policies for cameraserver so it has the same permissions
      as mediaserver.
      
      Bug: 24511454
      Change-Id: I1191e2ac36c00b942282f8dc3db9903551945adb
      e0378303
    • dcashman's avatar
      Restore untrusted_app proc_net access. · 5833e3f5
      dcashman authored
      Address the following denial:
      type=1400 audit(0.0:853): avc: denied { read } for name="/" dev="proc" ino=1 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=dir permissive=0
      
      Bug: 26806629
      Change-Id: Ic2ad91aadac00dc04d7e04f7460d5681d81134f4
      5833e3f5
  4. Jan 22, 2016
  5. Jan 08, 2016
    • Jeff Vander Stoep's avatar
      grant appdomain rw perms to tun_device · 2b935cd7
      Jeff Vander Stoep authored
      Previously granted to only untrusted_app, allow all apps except
      isolated_app read write permissions to tun_device.
      
      avc: denied { read write } for path="/dev/tun" dev="tmpfs" ino=8906 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:tun_device:s0 tclass=chr_file
      
      Bug: 26462997
      Change-Id: Id6f5b09cda26dc6c8651eb76f6791fb95640e4c7
      2b935cd7
    • Johan Redestig's avatar
      Neverallow isolated and untrusted apps to write system properties · 0d8e9adf
      Johan Redestig authored
      and as a consequence open up for other appdomains (e.g. platform_app)
      to write system properties.
      
      Change-Id: Ie6ad4d17247165564456e5b0d78f705a82cdcde7
      0d8e9adf
  6. Jan 06, 2016
  7. Jan 05, 2016
  8. Jan 04, 2016
    • Felipe Leme's avatar
      Creates a new permission for /cache/recovery · 549ccf77
      Felipe Leme authored
      This permission was created mostly for dumpstate (so it can include
      recovery files on bugreports when an OTA fails), but it was applied to
      uncrypt and recovery as well (since it had a wider access before).
      
      Grant access to cache_recovery_file where we previously granted access
      to cache_file. Add auditallow rules to determine if this is really
      needed.
      
      BUG: 25351711
      Change-Id: I07745181dbb4f0bde75694ea31b3ab79a4682f18
      549ccf77
  9. Dec 18, 2015
    • Nick Kralevich's avatar
      neverallow debugfs access · 96b1c9ca
      Nick Kralevich authored
      Don't allow access to the generic debugfs label. Instead, force
      relabeling to a more specific type. system_server and dumpstate
      are excluded from this until I have time to fix them.
      
      Tighten up the neverallow rules for untrusted_app. It should never
      be reading any file on /sys/kernel/debug, regardless of the label.
      
      Change-Id: Ic7feff9ba3aca450f1e0b6f253f0b56c7918d0fa
      96b1c9ca
  10. Dec 11, 2015
    • Jeff Vander Stoep's avatar
      Migrate to upstream policy version 30 · 3a0ce49b
      Jeff Vander Stoep authored
      Grant untrusted_app and isolated_app unpriv_sock_perms, neverallow
      priv_sock_perms to disallow access to MAC address and ESSID.
      
      Change-Id: Idac3b657a153e7d7fdc647ff34b876a325d759b3
      3a0ce49b
  11. Dec 08, 2015
  12. Dec 03, 2015
    • Jeff Vander Stoep's avatar
      Further restrict access to tun_device · e555f4b9
      Jeff Vander Stoep authored
      Remove bluetooth's access to tun_device. Auditallow rule demonstrates
      that it's not used.
      
      Strengthen the neverallow on opening tun_device to include all Apps.
      
      Bug: 24744295
      Change-Id: Iba85ba016b1e24c6c12d5b33e46fe8232908aac1
      e555f4b9
  13. Nov 03, 2015
    • Jeff Vander Stoep's avatar
      Create attribute for moving perms out of domain · d22987b4
      Jeff Vander Stoep authored
      Motivation: Domain is overly permissive. Start removing permissions
      from domain and assign them to the domain_deprecated attribute.
      Domain_deprecated and domain can initially be assigned to all
      domains. The goal is to not assign domain_deprecated to new domains
      and to start removing domain_deprecated where it is not required or
      reassigning the appropriate permissions to the inheriting domain
      when necessary.
      
      Bug: 25433265
      Change-Id: I8b11cb137df7bdd382629c98d916a73fe276413c
      d22987b4
  14. Oct 27, 2015
  15. Oct 23, 2015
    • Jeff Vander Stoep's avatar
      audit untrusted_app access to mtp_device · 7b8f9f15
      Jeff Vander Stoep authored
      android.process.media moved to priv_app. Add audit rule to test if
      untrusted_app still requires access or if some/all permissions may
      be removed.
      
      Bug: 25085347
      Change-Id: I13bae9c09bd1627b2c06ae84b069778984f9bd5d
      7b8f9f15
    • Jeff Vander Stoep's avatar
      Temporarily downgrade to policy version number · 0fc831c3
      Jeff Vander Stoep authored
      Temporarily move from policy version 30 to 29 until device kernels
      and prebuilts are all upgraded to the accepted upstream version of
      the selinux ioctl command whitelisting code.
      
      (cherry picked from commit 89765083)
      
      Bug: 22846070
      
      Change-Id: I31d1e80aaee164cf41a2f01c6ca846a000898ef4
      0fc831c3
  16. Oct 19, 2015
  17. Oct 16, 2015
    • Jeff Vander Stoep's avatar
      Remove untrusted_app access to cache · 68748c21
      Jeff Vander Stoep authored
      neverallow access to untrusted_app and isolated app
      
      Access to cache is a system|signature permission. Only
      priv/system/platform apps should be allowed access.
      
      Change-Id: I7ebd38ce6d39950e74c0a164479bc59e694c852d
      68748c21
  18. Oct 14, 2015
    • Jeff Vander Stoep's avatar
      Remove permissions for untrusted_app · 0d186fcf
      Jeff Vander Stoep authored
      Privileged apps now run in the priv_app domain. Remove permissions
      from untrusted_app that were originaly added for GMS core, Finsky, and
      Play store.
      
      Bug: 22033466
      Change-Id: Ibdce72ad629bfab47de92ac19542e8902e02c8be
      0d186fcf
  19. Oct 13, 2015
    • Nick Kralevich's avatar
      Remove ptrace from app.te · de11f501
      Nick Kralevich authored
      Remove ptrace from app.te, and only add it to the app domains
      which explicitly require it.
      
      Change-Id: I327aabd154ae07ce90e3529dee2b324ca125dd16
      de11f501
  20. Oct 07, 2015
    • Jeff Vander Stoep's avatar
      Do not allow untrusted_app to open tun_device · de53051a
      Jeff Vander Stoep authored
      Third party vpn apps must receive open tun fd from the framework
      for device traffic.
      
      neverallow untrusted_app open perm and auditallow bluetooth
      access to see if the neverallow rule can be expanded to include
      all of appdomain.
      
      Bug: 24677682
      Change-Id: I68685587228a1044fe1e0f96d4dc08c2adbebe78
      de53051a
  21. Sep 10, 2015
    • dcashman's avatar
      Allow untrusted_app to list services. · 0b764ae9
      dcashman authored
      CTS relies on the ability to see all services on the system to make sure
      the dump permission is properly enforced on all services.  Allow this.
      
      Bug: 23476772
      Change-Id: I144b825c3a637962aaca59565c9f567953a866e8
      0b764ae9
  22. Jul 30, 2015
    • Jeff Vander Stoep's avatar
      Temporarily downgrade to policy version number · 89765083
      Jeff Vander Stoep authored
      Temporarily move from policy version 30 to 29 until device kernels
      and prebuilts are all upgraded to the accepted upstream version of
      the selinux ioctl command whitelisting code.
      
      Bug: 22846070
      
      Change-Id: I31d1e80aaee164cf41a2f01c6ca846a000898ef4
      89765083
  23. Jul 29, 2015
  24. Jul 28, 2015
  25. Jul 24, 2015
  26. Jun 05, 2015
    • Jeff Vander Stoep's avatar
      restrict app access to socket ioctls · de9b5301
      Jeff Vander Stoep authored
      Create a macro of unprivileged ioctls including
      - All common socket ioctls except MAC address
      - All wireless extensions ioctls except get/set ESSID
      - Some commonly used tty ioctls
      
      Bug: 21657002
      Change-Id: Ib08be9cb70d08c1fa2c8bddbae519e7c2df5293c
      de9b5301
  27. May 19, 2015
    • Jeff Sharkey's avatar
      Allow MediaProvider to traverse /mnt/media_rw. · 6e1f405c
      Jeff Sharkey authored
      As an optimization, platform components like MediaProvider may choose
      to shortcut past the FUSE daemon and return open file descriptors
      directly pointing at the underlying storage device.
      
      Now that we have a specific label for /mnt/media_rw, we need to grant
      search access to untrusted apps like MediaProvider.  The actual
      access control is still managed by POSIX permissions on that
      directory.
      
      avc: denied { search } for name="media_rw" dev="tmpfs" ino=4150 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0
      
      Bug: 21017105
      Change-Id: I6d51939668b39b43b91b1f0c24c98bc2205bf511
      6e1f405c
  28. May 15, 2015
  29. May 13, 2015
Loading