Skip to content
Snippets Groups Projects
  1. Jan 29, 2018
    • Joel Galenson's avatar
      Track usbd SELinux denial. · 07efe37c
      Joel Galenson authored
      This should fix presubmit tests.
      
      Bug: 72472544
      Test: Built policy.
      Change-Id: I01f0fe3dc759db66005e26d15395893d494c4bb7
      07efe37c
    • Tom Cherry's avatar
      Remove vendor_init from coredomain · 9c778045
      Tom Cherry authored
      vendor_init exists on the system partition, but it is meant to be an
      extention of init that runs with vendor permissions for executing
      vendor scripts, therefore it is not meant to be in coredomain.
      
      Bug: 62875318
      Test: boot walleye
      Merged-In: I01af5c9f8b198674b15b90620d02725a6e7c1da6
      Change-Id: I01af5c9f8b198674b15b90620d02725a6e7c1da6
      9c778045
  2. Jan 28, 2018
  3. Jan 25, 2018
    • Joel Galenson's avatar
      Track crash_dump selinux denial. · 6e705357
      Joel Galenson authored
      This should fix presubmit tests.
      
      Bug: 72507494
      Test: Built policy.
      Change-Id: I56944d92232c7a715f0c88c13e24f65316805c39
      6e705357
    • Tom Cherry's avatar
      Neverallow vendor_init from accessing stats_data_file · c2653ae8
      Tom Cherry authored
      The exception for vendor_init in this neverallow was never needed.
      
      Bug: 62875318
      Test: Build walleye, bullhead
      Change-Id: Iac2b57df30b376492851d7520994e0400a87f1e1
      c2653ae8
    • Joel Galenson's avatar
      Suppress denials from idmap reading installd's files. · b050dccd
      Joel Galenson authored
      We are occasionally seeing the following SELinux denial:
      
      avc: denied { read } for comm="idmap" path="/proc/947/mounts" scontext=u:r:idmap:s0 tcontext=u:r:installd:s0 tclass=file
      
      This commit suppresses that exact denial.
      
      We believe this is occurring when idmap is forked from installd, which is reading its mounts file in another thread.
      
      Bug: 72444813
      Test: Boot Walleye and test wifi and camera.
      Change-Id: I3440e4b00c7e5a708b562a93b304aa726b6a3ab9
      b050dccd
    • Andreas Gampe's avatar
      Sepolicy: Allow stack dumps of statsd · 7468db67
      Andreas Gampe authored
      Allow dumpstate & system server watchdog to dump statsd stacks.
      
      Bug: 72461610
      Test: m
      Change-Id: I4c3472881da253f85d54b5e5b767b06e2618af9c
      7468db67
    • Joel Galenson's avatar
      Track idmap selinux denial. · 7b1e9a5f
      Joel Galenson authored
      This should fix presubmit tests.
      
      Bug: 72444813
      Test: Built policy.
      Change-Id: I5b8661b34c9417cd95cb0d6b688443dcbe0d1c0b
      7b1e9a5f
  4. Jan 24, 2018
    • Jaekyun Seok's avatar
      Add a default rule for /product files · a90cae8c
      Jaekyun Seok authored
      Since /product is an extension of /system, its file contexts should be
      consistent with ones of /system.
      
      Bug: 64195575
      Test: tested installing a RRO, apps, priv-apps and permissions
      Change-Id: I7560aaaed852ba07ebe1eb23b303301481c897f2
      a90cae8c
    • yinxu's avatar
      Add sepolicy for radio.config · 612350e3
      yinxu authored
      Bug: 64131518
      Test: Compile and flash the device, check whether service vendor.radio-config-hal-1-0 starts
      Change-Id: Id728658b4acdda87748259b74e6b7438f6283ea5
      612350e3
    • yro's avatar
      Allow binder call between statsd and healthd. Also allow statsd to find · 53164f40
      yro authored
      health hal service for battery metrics.
      
      Test: cts test, manual test
      
      Change-Id: I73a801f6970e25bee5921479f2f7078bcb1973a9
      53164f40
    • yro's avatar
      Update sepolicy of statsd to be able to find incident_service · cf38ca5e
      yro authored
      Test: manual testing
      Change-Id: Ia97c956c08d2062af6b33622c6b61ca3810b0cb1
      cf38ca5e
    • Janis Danisevskis's avatar
      Added default policy for Confirmation UI HAL · 97c56bdd
      Janis Danisevskis authored
      Bug: 63928580
      Test: Manually tested.
      
      Change-Id: If6bb10cb7c009883d853e46dcdeb92cd33877d53
      97c56bdd
    • Max Bires's avatar
      Adding permission for traceur to use content provider · 278147eb
      Max Bires authored
      This change will allow traceur to pass a file descriptor to another app
      in order to allow that app to process trace data files. E.g. in the use
      case that someone would like to email the traces they collected and pass
      the trace data files to gmail, this will now be permitted.
      
      Bug:68126425
      Test: Traceur can pass fd's to untrusted apps for processing
      Change-Id: If0507b5d1f06fd8400e04bd60e06a44153dc59b7
      278147eb
    • Marissa Wall's avatar
      sepolicy: restrict access to uid_cpupower files · dfe063c3
      Marissa Wall authored
      Do not let apps read /proc/uid_cpupower/time_in_state,
      /proc/uid_cpupower/concurrent_active_time,
      /proc/uid_cpupower/concurrent_policy_time.
      
      b/71718257
      
      Test: Check that they can't be read from the shell
          without root permissions and system_server was able
          to read them
      
      Change-Id: I812694adfbb4630f7b56aa7096dc2e6dfb148b15
      dfe063c3
    • Joel Galenson's avatar
      Fix init error trying to access file. · cf391269
      Joel Galenson authored
      Init tries to write /proc/sys/vm/min_free_order_shift but fails due to
      a SELinux denial.  This gives the file a new label and gives init the
      ability to write it.
      
      Test: Build and booted Sailfish (a couple of days ago).
      Change-Id: Ic93862b85c468afccff2019d84b927af9ed2a84d
      cf391269
  5. Jan 23, 2018
    • Tom Cherry's avatar
      Label /vendor_file_contexts as file_contexts_file · ecc4868f
      Tom Cherry authored
      vendor_init doesn't have permissions to read rootfs labeled files, but
      needs to read /vendor_file_contexts to do restorecon correctly.  This
      file is a file_contexts file, so labeling it as such seems appropriate.
      
      Test: bullhead + vendor_init doesn't hit this audit
      Change-Id: I1f2cf7dd7de17806ac0f1dfe2483fb6d6659939b
      ecc4868f
    • Dongwon Kang's avatar
      Allow mediaextractor to load libraries from apk_data_file · 1134bd00
      Dongwon Kang authored
      This is an experimental feature only on userdebug and eng build.
      
      Test: play MP4 file. install & uninstall media update apk.
      Bug: 67908547
      Change-Id: I513cdbfda962f00079e886b7a42f9928e81f6474
      1134bd00
    • Yi Jin's avatar
      Selinux permissions for incidentd project · bc24ba72
      Yi Jin authored
      Bug: 64222712
      Test: manual
      Change-Id: Ica77ae3c9e535eddac9fccf11710b0bcb3254ab3
      bc24ba72
    • Max Bires's avatar
      Fixing traceur selinux permission error · 842cc268
      Max Bires authored
      getattr for trace_data_file:dir permissions was missing, impacting
      functionality.
      
      Bug:68126425
      Test: Traceur functionality is properly working
      Change-Id: I2c8ae5cf3463a8e5309b8402713744e036a64171
      842cc268
    • Tri Vo's avatar
      dumpstate: remove access to 'proc' and 'sysfs' types. · 218d87c0
      Tri Vo authored
      And grant appropriate permissions to more granular types.
      
      Bug: 29319732
      Bug: 65643247
      Test: adb bugreport; no new denials to /proc or /sys files.
      
      Change-Id: Ied99546164e79bfa6148822858c165177d3720a5
      218d87c0
  6. Jan 22, 2018
    • Steven Moreland's avatar
      Clarify sysfs_leds neverallow. · 623d9f06
      Steven Moreland authored
      Now that init no longer uses it.
      
      Fixes: 70846424
      Test: no neverallows tripped
      Change-Id: I5c22dd272b66fd32b4758c1dce659ccd98b8a7ba
      623d9f06
    • Max Bires's avatar
      Adding write permissions to traceur · 35c36389
      Max Bires authored
      Fixing denials that stopped traceur from being able to write to
      debugfs_tracing. Also cleaning up general find denials for services that
      traceur doesn't have permission to access.
      
      Additionally, labeling /data/local/trace as a trace_data_file in order
      to give traceur a UX friendly area to write its traces to now that it
      will no longer be a shell user. It will be write/readable by traceur,
      and deletable/readable by shell.
      
      Test: Traceur functionality is not being blocked by selinux policy
      Bug: 68126425
      Change-Id: I201c82975a31094102e90bc81454d3c2a48fae36
      35c36389
    • Steven Moreland's avatar
      Add policy for 'blank_screen'. · 8bda3dfa
      Steven Moreland authored
      This util allows init to turn off the screen
      without any binder dependencies.
      
      Bug: 70846424
      Test: manual + init use
      Change-Id: I4f41a966d6398e959ea6baf36c2cfe6fcebc00de
      8bda3dfa
  7. Jan 20, 2018
  8. Jan 19, 2018
    • Tao Bao's avatar
      Add rules for system_update service. · d7d9cfca
      Tao Bao authored
      system_update service manages system update information: system updater
      (priv_app) publishes the pending system update info through the service,
      while other apps can read the info accordingly (design doc in
      go/pi-ota-platform-api).
      
      This CL adds the service type, and grants priv_app to access the service.
      
      Bug: 67437079
      Test: Build and flash marlin image. The system_update service works.
      Change-Id: I7a3eaee3ecd3e2e16b410413e917ec603566b375
      d7d9cfca
    • Paul Crowley's avatar
      Allow access to the metadata partition for metadata encryption. · ab318e30
      Paul Crowley authored
      Bug: 63927601
      Test: Enable metadata encryption in fstab on Taimen, check boot success.
      Change-Id: Id425c47d48f413d6ea44ed170835a52d0af39f9f
      ab318e30
    • Daniel Rosenberg's avatar
      Label esdfs as sdcardfs · 9d0d6856
      Daniel Rosenberg authored
      Test: esdfs should be mountable and usable with selinux on
      Bug: 63876697
      Change-Id: I7a1d96d3f0d0a6dbc1c98f0c4a96264938011b5e
      9d0d6856
    • Yifan Hong's avatar
      move /vendor VINTF data to /vendor/etc/vintf · 8d8da6a2
      Yifan Hong authored
      Test: boots
      Test: hwservicemanager can read these files
      Bug: 36790901
      Change-Id: I0431a7f166face993c1d14b6209c9b502a506e09
      8d8da6a2
    • Badhri Jagan Sridharan's avatar
      hal_usb_gadget sepolicy · 7bee33e6
      Badhri Jagan Sridharan authored
      Bug: 63669128
      Test: Checked for avc denail messages.
      Change-Id: I057b3cf9ccc945cb943b9cf60fc9cd6c023eddda
      Merged-In: I057b3cf9ccc945cb943b9cf60fc9cd6c023eddda
      7bee33e6
    • Yao Chen's avatar
      Allow dumpstate to call statsd. This is needed for bugreport. · b10ff337
      Yao Chen authored
      Selinux violations while calling dump() on statsd by bugreport.
      
      avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:statsd:s0 tclass=binder permissive=1
      denied { use } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fd permissive=1
      avc: denied { write } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1
      avc: denied { getattr } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1
      
      Test: manual
      Change-Id: I46c5b119548378cc80c6e4498d00edad5959d188
      b10ff337
    • Steven Moreland's avatar
      Disallow sysfs_leds to coredomains. · 09fddac1
      Steven Moreland authored
      Bug: 70846424
      Test: neverallow not tripped
      Change-Id: I9e351ee906162a594930b5ab300facb5fe807f13
      09fddac1
  9. Jan 18, 2018
    • Tri Vo's avatar
      neverallow shell access to 'device' type · 5dab9134
      Tri Vo authored
      Bug: 65643247
      Test: builds, the change doesn't affect runtime behavior.
      
      Change-Id: I621a8006db7074f124cb16a12662c768bb31e465
      5dab9134
    • Pavel Grafov's avatar
      Allow system apps to read log props. · 118e4969
      Pavel Grafov authored
      This is needed to allow system apps to know whether security
      logging is enabled, so that they can in this case log additional
      audit events.
      
      Test: logged a security event from locally modified KeyChain app.
      Bug: 70886042
      Change-Id: I9e18d59d72f40510f81d1840e4ac76a654cf6cbd
      118e4969
    • Jeff Vander Stoep's avatar
      Suppress denials for non-API access · 6d8a876a
      Jeff Vander Stoep authored
      avc: denied { read } scontext=u:r:priv_app:s0:c512,c768
      tcontext=u:object_r:proc_version:s0 tclass=file
      avc: denied { read } scontext=u:r:priv_app:s0:c512,c768
      tcontext=u:object_r:wifi_prop:s0 tclass=file
      avc: denied { read } scontext=u:r:priv_app:s0:c512,c768
      tcontext=u:object_r:net_dns_prop:s0 tclass=file
      
      Bug: 72151306
      Test: build
      Change-Id: I4b658ccd128746356f635ca7955385a89609eea1
      6d8a876a
    • Jaekyun Seok's avatar
      Add default namespaces of odm properties · afca82a3
      Jaekyun Seok authored
      Since /odm is an extension of /vendor, its default property contexts
      should be consistent with ones of /vendor.
      
      Bug: 36796459
      Test: tested on wahoo devices
      Change-Id: Ia67ebe81e9c7102aab35a34f14738ed9a24811d3
      afca82a3
  10. Jan 17, 2018
    • Chenbo Feng's avatar
      Add sepolicy to lock down bpf access · 566411ed
      Chenbo Feng authored
      Add a new set of sepolicy for the process that only netd use to load
      and run ebpf programs. It is the only process that can load eBPF
      programs into the kernel and is only used to do that. Add some
      neverallow rules regarding which processes have access to bpf objects.
      
      Test: program successfully loaded and pinned at sys/fs/bpf after device
      boot. No selinux violation for bpfloader
      Bug: 30950746
      
      Change-Id: Ia6bb1afda29ae0749bdc368e2dfc5faa12e81b2f
      566411ed
    • Tri Vo's avatar
      system_server: remove access sysfs_devices_system_cpu · 35c65c1e
      Tri Vo authored
      CpuFrequency.java seems to be the only thing that depends on
      /sys/devices/system/cpu in system_server. And according to
      b/68988722#comment15, that dependency is not exercised.
      
      Bug: 68988722
      Test: walleye boots without denials to sysfs_devices_system_cpu
      Change-Id: If777b716bf74188581327b7f5aa709f5d88aad2d
      35c65c1e
Loading