- Jan 17, 2018
-
-
Jeff Vander Stoep authored
There is a race condition between when /data is mounted and when processes attempt to access it. Attempting to access /data before it's mounted causes an selinux denial. Attribute these denials to a bug. 07-04 23:48:53.646 503 503 I auditd : type=1400 audit(0.0:7): avc: denied { search } for comm="surfaceflinger" name="/" dev="sda35" ino=2 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 07-15 17:41:18.100 582 582 I auditd : type=1400 audit(0.0:4): avc: denied { search } for comm="BootAnimation" name="/" dev="sda35" ino=2 scontext=u:r:bootanim:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=0 Bug: 68864350 Test: build Change-Id: I07f751d54b854bdc72f3e5166442a5e21b3a9bf5
-
- Jan 16, 2018
-
-
Treehugger Robot authored
-
Tri Vo authored
-
Treehugger Robot authored
-
Yifan Hong authored
Test: adb shell /vendor/bin/sh Fixes: 65448858 Change-Id: Ic2c9fa9b7e5bed3e1532f4e545f54a857ea99fc6
-
Tri Vo authored
We use this attribute to annotate coredomains that execute vendor code in a Treble-violating way. Bug: 62041836 Test: sepolicy builds Change-Id: Ie6052209b3901eaad8496b8fc9681421d7ee3c1c
-
- Jan 15, 2018
-
-
Nathan Harold authored
This gives the privilege to system apps, platform apps, ephemeral apps, and privileged apps to receive a UDP socket from the system server. This is being added for supporting UDP Encapsulation sockets for IPsec, which must be provided by the system. This is an analogous change to a previous change that permitted these sockets for untrusted_apps: 0f75a62e Bug: 70389346 Test: IpSecManagerTest, System app verified with SL4A Change-Id: Iec07e97012e0eab92a95fae9818f80f183325c31
-
- Jan 12, 2018
-
-
Joel Galenson authored
This patch adds a flag that can be used to ignore neverallow rules. By adding SELINUX_IGNORE_NEVERALLOWS := true into the BoardConfig.mk file, neverallow violations will be ignored silently. This flag can only be enabled on userdebug and eng builds. Users of this flag should be very careful. Since it does not work on user builds, it must be disabled to pass CTS, and enabling it for too long could hide issues that need to be addressed. As a happy side effect, this patch should also improve the error messages when violating a neverallow rules. Specifically, the file and line number should be correct. Bug: 70950899 Bug: 33960443 Test: Built walleye-{user,eng} with and without this new option and a neverallow violation. Built policy for all targets. Change-Id: Id0d65123cdd230d6b90faa6bb460d544054bb906
-
Tri Vo authored
Label /vendor/etc/selinux/* as vendor_configs_file. Bug: 62041836 Test: build system/sepolicy Test: walleye boots Change-Id: I617a3287860e965c282e9e82b4375ea68dbca785
-
- Jan 11, 2018
-
-
Tom Cherry authored
-
Tom Cherry authored
Bug: 71861796 Test: no more denials on walleye for shell init scripts Change-Id: I51eab267c95a915f927b0aaa7db9d678a83093c7
-
Holly Jiuyu Sun authored
-
Holly Jiuyu Sun authored
Bug: 38206971 Test: test on phone Change-Id: Id34ab2673c7a16744fba77eb5c176e2e8b474299 Merged-In: Id34ab2673c7a16744fba77eb5c176e2e8b474299
-
Jeff Vander Stoep authored
/proc/net/xt_qtaguid is used by apps to track their network data use. Limit access to just zygote spawned processes - apps and system_server, omitting access to isolated_app which is not allowed to create network sockets. As Android moves to eBPF for app's network data stats, access to /proc/net/xt_qtaguid will be removed entirely. Segmenting access off is the first step. Bug: 68774956 This change also helps further segment and whitelist access to files in /proc/net and is a step in the lockdown of /proc/net. Bug: 9496886 Test: boot Taimen. Walk through setup-wizard. Make phone call and video call. Browse web. Watch youtube. Navigate in maps. Test: cts-tradefed run cts -m CtsAppSecurityHostTestCases -t \ android.appsecurity.cts.AppSecurityTests Test: cts-tradefed run cts -m CtsNativeNetTestCases Test: cts-tradefed run cts -m CtsIncidentHostTestCases -t \ com.android.server.cts.NetstatsIncidentTest Test: cts-tradefed run cts -m CtsOsTestCases -t \ android.os.cts.StrictModeTest Test: cts-tradefed run cts -m CtsNetTestCases -t \ android.net.cts.TrafficStatsTest Test: cts-tradefed run cts -m CtsUsageStatsTestCases -t \ android.app.usage.cts.NetworkUsageStatsTest Test: vts-tradefed run vts -m VtsQtaguidTest Change-Id: Idddd318c56b84564142d37b11dcc225a2f2800ea
-
- Jan 10, 2018
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
* changes: vold_prepare_subdirs: grant chown statsd: annotate boot denials
-
Jeff Vander Stoep authored
Test: none Change-Id: I42f2c2a09235d907b020c4924b91a3428f6c9d8e
-
Jeff Vander Stoep authored
Addresses: avc: denied { chown } for comm="vold_prepare_su" capability=0 scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability Bug: 71796118 Test: build Change-Id: I64b2f1ad8d6e0748c5820b8a37a4fc4f4101d1fb
-
Jeff Vander Stoep authored
Point logspam to its owner. Bug: 71537285 Test: build Change-Id: I9db561ee6f2857214b7945b312e6d303630724ea
-
Jaekyun Seok authored
This CL lists all the exported platform properties in private/exported_property_contexts. Additionally accessing core_property_type from vendor components is restricted. Instead public_readable_property_type is used to allow vendor components to read exported platform properties, and accessibility from vendor_init is also specified explicitly. Note that whitelisting would be applied only if PRODUCT_COMPATIBLE_PROPERTY is set on. Bug: 38146102 Test: tested on walleye with PRODUCT_COMPATIBLE_PROPERTY=true Change-Id: I304ba428cc4ca82668fec2ddeb17c971e7ec065e
-
yro authored
and pulling metrics Bug: 63757906 Test: manual testing conducted Change-Id: Ieba524ee676dfb4a457d39d025d203bf02a70831
-
Primiano Tucci authored
Perfetto is a performance instrumentation and logging framework, living in AOSP's /external/pefetto. Perfetto introduces in the system one binary and two daemons (the binary can specialize in either depending on the cmdline). 1) traced: unprivileged daemon. This is architecturally similar to logd. It exposes two UNIX sockets: - /dev/socket/traced_producer : world-accessible, allows to stream tracing data. A tmpfs file descriptor is sent via SCM_RIGHTS from traced to each client process, which needs to be able to mmap it R/W (but not X) - /dev/socket/traced_consumer : privilege-accessible (only from: shell, statsd). It allows to configure tracing and read the trace buffer. 2) traced_probes: privileged daemon. This needs to: - access tracingfs (/d/tracing) to turn tracing on and off. - exec atrace - connect to traced_producer to stream data to traced. init.rc file: https://android-review.googlesource.com/c/platform/external/perfetto/+/575382/14/perfetto.rc Bug: 70942310 Change-Id: Ia3b5fdacbd5a8e6e23b82f1d6fabfa07e4abc405
-
- Jan 09, 2018
-
-
yro authored
communicate with statsd Test: manual testing conducted Change-Id: Icd268e258f7cbdd9310baab53fe0c66f4f303d5e
-
Treehugger Robot authored
-
Etan Cohen authored
-
Treehugger Robot authored
-
- Jan 08, 2018
-
-
Tom Cherry authored
This reverts commit d711d4d2. Reason for revert: Shouldn't have submitted... Change-Id: I5b88101f381ca59132ec7d24990ea41ac1b84171
-
Tom Cherry authored
getprop is broken out from toolbox/toybox, however its permissions should remain the same, so label it appropriately. Bug: 36001741 Test: boot bullhead with the new getprop Change-Id: I4114ea21998da95173d882038bc6aebf39b64d7f
-
Luis Hector Chavez authored
This reverts commit 640e595a. The corresponding code in libcutils was removed, so this is now unneeded. Bug: 71632076 Test: aosp_sailfish still works Change-Id: I615bab83e9a83bc14439b8ab90c00d3156b0a7c4
-
Treehugger Robot authored
-
- Jan 05, 2018
-
-
Joel Galenson authored
This fixes an incorrect exception in the neverallow rule. Test: Built policy for all lunch targets. Change-Id: I283833131c6f1fd741e934de24c838594ac38a18
-
Tom Cherry authored
-
Etan Cohen authored
Finalize Wi-Fi RTT service name per API review. Note: CL 2 of 2 - removing old entry. Bug: 65108607 Test: integration tests Change-Id: Id2b3d91ea2ca578a5834a299275df188c68475da
-
Etan Cohen authored
Finalize Wi-Fi RTT service name per API review. Note: CL 1 of 2 - adding new entry here, will remove old entry in next CL. Bug: 65108607 Test: integration tests Change-Id: I065ce9d570510180fa8c8f09e1025ac795706405
-
- Jan 04, 2018
-
-
Chen Xu authored
-
Joel Galenson authored
-
Joel Galenson authored
This reverts commit b40eb255. Change-Id: I04d9e76152ed11ada4cabcc79bb4eec827f8abef
-
Treehugger Robot authored
-
fionaxu authored
Bug: 64131637 Test: Manual Change-Id: I0170c5eb465aa663582e3974348380a8f0c9b27f
-