Skip to content
Snippets Groups Projects
  1. Jan 17, 2018
    • Jeff Vander Stoep's avatar
      Annotate denials · 1e1a3f7c
      Jeff Vander Stoep authored
      There is a race condition between when /data is mounted
      and when processes attempt to access it. Attempting to access
      /data before it's mounted causes an selinux denial. Attribute
      these denials to a bug.
      
      07-04 23:48:53.646   503   503 I auditd  : type=1400 audit(0.0:7): avc:
      denied { search } for comm="surfaceflinger" name="/" dev="sda35" ino=2
      scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:unlabeled:s0
      tclass=dir permissive=0
      07-15 17:41:18.100   582   582 I auditd  : type=1400 audit(0.0:4): avc:
      denied { search } for comm="BootAnimation" name="/" dev="sda35" ino=2
      scontext=u:r:bootanim:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir
      permissive=0
      
      Bug: 68864350
      Test: build
      Change-Id: I07f751d54b854bdc72f3e5166442a5e21b3a9bf5
      1e1a3f7c
  2. Jan 16, 2018
  3. Jan 15, 2018
    • Nathan Harold's avatar
      Allow More Apps to Recv UDP Sockets from SystemServer · ee268643
      Nathan Harold authored
      This gives the privilege to system apps, platform apps,
      ephemeral apps, and privileged apps to receive a
      UDP socket from the system server. This is being added
      for supporting UDP Encapsulation sockets for IPsec, which
      must be provided by the system.
      
      This is an analogous change to a previous change that
      permitted these sockets for untrusted_apps:
      0f75a62e
      
      Bug: 70389346
      Test: IpSecManagerTest, System app verified with SL4A
      Change-Id: Iec07e97012e0eab92a95fae9818f80f183325c31
      ee268643
  4. Jan 12, 2018
    • Joel Galenson's avatar
      Improve neverallow error messages and allow disabling them on userdebug builds. · 5988b565
      Joel Galenson authored
      This patch adds a flag that can be used to ignore neverallow rules.
      By adding
      SELINUX_IGNORE_NEVERALLOWS := true
      into the BoardConfig.mk file, neverallow violations will be ignored
      silently.  This flag can only be enabled on userdebug and eng builds.
      
      Users of this flag should be very careful.  Since it does not work on
      user builds, it must be disabled to pass CTS, and enabling it for
      too long could hide issues that need to be addressed.
      
      As a happy side effect, this patch should also improve the error
      messages when violating a neverallow rules.  Specifically, the file
      and line number should be correct.
      
      Bug: 70950899
      Bug: 33960443
      Test: Built walleye-{user,eng} with and without this new option and
      a neverallow violation.  Built policy for all targets.
      
      Change-Id: Id0d65123cdd230d6b90faa6bb460d544054bb906
      5988b565
    • Tri Vo's avatar
      Files under /vendor must have attribute vendor_file_type. · 30c3c2a8
      Tri Vo authored
      Label /vendor/etc/selinux/* as vendor_configs_file.
      
      Bug: 62041836
      Test: build system/sepolicy
      Test: walleye boots
      Change-Id: I617a3287860e965c282e9e82b4375ea68dbca785
      30c3c2a8
  5. Jan 11, 2018
    • Tom Cherry's avatar
      Merge "Add toolbox to vendor partition" · 1d2c3f44
      Tom Cherry authored
      1d2c3f44
    • Tom Cherry's avatar
      Add toolbox to vendor partition · b7255bf2
      Tom Cherry authored
      Bug: 71861796
      Test: no more denials on walleye for shell init scripts
      Change-Id: I51eab267c95a915f927b0aaa7db9d678a83093c7
      b7255bf2
    • Holly Jiuyu Sun's avatar
    • Holly Jiuyu Sun's avatar
      Add EuiccCardManager and EuiccCardController. · d41ec0ed
      Holly Jiuyu Sun authored
      Bug: 38206971
      Test: test on phone
      Change-Id: Id34ab2673c7a16744fba77eb5c176e2e8b474299
      Merged-In: Id34ab2673c7a16744fba77eb5c176e2e8b474299
      d41ec0ed
    • Jeff Vander Stoep's avatar
      relabel files in /proc/net/xt_qtaguid/ · 43303c8b
      Jeff Vander Stoep authored
      /proc/net/xt_qtaguid is used by apps to track their network data
      use. Limit access to just zygote spawned processes - apps and
      system_server, omitting access to isolated_app which is not allowed
      to create network sockets.
      As Android moves to eBPF for app's network data stats, access to
      /proc/net/xt_qtaguid will be removed entirely. Segmenting access off
      is the first step.
      Bug: 68774956
      
      This change also helps further segment and whitelist access to
      files in /proc/net and is a step in the lockdown of /proc/net.
      Bug: 9496886
      
      Test: boot Taimen. Walk through setup-wizard. Make phone call and
          video call. Browse web. Watch youtube. Navigate in maps.
      Test: cts-tradefed run cts -m CtsAppSecurityHostTestCases -t \
          android.appsecurity.cts.AppSecurityTests
      Test: cts-tradefed run cts -m CtsNativeNetTestCases
      Test: cts-tradefed run cts -m CtsIncidentHostTestCases -t \
          com.android.server.cts.NetstatsIncidentTest
      Test: cts-tradefed run cts -m CtsOsTestCases -t \
          android.os.cts.StrictModeTest
      Test: cts-tradefed run cts -m CtsNetTestCases -t \
          android.net.cts.TrafficStatsTest
      Test: cts-tradefed run cts -m CtsUsageStatsTestCases -t \
          android.app.usage.cts.NetworkUsageStatsTest
      Test: vts-tradefed run vts -m VtsQtaguidTest
      Change-Id: Idddd318c56b84564142d37b11dcc225a2f2800ea
      43303c8b
  6. Jan 10, 2018
    • Treehugger Robot's avatar
      70d2bb43
    • Treehugger Robot's avatar
      Merge "OWNERS: add Joel" · 73b9d8d8
      Treehugger Robot authored
      73b9d8d8
    • Treehugger Robot's avatar
      Merge changes I64b2f1ad,I9db561ee · be7b1b4f
      Treehugger Robot authored
      * changes:
        vold_prepare_subdirs: grant chown
        statsd: annotate boot denials
      be7b1b4f
    • Jeff Vander Stoep's avatar
      OWNERS: add Joel · 2f2d8aba
      Jeff Vander Stoep authored
      Test: none
      Change-Id: I42f2c2a09235d907b020c4924b91a3428f6c9d8e
      2f2d8aba
    • Jeff Vander Stoep's avatar
      vold_prepare_subdirs: grant chown · bdbdb0f2
      Jeff Vander Stoep authored
      Addresses:
      avc: denied { chown } for comm="vold_prepare_su" capability=0
      scontext=u:r:vold_prepare_subdirs:s0
      tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability
      
      Bug: 71796118
      Test: build
      Change-Id: I64b2f1ad8d6e0748c5820b8a37a4fc4f4101d1fb
      bdbdb0f2
    • Jeff Vander Stoep's avatar
      statsd: annotate boot denials · 79867779
      Jeff Vander Stoep authored
      Point logspam to its owner.
      
      Bug: 71537285
      Test: build
      Change-Id: I9db561ee6f2857214b7945b312e6d303630724ea
      79867779
    • Jaekyun Seok's avatar
      Whitelist exported platform properties · e4971454
      Jaekyun Seok authored
      This CL lists all the exported platform properties in
      private/exported_property_contexts.
      
      Additionally accessing core_property_type from vendor components is
      restricted.
      Instead public_readable_property_type is used to allow vendor components
      to read exported platform properties, and accessibility from
      vendor_init is also specified explicitly.
      
      Note that whitelisting would be applied only if
      PRODUCT_COMPATIBLE_PROPERTY is set on.
      
      Bug: 38146102
      Test: tested on walleye with PRODUCT_COMPATIBLE_PROPERTY=true
      Change-Id: I304ba428cc4ca82668fec2ddeb17c971e7ec065e
      e4971454
    • yro's avatar
      Update statsd sepolicies to avoid selinux violations during cts tests · e27af27f
      yro authored
      and pulling metrics
      
      Bug: 63757906
      Test: manual testing conducted
      Change-Id: Ieba524ee676dfb4a457d39d025d203bf02a70831
      e27af27f
    • Primiano Tucci's avatar
      Perfetto SELinux policies · c80f9e03
      Primiano Tucci authored
      Perfetto is a performance instrumentation and logging framework,
      living in AOSP's /external/pefetto.
      Perfetto introduces in the system one binary and two daemons
      (the binary can specialize in either depending on the cmdline).
      
      1) traced: unprivileged daemon. This is architecturally similar to logd.
         It exposes two UNIX sockets:
         - /dev/socket/traced_producer : world-accessible, allows to stream
           tracing data. A tmpfs file descriptor is sent via SCM_RIGHTS
           from traced to each client process, which needs to be able to
           mmap it R/W (but not X)
         - /dev/socket/traced_consumer : privilege-accessible (only from:
           shell, statsd). It allows to configure tracing and read the trace
           buffer.
      2) traced_probes: privileged daemon. This needs to:
         - access tracingfs (/d/tracing) to turn tracing on and off.
         - exec atrace
         - connect to traced_producer to stream data to traced.
      
      init.rc file:
      https://android-review.googlesource.com/c/platform/external/perfetto/+/575382/14/perfetto.rc
      
      Bug: 70942310
      Change-Id: Ia3b5fdacbd5a8e6e23b82f1d6fabfa07e4abc405
      c80f9e03
  7. Jan 09, 2018
  8. Jan 08, 2018
  9. Jan 05, 2018
  10. Jan 04, 2018
Loading