- Mar 07, 2018
-
-
Ruchi Kandoi authored
Test: eSE initializes at boot Bug: 64881253 Change-Id: Ib2388b7368c790c402c000adddf1488bee492cce (cherry picked from commit ea3cf000)
-
- Dec 13, 2017
-
-
Tom Cherry authored
Allow init to create a serialized property_info file and allow all processes to read it. Bug: 36001741 Test: boot bullhead, walleye using property_info Change-Id: Ie51d4c0f0221b128dd087029c811fda15b4d7093
-
- Sep 28, 2017
-
-
Dan Cashman authored
Bug: 37916906 Test: Builds 'n' boots. Change-Id: Ia1d86264446ebecc1ca79f32f11354921bc77668 Merged-In: I208ec6a864127a059fb389417a9c6b259d7474cb
-
- Sep 26, 2017
-
-
Dan Cashman authored
Bug: 37916906 Test: Builds 'n' boots. Change-Id: Ia1d86264446ebecc1ca79f32f11354921bc77668 Merged-In: I208ec6a864127a059fb389417a9c6b259d7474cb
-
- Sep 20, 2017
-
-
Robert Quattlebaum authored
Bug: b/64090883 Bug: b/33073713 Test: Manual Change-Id: I7aa23c31b1fccae56c1a0e0bd4cfe370aeb911dd
-
- Aug 11, 2017
-
-
Josh Gao authored
Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log crashes to dmesg when logd isn't up yet (or is the one crashing). Bug: http://b/36574794 Test: stop tombstoned; crasher; dmesg Change-Id: I6ffe11bc613e88198893e82712719522b74fe1be
-
- Jun 27, 2017
-
-
Tom Cherry authored
This was marked deprecated in 2014 and removed in 2015, let's remove the sepolicy now too. (Originally submitted in commit: 8c60f74d) Bug: 38242876 Test: Builds and boots. Change-Id: I4caa0dbf77956fcbc61a07897242b951c275b502
-
- Jun 14, 2017
-
-
Tim Murray authored
Allow lmkd to access /dev/memcg once again. Test: lmkd can access memcg bug 36588803 Change-Id: I47b4e79260bcd2967d85d8151c83e624d432f409
-
Robert Benea authored
This reverts commit 527f64e6. Change-Id: Ibc48af53431a8f7c7211999dcb571f492fb5ddb4
-
- Jun 13, 2017
-
-
Tim Murray authored
Allow lmkd to access /dev/memcg once again. Test: lmkd can access memcg bug 36588803 Change-Id: Ia57dbbc3987d8858c932103c4e546cbb88893207
-
- May 26, 2017
-
-
Josh Gao authored
This reverts commit a015186f. Bug: http://b/62101480 Change-Id: I8e889e3d50cf1749168acc526f8a8901717feb46
-
- May 11, 2017
-
-
Tom Cherry authored
This reverts commit 8c60f74d. Bug: 38242876 Change-Id: Iba5a94d16901dc0c52f1941972c26877baa4805c
-
- Apr 11, 2017
-
-
Tom Cherry authored
This was marked deprecated in 2014 and removed in 2015, let's remove the sepolicy now too. Test: see that logging still works on bullhead Change-Id: I4caa0dbf77956fcbc61a07897242b951c275b502
-
- Apr 06, 2017
-
-
Josh Gao authored
Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log crashes to dmesg when logd isn't up yet (or is the one crashing). Bug: http://b/36574794 Test: stop tombstoned; crasher; dmesg Change-Id: I249e11291c58fee77098dec3fd3271ea23363ac9
-
- Mar 26, 2017
-
-
Jeff Sharkey authored
Per loop(4), this device is the preferred way of allocating new loop devices since Linux 3.1. avc: denied { read write } for name="loop-control" dev="tmpfs" ino=15221 scontext=u:r:vold:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 Bug: 34903607 Change-Id: I1f5f62cf0a1c24c6f6453100004812af4b8e1503
-
- Mar 23, 2017
-
-
Martijn Coenen authored
vndservicemanager is the context manager for binder services that are solely registered and accessed from vendor processes. Bug: 36052864 Test: vendorservicemanager runs Merged-In: Ifbf536932678d0ff13d019635fe6347e185ef387 Change-Id: I430f1762eb83825f6cd4be939a69d46a8ddc80ff
-
- Mar 22, 2017
-
-
Martijn Coenen authored
vndservicemanager is the context manager for binder services that are solely registered and accessed from vendor processes. Bug: 36052864 Test: vendorservicemanager runs Change-Id: Ifbf536932678d0ff13d019635fe6347e185ef387
-
- Mar 18, 2017
-
-
Alex Klyubin authored
This switches Boot Control HAL policy to the design which enables us to conditionally remove unnecessary rules from domains which are clients of Boot Control HAL. Domains which are clients of Boot Control HAL, such as update_server, are granted rules targeting hal_bootctl only when the Boot Control HAL runs in passthrough mode (i.e., inside the client's process). When the HAL runs in binderized mode (i.e., in another process/domain, with clients talking to the HAL over HwBinder IPC), rules targeting hal_bootctl are not granted to client domains. Domains which offer a binderized implementation of Boot Control HAL, such as hal_bootctl_default domain, are always granted rules targeting hal_bootctl. P. S. This commit removes direct access to Boot Control HAL from system_server because system_server is not a client of this HAL. This commit also removes bootctrl_block_device type which is no longer used. Finally, boot_control_hal attribute is removed because it is now covered by the hal_bootctl attribute. Test: Device boots up, no new denials Test: Reboot into recovery, sideload OTA update succeeds Test: Apply OTA update via update_engine: 1. make dist 2. Ensure device has network connectivity 3. ota_call.py -s <serial here> out/dist/sailfish-ota-*.zip Bug: 34170079 Change-Id: I9c410c092069e431a3852b66c04c4d2a9f1a25cf
-
- Jan 13, 2017
-
-
Max Bires authored
It seems likely that there is no reason to keep around a number of devices that are configured to be included into the pixel kernels. Init and ueventd should be the only processes with r/w access to these devices, so auditallow rules have been added to ensure that they aren't actually used. /dev/keychord was given its own type since it's one of the few character devices that's actually legitimately used and would cause log spam in the auditallow otherwise. Bug: 33347297 Test: The phone boots without any apparent log spam. Change-Id: I3dd9557df8a9218b8c802e33ff549d15849216fb
-
- Jan 11, 2017
-
-
Josh Gao authored
Bug: http://b/34228376 Test: m Change-Id: I1321ada1521bb3e3fd08105f1a41d519ee486683
-
- Dec 05, 2016
-
-
Max authored
Only init and ueventd have any access to /dev/port, and neither should have any use for it. As it stands, leaving port in just represents additional attack surface with no useful functionality, so it should be removed if possible, not only from Pixel devices, but from all Android devices. Test: The phone boots successfully Bug:33301618 Change-Id: Iedc51590f1ffda02444587d647889ead9bdece3f
-
- Nov 21, 2016
-
-
Nick Kralevich authored
urandom_device and random_device have the exact same security properties. Collapse them into one type. Test: device boots and /dev/urandom is labeled correctly. Change-Id: I12da30749291bc5e37d99bc9422bb86cb58cec41
-
- Oct 06, 2016
-
-
dcashman authored
Divide policy into public and private components. This is the first step in splitting the policy creation for platform and non-platform policies. The policy in the public directory will be exported for use in non-platform policy creation. Backwards compatibility with it will be achieved by converting the exported policy into attribute-based policy when included as part of the non-platform policy and a mapping file will be maintained to be included with the platform policy that maps exported attributes of previous versions to the current platform version. Eventually we would like to create a clear interface between the platform and non-platform device components so that the exported policy, and the need for attributes is minimal. For now, almost all types and avrules are left in public. Test: Tested by building policy and running on device. Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
-
- Oct 05, 2016
-
-
Jeff Vander Stoep authored
No core android component needs access to /dev/snd/{seq,timer}, but currently audioserver, bootanim, init, system_server and ueventd have access. Seq and timer have been the source of many bugs in the past [1]. Giving these files new labels without explicitly granting access removes access from audioserver, bootanim, and system_server. Init and ueventd still require access for /dev setup. TODO: Explore unsetting CONFIG_SND_TIMER device kernels. [1] https://github.com/google/syzkaller/wiki/Found-Bugs Test: media CTS "cts-tradefed run cts -m CtsMediaTestCases" on Bullhead and Dragon completed with no denials. Bug: 29045223 (cherry picked from commit db4510d8) Change-Id: I2d069920e792ce8eef70c7b4a038b9e7000f39f5
-
- Oct 04, 2016
-
-
Jeff Vander Stoep authored
No core android component needs access to /dev/snd/{seq,timer}, but currently audioserver, bootanim, init, system_server and ueventd have access. Seq and timer have been the source of many bugs in the past [1]. Giving these files new labels without explicitly granting access removes access from audioserver, bootanim, and system_server. Init and ueventd still require access for /dev setup. TODO: Explore unsetting CONFIG_SND_TIMER device kernels. [1] https://github.com/google/syzkaller/wiki/Found-Bugs Test: media CTS "cts-tradefed run cts -m CtsMediaTestCases" on Bullhead and Dragon completed with no denials. Bug: 29045223 Change-Id: I2d069920e792ce8eef70c7b4a038b9e7000f39f5
-
- Sep 14, 2016
-
-
Martijn Coenen authored
Change-Id: I07d188e4dd8801a539db1e9f3edf82a1d662648e (cherry picked from commit 61a082a55dbc2798d50d0d4b766151d69334729a)
-
- Jul 27, 2016
-
-
Martijn Coenen authored
Change-Id: I07d188e4dd8801a539db1e9f3edf82a1d662648e (cherry picked from commit 61a082a55dbc2798d50d0d4b766151d69334729a)
-
- Jul 26, 2016
-
-
Elliott Hughes authored
Bug: http://b/30317429 Change-Id: I5c499c48d5e321ebdf588a162d29e949935ad8ee Test: adb shell dmesg | grep ueventd
-
- May 12, 2016
-
-
Jeff Vander Stoep authored
Only used by Flounder. Bug: 8435593 Change-Id: I06655e897ab68a1724190950e128cd390617f2bd
-
Jeff Vander Stoep authored
(cherry-picked from commit cc8a09f5) camera_device was previously removed in AOSP commit: b7aace2d "camera_device: remove type and add typealias" because the same domains required access to both without exception, meaning there was no benefit to distinguishing between the two. However, with the split up of mediaserver this is no longer the case and distinguishing between the camera and video provides a legitimate security benefit. For example, the mediacodec domain requires access to the video_device for access to hardware accelerated codecs but does not require access to the camera. Bug: 28359909 Change-Id: I8a4592722d8e6391c0e91b440914284b7245e232
-
- Apr 24, 2016
-
-
Jeff Vander Stoep authored
camera_device was previously removed in AOSP commit: b7aace2d "camera_device: remove type and add typealias" because the same domains required access to both without exception, meaning there was no benefit to distinguishing between the two. However, with the split up of mediaserver this is no longer the case and distinguishing between the camera and video provides a legitimate security benefit. For example, the mediacodec domain requires access to the video_device for access to hardware accelerated codecs but does not require access to the camera. Bug: 28359909 Change-Id: I8a4592722d8e6391c0e91b440914284b7245e232
-
- Jan 12, 2016
-
-
William Roberts authored
Remove the temporary typealias on camera_device since it is now defunct. Change-Id: I0a21d019580605695afa0a169aa1fbf0d7533f29
-
William Roberts authored
camera_device didn't really offer much in terms of control considering that most domains that need camera_device, also need video_device and vice versa. Thus, drop camera_device from the policy and add a temporary typealias. Change-Id: I144c0bb49a9a68ab1bdf636c64abe656f3e677b4 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Dec 24, 2015
-
-
Daichi Hirono authored
The new rules are used to allow to mount FUSE file system for priv-app. Change-Id: I5ce2d261be501e2b3fef09b7666f1e5d1cddbe52
-
- Dec 08, 2015
-
-
Tao Bao authored
Bug: 26039641 Change-Id: Ifd96b105f054b67f881529db3fe94718cab4a0f4
- Dec 03, 2015
-
-
Tom Cherry authored
Properties are now broken up from a single /dev/__properties__ file into multiple files, one per property label. This commit provides the mechanism to control read access to each of these files and therefore sets of properties. This allows full access for all domains to each of these new property files to match the current permissions of /dev/__properties__. Future commits will restrict the access. Bug: 21852512 Change-Id: Ie9e43968acc7ac3b88e354a0bdfac75b8a710094
-
- Nov 19, 2015
-
-
David Zeuthen authored
The update_engine daemon from Brillo is expected to be used also in Android so move its selinux policy to AOSP. Put update_engine in the whitelist (currently only has the recovery there) allowing it to bypass the notallow for writing to partititions labeled as system_block_device. Also introduce the misc_block_device dev_type as update_engine in some configurations may need to read/write the misc partition. Start migrating uncrypt to use this instead of overly broad block_device:blk_file access. Bug: 23186405 Test: Manually tested with Brillo build. Change-Id: Icf8cdb4133d4bbdf14bacc6c0fa7418810ac307a (cherry picked from commit a10f789d)
-
- Oct 27, 2015
-
-
Bruce Beare authored
Change-Id: I93d9cfea2f2148bb042d1cb8af3649524ad31034 Signed-off-by:
Bruce Beare <bruce.j.beare@intel.com>
-