Skip to content
Snippets Groups Projects
  1. Aug 17, 2017
  2. Aug 16, 2017
    • Martijn Coenen's avatar
      Remove display.qservice from service_contexts. · e1887359
      Martijn Coenen authored
      This is a Qualcomm proprietary service,
      and does not belong here.
      
      Test: boot Marlin
      Bug: 63391760
      Merged-In: If7469051f6cef3e2440f7021ae26c9815ff54820
      Change-Id: If7469051f6cef3e2440f7021ae26c9815ff54820
      e1887359
  3. Aug 14, 2017
    • TreeHugger Robot's avatar
    • Steven Moreland's avatar
      Add screencap domain. · 0bf4d0db
      Steven Moreland authored
      am: 6b780b35  -s ours
      
      Change-Id: I61d2951d682b236e7643b7b81eb5c52f84024950
      0bf4d0db
    • Steven Moreland's avatar
      Add screencap domain. · 9216a6ad
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Merged-In: I9f31d2067e002e7042646ee38dbfc06687481ac7
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      9216a6ad
    • Steven Moreland's avatar
      Add screencap domain. · 6b780b35
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Merged-In: I9f31d2067e002e7042646ee38dbfc06687481ac7
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      6b780b35
  4. Aug 11, 2017
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 530e168c
      Josh Gao authored
      am: 94e2a921
      
      Change-Id: I3cb9bd4305fe3f6d720f757a232d4bb38de98895
      530e168c
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 94e2a921
      Josh Gao authored
      Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log
      crashes to dmesg when logd isn't up yet (or is the one crashing).
      
      Bug: http://b/36574794
      Test: stop tombstoned; crasher; dmesg
      Change-Id: I6ffe11bc613e88198893e82712719522b74fe1be
      94e2a921
    • Nick Kralevich's avatar
      Validate no-cross-domain /proc/PID access · 881fe06f
      Nick Kralevich authored
      am: 7a463809
      
      Change-Id: Iba80938afccd21f0c3b69626223b35c672358e77
      881fe06f
    • Nick Kralevich's avatar
      Validate no-cross-domain /proc/PID access · 7a463809
      Nick Kralevich authored
      Android uses hidepid=2 to restrict visibility to other /proc entries on
      the system. This helps preserve user, application, and system
      confidentiality by preventing unauthorized access to application metadata,
      and addresses attacks such as
      http://www.cs.ucr.edu/~zhiyunq/pub/sec14_android_activity_inference.pdf
      
      Ensure the SELinux (weaker) equivalent is being enforced by adding
      neverallow compile time assertions.
      
      TODO: The "shell" user runs as both an Android application, as well as
      spawned via adb shell. This was a mistake. We should separate out the
      "shell" Android app into it's own SELinux domain. For now, exclude the
      shell from this assertion. (The shell Android app is covered by
      hidepid=2, so there's no leaking of data, but still, it's over
      privileged today and should be cleaned up.
      
      Bug: 23310674
      Test: policy compiles. Compile time assertion only.
      Change-Id: I0e1a6506b2719aabf7eb8127f046c4ada947ba90
      7a463809
  5. Aug 02, 2017
  6. Aug 01, 2017
    • Manoj Gupta's avatar
      Fix static analyzer warnings. · 3cdd4a4b
      Manoj Gupta authored
      Fix the following warnings:
      
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:346:9: warning:
      Potential leak of memory pointed to by '__s1'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:346:9: warning:
      Potential leak of memory pointed to by 'id'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:364:13: warning:
      Potential leak of memory pointed to by 'classperms'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:364:13: warning:
      Potential leak of memory pointed to by 'node'
      
      Bug: b/27101951
      Test:Warnings are gone.
      Change-Id: Ib9b2e0b9f19950b4b764d438ee58340e6c022ef5
      3cdd4a4b
    • Ruchi Kandoi's avatar
      Allow nfc application to set nfc property · 7ceea484
      Ruchi Kandoi authored
      am: df964950
      
      Change-Id: I5e793a78ad471b27fdc0bb88596ab23f6ac43dc4
      7ceea484
  7. Jul 31, 2017
    • Ruchi Kandoi's avatar
      Allow nfc application to set nfc property · df964950
      Ruchi Kandoi authored
      type=1400 audit(1501520483.066:14): avc: denied { write } for pid=3330
      comm=4173796E635461736B202331 name="property_service" dev="tmpfs"
      ino=10749 scontext=u:r:nfc:s0 tcontext=u:object_r:property_socket:s0
      tclass=sock_file permissive=0
      
      Test: No sepolicy denials
      Bug: 64010793
      Change-Id: I8d73e8e19cd4d0a8c61f1f184820c53e5cc2b6d6
      df964950
  8. Jul 29, 2017
  9. Jul 28, 2017
  10. Jul 27, 2017
    • Jeff Vander Stoep's avatar
      domain_deprecated: remove sysfs rules · 8e589af6
      Jeff Vander Stoep authored
      am: 275f6dd5
      
      Change-Id: I02b2eb1a5bbd0cf3a4bbeffbe70e442ba4cf8ee6
      8e589af6
    • Tim Kryger's avatar
      Fix selinux denials during bugreport · b7e1f2dd
      Tim Kryger authored
      
      avc: denied { read } for pid=1704 comm="top" name="stat" dev="proc" ino=4026532297 scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
      avc: denied { read } for pid=1636 comm="dumpstate" name="lcd-backlight" dev="sysfs" ino=16592 scontext=u:r:dumpstate:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=lnk_file permissive=0
      avc: denied { call } for pid=2230 comm="dumpsys" scontext=u:r:dumpstate:s0 tcontext=u:r:installd:s0 tclass=binder permissive=0
      avc: denied { create } for pid=1700 comm="ip" scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=netlink_xfrm_socket permissive=0
      
      Bug: 62410287
      Bug: 35350306
      Change-Id: I65be3678c64214ebeb544e0e155bce88b21adf02
      Signed-off-by: default avatarTim Kryger <tkryger@google.com>
      b7e1f2dd
    • Jeff Vander Stoep's avatar
      domain_deprecated: remove sysfs rules · 275f6dd5
      Jeff Vander Stoep authored
      Clean up the remaining granted permissions in domain_deprecated.
      
      avc: granted { read open } for comm="uncrypt"
      path="/sys/firmware/devicetree/base/firmware/android/fstab/compatible"
      dev="sysfs" ino=17591 scontext=u:r:uncrypt:s0
      tcontext=u:object_r:sysfs:s0 tclass=file
      avc: granted { getattr } for comm="uncrypt"
      path="/sys/firmware/devicetree/base/firmware/android/compatible"
      dev="sysfs" ino=17583 scontext=u:r:uncrypt:s0
      tcontext=u:object_r:sysfs:s0 tclass=file
      
      vc: granted { read open } for comm="update_engine"
      path="/sys/firmware/devicetree/base/firmware/android/fstab" dev="sysfs"
      ino=17258 scontext=u:r:update_engine:s0 tcontext=u:object_r:sysfs:s0
      tclass=dir
      avc: granted { getattr } for comm="update_engine"
      path="/sys/firmware/devicetree/base/firmware/android/fstab/compatible"
      dev="sysfs" ino=17259 scontext=u:r:update_engine:s0
      tcontext=u:object_r:sysfs:s0 tclass=file
      
      Bug: 28760354
      Test: build
      Change-Id: Id318ce84894c1001361923f5205de093a15c1e6a
      275f6dd5
    • Jeffrey Vander Stoep's avatar
      Merge "netd: relax binder neverallow rules for hwservices" · d7989e8b
      Jeffrey Vander Stoep authored
      am: 4fc64f2f
      
      Change-Id: I7dd6ea7bb5d767afb98a39e56214dd05d4585c93
      d7989e8b
    • Jeffrey Vander Stoep's avatar
    • Joel Galenson's avatar
      Add missing comment from my previous merge in 47966cec. · 87e51162
      Joel Galenson authored
      Test: Built.
      Change-Id: Ia5f5b52e10e9411cd87901053675d9e77a622529
      87e51162
    • Joel Galenson's avatar
      resolve merge conflicts of 27c0aa7a to stage-aosp-master · 47966cec
      Joel Galenson authored
      Test: I solemnly swear I tested this conflict resolution.
      
      Merged-In: Ia28707ec565a0792bc882fbffe9e8ab9968535f5
      Change-Id: I1f087fe5e7a71761a16673331619f52998473b44
      47966cec
    • Jeff Vander Stoep's avatar
      netd: relax binder neverallow rules for hwservices · 07c650eb
      Jeff Vander Stoep authored
      Relax neverallow rule restricting binder access to/from netd so that
      netd can export hwbinder services to vendor components.
      
      Continue to disallow app access to netd via binder.
      
      Bug: 36682246
      Test: build
      Change-Id: I8e558ea1add6c36b966ec1da204062ea82df3f3f
      07c650eb
    • Joel Galenson's avatar
      Move file labeling to genfs_contexts. · 27c0aa7a
      Joel Galenson authored
      This should improve performance, as file_contexts is slower than
      genfs_contexts.
      
      Bug: 62413700
      Test: Built, flashed, and booted Sailfish.  Verified that the
      files have the correct context and that wifi, web, and atrace work.
      
      Merged-In: Ia28707ec565a0792bc882fbffe9e8ab9968535f5
      Change-Id: I9546f3af3c95e3443684ae4764881b69987611ef
      27c0aa7a
  11. Jul 26, 2017
Loading