Skip to content
Snippets Groups Projects
  1. May 22, 2017
    • Nick Kralevich's avatar
      system_server: replace sys_resource with sys_ptrace · 3d8dde0e
      Nick Kralevich authored
      Commit https://android.googlesource.com/kernel/common/+/f0ce0eee added
      CAP_SYS_RESOURCE as a capability check which would allow access to
      sensitive /proc/PID files. However, in an SELinux based world, allowing
      this access causes CAP_SYS_RESOURCE to duplicate what CAP_SYS_PTRACE
      (without :process ptrace) already provides.
      
      Use CAP_SYS_PTRACE instead of CAP_SYS_RESOURCE.
      
      Test: Device boots, functionality remains identical, no sys_resource
      denials from system_server.
      Bug: 34951864
      Bug: 38496951
      Change-Id: I04d745b436ad75ee1ebecf0a61c6891858022e34
      (cherry picked from commit 44866954)
      3d8dde0e
  2. Dec 06, 2016
    • Nick Kralevich's avatar
      label /bugreports · 87a56541
      Nick Kralevich authored
      /data/bugreports is moving to /bugreports
      
      Bug: 27262109
      Bug: 27204904
      Bug: 32799236
      Test: new symlink is in /bugreports and is labeled correctly
      
      (cherry picked from commit d314376d)
      
      Change-Id: Ia9aca3ff642b2171e9b0ece7c2b420a0d38006cc
      87a56541
  3. Nov 17, 2016
  4. Oct 06, 2016
  5. Sep 23, 2016
  6. Sep 07, 2016
  7. Aug 23, 2016
    • Nick Kralevich's avatar
      fix build: exclude bluetooth from neverallow restriction · 7e380216
      Nick Kralevich authored
      Bluetooth is sometimes started from init.
      
      Addresses the following compiler error:
      
        libsepol.report_failure: neverallow on line 489 of
        system/sepolicy/domain.te (or line 9149 of policy.conf) violated by
        allow init bluetooth:process { transition };
        libsepol.check_assertions: 1 neverallow failures occurred
        Error while expanding policy
      
      Change-Id: I2bc1e15217892e1ba2a62c9683af0f3c0aa16b86
      7e380216
  8. Aug 22, 2016
    • Nick Kralevich's avatar
      Remove platform_app from neverallow execute from /data · c55cf17a
      Nick Kralevich authored
      Apparently some manufacturers sign APKs with the platform key
      which use renderscript. Renderscript works by compiling the
      .so file, and placing it in the app's home directory, where the
      app loads the content.
      
      Drop platform_app from the neverallow restriction to allow partners
      to add rules allowing /data execute for this class of apps.
      
      We should revisit this in the future after we have a better
      solution for apps which use renderscript.
      
      Bug: 29857189
      Change-Id: I058a802ad5eb2a67e657b6d759a3ef4e21cbb8cc
      c55cf17a
    • Eino-Ville Talvala's avatar
      Rework neverallow for /data execute permission · eedacf83
      Eino-Ville Talvala authored
      Previously appdomains allowed to execute off of /data
      where whitelisted. This had the unfortunate side effect of
      disallowing the creation of device specific app domains
      with fewer permissions than untrusted_app. Instead grant
      all apps a neverallow exemption and blacklist specific app
      domains that should still abide by the restriction.
      
      This allows devices to add new app domains that need
      /data execute permission without conflicting with this rule.
      
      Bug: 26906711
      
      (cherry picked from commit c5266df9)
      
      Change-Id: I4adb58e8c8b35122d6295db58cedaa355cdd3924
      eedacf83
  9. Jul 22, 2016
  10. Jul 13, 2016
  11. Jun 23, 2016
  12. Jun 21, 2016
  13. Jun 16, 2016
  14. Jun 15, 2016
    • Amith Yamasani's avatar
      Allow installd to delete the foreign-dex folder · a4e2aa13
      Amith Yamasani authored
      Grant installd the policies to recursively delete
      the foreign-dex folder when removing a user. Otherwise
      the user cleanup will partially fail and cause a boot loop
      when the userId is reused as some later point.
      
      Bug: 29285673
      Change-Id: I023f150cffbeb10b6014f48bca9eb0922c2d630a
      a4e2aa13
  15. Jun 14, 2016
    • dcashman's avatar
      Keep pre-existing sysfs write permissions. · 17cfd3fc
      dcashman authored
      Commit: b144ebab added the sysfs_usb
      type and granted the read perms globally, but did not add write
      permissions for all domains that previously had them.  Add the ability
      to write to sysfs_usb for all domains that had the ability to write to
      those files previously (sysfs).
      
      Address denials such as:
      type=1400 audit(1904.070:4): avc:  denied  { write } for  pid=321 comm="ueventd" name="uevent" dev="sysfs" ino=1742 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_usb:s0 tclass=file permissive=0
      
      Bug: 28417852
      Change-Id: I4562ea73f2158ebefba74b58ca572f2176d1b849
      17cfd3fc
    • Nick Kralevich's avatar
      Add SIOCGSTAMP SIOCGSTAMPNS to unpriv_sock_ioctls · 92e79e22
      Nick Kralevich authored
      Per "man socket":
      
        SIOCGSTAMP
        Return a struct timeval with the receive timestamp of the last packet
        passed to the user. This is useful for accurate round trip time
        measurements. See setitimer(2) for a description of struct timeval.
        This ioctl should only be used if the socket option SO_TIMESTAMP is
        not set on the socket. Otherwise, it returns the timestamp of the last
        packet that was received while SO_TIMESTAMP was not set, or it fails
        if no such packet has been received, (i.e., ioctl(2) returns -1 with
        errno set to ENOENT).
      
      Addresses the following denial:
      
      avc: denied { ioctl } for comm=6E6574776F726B5F74687265616420
      path="socket:[42934]" dev="sockfs" ino=42934 ioctlcmd=8906
      scontext=u:r:untrusted_app:s0:c512,c768
      tcontext=u:r:untrusted_app:s0:c512,c768 tclass=udp_socket permissive=0
      
      Bug: 29333189
      Change-Id: I916a695fa362cf1cf6759629c7f6101e9f657e7d
      92e79e22
  16. Jun 13, 2016
  17. Jun 10, 2016
    • Marco Nelissen's avatar
      reduce mediaserver permissions · f8f4d3e1
      Marco Nelissen authored
      It no longer needs access to audio and camera
      
      Bug: 22775369
      Change-Id: I1de1f0e3504b214d6943733bf60eb83654b71048
      f8f4d3e1
    • dcashman's avatar
      Allow access to sysfs usb nodes. · b144ebab
      dcashman authored
      Some legitimate functionality currently requires direct sysfs access
      that is not otherwise possible via the android APIs.  Specifically,
      isochronous USB transfers require this direct access, without which USB
      audio applications would noticibly suffer.
      
      Grant read access to the usb files under /sys/devices to prevent this
      regression.
      
      Bug: 28417852
      Change-Id: I3424bf3498ffa0eb647a54cc962ab8c54f291728
      b144ebab
  18. Jun 09, 2016
  19. Jun 08, 2016
  20. Jun 07, 2016
  21. Jun 06, 2016
  22. Jun 03, 2016
  23. Jun 02, 2016
    • Narayan Kamath's avatar
      sepolicy: broaden system_server access to foreign_dex_data_file. · d82df3bd
      Narayan Kamath authored
      The system_server needs to rename these files when an app is upgraded.
      
      bug: 28998083
      Change-Id: Idb0c1ae774228faaecc359e4e35603dbb534592a
      d82df3bd
    • Daniel Micay's avatar
      expose control over unpriv perf access to shell · 7005e25e
      Daniel Micay authored
      (Cherry picked from commit 38ac77e4)
      
      This allows the shell user to control whether unprivileged access to
      perf events is allowed.
      
      To enable unprivileged access to perf:
      
          adb shell setprop security.perf_harden 0
      
      To disable it again:
      
          adb shell setprop security.perf_harden 1
      
      This allows Android to disable this kernel attack surface by default,
      while still allowing profiling tools to work automatically. It can also
      be manually toggled, but most developers won't ever need to do that if
      tools end up incorporating this.
      
      Bug: 29054680
      
      Change-Id: Idcf6a2f6cbb35b405587deced7da1f6749b16a5f
      7005e25e
  24. Jun 01, 2016
  25. May 27, 2016
  26. May 26, 2016
Loading