- Feb 15, 2017
-
-
Nick Kralevich authored
Commit https://android.googlesource.com/kernel/common/+/f0ce0eee added CAP_SYS_RESOURCE as a capability check which would allow access to sensitive /proc/PID files. However, in an SELinux based world, allowing this access causes CAP_SYS_RESOURCE to duplicate what CAP_SYS_PTRACE (without :process ptrace) already provides. Use CAP_SYS_PTRACE instead of CAP_SYS_RESOURCE. Add a neverallow rule to prevent system_server from using this capability to ptrace attach to any other process. This limits the capability of system_server to only reading sensitive /proc files, but not ptrace() access. Test: Device boots, functionality remains identical, no sys_resource denials from system_server. Bug: 34951864 Change-Id: I04d745b436ad75ee1ebecf0a61c6891858022e34
-
Jeff Vander Stoep authored
am: e68f6fe4 Change-Id: I1c41631e19d8dc837c21f7748634f96d1ab0c994
-
Michael Peck authored
Add minTargetSdkVersion input selector to seapp_contexts am: f54b3622 am: 2afdf49a am: 4587df0f am: b7aa5f76 Change-Id: I7e006cff53b7f9f030613a91843b8acc82a28b15
-
Jeff Vander Stoep authored
am: a245e8b1 Change-Id: I5bc23ab43b2e6eda03cb0224fa9b2da59a9eda05
-
Michael Peck authored
am: 4587df0f Change-Id: I38418dfd353bb6b8ab5333ef0fb5a3907e7d3eab
-
- Feb 14, 2017
-
-
Jeff Vander Stoep authored
am: d16878f9 Change-Id: I4b129c8759994fbac3ef2b4961cfd9273c7ef112
-
Michael Peck authored
am: 2afdf49a Change-Id: Ic017d638035ce5be10ac2aeda60049a1087d83df
-
Jeff Vander Stoep authored
am: fb678339 Change-Id: Ife6c83dc50c381fcb1e2765beda3d69a26101401
-
Michael Peck authored
am: f54b3622 Change-Id: I0a304ed2b5591e58b0e39b37cb9fb8f392fe663b
-
Treehugger Robot authored
* changes: untrusted_app: policy versioning based on targetSdkVersion Add minTargetSdkVersion input selector to seapp_contexts
-
Jeff Vander Stoep authored
Motivation: Provide the ability to phase in new security policies by applying them to apps with a minimum targetSdkVersion. Place untrusted apps with targetSdkVersion<=25 into the untrustd_app_25 domain. Apps with targetSdkVersion>=26 are placed into the untrusted_app domain. Common rules are included in the untrusted_app_all attribute. Apps with a more recent targetSdkVersion are granted fewer permissions. Test: Marlin builds and boots. Apps targeting targetSdkVersion<=25 run in untrusted_app_25 domain. Apps targeting the current development build >=26 run in the untrusted_app domain with fewer permissions. No new denials observed during testing. Bug: 34115651 Bug: 35323421 Change-Id: Ie6a015566fac07c44ea06c963c40793fcdc9a083
-
Michael Peck authored
This new input selector allows phasing in new security policies by giving app developers an opportunity to make any needed compatibility changes before updating each app's targetSdkVersion. When all else is equal, matching entries with higher minTargetSdkVersion= values are preferred over entries with lower minTargetSdkVersion= values. Test: Marlin builds and boots. Apps targeting targetSdkVersion<=25 run in untrusted_app_25 domain. Apps targeting the current development build >=26 run in the untrusted_app domain with fewer permissions. No new denials observed during testing. Bug: 34115651 Change-Id: I14bf4f51dbe26cb9bd3f62ad0b281085441d9806
-
Treehugger Robot authored
-
Steven Moreland authored
am: 94651e19 Change-Id: I4e535ce2cb740c37bd96682d23f812dc260fd00a
-
Steven Moreland authored
am: e5d7a8ce Change-Id: I3c4398a0845d98c9824bde7f6a96bce2ac4ca665
-
Steven Moreland authored
am: 6832909b Change-Id: I0acd257b35f55e9f125ea805b2152aa1296ffa88
-
Steven Moreland authored
am: ee2faadc Change-Id: Ic12fe80e16972a172092291058c12dd53c95ee14
-
Treehugger Robot authored
-
Steven Moreland authored
am: 4e270210 -s ours Change-Id: I4fbb7538db0a094a8d9fa3feaa74c13f3b1bd453
-
Steven Moreland authored
am: 12649249 Change-Id: Idbccec64163fe70c146b653c0c71c6b14b8ba797
-
Steven Moreland authored
am: 8eb8beba Change-Id: Ie468fabd56f01c1340c49632760ce1e7ba65420b
-
Steven Moreland authored
am: d734f151 Change-Id: I600ecaf5fac9401db036a733a7afa186f6de7eb2
-
Steven Moreland authored
-
TreeHugger Robot authored
-
Paul Lawrence authored
am: 75877b24 Change-Id: Ic8688a5f7835ec689d47b1aad7d3e95424e28625
-
Pawin Vongmasa authored
am: d85cd20d Change-Id: I3dbea2d195d5dd8fa27e6c702c5772b2d5b0825b
-
Paul Lawrence authored
am: 8f022478 Change-Id: Id2bf23854f29d453e8e280a50e6b2fee308e6db2
-
Pawin Vongmasa authored
am: d1eb4564 Change-Id: Ic7a0b8ad7469778a2cf5ef2673de493fe34eabd9
-
Paul Lawrence authored
am: 7bb3d92a Change-Id: I77e60157551af8e13bb4fb45da86aae86347f084
-
Pawin Vongmasa authored
am: 6f443b87 Change-Id: I46dc0e9a5350dca7861fc81f0cf00d698c57ec0b
-
Paul Lawrence authored
am: ff5784f3 Change-Id: Ieb6e5cc4711add33fbd7b276bbbd362f249fb51e
-
Pawin Vongmasa authored
am: 5b4f15e1 Change-Id: Ic7c0de32ac3970c000062bc35bb0c50254510b3a
-
Treehugger Robot authored
-
Pawin Vongmasa authored
-
- Feb 13, 2017
-
-
Steven Moreland authored
Update shell.te to reflect the fact that hwbinder_user permission is for lshal, not dumpsys. Bug: 33382892 Test: pass Change-Id: I1d298261cea82177436a662afbaa767f00117b16
-
Steven Moreland authored
Bug: 34135607 Test: hals work Merged-In: I6a1f87438bb5b540fce900e9ec5df07d3f4f6bd4 Change-Id: I6a1f87438bb5b540fce900e9ec5df07d3f4f6bd4
-