Skip to content
Snippets Groups Projects
  1. Jan 20, 2018
  2. Jan 19, 2018
  3. Jan 18, 2018
  4. Jan 17, 2018
    • Tri Vo's avatar
      65565c1c
    • Chenbo Feng's avatar
      Add sepolicy to lock down bpf access · 566411ed
      Chenbo Feng authored
      Add a new set of sepolicy for the process that only netd use to load
      and run ebpf programs. It is the only process that can load eBPF
      programs into the kernel and is only used to do that. Add some
      neverallow rules regarding which processes have access to bpf objects.
      
      Test: program successfully loaded and pinned at sys/fs/bpf after device
      boot. No selinux violation for bpfloader
      Bug: 30950746
      
      Change-Id: Ia6bb1afda29ae0749bdc368e2dfc5faa12e81b2f
      566411ed
    • Tri Vo's avatar
      system_server: remove access sysfs_devices_system_cpu · 35c65c1e
      Tri Vo authored
      CpuFrequency.java seems to be the only thing that depends on
      /sys/devices/system/cpu in system_server. And according to
      b/68988722#comment15, that dependency is not exercised.
      
      Bug: 68988722
      Test: walleye boots without denials to sysfs_devices_system_cpu
      Change-Id: If777b716bf74188581327b7f5aa709f5d88aad2d
      35c65c1e
    • Tri Vo's avatar
      Mark shell as system_executes_vendor_violators. · 30a31570
      Tri Vo authored
      Bug: 62041836
      Test: sailfish sepolicy builds
      
      Change-Id: Iad865fea852ab134dd848688e8870bc71f99788d
      30a31570
    • Andy Hung's avatar
      dumpstate: add media.metrics · 8b049d5b
      Andy Hung authored
      Test: adb bugreport
      Bug: 71483452
      Change-Id: Ibd98702c1f757f17ada61a906ae4e0ec750aac79
      8b049d5b
    • Yang Ni's avatar
      1642d405
    • Jeffrey Vander Stoep's avatar
      Merge "Annotate denials" · 66024968
      Jeffrey Vander Stoep authored
      66024968
    • Treehugger Robot's avatar
    • Svet Ganov's avatar
      Don't record audio if UID is idle - sepolicy · b9a1e7ba
      Svet Ganov authored
      If a UID is in an idle state we don't allow recording to protect
      user's privacy. If the UID is in an idle state we allow recording
      but report empty data (all zeros in the byte array) and once
      the process goes in an active state we report the real mic data.
      This avoids the race between the app being notified aboout its
      lifecycle and the audio system being notified about the state
      of a UID.
      
      Test: Added - AudioRecordTest#testRecordNoDataForIdleUids
            Passing - cts-tradefed run cts-dev -m CtsMediaTestCases
                    -t android.media.cts.AudioRecordTest
      
      bug:63938985
      
      Change-Id: I8c044e588bac4182efcdc08197925fddf593a717
      b9a1e7ba
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      Annotate denials · 1e1a3f7c
      Jeff Vander Stoep authored
      There is a race condition between when /data is mounted
      and when processes attempt to access it. Attempting to access
      /data before it's mounted causes an selinux denial. Attribute
      these denials to a bug.
      
      07-04 23:48:53.646   503   503 I auditd  : type=1400 audit(0.0:7): avc:
      denied { search } for comm="surfaceflinger" name="/" dev="sda35" ino=2
      scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:unlabeled:s0
      tclass=dir permissive=0
      07-15 17:41:18.100   582   582 I auditd  : type=1400 audit(0.0:4): avc:
      denied { search } for comm="BootAnimation" name="/" dev="sda35" ino=2
      scontext=u:r:bootanim:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir
      permissive=0
      
      Bug: 68864350
      Test: build
      Change-Id: I07f751d54b854bdc72f3e5166442a5e21b3a9bf5
      1e1a3f7c
Loading