Skip to content
Snippets Groups Projects
  1. Jan 24, 2018
  2. Jan 23, 2018
  3. Jan 22, 2018
    • Max Bires's avatar
      Adding write permissions to traceur · 35c36389
      Max Bires authored
      Fixing denials that stopped traceur from being able to write to
      debugfs_tracing. Also cleaning up general find denials for services that
      traceur doesn't have permission to access.
      
      Additionally, labeling /data/local/trace as a trace_data_file in order
      to give traceur a UX friendly area to write its traces to now that it
      will no longer be a shell user. It will be write/readable by traceur,
      and deletable/readable by shell.
      
      Test: Traceur functionality is not being blocked by selinux policy
      Bug: 68126425
      Change-Id: I201c82975a31094102e90bc81454d3c2a48fae36
      35c36389
    • Tom Cherry's avatar
      Allow vendor_init without compatible_property to write most properties · 6473ae83
      Tom Cherry authored
      These property sets will be long term restricted with
      compatible_property but allowing them now eases the transition.
      
      Bug: 62875318
      Test: boot marlin without audits for setprop in vendor_init
      Change-Id: I25ab565bbf137e382c1dfc3b905b38403645f1d2
      6473ae83
  4. Jan 20, 2018
  5. Jan 19, 2018
    • Tao Bao's avatar
      Add rules for system_update service. · d7d9cfca
      Tao Bao authored
      system_update service manages system update information: system updater
      (priv_app) publishes the pending system update info through the service,
      while other apps can read the info accordingly (design doc in
      go/pi-ota-platform-api).
      
      This CL adds the service type, and grants priv_app to access the service.
      
      Bug: 67437079
      Test: Build and flash marlin image. The system_update service works.
      Change-Id: I7a3eaee3ecd3e2e16b410413e917ec603566b375
      d7d9cfca
    • Paul Crowley's avatar
      Allow access to the metadata partition for metadata encryption. · ab318e30
      Paul Crowley authored
      Bug: 63927601
      Test: Enable metadata encryption in fstab on Taimen, check boot success.
      Change-Id: Id425c47d48f413d6ea44ed170835a52d0af39f9f
      ab318e30
    • Badhri Jagan Sridharan's avatar
      hal_usb_gadget sepolicy · 7bee33e6
      Badhri Jagan Sridharan authored
      Bug: 63669128
      Test: Checked for avc denail messages.
      Change-Id: I057b3cf9ccc945cb943b9cf60fc9cd6c023eddda
      Merged-In: I057b3cf9ccc945cb943b9cf60fc9cd6c023eddda
      7bee33e6
    • Yifan Hong's avatar
      charger: allow to read /sys/class/power_supply · 2d64886d
      Yifan Hong authored
      Test: charger mode correctly shuts off when unplugged
      
      Change-Id: I06a7ffad67beb9f6d9642c4f53c35067b0dc2b3d
      Fixes: 71328882
      2d64886d
  6. Jan 18, 2018
  7. Jan 17, 2018
    • Chenbo Feng's avatar
      Add sepolicy to lock down bpf access · 566411ed
      Chenbo Feng authored
      Add a new set of sepolicy for the process that only netd use to load
      and run ebpf programs. It is the only process that can load eBPF
      programs into the kernel and is only used to do that. Add some
      neverallow rules regarding which processes have access to bpf objects.
      
      Test: program successfully loaded and pinned at sys/fs/bpf after device
      boot. No selinux violation for bpfloader
      Bug: 30950746
      
      Change-Id: Ia6bb1afda29ae0749bdc368e2dfc5faa12e81b2f
      566411ed
    • Tri Vo's avatar
      Mark shell as system_executes_vendor_violators. · 30a31570
      Tri Vo authored
      Bug: 62041836
      Test: sailfish sepolicy builds
      
      Change-Id: Iad865fea852ab134dd848688e8870bc71f99788d
      30a31570
    • Andy Hung's avatar
      dumpstate: add media.metrics · 8b049d5b
      Andy Hung authored
      Test: adb bugreport
      Bug: 71483452
      Change-Id: Ibd98702c1f757f17ada61a906ae4e0ec750aac79
      8b049d5b
  8. Jan 16, 2018
    • Jaekyun Seok's avatar
      Fix TODOs of duplicate property names for prefix and exact matching · f9d27887
      Jaekyun Seok authored
      Duplicate property names are supported now for prefix and exact
      matching.
      
      Bug: 38146102
      Test: tested on walleye with PRODUCT_COMPATIBLE_PROPERTY=true
      Change-Id: Ifd9d32eaece7370d69f121e88d5541f7a2e34458
      f9d27887
    • Yifan Hong's avatar
      Allow shell to start vendor shell · 00ab5d86
      Yifan Hong authored
      Test: adb shell /vendor/bin/sh
      Fixes: 65448858
      Change-Id: Ic2c9fa9b7e5bed3e1532f4e545f54a857ea99fc6
      00ab5d86
    • Tri Vo's avatar
      Introduce system_executes_vendor_violators attribute. · 282dbf7b
      Tri Vo authored
      We use this attribute to annotate coredomains that execute vendor code
      in a Treble-violating way.
      
      Bug: 62041836
      Test: sepolicy builds
      Change-Id: Ie6052209b3901eaad8496b8fc9681421d7ee3c1c
      282dbf7b
    • Svet Ganov's avatar
      No camera for idle uids - selinux · 9139ea1b
      Svet Ganov authored
      If a UID is idle (being in the background for more than
      cartain amount of time) it should not be able to use the
      camera. If the UID becomes idle we generate an eror and
      close the cameras for this UID. If an app in an idle UID
      tries to use the camera we immediately generate an error.
      Since apps already should handle these errors it is safe
      to apply this policy to all apps to protect user privacy.
      
      Test: Pass - cts-tradefed run cts -m CtsCameraTestCases
            Added - CameraTest#testCameraAccessForIdleUid
      
      Change-Id: I9ab3d6ec99764a93638746f18912ed60d299015f
      9139ea1b
  9. Jan 12, 2018
  10. Jan 11, 2018
    • Jeff Vander Stoep's avatar
      relabel files in /proc/net/xt_qtaguid/ · 43303c8b
      Jeff Vander Stoep authored
      /proc/net/xt_qtaguid is used by apps to track their network data
      use. Limit access to just zygote spawned processes - apps and
      system_server, omitting access to isolated_app which is not allowed
      to create network sockets.
      As Android moves to eBPF for app's network data stats, access to
      /proc/net/xt_qtaguid will be removed entirely. Segmenting access off
      is the first step.
      Bug: 68774956
      
      This change also helps further segment and whitelist access to
      files in /proc/net and is a step in the lockdown of /proc/net.
      Bug: 9496886
      
      Test: boot Taimen. Walk through setup-wizard. Make phone call and
          video call. Browse web. Watch youtube. Navigate in maps.
      Test: cts-tradefed run cts -m CtsAppSecurityHostTestCases -t \
          android.appsecurity.cts.AppSecurityTests
      Test: cts-tradefed run cts -m CtsNativeNetTestCases
      Test: cts-tradefed run cts -m CtsIncidentHostTestCases -t \
          com.android.server.cts.NetstatsIncidentTest
      Test: cts-tradefed run cts -m CtsOsTestCases -t \
          android.os.cts.StrictModeTest
      Test: cts-tradefed run cts -m CtsNetTestCases -t \
          android.net.cts.TrafficStatsTest
      Test: cts-tradefed run cts -m CtsUsageStatsTestCases -t \
          android.app.usage.cts.NetworkUsageStatsTest
      Test: vts-tradefed run vts -m VtsQtaguidTest
      Change-Id: Idddd318c56b84564142d37b11dcc225a2f2800ea
      43303c8b
  11. Jan 10, 2018
    • Jaekyun Seok's avatar
      Whitelist exported platform properties · e4971454
      Jaekyun Seok authored
      This CL lists all the exported platform properties in
      private/exported_property_contexts.
      
      Additionally accessing core_property_type from vendor components is
      restricted.
      Instead public_readable_property_type is used to allow vendor components
      to read exported platform properties, and accessibility from
      vendor_init is also specified explicitly.
      
      Note that whitelisting would be applied only if
      PRODUCT_COMPATIBLE_PROPERTY is set on.
      
      Bug: 38146102
      Test: tested on walleye with PRODUCT_COMPATIBLE_PROPERTY=true
      Change-Id: I304ba428cc4ca82668fec2ddeb17c971e7ec065e
      e4971454
    • Primiano Tucci's avatar
      Perfetto SELinux policies · c80f9e03
      Primiano Tucci authored
      Perfetto is a performance instrumentation and logging framework,
      living in AOSP's /external/pefetto.
      Perfetto introduces in the system one binary and two daemons
      (the binary can specialize in either depending on the cmdline).
      
      1) traced: unprivileged daemon. This is architecturally similar to logd.
         It exposes two UNIX sockets:
         - /dev/socket/traced_producer : world-accessible, allows to stream
           tracing data. A tmpfs file descriptor is sent via SCM_RIGHTS
           from traced to each client process, which needs to be able to
           mmap it R/W (but not X)
         - /dev/socket/traced_consumer : privilege-accessible (only from:
           shell, statsd). It allows to configure tracing and read the trace
           buffer.
      2) traced_probes: privileged daemon. This needs to:
         - access tracingfs (/d/tracing) to turn tracing on and off.
         - exec atrace
         - connect to traced_producer to stream data to traced.
      
      init.rc file:
      https://android-review.googlesource.com/c/platform/external/perfetto/+/575382/14/perfetto.rc
      
      Bug: 70942310
      Change-Id: Ia3b5fdacbd5a8e6e23b82f1d6fabfa07e4abc405
      c80f9e03
  12. Jan 08, 2018
  13. Jan 05, 2018
    • Joel Galenson's avatar
      Update neverallow exception. · 8d92a9a1
      Joel Galenson authored
      This fixes an incorrect exception in the neverallow rule.
      
      Test: Built policy for all lunch targets.
      Change-Id: I283833131c6f1fd741e934de24c838594ac38a18
      8d92a9a1
  14. Jan 04, 2018
  15. Jan 03, 2018
  16. Jan 02, 2018
    • Max Bires's avatar
      Adding a traceur_app domain to remove it from shell · 4ea5569f
      Max Bires authored
      This CL creates a traceur_app domain with userdebug privileges akin to
      what shell has with regards to being able to find most services on
      device. Previously, traceur was running as shell which was an
      unintentional abuse of selinux architecture.
      
      Bug: 68126425
      Test: Traceur functions outside of shell user privilege
      Change-Id: Ib5090e7e8225ad201b3ec24b506fe2717101d0f1
      4ea5569f
    • Chenbo Feng's avatar
      sepolicy: New sepolicy classes and rules about bpf object · 08f92f9c
      Chenbo Feng authored
      Add the new classes for eBPF map and program to limit the access to eBPF
      object. Add corresponding rules to allow netd module initialize bpf
      programs and maps, use the program and read/wirte to eBPF maps.
      
      Test: no bpf sepolicy violations when device boot
      Change-Id: I63c35cd60f1972d4fb36ef2408da8d5f2246f7fd
      08f92f9c
    • Chenbo Feng's avatar
      sepolicy: Allow mount cgroupv2 and bpf fs · 254ad0da
      Chenbo Feng authored
      Some necessary sepolicy rule changes for init process to create directory,
      mount cgroupv2 module and mount bpf filesystem. Also allow netd to create
      and pin bpf object as files and read it back from file under the
      directory where bpf filesystem is mounted.
      
      Test: bpf maps show up under /sys/fs/bpf/
      Change-Id: I579d04f60d7e20bd800d970cd28cd39fda9d20a0
      254ad0da
    • Ricky Wai's avatar
      Add Network Watchlist data file selinux policy(Used in ConfigUpdater) · ff3b957e
      Ricky Wai authored
      Bug: 63908748
      Test: Able to boot
      Change-Id: I14d8856d7aac7be9d1f26ecf5bfff69ea5ee9607
      ff3b957e
  17. Dec 29, 2017
  18. Dec 22, 2017
Loading