Skip to content
Snippets Groups Projects
  1. Sep 08, 2017
    • Dan Cashman's avatar
      Update sepolicy 26.0 prebuilts again, again. · 9aefc916
      Dan Cashman authored
      (cherry-pick of commit: 55c77504)
      
      Bug: 37916906
      Bug: 37896931
      Test: none, just prebuilt update.
      Change-Id: I55b5179f98703026699a59cce4b2e1afb166fd1d
      9aefc916
    • Dan Cashman's avatar
      Update 26.0 SELinux prebuilts. · 3686efca
      Dan Cashman authored
      More changes went into oc-dev after the freeze-date.  Reflect them.
      (cherry-pick of commit: 148578a6)
      
      Bug: 37916906
      Bug: 37896931
      Test: prebuilts - none.
      Change-Id: I3300751ea7362d5d96b327138544be65eb9fc483
      3686efca
    • Dan Cashman's avatar
      Add mapping compatibility file for sepolicy api lvl 26.0 · de51e7de
      Dan Cashman authored
      commit: 5c6a227e added the oc-dev
      sepolicy prebuilts (api 26.0), but did not include the corresponding
      base mapping file, which is to be maintained along with current
      platform development in order to ensure backwards compatibility.
      (cherry-pick of commit: 5e4e0d7f)
      
      Bug: 37916906
      Bug: 37896931
      Test: none, this just copies the old mapping file to prebuilts.
      Change-Id: Ia5c36ddab036352845878178fa9c6a9d649d238f
      de51e7de
    • Dan Cashman's avatar
      Commit oc-dev sepolicy to prebuilts. · fff3fe2f
      Dan Cashman authored
      Copy the final system sepolicy from oc-dev to its prebuilt dir
      corresponding to its version (26.0) so that we can uprev policy and
      start maintaining compatibility files, as well as use it for CTS
      tests targeting future platforms.
      
      (cherry-pick of commit: 5c6a227e)
      
      Bug: 37896931
      Bug: 37916906
      Test: none, this just copies the old policy.
      Change-Id: Ib069d505e42595c467e5d1164fb16fcb0286ab93
      fff3fe2f
  2. Sep 06, 2017
  3. Sep 05, 2017
  4. Sep 01, 2017
  5. Aug 31, 2017
  6. Aug 30, 2017
    • Robert Benea's avatar
      Allow lmkd read memcg stats. · 1a05283c
      Robert Benea authored
      Currently lmkd is not able to read memcg info. The mem/swap usage
      info are used by lmkd to ugrade medium pressure events to critical
      level.
      
      Test: tested on gobo
      Bug: 65180281
      Change-Id: I19d0eb53d5e754c176ffeda1b5d07049e6af8570
      1a05283c
  7. Aug 29, 2017
  8. Aug 28, 2017
    • Jeff Vander Stoep's avatar
      Allow all domains to stat symlinks in sysfs · 8d021a94
      Jeff Vander Stoep authored
      This is needed to retain app's previous access to
      /sys/devices/system/cpu. When these files were previously
      labeled in file_contexts, symlinks were labeled as
      sysfs_devices_system_cpu. When labeling was moved to genfs_contexts
      symlinks all have the default sysfs label.
      
      avc: denied { getattr } for comm="main"
      path="/sys/devices/system/cpu/cpu0/cpufreq" dev="sysfs" ino=41897
      scontext=u:r:untrusted_app_25:s0:c512,c768
      tcontext=u:object_r:sysfs:s0 tclass=lnk_file permissive=0
      
      Change-Id: Idaa565390bca13d3819e147fcea4214956c0f589
      Bug: 64270911
      Test: build aosp_marlin
      8d021a94
    • Bowgo Tsai's avatar
      Moving adbd from rootdir to system/bin · 5846c79e
      Bowgo Tsai authored
      Bug: 63910933
      Test: boot sailfish in normal mode, checks adbd is started
      Test: boot sailfish in recovery mode, checks adbd is started
      Test: boot bullhead in normal mode, checks adbd is started
      Test: boot bullhead in recovery mode, checks adbd is started
      
      Change-Id: I35ed78a15a34626fbd3c21d030e2bf51033f7b79
      Merged-In: I35ed78a15a34626fbd3c21d030e2bf51033f7b79
      (cherry picked from commit e2423d14)
      5846c79e
  9. Aug 25, 2017
  10. Aug 24, 2017
    • Mark Salyzyn's avatar
      Switch /data/misc/reboot/last_reboot_reason to persistent property · 006c2e99
      Mark Salyzyn authored
      Switch from /data/misc/reboot/last_reboot_reason to persistent
      Android property persist.sys.boot.reason for indicating why the
      device is rebooted or shutdown.
      
      Introduce protection for all boot reason properties
      
      Protect the following properties with these labels
      
      ro.boot.bootreason      u:object_r:bootloader_boot_reason_prop:s0
      sys.boot.reason         u:object_r:sys_boot_reason_prop:s0
      persist.sys.boot.reason u:object_r:last_boot_reason_prop:s0
      
      Setup the current as-need access rules for each.
      
      ToDo: Remove u:object_r:reboot_data_file after internal fixes.
      
      Test: system/core/bootstat/boot_reason_test.sh
      Bug: 64687998
      Change-Id: I3771c73933e8ae2d94aee936c7a38b6282611b80
      006c2e99
  11. Aug 23, 2017
  12. Aug 17, 2017
  13. Aug 16, 2017
    • Tianjie Xu's avatar
      Allow update_verifier to write to kmsg · d499e914
      Tianjie Xu authored
      Denial message:
      avc: denied { write } for pid=640 comm="update_verifier" name="kmsg"
      dev="tmpfs" ino=13951 scontext=u:r:update_verifier:s0
      tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0
      
      Bug: 64713327
      Test: update_verifier logs successfully during boot time.
      Change-Id: I421b1e6660239e5ffc624e504f5945d400510407
      d499e914
    • Martijn Coenen's avatar
      Remove display.qservice from service_contexts. · e1887359
      Martijn Coenen authored
      This is a Qualcomm proprietary service,
      and does not belong here.
      
      Test: boot Marlin
      Bug: 63391760
      Merged-In: If7469051f6cef3e2440f7021ae26c9815ff54820
      Change-Id: If7469051f6cef3e2440f7021ae26c9815ff54820
      e1887359
  14. Aug 14, 2017
    • TreeHugger Robot's avatar
    • Steven Moreland's avatar
      Add screencap domain. · 0bf4d0db
      Steven Moreland authored
      am: 6b780b35  -s ours
      
      Change-Id: I61d2951d682b236e7643b7b81eb5c52f84024950
      0bf4d0db
    • Steven Moreland's avatar
      Add screencap domain. · 9216a6ad
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Merged-In: I9f31d2067e002e7042646ee38dbfc06687481ac7
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      9216a6ad
    • Steven Moreland's avatar
      Add screencap domain. · 6b780b35
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Merged-In: I9f31d2067e002e7042646ee38dbfc06687481ac7
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      6b780b35
  15. Aug 11, 2017
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 530e168c
      Josh Gao authored
      am: 94e2a921
      
      Change-Id: I3cb9bd4305fe3f6d720f757a232d4bb38de98895
      530e168c
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 94e2a921
      Josh Gao authored
      Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log
      crashes to dmesg when logd isn't up yet (or is the one crashing).
      
      Bug: http://b/36574794
      Test: stop tombstoned; crasher; dmesg
      Change-Id: I6ffe11bc613e88198893e82712719522b74fe1be
      94e2a921
    • Nick Kralevich's avatar
      Validate no-cross-domain /proc/PID access · 881fe06f
      Nick Kralevich authored
      am: 7a463809
      
      Change-Id: Iba80938afccd21f0c3b69626223b35c672358e77
      881fe06f
    • Nick Kralevich's avatar
      Validate no-cross-domain /proc/PID access · 7a463809
      Nick Kralevich authored
      Android uses hidepid=2 to restrict visibility to other /proc entries on
      the system. This helps preserve user, application, and system
      confidentiality by preventing unauthorized access to application metadata,
      and addresses attacks such as
      http://www.cs.ucr.edu/~zhiyunq/pub/sec14_android_activity_inference.pdf
      
      Ensure the SELinux (weaker) equivalent is being enforced by adding
      neverallow compile time assertions.
      
      TODO: The "shell" user runs as both an Android application, as well as
      spawned via adb shell. This was a mistake. We should separate out the
      "shell" Android app into it's own SELinux domain. For now, exclude the
      shell from this assertion. (The shell Android app is covered by
      hidepid=2, so there's no leaking of data, but still, it's over
      privileged today and should be cleaned up.
      
      Bug: 23310674
      Test: policy compiles. Compile time assertion only.
      Change-Id: I0e1a6506b2719aabf7eb8127f046c4ada947ba90
      7a463809
  16. Aug 02, 2017
  17. Aug 01, 2017
    • Manoj Gupta's avatar
      Fix static analyzer warnings. · 3cdd4a4b
      Manoj Gupta authored
      Fix the following warnings:
      
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:346:9: warning:
      Potential leak of memory pointed to by '__s1'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:346:9: warning:
      Potential leak of memory pointed to by 'id'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:364:13: warning:
      Potential leak of memory pointed to by 'classperms'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:364:13: warning:
      Potential leak of memory pointed to by 'node'
      
      Bug: b/27101951
      Test:Warnings are gone.
      Change-Id: Ib9b2e0b9f19950b4b764d438ee58340e6c022ef5
      3cdd4a4b
Loading