Skip to content
Snippets Groups Projects
  1. Jun 01, 2016
  2. May 27, 2016
  3. May 26, 2016
  4. May 24, 2016
    • Fyodor Kupolov's avatar
      SELinux policies for /data/preloads directory · 49ac2a3d
      Fyodor Kupolov authored
      A new directory is created in user data partition that contains preloaded
      content such as a retail mode demo video and pre-loaded APKs.
      
      The new directory is writable/deletable by system server. It can only be
      readable (including directory list) by privileged or platform apps
      
      Bug: 28855287
      Change-Id: I3816cd3a1ed5b9a030965698a66265057214f037
      49ac2a3d
  5. May 16, 2016
  6. May 13, 2016
  7. May 12, 2016
  8. May 10, 2016
    • Richard Uhler's avatar
      dontaudit user_profile_foreign_dex_data_file open, read. · dfa29865
      Richard Uhler authored
      To avoid audit messages that arise because there is no way to create a
      file without also trying to open and read it.
      
      Bug: 28241500
      Change-Id: Id1daaf190b36eda9775e00701cd7241991f65a2a
      dfa29865
    • Evgenii Stepanov's avatar
      Add /data/lib64, /data/vendor/lib64 to ASan sepolicy. · 1cfdb12a
      Evgenii Stepanov authored
      This policy takes effect only when building with
      SANITIZE_TARGET=address and allows the Zygote to load libraries from
      /data. That's where ASan-instrumented copies of system libraries are
      located. 32-bit library directories have been added a while back;
      this CL extends the same policy to 64-bit directories.
      
      Bug: 25751174
      Bug: 28680288
      
      (cherry picked from commit dda55908)
      
      Change-Id: Ieb4701b78db9649ec8563f2962a69db537ae61b3
      1cfdb12a
  9. May 05, 2016
    • Philip Cuadra's avatar
      Add CAP_IPC_LOCK and pinner to system_server · 96da70eb
      Philip Cuadra authored
      Add pinner service to system_service services.
      Add CAP_IPC_LOCK permissions to system_server in order to allow
      system_server to pin more memory than the lockedmem ulimit.
      
      bug 28251566
      
      Change-Id: I990c73d25fce4f2cc9a2db0015aa238fa7b0e984
      96da70eb
  10. Apr 30, 2016
  11. Apr 28, 2016
    • Mihai Serban's avatar
      Allow ueventd to relabel block devices · 87c11478
      Mihai Serban authored
      
      There is a race in ueventd's coldboot procedure that permits creation
      of device block nodes before platform devices are registered. In this case
      the device node links used to compute the SELinux context are not known
      and the node is created under the generic context: u:object_r:block_device:s0.
      
      Ueventd has been patched to relabel the nodes on subsequent add events but
      it needs permissions to be allowed to do it.
      
      BUG=28388946
      
      Signed-off-by: default avatarMihai Serban <mihai.serban@intel.com>
      
      (cherry picked from commit d41ad551)
      
      Change-Id: I26838a3a9bc19b341e7176e5dc614827232014bf
      87c11478
    • Nick Kralevich's avatar
      Add no_x_file_perm to property related files. · ea0c294c
      Nick Kralevich authored
      It doesn't ever make sense to attempt to load executable code
      from these files. Add a neverallow rule (compile time assertion and
      CTS test).
      
      Bug: 27882507
      
      (cherry picked from commit 50ba6318)
      
      Change-Id: Ifab6e46a077a87629b4d3c7ada1050f2ab6931d5
      ea0c294c
    • Nick Kralevich's avatar
      Disallow /misc access except for a few domains. · 24a7f167
      Nick Kralevich authored
      The misc_block_device partition is intended for the exclusive
      use of the OTA system, and components related to the OTA system.
      Disallow it's use by anyone else on user builds. On userdebug/eng
      builds, allow any domain to use this, since this appears to be used
      for testing purposes.
      
      Bug: 26470876
      
      (cherry picked from commit 2c7a5f26)
      
      Change-Id: I40c80fa62651a0135e1f07a5e07d2ef65ba04139
      24a7f167
  12. Apr 27, 2016
  13. Apr 26, 2016
    • Jeff Vander Stoep's avatar
      Whitelist additional unix socket ioctl · 81b7675e
      Jeff Vander Stoep authored
      TIOCGWINSZ = 0x00005413
      
      avc: denied { ioctl } for comm="ls" path="socket:[362628]" dev="sockfs" ino=362628 ioctlcmd=5413 scontext=u:r:shell:s0 tcontext=u:r:adbd:s0 tclass=unix_stream_socket permissive=0
      
      Bug: 28171804
      Change-Id: I460e2469730d0cd90d714f30803ef849317d4be7
      81b7675e
  14. Apr 24, 2016
    • Jeffrey Vander Stoep's avatar
    • Jeff Vander Stoep's avatar
      Re-introduce camera_device type · cc8a09f5
      Jeff Vander Stoep authored
      camera_device was previously removed in AOSP commit: b7aace2d
      "camera_device: remove type and add typealias" because the
      same domains required access to both without exception, meaning
      there was no benefit to distinguishing between the two. However,
      with the split up of mediaserver this is no longer the case and
      distinguishing between the camera and video  provides a legitimate
      security benefit. For example, the mediacodec domain requires access
      to the video_device for access to hardware accelerated codecs but does
      not require access to the camera.
      
      Bug: 28359909
      Change-Id: I8a4592722d8e6391c0e91b440914284b7245e232
      cc8a09f5
  15. Apr 23, 2016
  16. Apr 22, 2016
  17. Apr 21, 2016
  18. Apr 20, 2016
    • Christopher Tate's avatar
      Allow system_server to hard link its own files · d9b0a34a
      Christopher Tate authored
      Specifically, backup of wallpaper imagery needs to use hard links to
      achieve "real file" access to the large imagery files without rewriting
      the contents all the time just to stage for backup.  They can't be
      symlinks because the underlying backup mechanisms refuse to act on
      symbolic links for other security reasons.
      
      Bug 25727875
      
      Change-Id: Ic48fba3f94c92a4b16ced27a23646296acf8f3a5
      d9b0a34a
  19. Apr 19, 2016
    • mukesh agrawal's avatar
      allow system server to set log.tag.WifiHAL · e651f6f4
      mukesh agrawal authored
      On eng and userdebug builds (only), allow system server
      to change the value of log.tag.WifiHAL. WifiStateMachine
      will set this property to 'D' by default. If/when a user
      enables "Developer options -> Enable Wi-Fi Verbose Logging",
      WifiStateMachine change log.tag.WifiHAL to 'V'.
      
      BUG=27857554
      TEST=manual (see below)
      
      Test detail
      1. on user build:
         $ adb shell setprop log.tag.WifiHAL V
         $ adb shell getprop log.tag.WifiHAL
         <blank line>
         $ adb bugreport | grep log.tag.WifiHAL
         <11>[  141.918517] init: avc:  denied  { set } for property=log.tag.WifiHAL pid=4583 uid=2000 gid=2000 scontext=u:r:shell:s0 tcontext=u:object_r:wifi_log_prop:s0 tclass=property_service permissive=0
         <11>[  141.918566] init: sys_prop: permission denied uid:2000  name:log.tag.WifiHAL
      2. on userdebug build:
         $ adb shell getprop log.tag.WifiHAL
         $ <blank line>
         $ adb shell setprop log.tag.WifiHAL V
         $ adb shell getprop log.tag.WifiHAL
         V
      3. on userdebug build with modified WifiStateMachine:
         $ adb shell getprop log.tag.WifiHAL
         D
      
      Change-Id: I9cdd52a2b47a3dd1065262ea8c329130b7b044db
      e651f6f4
    • mukesh agrawal's avatar
      limit shell's access to log.* properties · 84cfde22
      mukesh agrawal authored
      Restrict the ability of the shell to set the log.*
      properties. Namely: only allow the shell to set
      such properities on eng and userdebug builds.
      
      The shell (and other domains) can continue to
      read log.* properties on all builds.
      
      While there: harmonize permissions for log.* and
      persist.log.tag. Doing so introduces two changes:
      - log.* is now writable from from |system_app|. This
        mirrors the behavior of persist.log.tag, which is
        writable to support "Developer options" ->
        "Logger buffer sizes" -> "Off".
        (Since this option is visible on user builds, the
        permission is enabled for all builds.)
      - persist.log.tag can now be set from |shell| on
        userdebug_or_eng().
      
      BUG=28221972
      TEST=manual (see below)
      
      Testing details
      - user build (log.tag)
        $ adb shell setprop log.tag.foo V
        $ adb shell getprop log.tag
        <blank line>
        $ adb bugreport | grep log.tag.foo
        [  146.525836] init: avc:  denied  { set } for property=log.tag.foo pid=4644 uid=2000 gid=2000 scontext=u:r:shell:s0 tcontext=u:object_r:log_prop:s0 tclass=property_service permissive=0
        [  146.525878] init: sys_prop: permission denied uid:2000  name:log.tag.foo
      - userdebug build (log.tag)
        $ adb shell getprop log.tag.foo
        <blank line>
        $ adb shell setprop log.tag.foo V
        $ adb shell getprop log.tag.foo
        V
      - user build (persist.log.tag)
        $ adb shell getprop | grep log.tag
        <no match>
        - Developer options -> Logger buffer sizes -> Off
        $ adb shell getprop | grep log.tag
        [persist.log.tag]: [Settings]
        [persist.log.tag.snet_event_log]: [I]
      
      Change-Id: Idf00e7a623723a7c46bf6d01e386aeca92b2ad75
      84cfde22
    • Lorenzo Colitti's avatar
Loading