- Apr 09, 2018
-
-
Max Bires authored
This will allow adb shell getprop ro.vendor.build.security_patch to properly return the correct build property, whereas previously it was offlimits due to lack of label. Test: adb shell getprop ro.vendor.build.security_patch successfully returns whatever VENDOR_SECURITY_PATCH is defined to be in the Android .mk files Change-Id: Ie8427738125fc7f909ad8d51e4b76558f5544d49
-
Alan Stokes authored
This reverts commit db83323a. Reason for revert: breaks some builds due to duplicate genfs entries Change-Id: I47813bd84ff10074a32cf483501a9337f556e92a
-
Alan Stokes authored
cgroupfs doesn't allow files to be created, so this can't be needed. Also remove redundant neverallow and dontaudit rules. These are now more broadly handled by domain.te. Bug: 74182216 Test: Denials remain silenced. Change-Id: If7eb0e59f567695d987272a2fd36dbc251516e9f (cherry picked from commit 8e8c1093)
-
Alan Stokes authored
This allows system_server to access it for determining battery stats (see KernelMemoryBandwidthStats.java). batterystats-wo: type=1400 audit(0.0:429): avc: denied { read } for name="show_stat" dev="sysfs" ino=48071 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 Bug: 72643420 Bug: 73947096 Test: Denial is no longer present. Change-Id: Ibe46aee48eb3f78fa5a9d1f36602c082c33036f7 (cherry picked from commit a8b3634d)
-
- Apr 06, 2018
-
-
Mikhail Naganov authored
Bug: 73405145 Test: cts-tradefed run cts -m CtsMediaTestCases -t android.media.cts.AudioRecordTest#testRecordNoDataForIdleUids Change-Id: I09bdb74c9ecc317ea090643635ca26165efa423a (cherry picked from commit c5815891) Merged-In: I09bdb74c9ecc317ea090643635ca26165efa423a
-
Florian Mayer authored
This is needed to be able to scan the labels we have permission on. Denial: 04-06 12:52:22.674 874 874 W traced_probes: type=1400 audit(0.0:10314): avc: denied { search } for name="backup" dev="sda45" ino=6422529 scontext=u:r:traced_probes:s0 tcontext=u:object_r:backup_data_file:s0 tclass=dir permissive=0 Bug: 73625480
-
- Apr 05, 2018
-
-
Joel Galenson authored
This should help fix presubmit tests. Bug: 77634061 Test: Built policy. Change-Id: Ib9f15c93b71c2b67f25d4c9f949a5e2b3ce93b9c
-
- Apr 04, 2018
-
-
Kweku Adams authored
Bug: 72177715 Test: flash device and check incident output Change-Id: I16c172caec235d985a6767642134fbd5e5c23912
-
- Apr 03, 2018
-
-
Nathan Harold authored
Because applications should be able to set the receive timeout on UDP encapsulation sockets, we need to allow setsockopt(). getsockopt() is an obvious allowance as well. Bug: 68689438 Test: compilation Merged-In: I2eaf72bcce5695f1aee7a95ec03111eca577651c Change-Id: I2eaf72bcce5695f1aee7a95ec03111eca577651c
-
Jeff Vander Stoep authored
Test: build Bug: 68774956 Change-Id: I0f9fd87eb41e67e14f35e49eba13e3d1de745250
-
Jeff Vander Stoep authored
This is a partial cherry pick of commit 6231b4d9 'Enforce per-app data protections for targetSdk 28+'. Untrusted_app_27 remains unreachable, but it's existence prevents future merge conflicts. Bug: 63897054 Test: build/boot aosp_walleye-userdebug Change-Id: I64b013874fe87b55f47e817a1279e76ecf86b7c0 Merged-In: I64b013874fe87b55f47e817a1279e76ecf86b7c0 (cherry picked from commit 6231b4d9)
-
Jeff Vander Stoep authored
tagSocket() now results in netd performing these actions on behalf of the calling process. Remove direct access to: /dev/xt_qtaguid /proc/net/xt_qtaguid/ctrl Bug: 68774956 Test: -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.AppSecurityTests -m CtsNativeNetTestCases Test: stream youtube, browse chrome Test: go/manual-ab-ota Change-Id: I6a044f304c3ec4e7c6043aebeb1ae63c9c5a0beb
-
- Mar 30, 2018
-
-
yro authored
Test: manually tested to prevent sepolicy violation Change-Id: I9ebcc86464a9fc61a49d5c9be40f19f3523b6785
-
Yi Jin authored
Bug: 73354384 Test: manual Change-Id: Iaaeded69c287eae757aaf68dc18bc5a0c53b94e6
-
Florian Mayer authored
See also go/perfetto-io-tracing-security. * Grant CAP_DAC_READ_SEARCH to traced_probes. * Allow traced_probes to list selected labels. * Change ext4 and f2fs events to be available on user builds. Bug: 74584014 Change-Id: I891a0209be981d760a828a69e4831e238248ebad
-
- Mar 29, 2018
-
-
Joel Galenson authored
This allows init to write to it, which it does for atrace. Bug: 72643420 Test: Boot two devices, observe no denials, test atrace. Change-Id: I6810e5dcdfaff176bd944317e66d4fe612ccebed (cherry picked from commit dce07413)
-
Chenbo Feng authored
The netutils_wrapper is a process used by vendor code to update the iptable rules on devices. When it update the rules for a specific chain. The iptable module will reload the whole chain with the new rule. So even the netutils_wrapper do not need to add any rules related to xt_bpf module, it will still reloading the existing iptables rules about xt_bpf module and need pass through the selinux check again when the rules are reloading. So we have to grant it the permission to reuse the pinned program in fs_bpf when it modifies the corresponding iptables chain so the vendor module will not crash anymore. Test: device boot and no more denials from netutils_wrapper Bug: 72111305 Change-Id: I62bdfd922c8194c61b13e2855839aee3f1e349be
-
Alan Stokes authored
The kernel generates file creation audits when O_CREAT is passed even if the file already exists - which it always does in the cgroup cases. We add neverallow rules to prevent mistakenly allowing unnecessary create access. We also suppress these denials, which just add noise to the log, for the more common culprits. Bug: 72643420 Bug: 74182216 Test: Ran build_policies.sh and checked failures were unrelated. Test: Device still boots, denials gone. Change-Id: I034b41ca70da1e73b81fe90090e656f4a3b542dc (cherry picked from commit 92c149d0)
-
- Mar 28, 2018
-
-
Jeff Vander Stoep authored
Access to these files was removed in Oreo. Enforce that access is not granted by partners via neverallow rule. Also disallow most untrusted app access to net.dns.* properties. Bug: 77225170 Test: system/sepolicy/tools/build_policies.sh Change-Id: I85b634af509203393dd2d9311ab5d30c65f157c1
-
Joel Galenson authored
These denials occur fairly often, causing some logspam. Bug: 77225170 Test: Boot device. Merged-In: Icd73a992aee44007d0873743f706758f9a19a112 Change-Id: Icd73a992aee44007d0873743f706758f9a19a112 (cherry picked from commit a66d1a45)
-
- Mar 27, 2018
-
-
Andreas Gampe authored
Give statsd rights to connect to perfprofd in userdebug. Test: mmma system/extras/perfprofd Change-Id: Idea0a6b757d1b16ec2e6c8719e24900f1e5518fd
-
Jaekyun Seok authored
A default value of persist.radio.multisim.config can be set by SoC vendors, and so vendor-init-settable should be allowed to it. Bug: 73871799 Test: succeeded building and tested with taimen Change-Id: Ie62b91e7e3d7e05425b742838417f1cab7b3fed4
-
- Mar 26, 2018
-
-
Jeff Vander Stoep authored
Suppress WAI denials from crashdump. Test: build/flash Taimen. Verify no new denials. Bug: 68319037 Change-Id: If39d057cb020def7afe89fd95e049e45cce2ae16 (cherry picked from commit cc0304cf)
-
Primiano Tucci authored
This reverts commit 6f2040f8. Reason for revert: not needed anymore after ag/3773705 This was meant to allow system_server toggling the property on/off. Later we realized that we needed a separate property for that (see discussion in b/76077784) and system server happens to have already permissions to write to sys.* properties even without this CL. Reverting because at this point this creates just unnecessary clutter. Change-Id: Ia73d000aad3c4288a5652047dfe10896e231b0b1 Test: perfetto_integrationtests Bug: 76077784
-
Primiano Tucci authored
This allows an optimization that consists in the "perfetto" cmdline client passing directly the file descriptor for the output trace to traced (as opposite to having traced streaming back the trace data to "perfetto" and having that one doing the write() into file). This reduces sensibly the memory traffic and CPU overhead of traces with a minor change. Bug: 73625179 Test: builds + perfetto_integrationtests w/ long_trace.cfg Change-Id: I81f5a230338ced20dc543fd91c5a0bd0e58725f2
-
- Mar 23, 2018
-
-
Chenbo Feng authored
The permission to allow system_server to access sys/fs/bpf/ directory is missing. Add it back so it can get the bpf maps from the bpf_fs. Test: device boot and no more denial information of system_server try to searcg in fs_bpf atest android.net.cts.TrafficStatsTest Bug: 75285088 Change-Id: I1040cde6c038eccc4e91c69a10b20aa7a18b19f6
-
- Mar 22, 2018
-
-
Mikhail Naganov authored
Based on the following audit message: type=1400 audit(1521738979.005:385): avc: denied { write } for pid=1269 comm="Binder:1269_B" name="timerslack_ns" dev="proc" ino=254190 scontext=u:r:system_server:s0 tcontext=u:r:hal_audio_default:s0 tclass=file permissive=1 Bug: 74110604 Test: adb shell dmesg | grep hal_audio_default Change-Id: I4c2e787588eb9d223d5e50e1bc8f67876de97c2e
-
Primiano Tucci authored
Follow up to aosp/635599. It broke user builds again despite being tree hugged because of b/74344625. Adding missing ignore entries. Bug: b/73340039 Change-Id: Iba195d571aec9579195d79d4970f760e417608c6
-
Primiano Tucci authored
This CL adds the SELinux permissions required to execute atrace and get userspace tracing events from system services. This is to enable tracing of events coming from surfaceflinger, audio HAL, etc. atrace, when executed, sets a bunch of debug.atrace. properties and sends an IPC via binder/hwbinder to tell the services to reload that property. This CL does NOT affect systrace. In that case (i.e. when atrace is executed from adb/shell) atrace still runs in the shell domain and none of those changes apply. Change-Id: I11b096d5c5c5593f18bce87f06c1a7b1ffa7910e Bug: b/73340039
-
- Mar 21, 2018
-
-
Chenbo Feng authored
To better record the network traffic stats for each network interface. We use xt_bpf netfilter module to do the iface stats accounting instead of the cgroup bpf filter we currently use for per uid stats accounting. The xt_bpf module will take pinned eBPF program as iptables rule and run the program when packet pass through the netfilter hook. To setup the iptables rules. netd need to be able to access bpf filesystem and run the bpf program at boot time. The program used will still be created and pinned by the bpfloader process. Test: With selinux enforced, run "iptables -L -t raw" should show the xt_bpf related rule present in bw_raw_PREROUTING chain. Bug: 72111305 Change-Id: I11efe158d6bd5499df6adf15e8123a76cd67de04
-
- Mar 20, 2018
-
-
Fyodor Kupolov authored
Test: manual Bug: 75318418 Change-Id: I700c1b8b613dba1c99f4fbffdd905c0052c1b2e7
-
Andreas Gampe authored
So that perfprofd can send larger packets to dropbox. Follow-up of commit 3fa95acb. Bug: 73175642 Test: m Test: manual Change-Id: I88d1f83962243589909ff1ce3d02195e7c494256
-
Joel Galenson authored
This should fix audio on non-Treble devices. Bug: 75949883 Test: Built policy. Change-Id: I90a4648aaf975d59be36afd5f62c88a015af10f7
-
- Mar 19, 2018
-
-
Tri Vo authored
With this attribute it will be easier to reference /proc files. Bug: 74182216 Test: policy builds Change-Id: I5b7da508d821e45f122832261a742a201e8fdf2c
-
Chong Zhang authored
When extraction exif info, certain file formats may requires parsing the container. Allow mediaprovider to use extractor to do the parsing. bug: 73978990 Test: manually test the scenario in b/73978990 and verify the Exif is extracted correctly. Change-Id: I1cd46d793ebc9c38b816a3b63f361967e551d046
-
Hector Dearman authored
To enable/disable the traced and traced_probes deamons remotely we would like system server to be able to set persist.traced.enable. See also ag/3736001. Denial: selinux: avc: denied { set } for property=persist.traced.enable pid=1606 uid=1000 gid=1000 scontext=u:r:system_server:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=0\x0a Run: $ adb shell 'ps -A | grep traced' Should see traced. $ adb shell 'settings put global sys_traced 0' $ adb shell 'ps -A | grep traced' Should no longer see traced. Test: See above. Change-Id: I245b7df3853cabeb0e75db41fb4facaa178ab8f1
-
- Mar 16, 2018
-
-
Bowgo Tsai authored
Bug: 64240127 Test: normal boot a device Change-Id: I276ba6bc88eabb0d5562e4e96d3860eedb76aed5
-
Bowgo Tsai authored
Bug: 64240127 Test: normal boot and recovery boot a device Change-Id: I22d29e8476380d19aca1be359e0228ab6bbc3b0f
-
Bowgo Tsai authored
Bug: 64240127 Test: normal boot and recovery boot a device Change-Id: Ibd71219f60644e57370c0293decf11d82f1cb35c
-
Bowgo Tsai authored
Bug: 64240127 Test: normal boot a device Change-Id: I3626357237cc18a99511f1ebd9dd3ff5a7655963
-