- Aug 31, 2017
-
-
Steven Moreland authored
screencap domain needs additional permissions for dumpstate to dump screenshots. Test: adb shell cmd activity bug-report Bug: 65206688 Change-Id: I824f345fd90d286454d570576c5888d7719c4c5c
-
Steven Moreland authored
Before screencap was in its own domain, it was able to do this by using all of shell's permissions. The following denials are caused (along with times from running the below test command) when screencap is invoked to write a file onto the sdcard: 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:23): avc: denied { read } for name="primary" dev="tmpfs" ino=19547 scontext=u:r:screencap:s0 tcontext=u:object_r:storage_file:s0 tclass=lnk_file permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:24): avc: denied { search } for name="/" dev="tmpfs" ino=19529 scontext=u:r:screencap:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:25): avc: denied { search } for name="user" dev="tmpfs" ino=19535 scontext=u:r:screencap:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:26): avc: denied { read } for name="primary" dev="tmpfs" ino=31198 scontext=u:r:screencap:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=lnk_file permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:27): avc: denied { search } for name="/" dev="sdcardfs" ino=1310722 scontext=u:r:screencap:s0 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:28): avc: denied { write } for name="image.png" dev="sdcardfs" ino=1310764 scontext=u:r:screencap:s0 tcontext=u:object_r:sdcardfs:s0 tclass=file permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:29): avc: denied { open } for path="/storage/emulated/0/image.png" dev="sdcardfs" ino=1310764 scontext=u:r:screencap:s0 tcontext=u:object_r:sdcardfs:s0 tclass=file permissive=1 08-30 21:03:32.009 4986 4986 I screencap: type=1400 audit(0.0:30): avc: denied { write open } for path="/data/media/0/image.png" dev="sda45" ino=1310764 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 08-30 21:03:32.582 4990 4990 I screencap: type=1400 audit(0.0:31): avc: denied { execute } for name="sh" dev="dm-0" ino=998 scontext=u:r:screencap:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 08-30 21:03:32.582 4990 4990 I screencap: type=1400 audit(0.0:32): avc: denied { read open } for path="/system/bin/sh" dev="dm-0" ino=998 scontext=u:r:screencap:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 08-30 21:03:32.582 4990 4990 I screencap: type=1400 audit(0.0:33): avc: denied { execute_no_trans } for path="/system/bin/sh" dev="dm-0" ino=998 scontext=u:r:screencap:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 08-30 21:03:32.582 4990 4990 I sh : type=1400 audit(0.0:34): avc: denied { getattr } for path="/system/bin/sh" dev="dm-0" ino=998 scontext=u:r:screencap:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 08-30 21:03:32.586 4990 4990 I sh : type=1400 audit(0.0:35): avc: denied { ioctl } for path="socket:[57515]" dev="sockfs" ino=57515 ioctlcmd=5401 scontext=u:r:screencap:s0 tcontext=u:r:adbd:s0 tclass=unix_stream_socket permissive=1 08-30 21:03:32.586 4990 4990 I sh : type=1400 audit(0.0:36): avc: denied { getattr } for path="socket:[57515]" dev="sockfs" ino=57515 scontext=u:r:screencap:s0 tcontext=u:r:adbd:s0 tclass=unix_stream_socket permissive=1 08-30 21:03:32.589 4991 4991 I sh : type=1400 audit(0.0:37): avc: denied { execute_no_trans } for path="/system/bin/am" dev="dm-0" ino=1178 scontext=u:r:screencap:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 08-30 21:03:32.739 4992 4992 I cmd : type=1400 audit(0.0:38): avc: denied { call } for scontext=u:r:screencap:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1 08-30 21:03:32.739 4992 4992 I cmd : type=1400 audit(0.0:39): avc: denied { use } for path="/dev/null" dev="tmpfs" ino=19514 scontext=u:r:system_server:s0 tcontext=u:r:screencap:s0 tclass=fd permissive=1 08-30 21:03:32.739 4992 4992 I cmd : type=1400 audit(0.0:40): avc: denied { transfer } for scontext=u:r:screencap:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1 08-30 21:03:32.741 575 575 E SELinux : avc: denied { find } for service=activity pid=4992 uid=2000 scontext=u:r:screencap:s0 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1 08-30 21:03:32.749 837 837 I Binder:837_9: type=1400 audit(0.0:41): avc: denied { call } for scontext=u:r:system_server:s0 tcontext=u:r:screencap:s0 tclass=binder permissive=1 If /data/media/ is deleted, the following denials also occur: 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:43): avc: denied { search } for name="0" dev="sda45" ino=1310728 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:44): avc: denied { read open } for path="/data/media/0" dev="sda45" ino=1310728 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:48): avc: denied { write } for name="0" dev="sda45" ino=1310728 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:49): avc: denied { add_name } for name="image.png" scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:50): avc: denied { create } for name="image.png" scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:51): avc: denied { setattr } for name="image.png" dev="sda45" ino=1310764 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 08-31 00:45:45.966 8899 8899 I screencap: type=1400 audit(0.0:53): avc: denied { write open } for path="/data/media/0/image.png" dev="sda45" ino=1310764 scontext=u:r:screencap:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 08-31 01:04:29.741 6625 6625 W screencap: type=1400 audit(0.0:23): avc: denied { write } for name="0" dev="sdcardfs" ino=655364 scontext=u:r:screencap:s0 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=0 Test: adb shell screencap -p /sdcard/phone.png Bug: 65206688 Change-Id: I808429b25fa3118fef7931050ab757c9bcd61881
-
- Aug 29, 2017
-
-
TreeHugger Robot authored
-
Tomasz Wasilczyk authored
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
This is needed to retain app's previous access to /sys/devices/system/cpu. When these files were previously labeled in file_contexts, symlinks were labeled as sysfs_devices_system_cpu. When labeling was moved to genfs_contexts symlinks all have the default sysfs label. avc: denied { getattr } for comm="main" path="/sys/devices/system/cpu/cpu0/cpufreq" dev="sysfs" ino=41897 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=lnk_file permissive=0 Change-Id: Idaa565390bca13d3819e147fcea4214956c0f589 Bug: 64270911 Test: build aosp_marlin (cherry picked from commit 8d021a94)
-
- Aug 28, 2017
-
-
Tomasz Wasilczyk authored
Bug: 63600413 Test: VTS, instrumentation, audit2allow Change-Id: I57c0150a52c13f1ce21f9ae2147e3814aad0fb7e
-
- Aug 26, 2017
-
-
TreeHugger Robot authored
-
- Aug 25, 2017
-
-
TreeHugger Robot authored
-
- Aug 24, 2017
-
-
Jeff Vander Stoep authored
Commit 780a71e7 changed ueventd's selinux label lookup from /dev/input/ to /dev/input which no longer matches the regex in core policy file_contexts. Fix the regex to match /dev/input and /dev/input/. avc: denied { read } for name="input" dev="tmpfs" ino=14092 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:device:s0 tclass=dir avc: denied { open } for path="/dev/input" dev="tmpfs" ino=14092 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:device:s0 tclass=dir Change-Id: I8f42f5cd96fc8353bf21d3ee6c3de9e2872f229f Fixes: 64997761 Fixes: 64954704 Test: no camera HAL denials
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
John Stultz authored
This patch tries to provide similar functionality as the previous change made here: https://android-review.googlesource.com/#/c/platform/system/sepolicy/+/432339/ Only, making sure we add the same map permissions for the vendor directory. Signed-off-by:
John Stultz <john.stultz@linaro.org> (cherry picked from commit 24537b2e) Bug: 65011018 Test: policy compiles. Change-Id: I4d0319011ef4ef043134bf299dc4823a6c418717
-
Jeff Vander Stoep authored
Configstore HAL uses a seccomp filter which blocks the standard path of execing crash_dump to collect crash data. Add permission to use crash_dump's fallback mechanism. Allowing configstore to write to the socket provided by tombstoned required either exempting configstore from a neverallow rule, or removing the neverallow rule entirely. Since the neverallow rule could potentially prevent partners for doing security hardening, it has been removed. Bug: 64768925 Bug: 36453956 Test: killall -ABRT android.hardware.configstore@1.1-service Results in a call stack in logcat, and tombstone in /data/tombstones Test: configstore runs without crashing Test: SANITIZE_TARGET="address coverage" make vts -j64 vts-tradefedrun commandAndExit vts --skip-all-system-status-check \ -primary-abi-only --skip-preconditions -l VERBOSE --module \ VtsHalConfigstoreV1_0IfaceFuzzer Change-Id: I1ed5265f173c760288d856adb9292c4026da43d6 (cherry picked from commit 9924d782)
-
- Aug 23, 2017
-
-
Michael Wright authored
Bug: 64982450 Test: manual Change-Id: Ic5d25b8a12271e5bfa71e30843a36fb643b914ff
-
- Aug 18, 2017
-
-
TreeHugger Robot authored
-
- Aug 17, 2017
-
-
TreeHugger Robot authored
* changes: DO NOT MERGE: use 'expandattribute' for untrusted_app_visible_hwservice DO NOT MERGE: Add a way to allow untrusted_apps to talk to halserver domains DO NOT MERGE: Revert "Revert "Remove neverallow preventing hwservice access for apps.""
-
Sandeep Patil authored
Bug: 62658302 Test: Boot device and observe no new denials Change-Id: If9a21610897b14a419f276289818127412c29c55 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
Vendor HAL extentsions are currently allowed to discover hardware services that are labelled with 'untrusted_app_visible_hwservice'. However, the policy doesn't allow these apps to talk to these services. This CL makes sure that is now possible via the 'untrusted_app_visible_halserver' attribute for vendor domains that host such a service. Bug: 64382381 Test: Boot device and observe no new denials. Change-Id: I1ffc1a62bdf7506a311f5a19acdab8c7caec902b Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
- Aug 16, 2017
-
-
Corey Tabaka authored
Performanced needs to talk to the permission service to verify permissions of clients to access certain restricted scheduler policies. Bug: 64337476 Test: performance_service_tests passes; logs do not contain avc denials for performanced -> permission service. Change-Id: I31618ab1d3e79c3c10138d567b0f5606527020f9
-
Yifan Hong authored
-
Sandeep Patil authored
This reverts commit ceed7204. New HALs services that are added in the policy while the CL was reverted will are not made visible to applications by default. They are: hal_neuralnetworks_hwservice hal_wifi_offload_hwservice system_net_netd_hwservice thermalcallback_hwservice Bug: 64578796 Test: Boot device Change-Id: I84d65baddc757a5b0a38584430eff79a383aa8e0 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Dan Cashman authored
Make sure that any attributes removed from policy are declared in the mapping file, in case they are relied upon by vendor policy. Bug: 36899958 Test: Builds successfull, but not with removed attribute not in mapping file. Change-Id: I25526cd88a50e90513ae298ccf4f2660e4627fb4
-
Martijn Coenen authored
Bug: Bug: 36866029 Test: builds Change-Id: I520bd6f4af9278f7991950ccc4827928679c5927
-
Bowgo Tsai authored
Bug: 63910933 Test: boot sailfish in normal mode, checks adbd is started Test: boot sailfish in recovery mode, checks adbd is started Test: boot bullhead in normal mode, checks adbd is started Test: boot bullhead in recovery mode, checks adbd is started Change-Id: I35ed78a15a34626fbd3c21d030e2bf51033f7b79
-
- Aug 15, 2017
-
-
Yifan Hong authored
Test: gts-tradefed run gts-dev --module=GtsSecurityHostTestCases Bug: 64127136 Change-Id: Ib50294488bb1a5d46faed00d6954db64648fed20
-
TreeHugger Robot authored
-
- Aug 14, 2017
-
-
Dan Cashman authored
The treble compatibility tests check for policy differences between old and new policy. To do this correctly, we must not modify the policy which represents the older policies. Move the files meant to be changed to a different location from the ones that are not meant to be touched to avoid any undesired changes to old policy, e.g. commit: 2bdefd65078d890889672938c6f0d2accdd25bc5 Bug: 36899958 Test: Build-time tests build. Change-Id: I8fa3947cfae756f37556fb34e1654382e2e48372
-
TreeHugger Robot authored
-
- Aug 12, 2017
-
-
Martijn Coenen authored
-
- Aug 11, 2017
-
-
TreeHugger Robot authored
-
Dan Cashman authored
untrusted_app_visible_hwservice was an attribute that was meant to give partners time to add their HALs to AOSP. It was removed from mr1 and so needs to be accounted for in the compatibility mapping. Bug: 64321916 Test: Builds with treble policy tests. Change-Id: I359a842083016f0cf6c9d7ffed2116feb9e159c6
-
Steven Moreland authored
Only seeing this denial in permissive: allow shell screencap_exec:file getattr; Bug: 37565047 Test: adb shell screencap w/o root Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
-
Martijn Coenen authored
On Full Treble devices, servicemanager should only service services from the platform service_contexts file. Created new type to separate plat_ and nonplat_service_contexts, and added new type to mapping (although I don't think this type should have been used by vendors). Bug: 36866029 Test: Marlin/Taimen boot Change-Id: Ied112c64f22f8486a7415197660faa029add82d9
-
- Aug 09, 2017
-
-
Jin Qian authored
Allow vendors to extend e2fs rules to format other partitions. Bug: 64430395 Change-Id: I51566f72dea814af97b1fedbd4618cd4095d64c3
-
Dan Cashman authored
Also fix up set() additions in mini_parser.py and add global reference to the parser in tests for clarity. Bug: 36899958 Test: rm public type in old policy from policy and observe test failure. Change-Id: I6cba2473526798be871cd69249c9bbc6df2c5b4c
-
- Aug 08, 2017
-
-
Dan Cashman authored
Add support to the treble_sepolicy_tests suite that explicitly look at the old and current policy versions, as well as the compatibility file, to determine if any new types have been added without a compatibility entry. This first test catches the most common and likely changes that could change the type label of an object for which vendor policy may have needed access. It also should prove the basis for additional compatibility checks between old and new policies. Bug: 36899958 Test: Policy builds and tests pass. Change-Id: I609c913e6354eb10a04cc1a029ddd9fa0e592a4c
-
TreeHugger Robot authored
-