Skip to content
Snippets Groups Projects
  1. Sep 12, 2016
    • Alex Light's avatar
      Allow cppreopts to work with selinux · b7ebb32f
      Alex Light authored
      (cherry picked from commit d3edd6b5)
      
      Bug: 29278988
      Change-Id: I199572377a6b5c33116c718a545159ddcf50df30
      b7ebb32f
    • Jeffrey Vander Stoep's avatar
      Merge changes from topic 'blacklist_app_data_execute' · 72a2d64d
      Jeffrey Vander Stoep authored
      * changes:
        fix build: exclude bluetooth from neverallow restriction
        Remove platform_app from neverallow execute from /data
        Rework neverallow for /data execute permission
      72a2d64d
    • Nick Kralevich's avatar
      fix build: exclude bluetooth from neverallow restriction · e1b00f39
      Nick Kralevich authored
      Bluetooth is sometimes started from init.
      
      Addresses the following compiler error:
      
        libsepol.report_failure: neverallow on line 489 of
        system/sepolicy/domain.te (or line 9149 of policy.conf) violated by
        allow init bluetooth:process { transition };
        libsepol.check_assertions: 1 neverallow failures occurred
        Error while expanding policy
      
      (cherry-picked from commit 7e380216)
      
      Change-Id: I2bc1e15217892e1ba2a62c9683af0f3c0aa16b86
      e1b00f39
    • Nick Kralevich's avatar
      Remove platform_app from neverallow execute from /data · c255e377
      Nick Kralevich authored
      Apparently some manufacturers sign APKs with the platform key
      which use renderscript. Renderscript works by compiling the
      .so file, and placing it in the app's home directory, where the
      app loads the content.
      
      Drop platform_app from the neverallow restriction to allow partners
      to add rules allowing /data execute for this class of apps.
      
      We should revisit this in the future after we have a better
      solution for apps which use renderscript.
      
      (cherry picked from commit c55cf17a)
      
      Bug: 29857189
      Change-Id: I058a802ad5eb2a67e657b6d759a3ef4e21cbb8cc
      c255e377
    • Eino-Ville Talvala's avatar
      Rework neverallow for /data execute permission · 6bb6c16e
      Eino-Ville Talvala authored
      Previously appdomains allowed to execute off of /data
      where whitelisted. This had the unfortunate side effect of
      disallowing the creation of device specific app domains
      with fewer permissions than untrusted_app. Instead grant
      all apps a neverallow exemption and blacklist specific app
      domains that should still abide by the restriction.
      
      This allows devices to add new app domains that need
      /data execute permission without conflicting with this rule.
      
      Bug: 26906711
      
      (cherry picked from commit c5266df9)
      
      Change-Id: I4adb58e8c8b35122d6295db58cedaa355cdd3924
      6bb6c16e
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      slideshow: remove domain_deprecated attribute · fb873176
      Jeff Vander Stoep authored
      No "granted" messages for the removed permissions observed in three
      months of log audits.
      
      Bug: 28760354
      Change-Id: I7713a9ad9a1604b17119ecad4970e2aa46c15bd0
      fb873176
    • Jeff Vander Stoep's avatar
      kernel: remove domain_deprecated attribute · 108677ce
      Jeff Vander Stoep authored
      No "granted" messages for the removed permissions observed in three
      months of log audits.
      
      Bug: 28760354
      Change-Id: I6bd9525b663a2bdad4f5b2d4a85d3dd46d5fd106
      108677ce
  2. Sep 11, 2016
    • Jeff Vander Stoep's avatar
      Enforce ioctl command whitelisting on all sockets · bff98015
      Jeff Vander Stoep authored
      Remove the ioctl permission for most socket types. For others, such as
      tcp/udp/rawip/unix_dgram/unix_stream set a default unprivileged whitelist
      that individual domains may extend (except where neverallowed like
      untrusted_app). Enforce via a neverallowxperm rule.
      
      Change-Id: I15548d830f8eff1fd4d64005c5769ca2be8d4ffe
      bff98015
  3. Sep 10, 2016
  4. Sep 09, 2016
  5. Sep 07, 2016
  6. Sep 01, 2016
  7. Aug 31, 2016
  8. Aug 29, 2016
    • Douglas Leung's avatar
      Fix ioctl defines for Mips. · 5807d1d2
      Douglas Leung authored
      This patch allows mips to boot in enforcing mode.
      
      Change-Id: Ia4676db06adc3ccb20d5f231406cf4ab67317496
      5807d1d2
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: Allow kernel to read proc · 31e64607
      Jeff Vander Stoep authored
      am: c8820d04  -s ours
      
      Change-Id: I7a9086cbd781d8e4450564f6c7c1697fd14643f6
      31e64607
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: domain_deprecate: remove observed audit messages · 6b8e0994
      Jeff Vander Stoep authored
      am: 3dfef1fd  -s ours
      
      Change-Id: Ia0adf841c0b37647c27fe31b805abcf3cff4d62c
      6b8e0994
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: audit domain_deprecated perms for removal · e892f8a6
      Jeff Vander Stoep authored
      am: fe8d6739  -s ours
      
      Change-Id: I199ff6989c4acceb1878062ce9086ad9da6444b2
      e892f8a6
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: Allow kernel to read proc · c8820d04
      Jeff Vander Stoep authored
      (cherry picked from commit 48d68a64)
      
      Remove audit messaged.
      
      Addresses:
      avc:  granted  { read } for  pid=1 comm="init" name="cmdline" dev="proc" ino=4026535448 scontext=u:r:kernel:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc:  granted  { read open } for  pid=1 comm="init" path="/proc/cmdline" dev="proc" ino=4026535448 scontext=u:r:kernel:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Bug: 28760354
      Change-Id: I48ea01b35c6d1b255995484984ec92203b6083be
      c8820d04
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: domain_deprecate: remove observed audit messages · 3dfef1fd
      Jeff Vander Stoep authored
      (cherry picked from commit 8486f4e6)
      
      Grant observed permissions
      
      Addresses:
      init
      avc:  granted  { use } for  pid=1 comm="init" path="/sys/fs/selinux/null" dev="selinuxfs" ino=22 scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=fd
      
      mediaextractor
      avc: granted { getattr } for pid=582 comm="mediaextractor" path="/proc/meminfo" dev="proc" ino=4026535447 scontext=u:r:mediaextractor:s0 tcontext=u:object_r:proc_meminfo:s0 tclass=file
      avc: granted { read } for pid=582 comm="mediaextractor" name="meminfo" dev="proc" ino=4026535447 scontext=u:r:mediaextractor:s0 tcontext=u:object_r:proc_meminfo:s0 tclass=file
      avc: granted { read open } for pid=582 comm="mediaextractor" path="/proc/meminfo" dev="proc" ino=4026535447 scontext=u:r:mediaextractor:s0 tcontext=u:object_r:proc_meminfo:s0 tclass=file
      
      uncrypt
      avc: granted { getattr } for pid=6750 comm="uncrypt" path="/fstab.angler" dev="rootfs" ino=9809 scontext=u:r:uncrypt:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      avc: granted { read } for pid=6750 comm="uncrypt" name="fstab.angler" dev="rootfs" ino=9809 scontext=u:r:uncrypt:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      avc: granted { read open } for pid=6750 comm="uncrypt" path="/fstab.angler" dev="rootfs" ino=9809 scontext=u:r:uncrypt:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      
      Bug: 28760354
      Change-Id: Ibd51473c55d957aa7375de60da67cdc6504802f9
      3dfef1fd
    • Mitchell Wills's avatar
      Merge changes from topic 'wifi-aosp-master' into stage-aosp-master · d48127be
      Mitchell Wills authored
      * changes:
        Allow wificond to drop privileges after startup
        Allow wificond to set interfaces up and down
        Allow wificond to clean up wpa_supplicant state
        Allow wificond to drop signals on hostapd
        Give wificond permission to start/stop init services
        Give hostapd permissions to use its control socket
        Allow wificond to write wifi component config files
        add netlink socket permission for wificond
        SEPolicy to start hostapd via init
        Allow system_server to call wificond via Binder
        Allow wificond to mark interfaces up and down
        Separate permissions to set WiFi related properties
        Define explicit label for wlan sysfs fwpath
        sepolicy: Add permissions for wpa_supplicant binder
        sepolicy: add sepolicy binder support for wificond
        Sepolicy files for wificond
      d48127be
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: audit domain_deprecated perms for removal · fe8d6739
      Jeff Vander Stoep authored
      Grant permissions observed.
      
      (cherry picked from commit 9c820a11)
      
      Merged-in: Ifdead51f873eb587556309c48fb84ff1542ae303
      Bug: 28760354
      Change-Id: Ifdead51f873eb587556309c48fb84ff1542ae303
      fe8d6739
    • Jeffrey Vander Stoep's avatar
      Merge "resurrect camera_device" · 8585e8db
      Jeffrey Vander Stoep authored
      am: 163c6080
      
      Change-Id: Ia7e00dda7fea4e58c450c50ab7fd5fc709ebaa3e
      8585e8db
    • Jeffrey Vander Stoep's avatar
      Merge "resurrect camera_device" · 163c6080
      Jeffrey Vander Stoep authored
      163c6080
  9. Aug 28, 2016
  10. Aug 27, 2016
  11. Aug 26, 2016
    • Christopher Wiley's avatar
      Allow wificond to drop privileges after startup · 3c285a28
      Christopher Wiley authored
      wificond will now change user/group to wifi/wifi after
      taking control of a particular path in the sysfs.
      
      Bug: 29870863
      Change-Id: I9ccb23f60a66d6850f3969c364288f8850044fed
      Test: wificond unit and integration tests pass
      (cherry picked from commit 8a04a313)
      3c285a28
    • Christopher Wiley's avatar
      Allow wificond to set interfaces up and down · baf3cc22
      Christopher Wiley authored
      This is apparently a privileged ioctl.  Being able to do this allows us
      to no longer kill hostapd with SIGTERM, since we can cleanup after hard
      stops.
      
      Bug: 31023120
      Test: wificond unit and integration tests pass
      
      Change-Id: Icdf2469d403f420c742871f54b9fb17432805991
      (cherry picked from commit ca7b04ba)
      baf3cc22
    • Christopher Wiley's avatar
      Allow wificond to clean up wpa_supplicant state · af6faa70
      Christopher Wiley authored
      system_server communicates with wpa_supplicant via various control
      sockets.  Allow wificond to unlink these sockets after killing
      wpa_supplicant.
      
      Bug: 30666540
      Change-Id: Ic1419a587f066c36723c24518952025834959535
      (cherry picked from commit ba96cd1c)
      af6faa70
Loading