- Jan 04, 2016
-
-
Jeff Vander Stoep authored
Reduce the socket ioctl commands available to untrusted/isolated apps. Neverallow accessing sensitive information or setting of network parameters. Neverallow access to device private ioctls i.e. device specific customizations as these are a common source of driver bugs. Define common ioctl commands in ioctl_defines. Bug: 26267358 Change-Id: Ic5c0af066e26d4cb2867568f53a3e65c5e3b5a5d
-
- Dec 11, 2015
-
-
Andy Hung authored
-
Jeff Vander Stoep authored
Grant untrusted_app and isolated_app unpriv_sock_perms, neverallow priv_sock_perms to disallow access to MAC address and ESSID. Change-Id: Idac3b657a153e7d7fdc647ff34b876a325d759b3
-
Nick Kralevich authored
am: 5fc257e4 * commit '5fc257e4': su.te: dontaudit su property_type:file
-
Nick Kralevich authored
am: 66e4cf84 * commit '66e4cf84': Restore sysfs_devices_system_cpu to domain.te
-
- Dec 10, 2015
-
-
Nick Kralevich authored
am: 1638208f * commit '1638208f': su.te: dontaudit su property_type:file
-
Nick Kralevich authored
The "su" domain is in globally permissive mode on userdebug/eng builds. No SELinux denials are suppose to be generated when running under "su". Get rid of useless SELinux denials coming from su trying to stat files in /dev/__properties__. For example: "ls -la /dev/__properties__" as root. Addresses the following denials: avc: denied { getattr } for pid=14692 comm="ls" path="/dev/__properties__/u:object_r:wc_transport_prop:s0" dev="tmpfs" ino=10597 scontext=u:r:su:s0 tcontext=u:object_r:wc_transport_prop:s0 tclass=file permissive=1 avc: denied { getattr } for pid=14692 comm="ls" path="/dev/__properties__/u:object_r:qseecomtee_prop:s0" dev="tmpfs" ino=10596 scontext=u:r:su:s0 tcontext=u:object_r:qseecomtee_prop:s0 tclass=file permissive=1 avc: denied { getattr } for pid=14692 comm="ls" path="/dev/__properties__/u:object_r:radio_atfwd_prop:s0" dev="tmpfs" ino=10595 scontext=u:r:su:s0 tcontext=u:object_r:radio_atfwd_prop:s0 tclass=file permissive=1 avc: denied { getattr } for pid=14692 comm="ls" path="/dev/__properties__/u:object_r:qcom_ims_prop:s0" dev="tmpfs" ino=10594 scontext=u:r:su:s0 tcontext=u:object_r:qcom_ims_prop:s0 tclass=file permissive=1 avc: denied { getattr } for pid=14692 comm="ls" path="/dev/__properties__/u:object_r:contexthub_prop:s0" dev="tmpfs" ino=10593 scontext=u:r:su:s0 tcontext=u:object_r:contexthub_prop:s0 tclass=file permissive=1 Change-Id: Ief051a107f48c3ba596a31d01cd90fb0f3442a69
-
Nick Kralevich authored
am: 4e2d2245 * commit '4e2d2245': Restore sysfs_devices_system_cpu to domain.te
-
Nick Kralevich authored
Lots of processes access CPU information. This seems to be triggered by libraries loaded into every Android process. Allow the access. Addresses the following denials: adbd : type=1400 audit(0.0:3): avc: denied { search } for name="cpu" dev="sysfs" ino=32 scontext=u:r:adbd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=dir permissive=1 adbd : type=1400 audit(0.0:4): avc: denied { read } for name="online" dev="sysfs" ino=34 scontext=u:r:adbd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=file permissive=1 adbd : type=1400 audit(0.0:5): avc: denied { open } for path="/sys/devices/system/cpu/online" dev="sysfs" ino=34 scontext=u:r:adbd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=file permissive=1 adbd : type=1400 audit(0.0:6): avc: denied { getattr } for path="/sys/devices/system/cpu/online" dev="sysfs" ino=34 scontext=u:r:adbd:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0 tclass=file permissive=1 Change-Id: Ie7bfae53bdf670028db724d2720447ead42bad35
-
- Dec 09, 2015
-
-
Jeffrey Vander Stoep authored
-
Jeff Vander Stoep authored
Change-Id: I01bb0ad7c93e807cd76135bce554abf0908a54ab
-
Nick Kralevich authored
am: 4b689152 * commit '4b689152': Remove core_property_type from ctl_* properties
-
Nick Kralevich authored
am: f01453ad * commit 'f01453ad': Remove core_property_type from ctl_* properties
-
Nick Kralevich authored
Per https://android-review.googlesource.com/185392 , ctl.* properties are not represented as files in the filesystem. So there's no need to grant read access to them, since it's pointless. Remove core_property_type from these properties, which has the net effect of removing read access to these non-existent files. Change-Id: Ic1ca574668a3511c335a7036a2bb7993ff02c1e3
-
Nick Kralevich authored
am: 4c1bbc30 * commit '4c1bbc30': Remove property read access for non-core properties
-
Jeffrey Vander Stoep authored
am: 4cf49a91 * commit '4cf49a91': Revert "Migrate to upstream policy version 30"
-
Nick Kralevich authored
am: 5a570a4b * commit '5a570a4b': Remove property read access for non-core properties
-
Jeffrey Vander Stoep authored
am: 5ca5696e * commit '5ca5696e': Revert "Migrate to upstream policy version 30"
-
- Dec 08, 2015
-
-
Nick Kralevich authored
Instead of allowing global read access to all properties, only allow read access to the properties which are part of core SELinux policy. Device-specific policies are no longer readable by default and need to be granted in device-specific policy. Grant read-access to any property where the person has write access. In most cases, anyone who wants to write a property needs read access to that property. Change-Id: I2bd24583067b79f31b3bb0940b4c07fc33d09918
-
Marco Nelissen authored
-
Jeffrey Vander Stoep authored
This reverts commit 2ea23a6e. Change-Id: I5e9efa56d74ab22030611cab515e050e0bb77aca
-
Jeffrey Vander Stoep authored
This reverts commit 2ea23a6e. Change-Id: I5e9efa56d74ab22030611cab515e050e0bb77aca
-
Tao Bao authored
-
Nick Kralevich authored
am: def6593d * commit 'def6593d': Change /dev/ion from read-only to read-write
-
Nick Kralevich authored
am: 637af04e * commit '637af04e': Change /dev/ion from read-only to read-write
-
Nick Kralevich authored
am: 71fd337f * commit '71fd337f': Change /dev/ion from read-only to read-write
-
Nick Kralevich authored
Even though /dev/ion can allocate memory when opened in read-only mode, some processes seem to unnecessarily open it in read-write mode. This doesn't seem to be harmful, and was originally allowed in domain_deprecated. Re-allow it. Bug: 25965160 Change-Id: Icaf948be89a8f2805e9b6a22633fa05b69988e4f
-
Marco Nelissen authored
Change-Id: I6f07a36af3ff3cf5ba13322e1910b4455d2adbb7
-
Jeffrey Vander Stoep authored
am: af56999e * commit 'af56999e': Migrate to upstream policy version 30
-
Nick Kralevich authored
am: 3dd51b99 * commit '3dd51b99': shell.te: Restore /proc/net access
-
Jeffrey Vander Stoep authored
am: 862e4ab1 * commit '862e4ab1': Migrate to upstream policy version 30
-
Nick Kralevich authored
am: ce890bf8 * commit 'ce890bf8': shell.te: Restore /proc/net access
-
Jeffrey Vander Stoep authored
am: 9a3d490e * commit '9a3d490e': Migrate to upstream policy version 30
-
Nick Kralevich authored
am: 99c78bf2 * commit '99c78bf2': shell.te: Restore /proc/net access
-