Skip to content
Snippets Groups Projects
  1. Jan 20, 2017
  2. Jan 19, 2017
    • William Roberts's avatar
      wificond_service: drop system_service typeattribute · b68a0149
      William Roberts authored
      
      wificond_service is not a system_server service, so drop the
      typeattribute.
      
      Test: compile
      Change-Id: Ic212dd2c8bc897fbdc13ca33a9864ac8d4e68732
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      b68a0149
    • Jim Miller's avatar
      Fix fingerprint crypto operations. · 2796009e
      Jim Miller authored
      This fixes a bug introduced in the HIDL port where fingerprint no
      longer notifies keystore of authentications.
      
      Test: keyguard, FingerprintDialog
      
      Fixes bug 34200870
      
      Change-Id: I8b1aef9469ff4f4218573a6cde4c3a151512c226
      2796009e
    • Chad Brubaker's avatar
      Allow ephemeral apps to read/write external storage · 3d348fd6
      Chad Brubaker authored
      Ephemeral apps cannot open files from external storage, but can be given
      access to files via the file picker.
      
      Test: ACTION_OPEN_DOCUMENTS from an ephemeral app returns a readable fd.
      Change-Id: Ie21b64a9633eff258be254b9cd86f282db1509e8
      3d348fd6
    • Chad Brubaker's avatar
      Move ephemeral_app to appdomain · 5c566d1a
      Chad Brubaker authored
      Ephemeral apps are still apps with very similar capabilities, it makes
      more sense to have them under appdomain and benefit from the shared
      state (and all the neverallow rules) than to try and dupplicate them and
      keep them in sync.
      
      This is an initial move, there are parts of ephemeral_app that still
      need to be locked down further and some parts of appdomain that should
      be pushed down into the various app domains.
      
      Test: Builds, ephemeral apps work without denials.
      Change-Id: I1526b2c2aa783a91fbf6543ac7f6d0d9906d70af
      5c566d1a
    • Josh Gao's avatar
      Add mlstrustedobject to tombstone_data_file. · d94c5be5
      Josh Gao authored
      Bug: http://b/30705528
      Bug: http://b/34450704
      Test: mma
      Change-Id: I315a52411232b6ff38d014a2e0fadb0bcfbc1f3f
      d94c5be5
    • Max Bires's avatar
      Removing unused rules. · 58fb5ceb
      Max Bires authored
      After checking the auditallow logs for the rule being monitored, it's
      clear that the rule is not in use and can be removed. All unused rules
      should be removed, as they present needless additional attack vectors.
      
      Test: The device boots.
      Change-Id: Ie9e060c4d134212e01309a536ac052851e408320
      58fb5ceb
  3. Jan 18, 2017
    • Max Bires's avatar
      Removing setprop permissions from rild. · 8aef51e7
      Max Bires authored
      There were some auditallow rules left around in rild.te that had logs
      showing nothing was triggering them. Thus the rules they were auditing
      could be removed, as that's clear indication there's no use for them.
      Having rules around that aren't being used does nothing except increase
      attack surface and bloat sepolicy, and so should always be removed if
      possible.
      
      Test: The device boots
      Change-Id: I906ffc493807fbae90593548d478643cda4864eb
      8aef51e7
    • mukesh agrawal's avatar
      allow init and system_server access to tracing · 3a6bc68e
      mukesh agrawal authored
      Revise policy, to allow init and system_server to configure,
      clear, and read kernel trace events. This will enable us to
      debug certain WiFi failures.
      
      Note that system_server is restricted to only accessing
      a wifi-specific trace instance. (Hence, system_server is
      not allowed to interfere with atrace.) Moreover, even for
      the wifi trace instance, system_server is granted limited
      permissions. (system_server can not, e.g., change which
      events are traced.)
      
      Note also that init and system_server are only granted these
      powers on userdebug or eng builds.
      
      The init.te and system_server.te changes resolve the
      following denials:
      
      // Denials when wifi-events.rc configures tracing
      { write } for pid=1 comm="init" name="instances" dev="debugfs" ino=755 scontext=u:r:init:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
      { add_name } for pid=1 comm="init" name="wifi" scontext=u:r:init:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
      { create } for pid=1 comm="init" name="wifi" scontext=u:r:init:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
      { write } for pid=1 comm="init" name="tracing_on" dev="debugfs" ino=18067 scontext=u:r:init:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { write } for pid=1 comm="init" name="buffer_size_kb" dev="debugfs" ino=18061 scontext=u:r:init:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=file permissive=1
      
      // Denials when system_server sets up fail-safe
      // (auto-terminate tracing if system_server dies)
      { search } for pid=882 comm="system_server" name="instances" dev="debugfs" ino=755 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
      { read } for pid=882 comm="system_server" name="free_buffer" dev="debugfs" ino=18063 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { open } for pid=882 comm="system_server" path="/sys/kernel/debug/tracing/instances/wifi/free_buffer" dev="debugfs" ino=18063 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { getattr } for pid=882 comm="system_server" path="/sys/kernel/debug/tracing/instances/wifi/free_buffer" dev="debugfs" ino=18063 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      
      // Denials when system_server toggles tracing on or off
      // (WifiStateMachine is a thread in system_server)
      { search } for pid=989 comm="WifiStateMachin" name="instances" dev="debugfs" ino=755 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
      { write } for pid=989 comm="WifiStateMachin" name="tracing_on" dev="debugfs" ino=18067 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { open } for pid=989 comm="WifiStateMachin" path="/sys/kernel/debug/tracing/instances/wifi/tracing_on" dev="debugfs" ino=18067 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { getattr } for pid=989 comm="WifiStateMachin" path="/sys/kernel/debug/tracing/instances/wifi/tracing_on" dev="debugfs" ino=18067 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { write } for pid=989 comm="WifiStateMachin" name="tracing_on" dev="debugfs" ino=18067 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { open } for pid=989 comm="WifiStateMachin" path="/sys/kernel/debug/tracing/instances/wifi/tracing_on" dev="debugfs" ino=18067 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { getattr } for pid=989 comm="WifiStateMachin" path="/sys/kernel/debug/tracing/instances/wifi/tracing_on" dev="debugfs" ino=18067 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      
      // Denials when system_server reads the event trace
      // (This happens in response to a dumpsys request)
      { search } for pid=3537 comm="Binder:882_B" name="instances" dev="debugfs" ino=755 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1
      { read } for pid=3537 comm="Binder:882_B" name="trace" dev="debugfs" ino=18059 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { open } for pid=3537 comm="Binder:882_B" path="/sys/kernel/debug/tracing/instances/wifi/trace" dev="debugfs" ino=18059 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { getattr } for pid=3537 comm="Binder:882_B" path="/sys/kernel/debug/tracing/instances/wifi/trace" dev="debugfs" ino=18059 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      { write } for pid=3537 comm="Binder:882_B" name="trace" dev="debugfs" ino=18059 scontext=u:r:system_server:s0 tcontext=u:object_r:debugfs_wifi_tracing:s0 tclass=file permissive=1
      
      Bug: 27254565
      Test: manual
      Manual test:
      - Build this CL along with CL:322337
      - Verify that system boots, and that we can connect to GoogleGuest.
        (Testing of actual trace functionality with require some more
        patches in frameworks/opt/net/wifi.)
      $ adb root && adb shell dmesg | egrep 'avc: denied.+debugfs'
      
      Change-Id: Ib6eb4116549277f85bd510d25fb30200f1752f4d
      3a6bc68e
    • Josh Gao's avatar
      Introduce crash_dump debugging helper. · cb3eb4ee
      Josh Gao authored
      Replace the global debuggerd with a per-process debugging helper that
      gets exec'ed by the process that crashed.
      
      Bug: http://b/30705528
      Test: crasher/crasher64, `debuggerd <pid>`, `kill -ABRT <pid>`
      Change-Id: Iad1b7478f7a4e2690720db4b066417d8b66834ed
      cb3eb4ee
    • Eino-Ville Talvala's avatar
      DO NOT MERGE: Camera: Add initial Treble camera HAL sepolicy · 9c43a3ff
      Eino-Ville Talvala authored
      - Allow cameraservice to talk to hwbinder, hwservicemanager
      - Allow hal_camera to talk to the same interfaces as cameraservice
      
      Test: Compiles, confirmed that cameraservice can call hwservicemanager
      Bug: 32991422
      Change-Id: Ied0a3f5f7149e29c468a13887510c78d555dcb2a
      9c43a3ff
    • Jin Qian's avatar
      Define policy for /proc/uid_io/stats · d345906b
      Jin Qian authored
      New procfs file read by storaged to dump fg/bg IO usage.
      
      Remove kmsg rule since it's no longer used by storaged.
      
      Allow storaged to find permission_service to translate UID
      to package name.
      
      Test: adb shell storaged -u
      Bug: 34198239
      Change-Id: I74654662c75571cbe166cf2b8cbab84828218cbd
      d345906b
    • Steven Moreland's avatar
      haldomain: add hwbinder_use · a2519226
      Steven Moreland authored
      All hals need to use hwbinder.
      
      Test: no additional denials
      Bug: 34180936
      Change-Id: Ie92cdbd79fc75062c4afa4cda53cb57ccde7e370
      a2519226
    • Daichi Hirono's avatar
      Don't open appfuse files in apps. · 7ae1d237
      Daichi Hirono authored
      Previously we published appfuse mount points to apps and apps open
      appfuse file by themselves. We changed the design and we don't allow
      apps to access appfuse mount point. Instead system server opens a file
      on appfuse mount points and passes FD to apps.
      
      The change updates apps and system server policies to adopt new design.
      
      Bug: 29970149
      Test: None
      Change-Id: I0b35fee9816f61565705eecb88a472754ccffdca
      7ae1d237
    • Jeff Sharkey's avatar
      Define policy for /proc/uid_procstat/set. · 828433c8
      Jeff Sharkey authored
      New procfs file written by the system_server to communicate fg/bg
      state of UIDs to switch the statistics counter sets used.
      
      avc: denied { write } for name="set" dev="proc" ino=4026531862 scontext=u:r:system_server:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1
      
      Test: builds, boots, counter sets updated
      Bug: 34360629
      Change-Id: I2efbfbba9e73f50ce50a80a3dffd3b14fa55c048
      828433c8
    • Alex Klyubin's avatar
      1-arg variant of hal_impl_domain · b68cee25
      Alex Klyubin authored
      This improves readability and consistency for HAL implementation
      domains which have only one implementation.
      
      Test: No change to policy according to sesearch
      Test: No change to which types are associated with haldomain according to "sepolicy-analyze <sepolicy file> attribute haldomain"
      Bug: 34180936
      Change-Id: Ice599ea4971cdfbd8b835b1fd02ad1e14c7a0386
      b68cee25
  4. Jan 17, 2017
    • Alex Klyubin's avatar
      Group all HAL impls using haldomain attribute · f41d89eb
      Alex Klyubin authored
      This marks all HAL domain implementations with the haldomain attribute
      so that rules can be written which apply to all HAL implementations.
      
      This follows the pattern used for appdomain, netdomain and
      bluetoothdomain.
      
      Test: No change to policy according to sesearch.
      Bug: 34180936
      Change-Id: I0cfe599b0d49feed36538503c226dfce41eb65f6
      f41d89eb
    • Mikhail Naganov's avatar
      hal_audio: In binderized mode hal_audio needs access to IAllocator · ddb52d82
      Mikhail Naganov authored
      This is to ensure that hal_audio can access memory shared by
      audioserver.
      
      Bug: 34261005
      Change-Id: I84103b0d4692fd10afc56846fb116fec6a7b3dc7
      ddb52d82
  5. Jan 13, 2017
    • Jim Miller's avatar
      New SeLinux policy for fingerprint HIDL · 54e0e5af
      Jim Miller authored
      Move from fingerprintd to new fingerprint_hal and update SeLinux policy.
      
      Test: Boot with no errors related to fingerprint sepolicy
      Bug: 33199080
      Change-Id: Idfde0cb0530e75e705033042f64f3040f6df22d6
      54e0e5af
    • Hridya Valsaraju's avatar
      add selinux policy for GNSS hal · 953c4396
      Hridya Valsaraju authored
      The following are the avc denials that are addressed:
      
      avc: denied { call } for pid=889 comm="system_server"
      scontext=u:r:system_server:s0 tcontext=u:r:hal_gnss_default:s0
      tclass=binder permissive=0
      
      avc: denied { call } for scontext=u:r:hal_gnss_default:s0
      tcontext=u:r:system_server:s0 tclass=binder permissive=0
      
      avc: denied { read } for name="hw" dev="mmcblk0p43" ino=1837
      scontext=u:r:hal_gnss_default:s0 tcontext=u:object_r:system_file:s0
      tclass=dir permissive=0
      
      avc: denied { open } for path="/system/lib64/hw" dev="mmcblk0p43"
      ino=1837 scontext=u:r:hal_gnss_default:s0
      tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
      
      Bug:31974439
      
      Test: Checked that there no more related avc denial messages related to
      the GNSS HAL in dmesg.
      
      Change-Id: I5b43dc088017a5568dd8e442726d2bf52e95b1d5
      953c4396
    • Max Bires's avatar
      Auditing init and ueventd access to chr device files. · 9e7a5b0a
      Max Bires authored
      It seems likely that there is no reason to keep around a number of
      devices that are configured to be included into the pixel kernels. Init
      and ueventd should be the only processes with r/w access to these
      devices, so auditallow rules have been added to ensure that they aren't
      actually used.
      
      /dev/keychord was given its own type since it's one of the few character
      devices that's actually legitimately used and would cause log spam in
      the auditallow otherwise.
      
      Bug: 33347297
      Test: The phone boots without any apparent log spam.
      
      Change-Id: I3dd9557df8a9218b8c802e33ff549d15849216fb
      9e7a5b0a
  6. Jan 12, 2017
  7. Jan 11, 2017
  8. Jan 10, 2017
  9. Jan 09, 2017
    • Alex Klyubin's avatar
      Move ephemeral_app policy to private · baeac1fd
      Alex Klyubin authored
      This leaves only the existence of ephemeral_app domain as public API.
      All other rules are implementation details of this domain's policy and
      are thus now private. There are a few rules, defined by other domains'
      files remaining in the public policy until the rules from these
      domains also move to the private policy:
      
      allow ephemeral_app_current appdomain:binder transfer;
      allow ephemeral_app_current audioserver_current:binder transfer;
      allow ephemeral_app_current drmserver_current:binder transfer;
      allow ephemeral_app_current dumpstate_current:binder transfer;
      allow ephemeral_app_current mediaserver_current:binder transfer;
      allow ephemeral_app_current surfaceflinger_current:binder transfer;
      allow ephemeral_app_current system_server_current:binder transfer;
      
      Test: No change to policy according to sesearch, except for
            disappearance of all allow rules from platform_app_current
            attribute (as expected).
      Bug: 31364497
      
      Change-Id: I98687181434a98a141469ef676c461fcd1db2d4e
      baeac1fd
    • Alex Klyubin's avatar
      Move platform_app policy to private · c42d134e
      Alex Klyubin authored
      This leaves only the existence of platform_app domain as public API.
      All other rules are implementation details of this domain's policy and
      are thus now private.
      
      Test: No change to policy according to sesearch, except for
            disappearance of all allow rules from platform_app_current
            attribute (as expected).
      Bug: 31364497
      
      Change-Id: I47bb59fdfc07878c91fd5e207735cd0c07a128da
      c42d134e
    • Nick Kralevich's avatar
      install_recovery.te: remove domain_deprecated · 0c8101b2
      Nick Kralevich authored
      No relevant collected denials.
      
      Test: device boots and no obvious problems.
      Test: no collected denials.
      Bug: 28760354
      Change-Id: Idcf939b3cbdb1dec835d59150181047d062e6c48
      0c8101b2
  10. Jan 07, 2017
    • ynwang's avatar
      Storaged permissions for task I/O · e68d2d2c
      ynwang authored
      Allow storaged to read /proc/[pid]/io
      Grant binder access to storaged
      Add storaged service
      Grant storaged_exec access to dumpstate
      Grant storaged binder_call to dumpstate
      
      Bug: 32221677
      
      Change-Id: Iecc9dba266c5566817a99ac6251eb943a0bac630
      e68d2d2c
    • ynwang's avatar
      Storaged permission setting · 9fa8823c
      ynwang authored
      Allowing storaged for reading from pseudo filesystems and debugfs.
      
      Bug: 32221677
      
      Change-Id: I837cead9a68f0b399703b64d724cb9c4b205c335
      9fa8823c
    • Nick Kralevich's avatar
      priv_app.te: remove domain_deprecated · 164af103
      Nick Kralevich authored
      No denials collected.
      
      Bug: 28760354
      Test: no denials collected.
      Test: device boots and no obvious problems
      Change-Id: I7fc053ecae2db3bb2ca7c298634453e930713bec
      164af103
  11. Jan 06, 2017
    • Nick Kralevich's avatar
      platform_app.te: remove obsolete rules. · eb482c42
      Nick Kralevich authored
      No audits have been recorded for these rules. Remove them.
      
      Originally added for backwards compatibility in
      549ccf77 as part of the split
      between cache_file and cache_recovery_file.
      
      Bug: 25351711
      Test: No audit records recorded
      Change-Id: I5133028b5fcc99a731aabea90305171dee0edf47
      eb482c42
    • Nick Kralevich's avatar
      Refine rules for accessing /dev/__properties__ · 32c4a27c
      Nick Kralevich authored
      Don't allow processes to list out the contents of the directory
      /dev/__properties__. This is an implementation specific detail that
      shouldn't be visible to processes.
      
      Test: Device boots and no problems reading individual properties.
      Test: ls -la /dev/__properties__ fails
      Change-Id: I4df6a829b0d22e30fb2c38030c690fc4a356f6a3
      32c4a27c
    • Alex Klyubin's avatar
      Move system_app policy to private · b5853c3b
      Alex Klyubin authored
      This leaves only the existence of system_app domain as public API.
      All other rules are implementation details of this domain's policy and
      are thus now private.
      
      Test: No change to policy according to sesearch, except for
            disappearance of all allow rules from system_app_current
            attribute (as expected).
      Bug: 31364497
      
      Change-Id: Ifc7d350ed9749a32b0c38a78ac5f41c819dbdb96
      b5853c3b
    • Alex Klyubin's avatar
      Move isolated_app policy to private · a3903974
      Alex Klyubin authored
      This leaves only the existence of isolated_app domain as public API.
      All other rules are implementation details of this domain's policy and
      are thus now private.
      
      Test: No change to policy according to sesearch, except for
            disappearance of all allow rules from isolated_app_current
            attribute (as expected).
      Bug: 31364497
      
      Change-Id: I499a648e515628932b7bcd188ecbfbe4a247f2f3
      a3903974
Loading