- Jul 12, 2017
-
-
Peng Xu authored
Test: tested taking bugreport, sensor HAL traces show up in "VM TRACES JUST NOW" Test: tested trigger ANR by `adb shell am hang --allow-restart`, sensor HAL traces shows up in /data/anr/traces.txt Bug: 63096400 Change-Id: I1d012b9d9810f987be7aaf9d68abfd9c3184ac5c
-
- Jul 06, 2017
-
-
TreeHugger Robot authored
-
- Jul 05, 2017
-
-
Jeff Vander Stoep authored
Change fb889f23 "Force expand all hal_* attributes" annotated all hal_* attributes to be expanded to their associated types. However some of these attributes are used in CTS for neverallow checking. Mark these attributes to be preserved. In addition, remove the hacky workaround introduced in oc-dev for b/62658302 where extraneous neverallow rules were introduced to prevent unused or negated attributes from being auto-expanded from policy. Bug: 62658302 Bug: 63135903 Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.cts.security.SELinuxNeverallowRulesTest armeabi-v7a CtsSecurityHostTestCases completed in 4s. 501 passed, 0 failed, 0 not executed Merged-In: I989def70a16f66e7a18bef1191510793fbe9cb8c Change-Id: I989def70a16f66e7a18bef1191510793fbe9cb8c
-
Jin Qian authored
move them to device-specific files. Bug: 62908056 Change-Id: I299819785d5a64e6ecdde1cd7da472477fe1e295 Merged-In: If92352ea7a70780e9d81ab10963d63e16b793792
-
Jin Qian authored
Test: let fs_mgr format a damaged /data partition Bug: 35219933 Change-Id: I379567772c73e52f532a24acf640c21f2bab5c5b Merged-In: I379567772c73e52f532a24acf640c21f2bab5c5b
-
- Jun 30, 2017
-
-
TreeHugger Robot authored
Merge "DO NOT MERGE ANYWHERE Revert "SEPolicy: Changes for new stack dumping scheme."" into oc-dr1-dev
-
- Jun 29, 2017
-
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
avc: denied { read write } scontext=u:r:ipacm:s0 tcontext=u:r:system_server:s0 tclass=netlink_netfilter_socket avc: denied { setopt } scontext=u:r:ipacm:s0 tcontext=u:r:system_server:s0 tclass=netlink_netfilter_socket avc: denied { getattr } scontext=u:r:ipacm:s0 tcontext=u:r:system_server:s0 tclass=netlink_netfilter_socket avc: denied { create } for scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=netlink_netfilter_socket Bug: 29337859 Bug: 32163131 Test: adb shell getenforce Enforcing adb shell dumpsys connectivity tethering Tethering: ... Log: ... 06-28 11:46:58.841 - SET master tether settings: ON 06-28 11:46:58.857 - [OffloadController] tethering offload started And logs show some signs of happiness: 06-28 11:46:58.853 816 947 I IPAHALService: IPACM was provided two FDs (18, 19) 06-28 11:46:58.853 1200 1571 I zygote64: Looking for service android.hardware.tetheroffload.control@1.0::IOffloadControl/default Change-Id: I0c63bd2de334b4ca40e54efb9df4ed4904667e21
-
- Jun 27, 2017
-
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
- Jun 26, 2017
-
-
Jeff Vander Stoep authored
Su runs in permissive mode and denials should be suppressed. avc: denied { getattr } for scontext=u:r:su:s0 tcontext=u:object_r:pdx_display_client_endpoint_socket:s0 tclass=unix_stream_socket permissive=1 avc: denied { getattr } for scontext=u:r:su:s0 tcontext=u:object_r:pdx_display_manager_endpoint_socket:s0 tclass=unix_stream_socket permissive=1 avc: denied { getattr } for scontext=u:r:su:s0 tcontext=u:object_r:pdx_display_vsync_endpoint_socket:s0 tclass=unix_stream_socket permissive=1 avc: denied { getattr } for scontext=u:r:su:s0 tcontext=u:object_r:pdx_bufferhub_client_endpoint_socket:s0 tclass=unix_stream_socket permissive=1 avc: denied { getattr } for scontext=u:r:su:s0 tcontext=u:object_r:pdx_performance_client_endpoint_socket:s0 tclass=unix_stream_socket permissive=1 Bug: 35197529 Test: policy builds Change-Id: Ia643c6e776e5e5bd473d857d523c3be91d32c40a
-
Jeff Vander Stoep authored
A legitimate call to access(2) is generating a denial. Use the audit_access permission to suppress the denial on just the access() call. avc: denied { write } for name="verified_jars" scontext=u:r:dexoptanalyzer:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir Bug: 62597207 Test: build policy Test: The following cmd succeeds but no longer generates a denial adb shell cmd package compile -r bg-dexopt --secondary-dex \ com.google.android.googlequicksearchbox Change-Id: I7d03df2754c24c039bce11426bf8f317232f5e5f
-
Jeff Vander Stoep authored
am: c75aa50d Change-Id: I39eecd67a97de193d53ab298a1ef3e8443bb9391
-
Jeff Vander Stoep authored
Due to the massively increased number of attributes in SELinux policy as part of the treble changes, we have had to remove attributes from policy for performance reasons. Unfortunately, some attributes are required to be in policy to ensure that our neverallow rules are being properly enforced. Usually this is not a problem, since neverallow rules indicate that an attribute should be kept, but this is not currently the case when the attribute is part of a negation in a group. This is particularly problematic with treble since some attributes may exist for HALs that have no implementation, and thus no types. In particular, this has caused an issue with the neverallows added in our macros. Add an extraneous neverallow rule to each of those auto-generated neverallow rules to make sure that they are not removed from policy, until the policy compiler is fixed to avoid this. Also add corresponding rules for other types which have been removed due to no corresponding rules. Bug: 62658302 Bug: 62999603 Test: Build Marlin policy. Test: verify attribute exists in policy using sepolicy-analyze. sepolicy-analyze $OUT/vendor/etc/selinux/precompiled_sepolicy \ attribute hal_tetheroffload_server Test: CTS neverallow tests pass. cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.cts.security.SELinuxNeverallowRulesTest Change-Id: I62596ba8198ffdcbb4315df639a834e4becaf249
-
- Jun 23, 2017
-
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
avc: denied { find } for interface=android.hardware.configstore::ISurfaceFlingerConfigs scontext=u:r:system_server:s0 tcontext=u:object_r:hal_configstore_ISurfaceFlingerConfigs:s0 tclass=hwservice_manager permissive=0 Bug: 35197529 Test: Device boots without this denial Change-Id: Ia43bc5879e03a1f2056e373b17cc6533636f98b1
-
Narayan Kamath authored
NOTE: This change is marked dnma because we don't want it on oc-dr1-dev-plus-aosp or any other downstream branch. Moreover, oc-dr1-dev-plus-aosp is the only outgoing merger from oc-dr1-dev for this project. This reverts commit 11bfcc1e. Bug: 62908344 Test: make Change-Id: Ide61829cf99f15777c46f657a0e140d594f88243
-
- Jun 22, 2017
-
-
Sandeep Patil authored
am: 0e0ed156 Change-Id: I8ec0c46355507e8c1a7d10c53805eb350ebbe6a5
-
TreeHugger Robot authored
-
- Jun 21, 2017
-
-
Jeff Vander Stoep authored
am: 6351c374 Change-Id: I6e661aa37702c36e9003dcf41dbed4b754122c87
-
TreeHugger Robot authored
-
Sandeep Patil authored
This reverts commit 57e9946f. Bug: 62616897 Test: choosecombo 1 aosp_arm64_ab userdebug; m -j 80 The build should not break. Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Dan Cashman authored
am: 3e307a4d Change-Id: Ic144d924948d7b8e73939806d761d27337dbebef
-
Jeff Vander Stoep authored
The tetheroffload hal must be able to use network sockets as part of its job. Bug: 62870833 Test: neverallow-only change builds. Change-Id: I630b36340796a5ecb5db08e732b0978dd82835c7
-
Dan Cashman authored
Same-process HALs are forbidden except for very specific HALs that have been provided and whitelisted by AOSP. As a result, a vendor extension HAL may have a need to be accessed by untrusted_app. This is still discouraged, and the existing AOSP hwservices are still forbidden, but remove the blanket prohibition. Also indicate that this is temporary, and that partners should expect to get exceptions to the rule into AOSP in the future. Bug: 62806062 Test: neverallow-only change builds. Verify new attribute is in policy. Change-Id: I6d3e659147d509a3503c2c9e0b6bb9016cc75832
-
- Jun 20, 2017
-
-
Yabin Cui authored
This is to Allow commands like `adb shell run-as ...`. Bug: http://b/62358246 Test: run commands manually. Change-Id: I7bb6c79a6e27ff1224a80c6ddeffb7f27f492bb2 (cherry picked from commit 1847a38b)
- Jun 19, 2017
-
-
Tom Cherry authored
-
Tom Cherry authored
In libprocessgroup, we want to only send signals once to processes, particularly for SIGTERM. We must send the signal both to all processes within a POSIX process group and a cgroup. To ensure that we do not duplicate the signals being sent, we check the processes in the cgroup to see if they're in the POSIX process groups that we're killing. If they are, we skip sending a second signal. This requires getpgid permissions, hence this SELinux change. avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1 Bug: 37853905 Bug: 62418791 Test: Boot, kill zygote, reboot Change-Id: Ib6c265dbaac8833c47145ae28fb6594ca8545570 (cherry picked from commit c59eb4d8)
-
- Jun 16, 2017
-
-
TreeHugger Robot authored
-
Daniel Rosenberg authored
am: 58d0d1e4 Change-Id: I1a2207be3509ec5bc7797b906e15da16099190ad
-
TreeHugger Robot authored
-
Dan Cashman authored
am: b5aeaf6d Change-Id: Ib0ac9cf10c7cb9fd2462e0036307e2552d19b93b
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Daniel Rosenberg authored
This adds parellel rules to the ones added for media_rw_data_file to allow apps to access vfat under sdcardfs. This should be reverted if sdcardfs is modified to alter the secontext it used for access to the lower filesystem Change-Id: Idb123206ed2fac3ead88b0c1ed0b66952597ac65 Bug: 62584229 Test: Run android.appsecurity.cts.ExternalStorageHostTest with an external card formated as vfat Signed-off-by:
Daniel Rosenberg <drosen@google.com>
-
Dan Cashman authored
Due to the massively increased number of attributes in SELinux policy as part of the treble changes, we have had to remove attributes from policy for performance reasons. Unfortunately, some attributes are required to be in policy to ensure that our neverallow rules are being properly enforced. Usually this is not a problem, since neverallow rules indicate that an attribute should be kept, but this is not currently the case when the attribute is part of a negation in a group. This is particularly problematic with treble since some attributes may exist for HALs that have no implementation, and thus no types. In particular, this has caused an issue with the neverallows added in our macros. Add an extraneous neverallow rule to each of those auto-generated neverallow rules to make sure that they are not removed from policy, until the policy compiler is fixed to avoid this. Also add corresponding rules for other types which have been removed due to no corresponding rules. Bug: 62591065 Bug: 62658302 Test: Attributes present in policy and CTS passes. sepolicy-analyze also works on platform-only policy. Change-Id: Ic3fc034cdbd04a94167f8240cf562297e8d7c762
-
Sandeep Patil authored
am: 3692b318 Change-Id: I8affb6f117f842ebdf083ec24083e190dde0082a
-
Sandeep Patil authored
am: d3381cd9 Change-Id: I33215b5c9d894823f3928742a8712ef42d803156
-
Sandeep Patil authored
* changes: build: run neverallow checks on platform sepolicy radio: disalllow radio and rild socket for treble devices
-