Skip to content
Snippets Groups Projects
  1. May 03, 2017
    • William Roberts's avatar
      storaged: add permissions for dumpstate · fd8f305b
      William Roberts authored
      
      The service "storaged" implememnts a dump() interface for
      dumpsys, and thus it needs to write its state to the fd
      provided by dumpstate.
      
      To correct this, and fix dumpstate, allow the permission.
      
      Fixes:
      avc: denied { use } for pid=3298 comm="dumpsys" path="pipe:[33470]" dev="pipefs" ino=33470 scontext=u:r:storaged:s0 tcontext=u:r:dumpstate:s0 tclass=fd permissive=0
      
      Test:
      With a device that has storaged, issue the command:
      $ adb shell dumpstate
      
      Change-Id: I515e20f0328b6edc01ea2a7c53b1d3c4ca0e72ac
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      fd8f305b
  2. May 01, 2017
  3. Apr 28, 2017
    • Andreas Gampe's avatar
      fc_sort: Fix leaks · c32d7bae
      Andreas Gampe authored
      Use the getline API correctly: keep a single buffer as long as
      possible, and let the callee handle re-allocation. Move the final
      free out of the loop.
      
      Release the head of the linked list.
      
      Bug: 37757586
      Test: ASAN_OPTIONS= SANITIZE_HOST=address mmma system/sepolicy
      Change-Id: I42424acba7cd68c1b9a7a43e916a421ac3e253f7
      c32d7bae
    • Andreas Gampe's avatar
      Sepolicy-Analyze: Plug leak · ee8b67df
      Andreas Gampe authored
      Destroy the policy before exiting (for successful = expected runs).
      
      Bug: 37757759
      Test: ASAN_OPTIONS= SANITIZE_HOST=address m
      Change-Id: I67e35fbede696ec020a53b69a6cef9f374fae167
      ee8b67df
  4. Apr 27, 2017
  5. Apr 26, 2017
  6. Apr 25, 2017
  7. Apr 20, 2017
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      Only the bluetooth app may run in the bluetooth domain · 67b40378
      Jeff Vander Stoep authored
      Remove neverallow exemption allowing other processes to run in
      the bluetooth app's selinux domain.
      
      The bluetooth domain is intended to host the zygote spawned
      bluetooth app. It is not intended to host other bluetooth related
      processes. Please define new domains for these processes.
      
      Test: build Marlin
      Change-Id: I1fd3dd0fe85f73457d77b63a65b4307821cbd41c
      67b40378
    • Neil Fuller's avatar
      Allow the shell user to run tzdatacheck · 5684f61f
      Neil Fuller authored
      Allow the shell user to run tzdatacheck, which is required
      to enable a new host side test.
      
      This change also adds some additional checks to
      tzdatacheck.te to ensure that OEMs opening up permissions
      further don't accidentally create a security hole.
      
      Bug: 31008728
      Test: Ran CTS
      Change-Id: I6ebfb467526b6b2ea08f891420eea24c81ed1e36
      5684f61f
  8. Apr 19, 2017
  9. Apr 18, 2017
  10. Apr 17, 2017
    • Jerry Zhang's avatar
      Split mediaprovider as a separate domain from priv_app · 9f152d98
      Jerry Zhang authored
      MediaProvider requires permissions that diverge from those
      of a typical priv_app. This create a new domain and removes
      Mtp related permissions from priv_app.
      
      Bug: 33574909
      Test: Connect with MTP, download apps and files, select ringtones
      Test: DownloadProvider instrument tests, CtsProviderTestCases
      
      Change-Id: I950dc11f21048c34af639cb3ab81873d2a6730a9
      9f152d98
  11. Apr 15, 2017
  12. Apr 14, 2017
    • Tianjie Xu's avatar
      Allow recovery to read thermal info on sailfish · b4e4565d
      Tianjie Xu authored
      Encountered more denials on sailfish:
      
      avc:  denied  { read } for  pid=439 comm="recovery" name="thermal"
      dev="sysfs" ino=28516 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=0
      
      avc:  denied  { read } for  pid=441 comm="recovery"
      name="thermal_zone9" dev="sysfs" ino=40364 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_thermal:s0 tclass=lnk_file permissive=0
      
      Bug: 36920500
      Test: sideload a package in sailfish
      Change-Id: Ib4e89ba48cdc383318e5f3b7b15f542434e43564
      b4e4565d
    • Treehugger Robot's avatar
      e453801d
  13. Apr 13, 2017
    • Jeff Vander Stoep's avatar
      bluetooth: Remove domain_deprecated · ff1e0184
      Jeff Vander Stoep authored
      Remove domain_deprecated from bluetooth. This removes some unnecessarily
      permissive rules.
      
      Bug: 25433265
      Test: All of the permissions being removed were being audited. Verify
            that no audited (granted) avc messages for bluetooth exist in
            in the logs.
      
      Change-Id: Ifa12a0f1533edcb623bbb9631f88f1ff1d6d7085
      ff1e0184
    • Jerry Zhang's avatar
      Add configfs file permissions to init. · f3b5bd64
      Jerry Zhang authored
      These were previously in device specific sepolicies.
      They should be in core sepolicy to reflect their
      use by a core init file, init.usb.configfs.rc.
      
      Addresses denial:
      
      init    : type=1400 audit(0.0:135): avc: denied { unlink } for name="f1"
      dev="configfs" ino=10923 scontext=u:r:init:s0
      tcontext=u:object_r:configfs:s0 tclass=lnk_file permissive=0
      
      Test: denial addressed
      Change-Id: I869892f9d0c311b727462fb380f4160feb986215
      f3b5bd64
  14. Apr 12, 2017
  15. Apr 11, 2017
    • Tom Cherry's avatar
      remove /dev/log · 8c60f74d
      Tom Cherry authored
      This was marked deprecated in 2014 and removed in 2015, let's remove
      the sepolicy now too.
      
      Test: see that logging still works on bullhead
      
      Change-Id: I4caa0dbf77956fcbc61a07897242b951c275b502
      8c60f74d
    • Jorge Lucangeli Obes's avatar
      system_server: Report dalvikcache_data_file execute violations. · 665128fa
      Jorge Lucangeli Obes authored
      With build/core eaa9d88cf, system_server should not be loading code
      from /data. Add an auditallow rule to report violations.
      
      Bug: 37214733
      Test: Boot marlin, no SELinux audit lines for system_server.
      Change-Id: I2e25eb144503274025bd4fc9bb519555851f6521
      665128fa
    • Dan Cashman's avatar
      Add PLATFORM_SEPOLICY_VERSION. · bec5e57e
      Dan Cashman authored
      Create PLATFORM_SEPOLICY_VERSION, which is a version string to represent
      the platform sepolicy of the form "NN.m" where "NN" mirrors the
      PLATFORM_SDK_VERSION and "m" is a policy-based minor version that is
      incremented with every policy change that requires a new backward-compatible
      mapping file to be added to allow for future-proofing vendor policy against
      future platform policy.
      
      (cherry-pick of commit 6f14f6b7)
      
      Bug: 36783775
      Test: Device boots when sha256 doesn't match and compilation is forced.
      Change-Id: I4edb29824f2050a5a6e1bc078c100cf42e45c303
      bec5e57e
    • Sandeep Patil's avatar
      sepolicy_version: change current version to NN.m format · 9a3a6a81
      Sandeep Patil authored
      
      The sepolicy version takes SDK_INT.<minor> format. Make sure our
      'current' policy version reflects the format and make it '100000.0'.
      This ensures any vendor.img compiled with this will never work with
      a production framework image either.
      
      Make version_policy replace the '.' in version by '_' so secilc is
      happy too.
      
      This unblocks libvintf from giving out a runtme API to check vendor's
      sepolicy version. The PLAT_PUBLIC_SEPOLICY_CURRENT_VERSION will
      eventually be picked up from the build system.
      
      (cherry-pick of commit 42f95984)
      
      Bug: 35217573
      Test: Build and boot sailfish.
            Boot sailfish with sepolicy compilation on device.
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      
      Change-Id: Ic8b6687c4e71227bf9090018999149cd9e11d63b
      9a3a6a81
  16. Apr 10, 2017
  17. Apr 07, 2017
  18. Apr 06, 2017
    • Dan Cashman's avatar
      Move mapping_sepolicy.cil to /system partition. · 04ef57bf
      Dan Cashman authored
      This is a necessary first step to finalizing the SELinux policy build
      process.  The mapping_sepolicy.cil file is required to provide backward
      compatibility with the indicated vendor-targeted version.
      
      This still needs to be extended to provide N mapping files and corresponding
      SHA256 outputs, one for each of the N previous platform versions with which
      we're backward-compatible.
      
      (cherry-pick of commit: 0e9c47c0)
      
      Bug: 36783775
      Test: boot device with matching sha256 and non-matching and verify that
      device boots and uses either precompiled or compiled policy as needed. Also
      verify that mapping_sepolicy.cil has moved.
      
      Change-Id: I5692fb87c7ec0f3ae9ca611f76847ccff9182375
      04ef57bf
Loading