Skip to content
Snippets Groups Projects
  1. May 04, 2018
    • Pawin Vongmasa's avatar
      Put in sepolicies for Codec2.0 services · 19a74ec8
      Pawin Vongmasa authored
      Test: Builds
      
      Bug: 64121714
      Bug: 31973802
      Change-Id: Id37be8726a8bb297e35bca494964fdbcc48c6a73
      (cherry picked from commit 4be28894)
      19a74ec8
    • Jeff Vander Stoep's avatar
      Start the process of locking down proc/net · 7a4af30b
      Jeff Vander Stoep authored
      Files in /proc/net leak information. This change is the first step in
      determining which files apps may use, whitelisting benign access, and
      otherwise removing access while providing safe alternative APIs.
      
      To that end, this change:
      * Introduces the proc_net_type attribute which will assigned to any
      new SELinux types in /proc/net to avoid removing access to privileged
      processes. These processes may be evaluated later, but are lower
      priority than apps.
      * Labels /proc/net/{tcp,tcp6,udp,udp6} as proc_net_vpn due to existing
      use by VPN apps. This may be replaced by an alternative API.
      * Audits all other proc/net access for apps.
      * Audits proc/net access for other processes which are currently
      granted broad read access to /proc/net but should not be including
      storaged, zygote, clatd, logd, preopt2cachename and vold.
      
      Bug: 9496886
      Bug: 68016944
      Test: Boot Taimen-userdebug. On both wifi and cellular: stream youtube
          navigate maps, send text message, make voice call, make video call.
          Verify no avc "granted" messages in the logs.
      Test: A few VPN apps including "VPN Monster", "Turbo VPN", and
      "Freighter". Verify no logspam with the current setup.
      Test: atest CtsNativeNetTestCases
      Test: atest netd_integration_test
      Test: atest QtaguidPermissionTest
      Test: atest FileSystemPermissionTest
      
      Change-Id: I7e49f796a25cf68bc698c6c9206e24af3ae11457
      Merged-In: I7e49f796a25cf68bc698c6c9206e24af3ae11457
      (cherry picked from commit 08731895)
      7a4af30b
    • Roshan Pius's avatar
      sepolicy(hostapd): Add a HIDL interface for hostapd · d7b34a48
      Roshan Pius authored
      * Note on cherry-pick: Some of the dependent changes are not in AOSP.
      In order to keep hostapd running correctly in AOSP, I've modified this
      change to only include policy additions.
      
      Change sepolicy permissions to now classify hostapd as a HAL exposing
      HIDL interface.
      
      Sepolicy denial for accessing /data/vendor/misc/wifi/hostapd:
      12-27 23:40:55.913  4952  4952 W hostapd : type=1400 audit(0.0:19): avc:
      denied { write } for name="hostapd" dev="sda13" ino=4587601
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0
      
      01-02 19:07:16.938  5791  5791 W hostapd : type=1400 audit(0.0:31): avc:
      denied { search } for name="net" dev="sysfs" ino=30521
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:sysfs_net:s0 tclass=dir permissive=0
      
      Bug: 36646171
      Test: Device boots up and able to turn on SoftAp.
      Change-Id: Ibacfcc938deab40096b54b8d0e608d53ca91b947
      Merged-In: Ibacfcc938deab40096b54b8d0e608d53ca91b947
      (cherry picked from commit 5bca3e86)
      d7b34a48
    • android-build-prod (mdb)'s avatar
    • android-build-prod (mdb)'s avatar
      5d34bbcb
    • Jeffrey Vander Stoep's avatar
      54f61fe5
    • Dan Cashman's avatar
      Remove dcashman@google.com from OWNERS. · 9e4aa226
      Dan Cashman authored
      Buh-bye!
      Test: none
      
      Change-Id: Ib1917adf03f9e777c7fc4bcb749c34c051176860
      9e4aa226
    • Calin Juravle's avatar
    • Mark Salyzyn's avatar
      FrameworksServicesTests: allow access to test.sys.boot.reason property · 3443cafa
      Mark Salyzyn authored
      com.android.server.power.PowerManagerServiceTest#testGetLastShutdownReasonInternal due to "RuntimeException: failed to set system property"
      
      W/roidJUnitRunner: type=1400 audit(0.0:6): avc: denied { write } for name="property_service" dev="tmpfs" ino=13178 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
      W/libc    : Unable to set property "test.sys.boot.reason" to "shutdown,thermal": connection failed; errno=13 (Permission denied)
      
      Had to use precise property definition as com.android.phone accesses
      test properties as well.
      
      Test: compile
      Bug: 78245377
      Change-Id: I2cc810846f8615f2a2fae8e0d4f41de585b7abd7
      3443cafa
    • Jeffrey Vander Stoep's avatar
    • Jeff Vander Stoep's avatar
      Never expand proc_type attribute · a6295412
      Jeff Vander Stoep authored
      It's used in build-time tests and in CTS.
      
      Bug: 78898770
      Test: build user-build
      Change-Id: I254bf4d7ed0c0cb029b55110ceec982b84e4a91b
      Merged-In: I254bf4d7ed0c0cb029b55110ceec982b84e4a91b
      a6295412
    • Jeffrey Vander Stoep's avatar
      9c6749d7
    • Calin Juravle's avatar
      Allow system server to record its own profile · 71d8467b
      Calin Juravle authored
      On userdebug builds we can now profile system server without disabling
      selinux. This is the final piece, and allows the system server to save its
      own profile.
      
      Test: manual, on a device with system server profiling enabled
      Bug: 73313191
      Change-Id: Iaf9575d3cda19ae4c38f1e20a8e1b9288b7abc83
      71d8467b
  2. May 03, 2018
  3. May 02, 2018
  4. May 01, 2018
  5. Apr 30, 2018
  6. Apr 29, 2018
    • Jaekyun Seok's avatar
      Allow vendor-init-settable for properties used in Android TV · 18aaaad9
      Jaekyun Seok authored
      The following properties will be whitelisted.
      - ro.hdmi.device_type, ro.hdmi.wake_on_hotplug and
      persist.sys.hdmi.keep_awake for hdmi
      - ro.sf.disable_triple_buffer for SurfaceFlinger
      - media.stagefright.cache-params and persist.sys.media.avsync for
      nuplayer
      
      Bug: 78205669
      Bug: 78430613
      Test: succeeded building
      Change-Id: I5ee1a1de72c265bca87aa041c6acd9554f5f8c07
      18aaaad9
  7. Apr 27, 2018
  8. Apr 26, 2018
    • Paul Crowley's avatar
      Allow vold_prepare_subdirs to delete more files. · 80966397
      Paul Crowley authored
      Bug: 78591623
      Test: Create a new user with a fingerprint. Reboot. Delete that user.
          Check for denials, files left over in /data/*_{c,d}e/10
      Merged-In: Ib818e112a98c5b954ee829e93ebd69c3b12940cf
      Change-Id: Ib818e112a98c5b954ee829e93ebd69c3b12940cf
      80966397
    • android-build-prod (mdb)'s avatar
    • Steven Moreland's avatar
      Enforce parent hal attribute hierarchy. · 8a52c984
      Steven Moreland authored
      In order to support passthrough + binderized implementations
      with a simple switch, there is a hierarchy of attributes for
      different hal servers.
      
                 /------- hal_X --------\
                 |               **     |
                 v                      v
            hal_X_client           hal_X_server
                 |                      |
                 |                      |
                 v                      v
          halclientdomain        halserverdomain
      
      ** - hal_X -> hal_X_server is only on non-Treble devices. This
        is because on these devices, certain HALs are allowed to be
        loaded directly into the client process in "passthrough" mode
        as was the case in Android before Android O. This is a legacy
        compatibility mode. On Treble devices, any client can also be
        hal_X just by virtue of a server being able to also be a hal
        client.
      
      There is also one exception to this rule. su is not given every
      hal_* permission. If it is given all of these permissions on
      non-Treble devices, it must be added as an exemption to many
      other neverallow rules. As a sideeffect (which existed before
      this patch), su is not allowed to talk directly to all hardware
      on non-Treble devices as with Treble devices.
      
      Fixes: 34180936
      Test: compile only (neverallow rules are resolved at compile time)
      
      Change-Id: I47122daf95acd49cadaf8b7664e56268dac78945
      8a52c984
    • Jeff Vander Stoep's avatar
      app: removed unused /dev/ion write permissions · c20ba5bd
      Jeff Vander Stoep authored
      The /dev/ion driver's file operations structure does not specify a
      write operation. Granting write is meaningless. This audit statement
      has been around since Android Oreo and logs collected from dogfooders
      shows that no apps are attempting to open the file with write
      permissions.
      
      Bug: 28760354
      Test: build
      Test: verify no "granted" messages from dogfood devices.
      Change-Id: Id4f3540bba8c9f30f9d912f7a7473933be779cbb
      c20ba5bd
    • android-build-prod (mdb)'s avatar
      aa2185bb
Loading