Skip to content
Snippets Groups Projects
  1. Sep 10, 2018
    • Benjamin Gordon's avatar
      sepolicy: Allow apps to read ashmem fds from system_server · 360559e7
      Benjamin Gordon authored
      Kernel commit 8a2af06415ef0fc922162503dd18da0d9be7771f (ashmem: switch
      to ->read_iter) switched ashmem from using __vfs_read to vfs_iter_read
      to read the backing shmem file.  Prior to this, reading from an ashmem
      fd that was passed between processes didn't hit any permission checks;
      now SELinux checks that the receiver can read from the creator's file
      context.
      
      Some apps receive buffers through ashmem from system_server, e.g., the
      settings app reads battery stats from system_server through ashmem when
      an app details page is opened.  Restore this ability by giving apps read
      access to system_server_tmpfs.  system_server is still responsible for
      creating and passing across the ashmem buffers, so this doesn't give
      apps the ability to read anything system_server isn't willing to give
      them.
      
      Bug: 112987536
      Bug: 111381531
      Test: atest android.appsecurity.cts.PermissionsHostTest on kernel 4.14
      Change-Id: Ice5e25f55bc409e91ad7e8c7ea8b28ae213191a3
      360559e7
  2. Sep 07, 2018
  3. Sep 06, 2018
  4. Sep 05, 2018
  5. Sep 04, 2018
    • Treehugger Robot's avatar
      Merge "sepolicy: Add mmap for profman" · 7b229405
      Treehugger Robot authored
      7b229405
    • Benjamin Gordon's avatar
      sepolicy: Add mmap for profman · 7cab455f
      Benjamin Gordon authored
      SELinux has a separate file mmap permission in 4.14+ kernels.  Add this
      to profman in cases where it could already access files.
      
      Bug: 112990132
      Test: atest com.android.cts.dexmetadata.InstallDexMetadataHostTest
      Change-Id: I4f3cd55fbd4d0052500f07aac7d286c397758abc
      7cab455f
    • Jeff Vander Stoep's avatar
      app: Allow all apps to read dropbox FDs · 6026a4ad
      Jeff Vander Stoep authored
      DropboxManager may pass FDs to any app with the READ_LOGS
      permission which is available to all apps as a development
      permission.
      
      Test: atest CtsIncidentHostTestCases
      Fixes: 111856304
      Change-Id: I329e3125dab83de948b860061df9d232e31cb23e
      6026a4ad
    • Mark Salyzyn's avatar
      llkd: Add stack symbol checking · 275ea12d
      Mark Salyzyn authored
      llkd needs the ptrace capabilities and dac override to monitor for
      live lock conditions on the stack dumps.
      
      Test: compile
      Bug: 33808187
      Change-Id: Ibc1e4cc10395fa9685c4ef0ca214daf212a5e126
      275ea12d
  6. Sep 03, 2018
  7. Aug 31, 2018
  8. Aug 30, 2018
  9. Aug 29, 2018
  10. Aug 28, 2018
    • Treehugger Robot's avatar
      efb6667a
    • Mark Salyzyn's avatar
      init: drop /dev/keychord access · 0722b5aa
      Mark Salyzyn authored
      Test: compile
      Bug: 64114943
      Change-Id: I1d20cc027dbd1a94e2a79b6aebdd265cefe8a6a5
      0722b5aa
    • Nick Kralevich's avatar
      shell: remove /dev/input write access · 51156264
      Nick Kralevich authored
      Shell access to existing input devices is an abuse vector.
      The shell user can inject events that look like they originate
      from the touchscreen etc.
      
      Everyone should have already moved to UiAutomation#injectInputEvent
      if they are running instrumentation tests (i.e. CTS), Monkey for
      their stress tests, and the input command (adb shell input ...) for
      injecting swipes and things.
      
      Remove the write ability for shell users, and add a neverallow assertion
      (which is also a CTS test) to prevent regressions.
      
      Bug: 30861057
      Test: auditallow statement added in
        f617a404 hasn't triggered.
      Test: ran getevent, saw correct output, played with device
      
      Change-Id: Ia78eeec05f6015478dd32bd59505b51fef200a99
      51156264
    • Jeff Vander Stoep's avatar
      crash_dump: disallow ptrace of TCB components · 08aa7159
      Jeff Vander Stoep authored
      Remove permissions and add neverallow assertion.
      
      (cherry picked from commit f1554f15)
      
      Bug: 110107376
      Test: kill -6 <components excluded from ptrace>
      Change-Id: I2dc872f5c02749fbaf8ca6bc7e3e38404151442c
      08aa7159
  11. Aug 27, 2018
  12. Aug 25, 2018
  13. Aug 24, 2018
  14. Aug 23, 2018
  15. Aug 22, 2018
  16. Aug 21, 2018
    • Tri Vo's avatar
      Rename untrusted_app_visible_*' to include 'violators'. · 7f8b6cc6
      Tri Vo authored
      Bug: 110887137
      Test: Flash new system policy onto a device with vendor policy that uses
      untrusted_app_visible_* attributes, and check that old and new attributes
      are applied to exactly same types.
      Change-Id: Ibee0ec645878fcc8c93cd0fbd169a8d45129d79e
      Merged-In: Ibee0ec645878fcc8c93cd0fbd169a8d45129d79e
      (cherry picked from commit 7abca51d)
      7f8b6cc6
    • Benjamin Gordon's avatar
      sepolicy: Fix references to self:capability · 7ed266c6
      Benjamin Gordon authored
      commit 9b2e0cbe added a new
      self:global_capability_class_set macro that covers both self:capability
      and self:cap_userns.  Apply the new macro to various self:capability
      references that have cropped up since then.
      
      Bug: 112307595
      Test: policy diff shows new rules are all cap_userns
      Change-Id: I3eb38ef07532a8e693fd549dfdbc4a6df5329609
      7ed266c6
    • Yifan Hong's avatar
      3784e7fc
  17. Aug 20, 2018
Loading