Skip to content
Snippets Groups Projects
  1. Jan 11, 2019
    • Siarhei Vishniakou's avatar
      Permissions for InputClassifier HAL · 41a871ba
      Siarhei Vishniakou authored
      Add the required permissions for the InputClassifier HAL.
      
      Bug: 62940136
      Test: no selinux denials in logcat when HAL is used inside input flinger.
      Change-Id: Ibc9b115a83719421d56ecb4bca2fd196ec71fd76
      41a871ba
  2. Jan 10, 2019
    • Chalard Jean's avatar
      Add sepolicy for IpMemoryStoreService · fb15c9f1
      Chalard Jean authored
      Bug: 116512211
      Test: Builds, boots, including upcoming changes needing this
      Change-Id: I6f119368c5a4f7ac6c0325915dff60124c5a6399
      fb15c9f1
    • Tri Vo's avatar
      Apply full_treble_only to whole rule. · 1e99de57
      Tri Vo authored
      The way we build and run CTS expects full_treble_only and
      compatible_property_only macros to be applied to whole rules and not be
      nested inside other rules.
      
      Fixes: 122601363
      Test: corresponding neverallow rule in auto-generated
      SELinuxNeverallowRulesTest.java is parsed correctly.
      Change-Id: Ibf5187cedca72510fe74c6dc55a75a54a86c02ff
      1e99de57
  3. Jan 09, 2019
    • Yabin Cui's avatar
      Add permissions in runas_app domain to debug/profile debuggable apps. · 770a4f65
      Yabin Cui authored
      runas_app domain is used by lldb/ndk-gdb/simpleperf to debug/profile
      debuggable apps. But it misses permissions to ptrace app processes and
      read /proc/<app_pid> directory.
      
      Bug: none
      Test: build and boot marlin.
      Test: run lldb and simpleperf on apps with target sdk version 24-29.
      Change-Id: I9e6f940ec81a8285eae8db3b77fb1251a25dedd0
      770a4f65
  4. Jan 08, 2019
  5. Jan 07, 2019
  6. Dec 30, 2018
    • Justin Yun's avatar
      sepolicy for vendor overlay · df9d7832
      Justin Yun authored
      Make /(product|system/product)/vendor_overlay/<ver> have the vendor
      file context.
      
      If vendor_overlay requires to mount on the vendor directories other
      than 'vendor_file', the contexts must be defined in the device
      specific sepolicy files.
      
      Bug: 119076200
      Test: build and check if the files are overided and have the required
      sepolicy contexts.
      
      Change-Id: I69ed38d4ea8e7d89f56865b1ca1e26f290e9892d
      df9d7832
  7. Dec 28, 2018
    • Zachary Iqbal's avatar
      Added placeholder SELinux policy for the biometric face HAL. · 893272d8
      Zachary Iqbal authored
      Notes:
      - Added face hal domain, context and file types for the default
        SELinux policy.
      - Please see aosp/q/topic:"Face+Authentication"
      
      Bug: 80155388
      Test: Built successfully.
      Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
      893272d8
    • Dario Freni's avatar
      Revert "Add StagingManager service." · ca861694
      Dario Freni authored
      This reverts commit 9eb3b8ff.
      
      Reason for revert: We are deciding for now not to make StagingManager a fully-fledged binder service, as it will only be accessed by PackageInstaller. We might re-evaluate this decision later if needed.
      
      Bug: 122072686
      Change-Id: Ic2a53fc92ddd7d7eeccc6a4a0117f28724346ec7
      ca861694
  8. Dec 27, 2018
    • Dario Freni's avatar
      Add StagingManager service. · 9eb3b8ff
      Dario Freni authored
      Adding a new high-level service which will handle staged installs, i.e.
      installs that require a reboot.
      
      Bug: 118865310
      Test: An initial implementation of StagingManager can be reached
      successfully by PackageManagerService and PackageInstallerService.
      Change-Id: I8859b463575f8ee85caae43570958347b82f967e
      9eb3b8ff
    • Michael Groover's avatar
      Merge "Add selinux policy for new SensorPrivacyService" · 09c86730
      Michael Groover authored
      Test: manually verified SensorPrivacyService is accessible
      Bug: 110842805
      Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      (cherry picked from commit 0ac3dea7)
      09c86730
  9. Dec 21, 2018
    • Nick Kralevich's avatar
      Revert "remove app_data_file execute" · 65a89c1b
      Nick Kralevich authored
      This reverts commit b3624743.
      
      Reason for revert:
      
      android.jvmti.cts.JvmtiHostTest1906#testJvmti unittest failures.
      
      Bug: 121333210
      Bug: 112357170
      Change-Id: I6e68855abaaaa1e9248265a468712fa8d70ffa74
      Test: compiles and boots
      65a89c1b
    • Nick Kralevich's avatar
      Revert "Audit execution of app_data_file native code." · fa3eb773
      Nick Kralevich authored
      This reverts commit 89041472.
      
      Unittest failures of JvmtiHostTest1906#testJvmti. To do a clean revert
      of b3624743, we need to also revert this
      change.
      
      Test: compiles
      Bug: 121333210
      Bug: 111338677
      fa3eb773
    • Emilian Peev's avatar
      sepolicy: Add "rs" and "rs_exec" to public policy · a34cfe7b
      Emilian Peev authored
      Add "rs" and "rs_exec" types to public policy. Access
      to these types might be needed for device specific
      customization.
      
      Bug: 121306110
      Test: Manual using application
      Change-Id: Ief35d3353625adfbf468447de74aa80651dd9451
      a34cfe7b
    • Florian Mayer's avatar
      Make heapprofd work with MLS. · 23e1f4c7
      Florian Mayer authored
      Arbitrary apps need to connect to heapprofd in order to send samples.
      
      Relevant denial trying to profile com.google.android.inputmethod.latin
      on userdebug:
      
      12-20 14:50:20.420 25219 25219 I heapprofd: type=1400 audit(0.0:1006): avc: denied { read } for path="/proc/24819/mem" dev="proc" ino=244219 scontext=u:r:heapprofd:s0 tcontext=u:r:untrusted_app_27:s0:c133,c256,c512,c768 tclass=file permissive=1
      
      Bug: 121370989
      
      Test: m
      Test: flash walleye
      Test: profile com.google.android.inputmethod.latin
      
      Change-Id: Iee82c8c49951e5a5726cd5ab0b9e8fa71226c802
      23e1f4c7
    • Remi NGUYEN VAN's avatar
      Add selinux policies for network stack service · 47c2dee5
      Remi NGUYEN VAN authored
      The policies allow the system server to register a network_stack_service
      used to communicate with the network stack process.
      
      Test: atest FrameworksNetTests
      Bug: b/112869080
      Change-Id: Ib9b7d9150fe4afcce03c8b3dbb36b81c67e39366
      47c2dee5
  10. Dec 20, 2018
    • Remi NGUYEN VAN's avatar
      sepolicy changes for network stack app · 5f3ba92c
      Remi NGUYEN VAN authored
      The networking stack app hosts services that used to be in the system
      server (IpClient, NetworkMonitor for now), but in a different process to
      be packaged as a mainline module.
      
      Test: booted, verified networking stack working when in app
      Change-Id: I300a556f51b35c17378af961cea1ec937444e597
      5f3ba92c
    • Martijn Coenen's avatar
      Allow apexd to write to sysfs loop device parameters. · d7bf9218
      Martijn Coenen authored
      To configure read-ahead on loop devices, eg.
      /sys/devices/virtual/block/loop0/queue/read_ahead_kb
      
      Bug: 120776455
      Test: configuring read-ahead on loop devices works from apexd
      Change-Id: Ib25372358e8ca62fa634daf286e4b64e635fac58
      d7bf9218
  11. Dec 19, 2018
    • Nick Kralevich's avatar
      rs.te: Allow following /data/user/0 symlink · 5cbe41b1
      Nick Kralevich authored
      The bcc command line uses /data/user/0 paths, so renderscript needs to
      be able to follow those symlinks.
      
      Addresses the following denial:
      
        audit(1545249938.830:2274): avc: denied { read } for comm="bcc" name="0" dev="dm-6" ino=101 scontext=u:r:rs:s0:c184,c256,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=lnk_file permissive=1 app=android.rscpp.cts
      
      Test: cts-tradefed run cts -m CtsRsCppTestCases
      Bug: 121266184
      Bug: 112357170
      Change-Id: I16210f9b95f386bdee0863cf0044c956af99586d
      5cbe41b1
    • Tri Vo's avatar
      Separate product_file_contexts out of system sepolicy. · 3361ec43
      Tri Vo authored
      Bug: 119305624
      Test: boot blueline
      Change-Id: I3ecdeab3bb33c3cb5e80dc10ba1079c9853048f8
      3361ec43
  12. Dec 18, 2018
  13. Dec 17, 2018
    • Todd Kennedy's avatar
      Create new permissionmgr_service · 784c2b8d
      Todd Kennedy authored
      We're creating a new PermissionManagerService that will handle
      all of the permission related APIs. These are currently being
      routed through PackageManagerService.
      
      Test: Device boots
      Change-Id: I7d08561dd33b692209c30d413cdca0ff567358f1
      784c2b8d
  14. Dec 15, 2018
    • Rafal Slawik's avatar
      SELinux policy for rss_hwm_reset · 4e1c5764
      Rafal Slawik authored
      rss_hwm_reset is binary that reset RSS high-water mark counters for all
      currently running processes. It runs in a separate process because it
      needs dac_override capability.
      
      Bug: 119603799
      Test: no errors in logcat
      Change-Id: I6221a5eca3427bf532830575d8fba98eb3e65c29
      4e1c5764
  15. Dec 14, 2018
    • Felipe Leme's avatar
      DO NOT MERGE - Renamed "intelligence" to "content_capture" · 0f45683f
      Felipe Leme authored
      Bug: 111276913
      Test: manual verification
      
      Merged-In: If76dc7bfdad87789a58fc94e0fd280deae1a41ab
      Change-Id: If76dc7bfdad87789a58fc94e0fd280deae1a41ab
      (cherry picked from commit 73e7fa88)
      0f45683f
    • Alan Stokes's avatar
      Audit execution of app_data_file native code. · 89041472
      Alan Stokes authored
      On debug builds, introduce audit logging of apps targeting SDK <= 28
      that execute native code from a non-priv app home directory via
      execve() or dl_open().
      
      Bug: 111338677
      Test: Builds + boots.
      Test: Launch app that uses private .so files, see granted logs.
      Change-Id: I5880801d3a29cbf2c1cf4e0d72adc69a9d548952
      89041472
    • Martijn Coenen's avatar
      Allow apexd to flush block devices. · 558c1b8d
      Martijn Coenen authored
      To work around a kernel bug where pages that are read before changing
      the loop device offset are not invalidated correctly.
      
      Bug: 120853401
      Test: apexd mounts APEX files on gphone_sdk_x86_64
      Change-Id: I89f23f8f9d472e599f053553b73cc0618dcb3747
      558c1b8d
  16. Dec 13, 2018
    • Florian Mayer's avatar
      Allow to signal perfetto from shell. · aeca04b9
      Florian Mayer authored
      When daemonizing perfetto, SIGINT should be sent to ensure clean
      shutdown.
      
      Denial:
      12-06 11:12:16.566  3099  3099 I sh      : type=1400 audit(0.0:462): avc: denied { signal } for scontext=u:r:shell:s0 tcontext=u:r:perfetto:s0 tclass=process permissive=1
      
      Test: m
      Test: flash walleye
      Test: SIGINT perfetto from shell
      
      Change-Id: I8d34b447ea90c315faf88f020f1dfc49e4abbcce
      aeca04b9
    • Sudheer Shanka's avatar
      Allow zygote to create files at /mnt/user/.* · 2bac81df
      Sudheer Shanka authored
      Bug: 111789719
      Test: manual
      Change-Id: I5a5c1da69fd5d55e3276bb7384a94b9831e3cccd
      2bac81df
  17. Dec 12, 2018
    • Nick Kralevich's avatar
      remove app_data_file execute · b3624743
      Nick Kralevich authored
      Remove the ability for applications to dlopen() executable code from
      their home directory for newer API versions. API versions <= 28 are
      uneffected by this change.
      
      Bug: 112357170
      Test: cts-tradefed run cts -m CtsRenderscriptTestCases
      Change-Id: I1d7f3a1015d54b8610d1c561f38a1a3c2bcf79e4
      b3624743
    • Nick Kralevich's avatar
      bless app created renderscript files · 0eb0a16f
      Nick Kralevich authored
      When an app uses renderscript to compile a Script instance,
      renderscript compiles and links the script using /system/bin/bcc and
      /system/bin/ld.mc, then places the resulting shared library into the
      application's code_cache directory. The application then dlopen()s the
      resulting shared library.
      
      Currently, this executable code is writable to the application. This
      violates the W^X property (https://en.wikipedia.org/wiki/W%5EX), which
      requires any executable code be immutable.
      
      This change introduces a new label "rs_data_file". Files created by
      /system/bin/bcc and /system/bin/ld.mc in the application's home
      directory assume this label. This allows us to differentiate in
      security policy between app created files, and files created by
      renderscript on behalf of the application.
      
      Apps are allowed to delete these files, but cannot create or write these
      files. This is enforced through a neverallow compile time assertion.
      
      Several exceptions are added to Treble neverallow assertions to support
      this functionality. However, because renderscript was previously invoked
      from an application context, this is not a Treble separation regression.
      
      This change is needed to support blocking dlopen() for non-renderscript
      /data/data files, which will be submitted in a followup change.
      
      Bug: 112357170
      Test: cts-tradefed run cts -m CtsRenderscriptTestCases
      Change-Id: Ie38bbd94d26db8a418c2a049c24500a5463698a3
      0eb0a16f
Loading