- Jan 11, 2019
-
-
Siarhei Vishniakou authored
Add the required permissions for the InputClassifier HAL. Bug: 62940136 Test: no selinux denials in logcat when HAL is used inside input flinger. Change-Id: Ibc9b115a83719421d56ecb4bca2fd196ec71fd76
-
- Jan 10, 2019
-
-
Chalard Jean authored
Bug: 116512211 Test: Builds, boots, including upcoming changes needing this Change-Id: I6f119368c5a4f7ac6c0325915dff60124c5a6399
-
Tri Vo authored
The way we build and run CTS expects full_treble_only and compatible_property_only macros to be applied to whole rules and not be nested inside other rules. Fixes: 122601363 Test: corresponding neverallow rule in auto-generated SELinuxNeverallowRulesTest.java is parsed correctly. Change-Id: Ibf5187cedca72510fe74c6dc55a75a54a86c02ff
-
- Jan 09, 2019
-
-
Yabin Cui authored
runas_app domain is used by lldb/ndk-gdb/simpleperf to debug/profile debuggable apps. But it misses permissions to ptrace app processes and read /proc/<app_pid> directory. Bug: none Test: build and boot marlin. Test: run lldb and simpleperf on apps with target sdk version 24-29. Change-Id: I9e6f940ec81a8285eae8db3b77fb1251a25dedd0
-
- Jan 08, 2019
-
-
Jeff Vander Stoep authored
Bug: 33308258 Test: atest CtsSelinuxTargetSdk25TestCases Change-Id: Ifeceecec7b2f38ebd38b6693712b8f65ee24dc5d
-
Chenbo Feng authored
Recent change in netd and bpfloader switched the creater of bpf maps from netd to bpfloader. Change the rules related to it to make sure it doesn't fail. Test: dumpsys netd trafficcontroller Bug: 112334572 Change-Id: I016ff68b58ef7b12bdfdebc2fd178be1d0206a62
-
Tri Vo authored
Bug: 119305624 Test: normal/recovery boot aosp_taimen Change-Id: I46da995886ce421bb87e741d577f659426ff79c4
-
Tri Vo authored
Bug: 119305624 Test: normal/recovery boot aosp_taimen Change-Id: I15aa275fa658b58f5a5d3e651d164f9fcd87c0af
-
Tri Vo authored
Bug: 119305624 Test: normal/recovery boot aosp_taimen Change-Id: Ia8d69be16011db8dd63fa41672449a4ade7302c2
-
Tri Vo authored
Bug: 119305624 Test: normal/recovery boot aosp_taimen Change-Id: Ib7a29a9f8f23dd917cc25c23c7612f9e4ae36ea0
-
Tri Vo authored
Bug: 119305624 Test: normal/recovery boot aosp_taimen Change-Id: I1009745686acd51563378dac56e857be0d60e794
-
Narayan Kamath authored
For consistency with APKs, signature verification is performed in the system_server. This includes checking that the signature of an updated install matches the signature of the active package that it updates. For this, it requires search access to /data/apex and read access to the files under that directory. Test: m Change-Id: Ia073adb8892886e4767fa5529e95c110b9cbff1b
-
Remi NGUYEN VAN authored
Test: flashed, booted, verified app running properly Bug: b/112869080 Change-Id: I10737736ca5da67ef08fca1055e0f702371aba58
-
- Jan 07, 2019
-
-
Dario Freni authored
Test: basic workflow between apexd and PackageManager tested with changes being developed. Bug: 118865310 Change-Id: I1ae866f33e9b22493585e108c4fd45400493c7ac
-
Alex Buynytskyy authored
Used for e.g. abb. Test: Build, flash and boot, use `adb abb` to verify Change-Id: I4ad75498819edbcc0303f66420a58d06788ab5fb
-
Alan Stokes authored
This was originally implemented in commit 89041472 and reverted in commit fa3eb773. This effectively reverts the revert, with minimal changes to cope with the subsequent reversion of commit b3624743. Auditing is only enabled for apps targeting API <= 28. Test: Compiles, audit messages are seen. Bug: 121333210 Bug: 111338677 Change-Id: Ie38498a2b61f4b567902117f9ef293faa0e689dd
-
- Dec 30, 2018
-
-
Justin Yun authored
Make /(product|system/product)/vendor_overlay/<ver> have the vendor file context. If vendor_overlay requires to mount on the vendor directories other than 'vendor_file', the contexts must be defined in the device specific sepolicy files. Bug: 119076200 Test: build and check if the files are overided and have the required sepolicy contexts. Change-Id: I69ed38d4ea8e7d89f56865b1ca1e26f290e9892d
-
- Dec 28, 2018
-
-
Zachary Iqbal authored
Notes: - Added face hal domain, context and file types for the default SELinux policy. - Please see aosp/q/topic:"Face+Authentication" Bug: 80155388 Test: Built successfully. Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
-
Dario Freni authored
This reverts commit 9eb3b8ff. Reason for revert: We are deciding for now not to make StagingManager a fully-fledged binder service, as it will only be accessed by PackageInstaller. We might re-evaluate this decision later if needed. Bug: 122072686 Change-Id: Ic2a53fc92ddd7d7eeccc6a4a0117f28724346ec7
-
- Dec 27, 2018
-
-
Dario Freni authored
Adding a new high-level service which will handle staged installs, i.e. installs that require a reboot. Bug: 118865310 Test: An initial implementation of StagingManager can be reached successfully by PackageManagerService and PackageInstallerService. Change-Id: I8859b463575f8ee85caae43570958347b82f967e
-
Michael Groover authored
Test: manually verified SensorPrivacyService is accessible Bug: 110842805 Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f (cherry picked from commit 0ac3dea7)
-
- Dec 21, 2018
-
-
Nick Kralevich authored
This reverts commit b3624743. Reason for revert: android.jvmti.cts.JvmtiHostTest1906#testJvmti unittest failures. Bug: 121333210 Bug: 112357170 Change-Id: I6e68855abaaaa1e9248265a468712fa8d70ffa74 Test: compiles and boots
-
Nick Kralevich authored
This reverts commit 89041472. Unittest failures of JvmtiHostTest1906#testJvmti. To do a clean revert of b3624743, we need to also revert this change. Test: compiles Bug: 121333210 Bug: 111338677
-
Emilian Peev authored
Add "rs" and "rs_exec" types to public policy. Access to these types might be needed for device specific customization. Bug: 121306110 Test: Manual using application Change-Id: Ief35d3353625adfbf468447de74aa80651dd9451
-
Florian Mayer authored
Arbitrary apps need to connect to heapprofd in order to send samples. Relevant denial trying to profile com.google.android.inputmethod.latin on userdebug: 12-20 14:50:20.420 25219 25219 I heapprofd: type=1400 audit(0.0:1006): avc: denied { read } for path="/proc/24819/mem" dev="proc" ino=244219 scontext=u:r:heapprofd:s0 tcontext=u:r:untrusted_app_27:s0:c133,c256,c512,c768 tclass=file permissive=1 Bug: 121370989 Test: m Test: flash walleye Test: profile com.google.android.inputmethod.latin Change-Id: Iee82c8c49951e5a5726cd5ab0b9e8fa71226c802
-
Remi NGUYEN VAN authored
The policies allow the system server to register a network_stack_service used to communicate with the network stack process. Test: atest FrameworksNetTests Bug: b/112869080 Change-Id: Ib9b7d9150fe4afcce03c8b3dbb36b81c67e39366
-
- Dec 20, 2018
-
-
Remi NGUYEN VAN authored
The networking stack app hosts services that used to be in the system server (IpClient, NetworkMonitor for now), but in a different process to be packaged as a mainline module. Test: booted, verified networking stack working when in app Change-Id: I300a556f51b35c17378af961cea1ec937444e597
-
Martijn Coenen authored
To configure read-ahead on loop devices, eg. /sys/devices/virtual/block/loop0/queue/read_ahead_kb Bug: 120776455 Test: configuring read-ahead on loop devices works from apexd Change-Id: Ib25372358e8ca62fa634daf286e4b64e635fac58
-
- Dec 19, 2018
-
-
Nick Kralevich authored
The bcc command line uses /data/user/0 paths, so renderscript needs to be able to follow those symlinks. Addresses the following denial: audit(1545249938.830:2274): avc: denied { read } for comm="bcc" name="0" dev="dm-6" ino=101 scontext=u:r:rs:s0:c184,c256,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=lnk_file permissive=1 app=android.rscpp.cts Test: cts-tradefed run cts -m CtsRsCppTestCases Bug: 121266184 Bug: 112357170 Change-Id: I16210f9b95f386bdee0863cf0044c956af99586d
-
Tri Vo authored
Bug: 119305624 Test: boot blueline Change-Id: I3ecdeab3bb33c3cb5e80dc10ba1079c9853048f8
-
- Dec 18, 2018
-
-
Winson Chung authored
Bug: 120865921 Test: Manual verification Change-Id: Ic0b3f85fad24ccedc0a8e9935c198bc8503bb415
-
- Dec 17, 2018
-
-
Todd Kennedy authored
We're creating a new PermissionManagerService that will handle all of the permission related APIs. These are currently being routed through PackageManagerService. Test: Device boots Change-Id: I7d08561dd33b692209c30d413cdca0ff567358f1
-
- Dec 15, 2018
-
-
Rafal Slawik authored
rss_hwm_reset is binary that reset RSS high-water mark counters for all currently running processes. It runs in a separate process because it needs dac_override capability. Bug: 119603799 Test: no errors in logcat Change-Id: I6221a5eca3427bf532830575d8fba98eb3e65c29
-
- Dec 14, 2018
-
-
Felipe Leme authored
Bug: 111276913 Test: manual verification Merged-In: If76dc7bfdad87789a58fc94e0fd280deae1a41ab Change-Id: If76dc7bfdad87789a58fc94e0fd280deae1a41ab (cherry picked from commit 73e7fa88)
-
Alan Stokes authored
On debug builds, introduce audit logging of apps targeting SDK <= 28 that execute native code from a non-priv app home directory via execve() or dl_open(). Bug: 111338677 Test: Builds + boots. Test: Launch app that uses private .so files, see granted logs. Change-Id: I5880801d3a29cbf2c1cf4e0d72adc69a9d548952
-
Martijn Coenen authored
To work around a kernel bug where pages that are read before changing the loop device offset are not invalidated correctly. Bug: 120853401 Test: apexd mounts APEX files on gphone_sdk_x86_64 Change-Id: I89f23f8f9d472e599f053553b73cc0618dcb3747
-
- Dec 13, 2018
-
-
Florian Mayer authored
When daemonizing perfetto, SIGINT should be sent to ensure clean shutdown. Denial: 12-06 11:12:16.566 3099 3099 I sh : type=1400 audit(0.0:462): avc: denied { signal } for scontext=u:r:shell:s0 tcontext=u:r:perfetto:s0 tclass=process permissive=1 Test: m Test: flash walleye Test: SIGINT perfetto from shell Change-Id: I8d34b447ea90c315faf88f020f1dfc49e4abbcce
-
Sudheer Shanka authored
Bug: 111789719 Test: manual Change-Id: I5a5c1da69fd5d55e3276bb7384a94b9831e3cccd
-
- Dec 12, 2018
-
-
Nick Kralevich authored
Remove the ability for applications to dlopen() executable code from their home directory for newer API versions. API versions <= 28 are uneffected by this change. Bug: 112357170 Test: cts-tradefed run cts -m CtsRenderscriptTestCases Change-Id: I1d7f3a1015d54b8610d1c561f38a1a3c2bcf79e4
-
Nick Kralevich authored
When an app uses renderscript to compile a Script instance, renderscript compiles and links the script using /system/bin/bcc and /system/bin/ld.mc, then places the resulting shared library into the application's code_cache directory. The application then dlopen()s the resulting shared library. Currently, this executable code is writable to the application. This violates the W^X property (https://en.wikipedia.org/wiki/W%5EX), which requires any executable code be immutable. This change introduces a new label "rs_data_file". Files created by /system/bin/bcc and /system/bin/ld.mc in the application's home directory assume this label. This allows us to differentiate in security policy between app created files, and files created by renderscript on behalf of the application. Apps are allowed to delete these files, but cannot create or write these files. This is enforced through a neverallow compile time assertion. Several exceptions are added to Treble neverallow assertions to support this functionality. However, because renderscript was previously invoked from an application context, this is not a Treble separation regression. This change is needed to support blocking dlopen() for non-renderscript /data/data files, which will be submitted in a followup change. Bug: 112357170 Test: cts-tradefed run cts -m CtsRenderscriptTestCases Change-Id: Ie38bbd94d26db8a418c2a049c24500a5463698a3
-