- Jun 20, 2017
-
-
TreeHugger Robot authored
- Jun 19, 2017
-
-
TreeHugger Robot authored
-
Yabin Cui authored
run-as uses file descriptor created by adbd when running `adb shell -t run-as xxx`. It produces audit warnings like below: [ 2036.555371] c1 509 type=1400 audit(1497910817.864:238): avc: granted { use } for pid=4945 comm="run-as" path="/dev/pts/0" dev="devpts" ino=3 scontext=u:r:runas:s0 tcontext=u:r:adbd:s0 tclass=fd Bug: http://b/62358246 Test: test manually that the warning disappears. Change-Id: I19023ac876e03ce2afe18982fe753b07e4c876bb
-
TreeHugger Robot authored
-
Tom Cherry authored
am: ac178672 Change-Id: I1c7919c78b60997a5ead95e8efa604069cbc61d3
-
Tom Cherry authored
am: 0e6a3d87 Change-Id: I3af30f8f65918e273f634a9aa120c5cbeefd3a65
-
Joel Galenson authored
An earlier commit moved tracefs file labels from file_contexts to tracefs. But this requires a kernel patch that is not present on all devices, so let's revert it until that is merged. Bug: 62485981 Test: Built, flashed, and booted two devices. Verified that the files have the correct context. Verified that traceur works. Change-Id: I8ee3ea9864f73a92943cdbc550131d4a71b842ba
-
Tom Cherry authored
-
Jin Qian authored
recovery exec /system/bin/{mke2fs,e2fsdroid} to format userdata Bug: 35219933 Change-Id: I77e75c2dc55d4bea7984707f27bc215de186c4d1
-
Dan Cashman authored
More changes went into oc-dev after the freeze-date. Reflect them. Bug: 37896931 Test: prebuilts - none. Change-Id: I3300751ea7362d5d96b327138544be65eb9fc483
-
Tom Cherry authored
In libprocessgroup, we want to only send signals once to processes, particularly for SIGTERM. We must send the signal both to all processes within a POSIX process group and a cgroup. To ensure that we do not duplicate the signals being sent, we check the processes in the cgroup to see if they're in the POSIX process groups that we're killing. If they are, we skip sending a second signal. This requires getpgid permissions, hence this SELinux change. avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1 Bug: 37853905 Bug: 62418791 Test: Boot, kill zygote, reboot Change-Id: Ib6c265dbaac8833c47145ae28fb6594ca8545570 (cherry picked from commit c59eb4d8)
-
- Jun 16, 2017
-
-
Jeff Vander Stoep authored
am: 3c7156b5 Change-Id: I20743966a8eedb8a5168356d6af3907234431e31
-
Daniel Rosenberg authored
am: 581069bf Change-Id: I58f7e0c44e68908101cb874789994885ed9a15e9
-
Daniel Rosenberg authored
am: 77ea7ccb Change-Id: I6ce8f52e97f0198cf712a60fd6af1e77090ec338
-
Jeff Vander Stoep authored
am: 1468f85f Change-Id: Idd803017a8087ac9e9221c0ca6ac5893391db6de
-
Daniel Rosenberg authored
am: 29713c8d Change-Id: I7089b62f8c54e24af47263325e085f092231f29d
-
TreeHugger Robot authored
-
Daniel Rosenberg authored
am: 39c4f76b Change-Id: I54b821fa20f428eaad1c8ab934a7e479664a6038
-
Daniel Rosenberg authored
am: 58d0d1e4 Change-Id: I1a2207be3509ec5bc7797b906e15da16099190ad
-
Daniel Rosenberg authored
am: 58d0d1e4 Change-Id: Ia53beb365c39d501c9d6cd53a4cb72dec14b610b
-
TreeHugger Robot authored
-
Andres Oportus authored
-
Dan Cashman authored
Merge "Add extraneous neverallow rule to enforce attribute inclusion." into oc-dev am: b5aeaf6d am: 2f2fd365 am: 04d9f833 Change-Id: I0eaf6ae7cd00f3f53efd2243ffe15a1bb4e97442
-
Dan Cashman authored
am: dbd2b320 Change-Id: I1d4a04a8d79325f4dd7f06b995956e254668303b
-
Dan Cashman authored
Merge "Add extraneous neverallow rule to enforce attribute inclusion." into oc-dev am: b5aeaf6d am: 6f94efaf am: 3b2bf73d Change-Id: I666e91ca83ad916b04c325d4f75570d550fc0c61
-
Dan Cashman authored
am: 2f2fd365 Change-Id: Ice4004ddb745f5936fc430f7ff44d1df3236687a
-
Dan Cashman authored
am: d4faa3ce Change-Id: I1791a5758eae1907dc0f15c2eeba36a0ad6577ce
-
Dan Cashman authored
am: 6f94efaf Change-Id: I1aceeeb61ca9e558dd32b3ef33e07b6a551387e6
-
Dan Cashman authored
am: b5aeaf6d Change-Id: Ib0ac9cf10c7cb9fd2462e0036307e2552d19b93b
-
Dan Cashman authored
am: b5aeaf6d Change-Id: Ibcf17f7bbea4923abc5d1713227568bb35c6674b
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Daniel Rosenberg authored
This adds parellel rules to the ones added for media_rw_data_file to allow apps to access vfat under sdcardfs. This should be reverted if sdcardfs is modified to alter the secontext it used for access to the lower filesystem Change-Id: Idb123206ed2fac3ead88b0c1ed0b66952597ac65 Bug: 62584229 Test: Run android.appsecurity.cts.ExternalStorageHostTest with an external card formated as vfat Signed-off-by:
Daniel Rosenberg <drosen@google.com>
-
Andres Oportus authored
Bug: 62706738 Bug: 34133340 Test: Check that uid_time_in_state can't be read from the shell without root permissions and that "dumpsys batterystats --checkin| grep ctf" shows frequency data (system_server was able to read uid_time_in_state) Change-Id: Ic6a54da4ebcc9e10b0e3af8f14a45d7408e8686e
-
Dan Cashman authored
Due to the massively increased number of attributes in SELinux policy as part of the treble changes, we have had to remove attributes from policy for performance reasons. Unfortunately, some attributes are required to be in policy to ensure that our neverallow rules are being properly enforced. Usually this is not a problem, since neverallow rules indicate that an attribute should be kept, but this is not currently the case when the attribute is part of a negation in a group. This is particularly problematic with treble since some attributes may exist for HALs that have no implementation, and thus no types. In particular, this has caused an issue with the neverallows added in our macros. Add an extraneous neverallow rule to each of those auto-generated neverallow rules to make sure that they are not removed from policy, until the policy compiler is fixed to avoid this. Also add corresponding rules for other types which have been removed due to no corresponding rules. Bug: 62591065 Bug: 62658302 Test: Attributes present in policy and CTS passes. sepolicy-analyze also works on platform-only policy. Change-Id: Ic3fc034cdbd04a94167f8240cf562297e8d7c762
-
Sandeep Patil authored
am: 8e955869 Change-Id: I7ccc82bc5590b099eee3a329bdd7a63fde7a8e0b
-