Skip to content
Snippets Groups Projects
  1. Sep 04, 2018
    • Jeff Vander Stoep's avatar
      app: Allow all apps to read dropbox FDs · 6026a4ad
      Jeff Vander Stoep authored
      DropboxManager may pass FDs to any app with the READ_LOGS
      permission which is available to all apps as a development
      permission.
      
      Test: atest CtsIncidentHostTestCases
      Fixes: 111856304
      Change-Id: I329e3125dab83de948b860061df9d232e31cb23e
      6026a4ad
    • Mark Salyzyn's avatar
      llkd: Add stack symbol checking · 275ea12d
      Mark Salyzyn authored
      llkd needs the ptrace capabilities and dac override to monitor for
      live lock conditions on the stack dumps.
      
      Test: compile
      Bug: 33808187
      Change-Id: Ibc1e4cc10395fa9685c4ef0ca214daf212a5e126
      275ea12d
  2. Sep 03, 2018
  3. Aug 31, 2018
  4. Aug 30, 2018
  5. Aug 29, 2018
  6. Aug 28, 2018
    • Treehugger Robot's avatar
      efb6667a
    • Mark Salyzyn's avatar
      init: drop /dev/keychord access · 0722b5aa
      Mark Salyzyn authored
      Test: compile
      Bug: 64114943
      Change-Id: I1d20cc027dbd1a94e2a79b6aebdd265cefe8a6a5
      0722b5aa
    • Nick Kralevich's avatar
      shell: remove /dev/input write access · 51156264
      Nick Kralevich authored
      Shell access to existing input devices is an abuse vector.
      The shell user can inject events that look like they originate
      from the touchscreen etc.
      
      Everyone should have already moved to UiAutomation#injectInputEvent
      if they are running instrumentation tests (i.e. CTS), Monkey for
      their stress tests, and the input command (adb shell input ...) for
      injecting swipes and things.
      
      Remove the write ability for shell users, and add a neverallow assertion
      (which is also a CTS test) to prevent regressions.
      
      Bug: 30861057
      Test: auditallow statement added in
        f617a404 hasn't triggered.
      Test: ran getevent, saw correct output, played with device
      
      Change-Id: Ia78eeec05f6015478dd32bd59505b51fef200a99
      51156264
    • Jeff Vander Stoep's avatar
      crash_dump: disallow ptrace of TCB components · 08aa7159
      Jeff Vander Stoep authored
      Remove permissions and add neverallow assertion.
      
      (cherry picked from commit f1554f15)
      
      Bug: 110107376
      Test: kill -6 <components excluded from ptrace>
      Change-Id: I2dc872f5c02749fbaf8ca6bc7e3e38404151442c
      08aa7159
  7. Aug 27, 2018
  8. Aug 25, 2018
  9. Aug 24, 2018
  10. Aug 23, 2018
  11. Aug 22, 2018
  12. Aug 21, 2018
    • Tri Vo's avatar
      Rename untrusted_app_visible_*' to include 'violators'. · 7f8b6cc6
      Tri Vo authored
      Bug: 110887137
      Test: Flash new system policy onto a device with vendor policy that uses
      untrusted_app_visible_* attributes, and check that old and new attributes
      are applied to exactly same types.
      Change-Id: Ibee0ec645878fcc8c93cd0fbd169a8d45129d79e
      Merged-In: Ibee0ec645878fcc8c93cd0fbd169a8d45129d79e
      (cherry picked from commit 7abca51d)
      7f8b6cc6
    • Benjamin Gordon's avatar
      sepolicy: Fix references to self:capability · 7ed266c6
      Benjamin Gordon authored
      commit 9b2e0cbe added a new
      self:global_capability_class_set macro that covers both self:capability
      and self:cap_userns.  Apply the new macro to various self:capability
      references that have cropped up since then.
      
      Bug: 112307595
      Test: policy diff shows new rules are all cap_userns
      Change-Id: I3eb38ef07532a8e693fd549dfdbc4a6df5329609
      7ed266c6
    • Yifan Hong's avatar
      3784e7fc
  13. Aug 20, 2018
  14. Aug 17, 2018
  15. Aug 15, 2018
  16. Aug 14, 2018
    • Steven Moreland's avatar
      Remove old incidentd socket allow. · fa3c138a
      Steven Moreland authored
      Forgotten cleanup item.
      
      Bug: 35870313
      Test: making sepolicy (neverallows resolved at compile time)
      Change-Id: If9a583c4508db63356869502ec374727afa84b0b
      fa3c138a
    • Nick Kralevich's avatar
      Fix m4 warnings · 85508496
      Nick Kralevich authored
      Quotes and backticks are sensitive characters and should never show up
      in a comment. Fix comment to avoid the use of a single quote. Also fixes
      a bug where certain rules were not getting included in the compiled
      policy.
      
      Fixes the following build warnings:
      
      [  3% 3564/114975] build out/target/product/taimen/obj/ETC/sepolicy_neverallows_intermediates/plat_pub_policy.conf
      m4:system/sepolicy/public/te_macros:404: Warning: excess arguments to builtin `define' ignored
      [  3% 3578/114975] build out/target/product/taimen/obj/ETC/plat_sepolicy.cil_intermediates/plat_policy.conf
      m4:system/sepolicy/public/te_macros:404: Warning: excess arguments to builtin `define' ignored
      [  3% 3579/114975] build out/target/product/taimen/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_policy.conf
      m4:system/sepolicy/public/te_macros:404: Warning: excess arguments to builtin `define' ignored
      [  3% 3607/114975] build out/target/product/taimen/obj/ETC/sepolicy_neverallows_intermediates/policy.conf
      m4:system/sepolicy/public/te_macros:404: Warning: excess arguments to builtin `define' ignored
      [  3% 3677/114975] build out/target/product/taimen/obj/ETC/built_plat_sepolicy_intermediates/base_plat_policy.conf
      m4:system/sepolicy/public/te_macros:404: Warning: excess arguments to builtin `define' ignored
      
      Test: policy compiles and no warnings.
      Change-Id: Ie32d8b536955b40888b79e3a93851d2ae297f8ee
      85508496
    • Jerry Zhang's avatar
      Add sepolicy for fastbootd · 0fd3ed3b
      Jerry Zhang authored
      Also allow adb and fastboot to talk to recovery
      through recovery_socket. This enables changing
      between modes with usb commands.
      
      Test: No selinux denials
      Bug: 78793464
      Change-Id: I1f97659736429fe961319c642f458c80f199ffb4
      0fd3ed3b
    • Mark Salyzyn's avatar
      fs_mgr: use ro.persistent_properties.ready · 7ab1450d
      Mark Salyzyn authored
      Replace more complicated logic that determines that persistent
      properties are now valid with a simple check of
      ro.persistent_properties.ready.
      
      Test: manual
      Bug: 109821005
      Change-Id: I8c63beb294377ea9ce6eb6336b83f529deedd830
      7ab1450d
    • Tri Vo's avatar
      Sepolicy for system suspend HAL. · dac2a4a3
      Tri Vo authored
      Bug: 78888165
      Test: device can boot with HAL running.
      Change-Id: I3bf7c8203e038b892176c97ec006152a2904c7be
      dac2a4a3
    • Tri Vo's avatar
      Merge "neverallow fwk access to /vendor" · fdbd8519
      Tri Vo authored
      fdbd8519
  17. Aug 13, 2018
Loading