Skip to content
Snippets Groups Projects
  1. Nov 01, 2018
  2. Oct 31, 2018
  3. Oct 30, 2018
  4. Oct 29, 2018
    • Treehugger Robot's avatar
    • Treehugger Robot's avatar
      a94e6e51
    • Nick Kralevich's avatar
      Enforce execve() restrictions for API > 28 · 0dd738d8
      Nick Kralevich authored
      untrusted_app: Remove the ability to run execve() on files within an
      application's home directory. Executing code from a writable /home
      directory is a W^X violation (https://en.wikipedia.org/wiki/W%5EX).
      Additionally, loading code from application home directories violates a
      security requirement that all executable code mapped into memory must
      come from signed sources, or be derived from signed sources.
      
      Note: this change does *not* remove the ability to load executable code
      through other mechanisms, such as mmap(PROT_EXEC) of a file descriptor
      from the app's home directory. In particular, functionality like
      dlopen() on files in an app's home directory continues to work even
      after this change.
      
      untrusted_app_25 and untrusted_app_27: For backwards compatibility,
      continue to allow these domains to execve() files from the
      application's home directory.
      
      seapp_contexts: Bump the minimum API level required to enter the
      untrusted_app domain. This will run API level 27-28 processes in
      the API level 27 sandbox. API level 28 will continue to run with
      levelFrom=all, and API level 27 will continue to run with
      levelFrom=user.
      
      Bug: 112357170
      Test: Device boots and no obvious problems.
      Test: See CTS test at https://android-review.googlesource.com/c/platform/cts/+/804228
      Change-Id: Ief9ae3a227d16ab5792f43bacbb577c1e70185a0
      0dd738d8
  5. Oct 27, 2018
    • Jeff Sharkey's avatar
      vold does more than LOOP_GET_STATUS64. · f2cad2d9
      Jeff Sharkey authored
      Update the "allowxperm" to reflect the various ioctl() performed in
      the vold source code.
      
      Bug: 118437832
      Test: atest android.os.storage.cts.StorageManagerTest
      Change-Id: Ide3a09104d8b4ce7fa2b7e23e9b215139186f595
      f2cad2d9
    • Nick Kralevich's avatar
      drop priv_app app_data_file:file execute; · e1ddd741
      Nick Kralevich authored
      system/sepolicy commit 23c9d91b
      introduced a new type called privapp_data_file. This type is used to
      label priv-app's /home files. For backwards compatibility, priv-app
      rules involving normal app_data_files were preserved. Subsequently,
      system/sepolicy commit 5d175519
      assigned the file label privapp_data_file to /home files owned
      by priv-apps.
      
      Because of the previous labeling of priv-app data files, priv-apps were
      granted the ability to mmap(PROT_EXEC) any other app's /home files,
      regardless of how trustworthy or untrustworthy those files were. Commit
      23c9d91b preserved the status quo.
      However, now that we have a more refined label for priv-app /home files,
      we no longer need to be as permissive.
      
      Drop the ability for priv-apps to map executable code from
      untrusted_apps home directories. "execute" is removed in this change,
      and "execute_no_trans" was previously removed in commit
      8fb4cb8b. Add a neverallow assertion
      (compile time assertion + CTS test) to prevent regressions.
      
      Further clarify why we need to support priv-apps loading executable code
      from their own home directories, at least for now. b/112037137 covers
      further tightening we can do in this area.
      
      Bug: 112357170
      Test: Device boots and no problems.
      Change-Id: Ia6a9eb4c2ed8a02ad45644d025181ba3c8424cda
      e1ddd741
  6. Oct 26, 2018
    • Treehugger Robot's avatar
      Merge "Switch to r_file_perms" · de8dfc75
      Treehugger Robot authored
      de8dfc75
    • Nick Kralevich's avatar
      Switch to r_file_perms · 0bfa7b53
      Nick Kralevich authored
      The current rule is missing mmap. r_file_perm implicitly adds mmap, so
      we should just use that instead.
      
      Test: policy compiles.
      Change-Id: I4051d1eb4c36a2b6ff2b5f26ce53355287cbe2b4
      0bfa7b53
    • Risan's avatar
      SELinux changes for AppFuse · 67ed4328
      Risan authored
      We are moving AppFuse mount from system_server's mount namespace to
      vold. Hence, we could reduce the SELinux permissions given to
      system_server, in the expense of adding allow rules to vold and
      letting appdomain have access to vold's fd.
      
      Bug: 110379912
      Test: testOpenProxyFileDescriptor passes (after vold and
      system_server code changes)
      
      Change-Id: I4731a8ec846c5cb84ec4b680d51938494e8ddd75
      67ed4328
    • Tri Vo's avatar
    • Tri Vo's avatar
      same_process_hal_file: access to individual coredomains · 90cf5a7f
      Tri Vo authored
      Remove blanket coredomain access to same_process_hal_file in favor of
      granular access. This change takes into account audits from go/sedenials
      (our internal dogfood program)
      
      Bug: 37211678
      Test: m selinux_policy
      Change-Id: I5634fb65c72d13007e40c131a600585a05b8c4b5
      90cf5a7f
    • Tri Vo's avatar
      5292449e
    • Jiyong Park's avatar
      Allow apexd more ioctl cmds for loop devices · 173a1d9a
      Jiyong Park authored
      apexd is using following additional ioctl cmds to mount the mini
      filesystem inside APEXs:
      
       LOOP_SET_STATUS64
       LOOP_SET_FD
       LOOP_SET_BLOCK_SIZE
       LOOP_SET_DIRECT_IO
       LOOP_CLR_FD
      
      Test: m; m apex.test; adb push <the_built_apex> /data/apex; adb reboot
      
      /apex/com.android.example.apex exists
      
      Change-Id: I68388cc4f323e4fcff370c8cdc0958cbd827e9cc
      173a1d9a
    • Tri Vo's avatar
      Don't label /dev/tegra.* from core policy · 2ea956c0
      Tri Vo authored
      /dev/tegra.* is not used in android platform and is device-specific
      
      Bug: 110962171
      Test: boot walleye
      Change-Id: I4cc790d28457b429a3ed9829de223dae357eb498
      2ea956c0
    • Tri Vo's avatar
      Default undefined PRODUCT_SHIPPING_API_LEVEL to fake treble · 8844f28a
      Tri Vo authored
      This is a temporary measure to disable treble sepolicy tests for
      non-compliant targets.
      
      Bug: 113124961
      Bug: 111243627
      Test: m selinux_policy
      Change-Id: I291b7cc3c8c07b838f1ea22e55550c42c5083d8f
      8844f28a
  7. Oct 25, 2018
  8. Oct 24, 2018
Loading