Skip to content
Snippets Groups Projects
  1. Aug 08, 2016
  2. Aug 05, 2016
  3. Aug 04, 2016
  4. Aug 03, 2016
  5. Jul 27, 2016
  6. Jul 26, 2016
  7. Jul 22, 2016
  8. Jul 20, 2016
  9. Jul 19, 2016
  10. Jul 18, 2016
  11. Jul 15, 2016
    • Treehugger Robot's avatar
    • dcashman's avatar
      Grant untrusted_app dir access to asec_apk_file. · 83348b0b
      dcashman authored
      untrusted_app lost all of the domain_deprecated permissions in N,
      including the ability to read asec_apk_file dirs.  This is used for
      forward locked apps.
      
      Addresses the following denials:
      avc: denied { search } for name="asec" dev="tmpfs" ino=9298 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:asec_apk_file:s0 tclass=dir permissive=0
      avc: denied { getattr } for path="/mnt/asec" dev="tmpfs" ino=9298 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:asec_apk_file:s0 tclass=dir permissive=0
      
      (cherry-pick of internal commit: addd3c9f)
      
      Bug: 30082229
      Change-Id: I87758f1daee19197d9299bca261f0324e01af5e0
      83348b0b
  12. Jul 11, 2016
  13. Jul 08, 2016
  14. Jul 07, 2016
  15. Jul 01, 2016
  16. Jun 28, 2016
    • Jeff Vander Stoep's avatar
      domain: allow reading /proc/sys/vm/overcommit_memory · bc1986fb
      Jeff Vander Stoep authored
      Needed for jemalloc commit:
      
      2f970c32b527660a33fa513a76d913c812dcf7c
      Modify pages_map() to support mapping uncommitted virtual memory.
      
      avc: denied { read } for name="overcommit_memory" dev="proc" ino=10544
      scontext=u:r:wificond:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Bug: 29773242
      Change-Id: I78054c1ed576a7998c4ee1d1beca2f610c589c3a
      bc1986fb
  17. Jun 23, 2016
    • Jeff Vander Stoep's avatar
      lmkd: grant read access to all of /sys · 30a3ee4c
      Jeff Vander Stoep authored
      avc: denied { search } for pid=394 comm="lmkd" name="lowmemorykiller" dev="sysfs" ino=7541 scontext=u:r:lmkd:s0 tcontext=u:object_r:sysfs_lowmemorykiller:s0 tclass=dir permissive=0
      
      Bug: 29558514
      Change-Id: Iaae907a92976af2a9dcb58be5643b8614dcde174
      30a3ee4c
  18. Jun 22, 2016
  19. Jun 21, 2016
    • Alex Deymo's avatar
      Allow update_engine to suspend/resume postinstall. · 108b74a1
      Alex Deymo authored
      update_engine launches the postinstall process and can suspend and
      resume it by sending SIGSTOP and SIGCONT. This fixes the following
      denials:
      
      update_engine: type=1400 audit(0.0:88): avc: denied { sigstop } for scontext=u:r:update_engine:s0 tcontext=u:r:postinstall:s0 tclass=process permissive=1
      update_engine: type=1400 audit(0.0:89): avc: denied { signal } for scontext=u:r:update_engine:s0 tcontext=u:r:postinstall:s0 tclass=process permissive=1
      
      Bug: 28959137
      TEST=`update_engine_client --suspend ; update_engine_client --resume` while the device is running postinstall.
      
      Change-Id: I9890ad0ff7fe04bae1a54fa07c61aafca8de8e66
      108b74a1
  20. Jun 20, 2016
    • Felipe Leme's avatar
      Grant access to net_raw and net_admin to dumpstate. · 51fdddaf
      Felipe Leme authored
      These capabilities are required so it can run iptables, otherwise it
      will cause failures such as:
      
      06-20 16:19:02.650  5524  5524 W iptables: type=1400 audit(0.0:232): avc: denied { net_raw } for capability=13 scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=capability permissive=0
      06-20 16:56:57.119  5070  5070 W iptables: type=1400 audit(0.0:13): avc: denied { net_admin } for capability=12 scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=capability permissive=0
      
      BUG: 29455997
      Change-Id: I9c0d1973f166da202d039eac883a6e53d53e24cb
      51fdddaf
  21. Jun 09, 2016
  22. Jun 07, 2016
  23. Jun 03, 2016
    • William Roberts's avatar
      ueventd: allow getattr on blk and chr types. · cd109d44
      William Roberts authored
      
      The commit: d41ad551
      fixes a race in coldboot. However, introduced a seperate
      bug where existing character files were being relabeled.
      
      The fix was to have ueventd ensure their was a delta between
      the old and new labels and only then call lsetfilecon(). To
      do this we call lgetfilecon() which calls lgetxattr(), this
      requires getattr permissions.
      
      This patch is void of any relabelfrom/to for ueventd on chr_file
      as those can be added as they occur.
      
      Bug: 29106809
      
      Change-Id: I84f60539252fc2b4a71cf01f78e3cadcfad443ef
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      cd109d44
  24. May 31, 2016
    • Daniel Micay's avatar
      expose control over unpriv perf access to shell · 38ac77e4
      Daniel Micay authored
      This allows the shell user to control whether unprivileged access to
      perf events is allowed.
      
      To enable unprivileged access to perf:
      
          adb shell setprop security.perf_harden 0
      
      To disable it again:
      
          adb shell setprop security.perf_harden 1
      
      This allows Android to disable this kernel attack surface by default,
      while still allowing profiling tools to work automatically. It can also
      be manually toggled, but most developers won't ever need to do that if
      tools end up incorporating this.
      
      Bug: 29054680
      
      Change-Id: Idcf6a2f6cbb35b405587deced7da1f6749b16a5f
      38ac77e4
  25. May 17, 2016
  26. May 16, 2016
  27. May 13, 2016
    • Christian Poetzsch's avatar
      sepolicy: add support for new tracefs · 4dafa72a
      Christian Poetzsch authored
      Since kernel 4.1 ftrace is supported as a new separate filesystem. It
      gets automatically mounted by the kernel under the old path
      /sys/kernel/debug/tracing. Because it lives now on a separate device
      some sepolicy rules need to be updated. This patch is doing that. Most
      of the rules are created based on a conversation happened on the SELinux
      Android mailing list:
      
      http://comments.gmane.org/gmane.comp.security.seandroid/2799
      
      
      
      Note, that this also needs 3a343a1 from the 4.4 branch in kernel/common.
      Also note that when tracefs is auto mounted by the kernel, the kernel
      does not use the "mode" parameter specified to mount debugfs for
      tracefs. So an extra line like
      
         chmod 0755 /sys/kernel/debug/tracing
      
      is necessary in init.${ro.hardware}.rc after debugfs was mounted.
      
      Change-Id: I60fb7a90e24628e0370c3bca57644451fce5646d
      Signed-off-by: default avatarChristian Poetzsch <christian.potzsch@imgtec.com>
      4dafa72a
    • Shinichiro Hamaji's avatar
      Add keys to prerequisites of mac_permissions.xml · ef0c14d3
      Shinichiro Hamaji authored
      Bug: 27954979
      Change-Id: Ia0403e2dc2726523a41742e23beff29b47274392
      ef0c14d3
Loading