Skip to content
Snippets Groups Projects
  1. Sep 27, 2016
    • Jeff Vander Stoep's avatar
      Audit access to libart · 88cef4df
      Jeff Vander Stoep authored
      Grant access to all processes and audit access. The end goal is to
      whitelist all access to the interpreter. Several processes including
      dex2oat, apps, and zygote were observed using libart, so omit them
      from auditing and explicitly grant them access.
      
      Test: Angler builds and boots
      
      Bug: 29795519
      Change-Id: I9b93c7dbef5c49b95a18fd26307955d05a1c8e88
      88cef4df
    • Lorenzo Colitti's avatar
      Don't allow dumpstate to call ioctl on netlink_tcpdiag_socket. · a8239c61
      Lorenzo Colitti authored
      This fixes the build error:
      
      =====
      libsepol.report_assertion_extended_permissions: neverallowxperm on line 166 of system/sepolicy/domain.te (or line 9201 of policy.conf) violated by
      allow dumpstate dumpstate:netlink_tcpdiag_socket { ioctl };
      libsepol.check_assertions: 1 neverallow failures occurred
      =====
      
      Which is caused, in AOSP and downstream branches, by
      I123e5d40955358665800fe3b86cd5f8dbaeb8717.
      
      Test: builds.
      Change-Id: I925dec63df7c3a0f731b18093a8ac5c70167c970
      a8239c61
    • Lorenzo Colitti's avatar
      Allow dumpstate to run ss. · bb9b4dd8
      Lorenzo Colitti authored
      (cherry picked from commit 63c7ad6e)
      
      Bug: 23113288
      Test: see http://ag/1476096
      Change-Id: I3beb21f1af092c93eceb3d5115f823c1b993727d
      bb9b4dd8
  2. Sep 26, 2016
  3. Sep 23, 2016
  4. Sep 22, 2016
  5. Sep 21, 2016
  6. Sep 19, 2016
    • Svet Ganov's avatar
      Move device serial behing a permission - selinux · 3286fca7
      Svet Ganov authored
      Build serial is non-user resettable freely available device
      identifier. It can be used by ad-netowrks to track the user
      across apps which violates the user's privacy.
      
      This change deprecates Build.SERIAL and adds a new Build.getSerial()
      API which requires holding the read_phone_state permission.
      The Build.SERIAL value is set to "undefined" for apps targeting
      high enough SDK and for legacy app the value is still available.
      
      bug:31402365
      
      Change-Id: I6309aa58c8993b3db4fea7b55aae05592408b6e4
      3286fca7
    • Mitchell Wills's avatar
      Add selinux policy for legacy Wifi HAL · a18b41e7
      Mitchell Wills authored
      avc: denied { call } for scontext=u:r:wificond:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      avc: denied { call } for scontext=u:r:wificond:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=binder permissive=1
      
      avc: denied { bind } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { call } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=1
      avc: denied { getattr } for path="/proc/4355/net/psched" dev="proc" ino=4026535370 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
      avc: denied { getattr } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { ioctl } for path="socket:[28193]" dev="sockfs" ino=28193 ioctlcmd=8933 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=1
      avc: denied { ioctl } for path="socket:[34821]" dev="sockfs" ino=34821 ioctlcmd=8933 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=1
      avc: denied { net_admin } for capability=12 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=capability permissive=1
      avc: denied { net_raw } for capability=13 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=capability permissive=1
      avc: denied { open } for path="/proc/2754/net/psched" dev="proc" ino=4026535377 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
      avc: denied { open } for path="/sys/class/net" dev="sysfs" ino=10488 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
      avc: denied { read } for name="net" dev="sysfs" ino=10488 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
      avc: denied { read } for name="psched" dev="proc" ino=4026535370 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
      avc: denied { read } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { setopt } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { transfer } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      avc: denied { write } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=0
      avc: denied { net_admin } for capability=12 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=capability permissive=0
      avc: denied { read } for name="net" dev="sysfs" ino=9862 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
      avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=0
      
      Bug: 31352200
      Test: can boot angler & bullhead and start/stop HAL repeatedly
      Change-Id: Ide93730d362fb93602742fc10b22fff6e7d56f6b
      a18b41e7
  7. Sep 16, 2016
  8. Sep 15, 2016
  9. Sep 14, 2016
  10. Sep 13, 2016
Loading