Skip to content
Snippets Groups Projects
  1. Aug 02, 2018
  2. Aug 01, 2018
  3. Jul 31, 2018
    • Tom Cherry's avatar
      allow init to run fsck for early mount partitions · 47157353
      Tom Cherry authored
      Bug: 111883560
      Test: fsck runs successfully during early mount
      Change-Id: I697d0ab8ba51824d5c5062b48370a73438311566
      47157353
    • Nick Kralevich's avatar
      Allow mmap for vendor_init · 99ceb07e
      Nick Kralevich authored
      vendor_init needs to touch a bunch of files. Forgotten within this set
      of permissions is the ability to mmap files.
      
      Addresses the following denial:
      
        avc:  denied  { map } for  pid=1167 comm="init" path="/system/etc/selinux/plat_file_contexts" dev="vda1" ino=1845 scontext=u:r:vendor_init:s0 tcontext=u:object_r:file_contexts_file:s0 tclass=file permissive=0
      
      While I'm here, add mmap() support to other areas where it's likely
      needed.
      
      Bug: 111742629
      Test: make -j80, ran emulator
      Change-Id: Icab00e45ae88f0d86be66d85a22e018af6ffcd75
      99ceb07e
  4. Jul 26, 2018
    • Nick Kralevich's avatar
      Protect apps from ptrace by other system components · 84a42ead
      Nick Kralevich authored
      The Android security model guarantees the confidentiality and integrity
      of application data and execution state. Ptrace bypasses those
      confidentiality guarantees. Disallow ptrace access from system components
      to apps. Crash_dump is excluded, as it needs ptrace access to
      produce stack traces.
      
      Bug: 111317528
      Test: code compiles
      Change-Id: I883df49d3e9bca62952c3b33d1c691786dd7df4d
      84a42ead
  5. Jul 25, 2018
    • Treehugger Robot's avatar
      Merge "OWNERS: add nnk and smoreland" · 719fa6db
      Treehugger Robot authored
      719fa6db
    • Jeff Vander Stoep's avatar
      OWNERS: add nnk and smoreland · 90441656
      Jeff Vander Stoep authored
      Test: none
      Change-Id: I5023f3f3f9362d456f30c81ec67580509101e81e
      90441656
    • Bowgo Tsai's avatar
      Allowing vold to search /mnt/vendor/* · 7b67a617
      Bowgo Tsai authored
      vold will trim rw mount points about daily, but it is denied by SELinux:
      
      root   603   603 W Binder:603_2: type=1400 audit(0.0:11): avc: denied {
      search } for name="vendor" dev="tmpfs" ino=23935 scontext=u:r:vold:s0
      tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0
      
      Allowing vold to search /mnt/vendor/* to fix the denials.
      
      Note that device-specific sepolicy needs to be extended to allow vold
      to send FITRIM ioctl. e.g., for /mnt/vendor/persist, it needs:
      
          allow vold persist_file:dir { ioctl open read };
      
      Bug: 111409607
      Test: boot a device, checks the above denial is gone
      Change-Id: Ia9f22d973e5a2e295678781de49a0f61fccd9dad
      7b67a617
  6. Jul 24, 2018
  7. Jul 23, 2018
  8. Jul 20, 2018
    • Tri Vo's avatar
      28 mapping workaround for devices upgrading to P. · 0cc68ea0
      Tri Vo authored
      Bug: 72458734
      Test: Compile current system sepolicy with P vendor sepolicy
      Test: Plug in a P device then do:
      m selinux_policy
      cp $OUT/system/etc/selinux/plat_sepolicy.cil  plat_sepolicy.cil
      cp $ANDROID_BUILD_TOP/system/sepolicy/private/compat/28.0/28.0.cil 28.0.cil
      adb pull /vendor/etc/selinux/plat_pub_versioned.cil
      adb pull /vendor/etc/selinux/vendor_sepolicy.cil
      secilc plat_sepolicy.cil -m -M true -G -N -c 30 28.0.cil \
      plat_pub_versioned.cil vendor_sepolicy.cil
      Change-Id: I399b3a204eb94bee0ba1b5024b1c3463219c678e
      0cc68ea0
    • Alan Stokes's avatar
      Temporarily add auditing of execmod by apps. · 708aa90d
      Alan Stokes authored
      This is so we can get data on which apps are actually doing this.
      
      Bug: 111544476
      Test: Device boots. No audits seen on test device.
      Change-Id: I5f72200ed8606775904d353c4d3d790373fe7dea
      708aa90d
    • Tri Vo's avatar
      Merge "Add mapping files for 28.0.[ignore.]cil" · 13e60ed1
      Tri Vo authored
      13e60ed1
  9. Jul 19, 2018
    • Jae Shin's avatar
      Add mapping files for 28.0.[ignore.]cil · 1fa96348
      Jae Shin authored
      Steps taken to produce the mapping files:
      
      1. Add prebuilts/api/28.0/[plat_pub_versioned.cil|vendor_sepolicy.cil]
      from the /vendor/etc/selinux/[plat_pub_versioned.cil|vendor_sepolicy.cil]
      files built on pi-dev with lunch target aosp_arm64-eng
      
      2. Add new file private/compat/28.0/28.0.cil by doing the following:
      - copy /system/etc/selinux/mapping/28.0.cil from pi-dev aosp_arm64-eng
      device to private/compat/28.0/28.0.cil
      - remove all attribute declaration statement (typeattribute ...) and
      sort lines alphabetically
      - some selinux types were added/renamed/deleted w.r.t 28 sepolicy.
      Find all such types using treble_sepolicy_tests_28.0 test.
      - for all these types figure out where to map them by looking at
      27.0.[ignore.]cil files and add approprite entries to 28.0.[ignore.]cil.
      
      This change also enables treble_sepolicy_tests_28.0 and install 28.0.cil
      mapping onto the device.
      
      Bug: 72458734
      Test: m selinux_policy
      Change-Id: I90e17c0b43af436da4b62c16179c198b5c74002c
      1fa96348
  10. Jul 18, 2018
  11. Jul 17, 2018
  12. Jul 14, 2018
    • Steven Thomas's avatar
      Selinux changes for vr flinger vsync service · 7bec9674
      Steven Thomas authored
      Add selinux policy for the new Binder-based vr flinger vsync service.
      
      Bug: 72890037
      
      Test: - Manually confirmed that I can't bind to the new vsync service
      from a normal Android application, and system processes (other than
      vr_hwc) are prevented from connecting by selinux.
      
      - Confirmed the CTS test
        android.security.cts.SELinuxHostTest#testAospServiceContexts, when
        built from the local source tree with this CL applied, passes.
      
      - Confirmed the CTS test
        android.cts.security.SELinuxNeverallowRulesTest#testNeverallowRules521,
        when built from the local source tree with this CL applied, passes.
      
      Change-Id: Ib7a6bfcb1c2ebe1051f3accc18b481be1b188b06
      7bec9674
  13. Jul 13, 2018
  14. Jul 12, 2018
  15. Jul 11, 2018
  16. Jul 03, 2018
  17. Jul 02, 2018
    • Yabin Cui's avatar
      Merge "Export more files in proc_perf." · 74f86551
      Yabin Cui authored
      74f86551
    • Yabin Cui's avatar
      Export more files in proc_perf. · 09464811
      Yabin Cui authored
      Export /proc/sys/kernel/perf_cpu_time_max_percent and
      /proc/sys/kernel/perf_event_mlock_kb in proc_perf. So
      they can be read in shell and written by init.
      
      This is needed by simpleperf to control cpu percent and
      memory used for profiling.
      
      Bug: 110706031
      Test: build and boot hikey960 successfully.
      
      Change-Id: I2a01f583508003ab73427bab30a7982a27dfa677
      09464811
    • Yongqin Liu's avatar
      public/netd.te: allow netd to operate icmp_socket that passed to it · 8a8d4ef5
      Yongqin Liu authored
      This should be supplement for the change here:
      https://android-review.googlesource.com/c/platform/system/sepolicy/+/708638
      
      
      
      When test the cts libcore.libcore.io.OsTest#test_socketPing test case, it will fail
      with avc denial message like following:
      
      [ 1906.617027] type=1400 audit(1530527518.195:10496): avc: denied { read write } for comm="netd" path="socket:[32066]" dev="sockfs" ino=32066 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617189] type=1400 audit(1530527518.195:10496): avc: denied { read write } for comm="netd" path="socket:[32066]" dev="sockfs" ino=32066 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617206] type=1400 audit(1530527518.195:10497): avc: denied { getopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617313] type=1400 audit(1530527518.195:10497): avc: denied { getopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617330] type=1400 audit(1530527518.195:10498): avc: denied { setopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1907.832425] type=1400 audit(1530527518.195:10498): avc: denied { setopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      
      Test: run cts -m CtsLibcoreTestCases -t libcore.libcore.io.OsTest#test_socketPing
      
      Change-Id: If41cb804292834b8994333f170d1f7f837bcd7df
      Signed-off-by: default avatarYongqin Liu <yongqin.liu@linaro.org>
      8a8d4ef5
    • Pawin Vongmasa's avatar
      Allow surfaceflinger to call into mediacodec · ff2dccaf
      Pawin Vongmasa authored
      Test: adb logcat | grep "Wrong interface type."
      
      Bug: 77924251
      Change-Id: Idf9d7ae6db0d41bb0c2f94b2183bfe23f0c21155
      ff2dccaf
  18. Jun 29, 2018
Loading