- Sep 10, 2018
-
-
Joel Galenson authored
Allow dumpstate to get information about sockets and dontaudit accessing vendor files when running df. Bug: 112440280 Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t android.security.cts.SELinuxHostTest#testNoBugreportDenials Change-Id: Ide3cb2f3ce3f079bf30b3bd46810f9b55e105b2b
-
Treehugger Robot authored
-
Benjamin Gordon authored
Kernel commit 8a2af06415ef0fc922162503dd18da0d9be7771f (ashmem: switch to ->read_iter) switched ashmem from using __vfs_read to vfs_iter_read to read the backing shmem file. Prior to this, reading from an ashmem fd that was passed between processes didn't hit any permission checks; now SELinux checks that the receiver can read from the creator's file context. Some apps receive buffers through ashmem from system_server, e.g., the settings app reads battery stats from system_server through ashmem when an app details page is opened. Restore this ability by giving apps read access to system_server_tmpfs. system_server is still responsible for creating and passing across the ashmem buffers, so this doesn't give apps the ability to read anything system_server isn't willing to give them. Bug: 112987536 Bug: 111381531 Test: atest android.appsecurity.cts.PermissionsHostTest on kernel 4.14 Change-Id: Ice5e25f55bc409e91ad7e8c7ea8b28ae213191a3
-
- Sep 09, 2018
-
-
Tri Vo authored
-
- Sep 08, 2018
-
-
Tri Vo authored
Bug: 114017832 Test: m selinux_policy Change-Id: I1dcb09c76b3e49888d278a154d79add6c6a6c977
-
- Sep 07, 2018
-
-
Nick Kralevich authored
https://github.com/torvalds/linux/commit/af63f4193f9fbbbac50fc766417d74735afd87ef allows a security policy writer to determine whether transitions under nosuid / NO_NEW_PRIVS should be allowed or not. Define these permissions, so that they're usable to policy writers. This change is modeled after refpolicy https://github.com/TresysTechnology/refpolicy/commit/1637a8b407c85f67f0b2ca5c6d852cef3c999087 Test: policy compiles and device boots Test Note: Because this requires a newer kernel, full testing on such kernels could not be done. Change-Id: I9866724b3b97adfc0cdef5aaba6de0ebbfbda72f
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Access is deprecated for apps with targetSdkVersion=26+. Test: build (neverallow rules are build time assertions) Change-Id: I36480c38d45cf6bfb75f4988ffcefefc6b62d4b1
-
Marcin Oczeretko authored
-
Hridya Valsaraju authored
Bug: 78793464 Test: fastboot flashall Change-Id: I5b65b818dc43a01f90a38202e3a1b810fef70ca8
-
- Sep 06, 2018
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Marcin Oczeretko authored
Test: Built and flashed an image. Bug: 113651685 Change-Id: Ide239432ea8a5701d91c00edd06ad3e52560a3f7
-
Jeff Vander Stoep authored
audit logs indicate that "append" is still used, but not write. From ToT master: avc: granted { append } for comm="tombstoned" scontext=u:r:tombstoned:s0 tcontext=u:object_r:anr_data_file:s0 tclass=file Bug: 32064548 Test: build Change-Id: Id05853a8ae38b84deed4d8bcca5a72c64ce7fd7e
-
Nick Kralevich authored
Not needed for modern Android versions. These rules are really, really old. Test: "adb bugreport" continues to work Test: Generating a bugreport via key combo continues to work. Change-Id: Ibc1157fb36abd7fc701db3819474f25210a3cb5f
-
Makoto Onuki authored
-
Nick Kralevich authored
When /system/bin/crash_dump is executed from the su domain, do not perform a domain transition. This allows processes run from that domain to crash normally without SELinux interfering. Bug: 114136122 Test: cferris: "This change works for me. I ran the crasher executable on /data, /data/nativetest, /data/nativetest64 (and even /data/local/tmp). All of them show that crash_dump can read the executables." Change-Id: Ic135d61b11774acff37ebfb35831497cddbefdef
-
- Sep 05, 2018
-
-
Makoto Onuki authored
Bug: 109809543 Test: Build and boot with the new service in the internal branch. Change-Id: Iaee365771c3e8e5b8f5f3b6112bbf902c6bb02bd
-
Hridya Valsaraju authored
This is needed for flashall -w to wipe userdata. Bug: 113648914 Test: fastboot erase userdata Change-Id: I7e89cf885c9a67c78de67b79ed16af7e50104bf7
-
- Sep 04, 2018
-
-
Treehugger Robot authored
-
Benjamin Gordon authored
SELinux has a separate file mmap permission in 4.14+ kernels. Add this to profman in cases where it could already access files. Bug: 112990132 Test: atest com.android.cts.dexmetadata.InstallDexMetadataHostTest Change-Id: I4f3cd55fbd4d0052500f07aac7d286c397758abc
-
Jeff Vander Stoep authored
DropboxManager may pass FDs to any app with the READ_LOGS permission which is available to all apps as a development permission. Test: atest CtsIncidentHostTestCases Fixes: 111856304 Change-Id: I329e3125dab83de948b860061df9d232e31cb23e
-
Mark Salyzyn authored
llkd needs the ptrace capabilities and dac override to monitor for live lock conditions on the stack dumps. Test: compile Bug: 33808187 Change-Id: Ibc1e4cc10395fa9685c4ef0ca214daf212a5e126
-
- Sep 03, 2018
-
-
Alan Stokes authored
This is not needed and could conceivably be abused. Test: Builds. Bug: 110107376 Change-Id: I73f301439af435fe40b3902409964cdf6e2c7dd5
-
- Aug 31, 2018
-
-
Chih-Hung Hsieh authored
Test: make with WITH_TIDY=1 and clang-analyzer-* checks. Change-Id: Ide1eaf8880132c566545710e6287f66a5a2b393c
-
- Aug 30, 2018
-
-
Kevin Chyn authored
Bug: 72825012 Test: manual Change-Id: I850c869cdc0ad8735800130bb4a8d67822197ff9
-
- Aug 29, 2018
-
-
Treehugger Robot authored
-
- Aug 28, 2018
-
-
Treehugger Robot authored
-
Mark Salyzyn authored
Test: compile Bug: 64114943 Change-Id: I1d20cc027dbd1a94e2a79b6aebdd265cefe8a6a5
-
Nick Kralevich authored
Shell access to existing input devices is an abuse vector. The shell user can inject events that look like they originate from the touchscreen etc. Everyone should have already moved to UiAutomation#injectInputEvent if they are running instrumentation tests (i.e. CTS), Monkey for their stress tests, and the input command (adb shell input ...) for injecting swipes and things. Remove the write ability for shell users, and add a neverallow assertion (which is also a CTS test) to prevent regressions. Bug: 30861057 Test: auditallow statement added in f617a404 hasn't triggered. Test: ran getevent, saw correct output, played with device Change-Id: Ia78eeec05f6015478dd32bd59505b51fef200a99
-
Jeff Vander Stoep authored
Remove permissions and add neverallow assertion. (cherry picked from commit f1554f15) Bug: 110107376 Test: kill -6 <components excluded from ptrace> Change-Id: I2dc872f5c02749fbaf8ca6bc7e3e38404151442c
-
- Aug 27, 2018
-
-
Treehugger Robot authored
-
- Aug 25, 2018
-
-
Howard Ro authored
-
- Aug 24, 2018
-
-
Nick Kralevich authored
Test to see if anyone is writing to /dev/input from the shell. Bug: 30861057 Test: device boots and no avc granted messages. Change-Id: Ia3499ef9436f83cf13c633525348b63edd95990f
-
Treehugger Robot authored
-
- Aug 23, 2018
- Aug 22, 2018
-
-
Christine Franks authored
Bug: 111215474 Test: boots Change-Id: I98955bcd02f643400c3eb97232467c09a2c5c1e5
-