Skip to content
Snippets Groups Projects
  1. Sep 10, 2018
    • Joel Galenson's avatar
      Ensure taking a bugreport generates no denials. · e9ee9d86
      Joel Galenson authored
      Allow dumpstate to get information about sockets and dontaudit
      accessing vendor files when running df.
      
      Bug: 112440280
      Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t android.security.cts.SELinuxHostTest#testNoBugreportDenials
      Change-Id: Ide3cb2f3ce3f079bf30b3bd46810f9b55e105b2b
      e9ee9d86
    • Treehugger Robot's avatar
    • Benjamin Gordon's avatar
      sepolicy: Allow apps to read ashmem fds from system_server · 360559e7
      Benjamin Gordon authored
      Kernel commit 8a2af06415ef0fc922162503dd18da0d9be7771f (ashmem: switch
      to ->read_iter) switched ashmem from using __vfs_read to vfs_iter_read
      to read the backing shmem file.  Prior to this, reading from an ashmem
      fd that was passed between processes didn't hit any permission checks;
      now SELinux checks that the receiver can read from the creator's file
      context.
      
      Some apps receive buffers through ashmem from system_server, e.g., the
      settings app reads battery stats from system_server through ashmem when
      an app details page is opened.  Restore this ability by giving apps read
      access to system_server_tmpfs.  system_server is still responsible for
      creating and passing across the ashmem buffers, so this doesn't give
      apps the ability to read anything system_server isn't willing to give
      them.
      
      Bug: 112987536
      Bug: 111381531
      Test: atest android.appsecurity.cts.PermissionsHostTest on kernel 4.14
      Change-Id: Ice5e25f55bc409e91ad7e8c7ea8b28ae213191a3
      360559e7
  2. Sep 09, 2018
  3. Sep 08, 2018
  4. Sep 07, 2018
  5. Sep 06, 2018
  6. Sep 05, 2018
  7. Sep 04, 2018
    • Treehugger Robot's avatar
      Merge "sepolicy: Add mmap for profman" · 7b229405
      Treehugger Robot authored
      7b229405
    • Benjamin Gordon's avatar
      sepolicy: Add mmap for profman · 7cab455f
      Benjamin Gordon authored
      SELinux has a separate file mmap permission in 4.14+ kernels.  Add this
      to profman in cases where it could already access files.
      
      Bug: 112990132
      Test: atest com.android.cts.dexmetadata.InstallDexMetadataHostTest
      Change-Id: I4f3cd55fbd4d0052500f07aac7d286c397758abc
      7cab455f
    • Jeff Vander Stoep's avatar
      app: Allow all apps to read dropbox FDs · 6026a4ad
      Jeff Vander Stoep authored
      DropboxManager may pass FDs to any app with the READ_LOGS
      permission which is available to all apps as a development
      permission.
      
      Test: atest CtsIncidentHostTestCases
      Fixes: 111856304
      Change-Id: I329e3125dab83de948b860061df9d232e31cb23e
      6026a4ad
    • Mark Salyzyn's avatar
      llkd: Add stack symbol checking · 275ea12d
      Mark Salyzyn authored
      llkd needs the ptrace capabilities and dac override to monitor for
      live lock conditions on the stack dumps.
      
      Test: compile
      Bug: 33808187
      Change-Id: Ibc1e4cc10395fa9685c4ef0ca214daf212a5e126
      275ea12d
  8. Sep 03, 2018
  9. Aug 31, 2018
  10. Aug 30, 2018
  11. Aug 29, 2018
  12. Aug 28, 2018
    • Treehugger Robot's avatar
      efb6667a
    • Mark Salyzyn's avatar
      init: drop /dev/keychord access · 0722b5aa
      Mark Salyzyn authored
      Test: compile
      Bug: 64114943
      Change-Id: I1d20cc027dbd1a94e2a79b6aebdd265cefe8a6a5
      0722b5aa
    • Nick Kralevich's avatar
      shell: remove /dev/input write access · 51156264
      Nick Kralevich authored
      Shell access to existing input devices is an abuse vector.
      The shell user can inject events that look like they originate
      from the touchscreen etc.
      
      Everyone should have already moved to UiAutomation#injectInputEvent
      if they are running instrumentation tests (i.e. CTS), Monkey for
      their stress tests, and the input command (adb shell input ...) for
      injecting swipes and things.
      
      Remove the write ability for shell users, and add a neverallow assertion
      (which is also a CTS test) to prevent regressions.
      
      Bug: 30861057
      Test: auditallow statement added in
        f617a404 hasn't triggered.
      Test: ran getevent, saw correct output, played with device
      
      Change-Id: Ia78eeec05f6015478dd32bd59505b51fef200a99
      51156264
    • Jeff Vander Stoep's avatar
      crash_dump: disallow ptrace of TCB components · 08aa7159
      Jeff Vander Stoep authored
      Remove permissions and add neverallow assertion.
      
      (cherry picked from commit f1554f15)
      
      Bug: 110107376
      Test: kill -6 <components excluded from ptrace>
      Change-Id: I2dc872f5c02749fbaf8ca6bc7e3e38404151442c
      08aa7159
  13. Aug 27, 2018
  14. Aug 25, 2018
  15. Aug 24, 2018
  16. Aug 23, 2018
  17. Aug 22, 2018
Loading