Hridya Valsaraju
fbde815e2d
Merge "Recovery does not need permission to start adbd anymore"
...
am: 7706f51fd3
Change-Id: I5999552df5444e90804e91dac93d9e15da0679c8
2018-09-10 18:59:15 -07:00
Treehugger Robot
7706f51fd3
Merge "Recovery does not need permission to start adbd anymore"
2018-09-11 01:49:57 +00:00
Tri Vo
15f64cacab
Merge "ro.crypto.{allow_encrypt_override filenames_mode} vendor-init-settable."
...
am: 34e98082ff
Change-Id: I16b7b89a742fe502ce534f8ae941116fbca4eeab
2018-09-09 13:49:26 -07:00
Tri Vo
34e98082ff
Merge "ro.crypto.{allow_encrypt_override filenames_mode} vendor-init-settable."
2018-09-09 20:37:09 +00:00
Tri Vo
fe72cb70d7
ro.crypto.{allow_encrypt_override filenames_mode} vendor-init-settable.
...
Bug: 114017832
Test: m selinux_policy
Change-Id: I1dcb09c76b3e49888d278a154d79add6c6a6c977
2018-09-08 14:42:51 -07:00
Hridya Valsaraju
187d6e2280
Recovery does not need permission to start adbd anymore
...
adbd is started by an init trigger now when sys.usb.config is set
to adb.
Test: adb sideload works in user/userdebug builds
Bug: 113563995
Change-Id: I23db4074cd49cf0ba6c4eb27510e3a5caad5681b
2018-09-07 14:57:36 -07:00
Hridya Valsaraju
8386cae8ad
Merge "Fastbootd does not require read access to system and boot partitions"
...
am: 8d7d5b42b5
Change-Id: Ib4ed24211801d21ebc45a967d37c2137185f3ad9
2018-09-07 10:19:03 -07:00
Treehugger Robot
8d7d5b42b5
Merge "Fastbootd does not require read access to system and boot partitions"
2018-09-07 17:04:38 +00:00
Marcin Oczeretko
a98b64d44e
Merge "Add looper_stats_service to SE policy."
...
am: fb947d0c36
Change-Id: Idde84efff4c01752fa8ca131630481d73c7ed3a3
2018-09-07 03:08:58 -07:00
Marcin Oczeretko
fb947d0c36
Merge "Add looper_stats_service to SE policy."
2018-09-07 09:51:33 +00:00
Hridya Valsaraju
e9fcce5642
Fastbootd does not require read access to system and boot partitions
...
Bug: 78793464
Test: fastboot flashall
Change-Id: I5b65b818dc43a01f90a38202e3a1b810fef70ca8
2018-09-07 00:09:34 +00:00
Jeff Vander Stoep
51e3bfa7f0
Merge "tombstoned: clean up TODO on anr writes"
...
am: bedc4f170c
Change-Id: Ief9aeb57bdad01d14cabb100bea2f101c00f1c7f
2018-09-06 16:32:03 -07:00
Nick Kralevich
d8f692043a
Merge "dumpstate: remove JIT and /data execute"
...
am: ac45700478
Change-Id: Iafdd7cff1733d605baf2fdbd46b181fcb69d226d
2018-09-06 16:30:48 -07:00
Treehugger Robot
bedc4f170c
Merge "tombstoned: clean up TODO on anr writes"
2018-09-06 22:45:45 +00:00
Treehugger Robot
ac45700478
Merge "dumpstate: remove JIT and /data execute"
2018-09-06 22:41:19 +00:00
Hridya Valsaraju
8a1fd22c55
Merge "Allow fastbootd to wipe userdata."
...
am: 36c7f741c1
Change-Id: If102f6d7dbdc3212216bc3b5a8d930f56d01ccc2
2018-09-06 14:51:02 -07:00
Treehugger Robot
36c7f741c1
Merge "Allow fastbootd to wipe userdata."
2018-09-06 21:12:07 +00:00
Marcin Oczeretko
56ab6be0d4
Add looper_stats_service to SE policy.
...
Test: Built and flashed an image.
Bug: 113651685
Change-Id: Ide239432ea8a5701d91c00edd06ad3e52560a3f7
2018-09-06 21:07:13 +00:00
Jeff Vander Stoep
93727ae6d7
tombstoned: clean up TODO on anr writes
...
audit logs indicate that "append" is still used, but not write.
From ToT master:
avc: granted { append } for comm="tombstoned" scontext=u:r:tombstoned:s0
tcontext=u:object_r:anr_data_file:s0 tclass=file
Bug: 32064548
Test: build
Change-Id: Id05853a8ae38b84deed4d8bcca5a72c64ce7fd7e
2018-09-06 14:01:25 -07:00
Nick Kralevich
eef72d34b4
dumpstate: remove JIT and /data execute
...
Not needed for modern Android versions. These rules are really, really
old.
Test: "adb bugreport" continues to work
Test: Generating a bugreport via key combo continues to work.
Change-Id: Ibc1157fb36abd7fc701db3819474f25210a3cb5f
2018-09-06 13:28:34 -07:00
Makoto Onuki
6d31c536bd
Merge "Add app_binding system service"
...
am: ac4b6478c1
Change-Id: Idca8c49f6aac8b75a6d2222a62997809c9ff064c
2018-09-06 10:31:56 -07:00
Makoto Onuki
6af1181320
Add app_binding system service
...
Bug: 109809543
Test: Build and boot with the new service in the internal branch.
Change-Id: Iaee365771c3e8e5b8f5f3b6112bbf902c6bb02bd
2018-09-05 14:33:20 -07:00
Hridya Valsaraju
f97026db4a
Allow fastbootd to wipe userdata.
...
This is needed for flashall -w to wipe userdata.
Bug: 113648914
Test: fastboot erase userdata
Change-Id: I7e89cf885c9a67c78de67b79ed16af7e50104bf7
2018-09-05 13:40:30 -07:00
Benjamin Gordon
350c51d0bb
Merge "sepolicy: Add mmap for profman"
...
am: 7b22940511
Change-Id: Ie4fd9006bd092b079ca48387299f3420783854fa
2018-09-04 15:12:36 -07:00
Treehugger Robot
7b22940511
Merge "sepolicy: Add mmap for profman"
2018-09-04 22:09:28 +00:00
Jeff Vander Stoep
90753875f1
app: Allow all apps to read dropbox FDs
...
am: 6026a4adb9
Change-Id: I13503970dc58651246a6a37b89cb61575ffe0e37
2018-09-04 14:47:56 -07:00
Benjamin Gordon
7cab455f2d
sepolicy: Add mmap for profman
...
SELinux has a separate file mmap permission in 4.14+ kernels. Add this
to profman in cases where it could already access files.
Bug: 112990132
Test: atest com.android.cts.dexmetadata.InstallDexMetadataHostTest
Change-Id: I4f3cd55fbd4d0052500f07aac7d286c397758abc
2018-09-04 14:55:31 -06:00
Jeff Vander Stoep
6026a4adb9
app: Allow all apps to read dropbox FDs
...
DropboxManager may pass FDs to any app with the READ_LOGS
permission which is available to all apps as a development
permission.
Test: atest CtsIncidentHostTestCases
Fixes: 111856304
Change-Id: I329e3125dab83de948b860061df9d232e31cb23e
2018-09-04 20:23:43 +00:00
Mark Salyzyn
74ac780247
llkd: Add stack symbol checking
...
am: 275ea12d84
Change-Id: Ib4a96cdb97871ba77dfa95db76675f0830ef404a
2018-09-04 12:34:26 -07:00
Mark Salyzyn
275ea12d84
llkd: Add stack symbol checking
...
llkd needs the ptrace capabilities and dac override to monitor for
live lock conditions on the stack dumps.
Test: compile
Bug: 33808187
Change-Id: Ibc1e4cc10395fa9685c4ef0ca214daf212a5e126
2018-09-04 17:02:30 +00:00
Kevin Chyn
99979e0ce0
Add BiometricPromptService to sepolicy
...
am: 57887307df
Change-Id: Ibae53ecc88fc79b5cea3c0e4c7b45c7c33685cb4
2018-08-30 15:05:37 -07:00
Kevin Chyn
57887307df
Add BiometricPromptService to sepolicy
...
Bug: 72825012
Test: manual
Change-Id: I850c869cdc0ad8735800130bb4a8d67822197ff9
2018-08-30 11:43:20 -07:00
Mark Salyzyn
055af79ce5
Merge "init: drop /dev/keychord access"
...
am: b54e2b7bb3
Change-Id: I8d8765d96205e012f730a40232d1c967174533c2
2018-08-29 07:53:26 -07:00
Treehugger Robot
b54e2b7bb3
Merge "init: drop /dev/keychord access"
2018-08-29 14:40:32 +00:00
Nick Kralevich
f2735e60ab
Merge "shell: remove /dev/input write access"
...
am: efb6667a2c
Change-Id: I031764af6950f75ba20bdcd15e6311fa8b9e070b
2018-08-28 13:58:57 -07:00
Treehugger Robot
efb6667a2c
Merge "shell: remove /dev/input write access"
2018-08-28 17:53:27 +00:00
Mark Salyzyn
0722b5aab6
init: drop /dev/keychord access
...
Test: compile
Bug: 64114943
Change-Id: I1d20cc027dbd1a94e2a79b6aebdd265cefe8a6a5
2018-08-28 10:33:49 -07:00
Nick Kralevich
51156264b4
shell: remove /dev/input write access
...
Shell access to existing input devices is an abuse vector.
The shell user can inject events that look like they originate
from the touchscreen etc.
Everyone should have already moved to UiAutomation#injectInputEvent
if they are running instrumentation tests (i.e. CTS), Monkey for
their stress tests, and the input command (adb shell input ...) for
injecting swipes and things.
Remove the write ability for shell users, and add a neverallow assertion
(which is also a CTS test) to prevent regressions.
Bug: 30861057
Test: auditallow statement added in
f617a404c2
hasn't triggered.
Test: ran getevent, saw correct output, played with device
Change-Id: Ia78eeec05f6015478dd32bd59505b51fef200a99
2018-08-28 09:19:51 -07:00
Jeff Vander Stoep
08aa715966
crash_dump: disallow ptrace of TCB components
...
Remove permissions and add neverallow assertion.
(cherry picked from commit f1554f1588
)
Bug: 110107376
Test: kill -6 <components excluded from ptrace>
Change-Id: I2dc872f5c02749fbaf8ca6bc7e3e38404151442c
2018-08-28 08:28:25 -07:00
Chia-I Wu
31f88efdad
Merge "Allow signals to hal_graphics_allocator_server from dumpstate"
...
am: ed16534eb5
Change-Id: Icc0d6911546d012cde4f18951e13df32cbaf9785
2018-08-27 11:53:32 -07:00
Treehugger Robot
ed16534eb5
Merge "Allow signals to hal_graphics_allocator_server from dumpstate"
2018-08-27 18:46:28 +00:00
Howard Ro
7e143d0ce7
Merge "Allow all app types to socket send to statsdw (statsd socket)"
...
am: 00f76cb4ff
Change-Id: I72a850cb5d4d51a50d405d90fbe145e63940cb60
2018-08-25 09:14:37 -07:00
Howard Ro
00f76cb4ff
Merge "Allow all app types to socket send to statsdw (statsd socket)"
2018-08-25 00:32:59 +00:00
Nick Kralevich
5a4374c536
auditallow shell input_device:chr_file
...
am: f617a404c2
Change-Id: If6dcba9dcaeb19e1fb12e3ead5868027a3ddfc65
2018-08-24 14:37:25 -07:00
Nick Kralevich
f617a404c2
auditallow shell input_device:chr_file
...
Test to see if anyone is writing to /dev/input from the shell.
Bug: 30861057
Test: device boots and no avc granted messages.
Change-Id: Ia3499ef9436f83cf13c633525348b63edd95990f
2018-08-24 12:40:30 -07:00
Shibin George
57a4327288
Merge "Whitelist some more properties that go into /vendor/build.prop"
...
am: 7ecc8b13ee
Change-Id: I80f9b7d5530f97b2347bb95797b647d73bae3395
2018-08-23 22:19:05 -07:00
Treehugger Robot
7ecc8b13ee
Merge "Whitelist some more properties that go into /vendor/build.prop"
2018-08-24 05:06:33 +00:00
Howard Ro
21bd2aeb08
Allow all app types to socket send to statsdw (statsd socket)
...
Also move statsd to /public/
Bug: 110538431
Test: manual testing
Change-Id: I58319e169eaab7d997ed3628c3c9709cf7bd0d4a
2018-08-23 16:13:30 -07:00
Tri Vo
dc7ab41184
Merge "Rename untrusted_app_visible_*' to include 'violators'."
...
am: 00f28f6d09
Change-Id: Iaa4128625415e469d3cb78f83d274e7a227ea835
2018-08-22 21:04:57 -07:00
Tri Vo
00f28f6d09
Merge "Rename untrusted_app_visible_*' to include 'violators'."
2018-08-23 03:22:20 +00:00