- 23 Jun, 2016 1 commit
-
-
Daniel Micay authored
This allows the shell user to control whether unprivileged access to perf events is allowed. To enable unprivileged access to perf: adb shell setprop security.perf_harden 0 To disable it again: adb shell setprop security.perf_harden 1 This allows Android to disable this kernel attack surface by default, while still allowing profiling tools to work automatically. It can also be manually toggled, but most developers won't ever need to do that if tools end up incorporating this. (Cherry picked from commit 38ac77e4c2b3c3212446de2f5ccc42a4311e65fc) Bug: 29054680 Change-Id: Idcf6a2f6cbb35b405587deced7da1f6749b16a5f
-
- 27 May, 2016 2 commits
-
-
Nick Kralevich authored
SELinux defines various classes for various socket types, including tcp_socket, udp_socket, rawip_socket, netlink_socket, etc. Socket classes not known to the SELinux kernel code get lumped into the generic "socket" class. In particular, this includes the AF_MSM_IPC socket class. Bluetooth using apps were granted access to this generic socket class at one point in 2012. In 16011320, a TODO was added indicating that this access was likely unnecessary. In cb835a28, an auditallow was added to test to see if this rule was actually used, and in master branch d0113ae0, this rule was completely deleted. Revoke access to the generic socket class for isolated_app, untrusted_app, and shell for older Android releases. This is conceptually a backport of d0113ae0, but affecting fewer domains to avoid potential breakage. Add a neverallow rule asserting that this rule isn't present for the untrusted domains. Contrary to our usual conventions, the neverallow rule is placed in bluetooth.te, to avoid merge conflicts and simplify patching. Bug: 28612709 Bug: 25768265 Change-Id: Ibfbb67777e448784bb334163038436f3c4dc1b51
-
Jeff Vander Stoep authored
Restrict unix_dgram_socket and unix_stream_socket to a whitelist for all domains. Remove ioctl permission for netlink_selinux_socket and netlink_route_socket for netdomain. Bug: 28171804 Bug: 27424603 Change-Id: I650639115b8179964ae690a39e4766ead0032d2e
-
- 12 Jan, 2016 3 commits
-
-
Jeff Vander Stoep authored
am: f290a2dd * commit 'f290a2dd': DO NOT MERGE: Further restrict access to socket ioctl commands
-
Jeff Vander Stoep authored
am: c0ce53cc * commit 'c0ce53cc': DO NOT MERGE: Further restrict access to socket ioctl commands
-
Jeff Vander Stoep authored
am: 57531cac * commit '57531cac': DO NOT MERGE: Further restrict access to socket ioctl commands
-
- 05 Jan, 2016 1 commit
-
-
Jeff Vander Stoep authored
Remove untrusted/isolated app access to device private commands. Only allow shell user to access unprivileged socket ioctl commands. Bug: 26324307 Bug: 26267358 Change-Id: Iddf1171bc05c7600e0292f925d18d748f13a98f2
-
- 18 Dec, 2015 1 commit
-
-
Amith Yamasani authored
Bug: 26211308 Change-Id: I8fd2d14ea52d49a33e6cdbcdf90630eea89f7dd0
-
- 29 Oct, 2015 2 commits
-
-
dcashman authored
binderservicedomain services often expose their methods to untrusted clients and rely on permission checks for access control. Allow these services to query the permission service for access decisions. Bug: 25282923 Change-Id: I39bbef479de3a0df63e0cbca956f3546e13bbb9b
- 22 Oct, 2015 2 commits
-
-
Anthony Hugh authored
-
Anthony Hugh authored
This reverts commit cda36e31. This will be moved to a device specific file. BUG: 24555181 Change-Id: I0eb543211245c37da77bbf42449f70ff3fdf79ec
-
- 21 Oct, 2015 4 commits
-
-
Bill Yi authored
- 19 Oct, 2015 3 commits
-
-
Nick Kralevich authored
am: 6ab438dc * commit '6ab438dc': untrusted_apps: Allow untrusted apps to find healthd_service.
-
Nick Kralevich authored
-
Ruchi Kandoi authored
This allows apps to find the healthd service which is used to query battery properties. Bug: 24759218 Change-Id: I72ce5a28b2ffd57aa424faeb2d039b6c92f9597d Signed-off-by:
Ruchi Kandoi <kandoiruchi@google.com>
-
- 14 Oct, 2015 4 commits
-
-
Nick Kralevich authored
* commit '9fcc949f': bluetooth.te: Relax bluetooth neverallow rule.
-
Nick Kralevich authored
* commit '63af426a': bluetooth.te: Relax bluetooth neverallow rule.
-
Nick Kralevich authored
am: 33a779fe * commit '33a779fe': bluetooth.te: Relax bluetooth neverallow rule.
-
Nick Kralevich authored
Bug: 24866874 Change-Id: Ic13ad4d3292fe8284e5771a28abaebb0ec9590f0
-
- 25 Sep, 2015 1 commit
-
-
Bryce Lee authored
Bug: 21445745 Change-Id: I59fd20f61a5e669e000f696f3738cc11071920aa
-
- 15 Sep, 2015 2 commits
-
-
Lorenzo Colitti authored
* commit '48dae29f': Allow system_server to bind ping sockets.
-
Lorenzo Colitti authored
-
- 14 Sep, 2015 1 commit
-
-
Lorenzo Colitti authored
This allows NetworkDiagnostics to send ping packets from specific source addresses in order to detect reachability problems on the reverse path. This addresses the following denial: [ 209.744636] type=1400 audit(1441805730.510:14): avc: denied { node_bind } for pid=8347 comm="Thread-202" saddr=2400:xxxx:xxxx:xxxx:40b1:7e:a1d7:b3ae scontext=u:r:system_server:s0 tcontext=u:object_r:node:s0 tclass=rawip_socket permissive=0 Bug: 23661687 (cherry picked from commit c3712143) Change-Id: Ia93c14bc7fec17e2622e1b48bfbf591029d84be2
-
- 11 Sep, 2015 1 commit
-
- 10 Sep, 2015 1 commit
-
-
dcashman authored
CTS relies on the ability to see all services on the system to make sure the dump permission is properly enforced on all services. Allow this. Bug: 23476772 Change-Id: I144b825c3a637962aaca59565c9f567953a866e8
-
- 01 Sep, 2015 1 commit
-
-
Sharvil Nanavati authored
Bug: 23375670 Change-Id: I0454c580b465a2f0edc928cf0effb71733866f03
-
- 28 Aug, 2015 10 commits
-
-
Nick Kralevich authored
* commit '58aa4481':
-
Nick Kralevich authored
* commit 'ed21ab14':