Skip to content
Snippets Groups Projects
  1. Mar 13, 2018
  2. Mar 12, 2018
  3. Mar 11, 2018
  4. Mar 09, 2018
  5. Mar 08, 2018
  6. Mar 07, 2018
    • Joel Galenson's avatar
      Use user policy when checking neverallow rules. · 053cb341
      Joel Galenson authored
      When building userdebug or eng builds, we still want to build the user
      policy when checking neverallow rules so that we can catch compile
      errors.
      
      Commit c0713e86 split out a helper function but lost one instance of
      using user instead of the real variant.  This restores that one and
      adds it to the neverallow check.
      
      Bug: 74344625
      Test: Added a rule that referred to a type defined only
      in userdebug and eng and ensure we throw a compile error when building
      userdebug mode.
      
      Change-Id: I1a6ffbb36dbeeb880852f9cbac880f923370c2ae
      053cb341
    • TreeHugger Robot's avatar
    • Ruchi Kandoi's avatar
      Add secure_element_device · e0e2342e
      Ruchi Kandoi authored
      Test: eSE initializes at boot
      Bug: 64881253
      Change-Id: Ib2388b7368c790c402c000adddf1488bee492cce
      (cherry picked from commit ea3cf000)
      e0e2342e
    • Kweku Adams's avatar
      Enabling incidentd to get top and ps data. · bcf8b115
      Kweku Adams authored
      Bug: 72177715
      Bug: 72384374
      Test: flash device and make sure incidentd is getting data without SELinux denials
      Change-Id: I684fe014e19c936017a466ec2d6cd2e1f03022c0
      (cherry picked from commit 06ac7dba)
      bcf8b115
    • TreeHugger Robot's avatar
    • Joel Galenson's avatar
      Clean up bug_map. · f3f93eaf
      Joel Galenson authored
      Remove a fixed bug from bug_map.
      
      Bug: 62140539
      Test: Built policy.
      Change-Id: I2ce9e48de92975b6e37ca4a3a4c53f9478b006ef
      f3f93eaf
    • Joel Galenson's avatar
      Track platform_app SELinux denial. · 2995e996
      Joel Galenson authored
      This should fix presubmit tests.
      
      Bug: 74331887
      Test: Built policy.
      Change-Id: Ie9ef75a7f9eaebf1103e3d2f3b4521e9abaf2fe7
      2995e996
    • Chenbo Feng's avatar
      Fix sepolicy for bpf object · 6cd70c2f
      Chenbo Feng authored
      With the new patches backported to 4.9 kernels, the bpf file system now
      take the same file open flag as bpf_obj_get. So system server now need
      read permission only for both bpf map and fs_bpf since we do not need
      system server to edit the map. Also, the netd will always pass stdin
      stdout fd to the process forked by it and do allow it will cause the
      fork and execev fail. We just allow it pass the fd to bpfloader for now
      until we have a better option.
      
      Test: bpfloader start successful on devices with 4.9 kernel.
            run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest
      Bug: 74096311
      Bug: 30950746
      
      Change-Id: I747a51cb05ae495c155e7625a3021fc77f921e0d
      6cd70c2f
  7. Mar 05, 2018
    • Daichi Ueura's avatar
      sepolicy(hostapd): Allow socket based control iface · e0290858
      Daichi Ueura authored
      Update sepolicy permission to allow hostapd to setup
      socket for socket based control interface.
      
      Sepolicy denial for accessing /data/vendor/wifi/hostapd/ctrl:
      02-23 12:32:06.186  3068  3068 I hostapd : type=1400 audit(0.0:36):
      avc: denied { create } for name="ctrl"
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=dir permissive=1
      
      02-23 12:32:06.186  3068  3068 I hostapd : type=1400 audit(0.0:37):
      avc: denied { setattr } for name="ctrl" dev="sda35" ino=131410
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=dir permissive=1
      
      02-23 12:32:06.190  3068  3068 I hostapd : type=1400 audit(0.0:38):
      avc: denied { create } for name="wlan0"
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=sock_file permissive=1
      
      02-23 12:32:06.190  3068  3068 I hostapd : type=1400 audit(0.0:39):
      avc: denied { setattr } for name="wlan0" dev="sda35" ino=131411
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=sock_file permissive=1
      
      Bug: 73419160
      Test: Manual check that softAp works
      Change-Id: I2e733e168feceeab2d557f7704832c143e352375
      e0290858
  8. Mar 02, 2018
  9. Mar 01, 2018
Loading