- Jan 29, 2018
-
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72472544 Test: Built policy. Change-Id: I01f0fe3dc759db66005e26d15395893d494c4bb7
-
Tom Cherry authored
vendor_init exists on the system partition, but it is meant to be an extention of init that runs with vendor permissions for executing vendor scripts, therefore it is not meant to be in coredomain. Bug: 62875318 Test: boot walleye Merged-In: I01af5c9f8b198674b15b90620d02725a6e7c1da6 Change-Id: I01af5c9f8b198674b15b90620d02725a6e7c1da6
-
- Jan 28, 2018
-
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72550646 Test: Built policy. Change-Id: I51345468b7e74771bfa2958efc45a2a839c50283
-
- Jan 25, 2018
-
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72507494 Test: Built policy. Change-Id: I56944d92232c7a715f0c88c13e24f65316805c39
-
Tom Cherry authored
The exception for vendor_init in this neverallow was never needed. Bug: 62875318 Test: Build walleye, bullhead Change-Id: Iac2b57df30b376492851d7520994e0400a87f1e1
-
Joel Galenson authored
We are occasionally seeing the following SELinux denial: avc: denied { read } for comm="idmap" path="/proc/947/mounts" scontext=u:r:idmap:s0 tcontext=u:r:installd:s0 tclass=file This commit suppresses that exact denial. We believe this is occurring when idmap is forked from installd, which is reading its mounts file in another thread. Bug: 72444813 Test: Boot Walleye and test wifi and camera. Change-Id: I3440e4b00c7e5a708b562a93b304aa726b6a3ab9
-
Andreas Gampe authored
Allow dumpstate & system server watchdog to dump statsd stacks. Bug: 72461610 Test: m Change-Id: I4c3472881da253f85d54b5e5b767b06e2618af9c
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72444813 Test: Built policy. Change-Id: I5b8661b34c9417cd95cb0d6b688443dcbe0d1c0b
-
- Jan 24, 2018
-
-
Jaekyun Seok authored
Since /product is an extension of /system, its file contexts should be consistent with ones of /system. Bug: 64195575 Test: tested installing a RRO, apps, priv-apps and permissions Change-Id: I7560aaaed852ba07ebe1eb23b303301481c897f2
-
yinxu authored
Bug: 64131518 Test: Compile and flash the device, check whether service vendor.radio-config-hal-1-0 starts Change-Id: Id728658b4acdda87748259b74e6b7438f6283ea5
-
yro authored
health hal service for battery metrics. Test: cts test, manual test Change-Id: I73a801f6970e25bee5921479f2f7078bcb1973a9
-
yro authored
Test: manual testing Change-Id: Ia97c956c08d2062af6b33622c6b61ca3810b0cb1
-
Janis Danisevskis authored
Bug: 63928580 Test: Manually tested. Change-Id: If6bb10cb7c009883d853e46dcdeb92cd33877d53
-
Max Bires authored
This change will allow traceur to pass a file descriptor to another app in order to allow that app to process trace data files. E.g. in the use case that someone would like to email the traces they collected and pass the trace data files to gmail, this will now be permitted. Bug:68126425 Test: Traceur can pass fd's to untrusted apps for processing Change-Id: If0507b5d1f06fd8400e04bd60e06a44153dc59b7
-
Marissa Wall authored
Do not let apps read /proc/uid_cpupower/time_in_state, /proc/uid_cpupower/concurrent_active_time, /proc/uid_cpupower/concurrent_policy_time. b/71718257 Test: Check that they can't be read from the shell without root permissions and system_server was able to read them Change-Id: I812694adfbb4630f7b56aa7096dc2e6dfb148b15
-
Joel Galenson authored
Init tries to write /proc/sys/vm/min_free_order_shift but fails due to a SELinux denial. This gives the file a new label and gives init the ability to write it. Test: Build and booted Sailfish (a couple of days ago). Change-Id: Ic93862b85c468afccff2019d84b927af9ed2a84d
-
- Jan 23, 2018
-
-
Tom Cherry authored
vendor_init doesn't have permissions to read rootfs labeled files, but needs to read /vendor_file_contexts to do restorecon correctly. This file is a file_contexts file, so labeling it as such seems appropriate. Test: bullhead + vendor_init doesn't hit this audit Change-Id: I1f2cf7dd7de17806ac0f1dfe2483fb6d6659939b
-
Dongwon Kang authored
This is an experimental feature only on userdebug and eng build. Test: play MP4 file. install & uninstall media update apk. Bug: 67908547 Change-Id: I513cdbfda962f00079e886b7a42f9928e81f6474
-
Yi Jin authored
Bug: 64222712 Test: manual Change-Id: Ica77ae3c9e535eddac9fccf11710b0bcb3254ab3
-
Max Bires authored
getattr for trace_data_file:dir permissions was missing, impacting functionality. Bug:68126425 Test: Traceur functionality is properly working Change-Id: I2c8ae5cf3463a8e5309b8402713744e036a64171
-
Tri Vo authored
And grant appropriate permissions to more granular types. Bug: 29319732 Bug: 65643247 Test: adb bugreport; no new denials to /proc or /sys files. Change-Id: Ied99546164e79bfa6148822858c165177d3720a5
-
- Jan 22, 2018
-
-
Steven Moreland authored
Now that init no longer uses it. Fixes: 70846424 Test: no neverallows tripped Change-Id: I5c22dd272b66fd32b4758c1dce659ccd98b8a7ba
-
Max Bires authored
Fixing denials that stopped traceur from being able to write to debugfs_tracing. Also cleaning up general find denials for services that traceur doesn't have permission to access. Additionally, labeling /data/local/trace as a trace_data_file in order to give traceur a UX friendly area to write its traces to now that it will no longer be a shell user. It will be write/readable by traceur, and deletable/readable by shell. Test: Traceur functionality is not being blocked by selinux policy Bug: 68126425 Change-Id: I201c82975a31094102e90bc81454d3c2a48fae36
-
Steven Moreland authored
This util allows init to turn off the screen without any binder dependencies. Bug: 70846424 Test: manual + init use Change-Id: I4f41a966d6398e959ea6baf36c2cfe6fcebc00de
-
- Jan 20, 2018
-
-
Badhri Jagan Sridharan authored
Sepolicy for the usb daemon. (ag/3373886/) Bug: 63669128 Test: Checked for avc denial messages. Change-Id: I6e2a4ccf597750c47e1ea90c4d43581de4afa4af
-
Tri Vo authored
Bug: 65643247 Test: walleye boots with no denials from priv_app. Change-Id: I9a7faf1253bdd79d780c2398c740109e2d84bc63
-
Tri Vo authored
Bug: 65643247 Test: manual Test: browse internet Test: take a picture Change-Id: I9faff44b7a025c7422404d777113e40842ea26dd
-
- Jan 19, 2018
-
-
Tao Bao authored
system_update service manages system update information: system updater (priv_app) publishes the pending system update info through the service, while other apps can read the info accordingly (design doc in go/pi-ota-platform-api). This CL adds the service type, and grants priv_app to access the service. Bug: 67437079 Test: Build and flash marlin image. The system_update service works. Change-Id: I7a3eaee3ecd3e2e16b410413e917ec603566b375
-
Paul Crowley authored
Bug: 63927601 Test: Enable metadata encryption in fstab on Taimen, check boot success. Change-Id: Id425c47d48f413d6ea44ed170835a52d0af39f9f
-
Daniel Rosenberg authored
Test: esdfs should be mountable and usable with selinux on Bug: 63876697 Change-Id: I7a1d96d3f0d0a6dbc1c98f0c4a96264938011b5e
-
Yifan Hong authored
Test: boots Test: hwservicemanager can read these files Bug: 36790901 Change-Id: I0431a7f166face993c1d14b6209c9b502a506e09
-
Badhri Jagan Sridharan authored
Bug: 63669128 Test: Checked for avc denail messages. Change-Id: I057b3cf9ccc945cb943b9cf60fc9cd6c023eddda Merged-In: I057b3cf9ccc945cb943b9cf60fc9cd6c023eddda
-
Yao Chen authored
Selinux violations while calling dump() on statsd by bugreport. avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:statsd:s0 tclass=binder permissive=1 denied { use } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fd permissive=1 avc: denied { write } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 avc: denied { getattr } for path="pipe:[411602]" dev="pipefs" ino=411602 scontext=u:r:statsd:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 Test: manual Change-Id: I46c5b119548378cc80c6e4498d00edad5959d188
-
Steven Moreland authored
Bug: 70846424 Test: neverallow not tripped Change-Id: I9e351ee906162a594930b5ab300facb5fe807f13
-
- Jan 18, 2018
-
-
Tri Vo authored
Bug: 65643247 Test: builds, the change doesn't affect runtime behavior. Change-Id: I621a8006db7074f124cb16a12662c768bb31e465
-
Pavel Grafov authored
This is needed to allow system apps to know whether security logging is enabled, so that they can in this case log additional audit events. Test: logged a security event from locally modified KeyChain app. Bug: 70886042 Change-Id: I9e18d59d72f40510f81d1840e4ac76a654cf6cbd
-
Jeff Vander Stoep authored
avc: denied { read } scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file avc: denied { read } scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:wifi_prop:s0 tclass=file avc: denied { read } scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:net_dns_prop:s0 tclass=file Bug: 72151306 Test: build Change-Id: I4b658ccd128746356f635ca7955385a89609eea1
-
Jaekyun Seok authored
Since /odm is an extension of /vendor, its default property contexts should be consistent with ones of /vendor. Bug: 36796459 Test: tested on wahoo devices Change-Id: Ia67ebe81e9c7102aab35a34f14738ed9a24811d3
-
- Jan 17, 2018
-
-
Chenbo Feng authored
Add a new set of sepolicy for the process that only netd use to load and run ebpf programs. It is the only process that can load eBPF programs into the kernel and is only used to do that. Add some neverallow rules regarding which processes have access to bpf objects. Test: program successfully loaded and pinned at sys/fs/bpf after device boot. No selinux violation for bpfloader Bug: 30950746 Change-Id: Ia6bb1afda29ae0749bdc368e2dfc5faa12e81b2f
-
Tri Vo authored
CpuFrequency.java seems to be the only thing that depends on /sys/devices/system/cpu in system_server. And according to b/68988722#comment15, that dependency is not exercised. Bug: 68988722 Test: walleye boots without denials to sysfs_devices_system_cpu Change-Id: If777b716bf74188581327b7f5aa709f5d88aad2d
-