Skip to content
Snippets Groups Projects
  1. Jan 07, 2017
  2. Jan 06, 2017
  3. Jan 05, 2017
    • Alex Klyubin's avatar
      Move priv_app policy to private · 92295ef8
      Alex Klyubin authored
      This leaves the existence of priv_app domain as public API. All other
      rules are implementation details of this domain's policy and are thus
      now private.
      
      Test: No change to policy according to sesearch, except for
            disappearance of all allow rules from priv_app_current
            attribute (as expected) except for
            allow priv_app_current update_engine_current:binder transfer;
            which is caused by public update_engine.te rules and will go
            away once update_engine rules go private.
      Bug: 31364497
      
      Change-Id: Iea583127fbf0a19c37dd42bf1ef2ae0454793391
      92295ef8
    • Alex Klyubin's avatar
      Move untrusted_app policy to private · fce60d3d
      Alex Klyubin authored
      This leaves only the existence of untrusted_app domain as public API.
      All other rules are implementation details of this domain's policy and
      are thus now private.
      
      Test: No change to policy according to sesearch, except for
            disappearance of all allow rules from untrusted_domain_current
            attribute (as expected).
      Bug: 31364497
      
      Change-Id: Ief71fa16cfc38437cbe5c58100bba48b9a497c92
      fce60d3d
    • Nick Kralevich's avatar
      Drop auditallow radio net_radio_prop:property_service set; · 030188f3
      Nick Kralevich authored
      Commit fee49159 introduced the net_radio_prop and system_radio_prop
      properties, and added allow rules for backwards compatibility. In
      addition, auditallow rules were added to see if the allow rules were
      necessary.
      
      The auditallow rules for radio net_radio_prop are triggering, so it's
      clear these properties are being set by the radio process. Drop the
      auditallow statement.
      
      Test: policy compiles.
      Change-Id: I7fa6df18ed4dd4cb8e0c9098373cc28134615330
      030188f3
    • dcashman's avatar
      Split file_contexts for on-device compilation. · d225b697
      dcashman authored
      
      Simulate platform and non-platform split by compiling two different
      file_contexts files and loading them together on-device.  Leave the existing
      file_contexts.bin in place until we're ready to build images based on the new
      files.
      
      Bug: 31363362
      Test: Builds and boots without additional denials.
      Change-Id: I7248f876e2230cee3b3cbf386422063da1e3dde0
      
      Bring back file_contexts.bin.
      
      Change-Id: Ifec2c363579151080fdec48e8bc46bbbc8c97674
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      d225b697
  4. Jan 04, 2017
    • Nick Kralevich's avatar
      untrusted_app: allow access to /proc/tty/drivers · e427a2b2
      Nick Kralevich authored
      /proc/tty/drivers is read by applications to figure out if they are
      running in an emulated environment. Specifically, they look for the
      string "goldfish" within that file.
      
      Arguably this is not an Android API, and really shouldn't be exposed to
      applications, but:
      
      1) A largish number of applications break if they can't read this file;
      2) The information here isn't particularly sensitive
      
      While we could spend a bunch of time trying to get applications fixed,
      there are bigger fish to fry. It's not worth the battle.
      
      Test: "ls -laZ /proc/tty/drivers" is labeled properly.
      Bug: 33214085
      Bug: 33814662
      Bug: 33791054
      Bug: 33211769
      Bug: 26813932
      Change-Id: Icc05bdc1c917547a6dca7d76636a1009369bde49
      e427a2b2
  5. Jan 03, 2017
  6. Dec 29, 2016
  7. Dec 28, 2016
    • Ashutosh Joshi's avatar
      Add sepolicy for contexthub HAL · e8d0bdae
      Ashutosh Joshi authored
      Adding sepolicty for contexthub service.
      
      Test: GTS tests pass.
      Change-Id: I2576b8028d12a31151d7b7869679b853eb16c75e
      e8d0bdae
    • Richard Uhler's avatar
      Remove option for non-pic dex preopt. · c5c3abc6
      Richard Uhler authored
      Test: make checkbuild, aosp_bullhead-userdebug boots.
      Bug: 33192586
      
      Change-Id: I386df8b6c04fb162f79a4409801ce3e882026ea8
      c5c3abc6
    • Alex Klyubin's avatar
      Restrict access to Bluetooth system properties · 6e4508e6
      Alex Klyubin authored
      This removes access to Bluetooth system properties from arbitrary
      SELinux domains. Access remains granted to init, bluetooth, and
      system_app domains. neverallow rules / CTS enforce that access is not
      granted to Zygote and processes spawned from Zygote expcept for
      system_app and bluetooth.
      
      The reason is that some of these properties may leak persistent
      identifiers not resettable by the user.
      
      Test: Bluetooth pairing and data transfer works
      Bug: 33700679
      Change-Id: Icdcb3927a423c4011a62942340a498cc1b302472
      6e4508e6
    • Treehugger Robot's avatar
      0555222d
  8. Dec 27, 2016
Loading