- Jan 07, 2017
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Nick Kralevich authored
All SELinux domains are already granted the ability to read the filenames in /proc, so it's unnecessary to add it to storaged.te. $ grep "proc:dir r_dir_perms" public/domain.te allow domain proc:dir r_dir_perms; Remove redundant rule. Test: policy compiles. Change-Id: I8779cda19176f7eb914778f131bb5b14e5b14448
-
Treehugger Robot authored
* changes: Storaged permissions for task I/O Storaged permission setting
-
ynwang authored
Allow storaged to read /proc/[pid]/io Grant binder access to storaged Add storaged service Grant storaged_exec access to dumpstate Grant storaged binder_call to dumpstate Bug: 32221677 Change-Id: Iecc9dba266c5566817a99ac6251eb943a0bac630
-
ynwang authored
Allowing storaged for reading from pseudo filesystems and debugfs. Bug: 32221677 Change-Id: I837cead9a68f0b399703b64d724cb9c4b205c335
-
Nick Kralevich authored
No denials collected. Bug: 28760354 Test: no denials collected. Test: device boots and no obvious problems Change-Id: I7fc053ecae2db3bb2ca7c298634453e930713bec
-
- Jan 06, 2017
-
-
Nick Kralevich authored
No audits have been recorded for these rules. Remove them. Originally added for backwards compatibility in 549ccf77 as part of the split between cache_file and cache_recovery_file. Bug: 25351711 Test: No audit records recorded Change-Id: I5133028b5fcc99a731aabea90305171dee0edf47
-
Nick Kralevich authored
Don't allow processes to list out the contents of the directory /dev/__properties__. This is an implementation specific detail that shouldn't be visible to processes. Test: Device boots and no problems reading individual properties. Test: ls -la /dev/__properties__ fails Change-Id: I4df6a829b0d22e30fb2c38030c690fc4a356f6a3
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Alex Klyubin authored
-
Treehugger Robot authored
-
Alex Klyubin authored
This leaves only the existence of system_app domain as public API. All other rules are implementation details of this domain's policy and are thus now private. Test: No change to policy according to sesearch, except for disappearance of all allow rules from system_app_current attribute (as expected). Bug: 31364497 Change-Id: Ifc7d350ed9749a32b0c38a78ac5f41c819dbdb96
-
Treehugger Robot authored
-
Alex Klyubin authored
This leaves only the existence of isolated_app domain as public API. All other rules are implementation details of this domain's policy and are thus now private. Test: No change to policy according to sesearch, except for disappearance of all allow rules from isolated_app_current attribute (as expected). Bug: 31364497 Change-Id: I499a648e515628932b7bcd188ecbfbe4a247f2f3
-
- Jan 05, 2017
-
-
Alex Klyubin authored
This leaves the existence of priv_app domain as public API. All other rules are implementation details of this domain's policy and are thus now private. Test: No change to policy according to sesearch, except for disappearance of all allow rules from priv_app_current attribute (as expected) except for allow priv_app_current update_engine_current:binder transfer; which is caused by public update_engine.te rules and will go away once update_engine rules go private. Bug: 31364497 Change-Id: Iea583127fbf0a19c37dd42bf1ef2ae0454793391
-
Alex Klyubin authored
This leaves only the existence of untrusted_app domain as public API. All other rules are implementation details of this domain's policy and are thus now private. Test: No change to policy according to sesearch, except for disappearance of all allow rules from untrusted_domain_current attribute (as expected). Bug: 31364497 Change-Id: Ief71fa16cfc38437cbe5c58100bba48b9a497c92
-
Nick Kralevich authored
Commit fee49159 introduced the net_radio_prop and system_radio_prop properties, and added allow rules for backwards compatibility. In addition, auditallow rules were added to see if the allow rules were necessary. The auditallow rules for radio net_radio_prop are triggering, so it's clear these properties are being set by the radio process. Drop the auditallow statement. Test: policy compiles. Change-Id: I7fa6df18ed4dd4cb8e0c9098373cc28134615330
-
dcashman authored
Simulate platform and non-platform split by compiling two different file_contexts files and loading them together on-device. Leave the existing file_contexts.bin in place until we're ready to build images based on the new files. Bug: 31363362 Test: Builds and boots without additional denials. Change-Id: I7248f876e2230cee3b3cbf386422063da1e3dde0 Bring back file_contexts.bin. Change-Id: Ifec2c363579151080fdec48e8bc46bbbc8c97674 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
- Jan 04, 2017
-
-
Nick Kralevich authored
/proc/tty/drivers is read by applications to figure out if they are running in an emulated environment. Specifically, they look for the string "goldfish" within that file. Arguably this is not an Android API, and really shouldn't be exposed to applications, but: 1) A largish number of applications break if they can't read this file; 2) The information here isn't particularly sensitive While we could spend a bunch of time trying to get applications fixed, there are bigger fish to fry. It's not worth the battle. Test: "ls -laZ /proc/tty/drivers" is labeled properly. Bug: 33214085 Bug: 33814662 Bug: 33791054 Bug: 33211769 Bug: 26813932 Change-Id: Icc05bdc1c917547a6dca7d76636a1009369bde49
-
- Jan 03, 2017
-
-
Treehugger Robot authored
-
Alexey Polyudov authored
Change-Id: I79a305407c3a362d7be11f4c026f31f1e9666f1c Signed-off-by:
Alexey Polyudov <apolyudov@google.com>
-
Nick Kralevich authored
Allow init to send userspace generated SELinux denials to the kernel audit subsystem. Test: "setprop asdf asdf" from the unprivileged adb shell user generated an SELinux denial processed by logd. Bug: 27878170 Change-Id: I0ecd0601408bbda8227802c13689f98e507282d1
-
Treehugger Robot authored
-
- Dec 29, 2016
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Alex Klyubin authored
-
Mark Salyzyn authored
We allow domains to manually transition to logpersist for userdebug or eng debug logging permissions that would be counter to monitoring limits on a released user build. Test: compile Bug: 30566487 Change-Id: I03a81c75cbd2b44617e4b27c4c083a26a0e0fa87
-
Steven Moreland authored
Bug: 31982882 Test: works with wip bullhead binderized dumpstate implementation Change-Id: Iae964f49b3c2704688ded8e7366d89ace35a92aa
-
Ashutosh Joshi authored
Adding sepoilcy for sensors. Test: Sensors work. Change-Id: Ibbf0c1a22654a17b1573e3761ea9ccd816150255
-
Alex Klyubin authored
6e4508e6 inadvertently removed access to ro.serialno and ro.boot.serialno from ADB shell. This is needed for CTS. This commit thus reinstates the access. Test: adb shell getprop ro.serialno Bug: 33700679 Change-Id: I62de44b1631c03fcd64ceabaf33bbaeb869c2851
-
ashutoshj authored
-
ashutoshj authored
-
- Dec 28, 2016
-
-
Ashutosh Joshi authored
Adding sepolicty for contexthub service. Test: GTS tests pass. Change-Id: I2576b8028d12a31151d7b7869679b853eb16c75e
-
Richard Uhler authored
Test: make checkbuild, aosp_bullhead-userdebug boots. Bug: 33192586 Change-Id: I386df8b6c04fb162f79a4409801ce3e882026ea8
-
Alex Klyubin authored
This removes access to Bluetooth system properties from arbitrary SELinux domains. Access remains granted to init, bluetooth, and system_app domains. neverallow rules / CTS enforce that access is not granted to Zygote and processes spawned from Zygote expcept for system_app and bluetooth. The reason is that some of these properties may leak persistent identifiers not resettable by the user. Test: Bluetooth pairing and data transfer works Bug: 33700679 Change-Id: Icdcb3927a423c4011a62942340a498cc1b302472
-
Treehugger Robot authored
-
- Dec 27, 2016
-
-
Amit Mahajan authored
Test: Verified that WIP telephony and BT SAP CLs work fine with this change https://android-review.googlesource.com/#/q/topic:%22Basic+radio+service+and+client%22+(status:open+OR+status:merged) https://android-review.googlesource.com/#/q/topic:%22SAP+HAL%22+(status:open+OR+status:merged) Bug: 32020264 Change-Id: If15820d43e324d80e35808a292ee811f98d499cc
-
Treehugger Robot authored
-