- Aug 26, 2017
-
-
TreeHugger Robot authored
-
- Aug 25, 2017
-
-
TreeHugger Robot authored
-
- Aug 24, 2017
-
-
Jeff Vander Stoep authored
Commit 780a71e7 changed ueventd's selinux label lookup from /dev/input/ to /dev/input which no longer matches the regex in core policy file_contexts. Fix the regex to match /dev/input and /dev/input/. avc: denied { read } for name="input" dev="tmpfs" ino=14092 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:device:s0 tclass=dir avc: denied { open } for path="/dev/input" dev="tmpfs" ino=14092 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:device:s0 tclass=dir Change-Id: I8f42f5cd96fc8353bf21d3ee6c3de9e2872f229f Fixes: 64997761 Fixes: 64954704 Test: no camera HAL denials
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
John Stultz authored
This patch tries to provide similar functionality as the previous change made here: https://android-review.googlesource.com/#/c/platform/system/sepolicy/+/432339/ Only, making sure we add the same map permissions for the vendor directory. Signed-off-by:
John Stultz <john.stultz@linaro.org> (cherry picked from commit 24537b2e) Bug: 65011018 Test: policy compiles. Change-Id: I4d0319011ef4ef043134bf299dc4823a6c418717
-
Jeff Vander Stoep authored
Configstore HAL uses a seccomp filter which blocks the standard path of execing crash_dump to collect crash data. Add permission to use crash_dump's fallback mechanism. Allowing configstore to write to the socket provided by tombstoned required either exempting configstore from a neverallow rule, or removing the neverallow rule entirely. Since the neverallow rule could potentially prevent partners for doing security hardening, it has been removed. Bug: 64768925 Bug: 36453956 Test: killall -ABRT android.hardware.configstore@1.1-service Results in a call stack in logcat, and tombstone in /data/tombstones Test: configstore runs without crashing Test: SANITIZE_TARGET="address coverage" make vts -j64 vts-tradefedrun commandAndExit vts --skip-all-system-status-check \ -primary-abi-only --skip-preconditions -l VERBOSE --module \ VtsHalConfigstoreV1_0IfaceFuzzer Change-Id: I1ed5265f173c760288d856adb9292c4026da43d6 (cherry picked from commit 9924d782)
-
- Aug 23, 2017
-
-
Michael Wright authored
Bug: 64982450 Test: manual Change-Id: Ic5d25b8a12271e5bfa71e30843a36fb643b914ff
-
- Aug 18, 2017
-
-
TreeHugger Robot authored
-
- Aug 17, 2017
-
-
TreeHugger Robot authored
* changes: DO NOT MERGE: use 'expandattribute' for untrusted_app_visible_hwservice DO NOT MERGE: Add a way to allow untrusted_apps to talk to halserver domains DO NOT MERGE: Revert "Revert "Remove neverallow preventing hwservice access for apps.""
-
Sandeep Patil authored
Bug: 62658302 Test: Boot device and observe no new denials Change-Id: If9a21610897b14a419f276289818127412c29c55 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
Vendor HAL extentsions are currently allowed to discover hardware services that are labelled with 'untrusted_app_visible_hwservice'. However, the policy doesn't allow these apps to talk to these services. This CL makes sure that is now possible via the 'untrusted_app_visible_halserver' attribute for vendor domains that host such a service. Bug: 64382381 Test: Boot device and observe no new denials. Change-Id: I1ffc1a62bdf7506a311f5a19acdab8c7caec902b Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
- Aug 16, 2017
-
-
Corey Tabaka authored
Performanced needs to talk to the permission service to verify permissions of clients to access certain restricted scheduler policies. Bug: 64337476 Test: performance_service_tests passes; logs do not contain avc denials for performanced -> permission service. Change-Id: I31618ab1d3e79c3c10138d567b0f5606527020f9
-
Yifan Hong authored
-
Sandeep Patil authored
This reverts commit ceed7204. New HALs services that are added in the policy while the CL was reverted will are not made visible to applications by default. They are: hal_neuralnetworks_hwservice hal_wifi_offload_hwservice system_net_netd_hwservice thermalcallback_hwservice Bug: 64578796 Test: Boot device Change-Id: I84d65baddc757a5b0a38584430eff79a383aa8e0 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Dan Cashman authored
Make sure that any attributes removed from policy are declared in the mapping file, in case they are relied upon by vendor policy. Bug: 36899958 Test: Builds successfull, but not with removed attribute not in mapping file. Change-Id: I25526cd88a50e90513ae298ccf4f2660e4627fb4
-
Bowgo Tsai authored
Bug: 63910933 Test: boot sailfish in normal mode, checks adbd is started Test: boot sailfish in recovery mode, checks adbd is started Test: boot bullhead in normal mode, checks adbd is started Test: boot bullhead in recovery mode, checks adbd is started Change-Id: I35ed78a15a34626fbd3c21d030e2bf51033f7b79
-
- Aug 15, 2017
-
-
Yifan Hong authored
Test: gts-tradefed run gts-dev --module=GtsSecurityHostTestCases Bug: 64127136 Change-Id: Ib50294488bb1a5d46faed00d6954db64648fed20
-
TreeHugger Robot authored
-
- Aug 14, 2017
-
-
Dan Cashman authored
The treble compatibility tests check for policy differences between old and new policy. To do this correctly, we must not modify the policy which represents the older policies. Move the files meant to be changed to a different location from the ones that are not meant to be touched to avoid any undesired changes to old policy, e.g. commit: 2bdefd65078d890889672938c6f0d2accdd25bc5 Bug: 36899958 Test: Build-time tests build. Change-Id: I8fa3947cfae756f37556fb34e1654382e2e48372
-
TreeHugger Robot authored
-
- Aug 12, 2017
-
-
Martijn Coenen authored
-
- Aug 11, 2017
-
-
TreeHugger Robot authored
-
Dan Cashman authored
untrusted_app_visible_hwservice was an attribute that was meant to give partners time to add their HALs to AOSP. It was removed from mr1 and so needs to be accounted for in the compatibility mapping. Bug: 64321916 Test: Builds with treble policy tests. Change-Id: I359a842083016f0cf6c9d7ffed2116feb9e159c6
-
Steven Moreland authored
Only seeing this denial in permissive: allow shell screencap_exec:file getattr; Bug: 37565047 Test: adb shell screencap w/o root Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
-
Martijn Coenen authored
On Full Treble devices, servicemanager should only service services from the platform service_contexts file. Created new type to separate plat_ and nonplat_service_contexts, and added new type to mapping (although I don't think this type should have been used by vendors). Bug: 36866029 Test: Marlin/Taimen boot Change-Id: Ied112c64f22f8486a7415197660faa029add82d9
-
- Aug 09, 2017
-
-
Jin Qian authored
Allow vendors to extend e2fs rules to format other partitions. Bug: 64430395 Change-Id: I51566f72dea814af97b1fedbd4618cd4095d64c3
-
Dan Cashman authored
Also fix up set() additions in mini_parser.py and add global reference to the parser in tests for clarity. Bug: 36899958 Test: rm public type in old policy from policy and observe test failure. Change-Id: I6cba2473526798be871cd69249c9bbc6df2c5b4c
-
- Aug 08, 2017
-
-
Dan Cashman authored
Add support to the treble_sepolicy_tests suite that explicitly look at the old and current policy versions, as well as the compatibility file, to determine if any new types have been added without a compatibility entry. This first test catches the most common and likely changes that could change the type label of an object for which vendor policy may have needed access. It also should prove the basis for additional compatibility checks between old and new policies. Bug: 36899958 Test: Policy builds and tests pass. Change-Id: I609c913e6354eb10a04cc1a029ddd9fa0e592a4c
-
TreeHugger Robot authored
-
Dan Cashman authored
Commit: 2490f1ad meant to add thermalserviced_tmpfs to the new_object list in the mapping file, but copy-paste error resulted in thermalserviced_exec_tmpfs being recorded instead. Fix this. (cherry-pick of commit: fbacc656) Bug: 62573845 Test: None. prebuilt change. Change-Id: Iab4eaef04742187d6397a539aae854651caa9935
-
TreeHugger Robot authored
-
- Aug 04, 2017
-
-
Todd Kennedy authored
A new API [getNamesForUids] was recently added to the PackageManager and this API needs to be accessible to native code. However, there were two constraints: 1) Instead of hand-rolling the binder, we wanted to auto generate the bindings directly from the AIDL compiler. 2) We didn't want to expose/annotate all 180+ PackageManager APIs when only a single API is needed. So, we chose to create a parallel API that can be used explicitly for native bindings without exposing the entirety of the PackageManager. Bug: 62805090 Test: Manual Test: Create a native application that calls into the new service Test: See the call works and data and returned Change-Id: I0d469854eeddfa1a4fd04b5c53b7a71ba3ab1f41
-
Dan Cashman authored
Commit: ec3b6b7e added a new daemon and corresponding types to sepolicy. The explicitly declared types were added to 26.0.ignore.cil to reflect the labeling of new objects, but another type, thermalserviced_tmpfs was created by macro and was missed in code review. Add it as well. Bug: 62573845 Test: None. prebuilt change. Change-Id: Ia8968448eea0be889911f46fe255f581659eb548 (cherry picked from commit 2490f1ad)
-
Todd Poynor authored
Add sepolicy for thermalserviced daemon, IThermalService binder service, IThermalCallback hwservice, and Thermal HAL revision 1.1. Test: manual: marlin with modified thermal-engine.conf Bug: 30982366 Change-Id: I207fa0f922a4e658338af91dea28c497781e8fe9 (cherry picked from commit ec3b6b7e)
-
- Aug 02, 2017
-
-
Philip P. Moltmann authored
-
TreeHugger Robot authored
* changes: Fix CoredomainViolators typo and clean up test option parsing. Record hal_wifi_offload_hwservice type for compatibility.
-
- Aug 01, 2017
-
-
Ruchi Kandoi authored
am: 0393dafd Change-Id: Ida00cdf24a809888233ede97a83d42ed5c1a8574
-