Skip to content
Snippets Groups Projects
  1. Apr 23, 2018
  2. Apr 11, 2018
    • sqian's avatar
      Add sepolicy for radio sap 1.2 · 64839e87
      sqian authored
      Bug: 74114758
      Test: Checked radio-service and sap-service is on the lshal after running the service
      Change-Id: I1b18711286e000a7d17664e7d3a2045aeeb8c285
      64839e87
  3. Mar 12, 2018
  4. Mar 11, 2018
  5. Mar 08, 2018
    • Amit Mahajan's avatar
      Move rild from public to vendor. · eeda6c61
      Amit Mahajan authored
      Also change the neverallow exceptions to be for hal_telephony_server
      instead of rild.
      
      Test: Basic telephony sanity, treehugger
      Bug: 36427227
      Change-Id: If892b28416d98ca1f9c241c5fcec70fbae35c82e
      eeda6c61
    • Joel Galenson's avatar
      Ensure taking a bugreport generates no denials. · ba0c279d
      Joel Galenson authored
      This commit adds new SELinux permissions and neverallow rules so that
      taking a bugreport does not produce any denials.
      
      Bug: 73256908
      Test: Captured bugreports on Sailfish and Walleye and verified
      that there were no denials.
      
      Merged-In: If3f2093a2b51934938e3d7e5c42036b2e2bf6de9
      Change-Id: If3f2093a2b51934938e3d7e5c42036b2e2bf6de9
      (cherry picked from commit daf1cdfa5ac7eca95f3b21034174a495a6760e47)
      ba0c279d
  6. Mar 07, 2018
  7. Mar 05, 2018
    • Daichi Ueura's avatar
      sepolicy(hostapd): Allow socket based control iface · e0290858
      Daichi Ueura authored
      Update sepolicy permission to allow hostapd to setup
      socket for socket based control interface.
      
      Sepolicy denial for accessing /data/vendor/wifi/hostapd/ctrl:
      02-23 12:32:06.186  3068  3068 I hostapd : type=1400 audit(0.0:36):
      avc: denied { create } for name="ctrl"
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=dir permissive=1
      
      02-23 12:32:06.186  3068  3068 I hostapd : type=1400 audit(0.0:37):
      avc: denied { setattr } for name="ctrl" dev="sda35" ino=131410
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=dir permissive=1
      
      02-23 12:32:06.190  3068  3068 I hostapd : type=1400 audit(0.0:38):
      avc: denied { create } for name="wlan0"
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=sock_file permissive=1
      
      02-23 12:32:06.190  3068  3068 I hostapd : type=1400 audit(0.0:39):
      avc: denied { setattr } for name="wlan0" dev="sda35" ino=131411
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=sock_file permissive=1
      
      Bug: 73419160
      Test: Manual check that softAp works
      Change-Id: I2e733e168feceeab2d557f7704832c143e352375
      e0290858
  8. Feb 15, 2018
    • Joel Galenson's avatar
      Dontaudit denials caused by race with labeling. · f7ec4138
      Joel Galenson authored
      These denials seem to be caused by a race with the process that labels
      the files.  While we work on fixing them, hide the denials.
      
      Bug: 68864350
      Bug: 70180742
      Test: Built policy.
      Change-Id: I58a32e38e6384ca55e865e9575dcfe7c46b2ed3c
      f7ec4138
  9. Feb 14, 2018
    • Pavel Grafov's avatar
      Allow wpa_supplicant to read security logging property. · 54c9dafb
      Pavel Grafov authored
      This is needed to allow it to log audit events, e.g. cert
      validation failure.
      
      Bug: 70886042
      Test: manual, attempt connecting to EAP-TLS wifi with bad cert.
      Merged-In: Ia1b0f3c6e02697fdb5018082d5c851f116013fb1
      Change-Id: Ia1b0f3c6e02697fdb5018082d5c851f116013fb1
      54c9dafb
    • Pavel Grafov's avatar
      Allow wpa_supplicant to read security logging property. · fb227040
      Pavel Grafov authored
      This is needed to allow it to log audit events, e.g. cert
      validation failure.
      
      Bug: 70886042
      Test: manual, attempt connecting to EAP-TLS wifi with bad cert.
      Change-Id: Ia1b0f3c6e02697fdb5018082d5c851f116013fb1
      fb227040
  10. Feb 09, 2018
  11. Feb 05, 2018
  12. Jan 31, 2018
  13. Jan 30, 2018
    • Joel Galenson's avatar
      Clean up bug_map. · 26ccebd7
      Joel Galenson authored
      Remove bugs that have been fixed, re-map duped bugs, and alphabetize
      the list.
      
      Test: Booted Walleye and Sailfish, tested wifi and camera, and
      observed no new denials.
      
      Change-Id: I94627d532ea13f623fe29cf259dd404bfd850c13
      26ccebd7
    • Jeff Vander Stoep's avatar
      Correctly label data types · 8be8322b
      Jeff Vander Stoep authored
      Data outside /data/vendor must have the core_data_file_type
      attribute.
      
      Test: build (this is a build time test)
      Bug: 34980020
      Change-Id: Ia727fcad813d5fcfbe8f714246364bae0bda43bd
      Merged-In: Ibacfcc938deab40096b54b8d0e608d53ca91b947
      8be8322b
  14. Jan 29, 2018
  15. Jan 24, 2018
  16. Jan 22, 2018
  17. Jan 12, 2018
    • Roshan Pius's avatar
      sepolicy(hostapd): Add a HIDL interface for hostapd · 5bca3e86
      Roshan Pius authored
      Change sepolicy permissions to now classify hostapd as a HAL exposing
      HIDL interface.
      
      Sepolicy denial for accessing /data/vendor/misc/wifi/hostapd:
      12-27 23:40:55.913  4952  4952 W hostapd : type=1400 audit(0.0:19): avc:
      denied { write } for name="hostapd" dev="sda13" ino=4587601
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0
      
      01-02 19:07:16.938  5791  5791 W hostapd : type=1400 audit(0.0:31): avc:
      denied { search } for name="net" dev="sysfs" ino=30521
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:sysfs_net:s0 tclass=dir permissive=0
      
      Bug: 36646171
      Test: Device boots up and able to turn on SoftAp.
      Change-Id: Ibacfcc938deab40096b54b8d0e608d53ca91b947
      5bca3e86
  18. Jan 10, 2018
  19. Jan 03, 2018
  20. Dec 07, 2017
  21. Nov 22, 2017
    • Jeff Vander Stoep's avatar
      Move platform/vendor data violations to device policy · 5b557888
      Jeff Vander Stoep authored
      Sharing data folders by path will be disallowed because it violates
      the approved API between platform and vendor components tested by
      VTS. Move all violating permissions from core selinux policy to
      device specific policy so that we can exempt existing devices from
      the ban and enforce it on new devices.
      
      Bug: 34980020
      Test: Move permissions. Build and test wifi, wifi AP, nfc, fingerprint
          and Play movies on Marlin and Taimen.
      Test: build on Angler, Bullhead, Dragon, Fugu, Marlin, Walleye
      
      (cherry picked from commit ba2130a8)
      
      Change-Id: Iaedbbe31237822cf3348209028bba45ad85465f8
      5b557888
    • Michael Wright's avatar
      Revert "Move platform/vendor data violations to device policy" · d8b864cb
      Michael Wright authored
      This reverts commit ba2130a8.
      
      Test: lunch elfin-userdebug && m -j
      Change-Id: I83e8a37cac97e2f994fd2defb94888ec73b41f3b
      d8b864cb
  22. Nov 21, 2017
    • Courtney Goeltzenleuchter's avatar
      Add support for updated HW composer interface · 68f24388
      Courtney Goeltzenleuchter authored
      Test: build
      Bug: 63710530
      Change-Id: I85cddfaf3ec004165040935f8723e9eed0ef7900
      68f24388
    • Benjamin Gordon's avatar
      sepolicy: Add rules for non-init namespaces · 9b2e0cbe
      Benjamin Gordon authored
      In kernel 4.7, the capability and capability2 classes were split apart
      from cap_userns and cap2_userns (see kernel commit
      8e4ff6f228e4722cac74db716e308d1da33d744f). Since then, Android cannot be
      run in a container with SELinux in enforcing mode.
      
      This change applies the existing capability rules to user namespaces as
      well as the root namespace so that Android running in a container
      behaves the same on pre- and post-4.7 kernels.
      
      This is essentially:
        1. New global_capability_class_set and global_capability2_class_set
           that match capability+cap_userns and capability2+cap2_userns,
           respectively.
        2. s/self:capability/self:global_capability_class_set/g
        3. s/self:capability2/self:global_capability2_class_set/g
        4. Add cap_userns and cap2_userns to the existing capability_class_set
           so that it covers all capabilities.  This set was used by several
           neverallow and dontaudit rules, and I confirmed that the new
           classes are still appropriate.
      
      Test: diff new policy against old and confirm that all new rules add
            only cap_userns or cap2_userns;
            Boot ARC++ on a device with the 4.12 kernel.
      Bug: crbug.com/754831
      
      Change-Id: I4007eb3a2ecd01b062c4c78d9afee71c530df95f
      9b2e0cbe
  23. Nov 20, 2017
    • Jeff Vander Stoep's avatar
      Move platform/vendor data violations to device policy · ba2130a8
      Jeff Vander Stoep authored
      Sharing data folders by path will be disallowed because it violates
      the approved API between platform and vendor components tested by
      VTS. Move all violating permissions from core selinux policy to
      device specific policy so that we can exempt existing devices from
      the ban and enforce it on new devices.
      
      Bug: 34980020
      Test: Move permissions. Build and test wifi, wifi AP, nfc, fingerprint
          and Play movies on Marlin and Taimen.
      Test: build on Angler, Bullhead, Dragon, Fugu, Marlin, Walleye
      
      Change-Id: Ifcb51a9c479955f4771586b61bccb705c552e4db
      ba2130a8
    • Jeff Vander Stoep's avatar
      Revert "Move platform/vendor data violations to device policy" · 03177f05
      Jeff Vander Stoep authored
      This reverts commit d4785c37.
      
      Temporarily revert to fix crosshatch.
      
      Test: crosshatch now builds
      03177f05
    • Jeff Vander Stoep's avatar
      Move platform/vendor data violations to device policy · d4785c37
      Jeff Vander Stoep authored
      Sharing data folders by path will be disallowed because it violates
      the approved API between platform and vendor components tested by
      VTS. Move all violating permissions from core selinux policy to
      device specific policy so that we can exempt existing devices from
      the ban and enforce it on new devices.
      
      Bug: 34980020
      Test: Move permissions. Build and test wifi, wifi AP, nfc, fingerprint
          and Play movies on Marlin and Taimen.
      Test: build on Angler, Bullhead, Dragon, Fugu, Marlin, Walleye
      
      Change-Id: Ib6fc9cf1403e74058aaae5a7b0784922f3172b4e
      d4785c37
  24. Nov 16, 2017
    • Jeff Vander Stoep's avatar
      Remove unused permissions from tee · 13c69b89
      Jeff Vander Stoep authored
      Only getattr and read are necessary for lnk_file. Open violates a new
      neverallow for separating system and vendor data.
      
      Bug: 34980020
      Test: Enroll fingerprint on Taimen
      Change-Id: I9434afbd5b4ecc1ead9f0ba47c7582fb5a6c6bf0
      13c69b89
  25. Nov 01, 2017
  26. Oct 11, 2017
  27. Sep 28, 2017
  28. Sep 26, 2017
Loading