Skip to content
Snippets Groups Projects
  1. Mar 03, 2017
    • Roshan Pius's avatar
    • Roshan Pius's avatar
      sepolicy: Allow hal_wifi to set wlan driver status prop · e62805d7
      Roshan Pius authored
      The new wifi HAL manages the wlan driver and hence needs to be able to
      load/unload the driver. The "wlan.driver.status" is used to indicate the
      state of the driver to the rest of the system. There are .rc scripts for
      example which wait for the state of this property.
      
      Denials:
      03-01 13:31:43.394   476   476 W android.hardwar: type=1400
      audit(0.0:7243): avc: denied { read } for name="u:object_r:wifi_prop:s0"
      dev="tmpfs" ino=10578 scontext=u:r:hal_wifi_default:s0
      tcontext=u:object_r:wifi_prop:s0 tclass=file permissive=0
      03-01 13:31:43.399   476   476 E libc    : Access denied finding
      property "wlan.driver.status"
      
      Bug: 35765841
      Test: Denials no longer seen
      Change-Id: I502494af7140864934038ef51cb0326ba3902c63
      e62805d7
  2. Mar 02, 2017
  3. Mar 01, 2017
  4. Feb 28, 2017
  5. Feb 27, 2017
    • Jin Qian's avatar
      storaged: remove rules no longer necessary · d3a11613
      Jin Qian authored
      Test: adb shell dumpsys storaged --force
      Bug: 35323867
      Change-Id: I6944ca357875a24465054d3891a00dbcd67495cf
      d3a11613
    • Sandeep Patil's avatar
      init: enable init to relabel symlinks for system_block_devices · df32f3e8
      Sandeep Patil authored
      
      early mounted block device are created by 'init' in its first stage, so
      the following restorecon() now finds device nodes and their corresponding
      symlinks. The CL adds rule to make sure the block and
      system_block_devices can be relabeled by init in this case.
      
      Bug: 35792677
      Bug: 27805372
      
      Test: tested ota using 'adb sideload' on sailfish
      
      Change-Id: I7d9d89878919c1267bf3c74f0cdbb4367b5ad458
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      df32f3e8
    • Nick Kralevich's avatar
      netd.te: drop dccp_socket support · 5251ad1a
      Nick Kralevich authored
      No SELinux domains can create dccp_socket instances, so it doesn't make
      any sense to allow netd to minipulate already-open dccp sockets.
      
      Bug: 35784697
      Test: policy compiles.
      Change-Id: I189844462cbab58ed58c24fbad6a392f6b035815
      5251ad1a
  6. Feb 25, 2017
    • Alex Klyubin's avatar
      Test CIL policy when building it · 8f7173b0
      Alex Klyubin authored
      Prior to this commit, there was a bug in generated CIL where it
      wouldn't compile using secilc. The reason was that the build script
      was stripping out all lines containing "neverallow" from CIL files,
      accidentally removing lines which were not neverallow statements,
      such as lmx lines referencing app_neverallows.te.
      
      The commit fixes the build script's CIL neverallow filter to filter
      out only neverallow* statements, as originally intended. Moreover, to
      catch non-compiling CIL policy earlier in the future, this commit runs
      secilc on the policy at build time. In particular, it tests that
      platform policy compiles on its own and that nonplatform + platform +
      mappig policy compiles as well.
      
      Test: CIL policy builds and compiles on-device using secilc
      Bug: 31363362
      Change-Id: I769aeb3d8c913a5599f1a2195c69460ece7f6465
      8f7173b0
  7. Feb 24, 2017
  8. Feb 23, 2017
Loading