Skip to content
Snippets Groups Projects
  1. Mar 05, 2017
  2. Mar 04, 2017
  3. Mar 03, 2017
    • Alex Klyubin's avatar
      6d931af8
    • Keun-young Park's avatar
      allow dumpstate to collect ro.boottime.* · 43e8fae0
      Keun-young Park authored
      - necessary for analyzing early boot stage
      
      bug: 35949319
      Test: check captured bugreport for ro.boottime.* in SYSTEM PROPERTIES
      Change-Id: I8826abd19ac00f169841b4a7ceeb68be3405d1b9
      43e8fae0
    • Nick Kralevich's avatar
      Label /proc/misc · 50bb7b5a
      Nick Kralevich authored
      Label /proc/misc and allow access to untrusted_apps targeting older API
      versions, as well as update_engine_common.
      
      /proc/misc is used by some banking apps to try to detect if they are
      running in an emulated environment.
      
      TODO: Remove access to proc:file from update_engine_common after more
      testing.
      
      Bug: 35917228
      Test: Device boots and no new denials.
      Change-Id: If1b97a9c55a74cb74d1bb15137201ffb95b5bd75
      50bb7b5a
    • Treehugger Robot's avatar
      afb082e3
    • Roshan Pius's avatar
    • Jeff Vander Stoep's avatar
      domain: Allow stat on symlinks in vendor · 05d83dd4
      Jeff Vander Stoep authored
      Addresses:
      denied { getattr } for pid=155 comm="keystore" path="/vendor"
      dev="mmcblk0p6" ino=1527 scontext=u:r:keystore:s0
      tcontext=u:object_r:system_file:s0 tclass=lnk_file
      
      On devices without an actual vendor image, /vendor is a symlink to
      /system/vendor. When loading a library from this symlinked vendor,
      the linker uses resolve_paths() resulting in an lstat(). This
      generates an selinux denial. Allow this lstat() so that paths can
      be resolved on devices without a real vendor image.
      
      Bug: 35946056
      Test: sailfish builds
      Change-Id: Ifae11bc7039047e2ac2b7eb4fbcce8ac4580799f
      05d83dd4
    • Alex Klyubin's avatar
      Move split sepolicy to correct locations · 052b0bbb
      Alex Klyubin authored
      This moves the CIL files comprising the split sepolicy to the
      directories/partitions based on whether the file is part of
      platform/system or non-platform/vendor. In particular:
      * plat_sepolicy.cil is moved to /system/etc/selinux,
      * nonplat_sepolicy.cil is moved to /vendor/etc/selinux, and
      * mapping_sepolicy.cil is moved to /vendor/etc/selinux.
      
      Test: Device boots, no additional denials. The test is performed both
            for a device without the CIL files and with the three CIL files.
      Bug: 31363362
      
      Change-Id: Ia760d7eb32c80ba72f6409da75d99eb5aae71cd9
      052b0bbb
    • Roshan Pius's avatar
      sepolicy: Allow hal_wifi to set wlan driver status prop · e62805d7
      Roshan Pius authored
      The new wifi HAL manages the wlan driver and hence needs to be able to
      load/unload the driver. The "wlan.driver.status" is used to indicate the
      state of the driver to the rest of the system. There are .rc scripts for
      example which wait for the state of this property.
      
      Denials:
      03-01 13:31:43.394   476   476 W android.hardwar: type=1400
      audit(0.0:7243): avc: denied { read } for name="u:object_r:wifi_prop:s0"
      dev="tmpfs" ino=10578 scontext=u:r:hal_wifi_default:s0
      tcontext=u:object_r:wifi_prop:s0 tclass=file permissive=0
      03-01 13:31:43.399   476   476 E libc    : Access denied finding
      property "wlan.driver.status"
      
      Bug: 35765841
      Test: Denials no longer seen
      Change-Id: I502494af7140864934038ef51cb0326ba3902c63
      e62805d7
  4. Mar 02, 2017
  5. Mar 01, 2017
  6. Feb 28, 2017
  7. Feb 27, 2017
    • Jin Qian's avatar
      storaged: remove rules no longer necessary · d3a11613
      Jin Qian authored
      Test: adb shell dumpsys storaged --force
      Bug: 35323867
      Change-Id: I6944ca357875a24465054d3891a00dbcd67495cf
      d3a11613
    • Sandeep Patil's avatar
      init: enable init to relabel symlinks for system_block_devices · df32f3e8
      Sandeep Patil authored
      
      early mounted block device are created by 'init' in its first stage, so
      the following restorecon() now finds device nodes and their corresponding
      symlinks. The CL adds rule to make sure the block and
      system_block_devices can be relabeled by init in this case.
      
      Bug: 35792677
      Bug: 27805372
      
      Test: tested ota using 'adb sideload' on sailfish
      
      Change-Id: I7d9d89878919c1267bf3c74f0cdbb4367b5ad458
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      df32f3e8
    • Nick Kralevich's avatar
      netd.te: drop dccp_socket support · 5251ad1a
      Nick Kralevich authored
      No SELinux domains can create dccp_socket instances, so it doesn't make
      any sense to allow netd to minipulate already-open dccp sockets.
      
      Bug: 35784697
      Test: policy compiles.
      Change-Id: I189844462cbab58ed58c24fbad6a392f6b035815
      5251ad1a
  8. Feb 25, 2017
    • Alex Klyubin's avatar
      Test CIL policy when building it · 8f7173b0
      Alex Klyubin authored
      Prior to this commit, there was a bug in generated CIL where it
      wouldn't compile using secilc. The reason was that the build script
      was stripping out all lines containing "neverallow" from CIL files,
      accidentally removing lines which were not neverallow statements,
      such as lmx lines referencing app_neverallows.te.
      
      The commit fixes the build script's CIL neverallow filter to filter
      out only neverallow* statements, as originally intended. Moreover, to
      catch non-compiling CIL policy earlier in the future, this commit runs
      secilc on the policy at build time. In particular, it tests that
      platform policy compiles on its own and that nonplatform + platform +
      mappig policy compiles as well.
      
      Test: CIL policy builds and compiles on-device using secilc
      Bug: 31363362
      Change-Id: I769aeb3d8c913a5599f1a2195c69460ece7f6465
      8f7173b0
  9. Feb 24, 2017
Loading