- Mar 05, 2017
-
-
Nick Kralevich authored
Drop support for execmod (aka text relocations) for newer API versions. Retain it for older app APIs versions. Bug: 30146890 Bug: 20013628 Bug: 35323421 Test: policy compiles. Change-Id: Ie54fdb385e9c4bb997ad6fcb6cff74f7e32927bb
-
Nick Kralevich authored
This should only be granted to legacy apps, not to newer API versions. Change-Id: Ia4b9b3a3cf33aa31bcad2fe15d8470c50132e2a9 Test: policy compiles.
-
- Mar 04, 2017
-
-
Wei Wang authored
Fix restorecon failue on second call Bug: 35803475 Test: angler boot with UART on and set sys.wifitracing.started to 0 after boot Change-Id: Ia5496fcba031616297fa0a4c0f45e3ece0b4d662
-
Keun-young Park authored
-
- Mar 03, 2017
-
-
Alex Klyubin authored
-
Keun-young Park authored
- necessary for analyzing early boot stage bug: 35949319 Test: check captured bugreport for ro.boottime.* in SYSTEM PROPERTIES Change-Id: I8826abd19ac00f169841b4a7ceeb68be3405d1b9
-
Nick Kralevich authored
Label /proc/misc and allow access to untrusted_apps targeting older API versions, as well as update_engine_common. /proc/misc is used by some banking apps to try to detect if they are running in an emulated environment. TODO: Remove access to proc:file from update_engine_common after more testing. Bug: 35917228 Test: Device boots and no new denials. Change-Id: If1b97a9c55a74cb74d1bb15137201ffb95b5bd75
-
Treehugger Robot authored
-
Roshan Pius authored
-
Jeff Vander Stoep authored
Addresses: denied { getattr } for pid=155 comm="keystore" path="/vendor" dev="mmcblk0p6" ino=1527 scontext=u:r:keystore:s0 tcontext=u:object_r:system_file:s0 tclass=lnk_file On devices without an actual vendor image, /vendor is a symlink to /system/vendor. When loading a library from this symlinked vendor, the linker uses resolve_paths() resulting in an lstat(). This generates an selinux denial. Allow this lstat() so that paths can be resolved on devices without a real vendor image. Bug: 35946056 Test: sailfish builds Change-Id: Ifae11bc7039047e2ac2b7eb4fbcce8ac4580799f
-
Alex Klyubin authored
This moves the CIL files comprising the split sepolicy to the directories/partitions based on whether the file is part of platform/system or non-platform/vendor. In particular: * plat_sepolicy.cil is moved to /system/etc/selinux, * nonplat_sepolicy.cil is moved to /vendor/etc/selinux, and * mapping_sepolicy.cil is moved to /vendor/etc/selinux. Test: Device boots, no additional denials. The test is performed both for a device without the CIL files and with the three CIL files. Bug: 31363362 Change-Id: Ia760d7eb32c80ba72f6409da75d99eb5aae71cd9
-
Roshan Pius authored
The new wifi HAL manages the wlan driver and hence needs to be able to load/unload the driver. The "wlan.driver.status" is used to indicate the state of the driver to the rest of the system. There are .rc scripts for example which wait for the state of this property. Denials: 03-01 13:31:43.394 476 476 W android.hardwar: type=1400 audit(0.0:7243): avc: denied { read } for name="u:object_r:wifi_prop:s0" dev="tmpfs" ino=10578 scontext=u:r:hal_wifi_default:s0 tcontext=u:object_r:wifi_prop:s0 tclass=file permissive=0 03-01 13:31:43.399 476 476 E libc : Access denied finding property "wlan.driver.status" Bug: 35765841 Test: Denials no longer seen Change-Id: I502494af7140864934038ef51cb0326ba3902c63
-
- Mar 02, 2017
-
-
Keun-young Park authored
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Jeff Davidson authored
Bug: 33075886 Test: N/A Change-Id: I1654ee20fa6125cf3ed5c0796e85f289db5a9745
-
Alex Klyubin authored
This starts with the reduction in the number of services that ephemeral apps can access. Prior to this commit, ephemeral apps were permitted to access most of the service_manager services accessible by conventional apps. This commit reduces this set by removing access from ephemeral apps to: * gatekeeper_service, * sec_key_att_app_id_provider_service, * wallpaper_service, * wifiaware_service, * wifip2p_service, * wifi_service. Test: Device boots up fine, Chrome, Play Movies, YouTube, Netflix, work fine. Bug: 33349998 Change-Id: Ie4ff0a77eaca8c8c91efda198686c93c3a2bc4b3
-
Chad Brubaker authored
This is needed, at least short term Bug:34231507 Test: Builds Change-Id: Id313c4f3e40c17b0eead50facf474a890cda5c85
-
Hugo Benichi authored
Test: build, flashed, booted. Bug: 32648597 Change-Id: Ife3d99293c3274ad3a62fb71ae3f799c74e853f4
-
- Mar 01, 2017
-
-
Keun-young Park authored
- compared to ro.boottime, this one does not pass time info bug: 35178781 bug: 34274385 Test: reboot Change-Id: I6a7bf636a3f201653e2890751d5fa210274c9ede
-
ashutoshj authored
-
Jeffrey Vander Stoep authored
-
- Feb 28, 2017
-
-
Keun-young Park authored
-
Todd Poynor authored
Add a file context for keeping track of last reboot reason and label directory /data/misc/reboot/ for this purpose. (Cherry picked from commit ca051f6d) Bug: 30994946 Test: manual: reboot ocmmand, setprop sys.powerctl, SoC thermal mgr Change-Id: I9569420626b4029a62448b3f729ecbbeafbc3e66
-
Chong Zhang authored
Also allow media.extractor to use media.cas for descrambling. bug: 22804304 Change-Id: Id283b31badecb11011211a776ba9ff5167a9019d
-
Treehugger Robot authored
-
Keun-young Park authored
- hal clients checking hal_binderization prop also need to check ro.boottime.persistent_properties. bug: 35178781 Test: reboot Change-Id: I413c663537dc118e0492416e3e5a2af721b18107
-
Steven Moreland authored
Bug: 35328775 Test: works in both binderized and passthrough modes Merged-In: I1f827b4983e5e67c516e4488ad3497dd62db7e20 Change-Id: I1f827b4983e5e67c516e4488ad3497dd62db7e20
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Feb 27, 2017
-
-
Jin Qian authored
Test: adb shell dumpsys storaged --force Bug: 35323867 Change-Id: I6944ca357875a24465054d3891a00dbcd67495cf
-
Sandeep Patil authored
early mounted block device are created by 'init' in its first stage, so the following restorecon() now finds device nodes and their corresponding symlinks. The CL adds rule to make sure the block and system_block_devices can be relabeled by init in this case. Bug: 35792677 Bug: 27805372 Test: tested ota using 'adb sideload' on sailfish Change-Id: I7d9d89878919c1267bf3c74f0cdbb4367b5ad458 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Nick Kralevich authored
No SELinux domains can create dccp_socket instances, so it doesn't make any sense to allow netd to minipulate already-open dccp sockets. Bug: 35784697 Test: policy compiles. Change-Id: I189844462cbab58ed58c24fbad6a392f6b035815
-
- Feb 25, 2017
-
-
Alex Klyubin authored
Prior to this commit, there was a bug in generated CIL where it wouldn't compile using secilc. The reason was that the build script was stripping out all lines containing "neverallow" from CIL files, accidentally removing lines which were not neverallow statements, such as lmx lines referencing app_neverallows.te. The commit fixes the build script's CIL neverallow filter to filter out only neverallow* statements, as originally intended. Moreover, to catch non-compiling CIL policy earlier in the future, this commit runs secilc on the policy at build time. In particular, it tests that platform policy compiles on its own and that nonplatform + platform + mappig policy compiles as well. Test: CIL policy builds and compiles on-device using secilc Bug: 31363362 Change-Id: I769aeb3d8c913a5599f1a2195c69460ece7f6465
-
- Feb 24, 2017
-
-
Treehugger Robot authored
-
Alex Deymo authored
-
Treehugger Robot authored
-
Chia-I Wu authored
Bug: 35708449 Test: AS screen capture Change-Id: I53f1604e1ee9c9b32c6932f1b8944708f5012e5f
-
Treehugger Robot authored
-
Alex Deymo authored
Bug: 35721166 Test: Run update_engine_unittest as system user in enforcing mode. Change-Id: I9cd63b19e6eed3e1291d36d4c342ecf725407232
-