Skip to content
Snippets Groups Projects
  1. Jun 06, 2018
  2. Jun 05, 2018
  3. Jun 04, 2018
  4. Jun 02, 2018
    • Steven Moreland's avatar
      Add context for ro.boot.product.hardware.sku. · 5516acc6
      Steven Moreland authored
      This was defined, but it had no users in the Android tree.
      Because of this, ODM manifests required extra sepolicy to be applied
      in vendor. Before this, there was no policy split, so that was okay,
      but now it is impossible.
      
      Bug: 91735839
      Test: add an odm manifest for SE conditional on
          a system property (ro.boot.product.hardware.sku)
          and make sure it is read into the manifest (using
          the vintf tool) and also that a client can get the
      $ lshal | grep secure
      Y android.hardware.secure_element@1.0::ISecureElement/SIM1                                  0/2        881    2262 567
      
      Change-Id: I94a2928943be6a17416b8bbd78106809c0c21198
      5516acc6
  5. Jun 01, 2018
  6. May 31, 2018
  7. May 30, 2018
    • Jiyong Park's avatar
      add extended_core_property_type · c0f8f2f8
      Jiyong Park authored
      The attribute is used to capture system properties added from outside of
      AOSP (e.g. by OEM), but are not device-specific and thus are used only
      inside the system partition.
      
      Access to the the system properties from outside of the system partition
      is prevented by the neverallow rule.
      
      Bug: 80382020
      Bug: 78598545
      Test: m -j selinux_policy
      Change-Id: I22c083dc195dab84c9c21a79fbe3ad823a3bbb46
      c0f8f2f8
  8. May 23, 2018
    • TreeHugger Robot's avatar
    • Jeff Vander Stoep's avatar
      Use non-expanded types in prop neverallows · 7745770b
      Jeff Vander Stoep authored
      Using hal_foo attributes in neverallow rules does not work because
      they are auto-expanded to types. Use hal_foo_server types instead.
      
      Fixes the following error:
      unit.framework.AssertionFailedError: The following errors were
      encountered when validating the SELinuxneverallow rule: neverallow
      { domain -coredomain -bluetooth -hal_bluetooth } { bluetooth_prop }:
      property_service set; Warning! Type or attribute hal_bluetooth used
      in neverallow undefined in policy being checked.
      
      Test: CtsSecurityHostTestCases
      Bug: 80153368
      Change-Id: I2baf9f66d2ff110a4f181423790a1160a6e138da
      7745770b
    • Joel Galenson's avatar
      Hide bpfloader sys_admin denials. · d65f26f1
      Joel Galenson authored
      Bug: 79524845
      Test: Boot device and see no denials.
      Change-Id: I9316bfd0e3718818a7613a421aedff7da8c87108
      d65f26f1
  9. May 22, 2018
  10. May 21, 2018
  11. May 18, 2018
  12. May 16, 2018
  13. May 15, 2018
    • Pavel Maltsev's avatar
      Allow to specify platform sepolicy dir mult. times · 34f23364
      Pavel Maltsev authored
      For automotive (and I assume for other verticals) it make sense to keep
      vertical-specific policies outside of /system/sepolicy as those not used
      by the phones. However, there's no way to do it rather than using
      BOARD_PLAT_{PUBLIC|PRIVATE}_SEPOLICY_DIR build variables.
      
      Bug: 70637118
      Test: lunch bat_land-userdebug && m
      Test: verify it builds, boots and logs seems to be reasonable
      Test: enable full treble for aosp_car_x86 - verify it builds, boots and
      no denials in the logs
      
      Change-Id: Ia5fd847f7a6152ff6cf99bbbc12e1e322f7946ab
      34f23364
    • Jerry Zhang's avatar
    • Jerry Zhang's avatar
      Allow mediaprovider to search /mnt/media_rw · 31c4b4ea
      Jerry Zhang authored
      Mtp needs access to this path in order to
      change files on an sdcard.
      
      Fixes denial:
      
      05-14 17:40:58.803  3004  3004 W MtpServer: type=1400 audit(0.0:46):
      avc: denied { search } for name="media_rw" dev="tmpfs" ino=10113
      scontext=u:r:mediaprovider:s0:c512,c768
      tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0
      b/77925342 app=com.android.providers.media
      
      Bug: 77849654
      Test: no denials using mtp with emulated sdcard
      Change-Id: I27b5294fa211bb1eff6d011638b5fdc90334bc80
      31c4b4ea
    • TreeHugger Robot's avatar
  14. May 14, 2018
    • TreeHugger Robot's avatar
    • Pavel Maltsev's avatar
      Allow to use sockets from hal server for auto · 4cafae77
      Pavel Maltsev authored
      Add an exemption to neverallow rule to use sockets from HAL servers only
      for automotive build
      
      Bug: 78901167
      Test: assign this attribute to hal_vehicle_default and try to open
      socket from HAL implementation
      Test: verify that new CTS test will fail for non-automotive build with
      this attribute buing used
      Test: make cts && cts-tradefed run singleCommand cts --skip-device-info
       --skip-preconditions --abi arm64-v8a --module CtsSecurityHostTestCases
       -t android.security.cts.SELinuxHostTest
      
      Change-Id: I27976443dad4fc5b7425c089512cac65bb54d6d9
      4cafae77
Loading