Skip to content
Snippets Groups Projects
  1. Aug 26, 2016
    • Christopher Wiley's avatar
      Allow wificond to mark interfaces up and down · 3d5d0832
      Christopher Wiley authored
      avc: denied { create } for scontext=u:r:wificond:s0
      tcontext=u:r:wificond:s0 tclass=udp_socket permissive=0
      
      avc: denied { net_raw } for capability=13 scontext=u:r:wificond:s0
      tcontext=u:r:wificond:s0 tclass=capability permissive=0
      
      avc: denied { read } for name="psched" dev="proc" ino=4026535377
      scontext=u:r:wificond:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      permissive=0
      
      Test: fixes above avc denials
      Bug: 29579539
      
      Change-Id: Ie1dff80103e81cfba8064a22b5dd3e1e8f29471b
      (cherry picked from commit b6a6561d)
      3d5d0832
    • Christopher Wiley's avatar
      Separate permissions to set WiFi related properties · bf18eca5
      Christopher Wiley authored
      wificond would like to be able to set WiFi related properties
      without access to the rest of the system properties.  Today,
      this only involves marking the driver as loaded or unloaded.
      
      avc: denied { write } for name="property_service" dev="tmpfs" ino=10100
      scontext=u:r:wificond:s0 tcontext=u:object_r:property_socket:s0
      tclass=sock_file permissive=0
      
      Bug: 29579539
      Test: No avc denials related to system properties across
            various WiFi events.
      
      Change-Id: I6d9f1de3fbef04cb7750cc3753634f9e02fdb71f
      (cherry picked from commit 1ebfdd6a)
      bf18eca5
    • Christopher Wiley's avatar
      Define explicit label for wlan sysfs fwpath · 97db27d8
      Christopher Wiley authored
      avc: denied { write } for name="fwpath" dev="sysfs" ino=6863
      scontext=u:r:wificond:s0 tcontext=u:object_r:sysfs_wlan_fwpath:s0
      tclass=file permissive=0
      
      Test: wificond and netd can write to this path, wifi works
      Test: `runtest frameworks-wifi` passes
      
      Bug: 29579539
      
      Change-Id: Ia21c654b00b09b9fe3e50d564b82966c9c8e6994
      (cherry picked from commit 7d13dd80)
      97db27d8
    • Roshan Pius's avatar
      sepolicy: Add permissions for wpa_supplicant binder · 7c539b1c
      Roshan Pius authored
      Add the necessary permissions for |wpa_supplicant| to expose a binder
      interface. This binder interface will be used by the newly added
      |wificond| service (and potentially system_server).
      |wpa_supplicant| also needs to invoke binder callbacks on |wificond|.
      
      Changes in the CL:
      1. Allow |wpa_supplicant| to register binder service.
      2. Allow |wpa_supplicant| to invoke binder calls on |wificond|.
      3. Allow |wificond| to invoke binder calls on |wpa_supplicant|
      
      Denials:
      06-30 08:14:42.788   400   400 E SELinux : avc:  denied  { add } for
      service=wpa_supplicant pid=20756 uid=1010 scontext=u:r:wpa:s0
      tcontext=u:object_r:default_android_service:s0 tclass=service_manager
      permissive=1
      
      BUG:29877467
      TEST: Compiled and ensured that the selinux denials are no longer
      present in logs.
      TEST: Ran integration test to find the service.
      
      Change-Id: Ib78d8e820fc81b2c3d9260e1c877c5faa9f1f662
      (cherry picked from commit 18883a93)
      7c539b1c
    • Ningyuan Wang's avatar
      sepolicy: add sepolicy binder support for wificond · b83c8cb1
      Ningyuan Wang authored
      This allows wificond to publish binder interface using
      service manager.
      
      Denial warnings:
      
      wificond: type=1400 audit(0.0:8): avc:
      denied { call } for scontext=u:r:wificond:s0
      tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
      
      wificond: type=1400 audit(0.0:9): avc:
      denied { transfer } for scontext=u:r:wificond:s0
      tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
      
      servicemanager: type=1400
      audit(0.0:10): avc: denied { search } for name="6085" dev="proc"
      ino=40626 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0
      tclass=dir permissive=1
      
      servicemanager: type=1400
      audit(0.0:11): avc: denied { read } for name="current" dev="proc"
      ino=40641 scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0
      tclass=file permissive=1
      
      servicemanager: type=1400
      audit(0.0:12): avc: denied { open } for path="/proc/6085/attr/current"
      dev="proc" ino=40641 scontext=u:r:servicemanager:s0
      tcontext=u:r:wificond:s0 tclass=file permissive=1
      
      servicemanager: type=1400
      audit(0.0:13): avc: denied { getattr } for
      scontext=u:r:servicemanager:s0 tcontext=u:r:wificond:s0 tclass=process
      permissive=1
      
      SELinux : avc:  denied  { add } for
      service=wificond pid=6085 uid=0 scontext=u:r:wificond:s0
      tcontext=u:object_r:wifi_service:s0 tclass=service_manager permissive=1
      
      BUG=28867093
      TEST=compile
      TEST=use a client to call wificond service through binder
      
      Change-Id: I9312892caff171f17b04c30a415c07036b39ea7f
      (cherry picked from commit d56bcb1c)
      b83c8cb1
    • Ningyuan Wang's avatar
      Sepolicy files for wificond · 3cbf14a1
      Ningyuan Wang authored
      This sepolicy change allows wificond to run as a deamon.
      
      BUG=28865186
      TEST=compile
      TEST=compile with ag/1059605
        Add wificond to '/target/product/base.mk'
        Adb shell ps -A | grep 'wificond'
      
      Change-Id: If1e4a8542ac03e8ae42371d75aa46b90c3d8545d
      (cherry picked from commit 4ef44a61)
      3cbf14a1
  2. Aug 24, 2016
  3. Aug 23, 2016
  4. Aug 22, 2016
  5. Aug 19, 2016
  6. Aug 18, 2016
  7. Aug 15, 2016
    • Hung-ying Tyan's avatar
      Allow init to mount /odm, /vendor early · c3774720
      Hung-ying Tyan authored
      Specifically we need init to relabel (/dev/device-mapper, /dev/block/dm-?)
      and other files in /dev/block/* from tmpfs to dm_device and block_device
      respectively.
      
      BUG=27805372
      
      Change-Id: I16af6e803f8e4150481137aba24d5406872f9c62
      c3774720
  8. Aug 14, 2016
  9. Aug 12, 2016
  10. Aug 11, 2016
  11. Aug 10, 2016
  12. Aug 09, 2016
    • Alex Deymo's avatar
      Allow executing update_engine_sideload from recovery. · d63084d3
      Alex Deymo authored
      The recovery flow for A/B devices allows to sideload an OTA downloaded
      to a desktop and apply from recovery. This patch allows the "recovery"
      context to perform all the operations required to apply an update as
      update_engine would do in the background. These rules are now extracted
      into a new attributte called update_engine_common shared between
      recovery and update_engine.
      
      Bug: 27178350
      Change-Id: I97b301cb2c039fb002e8ebfb23c3599463ced03a
      d63084d3
  13. Aug 08, 2016
  14. Aug 05, 2016
  15. Aug 04, 2016
  16. Aug 03, 2016
  17. Jul 27, 2016
  18. Jul 26, 2016
  19. Jul 22, 2016
Loading