Skip to content
Snippets Groups Projects
  1. Jan 26, 2017
  2. Jan 25, 2017
    • Alex Klyubin's avatar
      Remove hal_drm from mediadrmserver domain · 5bfda51e
      Alex Klyubin authored
      HAL clients should not be annotated with hal_x and haldomain. This may
      grant them too much access. Instead, the policy needed for using
      in-process HALs should be directly embedded into the client's domain
      rules.
      
      This reverts the moving of rules out of mediadrmserver in commit
      c86f42b9.
      
      Test: YouTube videos play back, no mediadrmserver denials
      Bug: 34715716
      Bug: 32815560
      Change-Id: Ib57ef880bcc306c6e01f2c24c0f3a4298598eb9a
      5bfda51e
    • Hassan Shojania's avatar
      Modular DRM for MediaPlayer · 8101bad7
      Hassan Shojania authored
      Bug:    34559906
      Test:	Manual through the test app
      Change-Id: Ib69d4fe6b0e21f162f08cea061260c683e4b8c9b
      8101bad7
    • Jeff Tinker's avatar
      Add sepolicy for drm HALs · c86f42b9
      Jeff Tinker authored
      bug:32815560
      Change-Id: I494141b47fcd2e7e0cc02aa58d8df9a222060b3f
      c86f42b9
    • Treehugger Robot's avatar
      Merge "racoon: Add SIOCSIFNETMASK" · f65641e9
      Treehugger Robot authored
      f65641e9
    • Treehugger Robot's avatar
      727e543f
    • Nick Kralevich's avatar
      racoon: Add SIOCSIFNETMASK · a675ca60
      Nick Kralevich authored
      XAUTH based VPNs
      1. IPSec XAUTH PSK
      2. IPSec XAUTH RSA
      fail with the following error from racoon
      
        01-24 16:46:05.583 18712 18712 W ip-up-vpn: type=1400 audit(0.0:390):
        avc: denied { ioctl } for path="socket:[954683]" dev="sockfs" ino=954683
        ioctlcmd=891c scontext=u:r:racoon:s0 tcontext=u:r:racoon:s0
        tclass=udp_socket permissive=0
      
      "setenforce 0" on the device fixed the issue.
      
      Bug: 34690009
      Test: Policy compiles
      Change-Id: Idc0d156ec32e7a9be3825c380c3cb0359fe4fabe
      a675ca60
    • Ray Essick's avatar
      rename mediaanalytics->mediametrics, wider access · 39185400
      Ray Essick authored
      reflect the change from "mediaanalytics" to "mediametrics"
      
      Also incorporates a broader access to the service -- e.g. anyone.
      This reflects that a number of metrics submissions come from application
      space and not only from our controlled, trusted media related processes.
      The metrics service (in another commit) checks on the source of any
      incoming metrics data and limits what is allowed from unprivileged
      clients.
      
      Bug: 34615027
      Test: clean build, service running and accessible
      Change-Id: I657c343ea1faed536c3ee1940f1e7a178e813a42
      39185400
    • Steven Moreland's avatar
      haldomain: search for passthrough hals · 18d7f8c1
      Steven Moreland authored
      Bug: 34366227
      Test: passthrough services successfully found
      Change-Id: If2cad09edc42f01cc5a444229758ecdfe2017cf2
      18d7f8c1
    • Calin Juravle's avatar
  3. Jan 24, 2017
    • Calin Juravle's avatar
      SElinux policies for compiling secondary dex files · e5a1f64a
      Calin Juravle authored
      This CLs adds SElinux policies necessary to compile secondary dex files.
      
      When an app loads secondary dex files via the base class loader the
      files will get reported to PM. During maintance mode PM will compile the
      secondary dex files which were used via the standard installd model
      (fork, exec, change uid and lower capabilities).
      
      What is needed:
      dexoptanalyzer - needs to read the dex file and the boot image in order
      to decide if we need to actually comppile.
      dex2oat - needs to be able to create *.oat files next to the secondary
      dex files.
      
      Test: devices boots
            compilation of secondary dex files works without selinux denials
            cmd package compile --secondary-dex -f -m speed
      com.google.android.gms
      
      Bug: 32871170
      Change-Id: I038955b5bc9a72d49f6c24c1cb76276e0f53dc45
      e5a1f64a
    • Max Bires's avatar
    • Steven Moreland's avatar
      Merge "update_verifier: read dir perms" · 2ec9184e
      Steven Moreland authored
      2ec9184e
    • Steven Moreland's avatar
      update_verifier: read dir perms · bafa38e0
      Steven Moreland authored
      Allow update_verifier to load the boot_control_hal in passthrough mode.
      
      Test: update_verifier works, no denials
      Bug: 34656553
      Change-Id: I5c20ce67c8f1fd195f2429dae497221514ed95a8
      bafa38e0
    • Treehugger Robot's avatar
      e996d177
    • Steven Moreland's avatar
      system_server: add hal_lights permission · 0223ca51
      Steven Moreland authored
      system_server needs the permissions to open the lights hal in the same
      process.
      
      Bug: 34634317
      Test: can change brightness on marlin (tested on internal master)
      Change-Id: I11fe59b4ab32e13d6dad246f4e6c56951e051181
      0223ca51
    • Treehugger Robot's avatar
      Merge "Declare new Fonts service" · 200d436b
      Treehugger Robot authored
      200d436b
    • Nick Kralevich's avatar
      priv_app: allow reading /cache symlink · 21cb045b
      Nick Kralevich authored
      Addresses the following denial:
      
        avc: denied { read } for name="cache" dev="dm-0" ino=2755
        scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_file:s0
        tclass=lnk_file permissive=0
      
      which occurs when a priv-app attempts to follow the /cache symlink. This
      symlink occurs on devices which don't have a /cache partition, but
      rather symlink /cache to /data/cache.
      
      Bug: 34644911
      Test: Policy compiles.
      Change-Id: I9e052aeb0c98bac74fa9225b9253b1537ffa5adc
      21cb045b
  4. Jan 23, 2017
    • Max Bires's avatar
      Adding a neverallow rule to prevent renaming of device and char files · 626f90c5
      Max Bires authored
      This neverallow addition addresses the renaming of files in exploits in
      order to bypass denied permissions. An example of a similar use case of
      using mv to bypass permission denials appeared in a recent project zero
      ChromeOS exploit as one of the steps in the exploit chain.
      https://googleprojectzero.blogspot.com/2016/12/chrome-os-exploit-one-byte-overflow-and.html
      
      Additionally, vold and init both had permission sets that allowed them
      to rename, but neither of them seem to need it. Therefore the rename
      permission has also been removed from these two .te files.
      
      Test: The device boots successfully
      Change-Id: I07bbb58f058bf050f269b083e836c2c9a5bbad80
      626f90c5
    • Josh Gao's avatar
      tombstoned: temporarily allow write to anr_data_file. · 4c27d7a1
      Josh Gao authored
      auditallow this until we track down where the file is opened without
      O_APPEND.
      
      01-23 08:02:12.272   555   555 W tombstoned: type=1400 audit(0.0:11480): avc: denied { write } for path="/data/anr/traces.txt" dev="sda35" ino=4669445 scontext=u:r:tombstoned:s0 tcontext=u:object_r:anr_data_file:s0 tclass=file permissive=0
      
      Bug: http://b/34193533
      Test: mma
      Change-Id: I77b854dce06231232004432839ebd5aa963ef035
      4c27d7a1
    • Clara Bayarri's avatar
      Declare new Fonts service · b69af83b
      Clara Bayarri authored
      Merged-In: Id2b849d7fa22989225066ebe487fc98d319743ea
      Bug: 34190490
      Test: CTS in internal master
      Change-Id: I27ab62469f3a405c59eda1a2a249899e845bed56
      b69af83b
  5. Jan 22, 2017
  6. Jan 21, 2017
  7. Jan 20, 2017
    • Steven Moreland's avatar
      shell: hwbinder_use · 5fd36267
      Steven Moreland authored
      In order to dump hardware services using dumpsys, dumpsys needs to be
      able to talk to the hwservicemanager.
      
      Bug: 33382892
      Test: dumpsys --hw works from unrooted shell
      Change-Id: I31f0982193991428da465507f93d50646cb38726
      5fd36267
    • Treehugger Robot's avatar
    • Paul Lawrence's avatar
      tracefs not debugfs · ef2a1709
      Paul Lawrence authored
      Test:   Device boots
              Can take photos
              Run "adb shell atrace -c -b 16000 -t 5 gfx" without root and check produces
              output
              Run "python systrace.py view gfx freq sched am wm dalvik
              binder_driver" from external/chromium-trace after adb root and
              check populated
      Bug: 31856701
      Change-Id: Ic319f8a0a3e395efa7ee8ba33a868ac55cb44fe4
      ef2a1709
    • Alex Klyubin's avatar
      952072b9
    • Alex Klyubin's avatar
      Grant rild and gatekeeperd access to hwservicemanager · 7f468994
      Alex Klyubin authored
      In my commit f41d89eb I forgot to
      switch rild and gatekeeperd rules from explicitly associating these
      domains with the hal_telephony and hal_gatekeeper to using the
      hal_impl_domain macro. As a result, the recent commit
      a2519226 inadvertently revoked
      HwBinder access from rild and gatekeeperd.
      
      This commit fixes the issue by switching rild and gatekeeperd to the
      hal_impl_domain macro.
      
      Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute haldomain"
            now lists rild and gatekeeperd
      Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute hal_telephony"
            still lists rild
      Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute hal_gatekeeper"
            still lists gatekeeperd
      Bug: 34180936
      Bug: 34470443
      Change-Id: I7949556f58c36811205d5ea3ee78ea5708e95b45
      7f468994
    • Josh Gao's avatar
      tombstoned: allow append to anr_data_file. · 4eddb3e3
      Josh Gao authored
      Fix the following denial:
      
      tombstoned: type=1400 audit(0.0:563): avc: denied { append } for path="/data/anr/traces.txt" dev="sda35" ino=679941 scontext=u:r:tombstoned:s0 tcontext=u:object_r:anr_data_file:s0 tclass=file permissive=0
      
      Bug: http://b/34472671
      Test: mma
      Change-Id: Iab5fbaf50888aa0f195841cb7e718ff393e526dd
      4eddb3e3
    • Alex Klyubin's avatar
      Sort hal_* declarations alphabetically · e1ff7e88
      Alex Klyubin authored
      Test: No change to SELinux policy
      Change-Id: I45d6d6ab0538b9d4768b922cfdc2c972272d0b18
      e1ff7e88
    • Alex Klyubin's avatar
      937be2b4
    • Max Bires's avatar
      Merge "Removing unused rules." · 2b2c74f8
      Max Bires authored
      2b2c74f8
    • William Roberts's avatar
      wificond_service: drop system_service typeattribute · 9d8edcae
      William Roberts authored
      
      wificond_service is not a system_server service, so drop the
      typeattribute.
      
      Provide find permission for system_server so it can still call
      wificond.
      
      Test: compile and run on emulator. Also check built policy to verify
      the permissions changes are as expected. system_server should have lost
      the add permissions on wificond_service. Most importantly this needs
      to be tested on a device with wificond.
      
      Change-Id: I6dd655a5ac1dbfef809b8759a86429557a7c1207
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      9d8edcae
    • Nick Kralevich's avatar
      more ephemeral_app cleanup · d5b6043f
      Nick Kralevich authored
      As of https://android-review.googlesource.com/324092, ephemeral_app is
      now an appdomain, so places where both appdomain and ephemeral_app are
      granted the same set of rules can be deleted.
      
      Test: policy compiles.
      Change-Id: Ideee710ea47af7303e5eb3af1331653afa698415
      d5b6043f
    • Nick Kralevich's avatar
    • Alex Klyubin's avatar
      Fix bugs in *_file_contexts targets · e4665d7f
      Alex Klyubin authored
      This fixes the following issues introduced in commit
      d225b697:
      * plat_file_contexts was empty because the target was referencing
        system/sepolicy/private/file_contexts via a misspelled variable
        name.
      * plat_file_contexts wasn't marked as dirty and thus wasn't rebuilt
        when system/sepolicy/private/file_contexts changed. This is because
        the file_contexts dependency was referenced via a misspelled
        variable name.
      * plat_file_contexts wasn't sorted (as opposed to other similar
        targets, such as nonplat_file_contexts and file_contexts.bin). This
        may lead to unnecessary non-determinism.
      * nonplat_file_contexts wasn't marked dirty and thus wasn't rebuilt
        when device-specific file_contexts file(s) changed. This is because
        the file_contexts files were referenced via a misspelled variable
        name.
      
      Test: "make plat_file_contexts" produces a non-empty file containing
            mappings from system/sepolicy/private/file_contexts
      Test: "make plat_file_contexts" updates output when
            system/sepolicy/private/file_contexts changes
      Test: "make plat_file_contexts" produces output which is sorted
            accroding to rules in fc_sort
      Test: "make nonplat_file_contexts" updates output when
            device/lge/bullhead/sepolicy/file_contexts changes (tested on
            aosp_bullhead-eng)
      Bug: 31363362
      Change-Id: I540555651103f02c96cf958bb93618f600e47a75
      e4665d7f
Loading