Skip to content
Snippets Groups Projects
  1. Mar 09, 2017
  2. Mar 08, 2017
    • Alex Klyubin's avatar
      Correct location of property_contexts for TREBLE devices · 4cb628a3
      Alex Klyubin authored
      This makes the build system, for TREBLE devices only, place
      plat_property_contexts under /system/etc/selinux and
      nonplat_property_contexts under /vendor/etc/selinux. For other devices
      these files are placed under /, same as before.
      
      Test: *_property_contexts in correct locations when
            PRODUCT_FULL_TREBLE is set to true and when it is set to false.
      Bug: 36002573
      
      Change-Id: I7e30e64918bb3ee671fa8c7a2e30ed96a9cc1ad7
      4cb628a3
  3. Mar 07, 2017
    • Alex Klyubin's avatar
      Precompiled kernel policy for on-device use · 193dccda
      Alex Klyubin authored
      This adds build targets for outputing precompiled kernel policy usable
      on devices with policy split between system and vendor partitions. On
      such devices, precompiled policy must reside on the vendor partition.
      
      Because such devices support updating these partitions independently
      of each other, the precompiled policy must reference the system
      partition's policy against which it was compiled. This enables init to
      establish whether the precompiled policy is valid for the current
      combination of system and vendor partitions.
      
      The referencing is performed by both the system and vendor partitions
      including the SHA-256 digest of the system partition's policy
      (plat_sepolicy.cil). Only the when the digest is the same on both
      partitions can the precompiled policy be used.
      
      Test: plat_sepolicy.cil.sha256 contains exactly the hex form of the
            SHA-256 digest of plat_sepolicy.cil
      Test: plat_sepolicy.cil.sha256 is identical
            precompiled_sepolicy.plat.sha256.
      Bug: 31363362
      Change-Id: I9771e1aa751e25bba6e2face37d68e0ae43b33a3
      193dccda
    • Jeff Vander Stoep's avatar
      assert plat neverallows on nonplat seapp_contexts · 87ae5f7d
      Jeff Vander Stoep authored
      With the plat/nonplat policy split, nonplat_seapp_contexts should still
      be checked against the plat_seapp_contexts_neverallows during build
      time to ensure no violations occur.
      
      Test: stock aosp_marlin builds.
      Test: name=foo.bar seinfo=default fails (as expected) in nonplat policy
      Test: name=foo.bar seinfo="" fails (as expected) in nonplat policy
      Bug: 36002816
      Change-Id: I95b2c695b23e2bdf420575d631e85391e93fc869
      87ae5f7d
    • Yabin Cui's avatar
      Make /proc/sys/kernel/perf_event_max_sample_rate accessible to untrusted_app. · 5b15baeb
      Yabin Cui authored
      perf_event_max_sample_rate is needed to be read for native profiling,
      otherwise CTS test can fail on devices with kernel >= 4.4. Before this CL,
      the file is not readable from untrusted_app domain. This CL makes it readable
      from both shell domain and untrusted_app domain.
      
      Bug: http://b/35554543
      Test: build and test on marlin.
      Change-Id: Id118e06e3c800b70a749ab112e07a4ec24bb5975
      5b15baeb
    • Calin Juravle's avatar
      SElinux: Clean up code related to foreign dex use · 2b291121
      Calin Juravle authored
      We simplified the way we track whether or not a dex file is used by
      other apps. DexManager in the framework keeps track of the data and we
      no longer need file markers on disk.
      
      Test: device boots, foreign dex markers are not created anymore
      
      Bug: 32871170
      Change-Id: I464ed6b09439cf0342020ee07596f9aa8ae53b62
      2b291121
    • Roshan Pius's avatar
    • Roshan Pius's avatar
      sepolicy: Make wpa_supplicant a HIDL service · a976e64d
      Roshan Pius authored
      Note: The existing rules allowing socket communication will be removed
      once we  migrate over to HIDL completely.
      
      (cherry-pick of 2a9595ed) 
      Bug: 34603782
      Test: Able to connect to wifi networks.
      Test: Will be sending for full wifi integration tests
      (go/wifi-test-request)
      Change-Id: I9ee238fd0017ec330f6eb67ef9049211f7bd4615
      a976e64d
  4. Mar 06, 2017
  5. Mar 05, 2017
  6. Mar 04, 2017
  7. Mar 03, 2017
    • Alex Klyubin's avatar
      6d931af8
    • Keun-young Park's avatar
      allow dumpstate to collect ro.boottime.* · 43e8fae0
      Keun-young Park authored
      - necessary for analyzing early boot stage
      
      bug: 35949319
      Test: check captured bugreport for ro.boottime.* in SYSTEM PROPERTIES
      Change-Id: I8826abd19ac00f169841b4a7ceeb68be3405d1b9
      43e8fae0
    • Nick Kralevich's avatar
      Label /proc/misc · 50bb7b5a
      Nick Kralevich authored
      Label /proc/misc and allow access to untrusted_apps targeting older API
      versions, as well as update_engine_common.
      
      /proc/misc is used by some banking apps to try to detect if they are
      running in an emulated environment.
      
      TODO: Remove access to proc:file from update_engine_common after more
      testing.
      
      Bug: 35917228
      Test: Device boots and no new denials.
      Change-Id: If1b97a9c55a74cb74d1bb15137201ffb95b5bd75
      50bb7b5a
    • Treehugger Robot's avatar
      afb082e3
    • Roshan Pius's avatar
    • Jeff Vander Stoep's avatar
      domain: Allow stat on symlinks in vendor · 05d83dd4
      Jeff Vander Stoep authored
      Addresses:
      denied { getattr } for pid=155 comm="keystore" path="/vendor"
      dev="mmcblk0p6" ino=1527 scontext=u:r:keystore:s0
      tcontext=u:object_r:system_file:s0 tclass=lnk_file
      
      On devices without an actual vendor image, /vendor is a symlink to
      /system/vendor. When loading a library from this symlinked vendor,
      the linker uses resolve_paths() resulting in an lstat(). This
      generates an selinux denial. Allow this lstat() so that paths can
      be resolved on devices without a real vendor image.
      
      Bug: 35946056
      Test: sailfish builds
      Change-Id: Ifae11bc7039047e2ac2b7eb4fbcce8ac4580799f
      05d83dd4
    • Alex Klyubin's avatar
      Move split sepolicy to correct locations · 052b0bbb
      Alex Klyubin authored
      This moves the CIL files comprising the split sepolicy to the
      directories/partitions based on whether the file is part of
      platform/system or non-platform/vendor. In particular:
      * plat_sepolicy.cil is moved to /system/etc/selinux,
      * nonplat_sepolicy.cil is moved to /vendor/etc/selinux, and
      * mapping_sepolicy.cil is moved to /vendor/etc/selinux.
      
      Test: Device boots, no additional denials. The test is performed both
            for a device without the CIL files and with the three CIL files.
      Bug: 31363362
      
      Change-Id: Ia760d7eb32c80ba72f6409da75d99eb5aae71cd9
      052b0bbb
    • Roshan Pius's avatar
      sepolicy: Allow hal_wifi to set wlan driver status prop · e62805d7
      Roshan Pius authored
      The new wifi HAL manages the wlan driver and hence needs to be able to
      load/unload the driver. The "wlan.driver.status" is used to indicate the
      state of the driver to the rest of the system. There are .rc scripts for
      example which wait for the state of this property.
      
      Denials:
      03-01 13:31:43.394   476   476 W android.hardwar: type=1400
      audit(0.0:7243): avc: denied { read } for name="u:object_r:wifi_prop:s0"
      dev="tmpfs" ino=10578 scontext=u:r:hal_wifi_default:s0
      tcontext=u:object_r:wifi_prop:s0 tclass=file permissive=0
      03-01 13:31:43.399   476   476 E libc    : Access denied finding
      property "wlan.driver.status"
      
      Bug: 35765841
      Test: Denials no longer seen
      Change-Id: I502494af7140864934038ef51cb0326ba3902c63
      e62805d7
  8. Mar 02, 2017
  9. Mar 01, 2017
  10. Feb 28, 2017
Loading