Skip to content
Snippets Groups Projects
  1. Jan 02, 2018
    • Max Bires's avatar
      Adding a traceur_app domain to remove it from shell · 4ea5569f
      Max Bires authored
      This CL creates a traceur_app domain with userdebug privileges akin to
      what shell has with regards to being able to find most services on
      device. Previously, traceur was running as shell which was an
      unintentional abuse of selinux architecture.
      
      Bug: 68126425
      Test: Traceur functions outside of shell user privilege
      Change-Id: Ib5090e7e8225ad201b3ec24b506fe2717101d0f1
      4ea5569f
    • Chenbo Feng's avatar
      sepolicy: Allow mount cgroupv2 and bpf fs · 254ad0da
      Chenbo Feng authored
      Some necessary sepolicy rule changes for init process to create directory,
      mount cgroupv2 module and mount bpf filesystem. Also allow netd to create
      and pin bpf object as files and read it back from file under the
      directory where bpf filesystem is mounted.
      
      Test: bpf maps show up under /sys/fs/bpf/
      Change-Id: I579d04f60d7e20bd800d970cd28cd39fda9d20a0
      254ad0da
    • Ricky Wai's avatar
      Add Network Watchlist data file selinux policy(Used in ConfigUpdater) · ff3b957e
      Ricky Wai authored
      Bug: 63908748
      Test: Able to boot
      Change-Id: I14d8856d7aac7be9d1f26ecf5bfff69ea5ee9607
      ff3b957e
  2. Dec 29, 2017
  3. Dec 20, 2017
    • Tony Mak's avatar
      Add selinux policy for CrossProfileAppsService · 215fb3ef
      Tony Mak authored
      CrossProfileAppsService allows apps to do limited cross profile
      operations, like checking the caller package is installed in
      the specified user. It is similar to LauncherAppsService in some sense.
      
      Merged-In: I26e383a57c32c4dc9b779752b20000b283a5bfdc
      Change-Id: I26e383a57c32c4dc9b779752b20000b283a5bfdc
      Fix: 67765768
      Test: Built with ag/3063260. Can boot and verified those APIs are working.
      (cherry picked from commit 6536c9e0)
      215fb3ef
  4. Dec 19, 2017
  5. Dec 18, 2017
    • xshu's avatar
      Wifi hal - Firmware dump permissions · 6ad3c891
      xshu authored
      we are aiming to improve logging performance by having wifi hal
      directly write to the flash.
      
      Wifi hal need to be able to create, write, and delete files in
      a directory. This will be restricted to userdebug and eng builds only.
      
      Bug: 70170285
      Test: compile, run on device
      Change-Id: Id0cd317411f4c393d7529aa31b501046d7350edb
      6ad3c891
  6. Dec 16, 2017
  7. Dec 13, 2017
    • Tom Cherry's avatar
      Add /dev/__properties__/property_info · 8b5433a9
      Tom Cherry authored
      Allow init to create a serialized property_info file and allow all
      processes to read it.
      
      Bug: 36001741
      Test: boot bullhead, walleye using property_info
      
      Change-Id: Ie51d4c0f0221b128dd087029c811fda15b4d7093
      8b5433a9
  8. Dec 05, 2017
  9. Nov 30, 2017
  10. Nov 17, 2017
    • Vishnu Nair's avatar
      Add window trace files SELinux policy rules · 2d6942d3
      Vishnu Nair authored
      - Allow system_server to create and write to /data/misc/wmtrace/*
      - Allow surfaceflinger to create and write files from /data/misc/wmtrace/*
      - Allow dumpstate to read files from /data/misc/wmtrace/*
      permissions are restricted to userdebug or eng builds
      
      Bug: 64831661
      
      Test: adb shell cmd window tracing start && adb shell cmd window tracing stop
      Test: adb shell su root service call SurfaceFlinger 1025 i32 1 >/dev/null && adb shell su root service call SurfaceFlinger 1025 i32 0 >/dev/null
      Test: adb bugreport ~/tmp.zip && adb shell su root dmesg | grep 'avc: '
      
      Change-Id: I0b15166560739d73d7749201f3ad197dbcf5791c
      2d6942d3
  11. Nov 09, 2017
  12. Oct 25, 2017
    • Tom Cherry's avatar
      add vendor_init.te · 621c24cb
      Tom Cherry authored
      First pass at adding vendor_init.te
      
      Bug: 62875318
      Test: boot sailfish with vendor_init
      Change-Id: I35cc9be324075d8baae866d6de4166c37fddac68
      621c24cb
  13. Oct 23, 2017
    • Max Bires's avatar
      Adding statscompanion_service and a dontaudit for find/add · 0187b231
      Max Bires authored
      Instead of removing the denial generating code, a dontaudit and a
      service label will be provided so that the team working on this new
      feature doesn't have to get slowed up with local revision patches.
      
      The dontaudit should be removed upon resolution of the linked bug.
      
      Bug: 67468181
      Test: statscompanion denials aren't audited
      Change-Id: Ib4554a7b6c714e7409ea504f5d0b82d5e1283cf7
      0187b231
  14. Oct 17, 2017
  15. Oct 16, 2017
  16. Sep 28, 2017
  17. Sep 26, 2017
  18. Sep 01, 2017
  19. Aug 28, 2017
  20. Aug 25, 2017
  21. Aug 16, 2017
    • Bowgo Tsai's avatar
      Moving adbd from rootdir to system/bin · e2423d14
      Bowgo Tsai authored
      Bug: 63910933
      Test: boot sailfish in normal mode, checks adbd is started
      Test: boot sailfish in recovery mode, checks adbd is started
      Test: boot bullhead in normal mode, checks adbd is started
      Test: boot bullhead in recovery mode, checks adbd is started
      
      Change-Id: I35ed78a15a34626fbd3c21d030e2bf51033f7b79
      e2423d14
  22. Aug 14, 2017
    • Dan Cashman's avatar
      Move compatibility files out of prebuilts dir. · 78b3d573
      Dan Cashman authored
      The treble compatibility tests check for policy differences between old
      and new policy.  To do this correctly, we must not modify the policy which
      represents the older policies.  Move the files meant to be changed to a
      different location from the ones that are not meant to be touched to avoid
      any undesired changes to old policy, e.g. commit:
      2bdefd65078d890889672938c6f0d2accdd25bc5
      
      Bug: 36899958
      Test: Build-time tests build.
      Change-Id: I8fa3947cfae756f37556fb34e1654382e2e48372
      78b3d573
  23. Aug 11, 2017
    • Steven Moreland's avatar
      Add screencap domain. · f27bba93
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      f27bba93
  24. Aug 08, 2017
    • Dan Cashman's avatar
      Fix thermalserviced_tmpfs compat recording mistake. · 34f827fb
      Dan Cashman authored
      Commit: 2490f1ad meant to add
      thermalserviced_tmpfs to the new_object list in the mapping file,
      but copy-paste error resulted in thermalserviced_exec_tmpfs being
      recorded instead.  Fix this.
      
      (cherry-pick of commit: fbacc656)
      
      Bug: 62573845
      Test: None. prebuilt change.
      Change-Id: Iab4eaef04742187d6397a539aae854651caa9935
      34f827fb
  25. Aug 04, 2017
    • Todd Kennedy's avatar
      Allow PackageManager to create a new service · 8bb80471
      Todd Kennedy authored
      A new API [getNamesForUids] was recently added to the PackageManager
      and this API needs to be accessible to native code. However, there
      were two constraints:
      1) Instead of hand-rolling the binder, we wanted to auto generate
      the bindings directly from the AIDL compiler.
      2) We didn't want to expose/annotate all 180+ PackageManager APIs
      when only a single API is needed.
      So, we chose to create a parallel API that can be used explicitly
      for native bindings without exposing the entirety of the
      PackageManager.
      
      Bug: 62805090
      Test: Manual
      Test: Create a native application that calls into the new service
      Test: See the call works and data and returned
      Change-Id: I0d469854eeddfa1a4fd04b5c53b7a71ba3ab1f41
      8bb80471
    • Dan Cashman's avatar
      Record thermalserviced_tmpfs for compat infrastructure. · e772a5cf
      Dan Cashman authored
      Commit: ec3b6b7e added a new daemon
      and corresponding types to sepolicy.  The explicitly declared types
      were added to 26.0.ignore.cil to reflect the labeling of new objects,
      but another type, thermalserviced_tmpfs was created by macro and was
      missed in code review.  Add it as well.
      
      Bug: 62573845
      Test: None. prebuilt change.
      Change-Id: Ia8968448eea0be889911f46fe255f581659eb548
      (cherry picked from commit 2490f1ad)
      e772a5cf
    • Todd Poynor's avatar
      thermal: sepolicy for thermalservice and Thermal HAL revision 1.1 · e9b2def7
      Todd Poynor authored
      Add sepolicy for thermalserviced daemon, IThermalService binder
      service, IThermalCallback hwservice, and Thermal HAL revision 1.1.
      
      Test: manual: marlin with modified thermal-engine.conf
      Bug: 30982366
      Change-Id: I207fa0f922a4e658338af91dea28c497781e8fe9
      (cherry picked from commit ec3b6b7e)
      e9b2def7
  26. Jul 31, 2017
    • Dan Cashman's avatar
      Record hal_wifi_offload_hwservice type for compatibility. · 3fc7f836
      Dan Cashman authored
      Commit: 5aef6a94 added a new type,
      system_net_netd_hwservice, for a new hwservice.  Record this in the
      compatibility infrastructure as labeling a new object, rather than
      relabeling one from O.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: If360eb9e05684d9b47316d53e494aa773485e93f
      3fc7f836
    • Dan Cashman's avatar
      Record mediaprovider_tmpfs type for compatibility. · 079a98b8
      Dan Cashman authored
      Commit: 3eed3eac added the compatibility
      statement for the new mediaprovider app domain, but it missed another
      new, private type, mediaprovider_tmpfs, that is automatically created for
      all appdomains.  It replaces priv_app_tmpfs, but since both types are
      private, they do not need to be added to the actual mapping (vendor policy
      cannot use it).
      
      Bug: 62573845
      Test: None.  Prebuilt-only change.
      Change-Id: I62229a5be74cd928fe0ca82a45b73cb61d6f5223
      079a98b8
    • Dan Cashman's avatar
      Record hal_wifi_offload_hwservice type for compatibility. · 0785a72c
      Dan Cashman authored
      Commit: 632bc494 added hwservice labeling
      and was cherry-picked to oc-dev, but the hal_wifi_offload_hwservice type
      was not part of the cherry-pick because the service was not in oc-dev.
      Record the type for compatibility purposes.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: Ib2c0fe862eddb566fbe6b0287238fa93dddae7b8
      0785a72c
  27. Jul 25, 2017
  28. Jul 18, 2017
    • Dan Cashman's avatar
      rm memcg type from ignore list. · 9d0737a5
      Dan Cashman authored
      This type was removed in commit: 93166cef
      and no longer needs to be included in compatibility infrastructure.
      
      Bug: 62573845
      Test: None, prebuilt change.
      Change-Id: I9dc05512c7fcb3ef4445c4c6b040809a1d595282
      9d0737a5
  29. Jul 12, 2017
    • Lorenzo Colitti's avatar
      Revert "Temporarily remove netd_stable_secret_prop from compat infra." · 98e96fac
      Lorenzo Colitti authored
      This reinstates the exception for netd_stable_secret_prop, which
      was added after O sepolicy freeze. This exception, along with the
      corresponding core sepolicy change, was reverted in order to
      allow these policies to be added to per-device sepolicy.
      
      DO NOT SUBMIT until http://ag/2528214 has automerged to master.
      
      This reverts commit 777c8ee0.
      
      Bug: 17613910
      Bug: 62573845
      Test: make -j64 bootimage
      Change-Id: I20b52f1d8e1c0cbb18a339bf45586dacbc7405ad
      98e96fac
  30. Jul 11, 2017
    • Lorenzo Colitti's avatar
      Temporarily remove netd_stable_secret_prop from compat infra. · 777c8ee0
      Lorenzo Colitti authored
      This will allow removing the netd_stable_secret_prop from common
      policy in master. It will be re-added after the wahoo-specific
      sepolicy for netd_stable_secret_prop lands in oc-dr1-dev, is
      automerged to master, and then is reverted in master.
      
      This reverts commit ebea2b45.
      
      Bug: 17613910
      Bug: 62573845
      Test: None, prebuilt change only.
      Change-Id: I1234326d2fe6446e7e09ba9e97187518fa9bce33
      777c8ee0
  31. Jul 07, 2017
    • Dan Cashman's avatar
      Record hal_tetheroffload_service for compatibility. · 4d9f41d7
      Dan Cashman authored
      Commit: e58a8de5 added a new type
      which has no analogue in 26.0.  Record it as such.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I6b6d2aa64e0ac2c39c8d0427d333e6c7fc2b0bb1
      4d9f41d7
    • Dan Cashman's avatar
      Record memcg_device type for compat. · d0900526
      Dan Cashman authored
      Commit: 86cb5215 gave /dev/memcg a
      new label, but also explicitly prohibited access to vendor domains.
      Add the type to the 'new types' and don't map it to any other type
      for backwards compatibility.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I8902716830b162ead69834544ace9e02a94c65b4
      d0900526
    • Dan Cashman's avatar
      Record new broadcast_service type. · 255a4a72
      Dan Cashman authored
      Commit: 38f0928f added a type for a
      new system service.  This service did not exist previously, so mark
      the type as not needing any compat entry.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: I52d8e144c614b27f5c52fa99be6cfac87159bbcd
      255a4a72
Loading