- Oct 18, 2017
-
-
Treehugger Robot authored
-
- Oct 17, 2017
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Addresses the following test failure: system/extras/tests/kernel.config/nfs_test.cpp:24: Failure Value of: android::base::ReadFileToString("/proc/filesystems", &fs) Actual: false Expected: true Denial: avc: denied { read } for name="filesystems" dev="proc" scontext=u:r:shell:s0 tcontext=u:object_r:proc_filesystems:s0 tclass=file Bug: 67862327 Test: build Change-Id: I9ada5404987cb474968afc8cb8d96137ee36c68d
-
Jeff Vander Stoep authored
As part of Treble, enforce that the communication between platform and vendor components use the official hw binder APIs. Prevent sharing of data by file path. Platform and vendor components may share files, but only via FD passed over hw binder. This change adds the violators attribute that will be used to mark violating domains that need to be fixed. Bug: 34980020 Test: build Change-Id: Id9acfbbc86bfd6fd0633b8164a37ce94d25ffa2c
-
Paul Crowley authored
Bug: 25861755 Test: Boot device, observe logs Change-Id: I6c13430d42e9794003eb48e6ca219b874112b900 Merged-In: I6c13430d42e9794003eb48e6ca219b874112b900 (cherry picked from commit 47f3ed09)
-
- Oct 16, 2017
-
-
Robert Quattlebaum authored
This change allows wpantund to call any binder callbacks that have been registered with it. Generally, only privileged apps are allowed to register callbacks with wpantund, so we are limiting the scope for callbacks to only privileged apps. We also add shell to allow the command-line utility `lowpanctl` to work properly from `adb shell`. Bug: b/67393078 Test: manual Change-Id: I64c52cc5e202725a81230dc67e1cd7c911cf8e1c (cherry picked from commit 17319cb3)
-
Robert Quattlebaum authored
Bug: b/64399219 Test: Manual Change-Id: I4f6c7e4e3339ae95e43299bf364edff40d07c796 (cherry picked from commit c8bd93d7)
-
Tri Vo authored
-
Tri Vo authored
As a consequence, hal_audio_default (and any domain with hal_audio attribute) loses access to proc label. Bug: 65643247 Test: sailfish boots, can play sound through speakers and headset (3.5mm, usb, and bluetooth) without denials from hal_audio to proc. Test: VtsHalAudioEffectV2_0Target Test: VtsHalAudioV2_0Target Change-Id: I3eead5a26ef36b8840d31c5e078f006b0c2266a3
-
William Roberts authored
Update to commit: - https://github.com/TresysTechnology/refpolicy/commit/5490639ac99fcfa062a0b9825a111b9392a2da34 This solves all reported clang analyzer issues and is inline with upstream. Test: veerify that md5sum of output files do not change. Change-Id: I942145b8f9748c8ecd185f730c94d57cb77f5acc Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
- Oct 14, 2017
-
-
Todd Poynor authored
Allow PowerUI / platform_app to use thermalservice for receiving notifications of thermal events. Bug: 66698613 Test: PowerNotificationWarningsTest, PowerUITest, manual: marlin and <redacted> with artificially low temperature threshold and logcat debugging messages Change-Id: I5428bd5f99424f83ef72d981afaf769bdcd03629 Merged-In: I5428bd5f99424f83ef72d981afaf769bdcd03629
-
- Oct 13, 2017
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Dontaudit denials for services that system_app may not use due to neverallow assertions. Bug: 67779088 Test: build Change-Id: I822a7909c86bee5c2fdeec6e13af1a9791883f72
-
Jeff Vander Stoep authored
This denial should not be allowed. Add bug information to the denial to give context. Bug: 63801215 Test: build Change-Id: I3dc5ce6a5aa1c6bf74c6fd13cab082c7f263c4e8
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Addresses: avc: denied { search } for comm="sh" name="bms" dev="sysfs" ino=47908 scontext=u:r:shell:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir Test: build Change-Id: I8a0197417c47feefba084e9c75933d28c5f6e5f1
-
Tri Vo authored
-
- Oct 12, 2017
-
-
Tri Vo authored
New types: sysfs_android_usb sysfs_ipv4 sysfs_power sysfs_rtc sysfs_switch sysfs_wakeup_reasons Labeled: /sys/class/android_usb, /sys/devices/virtual/android_usb ->sysfs_android_usb /sys/class/rtc -> sysfs_rtc /sys/class/switch, /sys/devices/virtual/switch -> sysfs_switch /sys/power/state, /sys/power/wakeup_count -> sysfs_power /sys/kernel/ipv4 -> sysfs_ipv4 /sys/kernel/wakeup_reasons -> sysfs_wakeup_reasons Removed access to sysfs and sysfs_type from system_server and added appropriate access to new types. Bug: 65643247 Test: sailfish boots without violation from system_server or to new labels. Change-Id: I27250fd537d76c8226defa138d84fe2a4ce2d5d5
-
Chong Zhang authored
-
Jeff Vander Stoep authored
Test: build aosp_sailfish Change-Id: Iaefe1df66885d3e78feb600c3d9845bd9fe671a2
-
- Oct 11, 2017
-
-
Chong Zhang authored
bug: 67029332 testing: - build - boot - CTS MediaCasTest on Pixel2 Change-Id: I019e0156c67c84875310d630f8a8bec7aaa483a6
-
- Oct 10, 2017
-
-
Tao Bao authored
Prior to this CL, /sys/devices/virtual/block/dm-X was using the generic sysfs label. This CL creates sysfs_dm label and grants the following accesses: - update_verifier to read sysfs_dm dir and file at /sys/devices/virtual/block/dm-X. - vold to write sysfs_dm. Bug: 63440407 Test: update_verifier successfully triggers blocks verification and marks a sucessful boot; Test: No sysfs_dm related denials on sailfish. Change-Id: I6349412707800f1bd3a2fb94d4fe505558400c95
-
Nick Kralevich authored
isolated_apps are intended to be strictly limited in the /sys files which can be read. Add a neverallow assertion to guarantee this on all Android compatible devices. Test: policy compiles. Change-Id: I2980291dcf4e74bb12c81199d61c5eb8a182036c
-
- Oct 09, 2017
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Comments indicate that these permissions are used to access already open FDs. However, getattr of a directory is clearly not necessary for that, search of system_data_file is already granted to domain and following symlinks is clearly not needed for reading an already open FD. Bug: 34980020 Test: boot marlin. Test drm with google play movies, no related denials Test: cts-tradefed run cts -m CtsMediaTestCases -t \ android.media.cts.MediaCasTest 5/6 tests fail with no related selinux denials. The same 5/6 also fail in selinux permissive mode. Change-Id: Ib4b9a1e18bdc479d656b2d64917bbc0358515525
-
Dan Cashman authored
Bug: 64687998 Test: Builds. Change-Id: I7a5b65d34382b8b76e55c523811a0f17dd9c1051
-
Tri Vo authored
Bug: 65643247 Test: sailfish boots, can take pictures, use browser without denials form kernel domain. Change-Id: I4fc0555f0b65fc5537e0b2765142b384ed0560c8
-
- Oct 08, 2017
-
-
Jeffrey Vander Stoep authored
-
- Oct 07, 2017
-
-
Treehugger Robot authored
-
Nick Kralevich authored
-
Nick Kralevich authored
Bullhead and dragon are broken. Revert until I can fix those builds. Dragon: libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26264 of policy.conf) violated by allow isolated_app sysfs_socinfo:file { ioctl read lock open }; Bullhead: libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_power_management:file { ioctl read lock open }; libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_socinfo:file { ioctl read lock open }; libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_thermal:file { ioctl read lock open }; libsepol.check_assertions: 3 neverallow failures occurred This reverts commit 579366a0. Change-Id: I1ea4824e226c06628769898299f2e322060d0d06 Test: policy compiles.
-
Treehugger Robot authored
-
Nick Kralevich authored
Mediaextractor should only be operating on data passed directly to it. It shouldn't be attempting to open /data files on it's own. Add a neverallow statement (compile time assertion + CTS test) to ensure this is the case. Bug: 67454004 Test: policy compiles. No runtime impact. Change-Id: Ie94d4cb9aece7e72fbd13321f339dcf9d44d5d77
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Allows partners to add a new attribute definition to their public policy without causing a compatibility failure with the AOSP system image. Bug: 67092827 Bug: 37915794 Test: build and boot aosp_sailfish with new type declared in public policy Change-Id: I015c26fa7c399423e8a6e7079b5689007d031479
-
- Oct 06, 2017
-
-
Jeffrey Vander Stoep authored
-
Nick Kralevich authored
These denials are expected and the code has fallbacks to handle this case. Test: policy compiles. Bug: 67454004 Change-Id: I787625494d0a7c9945318428b6fd3f668a8a2564
-