Skip to content
Snippets Groups Projects
  1. Oct 18, 2017
  2. Oct 17, 2017
  3. Oct 16, 2017
  4. Oct 14, 2017
    • Todd Poynor's avatar
      PowerUI access to thermalservice · bbc692c6
      Todd Poynor authored
      Allow PowerUI / platform_app to use thermalservice for receiving
      notifications of thermal events.
      
      Bug: 66698613
      Test: PowerNotificationWarningsTest, PowerUITest,
            manual: marlin and <redacted> with artificially low temperature
            threshold and logcat debugging messages
      Change-Id: I5428bd5f99424f83ef72d981afaf769bdcd03629
      Merged-In: I5428bd5f99424f83ef72d981afaf769bdcd03629
      bbc692c6
  5. Oct 13, 2017
  6. Oct 12, 2017
    • Tri Vo's avatar
      Label system_server's dependencies in sysfs. · 1960215c
      Tri Vo authored
      New types:
      sysfs_android_usb
      sysfs_ipv4
      sysfs_power
      sysfs_rtc
      sysfs_switch
      sysfs_wakeup_reasons
      
      Labeled:
      /sys/class/android_usb, /sys/devices/virtual/android_usb ->sysfs_android_usb
      /sys/class/rtc -> sysfs_rtc
      /sys/class/switch, /sys/devices/virtual/switch -> sysfs_switch
      /sys/power/state, /sys/power/wakeup_count -> sysfs_power
      /sys/kernel/ipv4 -> sysfs_ipv4
      /sys/kernel/wakeup_reasons -> sysfs_wakeup_reasons
      
      Removed access to sysfs and sysfs_type from system_server and added
      appropriate access to new types.
      
      Bug: 65643247
      Test: sailfish boots without violation from system_server or to new labels.
      Change-Id: I27250fd537d76c8226defa138d84fe2a4ce2d5d5
      1960215c
    • Chong Zhang's avatar
    • Jeff Vander Stoep's avatar
      Neverallow write access to /sys files for untrusted apps · 06cef4ff
      Jeff Vander Stoep authored
      Test: build aosp_sailfish
      Change-Id: Iaefe1df66885d3e78feb600c3d9845bd9fe671a2
      06cef4ff
  7. Oct 11, 2017
  8. Oct 10, 2017
    • Tao Bao's avatar
      Create sysfs_dm label. · 5b4bea43
      Tao Bao authored
      Prior to this CL, /sys/devices/virtual/block/dm-X was using the generic
      sysfs label. This CL creates sysfs_dm label and grants the following
      accesses:
       - update_verifier to read sysfs_dm dir and file at
         /sys/devices/virtual/block/dm-X.
       - vold to write sysfs_dm.
      
      Bug: 63440407
      Test: update_verifier successfully triggers blocks verification and
            marks a sucessful boot;
      Test: No sysfs_dm related denials on sailfish.
      Change-Id: I6349412707800f1bd3a2fb94d4fe505558400c95
      5b4bea43
    • Nick Kralevich's avatar
      Ensure /sys restrictions for isolated_apps · 62d3b4f1
      Nick Kralevich authored
      isolated_apps are intended to be strictly limited in the /sys files
      which can be read. Add a neverallow assertion to guarantee this on all
      Android compatible devices.
      
      Test: policy compiles.
      Change-Id: I2980291dcf4e74bb12c81199d61c5eb8a182036c
      62d3b4f1
  9. Oct 09, 2017
    • Treehugger Robot's avatar
      Merge "Remove reboot_data_file." · f3f194c0
      Treehugger Robot authored
      f3f194c0
    • Treehugger Robot's avatar
      f7196a88
    • Jeff Vander Stoep's avatar
      Remove unnecessary HAL permissions · 89d77187
      Jeff Vander Stoep authored
      Comments indicate that these permissions are used to access already
      open FDs. However, getattr of a directory is clearly not necessary
      for that, search of system_data_file is already granted to domain
      and following symlinks is clearly not needed for reading an already
      open FD.
      
      Bug: 34980020
      Test: boot marlin. Test drm with google play movies, no related
          denials
      Test: cts-tradefed run cts -m CtsMediaTestCases -t \
          android.media.cts.MediaCasTest
          5/6 tests fail with no related selinux denials. The same 5/6
          also fail in selinux permissive mode.
      Change-Id: Ib4b9a1e18bdc479d656b2d64917bbc0358515525
      89d77187
    • Dan Cashman's avatar
      Remove reboot_data_file. · 76d0e418
      Dan Cashman authored
      Bug: 64687998
      Test: Builds.
      Change-Id: I7a5b65d34382b8b76e55c523811a0f17dd9c1051
      76d0e418
    • Tri Vo's avatar
      Remove proc label access from kernel domain. · bc1c5453
      Tri Vo authored
      Bug: 65643247
      Test: sailfish boots, can take pictures, use browser without denials
      form kernel domain.
      Change-Id: I4fc0555f0b65fc5537e0b2765142b384ed0560c8
      bc1c5453
  10. Oct 08, 2017
  11. Oct 07, 2017
    • Treehugger Robot's avatar
      e22e99a6
    • Nick Kralevich's avatar
    • Nick Kralevich's avatar
      Revert "Ensure /sys restrictions for isolated_apps" · ae48ecbd
      Nick Kralevich authored
      Bullhead and dragon are broken. Revert until I can fix
      those builds.
      
      Dragon:
      
      libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26264 of policy.conf) violated by allow isolated_app sysfs_socinfo:file { ioctl read lock open }; 
      
      Bullhead:
      
      libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_power_management:file { ioctl read lock open }; 
      libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_socinfo:file { ioctl read lock open }; 
      libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_thermal:file { ioctl read lock open }; 
      libsepol.check_assertions: 3 neverallow failures occurred 
      
      
      This reverts commit 579366a0.
      
      Change-Id: I1ea4824e226c06628769898299f2e322060d0d06
      Test: policy compiles.
      ae48ecbd
    • Treehugger Robot's avatar
    • Nick Kralevich's avatar
      mediaextractor: ensure no direct open()s · d329e7eb
      Nick Kralevich authored
      Mediaextractor should only be operating on data passed directly to it.
      It shouldn't be attempting to open /data files on it's own.
      
      Add a neverallow statement (compile time assertion + CTS test) to ensure
      this is the case.
      
      Bug: 67454004
      Test: policy compiles. No runtime impact.
      Change-Id: Ie94d4cb9aece7e72fbd13321f339dcf9d44d5d77
      d329e7eb
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      Allow redeclaring typeattributes · 74b7071b
      Jeff Vander Stoep authored
      Allows partners to add a new attribute definition to their public
      policy without causing a compatibility failure with the AOSP system
      image.
      
      Bug: 67092827
      Bug: 37915794
      Test: build and boot aosp_sailfish with new type declared in public
          policy
      
      Change-Id: I015c26fa7c399423e8a6e7079b5689007d031479
      74b7071b
  12. Oct 06, 2017
Loading