Skip to content
Snippets Groups Projects
  1. Oct 26, 2016
    • Roshan Pius's avatar
      wpa: Add permissions for hwbinder · 6caeac7b
      Roshan Pius authored
      Modify permissions for wpa_supplicant to use hwbinder (for HIDL),
      instead of binder.
      
      Denials:
      01-15 14:31:58.573   541   541 W wpa_supplicant: type=1400
      audit(0.0:10): avc: denied { call } for scontext=u:r:wpa:s0
      tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=0
      01-15 14:31:58.573   541   541 W wpa_supplicant: type=1400
      audit(0.0:11): avc: denied { call } for scontext=u:r:wpa:s0
      tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=0
      
      BUG: 31365276
      Test: Compiled and ensured that the selinux denials are no longer
      present in logs.
      
      Change-Id: Ifa4630edea6ec5a916b3940f9a03ef9dc6fc9af2
      6caeac7b
    • Treehugger Robot's avatar
      70591fed
    • Jeff Vander Stoep's avatar
      Rename macros for (non)binderized HALs · f579ef15
      Jeff Vander Stoep authored
      Test: builds
      Bug: 32243668
      Change-Id: I1ad4b53003462e932cf80b6972db1520dc66d735
      f579ef15
    • Jeff Vander Stoep's avatar
      clean up hal types · 27ae545a
      Jeff Vander Stoep authored
      Bug: 32123421
      Test: build Hikey
      Change-Id: Iaf02626f3f3a94104c0f9d746c3cf5f20751a27d
      27ae545a
  2. Oct 25, 2016
  3. Oct 24, 2016
  4. Oct 21, 2016
  5. Oct 20, 2016
  6. Oct 19, 2016
  7. Oct 18, 2016
    • Prashant Malani's avatar
      Add sysfs rule for vibrator in system_server · c86eb96f
      Prashant Malani authored
      Helps fix vibrator HAL open issue
      
      avc: denied { write } for pid=907 comm="system_server" name="enable" dev="sysfs" ino=20423 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_vibrator:s0 tclass=file permissive=0
      
      Bug: 32209928
      Bug: 32225232
      
      Test: m, booted, tested keypad to make sure vibrator works
      Change-Id: I4977c42b7fac0c9503be04b6520487f2d6cbc903
      c86eb96f
  8. Oct 17, 2016
  9. Oct 16, 2016
  10. Oct 15, 2016
    • Jeff Vander Stoep's avatar
      racoon: allow setting options on tun interface · d063d230
      Jeff Vander Stoep authored
      Fixes failure in VPN connection
      
      avc: denied { ioctl } for pid=2870 comm="ip-up-vpn" ioctlcmd=8914
      scontext=u:r:racoon:s0 tcontext=u:r:racoon:s0 tclass=udp_socket
      avc: denied { ioctl } for pid=2870 comm="ip-up-vpn" ioctlcmd=8916
      scontext=u:r:racoon:s0 tcontext=u:r:racoon:s0 tclass=udp_socket
      
      Test: VPN works
      Bug: 32011648
      Change-Id: I28c4dc7ffbf7e35ef582176674c4e9764719a2a9
      d063d230
  11. Oct 14, 2016
  12. Oct 13, 2016
    • Prashant Malani's avatar
      sepolicy: Add policy for vibrator HIDL service · b32b4a11
      Prashant Malani authored
      Fixes the following denials:
      avc: denied { open } for pid=7530 comm="android.hardwar" path="/sys/devices/virtual/timed_output/vibrator/enable" dev="sysfs" ino=20519 scontext=u:r:android_hardware_vibrator_1_0_service:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
      avc: denied { call } for pid=9173 comm="Binder:7735_C" scontext=u:r:system_server:s0 tcontext=u:r:android_hardware_vibrator_1_0_service:s0 tclass=binder permissive=1
      
      Test: m
      Bug: 32021191
      Change-Id: I243a86b449794e3c2f0abf91ddcf405eff548d0c
      b32b4a11
  13. Oct 12, 2016
  14. Oct 11, 2016
  15. Oct 07, 2016
  16. Oct 06, 2016
    • Prashant Malani's avatar
      system_server: Allow hwservicemanager to make binder calls · abb5c72b
      Prashant Malani authored
      Fixes the following denial:
      avc: denied { call } for pid=791 comm="system_server" scontext=u:r:system_server:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      
      Test: Builds, boots, vibrator works on bullhead
      Change-Id: I56a0a86b64f5d46dc490f6f3255009c40e6e3f8f
      abb5c72b
    • dcashman's avatar
      Split general policy into public and private components. · cc39f637
      dcashman authored
      Divide policy into public and private components.  This is the first
      step in splitting the policy creation for platform and non-platform
      policies.  The policy in the public directory will be exported for use
      in non-platform policy creation.  Backwards compatibility with it will
      be achieved by converting the exported policy into attribute-based
      policy when included as part of the non-platform policy and a mapping
      file will be maintained to be included with the platform policy that
      maps exported attributes of previous versions to the current platform
      version.
      
      Eventually we would like to create a clear interface between the
      platform and non-platform device components so that the exported policy,
      and the need for attributes is minimal.  For now, almost all types and
      avrules are left in public.
      
      Test: Tested by building policy and running on device.
      
      Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
      cc39f637
    • Andreas Gampe's avatar
      Sepolicy: Ignore otapreopt_chroot setsched denial · f1eabc56
      Andreas Gampe authored
      Ignore, as it's a side effect of mounting /vendor.
      
      Bug: 31116514
      Change-Id: If94a27a26181e40de5c5e60f5446de9ce2ccdba0
      (cherry picked from commit 0f81e066)
      f1eabc56
  17. Oct 05, 2016
  18. Oct 03, 2016
    • Jeff Vander Stoep's avatar
      app: audit usage of ion ioctls · 96a85d12
      Jeff Vander Stoep authored
      Test: builds and boots on Bullhead with no selinux audit messages.
      
      Bug: 29795149
      Bug: 30400942
      Change-Id: I93295424a03488234b233d5e2f86d3bf329e53fd
      96a85d12
  19. Oct 02, 2016
  20. Oct 01, 2016
Loading