Skip to content
Snippets Groups Projects
  1. Jun 08, 2017
  2. Jun 07, 2017
  3. Jun 06, 2017
    • Jeff Vander Stoep's avatar
      Move sysfs cpu hotplug labeling to genfs_contexts · e5fe6a33
      Jeff Vander Stoep authored
      On Marlin ~120 ms of time is spent relabeling /sys/devices/system/cpu
      every time we come out of suspend. Moving from file_contexts to
      genfs_contexts as the labeling mechanism knocks this down to ~3 ms.
      
      Bug: 32938130
      Test: build and boot Marlin. Verify that files in
          /sys/devices/system/cpu have the proper label before and after
          suspend.
      
      Change-Id: Ie71ea7e3dd5df250cabe4ba9600afbf67e69f720
      e5fe6a33
    • Jeff Vander Stoep's avatar
      Move sysfs cpu hotplug labeling to genfs_contexts · f85be7f8
      Jeff Vander Stoep authored
      On Marlin ~120 ms of time is spent relabeling /sys/devices/system/cpu
      every time we come out of suspend. Moving from file_contexts to
      genfs_contexts as the labeling mechanism knocks this down to ~3 ms.
      
      Bug: 32938130
      Test: build and boot Marlin. Verify that files in
          /sys/devices/system/cpu have the proper label before and after
          suspend.
      
      Change-Id: Ie71ea7e3dd5df250cabe4ba9600afbf67e69f720
      f85be7f8
  4. Jun 05, 2017
    • Sandeep Patil's avatar
      Fix coredomain violation for modprobe · e41af203
      Sandeep Patil authored
      
      modprobe domain was allowed to launch vendor toolbox even if its a
      coredomain. That violates the treble separation. Fix that by creating a
      separate 'vendor_modprobe' domain that init is allowed to transition to
      through vendor_toolbox.
      
      Bug: 37008075
      Test: Build and boot sailfish
      
      Change-Id: Ic3331797691bb5d1fdc05a674aa4aa313e1f86b2
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      (cherry picked from commit 9e366a0e)
      e41af203
  5. Jun 02, 2017
    • Sandeep Patil's avatar
      Fix coredomain violation for modprobe · 9e366a0e
      Sandeep Patil authored
      
      modprobe domain was allowed to launch vendor toolbox even if its a
      coredomain. That violates the treble separation. Fix that by creating a
      separate 'vendor_modprobe' domain that init is allowed to transition to
      through vendor_toolbox.
      
      Bug: 37008075
      Test: Build and boot sailfish
      
      Change-Id: Ic3331797691bb5d1fdc05a674aa4aa313e1f86b2
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      9e366a0e
    • Jerry Zhang's avatar
      Revert "Split mediaprovider from priv_app." · c00c07c1
      Jerry Zhang authored
      This reverts commit c147b592.
      
      The new domain changed neverallows, breaking CTS compatability.
      Revert the domain now, with the intention to re-add for the next
      release.
      
      Bug: 62102757
      Test: domain is set to priv_app
      Change-Id: I907ff7c513cd642a306e3eaed3937352ced90005
      c00c07c1
  6. Jun 01, 2017
    • Neil Fuller's avatar
      Enable the TimeZoneManagerService · ca595e11
      Neil Fuller authored
      Add policy changes to enable a new service. The service
      is currently switched off in config, but this change is
      needed before it could be enabled.
      
      Bug: 31008728
      Test: make droid
      Merged-In: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      ca595e11
  7. May 31, 2017
    • Neil Fuller's avatar
      Enable the TimeZoneManagerService · 50889ce0
      Neil Fuller authored
      Add policy changes to enable a new service. The service
      is currently switched off in config, but this change is
      needed before it could be enabled.
      
      Bug: 31008728
      Test: make droid
      Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      50889ce0
    • Andrew Scull's avatar
      Add missing sepolicies for OemLock HAL. · 475954da
      Andrew Scull authored
      Bug: 38232801
      Test: Build
      
      Change-Id: Iccc16430e7502bb317f95bb2a5e2f021d8239a00
      475954da
    • Andrew Scull's avatar
      Add missing sepolicies for the Weaver HAL. · a939c432
      Andrew Scull authored
      Bug: 38233550
      Test: Build
      Change-Id: I7c2105d5f215a60a611110640afff25fc3403559
      a939c432
    • Narayan Kamath's avatar
      SEPolicy: Allow app / system_server to write to dumpstate pipes. · a34781ae
      Narayan Kamath authored
      tombstoned allows dumpstate to install "intercepts" to java trace
      requests for a given process. When an "intercept" is installed, all
      trace output is redirected to a pipe provided by dumpstate instead
      of the default location (usually in /data/anr or /data/tombstone).
      
      Note that these processes are already granted "write" and "getattr"
      on dumpstate:fifo_file in order to communicate with dumpstate; this
      change adds "append" to the existing set of permissions.
      
      Bug: 32064548
      Test: manual
      Change-Id: Iccbd78c59071252fef318589f3e55ece51a3c64c
      a34781ae
    • Narayan Kamath's avatar
      SEPolicy: Changes for new stack dumping scheme. · f194aad2
      Narayan Kamath authored
      Applications connect to tombstoned via a unix domain socket and request
      an open FD to which they can write their traces. This socket has a new
      label (tombstoned_java_trace_socket) and appdomain and system_server are
      given permissions to connect and write to it.
      
      Apps no longer need permissions to open files under /data/anr/ and
      these permissions will be withdrawn in a future change.
      
      Bug: 32064548
      Test: Manual
      
      (cherry picked from commit a8832dabc7f3b7b2381760d2b95f81abf78db709)
      
      (cherry picked from commit 11bfcc1e)
      
      Change-Id: Icc60d227331c8eee70a9389ff1e7e78772f37e6f
      f194aad2
    • Narayan Kamath's avatar
      SEPolicy: Changes for new stack dumping scheme. · e628cb5b
      Narayan Kamath authored
      Applications connect to tombstoned via a unix domain socket and request
      an open FD to which they can write their traces. This socket has a new
      label (tombstoned_java_trace_socket) and appdomain and system_server are
      given permissions to connect and write to it.
      
      Apps no longer need permissions to open files under /data/anr/ and
      these permissions will be withdrawn in a future change.
      
      Bug: 32064548
      Test: Manual
      
      Merged-In: I70a3e6e230268d12b454e849fa88418082269c4f
      Change-Id: Ib4b73fc130f4993c44d96c8d68f61b6d9bb2c7d5
      e628cb5b
  8. May 30, 2017
    • Chad Brubaker's avatar
      Allow ephemeral apps to find media.drm · d2b3a454
      Chad Brubaker authored
      Bug: 62102558
      Test: see b/62102558
      Change-Id: If80d1270bcf6835e6d1a78e2176c3e139cebd174
      d2b3a454
    • Narayan Kamath's avatar
      SEPolicy: Changes for new stack dumping scheme. · 11bfcc1e
      Narayan Kamath authored
      Applications connect to tombstoned via a unix domain socket and request
      an open FD to which they can write their traces. This socket has a new
      label (tombstoned_java_trace_socket) and appdomain and system_server are
      given permissions to connect and write to it.
      
      Apps no longer need permissions to open files under /data/anr/ and
      these permissions will be withdrawn in a future change.
      
      Bug: 32064548
      Test: Manual
      
      (cherry picked from commit a8832dabc7f3b7b2381760d2b95f81abf78db709)
      
      Change-Id: I70a3e6e230268d12b454e849fa88418082269c4f
      11bfcc1e
  9. May 26, 2017
  10. May 25, 2017
  11. May 24, 2017
    • Sandeep Patil's avatar
      Allow init to run vendor toybox for modprobe · d46b5d35
      Sandeep Patil authored
      
      vendor implementations need to be able to run modprobe as part of
      init.rc scripts.  They cannot do so because of the strict neverallow
      currently in place that disallows all coredomains (including init)
      to execute vendor toybox.
      
      Fix this by adding init to the exception list for the neverallow so
      vendors can then run modprobe from .rc scripts and also add the rule to
      allow init to transition to modprobe domain using vendor_toolbox.
      
      Bug: b/38212864
      Test: Boot sailfish
      
      Change-Id: Ib839246954e9002859f3ba986094f206bfead137
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      d46b5d35
  12. May 23, 2017
    • pkanwar's avatar
      SE Policy for Tether Offload HAL · c67fa9bf
      pkanwar authored
      Update SE Policy to allow calls to and callbacks for the Tether Offload HAL
      HIDL binderized service.
      
      Bug: 38417260
      Test: New functionality. So we don't have any tests.
      Change-Id: I2c95b290523c55c081afa1bca091f368559c9125
      (cherry picked from commit 722249b3)
      c67fa9bf
    • pkanwar's avatar
      SE Policy for Tether Offload HAL · 722249b3
      pkanwar authored
      Update SE Policy to allow calls to and callbacks for the Tether Offload HAL
      HIDL binderized service.
      
      Bug: 38417260
      Test: New functionality. So we don't have any tests.
      Change-Id: I2c95b290523c55c081afa1bca091f368559c9125
      722249b3
  13. May 22, 2017
  14. May 19, 2017
  15. May 18, 2017
    • Sohani Rao's avatar
      SE Policy for Wifi Offload HAL · 325bf725
      Sohani Rao authored
      Update SE Policy to allow calls to and callbacks from Wifi Offload HAL
      HIDL binderized service.
      Combined cherry pick from d56aa1982d15acfc2408271138dac43f1e5dc987
      and 66e27bf5
      
      Bug: 32842314
      Test: Unit tests, Mannual test to ensure Wifi can be brought up and
      connected to an AP, ensure that Offload HAL service is running and that
      that wificond can get the service handle by calling hwservicemanager.
      
      Change-Id: I0fc51a4152f1891c8d88967e75d45ded115e766e
      325bf725
  16. May 17, 2017
    • Steven Moreland's avatar
      Add fwk_display_hwservice. · e8ab0020
      Steven Moreland authored
      This hidl service provides information about vsync and hotplug
      to vendor services which is required by at least some camera
      hal implementations.
      
      Test: VtsFwkDisplayServiceV1_0TargetTest
      Test: no denials
      Bug: 38311538
      Change-Id: I64f0321e2832facf987057f0d48940e269d8e2d9
      e8ab0020
    • Jiyong Park's avatar
      sepolicy: allow apps to execute libs embedded inside vendor apk · 86539031
      Jiyong Park authored
      Currently, some jni libs in /vendor/lib are allowed to be executed
      in java process by labelling them as same_process_hal_file. This is
      wrong because those jni libs are not in fact same process HALs.
      
      After b/37481404, those jni libs for vendor apks are embedded inside the
      apk just like downloaded apks.
      
      In order to make this possible, appdomain is allowed to execute
      vendor_app_file. Note that allowing this is not a Treble violation because
      vendor_app_file is Java and JNI code only. Native libraries in
      /vendor/lib are still prevented from being loaded in apps except for
      those are labeled as same_process_hal_file AND are loaded via the
      'sphal' namespace.
      
      Bug: 37481404
      Test: Phone application does not crash.
      Change-Id: Ifaece2f05d0b20e28c4b1c0847f5ea0bb28ade02
      86539031
  17. May 15, 2017
    • Jeff Vander Stoep's avatar
      Move domain_deprecated into private policy · 76aab82c
      Jeff Vander Stoep authored
      This attribute is being actively removed from policy. Since
      attributes are not being versioned, partners must not be able to
      access and use this attribute. Move it from private and verify in
      the logs that rild and tee are not using these permissions.
      
      Bug: 38316109
      Test: build and boot Marlin
      Test: Verify that rild and tee are not being granted any of these
            permissions.
      Change-Id: I31beeb5bdf3885195310b086c1af3432dc6a349b
      76aab82c
    • Alex Vakulenko's avatar
      SELinux policies for PDX services · c4055f0d
      Alex Vakulenko authored
      Specify per-service rules for PDX transport. Now being able to
      grant permissions to individual services provided by processes,
      not all services of a process.
      
      Also tighter control over which permissions are required for
      client and server for individual components of IPC (endpoints,
      channels, etc).
      
      Bug: 37646189
      Change-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea
      Merged-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea
      c4055f0d
  18. May 12, 2017
    • Andrew Scull's avatar
      SELinux policies for Weaver HAL. · 3c90eaf2
      Andrew Scull authored
      Bug: 35628284
      Change-Id: I08877ac117212325b1259f7d90a4c0cb1dac2d9f
      Fix: 38233550
      Test: Build and boot
      Merged-In: I4cdacb601e0eea1f5f0e721c568c7ee04298704f
      3c90eaf2
    • Andrew Scull's avatar
      SELinux policies for the OEM lock HAL. · 0e9b2207
      Andrew Scull authored
      Bug: 34766843
      Change-Id: I5be615d818ecf999fec6514ce9b89ff6a7f13cd6
      Fix: 38232801
      Test: Build and boot
      Merged-In: Ice78aedfdbe82477a84252499a76dad37887fe6b
      0e9b2207
  19. May 11, 2017
    • Luke Song's avatar
      Move sensord sepolicy · 2dd9ae33
      Luke Song authored
      Sensord move in ag/2106763 should be accompanied by corresponding
      sepolicy move of sensord-related files/declarations.
      
      Bug: 36996994
      Test: Sailfish build shows no related permission errors
      Change-Id: Ibe41b363f7ca2752b5d3e0961298985cf784663d
      2dd9ae33
    • Tom Cherry's avatar
      Revert "remove /dev/log" · 5dff1962
      Tom Cherry authored
      This reverts commit 8c60f74d.
      
      Bug: 38242876
      Change-Id: Iba5a94d16901dc0c52f1941972c26877baa4805c
      5dff1962
    • Siarhei Vishniakou's avatar
      Allow shell access on /dev/uhid node · 2a7f5710
      Siarhei Vishniakou authored
      Node for /dev/uhid driver needs to be accessible
      by shell for the 'hid' command in frameworks/base/cmds.
      This CL is in support of another CL c/2048848, topic
      'Refactor hid command in /frameworks/base/cmds'
      in internal master.
      
      Bug: 34052337
      Test: CTS test for GamepadTestCase#testButtonA; Checked that
      cat /dev/uhid does not raise permission error.
      
      Change-Id: I861c1226b4a67272af7c2a93d7811bf87a083478
      2a7f5710
  20. May 10, 2017
    • Alex Vakulenko's avatar
      SELinux policies for PDX services · 41daa7f8
      Alex Vakulenko authored
      Specify per-service rules for PDX transport. Now being able to
      grant permissions to individual services provided by processes,
      not all services of a process.
      
      Also tighter control over which permissions are required for
      client and server for individual components of IPC (endpoints,
      channels, etc).
      
      Bug: 37646189
      Change-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea
      41daa7f8
  21. May 09, 2017
  22. May 08, 2017
    • Yifan Hong's avatar
      Allow adbd and shell to read /proc/config.gz · 19a87733
      Yifan Hong authored
      for CTS device info collection purposes.
      
      Bug: 28656227
      Test: m cts -j && cts-tradefed run cts -m Gesture --test
      android.gesture.cts.GestureTest#testGetStrokes
      
      Change-Id: I8caf3580fb05fb489dc5abb917c8cb78cb089fb7
      19a87733
    • Nick Kralevich's avatar
      Further restrict SELinux API access · 14e2e926
      Nick Kralevich authored
      Remove SELinux access from domain_deprecated. Access to SELinux APIs can
      be granted on a per-domain basis.
      
      Remove appdomain access to SELinux APIs. SELinux APIs are not public and
      are not intended for application use. In particular, some exploits poll
      on /sys/fs/selinux/enforce to determine if the attack was successful,
      and we want to ensure that the behavior isn't allowed. This access was
      only granted in the past for CTS purposes, but all the relevant CTS
      tests have been moved to the shell domain.
      
      Bug: 27756382
      Bug: 28760354
      Test: Device boots and no obvious problems. No collected denials.
      Change-Id: Ide68311bd0542671c8ebf9df0326e512a1cf325b
      14e2e926
  23. May 04, 2017
Loading