- Apr 03, 2018
-
-
Jeff Vander Stoep authored
Types in sysfs should have the sysfs_type attribute, types in debugfs and tracefs should have the debugfs_type attribute. TODO: Test that files in procfs have the proc_type attribute. TODO: Assert these tests in CTS. Bug: 74182216 Test: build - these are build-time tests. Change-Id: Icf0ff2a26c05f94da421ba23df0b92d8eef906bf Merged-In: Icf0ff2a26c05f94da421ba23df0b92d8eef906bf (cherry picked from commit 1b828444)
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
TreeHugger Robot authored
- Apr 02, 2018
-
-
Jaekyun Seok authored
A default value of persist.sys.sf.native_mode could be set by SoC partners in some devices including some pixels. So it should have vendor_init_settable accessibility. Bug: 74266614 Test: succeeded building and tested with a pixel device with PRODUCT_COMPATIBLE_PROPERTY_OVERRIDE=true. Change-Id: I5d7a029f82505983d21dc722541fb55761a8714d Merged-In: I5d7a029f82505983d21dc722541fb55761a8714d (cherry picked from commit 0dc35873)
-
Andreas Gampe authored
Update for debugfs labeling changes. Update for simpleperf behavior with stack traces (temp file). (cherry picked from commit c8fe29ff) Bug: 73175642 Test: m Test: manual - run profiling, look for logs Merged-In: Ie000a00ef56cc603f498d48d89001f566c03b661 Change-Id: Ie000a00ef56cc603f498d48d89001f566c03b661
-
TreeHugger Robot authored
-
- Mar 31, 2018
-
-
yro authored
Bug: 75968642 Test: manual testing to check for sepolicy violation Cherry-picked from aosp/652222 Change-Id: Idc83669feaf9fd17bed26f89dfce33e3f2f5424f
-
- Mar 30, 2018
-
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Chenbo Feng authored
The netutils_wrapper is a process used by vendor code to update the iptable rules on devices. When it update the rules for a specific chain. The iptable module will reload the whole chain with the new rule. So even the netutils_wrapper do not need to add any rules related to xt_bpf module, it will still reloading the existing iptables rules about xt_bpf module and need pass through the selinux check again when the rules are reloading. So we have to grant it the permission to reuse the pinned program in fs_bpf when it modifies the corresponding iptables chain so the vendor module will not crash anymore. Test: device boot and no more denials from netutils_wrapper Bug: 72111305 Change-Id: I62bdfd922c8194c61b13e2855839aee3f1e349be (cherry picked from aosp commit 2623ebcf)
-
TreeHugger Robot authored
-
Tri Vo authored
This will test that system/sepolicy/{public/, private/} are identical to prebuilts if PLATFORM_SEPOLICY_VERSION is not 10000.0. Bug: 74622750 Test: build policy Test: correctly catches divergence from prebuilts for frozen policies Change-Id: I2fa14b672544a021c2d42ad5968dfbac21b72f6a (cherry picked from commit 81198bb8)
-
TreeHugger Robot authored
-
Primiano Tucci authored
-
- Mar 29, 2018
-
-
TreeHugger Robot authored
-
Florian Mayer authored
See also go/perfetto-io-tracing-security. * Grant CAP_DAC_READ_SEARCH to traced_probes. * Allow traced_probes to list selected labels. * Change ext4 and f2fs events to be available on user builds. Bug: 74584014 Cherry-picked from aosp/631805 Change-Id: I891a0209be981d760a828a69e4831e238248ebad Merged-In: I891a0209be981d760a828a69e4831e238248ebad
-
Joel Galenson authored
This allows init to write to it, which it does for atrace. Bug: 72643420 Test: Boot two devices, observe no denials, test atrace. Change-Id: I6810e5dcdfaff176bd944317e66d4fe612ccebed
-
Jeff Vander Stoep authored
Access to these files was removed in Oreo. Enforce that access is not granted by partners via neverallow rule. Also disallow most untrusted app access to net.dns.* properties. Bug: 77225170 Test: system/sepolicy/tools/build_policies.sh Change-Id: I85b634af509203393dd2d9311ab5d30c65f157c1 (cherry picked from commit 886aa54b)
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Alan Stokes authored
The kernel generates file creation audits when O_CREAT is passed even if the file already exists - which it always does in the cgroup cases. We add neverallow rules to prevent mistakenly allowing unnecessary create access. We also suppress these denials, which just add noise to the log, for the more common culprits. Bug: 72643420 Bug: 74182216 Test: Ran build_policies.sh and checked failures were unrelated. Test: Device still boots, denials gone. Change-Id: I034b41ca70da1e73b81fe90090e656f4a3b542dc
-
Pawin Vongmasa authored
Test: Builds Bug: 64121714 Bug: 31973802 Change-Id: Id37be8726a8bb297e35bca494964fdbcc48c6a73
-
TreeHugger Robot authored
-
- Mar 28, 2018
-
-
Yi Jin authored
Bug: 73354384 Test: manual Change-Id: I4fa630624cc247275e11965471461502f451edf4
-
TreeHugger Robot authored
-
Joel Galenson authored
These denials occur fairly often, causing some logspam. Bug: 77225170 Test: Boot device. Change-Id: Icd73a992aee44007d0873743f706758f9a19a112
-
Alan Stokes authored
In permissive mode we get more spurious denials when O_CREAT is used with an already-existing file. They're harmless so we don't need to audit them. Example denials: denied { add_name } for name="trigger" scontext=u:r:init:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1 denied { create } for name="trigger" scontext=u:r:init:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1 Bug: 72643420 Bug: 74182216 Test: Device boots, denials gone. Change-Id: I54b1a0c138ff5167f1d1d12c4b0b9e9afaa5bca0
-
TreeHugger Robot authored
-
Jaekyun Seok authored
A default value of persist.radio.multisim.config can be set by SoC vendors, and so vendor-init-settable should be allowed to it. Bug: 73871799 Test: succeeded building and tested with taimen Change-Id: Ie62b91e7e3d7e05425b742838417f1cab7b3fed4 Merged-In: Ie62b91e7e3d7e05425b742838417f1cab7b3fed4 (cherry picked from commit ac8c6e3d)
-
Andreas Gampe authored
Give statsd rights to connect to perfprofd in userdebug. (cherry picked from commit 488030ee) Bug: 73175642 Test: mmma system/extras/perfprofd Merged-In: Idea0a6b757d1b16ec2e6c8719e24900f1e5518fd Change-Id: Idea0a6b757d1b16ec2e6c8719e24900f1e5518fd
-
- Mar 27, 2018
-
-
Janis Danisevskis authored
The ConfirmationUI API has a callback interface by which confirmation results are presented to the calling app. This requires keystore to call into apps. Test: Device boots and no more denials when call back is delivered to apps. Bug: 63928580 Change-Id: Ie23211aeb74c39956c3c3b8b32843d35afa1315a
-
Joel Galenson authored
Use the user policy when running the compatibility tests. Bug: 74344625 Test: Built policy for many devices. Booted one device. Test: Delete some compat rules, verify error on userdebug. Change-Id: Ib2df2dfc06cdf55a839011e9a528e76160a9e436 (cherry picked from commit c1486218)
-
- Mar 26, 2018
-
-
Tom Cherry authored
Verify that the SELabels used in property_contexts correspond to a real type in the SEPolicy and that this type has the property_type attribute. Additionally add a check that vendor property_context files do not duplicate entries in plat property_contexts, and a similar check that odm property_contexts doesn't duplicate either plat or vendor property_contexts. Bug: 74078792 Test: Build property_contexts on bullhead successfully Test: See failure when using a faulty SELabel in property_contexts Test: See failure when duplicating label in vendor and plat property_contexts Change-Id: I4d2338dab68f1c5a8ed110aa7821f0677f61bafb (cherry picked from commit a15df75d)
-
TreeHugger Robot authored
-
Jeff Vander Stoep authored
Suppress WAI denials from crashdump. Test: build/flash Taimen. Verify no new denials. Bug: 68319037 Change-Id: If39d057cb020def7afe89fd95e049e45cce2ae16
-
TreeHugger Robot authored
-
Primiano Tucci authored
This allows an optimization that consists in the "perfetto" cmdline client passing directly the file descriptor for the output trace to traced (as opposite to having traced streaming back the trace data to "perfetto" and having that one doing the write() into file). This reduces sensibly the memory traffic and CPU overhead of traces with a minor change. Bug: 73625179 Test: builds + perfetto_integrationtests w/ long_trace.cfg Change-Id: I81f5a230338ced20dc543fd91c5a0bd0e58725f2 Merged-In: I81f5a230338ced20dc543fd91c5a0bd0e58725f2 (cherry picked from aosp/648831)
-
- Mar 24, 2018
-
-
Chenbo Feng authored
The permission to allow system_server to access sys/fs/bpf/ directory is missing. Add it back so it can get the bpf maps from the bpf_fs. Test: device boot and no more denial information of system_server try to searcg in fs_bpf atest android.net.cts.TrafficStatsTest Bug: 75285088 Change-Id: I1040cde6c038eccc4e91c69a10b20aa7a18b19f6 (cherry picked from aosp commit f83bbd17)
-