Skip to content
Snippets Groups Projects
  1. Sep 10, 2016
  2. Sep 09, 2016
  3. Sep 07, 2016
  4. Sep 01, 2016
  5. Aug 31, 2016
  6. Aug 29, 2016
    • Douglas Leung's avatar
      Fix ioctl defines for Mips. · 5807d1d2
      Douglas Leung authored
      This patch allows mips to boot in enforcing mode.
      
      Change-Id: Ia4676db06adc3ccb20d5f231406cf4ab67317496
      5807d1d2
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: Allow kernel to read proc · 31e64607
      Jeff Vander Stoep authored
      am: c8820d04  -s ours
      
      Change-Id: I7a9086cbd781d8e4450564f6c7c1697fd14643f6
      31e64607
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: domain_deprecate: remove observed audit messages · 6b8e0994
      Jeff Vander Stoep authored
      am: 3dfef1fd  -s ours
      
      Change-Id: Ia0adf841c0b37647c27fe31b805abcf3cff4d62c
      6b8e0994
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: audit domain_deprecated perms for removal · e892f8a6
      Jeff Vander Stoep authored
      am: fe8d6739  -s ours
      
      Change-Id: I199ff6989c4acceb1878062ce9086ad9da6444b2
      e892f8a6
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: Allow kernel to read proc · c8820d04
      Jeff Vander Stoep authored
      (cherry picked from commit 48d68a64)
      
      Remove audit messaged.
      
      Addresses:
      avc:  granted  { read } for  pid=1 comm="init" name="cmdline" dev="proc" ino=4026535448 scontext=u:r:kernel:s0 tcontext=u:object_r:proc:s0 tclass=file
      avc:  granted  { read open } for  pid=1 comm="init" path="/proc/cmdline" dev="proc" ino=4026535448 scontext=u:r:kernel:s0 tcontext=u:object_r:proc:s0 tclass=file
      
      Bug: 28760354
      Change-Id: I48ea01b35c6d1b255995484984ec92203b6083be
      c8820d04
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: domain_deprecate: remove observed audit messages · 3dfef1fd
      Jeff Vander Stoep authored
      (cherry picked from commit 8486f4e6)
      
      Grant observed permissions
      
      Addresses:
      init
      avc:  granted  { use } for  pid=1 comm="init" path="/sys/fs/selinux/null" dev="selinuxfs" ino=22 scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=fd
      
      mediaextractor
      avc: granted { getattr } for pid=582 comm="mediaextractor" path="/proc/meminfo" dev="proc" ino=4026535447 scontext=u:r:mediaextractor:s0 tcontext=u:object_r:proc_meminfo:s0 tclass=file
      avc: granted { read } for pid=582 comm="mediaextractor" name="meminfo" dev="proc" ino=4026535447 scontext=u:r:mediaextractor:s0 tcontext=u:object_r:proc_meminfo:s0 tclass=file
      avc: granted { read open } for pid=582 comm="mediaextractor" path="/proc/meminfo" dev="proc" ino=4026535447 scontext=u:r:mediaextractor:s0 tcontext=u:object_r:proc_meminfo:s0 tclass=file
      
      uncrypt
      avc: granted { getattr } for pid=6750 comm="uncrypt" path="/fstab.angler" dev="rootfs" ino=9809 scontext=u:r:uncrypt:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      avc: granted { read } for pid=6750 comm="uncrypt" name="fstab.angler" dev="rootfs" ino=9809 scontext=u:r:uncrypt:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      avc: granted { read open } for pid=6750 comm="uncrypt" path="/fstab.angler" dev="rootfs" ino=9809 scontext=u:r:uncrypt:s0 tcontext=u:object_r:rootfs:s0 tclass=file
      
      Bug: 28760354
      Change-Id: Ibd51473c55d957aa7375de60da67cdc6504802f9
      3dfef1fd
    • Mitchell Wills's avatar
      Merge changes from topic 'wifi-aosp-master' into stage-aosp-master · d48127be
      Mitchell Wills authored
      * changes:
        Allow wificond to drop privileges after startup
        Allow wificond to set interfaces up and down
        Allow wificond to clean up wpa_supplicant state
        Allow wificond to drop signals on hostapd
        Give wificond permission to start/stop init services
        Give hostapd permissions to use its control socket
        Allow wificond to write wifi component config files
        add netlink socket permission for wificond
        SEPolicy to start hostapd via init
        Allow system_server to call wificond via Binder
        Allow wificond to mark interfaces up and down
        Separate permissions to set WiFi related properties
        Define explicit label for wlan sysfs fwpath
        sepolicy: Add permissions for wpa_supplicant binder
        sepolicy: add sepolicy binder support for wificond
        Sepolicy files for wificond
      d48127be
    • Jeff Vander Stoep's avatar
      DO NOT MERGE: audit domain_deprecated perms for removal · fe8d6739
      Jeff Vander Stoep authored
      Grant permissions observed.
      
      (cherry picked from commit 9c820a11)
      
      Merged-in: Ifdead51f873eb587556309c48fb84ff1542ae303
      Bug: 28760354
      Change-Id: Ifdead51f873eb587556309c48fb84ff1542ae303
      fe8d6739
    • Jeffrey Vander Stoep's avatar
      Merge "resurrect camera_device" · 8585e8db
      Jeffrey Vander Stoep authored
      am: 163c6080
      
      Change-Id: Ia7e00dda7fea4e58c450c50ab7fd5fc709ebaa3e
      8585e8db
    • Jeffrey Vander Stoep's avatar
      Merge "resurrect camera_device" · 163c6080
      Jeffrey Vander Stoep authored
      163c6080
  7. Aug 28, 2016
  8. Aug 27, 2016
  9. Aug 26, 2016
    • Christopher Wiley's avatar
      Allow wificond to drop privileges after startup · 3c285a28
      Christopher Wiley authored
      wificond will now change user/group to wifi/wifi after
      taking control of a particular path in the sysfs.
      
      Bug: 29870863
      Change-Id: I9ccb23f60a66d6850f3969c364288f8850044fed
      Test: wificond unit and integration tests pass
      (cherry picked from commit 8a04a313)
      3c285a28
    • Christopher Wiley's avatar
      Allow wificond to set interfaces up and down · baf3cc22
      Christopher Wiley authored
      This is apparently a privileged ioctl.  Being able to do this allows us
      to no longer kill hostapd with SIGTERM, since we can cleanup after hard
      stops.
      
      Bug: 31023120
      Test: wificond unit and integration tests pass
      
      Change-Id: Icdf2469d403f420c742871f54b9fb17432805991
      (cherry picked from commit ca7b04ba)
      baf3cc22
    • Christopher Wiley's avatar
      Allow wificond to clean up wpa_supplicant state · af6faa70
      Christopher Wiley authored
      system_server communicates with wpa_supplicant via various control
      sockets.  Allow wificond to unlink these sockets after killing
      wpa_supplicant.
      
      Bug: 30666540
      Change-Id: Ic1419a587f066c36723c24518952025834959535
      (cherry picked from commit ba96cd1c)
      af6faa70
    • Christopher Wiley's avatar
      Allow wificond to drop signals on hostapd · fd1cdd3f
      Christopher Wiley authored
      Stopping hostapd abruptly with SIGKILL can sometimes leave the driver
      in a poor state.  Long term, we should pro-actively go in and clean up
      the driver.  In the short term, it helps tremendously to send SIGTERM
      and give hostapd time to clean itself up.
      
      Bug: 30311493
      Test: With patches in this series, wificond can cleanly start and stop
            hostapd in integration tests.
      
      Change-Id: Ic770c2fb1a1b636fced4620fe6e24d1c8dcdfeb8
      (cherry picked from commit 762cb7c4)
      fd1cdd3f
    • Christopher Wiley's avatar
      Give wificond permission to start/stop init services · 07200122
      Christopher Wiley authored
      Bug: 30292103
      Change-Id: I433f2b8cc912b42bf026f6e908fd458a07c41fc2
      Test: Integration tests reveal wificond can start/stop hostapd.
      (cherry picked from commit 1faa9c55)
      07200122
    • Christopher Wiley's avatar
      Give hostapd permissions to use its control socket · ce7bb1d4
      Christopher Wiley authored
      Bug: 30311493
      Test: hostapd starts and stops reliably without complaining about
            permission to create the control directory, the control socket,
            or write to the control socket.
      
      Change-Id: If8cf57cce5df2c6af06c8b7f28708e40876e948c
      (cherry picked from commit cbabe363)
      ce7bb1d4
    • Christopher Wiley's avatar
      Allow wificond to write wifi component config files · da35cbcc
      Christopher Wiley authored
      We need the ability to set file permissions, create files, write
      files, chown files.
      
      Test: integration tests that start/stop hostapd and write its config
            file via wificond pass without SELinux denials.
      Bug: 30040724
      
      Change-Id: Iee15fb36a6a4a89009d4b45281060379d70cd53c
      (cherry picked from commit f83da142)
      da35cbcc
    • Ningyuan Wang's avatar
      add netlink socket permission for wificond · 49f86f5b
      Ningyuan Wang authored
       wificond: type=1400 audit(0.0:43): avc: denied { create } for
       scontext=u:r:wificond:s0 tcontext=u:r:wificond:s0 tclass=netlink_socket
       permissive=1
      
       wificond: type=1400 audit(0.0:44):
       avc: denied { setopt } for scontext=u:r:wificond:s0
       tcontext=u:r:wificond:s0 tclass=netlink_socket permissive=1
      
       wificond: type=1400 audit(0.0:45):
       avc: denied { net_admin } for capability=12 scontext=u:r:wificond:s0
       tcontext=u:r:wificond:s0 tclass=capability permissive=1
      
       wificond: type=1400 audit(0.0:46):
       avc: denied { bind } for scontext=u:r:wificond:s0
       tcontext=u:r:wificond:s0 tclass=netlink_socket permissive=1
      
       wificond: type=1400 audit(0.0:47):
       avc: denied { write } for scontext=u:r:wificond:s0
       tcontext=u:r:wificond:s0 tclass=netlink_socket permissive=1
      
       wificond: type=1400 audit(0.0:48):
       avc: denied { read } for path="socket:[35892]" dev="sockfs" ino=35892
       scontext=u:r:wificond:s0 tcontext=u:r:wificond:s0 tclass=netlink_socket
       permissive=1
      
      TEST=compile and run
      
      Change-Id: I5e1befabca7388d5b2145f49462e5cff872d9f43
      (cherry picked from commit 781cfd82)
      49f86f5b
    • Christopher Wiley's avatar
      SEPolicy to start hostapd via init · d29c1a0a
      Christopher Wiley authored
      While here, remove a lot of extra permissions that we apparently
      had because hostapd was inheriting fds from netd.
      
      Bug: 30041118
      Test: netd can request init to start/stop hostapd without denials.
      
      Change-Id: Ia777497443a4226a201030eccb9dfc5a40f015dd
      (cherry picked from commit 8a6c5f85)
      d29c1a0a
    • Christopher Wiley's avatar
      Allow system_server to call wificond via Binder · 1e170519
      Christopher Wiley authored
      WifiStateMachin: type=1400 audit(0.0:24): avc: denied { call } for
      scontext=u:r:system_server:s0 tcontext=u:r:wificond:s0 tclass=binder
      permissive=0
      
      Bug: 29607308
      Test: Above denial disapears
      
      Change-Id: I9b5cfe414683991ffb6308eea612ca6750f1b8ec
      (cherry picked from commit 71fb20be)
      1e170519
    • Christopher Wiley's avatar
      Allow wificond to mark interfaces up and down · 3d5d0832
      Christopher Wiley authored
      avc: denied { create } for scontext=u:r:wificond:s0
      tcontext=u:r:wificond:s0 tclass=udp_socket permissive=0
      
      avc: denied { net_raw } for capability=13 scontext=u:r:wificond:s0
      tcontext=u:r:wificond:s0 tclass=capability permissive=0
      
      avc: denied { read } for name="psched" dev="proc" ino=4026535377
      scontext=u:r:wificond:s0 tcontext=u:object_r:proc_net:s0 tclass=file
      permissive=0
      
      Test: fixes above avc denials
      Bug: 29579539
      
      Change-Id: Ie1dff80103e81cfba8064a22b5dd3e1e8f29471b
      (cherry picked from commit b6a6561d)
      3d5d0832
    • Christopher Wiley's avatar
      Separate permissions to set WiFi related properties · bf18eca5
      Christopher Wiley authored
      wificond would like to be able to set WiFi related properties
      without access to the rest of the system properties.  Today,
      this only involves marking the driver as loaded or unloaded.
      
      avc: denied { write } for name="property_service" dev="tmpfs" ino=10100
      scontext=u:r:wificond:s0 tcontext=u:object_r:property_socket:s0
      tclass=sock_file permissive=0
      
      Bug: 29579539
      Test: No avc denials related to system properties across
            various WiFi events.
      
      Change-Id: I6d9f1de3fbef04cb7750cc3753634f9e02fdb71f
      (cherry picked from commit 1ebfdd6a)
      bf18eca5
Loading