Skip to content
Snippets Groups Projects
  1. May 04, 2017
    • Mikhail Naganov's avatar
      hal_audio: Allow writing dump info into pipes when capturing BR · 9686cbcd
      Mikhail Naganov authored
      The following HAL methods use file descriptors to write dump
      info comprising audioflinger debug dump:
      
      IDevice.debugDump
      IEffectsFactory.debugDump
      IStream.debugDump
      
      Bug: 37993476
      Test: check contents of media.audio_flinger section in
            a bugreport captured on Pixel device
      
      Change-Id: I77d347c019ac93c3ba0d54ce50f0fdc243b04685
      9686cbcd
    • Dimitry Ivanov's avatar
      Allow getattr on tempfs files · bf030965
      Dimitry Ivanov authored
      This is needed by linker to be able to load libraries from memfd
      which currently generated following denial:
      avc: denied { getattr } for path=2F6D656D66643A666F6F626172202864656C6574656429 dev="tmpfs" ino=902079 scontext=u:r:shell:s0 tcontext=u:object_r:shell_tmpfs:s0 tclass=file permissive=0
      
      Bug: http://b/37245203
      Bug: http://b/37916741
      Test: builds
      Change-Id: I5b57b6cada50a62657c8daaaaaa56f1ee9cdb376
      (cherry picked from commit a0d3ff8e)
  2. May 01, 2017
  3. Apr 28, 2017
    • Andreas Gampe's avatar
      fc_sort: Fix leaks · c32d7bae
      Andreas Gampe authored
      Use the getline API correctly: keep a single buffer as long as
      possible, and let the callee handle re-allocation. Move the final
      free out of the loop.
      
      Release the head of the linked list.
      
      Bug: 37757586
      Test: ASAN_OPTIONS= SANITIZE_HOST=address mmma system/sepolicy
      Change-Id: I42424acba7cd68c1b9a7a43e916a421ac3e253f7
      c32d7bae
    • Andreas Gampe's avatar
      Sepolicy-Analyze: Plug leak · ee8b67df
      Andreas Gampe authored
      Destroy the policy before exiting (for successful = expected runs).
      
      Bug: 37757759
      Test: ASAN_OPTIONS= SANITIZE_HOST=address m
      Change-Id: I67e35fbede696ec020a53b69a6cef9f374fae167
      ee8b67df
  4. Apr 27, 2017
  5. Apr 26, 2017
  6. Apr 25, 2017
  7. Apr 20, 2017
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      Only the bluetooth app may run in the bluetooth domain · 67b40378
      Jeff Vander Stoep authored
      Remove neverallow exemption allowing other processes to run in
      the bluetooth app's selinux domain.
      
      The bluetooth domain is intended to host the zygote spawned
      bluetooth app. It is not intended to host other bluetooth related
      processes. Please define new domains for these processes.
      
      Test: build Marlin
      Change-Id: I1fd3dd0fe85f73457d77b63a65b4307821cbd41c
      67b40378
    • Neil Fuller's avatar
      Allow the shell user to run tzdatacheck · 5684f61f
      Neil Fuller authored
      Allow the shell user to run tzdatacheck, which is required
      to enable a new host side test.
      
      This change also adds some additional checks to
      tzdatacheck.te to ensure that OEMs opening up permissions
      further don't accidentally create a security hole.
      
      Bug: 31008728
      Test: Ran CTS
      Change-Id: I6ebfb467526b6b2ea08f891420eea24c81ed1e36
      5684f61f
  8. Apr 19, 2017
  9. Apr 18, 2017
  10. Apr 17, 2017
    • Jerry Zhang's avatar
      Split mediaprovider as a separate domain from priv_app · 9f152d98
      Jerry Zhang authored
      MediaProvider requires permissions that diverge from those
      of a typical priv_app. This create a new domain and removes
      Mtp related permissions from priv_app.
      
      Bug: 33574909
      Test: Connect with MTP, download apps and files, select ringtones
      Test: DownloadProvider instrument tests, CtsProviderTestCases
      
      Change-Id: I950dc11f21048c34af639cb3ab81873d2a6730a9
      9f152d98
  11. Apr 15, 2017
  12. Apr 14, 2017
    • Tianjie Xu's avatar
      Allow recovery to read thermal info on sailfish · b4e4565d
      Tianjie Xu authored
      Encountered more denials on sailfish:
      
      avc:  denied  { read } for  pid=439 comm="recovery" name="thermal"
      dev="sysfs" ino=28516 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=0
      
      avc:  denied  { read } for  pid=441 comm="recovery"
      name="thermal_zone9" dev="sysfs" ino=40364 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_thermal:s0 tclass=lnk_file permissive=0
      
      Bug: 36920500
      Test: sideload a package in sailfish
      Change-Id: Ib4e89ba48cdc383318e5f3b7b15f542434e43564
      b4e4565d
    • Treehugger Robot's avatar
      e453801d
  13. Apr 13, 2017
    • Jeff Vander Stoep's avatar
      bluetooth: Remove domain_deprecated · ff1e0184
      Jeff Vander Stoep authored
      Remove domain_deprecated from bluetooth. This removes some unnecessarily
      permissive rules.
      
      Bug: 25433265
      Test: All of the permissions being removed were being audited. Verify
            that no audited (granted) avc messages for bluetooth exist in
            in the logs.
      
      Change-Id: Ifa12a0f1533edcb623bbb9631f88f1ff1d6d7085
      ff1e0184
    • Jerry Zhang's avatar
      Add configfs file permissions to init. · f3b5bd64
      Jerry Zhang authored
      These were previously in device specific sepolicies.
      They should be in core sepolicy to reflect their
      use by a core init file, init.usb.configfs.rc.
      
      Addresses denial:
      
      init    : type=1400 audit(0.0:135): avc: denied { unlink } for name="f1"
      dev="configfs" ino=10923 scontext=u:r:init:s0
      tcontext=u:object_r:configfs:s0 tclass=lnk_file permissive=0
      
      Test: denial addressed
      Change-Id: I869892f9d0c311b727462fb380f4160feb986215
      f3b5bd64
  14. Apr 12, 2017
  15. Apr 11, 2017
    • Tom Cherry's avatar
      remove /dev/log · 8c60f74d
      Tom Cherry authored
      This was marked deprecated in 2014 and removed in 2015, let's remove
      the sepolicy now too.
      
      Test: see that logging still works on bullhead
      
      Change-Id: I4caa0dbf77956fcbc61a07897242b951c275b502
      8c60f74d
    • Jorge Lucangeli Obes's avatar
      system_server: Report dalvikcache_data_file execute violations. · 665128fa
      Jorge Lucangeli Obes authored
      With build/core eaa9d88cf, system_server should not be loading code
      from /data. Add an auditallow rule to report violations.
      
      Bug: 37214733
      Test: Boot marlin, no SELinux audit lines for system_server.
      Change-Id: I2e25eb144503274025bd4fc9bb519555851f6521
      665128fa
    • Dan Cashman's avatar
      Add PLATFORM_SEPOLICY_VERSION. · bec5e57e
      Dan Cashman authored
      Create PLATFORM_SEPOLICY_VERSION, which is a version string to represent
      the platform sepolicy of the form "NN.m" where "NN" mirrors the
      PLATFORM_SDK_VERSION and "m" is a policy-based minor version that is
      incremented with every policy change that requires a new backward-compatible
      mapping file to be added to allow for future-proofing vendor policy against
      future platform policy.
      
      (cherry-pick of commit 6f14f6b7)
      
      Bug: 36783775
      Test: Device boots when sha256 doesn't match and compilation is forced.
      Change-Id: I4edb29824f2050a5a6e1bc078c100cf42e45c303
      bec5e57e
    • Sandeep Patil's avatar
      sepolicy_version: change current version to NN.m format · 9a3a6a81
      Sandeep Patil authored
      
      The sepolicy version takes SDK_INT.<minor> format. Make sure our
      'current' policy version reflects the format and make it '100000.0'.
      This ensures any vendor.img compiled with this will never work with
      a production framework image either.
      
      Make version_policy replace the '.' in version by '_' so secilc is
      happy too.
      
      This unblocks libvintf from giving out a runtme API to check vendor's
      sepolicy version. The PLAT_PUBLIC_SEPOLICY_CURRENT_VERSION will
      eventually be picked up from the build system.
      
      (cherry-pick of commit 42f95984)
      
      Bug: 35217573
      Test: Build and boot sailfish.
            Boot sailfish with sepolicy compilation on device.
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      
      Change-Id: Ic8b6687c4e71227bf9090018999149cd9e11d63b
      9a3a6a81
  16. Apr 10, 2017
  17. Apr 07, 2017
Loading