Skip to content
Snippets Groups Projects
  1. Apr 13, 2018
    • Jaekyun Seok's avatar
      Whitelist vendor-init-settable bluetooth_prop and wifi_prop · a11b16c9
      Jaekyun Seok authored
      Values of the following properties are set by SoC vendors on some
      devices including Pixels.
      - persist.bluetooth.a2dp_offload.cap
      - persist.bluetooth.a2dp_offload.enable
      - persist.vendor.bluetooth.a2dp_offload.enable
      - ro.bt.bdaddr_path
      - wlan.driver.status
      
      So they should be whitelisted for compatibility.
      
      Bug: 77633703
      Test: succeeded building and tested with Pixels
      Change-Id: Ib2b81bcc1fd70ddd571dc7fb2b923b576d62b7d5
      Merged-In: Ib2b81bcc1fd70ddd571dc7fb2b923b576d62b7d5
      (cherry picked from commit 224921d1)
      a11b16c9
  2. Apr 11, 2018
    • Jaekyun Seok's avatar
      Allow vendor-init-readable for sys.boot_completed and dev.bootcomplete · ac2e4cce
      Jaekyun Seok authored
      Bug: 75987246
      Test: succeeded builing and tested with taimen
      Change-Id: I2d8bc91c305e665ed9c69459e51204117afb3eee
      ac2e4cce
    • Joel Galenson's avatar
      Widen crash_dump dontaudit. · a01e9313
      Joel Galenson authored
      We have seen crash_dump denials for radio_data_file,
      shared_relro_file, shell_data_file, and vendor_app_file.  This commit
      widens an existing dontaudit to include them as well as others that we
      might see.
      
      Bug: 77908066
      Test: Boot device.
      Change-Id: I9ad2a2dafa8e73b13c08d0cc6886274a7c0e3bac
      (cherry picked from commit a3b3bdbb)
      a01e9313
    • Joel Galenson's avatar
      Hide sys_rawio SELinux denials. · e477c781
      Joel Galenson authored
      We often see the following denials:
      
      avc: denied { sys_rawio } for comm="update_engine" capability=17 scontext=u:r:update_engine:s0 tcontext=u:r:update_engine:s0 tclass=capability permissive=0
      avc: denied { sys_rawio } for comm="boot@1.0-servic" capability=17 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0
      
      These are benign, so we are hiding them.
      
      Bug: 37778617
      Test: Boot device.
      Change-Id: Iac196653933d79aa9cdeef7670076f0efc97b44a
      (cherry picked from commit bf4afae1)
      e477c781
  3. Apr 06, 2018
    • Yifan Hong's avatar
      hal_health: allow to write kernel logs. · 306b2671
      Yifan Hong authored
      This is originally allowed in healthd but the permission
      was not transfered to health HAL. A typical health HAL
      implementation is likely to write battery info to kernel
      logs.
      
      Test: device has battery kernel logs with health HAL
            but without healthd
      
      Bug: 77661605
      
      Change-Id: Ib3b5d3fe6bdb3df2a240c85f9d27b863153805d2
      306b2671
    • Alan Stokes's avatar
      Installd doesn't need to create cgroup files. · 8e8c1093
      Alan Stokes authored
      cgroupfs doesn't allow files to be created, so this can't be needed.
      
      Also remove redundant neverallow and dontaudit rules. These are now
      more broadly handled by domain.te.
      
      Bug: 74182216
      
      Test: Denials remain silenced.
      
      Change-Id: If7eb0e59f567695d987272a2fd36dbc251516e9f
      8e8c1093
  4. Apr 05, 2018
  5. Apr 03, 2018
  6. Apr 02, 2018
    • Jaekyun Seok's avatar
      Allow vendor_init_settable for persist.sys.sf.native_mode · d2a6c235
      Jaekyun Seok authored
      A default value of persist.sys.sf.native_mode could be set by SoC
      partners in some devices including some pixels.
      So it should have vendor_init_settable accessibility.
      
      Bug: 74266614
      Test: succeeded building and tested with a pixel device with
      PRODUCT_COMPATIBLE_PROPERTY_OVERRIDE=true.
      
      Change-Id: I5d7a029f82505983d21dc722541fb55761a8714d
      Merged-In: I5d7a029f82505983d21dc722541fb55761a8714d
      (cherry picked from commit 0dc35873)
      d2a6c235
    • Andreas Gampe's avatar
      Selinux: Fix perfprofd policy · bda72633
      Andreas Gampe authored
      Update for debugfs labeling changes.
      
      Update for simpleperf behavior with stack traces (temp file).
      
      (cherry picked from commit c8fe29ff)
      
      Bug: 73175642
      Test: m
      Test: manual - run profiling, look for logs
      Merged-In: Ie000a00ef56cc603f498d48d89001f566c03b661
      Change-Id: Ie000a00ef56cc603f498d48d89001f566c03b661
      bda72633
    • Jiyong Park's avatar
      Reland "Allow dexopt to follow /odm/lib(64) symlinks."" · c29028f4
      Jiyong Park authored
      This reverts commit 942500b9.
      
      Bug: 75287236
      Test: boot a device
      Merged-In: If81a2d2a46979ffbd536bb95528c3b4ebe3483df
      Change-Id: If81a2d2a46979ffbd536bb95528c3b4ebe3483df
      (cherry picked from commit a6d9d6b6)
      c29028f4
  7. Mar 29, 2018
    • Florian Mayer's avatar
      SELinux changes for I/O tracing. · 8d819055
      Florian Mayer authored
      See also go/perfetto-io-tracing-security.
      
      * Grant CAP_DAC_READ_SEARCH to traced_probes.
      * Allow traced_probes to list selected labels.
      * Change ext4 and f2fs events to be available on user builds.
      
      Bug: 74584014
      Cherry-picked from aosp/631805
      Change-Id: I891a0209be981d760a828a69e4831e238248ebad
      Merged-In: I891a0209be981d760a828a69e4831e238248ebad
      8d819055
    • Alan Stokes's avatar
      Suppress harmless denials for file creation in cgroupfs. · 92c149d0
      Alan Stokes authored
      The kernel generates file creation audits when O_CREAT is passed even
      if the file already exists - which it always does in the cgroup cases.
      
      We add neverallow rules to prevent mistakenly allowing unnecessary
      create access. We also suppress these denials, which just add noise to
      the log, for the more common culprits.
      
      Bug: 72643420
      Bug: 74182216
      
      Test: Ran build_policies.sh and checked failures were unrelated.
      Test: Device still boots, denials gone.
      Change-Id: I034b41ca70da1e73b81fe90090e656f4a3b542dc
      92c149d0
    • Pawin Vongmasa's avatar
      Put in sepolicies for Codec2.0 services · 4be28894
      Pawin Vongmasa authored
      Test: Builds
      
      Bug: 64121714
      Bug: 31973802
      Change-Id: Id37be8726a8bb297e35bca494964fdbcc48c6a73
      4be28894
  8. Mar 28, 2018
    • Alan Stokes's avatar
      Stop O_CREAT logspam in permissive mode. · 7d4294cb
      Alan Stokes authored
      In permissive mode we get more spurious denials when O_CREAT is used
      with an already-existing file. They're harmless so we don't need to
      audit them.
      
      Example denials:
      denied { add_name } for name="trigger" scontext=u:r:init:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1
      denied { create } for name="trigger" scontext=u:r:init:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=file permissive=1
      
      Bug: 72643420
      Bug: 74182216
      
      Test: Device boots, denials gone.
      Change-Id: I54b1a0c138ff5167f1d1d12c4b0b9e9afaa5bca0
      7d4294cb
    • Jaekyun Seok's avatar
      Allow vendor-init-settable to persist.radio.multisim.config · 7d3bd8db
      Jaekyun Seok authored
      A default value of persist.radio.multisim.config can be set by SoC
      vendors, and so vendor-init-settable should be allowed to it.
      
      Bug: 73871799
      Test: succeeded building and tested with taimen
      Change-Id: Ie62b91e7e3d7e05425b742838417f1cab7b3fed4
      Merged-In: Ie62b91e7e3d7e05425b742838417f1cab7b3fed4
      (cherry picked from commit ac8c6e3d)
      7d3bd8db
    • Andreas Gampe's avatar
      Statsd: Allow statsd to contact perfprofd in userdebug · 2767f9d3
      Andreas Gampe authored
      Give statsd rights to connect to perfprofd in userdebug.
      
      (cherry picked from commit 488030ee)
      
      Bug: 73175642
      Test: mmma system/extras/perfprofd
      Merged-In: Idea0a6b757d1b16ec2e6c8719e24900f1e5518fd
      Change-Id: Idea0a6b757d1b16ec2e6c8719e24900f1e5518fd
      2767f9d3
  9. Mar 27, 2018
    • Janis Danisevskis's avatar
      Keystore needs to be able to call apps · a290f576
      Janis Danisevskis authored
      The ConfirmationUI API has a callback interface by which confirmation
      results are presented to the calling app. This requires keystore to call
      into apps.
      
      Test: Device boots and no more denials when call back is delivered to
            apps.
      Bug: 63928580
      Change-Id: Ie23211aeb74c39956c3c3b8b32843d35afa1315a
      a290f576
  10. Mar 26, 2018
    • Jeff Vander Stoep's avatar
      crashdump: cleanup logs · cc0304cf
      Jeff Vander Stoep authored
      Suppress WAI denials from crashdump.
      
      Test: build/flash Taimen. Verify no new denials.
      Bug: 68319037
      Change-Id: If39d057cb020def7afe89fd95e049e45cce2ae16
      cc0304cf
  11. Mar 23, 2018
  12. Mar 22, 2018
    • Jong Wook Kim's avatar
      Wifi HAL SIOCSIFHWADDR sepolicy · d6d16489
      Jong Wook Kim authored
      Add sepolicy rule to grant Wifi HAL permission to use SIOCSIFHWADDR
      ioctl. This permission is needed to dynamically change MAC address of
      the device.
      
      We are moving the implementation of setting the MAC address from
      WifiCond to Vendor HAL to give vendors flexibility in supporting
      Connected MAC Randomization. Will clean up WifiCond sepolicy afterwards.
      
      Bug: 74347653
      Test: Verified manually
      Change-Id: I334cefddf385ecb1ee169eb692c4e0060c26d6d9
      d6d16489
  13. Mar 21, 2018
  14. Mar 20, 2018
  15. Mar 19, 2018
  16. Mar 18, 2018
  17. Mar 16, 2018
    • padarshr's avatar
      Init: Enable init to relabel symlinks for recovery_block_device. · ecab4010
      padarshr authored
      Allow init the ability to relabel recovery block devices. In the case
      where we have recovery as a chain partition, due to its presence in
      early mount node, init, in first stage itself would require relabel
      permissions for the restorecon operation on recovery block device.
      
      Bug: 73642793
      Test: On bootup, recovery partition gets the appropriate se-label.
            Perform OTA on non-A/B device with recovery as chain partition,
            now the recovery partition gets upgraded successfully, now that
            it has the correct se-label.
      
      Change-Id: I370c510320e78ab78c9c55573073415b4983d0f6
      Merged-In: I370c510320e78ab78c9c55573073415b4983d0f6
      (cherry picked from commit bc14ee3c)
      ecab4010
    • Bowgo Tsai's avatar
      Mark some odm properties as vendor-init-settable · 98d5c1f5
      Bowgo Tsai authored
      Bug: 64195575
      Test: boot a device
      
      Change-Id: I7f7deb5e2c5c6e0a75cf22eb610a7973b5be0d7e
      Merged-In: I7f7deb5e2c5c6e0a75cf22eb610a7973b5be0d7e
      (cherry picked from commit a47a1c25)
      98d5c1f5
  18. Mar 13, 2018
    • Jaekyun Seok's avatar
      Allow vendor-init-settable to ro.enable_boot_charger_mode · 0630c7d9
      Jaekyun Seok authored
      vendor-init-settable should be allowed to ro.enable_boot_charger_mode so
      that SoC vendors can set its default value.
      
      Bug: 74421250
      Test: succeeded building and tested with taimen
      Change-Id: I2859aab29fefb7882989413a089b0de55142d2f1
      Merged-In: I2859aab29fefb7882989413a089b0de55142d2f1
      (cherry picked from commit 46bc518c)
      0630c7d9
    • Jakub Pawlowski's avatar
      Add ro.hardware.audio.hearing_aid · f91c9b45
      Jakub Pawlowski authored
      Bug: 69623109
      Change-Id: I7d194a3489fc5ff278cef7bebe9bfe6c39d3b2b8
      (cherry-picked from 4a40c592404bdc2032067f4a3fac2f33b9246aa0)
      f91c9b45
  19. Mar 12, 2018
    • Sunny Kapdi's avatar
      Bluetooth A2DP offload: Binder call to audio HAL · 863a4efa
      Sunny Kapdi authored
      Add rule to allow Binder call from Bluetooth process to Bluetooth
      audio HIDL interface running in audio HAL service process.
      
      Bug: 63932139
      Bug: 72242910
      Test: Manual; TestTracker/148125
      Change-Id: I1981a78bece10b8e516f218d3edde8b77943d130
      (cherry picked from commit e8cfac90e8bf14466b6431a21bc5ccd4bf6ca3ea)
      863a4efa
    • Amit Mahajan's avatar
      Revert "Revert "Move rild from public to vendor."" · 312248ff
      Amit Mahajan authored
      This reverts commit 016f0a58.
      
      Reason for revert: Was temporarily reverted, merging back in with fix.
      
      Bug: 74486619
      Bug: 36427227
      Change-Id: Ide68726a90d5485c2758673079427407aee1e4f2
      312248ff
    • Bowgo Tsai's avatar
      Adding /odm support · 07ddddaf
      Bowgo Tsai authored
      /odm partition isn't mandatory and the following symlinks will exist on
      a device without /odm partition.
      
        /odm/app ->/vendor/odm/app
        /odm/bin ->/vendor/odm/bin
        /odm/etc ->/vendor/odm/etc
        /odm/firmware ->/vendor/odm/firmware
        /odm/framework ->/vendor/odm/framework
        /odm/lib -> /vendor/odm/lib
        /odm/lib64 -> /vendor/odm/lib64
        /odm/overlay -> /vendor/odm/overlay
        /odm/priv-app -> /vendor/odm/priv-app
      
      This CL allows all domains to access the symlinks, also removes the
      Treble compliance neverallows on them because the actual restrictions
      should apply to the real path directly.
      
      Bug: 70678783
      Test: boot a device
      Change-Id: If1522780a13710d8a592272dc688685cbae29f52
      (cherry picked from commit dd6efea2)
      07ddddaf
  20. Mar 11, 2018
  21. Mar 08, 2018
    • Amit Mahajan's avatar
      Move rild from public to vendor. · eeda6c61
      Amit Mahajan authored
      Also change the neverallow exceptions to be for hal_telephony_server
      instead of rild.
      
      Test: Basic telephony sanity, treehugger
      Bug: 36427227
      Change-Id: If892b28416d98ca1f9c241c5fcec70fbae35c82e
      eeda6c61
    • Jaekyun Seok's avatar
      Allow public-readable to persist.rcs.supported · 9ddba296
      Jaekyun Seok authored
      For now, persist.rcs.supported has only vendor-init-settable, but it
      turned out that the property should be read by vendor components in
      some devices including 2018 Pixels.
      
      Bug: 74266614
      Test: succeeded building and tested on a blueline device with
      PRODUCT_COMPATIBLE_PROPERTY_OVERRIDE=true
      
      Change-Id: I926eb4316c178a39693300fe983176acfb9cabec
      9ddba296
  22. Mar 07, 2018
Loading