Skip to content
Snippets Groups Projects
  1. May 18, 2018
  2. May 16, 2018
  3. May 15, 2018
    • Jerry Zhang's avatar
      Allow mediaprovider to search /mnt/media_rw · 31c4b4ea
      Jerry Zhang authored
      Mtp needs access to this path in order to
      change files on an sdcard.
      
      Fixes denial:
      
      05-14 17:40:58.803  3004  3004 W MtpServer: type=1400 audit(0.0:46):
      avc: denied { search } for name="media_rw" dev="tmpfs" ino=10113
      scontext=u:r:mediaprovider:s0:c512,c768
      tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0
      b/77925342 app=com.android.providers.media
      
      Bug: 77849654
      Test: no denials using mtp with emulated sdcard
      Change-Id: I27b5294fa211bb1eff6d011638b5fdc90334bc80
      31c4b4ea
  4. May 14, 2018
    • Pavel Maltsev's avatar
      Allow to use sockets from hal server for auto · 4cafae77
      Pavel Maltsev authored
      Add an exemption to neverallow rule to use sockets from HAL servers only
      for automotive build
      
      Bug: 78901167
      Test: assign this attribute to hal_vehicle_default and try to open
      socket from HAL implementation
      Test: verify that new CTS test will fail for non-automotive build with
      this attribute buing used
      Test: make cts && cts-tradefed run singleCommand cts --skip-device-info
       --skip-preconditions --abi arm64-v8a --module CtsSecurityHostTestCases
       -t android.security.cts.SELinuxHostTest
      
      Change-Id: I27976443dad4fc5b7425c089512cac65bb54d6d9
      4cafae77
    • Joel Galenson's avatar
      Allow vendor_init to getattr vold_metadata_file. · 597be44e
      Joel Galenson authored
      This relaxes the neverallow rule blocking vendor_init from doing
      anything to vold_metadata_file.  The rules above it still prevent it
      from doing anything other than relabelto and getattr.
      
      Bug: 79681561
      Test: Boot device and see no denials.
      Change-Id: I1beb25bb9f8d69323c9fee53a140c2a084b12124
      597be44e
    • Logan Chien's avatar
      Add ro.vndk.lite to property_contexts · 9f55f345
      Logan Chien authored
      Bug: 78605339
      Test: aosp_walleye-userdebug builds
      Change-Id: I37c84e20f2284d50cbe29bfa1b7597dd2c01fb4b
      9f55f345
  5. May 12, 2018
    • Calin Juravle's avatar
      Whitelist dalvik.vm.profilebootimage · 54fc209a
      Calin Juravle authored
      The property is set on builds which profile the boot image.
      
      Test: m
      Bug: 73313191
      
      (cherry-pick form commit d99f4acf2ddaeede543eba6fb78fe7931318d652)
      
      Merged-In: Ie0cd54f23250df02850c38bb14e92d4b1fa04f16
      Change-Id: Ie0cd54f23250df02850c38bb14e92d4b1fa04f16
      54fc209a
  6. May 09, 2018
    • Paul Crowley's avatar
      Add wait_for_keymaster · 6af7af15
      Paul Crowley authored
      Bug: 79228237
      Test: audit2allow finds no relevant denials on boot
      Change-Id: Ia80b77ba9a1ec2354127cd0ef68d50ebcf593fb0
      6af7af15
    • Calin Juravle's avatar
      Allow system server to write profile snapshots in /data/misc/profman · 687d5e46
      Calin Juravle authored
      The goal is to allow creating profile snapshots from the shell command in
      order to be able to write CTS tests.
      
      The system server will dump profiles for debuggable in /data/misc/profman
      from where they will be pulled and verified by CTS tests.
      
      Test: adb shell cmd package snapshot-profile com.android.vending
      Bug: 74081010
      Change-Id: I54690305284b92c0e759538303cb98c93ce92dd5
      687d5e46
    • Mark Salyzyn's avatar
      FrameworksServicesTests: allow access to test.sys.boot.reason property · 1b748766
      Mark Salyzyn authored
      com.android.server.power.PowerManagerServiceTest#testGetLastShutdownReasonInternal due to "RuntimeException: failed to set system property"
      
      W/roidJUnitRunner: type=1400 audit(0.0:6): avc: denied { write } for name="property_service" dev="tmpfs" ino=13178 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
      W/libc    : Unable to set property "test.sys.boot.reason" to "shutdown,thermal": connection failed; errno=13 (Permission denied)
      
      Had to use precise property definition as com.android.phone accesses
      test properties as well.
      
      Test: compile
      Bug: 78245377
      Change-Id: I2cc810846f8615f2a2fae8e0d4f41de585b7abd7
      1b748766
    • Joel Galenson's avatar
      Track cppreopts SELinux denial. · 8e6b2d55
      Joel Galenson authored
      This should help fix presubmit tests.
      
      Bug: 79414024
      Test: Built policy.
      Change-Id: Ic840150767ff6c2799ac3b5ef22ba139108c94dd
      (cherry picked from commit 06e09abd)
      8e6b2d55
  7. May 07, 2018
    • Jean-Michel Trivi's avatar
      Whitelist reading property ro.aac_drc_effect_type · 41795cdf
      Jean-Michel Trivi authored
      Bug: 71430241
      Test: build/flash, grep for "avc: denied { read }" for mediacodec, should be empty on walleye
      Change-Id: I12e1b11a969d3f979ca0cfbe4ca7db2bc5e46165
      41795cdf
    • Ray Essick's avatar
      give audioserver access to media.metrics · 2306cc04
      Ray Essick authored
      Let the audioserver record metrics with media.metrics service.
      This is for 'audiopolicy' metrics.
      
      Bug: 78595399
      Test: record from different apps, see records in 'dumpsys media.metrics'
      Change-Id: I63f9d4ad2d2b08eb98a49b8de5f86b6797ba2995
      2306cc04
  8. May 04, 2018
    • Calin Juravle's avatar
      Allow system server to record its own profile · 035fcc46
      Calin Juravle authored
      On userdebug builds we can now profile system server without disabling
      selinux. This is the final piece, and allows the system server to save its
      own profile.
      
      Test: manual, on a device with system server profiling enabled
      Bug: 73313191
      
      (cherry picked from commit 71d8467b)
      
      Change-Id: I93e7e01bfbd3146a8cfd26a1f6e88b640e9c4e0f
      035fcc46
  9. May 03, 2018
  10. May 02, 2018
  11. May 01, 2018
  12. Apr 30, 2018
  13. Apr 13, 2018
    • Wale Ogunwale's avatar
      Finalizing P SDK · 49b79029
      Wale Ogunwale authored
      Bug: 77588754
      Test: builds
      Change-Id: I61ceb438cd532584847ddd55c0eeaefebdcfa51c
      49b79029
  14. Feb 01, 2018
    • Tri Vo's avatar
      Add prebuilts/api/27.0/nonplat_sepolicy.cil. · 9bcce08b
      Tri Vo authored
      This file is /vendor/etc/selinux/nonplat_sepolicy.cil from aosp_arm64-eng
      from mr1-dev
      
      Bug: 69390067
      Test: prebuilt only change
      Change-Id: I717513ae66e806afe0071cf5b42e9f709264d0b6
      9bcce08b
  15. Dec 06, 2017
  16. Oct 16, 2017
    • Jin Qian's avatar
      storaged: add storaged_pri service · 37ab7c09
      Jin Qian authored
      "storaged" service will be used by external clients, e.g. vold, dumpsys
      "storaged_pri" service will only be used by storaged cmdline.
      
      Bug: 63740245
      Change-Id: I7a60eb4ce321aced9589bbb8474d2d9e75ab7042
      37ab7c09
  17. Sep 26, 2017
  18. Sep 19, 2017
    • Daniel Cashman's avatar
      Bug revert AOSP cherry-picks to enable big diff. · 46f41134
      Daniel Cashman authored
      The following commits were cherry-picked from internal master to AOSP,
      but to avoid merge-conflicts we'll do a large diff instead of individual
      cherry-picks:
      521742e9
      9aefc916
      3686efca
      de51e7de
      fff3fe2f
      
      Bug: 37916906
      Test: angler builds and boots.
      Merged-In: Ie010cc12ae866dbb97c387471f433158d3b699f3
      Change-Id: I5126ebe88b9c76a74690ecf95851d389cfc22d1f
      46f41134
    • Dan Cashman's avatar
      Bulk-revert changes caused by AOSP cherry-picks. · c3f9ebda
      Dan Cashman authored
      In order to bring AOSP development back in-line with master development,
      some CLs were cherry-picked individually from internal master to AOSP,
      which were then merged back into internal master (MERGED-IN was missing).
      Due to merge-conflict pain, these are being reverted in favor of one
      big diff.  This CL reverts the changes that were auto-merged in as a result,
      and can be used as the target of MERGED-IN when reverting the individual
      cherry-picks in AOSP.
      
      This reverts commit a08fe91e, reversing
      changes made to 11481d1d.
      
      This reverts commit 7ec5ecfb, reversing
      changes made to 6fecbbb2.
      
      Bug: 37916906
      Test: Builds 'n' boots.
      c3f9ebda
  19. Sep 08, 2017
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 521742e9
      Josh Gao authored
      Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log
      crashes to dmesg when logd isn't up yet (or is the one crashing).
      
      (Originally commited in a015186f)
      (cherry-pick of commit: 3458ec13)
      
      Bug: 37916906
      Bug: 36574794
      Bug: 62101480
      Test: Builds and boots.
      Change-Id: I83aa392f49bb412d96534925fb02921a8f4731fa
      521742e9
    • Dan Cashman's avatar
      Update sepolicy 26.0 prebuilts again, again. · 9aefc916
      Dan Cashman authored
      (cherry-pick of commit: 55c77504)
      
      Bug: 37916906
      Bug: 37896931
      Test: none, just prebuilt update.
      Change-Id: I55b5179f98703026699a59cce4b2e1afb166fd1d
      9aefc916
    • Dan Cashman's avatar
      Update 26.0 SELinux prebuilts. · 3686efca
      Dan Cashman authored
      More changes went into oc-dev after the freeze-date.  Reflect them.
      (cherry-pick of commit: 148578a6)
      
      Bug: 37916906
      Bug: 37896931
      Test: prebuilts - none.
      Change-Id: I3300751ea7362d5d96b327138544be65eb9fc483
      3686efca
    • Dan Cashman's avatar
      Add mapping compatibility file for sepolicy api lvl 26.0 · de51e7de
      Dan Cashman authored
      commit: 5c6a227e added the oc-dev
      sepolicy prebuilts (api 26.0), but did not include the corresponding
      base mapping file, which is to be maintained along with current
      platform development in order to ensure backwards compatibility.
      (cherry-pick of commit: 5e4e0d7f)
      
      Bug: 37916906
      Bug: 37896931
      Test: none, this just copies the old mapping file to prebuilts.
      Change-Id: Ia5c36ddab036352845878178fa9c6a9d649d238f
      de51e7de
    • Dan Cashman's avatar
      Commit oc-dev sepolicy to prebuilts. · fff3fe2f
      Dan Cashman authored
      Copy the final system sepolicy from oc-dev to its prebuilt dir
      corresponding to its version (26.0) so that we can uprev policy and
      start maintaining compatibility files, as well as use it for CTS
      tests targeting future platforms.
      
      (cherry-pick of commit: 5c6a227e)
      
      Bug: 37896931
      Bug: 37916906
      Test: none, this just copies the old policy.
      Change-Id: Ib069d505e42595c467e5d1164fb16fcb0286ab93
      fff3fe2f
  20. Aug 14, 2017
    • Dan Cashman's avatar
      Move compatibility files out of prebuilts dir. · 78b3d573
      Dan Cashman authored
      The treble compatibility tests check for policy differences between old
      and new policy.  To do this correctly, we must not modify the policy which
      represents the older policies.  Move the files meant to be changed to a
      different location from the ones that are not meant to be touched to avoid
      any undesired changes to old policy, e.g. commit:
      2bdefd65078d890889672938c6f0d2accdd25bc5
      
      Bug: 36899958
      Test: Build-time tests build.
      Change-Id: I8fa3947cfae756f37556fb34e1654382e2e48372
      78b3d573
  21. Aug 11, 2017
    • Dan Cashman's avatar
      Add missing attribute to compatibility file. · 758d2561
      Dan Cashman authored
      untrusted_app_visible_hwservice was an attribute that was meant to
      give partners time to add their HALs to AOSP.  It was removed from mr1
      and so needs to be accounted for in the compatibility mapping.
      
      Bug: 64321916
      Test: Builds with treble policy tests.
      Change-Id: I359a842083016f0cf6c9d7ffed2116feb9e159c6
      758d2561
    • Steven Moreland's avatar
      Add screencap domain. · f27bba93
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      f27bba93
    • Martijn Coenen's avatar
      Prevent access to nonplat_service_contexts on full_treble. · 431a03bb
      Martijn Coenen authored
      On Full Treble devices, servicemanager should only service
      services from the platform service_contexts file.
      
      Created new type to separate plat_ and nonplat_service_contexts,
      and added new type to mapping (although I don't think this type
      should have been used by vendors).
      
      Bug: 36866029
      Test: Marlin/Taimen boot
      Change-Id: Ied112c64f22f8486a7415197660faa029add82d9
      431a03bb
Loading