- Jan 26, 2017
-
-
Steven Moreland authored
- Added set_prop to shell so that you can set it from shell. - Added set_prop to sytem_app so that it can be updated in settings. Bug: 34256441 Test: can update prop from Settings and shell. nfc and lights work with ag/1833821 with persist.hal.binderization set to on and off. There are no additional selinux denials. Change-Id: I883ca489093c1d56b2efa725c58e6e3f3b81c3aa
-
William Roberts authored
Introduce the add_service() macro which wraps up add/find permissions for the source domain with a neverallow preventing others from adding it. Only a particular domain should add a particular service. Use the add_service() macro to automatically add a neverallow that prevents other domains from adding the service. mediadrmserver was adding services labeled mediaserver_service. Drop the add permission as it should just need the find permission. Additionally, the macro adds the { add find } permission which causes some existing neverallow's to assert. Adjust those neverallow's so "self" can always find. Test: compile and run on hikey and emulator. No new denials were found, and all services, where applicable, seem to be running OK. Change-Id: Ibbd2a5304edd5f8b877bc86852b0694732be993c Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Alex Klyubin authored
-
Treehugger Robot authored
-
- Jan 25, 2017
-
-
Alex Klyubin authored
HAL clients should not be annotated with hal_x and haldomain. This may grant them too much access. Instead, the policy needed for using in-process HALs should be directly embedded into the client's domain rules. This reverts the moving of rules out of mediadrmserver in commit c86f42b9. Test: YouTube videos play back, no mediadrmserver denials Bug: 34715716 Bug: 32815560 Change-Id: Ib57ef880bcc306c6e01f2c24c0f3a4298598eb9a
-
Hassan Shojania authored
Bug: 34559906 Test: Manual through the test app Change-Id: Ib69d4fe6b0e21f162f08cea061260c683e4b8c9b
-
Jeff Tinker authored
bug:32815560 Change-Id: I494141b47fcd2e7e0cc02aa58d8df9a222060b3f
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Nick Kralevich authored
XAUTH based VPNs 1. IPSec XAUTH PSK 2. IPSec XAUTH RSA fail with the following error from racoon 01-24 16:46:05.583 18712 18712 W ip-up-vpn: type=1400 audit(0.0:390): avc: denied { ioctl } for path="socket:[954683]" dev="sockfs" ino=954683 ioctlcmd=891c scontext=u:r:racoon:s0 tcontext=u:r:racoon:s0 tclass=udp_socket permissive=0 "setenforce 0" on the device fixed the issue. Bug: 34690009 Test: Policy compiles Change-Id: Idc0d156ec32e7a9be3825c380c3cb0359fe4fabe
-
Ray Essick authored
reflect the change from "mediaanalytics" to "mediametrics" Also incorporates a broader access to the service -- e.g. anyone. This reflects that a number of metrics submissions come from application space and not only from our controlled, trusted media related processes. The metrics service (in another commit) checks on the source of any incoming metrics data and limits what is allowed from unprivileged clients. Bug: 34615027 Test: clean build, service running and accessible Change-Id: I657c343ea1faed536c3ee1940f1e7a178e813a42
-
Steven Moreland authored
Bug: 34366227 Test: passthrough services successfully found Change-Id: If2cad09edc42f01cc5a444229758ecdfe2017cf2
-
Calin Juravle authored
-
- Jan 24, 2017
-
-
Calin Juravle authored
This CLs adds SElinux policies necessary to compile secondary dex files. When an app loads secondary dex files via the base class loader the files will get reported to PM. During maintance mode PM will compile the secondary dex files which were used via the standard installd model (fork, exec, change uid and lower capabilities). What is needed: dexoptanalyzer - needs to read the dex file and the boot image in order to decide if we need to actually comppile. dex2oat - needs to be able to create *.oat files next to the secondary dex files. Test: devices boots compilation of secondary dex files works without selinux denials cmd package compile --secondary-dex -f -m speed com.google.android.gms Bug: 32871170 Change-Id: I038955b5bc9a72d49f6c24c1cb76276e0f53dc45
-
Max Bires authored
-
Steven Moreland authored
-
Steven Moreland authored
Allow update_verifier to load the boot_control_hal in passthrough mode. Test: update_verifier works, no denials Bug: 34656553 Change-Id: I5c20ce67c8f1fd195f2429dae497221514ed95a8
-
Treehugger Robot authored
-
Steven Moreland authored
system_server needs the permissions to open the lights hal in the same process. Bug: 34634317 Test: can change brightness on marlin (tested on internal master) Change-Id: I11fe59b4ab32e13d6dad246f4e6c56951e051181
-
Treehugger Robot authored
-
Nick Kralevich authored
Addresses the following denial: avc: denied { read } for name="cache" dev="dm-0" ino=2755 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cache_file:s0 tclass=lnk_file permissive=0 which occurs when a priv-app attempts to follow the /cache symlink. This symlink occurs on devices which don't have a /cache partition, but rather symlink /cache to /data/cache. Bug: 34644911 Test: Policy compiles. Change-Id: I9e052aeb0c98bac74fa9225b9253b1537ffa5adc
-
- Jan 23, 2017
-
-
Max Bires authored
This neverallow addition addresses the renaming of files in exploits in order to bypass denied permissions. An example of a similar use case of using mv to bypass permission denials appeared in a recent project zero ChromeOS exploit as one of the steps in the exploit chain. https://googleprojectzero.blogspot.com/2016/12/chrome-os-exploit-one-byte-overflow-and.html Additionally, vold and init both had permission sets that allowed them to rename, but neither of them seem to need it. Therefore the rename permission has also been removed from these two .te files. Test: The device boots successfully Change-Id: I07bbb58f058bf050f269b083e836c2c9a5bbad80
-
Josh Gao authored
auditallow this until we track down where the file is opened without O_APPEND. 01-23 08:02:12.272 555 555 W tombstoned: type=1400 audit(0.0:11480): avc: denied { write } for path="/data/anr/traces.txt" dev="sda35" ino=4669445 scontext=u:r:tombstoned:s0 tcontext=u:object_r:anr_data_file:s0 tclass=file permissive=0 Bug: http://b/34193533 Test: mma Change-Id: I77b854dce06231232004432839ebd5aa963ef035
-
Clara Bayarri authored
Merged-In: Id2b849d7fa22989225066ebe487fc98d319743ea Bug: 34190490 Test: CTS in internal master Change-Id: I27ab62469f3a405c59eda1a2a249899e845bed56
-
- Jan 22, 2017
-
-
Treehugger Robot authored
-
- Jan 21, 2017
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Jin Qian authored
Delete rule for permission_service since we use packages.list instead. Test: adb shell storaged -u Bug: 34198239 Change-Id: Ic69d0fe185e627a932bbf8e85fc13163077bbe6b
-
Steven Moreland authored
Test: pass Change-Id: Ie1a6513f8fa9cb4b007fccefe63ccb78fcd45578
-
- Jan 20, 2017
-
-
Steven Moreland authored
In order to dump hardware services using dumpsys, dumpsys needs to be able to talk to the hwservicemanager. Bug: 33382892 Test: dumpsys --hw works from unrooted shell Change-Id: I31f0982193991428da465507f93d50646cb38726
-
Treehugger Robot authored
-
Paul Lawrence authored
Test: Device boots Can take photos Run "adb shell atrace -c -b 16000 -t 5 gfx" without root and check produces output Run "python systrace.py view gfx freq sched am wm dalvik binder_driver" from external/chromium-trace after adb root and check populated Bug: 31856701 Change-Id: Ic319f8a0a3e395efa7ee8ba33a868ac55cb44fe4
-
Alex Klyubin authored
-
Alex Klyubin authored
In my commit f41d89eb I forgot to switch rild and gatekeeperd rules from explicitly associating these domains with the hal_telephony and hal_gatekeeper to using the hal_impl_domain macro. As a result, the recent commit a2519226 inadvertently revoked HwBinder access from rild and gatekeeperd. This commit fixes the issue by switching rild and gatekeeperd to the hal_impl_domain macro. Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute haldomain" now lists rild and gatekeeperd Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute hal_telephony" still lists rild Test: "sepolicy-analyze out/target/product/bullhead/root/sepolicy attribute hal_gatekeeper" still lists gatekeeperd Bug: 34180936 Bug: 34470443 Change-Id: I7949556f58c36811205d5ea3ee78ea5708e95b45
-
Josh Gao authored
Fix the following denial: tombstoned: type=1400 audit(0.0:563): avc: denied { append } for path="/data/anr/traces.txt" dev="sda35" ino=679941 scontext=u:r:tombstoned:s0 tcontext=u:object_r:anr_data_file:s0 tclass=file permissive=0 Bug: http://b/34472671 Test: mma Change-Id: Iab5fbaf50888aa0f195841cb7e718ff393e526dd
-
Alex Klyubin authored
Test: No change to SELinux policy Change-Id: I45d6d6ab0538b9d4768b922cfdc2c972272d0b18
-
Alex Klyubin authored
-
Max Bires authored
-
William Roberts authored
wificond_service is not a system_server service, so drop the typeattribute. Provide find permission for system_server so it can still call wificond. Test: compile and run on emulator. Also check built policy to verify the permissions changes are as expected. system_server should have lost the add permissions on wificond_service. Most importantly this needs to be tested on a device with wificond. Change-Id: I6dd655a5ac1dbfef809b8759a86429557a7c1207 Signed-off-by:
William Roberts <william.c.roberts@intel.com>
-
Nick Kralevich authored
As of https://android-review.googlesource.com/324092, ephemeral_app is now an appdomain, so places where both appdomain and ephemeral_app are granted the same set of rules can be deleted. Test: policy compiles. Change-Id: Ideee710ea47af7303e5eb3af1331653afa698415
-