- Jan 05, 2017
-
-
dcashman authored
Simulate platform and non-platform split by compiling two different file_contexts files and loading them together on-device. Leave the existing file_contexts.bin in place until we're ready to build images based on the new files. Bug: 31363362 Test: Builds and boots without additional denials. Change-Id: I7248f876e2230cee3b3cbf386422063da1e3dde0 Bring back file_contexts.bin. Change-Id: Ifec2c363579151080fdec48e8bc46bbbc8c97674 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
- Jan 04, 2017
-
-
Nick Kralevich authored
/proc/tty/drivers is read by applications to figure out if they are running in an emulated environment. Specifically, they look for the string "goldfish" within that file. Arguably this is not an Android API, and really shouldn't be exposed to applications, but: 1) A largish number of applications break if they can't read this file; 2) The information here isn't particularly sensitive While we could spend a bunch of time trying to get applications fixed, there are bigger fish to fry. It's not worth the battle. Test: "ls -laZ /proc/tty/drivers" is labeled properly. Bug: 33214085 Bug: 33814662 Bug: 33791054 Bug: 33211769 Bug: 26813932 Change-Id: Icc05bdc1c917547a6dca7d76636a1009369bde49
-
- Jan 03, 2017
-
-
Treehugger Robot authored
-
Alexey Polyudov authored
Change-Id: I79a305407c3a362d7be11f4c026f31f1e9666f1c Signed-off-by:
Alexey Polyudov <apolyudov@google.com>
-
Nick Kralevich authored
Allow init to send userspace generated SELinux denials to the kernel audit subsystem. Test: "setprop asdf asdf" from the unprivileged adb shell user generated an SELinux denial processed by logd. Bug: 27878170 Change-Id: I0ecd0601408bbda8227802c13689f98e507282d1
-
Treehugger Robot authored
-
- Dec 29, 2016
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Alex Klyubin authored
-
Mark Salyzyn authored
We allow domains to manually transition to logpersist for userdebug or eng debug logging permissions that would be counter to monitoring limits on a released user build. Test: compile Bug: 30566487 Change-Id: I03a81c75cbd2b44617e4b27c4c083a26a0e0fa87
-
Steven Moreland authored
Bug: 31982882 Test: works with wip bullhead binderized dumpstate implementation Change-Id: Iae964f49b3c2704688ded8e7366d89ace35a92aa
-
Ashutosh Joshi authored
Adding sepoilcy for sensors. Test: Sensors work. Change-Id: Ibbf0c1a22654a17b1573e3761ea9ccd816150255
-
Alex Klyubin authored
6e4508e6 inadvertently removed access to ro.serialno and ro.boot.serialno from ADB shell. This is needed for CTS. This commit thus reinstates the access. Test: adb shell getprop ro.serialno Bug: 33700679 Change-Id: I62de44b1631c03fcd64ceabaf33bbaeb869c2851
-
ashutoshj authored
-
ashutoshj authored
-
- Dec 28, 2016
-
-
Ashutosh Joshi authored
Adding sepolicty for contexthub service. Test: GTS tests pass. Change-Id: I2576b8028d12a31151d7b7869679b853eb16c75e
-
Richard Uhler authored
Test: make checkbuild, aosp_bullhead-userdebug boots. Bug: 33192586 Change-Id: I386df8b6c04fb162f79a4409801ce3e882026ea8
-
Alex Klyubin authored
This removes access to Bluetooth system properties from arbitrary SELinux domains. Access remains granted to init, bluetooth, and system_app domains. neverallow rules / CTS enforce that access is not granted to Zygote and processes spawned from Zygote expcept for system_app and bluetooth. The reason is that some of these properties may leak persistent identifiers not resettable by the user. Test: Bluetooth pairing and data transfer works Bug: 33700679 Change-Id: Icdcb3927a423c4011a62942340a498cc1b302472
-
Treehugger Robot authored
-
- Dec 27, 2016
-
-
Amit Mahajan authored
Test: Verified that WIP telephony and BT SAP CLs work fine with this change https://android-review.googlesource.com/#/q/topic:%22Basic+radio+service+and+client%22+(status:open+OR+status:merged) https://android-review.googlesource.com/#/q/topic:%22SAP+HAL%22+(status:open+OR+status:merged) Bug: 32020264 Change-Id: If15820d43e324d80e35808a292ee811f98d499cc
-
Treehugger Robot authored
-
Alex Klyubin authored
ro.runtime.firstboot system property is only used internally by system_server to distinguish between first start after boot from consecutive starts (for example, this happens when full-disk encryption is enabled). The value of the property is a millisecond-precise timestamp which can help track individual device. Thus apps should not have access to this property. Test: Device boots fine, reading ro.runtime.firstboot from an app results in an error and SELinux denial. Bug: 33700679 Change-Id: I4c3c26a35c5dd840bced3a3e53d071f45317f63c
-
Alex Klyubin authored
SELinux policy compiler complained about a quote inside the recovery_only section of recovery.te. This section's contents are inside quotes and thus can't contain quotes. Test: mmm system/sepolicy produces no warnings Bug: 33700679 Change-Id: I5bf943166f4f514d04472f7e59b025a9723eb1b8
-
Ashutosh Joshi authored
Bring the context hub service advertised name into compliance with the other Android services. This changes the name from "contexthub_service" to "context". Test: GTS tests pass. Change-Id: I8490d60f89bdb97813e328b9ddf08270470fda76
-
- Dec 22, 2016
-
-
Treehugger Robot authored
-
Steven Moreland authored
Bug: 32123421 Test: full build/test of allocator hal using hidl_test Change-Id: I253b4599b6fe6e7f4a2f5f55b34cdeed9e5d769b
-
Alex Klyubin authored
This restricts access to ro.serialno and ro.boot.serialno, the two system properties which contain the device's serial number, to a select few SELinux domains which need the access. In particular, this removes access to these properties from Android apps. Apps can access the serial number via the public android.os.Build API. System properties are not public API for apps. The reason for the restriction is that serial number is a globally unique identifier which cannot be reset by the user. Thus, it can be used as a super-cookie by apps. Apps need to wean themselves off of identifiers not resettable by the user. Test: Set up fresh GMS device, install some apps via Play, update some apps, use Chrome Test: Access the device via ADB (ADBD exposes serial number) Test: Enable MTP over USB, use mtp-detect to confirm that serial number is reported in MTP DeviceInfo Bug: 31402365 Bug: 33700679 Change-Id: I4713133b8d78dbc63d8272503e80cd2ffd63a2a7
-
Mikhail Naganov authored
Audio HAL server needs to set SCHED_FIFO scheduling policy for its threads that communicate with FastMixer threads of AudioFlinger that use the same scheduler. Bug: 30222631 Change-Id: I405a69d097a6bfed455e3483365b27c4004e1063
-
- Dec 21, 2016
-
-
Mark Salyzyn authored
mmi-based products insists on running persistent logcat directly. Test: build Bug: 30566487 Change-Id: I6397f5faedb2a4a5e2f4cfc5387977ae9c54b2d4
-
Treehugger Robot authored
-
Steven Moreland authored
Enabling/disabling sepolicy based on ENABLE_TREBLE is not granular enough (ref: b/32978887 #4). Bug: 32978887 Test: compiles, doesn't cause any additional denials on device. Nothing depends on these things I'm removing. Change-Id: I10acbde16e5e2093f2c9205ed79cd20caed7f44d
-
Treehugger Robot authored
-
Steven Moreland authored
-
Mark Salyzyn authored
Generate a compile time error if someone unexpectedly tries to transition into logpersist or logd domain. Test: compile Bug: 30566487 Change-Id: Ib55f301f104ad63de5ac513cdc9dc9937e3ba48d
-
- Dec 20, 2016
-
-
Mark Salyzyn authored
- transition to logpersist from init - sort some overlapping negative references - intention is to allow logpersist to be used by vendor userdebug logging Test: gTest liblog-unit-tests, logd-unit-tests & logcat-unit-tests Bug: 30566487 Change-Id: I7806f5a2548cbe0c1f257a0ba2855f2eb69d8e7c
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Alex Klyubin authored
-
- Dec 19, 2016
-
-
Nick Kralevich authored
auditallow (added in commit 758e6b36) has been in place for about 2 weeks now, and no hits. Remove execute_no_trans. The net effect of this change is that priv_apps won't be able to exec() a file from their home directory, but dlopen() and friends will still work. Test: Compiles and boots successfully. Test: No auditallow messages received via SELinux denial collection. Change-Id: I60fcdc260d12e1bcc2355ca4dd912de7e6d0a145
-
Alex Klyubin authored
Test: It's a comment -- no impact on build Change-Id: Ibd7ff0dcd9d4c3d526ca20ab35dd4bac70d14f0a
-