- May 23, 2018
-
-
Joel Galenson authored
Bug: 79524845 Test: Boot device and see no denials. Change-Id: I9316bfd0e3718818a7613a421aedff7da8c87108
-
- May 22, 2018
-
-
Jordan Liu authored
-
Tom Cherry authored
-
Tom Cherry authored
Currently, permissions for ctl. property apply to each action verb, so if a domain has permissions for controlling service 'foo', then it can start, stop, and restart foo. This change implements finer grainer permissions such that permission can be given to strictly start a given service, but not stop or restart it. This new permission scheme is mandatory for the new control functions, sigstop_on, sigstop_off, interface_start, interface_stop, interface_restart. Bug: 78511553 Test: see appropriate successes and failures based on permissions Change-Id: Ibe0cc0d6028fb0ed7d6bcba626721e0d84cc20fa
-
Alan Stokes authored
Bug: 77816522 Bug: 73947096 Test: Flashed device, no denial seen Change-Id: Ib2f1fc670c9a76abbb9ff6747fec00fa5bcde5af (cherry picked from commit 62913dbf)
-
TreeHugger Robot authored
-
- May 21, 2018
-
-
TreeHugger Robot authored
-
Niklas Lindgren authored
apns downloaded will enter a new directory that TelephonyProvider can access. Bug: 79948106 Test: Manual Change-Id: I1e7660adf020dc7052da94dfa03fd58d0386ac55 Merged-In: I1e7660adf020dc7052da94dfa03fd58d0386ac55
-
TreeHugger Robot authored
-
Carmen Jackson authored
The 'sync' tracepoint was updated to be 'fence' in kernel 4.9, so this change also adds that one to the list. Bug: 79935503 Test: Took a trace using 'sync' in user mode and saw the tracepoints being saved. Change-Id: I793c6f54cd9364f33853983f8c5dfb28b98c2708
-
TreeHugger Robot authored
-
Bowgo Tsai authored
This is needed when ueventd needs to read device tree files (/proc/device-tree). Prior to acccess, it tries to read "androidboot.android_dt_dir" from kernel cmdline for a custom Android DT path. Bug: 78613232 Test: boot a device without unknown SELinux denials Change-Id: Iff9c882b4fcad5e384757a1e42e4a1d1259bb574 (cherry picked from commit 98ef2abb)
-
- May 18, 2018
-
-
Frank Salim authored
-
Paul Crowley authored
Test: booted metadata-encrypted device Bug: 79781913 Change-Id: Ib4cb4a04145e5619994083da055f06fe7ae0137a
-
Frank Salim authored
This allows Android Keystore to statically register support for 3DES during zygote initialization based on the device's support for hardware backed 3DES keys. Bug: b/79986680 Test: keystore CTS Change-Id: Ic9a6653cdd623a3ab10e0efbcdb37c437e6c59b9
-
Tom Cherry authored
System properties can be abused to get around Treble requirements of having a clean system/vendor split. This CL seeks to prevent that by neverallowing coredomain from writing vendor properties. Bug: 78598545 Test: build 2017/2018 Pixels Test: build aosp_arm64 Change-Id: I5e06894150ba121624d753228e550ba9b81f7677
-
TreeHugger Robot authored
-
- May 16, 2018
-
-
TreeHugger Robot authored
-
Yongqin Liu authored
to workaround some VTS VtsKernelLtp failures introduced by change on vfs_iter_write here: https://android.googlesource.com/kernel/hikey-linaro/+/abbb65899aecfc97bda64b6816d1e501754cfe1f%5E%21/#F3 for discussion please check threads here: https://www.mail-archive.com/seandroid-list@tycho.nsa.gov/msg03348.html Sandeep suggest to re-order the events in that thread, that should be the right solution, this change is only a tempory workaround before that change. Bug: 79528964 Test: manually with -m VtsKernelLtp -t VtsKernelLtp#fs.fs_fill_64bit Change-Id: I3f46ff874d3dbcc556cfbeb27be21878574877d1 Signed-off-by:
Yongqin Liu <yongqin.liu@linaro.org> (cherry picked from commit 64ff9e95) Merged-In: I3f46ff874d3dbcc556cfbeb27be21878574877d1
-
Logan Chien authored
-
- May 15, 2018
-
-
Pavel Maltsev authored
For automotive (and I assume for other verticals) it make sense to keep vertical-specific policies outside of /system/sepolicy as those not used by the phones. However, there's no way to do it rather than using BOARD_PLAT_{PUBLIC|PRIVATE}_SEPOLICY_DIR build variables. Bug: 70637118 Test: lunch bat_land-userdebug && m Test: verify it builds, boots and logs seems to be reasonable Test: enable full treble for aosp_car_x86 - verify it builds, boots and no denials in the logs Change-Id: Ia5fd847f7a6152ff6cf99bbbc12e1e322f7946ab
-
Jerry Zhang authored
-
Jerry Zhang authored
Mtp needs access to this path in order to change files on an sdcard. Fixes denial: 05-14 17:40:58.803 3004 3004 W MtpServer: type=1400 audit(0.0:46): avc: denied { search } for name="media_rw" dev="tmpfs" ino=10113 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 b/77925342 app=com.android.providers.media Bug: 77849654 Test: no denials using mtp with emulated sdcard Change-Id: I27b5294fa211bb1eff6d011638b5fdc90334bc80
-
TreeHugger Robot authored
-
- May 14, 2018
-
-
TreeHugger Robot authored
-
Pavel Maltsev authored
Add an exemption to neverallow rule to use sockets from HAL servers only for automotive build Bug: 78901167 Test: assign this attribute to hal_vehicle_default and try to open socket from HAL implementation Test: verify that new CTS test will fail for non-automotive build with this attribute buing used Test: make cts && cts-tradefed run singleCommand cts --skip-device-info --skip-preconditions --abi arm64-v8a --module CtsSecurityHostTestCases -t android.security.cts.SELinuxHostTest Change-Id: I27976443dad4fc5b7425c089512cac65bb54d6d9
-
Joel Galenson authored
This relaxes the neverallow rule blocking vendor_init from doing anything to vold_metadata_file. The rules above it still prevent it from doing anything other than relabelto and getattr. Bug: 79681561 Test: Boot device and see no denials. Change-Id: I1beb25bb9f8d69323c9fee53a140c2a084b12124
-
TreeHugger Robot authored
-
Logan Chien authored
Bug: 78605339 Test: aosp_walleye-userdebug builds Change-Id: I37c84e20f2284d50cbe29bfa1b7597dd2c01fb4b
-
- May 13, 2018
-
-
Jaegeuk Kim authored
[ 196.680228] type=1400 audit(1526230655.786:26): avc: denied { getattr } for pid=7159 comm="df" path="/metadata" dev="sda20" ino=2 scontext=u:r:dumpstate:s0 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=0 Bug: 66967195 Bug: 79552162 Test: adb bugreport Change-Id: Ib2abbc35e04a69992fa09a596694f428d3adc7c1 Signed-off-by:
Jaegeuk Kim <jaegeuk@google.com>
-
- May 12, 2018
-
-
TreeHugger Robot authored
-
Kourosh Derakshan authored
Test: camera operation Bug: 73173997 Change-Id: I17668a2e4cc56499bc837920e2cdcfd96d608153
-
Calin Juravle authored
The property is set on builds which profile the boot image. Test: m Bug: 73313191 (cherry-pick form commit d99f4acf2ddaeede543eba6fb78fe7931318d652) Merged-In: Ie0cd54f23250df02850c38bb14e92d4b1fa04f16 Change-Id: Ie0cd54f23250df02850c38bb14e92d4b1fa04f16
-
- May 11, 2018
-
-
TreeHugger Robot authored
-
Max Bires authored
Keymaster hal needs to be able to read the vendor SPL for purposes of rollback protection. Bug: 76428542 Test: Keymaster can access the hal_keymaster_default property Change-Id: Ifa53adb23f6ab79346e9dd9616b34d8b24395a0a
-
- May 10, 2018
-
-
Mark Salyzyn authored
-
Chris Fries authored
-
- May 09, 2018
-
-
Calin Juravle authored
-
Paul Crowley authored
Bug: 79228237 Test: audit2allow finds no relevant denials on boot Change-Id: Ia80b77ba9a1ec2354127cd0ef68d50ebcf593fb0
-
Calin Juravle authored
The goal is to allow creating profile snapshots from the shell command in order to be able to write CTS tests. The system server will dump profiles for debuggable in /data/misc/profman from where they will be pulled and verified by CTS tests. Test: adb shell cmd package snapshot-profile com.android.vending Bug: 74081010 Change-Id: I54690305284b92c0e759538303cb98c93ce92dd5
-