Skip to content
Snippets Groups Projects
  1. Mar 19, 2018
  2. Mar 18, 2018
  3. Mar 16, 2018
    • TreeHugger Robot's avatar
    • padarshr's avatar
      Init: Enable init to relabel symlinks for recovery_block_device. · ecab4010
      padarshr authored
      Allow init the ability to relabel recovery block devices. In the case
      where we have recovery as a chain partition, due to its presence in
      early mount node, init, in first stage itself would require relabel
      permissions for the restorecon operation on recovery block device.
      
      Bug: 73642793
      Test: On bootup, recovery partition gets the appropriate se-label.
            Perform OTA on non-A/B device with recovery as chain partition,
            now the recovery partition gets upgraded successfully, now that
            it has the correct se-label.
      
      Change-Id: I370c510320e78ab78c9c55573073415b4983d0f6
      Merged-In: I370c510320e78ab78c9c55573073415b4983d0f6
      (cherry picked from commit bc14ee3c)
      ecab4010
    • Bowgo Tsai's avatar
      Mark some odm properties as vendor-init-settable · 98d5c1f5
      Bowgo Tsai authored
      Bug: 64195575
      Test: boot a device
      
      Change-Id: I7f7deb5e2c5c6e0a75cf22eb610a7973b5be0d7e
      Merged-In: I7f7deb5e2c5c6e0a75cf22eb610a7973b5be0d7e
      (cherry picked from commit a47a1c25)
      98d5c1f5
  4. Mar 13, 2018
  5. Mar 12, 2018
  6. Mar 11, 2018
  7. Mar 09, 2018
  8. Mar 08, 2018
  9. Mar 07, 2018
    • Joel Galenson's avatar
      Use user policy when checking neverallow rules. · 053cb341
      Joel Galenson authored
      When building userdebug or eng builds, we still want to build the user
      policy when checking neverallow rules so that we can catch compile
      errors.
      
      Commit c0713e86 split out a helper function but lost one instance of
      using user instead of the real variant.  This restores that one and
      adds it to the neverallow check.
      
      Bug: 74344625
      Test: Added a rule that referred to a type defined only
      in userdebug and eng and ensure we throw a compile error when building
      userdebug mode.
      
      Change-Id: I1a6ffbb36dbeeb880852f9cbac880f923370c2ae
      053cb341
    • TreeHugger Robot's avatar
    • Ruchi Kandoi's avatar
      Add secure_element_device · e0e2342e
      Ruchi Kandoi authored
      Test: eSE initializes at boot
      Bug: 64881253
      Change-Id: Ib2388b7368c790c402c000adddf1488bee492cce
      (cherry picked from commit ea3cf000)
      e0e2342e
    • Kweku Adams's avatar
      Enabling incidentd to get top and ps data. · bcf8b115
      Kweku Adams authored
      Bug: 72177715
      Bug: 72384374
      Test: flash device and make sure incidentd is getting data without SELinux denials
      Change-Id: I684fe014e19c936017a466ec2d6cd2e1f03022c0
      (cherry picked from commit 06ac7dba)
      bcf8b115
    • TreeHugger Robot's avatar
    • Joel Galenson's avatar
      Clean up bug_map. · f3f93eaf
      Joel Galenson authored
      Remove a fixed bug from bug_map.
      
      Bug: 62140539
      Test: Built policy.
      Change-Id: I2ce9e48de92975b6e37ca4a3a4c53f9478b006ef
      f3f93eaf
    • Joel Galenson's avatar
      Track platform_app SELinux denial. · 2995e996
      Joel Galenson authored
      This should fix presubmit tests.
      
      Bug: 74331887
      Test: Built policy.
      Change-Id: Ie9ef75a7f9eaebf1103e3d2f3b4521e9abaf2fe7
      2995e996
    • Chenbo Feng's avatar
      Fix sepolicy for bpf object · 6cd70c2f
      Chenbo Feng authored
      With the new patches backported to 4.9 kernels, the bpf file system now
      take the same file open flag as bpf_obj_get. So system server now need
      read permission only for both bpf map and fs_bpf since we do not need
      system server to edit the map. Also, the netd will always pass stdin
      stdout fd to the process forked by it and do allow it will cause the
      fork and execev fail. We just allow it pass the fd to bpfloader for now
      until we have a better option.
      
      Test: bpfloader start successful on devices with 4.9 kernel.
            run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest
      Bug: 74096311
      Bug: 30950746
      
      Change-Id: I747a51cb05ae495c155e7625a3021fc77f921e0d
      6cd70c2f
  10. Mar 05, 2018
    • Daichi Ueura's avatar
      sepolicy(hostapd): Allow socket based control iface · e0290858
      Daichi Ueura authored
      Update sepolicy permission to allow hostapd to setup
      socket for socket based control interface.
      
      Sepolicy denial for accessing /data/vendor/wifi/hostapd/ctrl:
      02-23 12:32:06.186  3068  3068 I hostapd : type=1400 audit(0.0:36):
      avc: denied { create } for name="ctrl"
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=dir permissive=1
      
      02-23 12:32:06.186  3068  3068 I hostapd : type=1400 audit(0.0:37):
      avc: denied { setattr } for name="ctrl" dev="sda35" ino=131410
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=dir permissive=1
      
      02-23 12:32:06.190  3068  3068 I hostapd : type=1400 audit(0.0:38):
      avc: denied { create } for name="wlan0"
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=sock_file permissive=1
      
      02-23 12:32:06.190  3068  3068 I hostapd : type=1400 audit(0.0:39):
      avc: denied { setattr } for name="wlan0" dev="sda35" ino=131411
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:hostapd_data_file:s0 tclass=sock_file permissive=1
      
      Bug: 73419160
      Test: Manual check that softAp works
      Change-Id: I2e733e168feceeab2d557f7704832c143e352375
      e0290858
Loading