Skip to content
Snippets Groups Projects
  1. Jun 08, 2017
  2. Jun 06, 2017
  3. Jun 05, 2017
    • Josh Gao's avatar
      crash_dump_fallback: allow dumpstate:pipe_file write. · 7aa08523
      Josh Gao authored
      It appears that selinux requires the write permission to receive
      a writable pipe from dumpstate, for unclear reasons. Add the permission
      for now.
      
      Bug: http://b/62297059
      Test: dumpstate
      Change-Id: I0f25682177115aacd5c2203ddc0008228b0380ad
      7aa08523
    • Sandeep Patil's avatar
      Fix coredomain violation for modprobe · e41af203
      Sandeep Patil authored
      
      modprobe domain was allowed to launch vendor toolbox even if its a
      coredomain. That violates the treble separation. Fix that by creating a
      separate 'vendor_modprobe' domain that init is allowed to transition to
      through vendor_toolbox.
      
      Bug: 37008075
      Test: Build and boot sailfish
      
      Change-Id: Ic3331797691bb5d1fdc05a674aa4aa313e1f86b2
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      (cherry picked from commit 9e366a0e)
      e41af203
  4. Jun 02, 2017
  5. Jun 01, 2017
    • Steve Muckle's avatar
      allow modprobe to load signed kernel modules · 53add31a
      Steve Muckle authored
      Modprobe requires this permission or the following denial will
      prevent loading of signed kernel modules:
      
      audit: type=1400 audit(27331649.656:4): avc:  denied  { search } for
      pid=448 comm="modprobe" scontext=u:r:modprobe:s0 tcontext=u:r:kernel:s0
      tclass=key permissive=0
      
      Bug: 62256697
      Test: Verified signed module loading on sailfish.
      Change-Id: Idde41d1ab58e760398190d6686665a252f1823bb
      53add31a
    • Neil Fuller's avatar
      Enable the TimeZoneManagerService · ca595e11
      Neil Fuller authored
      Add policy changes to enable a new service. The service
      is currently switched off in config, but this change is
      needed before it could be enabled.
      
      Bug: 31008728
      Test: make droid
      Merged-In: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      ca595e11
  6. May 31, 2017
    • Neil Fuller's avatar
      Enable the TimeZoneManagerService · 50889ce0
      Neil Fuller authored
      Add policy changes to enable a new service. The service
      is currently switched off in config, but this change is
      needed before it could be enabled.
      
      Bug: 31008728
      Test: make droid
      Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
      50889ce0
    • Andrew Scull's avatar
      Allow bootctl HAL to access misc block device. · b0d59450
      Andrew Scull authored
      This is sometimes used for communication with the bootloader.
      
      Bug: 62052545
      Test: Build
      Change-Id: I3ae37793407719e55ab0830129aa569c9018f7da
      b0d59450
    • Andrew Scull's avatar
      Add missing sepolicies for OemLock HAL. · 475954da
      Andrew Scull authored
      Bug: 38232801
      Test: Build
      
      Change-Id: Iccc16430e7502bb317f95bb2a5e2f021d8239a00
      475954da
    • Andrew Scull's avatar
      Add missing sepolicies for the Weaver HAL. · a939c432
      Andrew Scull authored
      Bug: 38233550
      Test: Build
      Change-Id: I7c2105d5f215a60a611110640afff25fc3403559
      a939c432
    • Narayan Kamath's avatar
      SEPolicy: Changes for new stack dumping scheme. · f194aad2
      Narayan Kamath authored
      Applications connect to tombstoned via a unix domain socket and request
      an open FD to which they can write their traces. This socket has a new
      label (tombstoned_java_trace_socket) and appdomain and system_server are
      given permissions to connect and write to it.
      
      Apps no longer need permissions to open files under /data/anr/ and
      these permissions will be withdrawn in a future change.
      
      Bug: 32064548
      Test: Manual
      
      (cherry picked from commit a8832dabc7f3b7b2381760d2b95f81abf78db709)
      
      (cherry picked from commit 11bfcc1e)
      
      Change-Id: Icc60d227331c8eee70a9389ff1e7e78772f37e6f
      f194aad2
    • Narayan Kamath's avatar
      SEPolicy: Changes for new stack dumping scheme. · e628cb5b
      Narayan Kamath authored
      Applications connect to tombstoned via a unix domain socket and request
      an open FD to which they can write their traces. This socket has a new
      label (tombstoned_java_trace_socket) and appdomain and system_server are
      given permissions to connect and write to it.
      
      Apps no longer need permissions to open files under /data/anr/ and
      these permissions will be withdrawn in a future change.
      
      Bug: 32064548
      Test: Manual
      
      Merged-In: I70a3e6e230268d12b454e849fa88418082269c4f
      Change-Id: Ib4b73fc130f4993c44d96c8d68f61b6d9bb2c7d5
      e628cb5b
  7. May 30, 2017
    • Narayan Kamath's avatar
      SEPolicy: Changes for new stack dumping scheme. · 11bfcc1e
      Narayan Kamath authored
      Applications connect to tombstoned via a unix domain socket and request
      an open FD to which they can write their traces. This socket has a new
      label (tombstoned_java_trace_socket) and appdomain and system_server are
      given permissions to connect and write to it.
      
      Apps no longer need permissions to open files under /data/anr/ and
      these permissions will be withdrawn in a future change.
      
      Bug: 32064548
      Test: Manual
      
      (cherry picked from commit a8832dabc7f3b7b2381760d2b95f81abf78db709)
      
      Change-Id: I70a3e6e230268d12b454e849fa88418082269c4f
      11bfcc1e
  8. May 26, 2017
  9. May 25, 2017
    • Yifan Hong's avatar
      Update selinux policy for policyvers retrieval. · 5b3494eb
      Yifan Hong authored
      Test: pass
      Bug: 62073522
      Change-Id: I3d53d0d5ec701c87fb3d45080799f424f7ba3792
      5b3494eb
    • Jeff Vander Stoep's avatar
      Force expand all hal_* attributes · fb889f23
      Jeff Vander Stoep authored
      Cutting down on the number of attributes associated with each type
      speeds up policy lookup times when there is an access vector cache
      miss.
      
      This change cuts down on the number of attributes associate with
      system_server from 19 to 8. The total number of attributes is
      reduced from 159 to 64.
      
      Bug: 36508258
      Test: build and boot Marlin
      Change-Id: I8cdb6fb783ded869e88c5a9868fd7c8f838190f9
      fb889f23
  10. May 24, 2017
    • Sandeep Patil's avatar
      Allow init to run vendor toybox for modprobe · d46b5d35
      Sandeep Patil authored
      
      vendor implementations need to be able to run modprobe as part of
      init.rc scripts.  They cannot do so because of the strict neverallow
      currently in place that disallows all coredomains (including init)
      to execute vendor toybox.
      
      Fix this by adding init to the exception list for the neverallow so
      vendors can then run modprobe from .rc scripts and also add the rule to
      allow init to transition to modprobe domain using vendor_toolbox.
      
      Bug: b/38212864
      Test: Boot sailfish
      
      Change-Id: Ib839246954e9002859f3ba986094f206bfead137
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      d46b5d35
    • Josh Gao's avatar
      Let fallback crash dumping write to dumpstate pipes. · 8ba3138a
      Josh Gao authored
      Fix the following denial:
          avc: denied { append } for pid=1093 comm="mediaextractor" path="pipe:[68438]" dev="pipefs" ino=68438 scontext=u:r:mediaextractor:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 ppid=1 pcomm="init" pgid=1 pgcomm="init"
      
      Bug: http://b/38444258
      Test: none
      Change-Id: I58162e3a28b744a58396e77d6b0e2becb5633d6a
      (cherry picked from commit 5efadd91)
      8ba3138a
    • Andy Hung's avatar
      MediaExtractor: Allow reading of app data files. · ec5f80cb
      Andy Hung authored
      Needed to allow lower power Play Music of downloaded files.
      
          05-24 10:12:49.331 24025 24025 W generic : type=1400
                audit(0.0:1259): avc: denied { read } for
                path="/data/data/com.google.android.music/files/music/925.mp3"
                dev="sda35" ino=2179256 scontext=u:r:mediaextractor:s0
                tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file
                permissive=0
      
      Test: Play Music
      Bug: 62059834
      
      Change-Id: I97bdb1d175dba8f7a8ec6cd9084323cfcd3660bd
      ec5f80cb
    • Josh Gao's avatar
      Let fallback crash dumping write to dumpstate pipes. · 5efadd91
      Josh Gao authored
      Fix the following denial:
          avc: denied { append } for pid=1093 comm="mediaextractor" path="pipe:[68438]" dev="pipefs" ino=68438 scontext=u:r:mediaextractor:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 ppid=1 pcomm="init" pgid=1 pgcomm="init"
      
      Bug: http://b/38444258
      Test: none
      Change-Id: I58162e3a28b744a58396e77d6b0e2becb5633d6a
      5efadd91
  11. May 23, 2017
    • pkanwar's avatar
      SE Policy for Tether Offload HAL · c67fa9bf
      pkanwar authored
      Update SE Policy to allow calls to and callbacks for the Tether Offload HAL
      HIDL binderized service.
      
      Bug: 38417260
      Test: New functionality. So we don't have any tests.
      Change-Id: I2c95b290523c55c081afa1bca091f368559c9125
      (cherry picked from commit 722249b3)
      c67fa9bf
    • pkanwar's avatar
      SE Policy for Tether Offload HAL · 722249b3
      pkanwar authored
      Update SE Policy to allow calls to and callbacks for the Tether Offload HAL
      HIDL binderized service.
      
      Bug: 38417260
      Test: New functionality. So we don't have any tests.
      Change-Id: I2c95b290523c55c081afa1bca091f368559c9125
      722249b3
  12. May 22, 2017
  13. May 19, 2017
    • Steven Moreland's avatar
      Fix graphics composer denial. · f30a82ef
      Steven Moreland authored
      Right now, the hwcomposer hidl hal is unable to figure out where
      to get the hidl mapper implementation.
      
      It is expected that all graphics composer objects will need this
      permission. The interfaces are written to work together with the
      "IMapper" being the same-process ("sphal") component and the
      "IComposer" interface being the binderized compoenent.
      
      10-09 00:24:38.900   457   457 E SELinux : avc:  denied  { find } for
      interface=android.hardware.graphics.mapper::IMapper pid=495
      scontext=u:r:hal_graphics_composer_default:s0
      tcontext=u:object_r:hal_graphics_mapper_hwservice:s0 tclass=hwservice_manager
      
      Test: boot marlin, denial no longer present.
      Bug: 38415912
      Change-Id: I1b274be10e115fa7b53fb81e85be8827da05997e
      f30a82ef
  14. May 18, 2017
    • Wyatt Riley's avatar
      Removing UDP access for hal_gnss · 799c2349
      Wyatt Riley authored
      Underlying data services setup no longer needs this
      
      Bug: 35757613
      Bug: 36085168
      Test: GPS, XTRA & avc denial checks
      Change-Id: I679ee70f65f34d5a7d1fc1f1fe92af6a92ec92c5
      799c2349
    • Sohani Rao's avatar
      SE Policy for Wifi Offload HAL · 325bf725
      Sohani Rao authored
      Update SE Policy to allow calls to and callbacks from Wifi Offload HAL
      HIDL binderized service.
      Combined cherry pick from d56aa1982d15acfc2408271138dac43f1e5dc987
      and 66e27bf5
      
      Bug: 32842314
      Test: Unit tests, Mannual test to ensure Wifi can be brought up and
      connected to an AP, ensure that Offload HAL service is running and that
      that wificond can get the service handle by calling hwservicemanager.
      
      Change-Id: I0fc51a4152f1891c8d88967e75d45ded115e766e
      325bf725
  15. May 17, 2017
    • Steven Moreland's avatar
      Add fwk_display_hwservice. · e8ab0020
      Steven Moreland authored
      This hidl service provides information about vsync and hotplug
      to vendor services which is required by at least some camera
      hal implementations.
      
      Test: VtsFwkDisplayServiceV1_0TargetTest
      Test: no denials
      Bug: 38311538
      Change-Id: I64f0321e2832facf987057f0d48940e269d8e2d9
      e8ab0020
  16. May 16, 2017
    • Jeff Vander Stoep's avatar
      hal_camera: remove video_device restriction · a1c94c8d
      Jeff Vander Stoep authored
      Disallowing other HALs access to video_device does not appear to be
      enforceable.
      
      (cherry picked from commit c26dd18a)
      
      Bug: 37669506
      Test: build policy. Neverallow rules are build time test and do not
            impact the policy binary.
      Change-Id: Iea401de08a63f3261a461f67b85113a9d838e88a
      a1c94c8d
  17. May 15, 2017
    • Jeff Vander Stoep's avatar
      Move domain_deprecated into private policy · 76aab82c
      Jeff Vander Stoep authored
      This attribute is being actively removed from policy. Since
      attributes are not being versioned, partners must not be able to
      access and use this attribute. Move it from private and verify in
      the logs that rild and tee are not using these permissions.
      
      Bug: 38316109
      Test: build and boot Marlin
      Test: Verify that rild and tee are not being granted any of these
            permissions.
      Change-Id: I31beeb5bdf3885195310b086c1af3432dc6a349b
      76aab82c
    • Dan Cashman's avatar
      Partially revert "Sepolicy: Give asan_extract access to powerctl" · f66fbab2
      Dan Cashman authored
      This is a partial revert of commit 82672089.
      The previous commit removed a public type, which is a version-incompatible
      change to the SELinux vendor API.  Since the 2017 devices are meant to be
      launching with the previous version, this is unacceptable.  Revert the
      version-incompatible parts of the change, but keep the other parts to enable
      existing system functionality to persist and become part of MR1.  Leave TODOs
      to remove the other parts when a version bump is acceptable.
      
      Bug: 38241921
      Test: Policy builds and device boots with ASAN enabled.
      Change-Id: I0dd3673b8ed7fb86abd79cd04982396000e986f1
      f66fbab2
    • Alex Vakulenko's avatar
      SELinux policies for PDX services · c4055f0d
      Alex Vakulenko authored
      Specify per-service rules for PDX transport. Now being able to
      grant permissions to individual services provided by processes,
      not all services of a process.
      
      Also tighter control over which permissions are required for
      client and server for individual components of IPC (endpoints,
      channels, etc).
      
      Bug: 37646189
      Change-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea
      Merged-Id: I78eb8ae8b6e08105666445a66bfcbd2f1d69d0ea
      c4055f0d
  18. May 12, 2017
    • Andrew Scull's avatar
      SELinux policies for Weaver HAL. · 3c90eaf2
      Andrew Scull authored
      Bug: 35628284
      Change-Id: I08877ac117212325b1259f7d90a4c0cb1dac2d9f
      Fix: 38233550
      Test: Build and boot
      Merged-In: I4cdacb601e0eea1f5f0e721c568c7ee04298704f
      3c90eaf2
    • Andrew Scull's avatar
      SELinux policies for the OEM lock HAL. · 0e9b2207
      Andrew Scull authored
      Bug: 34766843
      Change-Id: I5be615d818ecf999fec6514ce9b89ff6a7f13cd6
      Fix: 38232801
      Test: Build and boot
      Merged-In: Ice78aedfdbe82477a84252499a76dad37887fe6b
      0e9b2207
  19. May 11, 2017
    • Luke Song's avatar
      Move sensord sepolicy · 2dd9ae33
      Luke Song authored
      Sensord move in ag/2106763 should be accompanied by corresponding
      sepolicy move of sensord-related files/declarations.
      
      Bug: 36996994
      Test: Sailfish build shows no related permission errors
      Change-Id: Ibe41b363f7ca2752b5d3e0961298985cf784663d
      2dd9ae33
    • Tom Cherry's avatar
      Revert "remove /dev/log" · 5dff1962
      Tom Cherry authored
      This reverts commit 8c60f74d.
      
      Bug: 38242876
      Change-Id: Iba5a94d16901dc0c52f1941972c26877baa4805c
      5dff1962
Loading