- Jun 22, 2018
-
-
Jeff Vander Stoep authored
Grant access to icmp_socket to netdomain. This was previously labeled as rawip_socket which apps are allowed to use. Neverallow all other new socket types for apps. Kernels versions > 4.9 redefine ICMP sockets from rawip_socket to icmp_socket. To pass neverallow tests, we need to define which IOCTLs are allowed (and disallowed). Note that this does not change behavior on devices with kernel versions <=4.9. However, it is necessary (although not sufficient) to pass CTS on kernel version 4.14. Bug: 110520616 Test: Grant icmp_socket in net.te and build. Change-Id: I5c7cb6867d1a4cd1554a8da0d55daa8e06daf803
-
- Jun 21, 2018
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Inseob Kim authored
From now on, linker will resolve dir.${section} paths of ld.config.txt. This is added to suppress SELinux denial during resolving /postinstall. Bug: http://b/80422611 Test: on taimen m -j, logcat | grep denied, atest on bionic/linker/tests Change-Id: I12c2bb76d71ae84055b5026933dcaa6ef2808590
-
- Jun 19, 2018
-
-
Neil Fuller authored
Add sepolicy entries for the new time zone detector service. The timezonedetector_service will be called from the telephony process. Bug: 78217059 Test: make / booted device Change-Id: Ib719a4bb444b2af7dd71910fb0bd12992df9d88c
-
Treehugger Robot authored
-
Neil Fuller authored
There will likely be no need for platform apps to call the timedetector_service; it was added in error. Bug: 78217059 Test: build / boot Change-Id: Ie299c92a60f26fe6cb00562219e386a9f13e459f
-
- Jun 15, 2018
-
-
Treehugger Robot authored
-
- Jun 14, 2018
-
-
John Stultz authored
For 4.14+ kernels, we need map permissions for vendor_config_files, for things like kernel loaded firmware blobs, etc. Change-Id: I8144c50b0239aedf4124569003187cc50c963080 Signed-off-by:
John Stultz <john.stultz@linaro.org>
-
Mark Salyzyn authored
init, dumpstate and shell Test: check avc for init is now gone Bug: 7232205 Bug: 109821005 Change-Id: I299a0ba29bcc97a97047f12a5c48f6056f5e6de5
-
Andrew Hsieh authored
-
- Jun 13, 2018
-
-
Treehugger Robot authored
* changes: init is a dynamic executable adbd is allowed to execute shell in recovery mode
-
Jiyong Park authored
init is now a dynamic executable. So it has to be able to execute the dynamic linker (/system/bin/linker) and shared libraries (e.g., /system/lib/libc.so). Furthermore, when in recovery mode, the files are all labeled as rootfs - because the recovery ramdisk does not support xattr, so files of type rootfs is allowed to be executed. Do the same for kernel and ueventd because they are executing the init executable. Bug: 63673171 Test: `adb reboot recovery; adb devices` shows the device ID Change-Id: Ic6225bb8e129a00771e1455e259ff28241b70396
-
padarshr authored
Legacy hardware and code still depends on the ueventd helpers to locate the firmware supported files which are on new mount path labeled with mnt_vendot_file. For ueventd helper to work we need dir search and read permission on this new label so moving ueventd to exempted list. Already ueventd has the vendor_file_type read access. Bug:110083808 Change-Id: Ia15cc39ecef9e29b4f1f684efdddbeb78b427988
-
- Jun 12, 2018
-
-
Treehugger Robot authored
-
- Jun 11, 2018
-
-
Steven Moreland authored
If you can get or serve the hal allocator interface, you should be a hal_allocator_client or hal_allocator_server. Bug: 80319537 Test: boot aosp_walleye and (sanity) take photos Change-Id: Iea14c67c4aa56df7a74ebdb17e99b78b1d3aa105
-
Neil Fuller authored
The timedetector_service will be called from the telephony process Bug: 78217059 Test: build / local testing with a client Change-Id: I25dfa4daabaa80e6b5e697ad1b1e2f7f72377702
-
Mark Salyzyn authored
To ensure a surprise reboot does not take the last boot reason on face value especially if coming from more than one boot sessions ago. We shift and clear the value from persist.sys.boot.reason to sys.boot.reason.last and establish a correct last reboot reason in the canonical sys.boot.reason property. As a result, the power manager should read the canonical sys.boot.reason for a definitive result rather than relying on the possibly incorrect values in the persistent storage. sys.boot.reason should be a core property as it represents the canonical boot reason API. Test: compile Bug: 86671991 Bug: 63736262 Change-Id: If3742c487d6c0ab69c464f056bf48c786b66a945
-
- Jun 08, 2018
-
-
Jiyong Park authored
The shell is now available directly in the recovery ramdisk. We no longer need to mount system.img to /system as the recovery ramdisk is self-contained. However, there is a problem that every file in the ramdisk is labeled as rootfs because the ramdisk does not support xattr. This CL adds several recovery-only rules that are required to make the recovery ramdisk self-contained. Most importantly, adbd is allowed to domain_trans to shell. Also shell is allowe to execute files of type rootfs. Finally, the recovery is allowed to mount on tmpfs since it now mounts system.img to /mnt/system. Bug: 63673171 Test: `adb reboot recovery; adb devices` shows the device ID Test: `adb root && adb shell` and then $ lsof -p `pidof adbd` shows that libm.so, libc.so, etc. are loaded from the /lib directory. Change-Id: If21b069aee63541344a5ca8939fb9a46ffef4d3e
-
- Jun 07, 2018
-
-
Neil Fuller authored
-
Steven Moreland authored
-
Treehugger Robot authored
-
- Jun 06, 2018
-
-
Tri Vo authored
build_test_only is used to denote rules that should not verified as part of compliance testing. Use this macro to exclude neverallow rules which we want to check as part of build, but not CTS. Bug: 80499271 Test: SELinuxNeverallowRulesTest on walleye has no more failure of type "Type or attribute * used in neverallow undefined in policy being checked." Number of failing test cases is reduced by 142. Test: policy.conf used to check neverallows at build-time still retains all neverallow rules. Change-Id: I5f1b383d9096bb5a7b8c0f1bc008b5dd07419580
-
Steven Moreland authored
Previously, supposedly, each individual client of configstore was supposed to add the add_hwservice attribute itself to get ahold of the specific sub-interface of configstore relevant to it. However, there is only one configstore interface, ISurfaceFlingerConfigs. From this point onward, the configstore hal is to be thought of as specifically relating to surface flinger. Other properties may be added as other attributes/packages. For instance, if we want a configstore entry for 'IFooConfig', then we would add the configuration to one of the following packages: - android.hardware.foo@X.Y (to the interface itself) - android.hardware.foo.config@X.Y (to a configuration of the interface) - android.hardware.configstore.foo@X.Y (as a sub-interface of configstore) and then it could be associated with the sepolicy attributes (respectively): - hal_foo - hal_foo_config (or just hal_foo if they are 1-1) - hal_configstore_foo The specific pattern to be followed irrelevant to this CL and subject to future discussion, the point being that we're going to have a separate sepolicy attribute (and package, although this isn't strictly necessary) for each separate domain's configuration. Fixes: 109806245 Test: boot walleye, check for denials Change-Id: If661e3fca012017a6c854fe3f02df4b779d514df
-
Treehugger Robot authored
* changes: hal_attribute_hwservice_client drop '_client' hal_attribute_hwservice_client += add_hwservice
-
Treehugger Robot authored
-
Steven Moreland authored
Since this attribute just associates a hal_attribute with a given hwservice in the standard way. Bug: 80319537 Test: boot + sanity + test for denials Change-Id: I545de165515387317e6920ce8f5e8c491f9ab24e
-
Steven Moreland authored
For sanity, this makes 'hal_attribute_hwservice_client' be associated with a specific hwservice thus making things consistent. After this change, only configstore, hal_allocator, and the fwk_* services are inconsistent with all other HALs. Bug: 80319537 Test: boot device, sanity tests, check for denials Change-Id: Ibffc65c9567a429e07a3dc4dd41117738459dc2a
-
Neil Fuller authored
This change removes references to the common time management service. Bug: 80462439 Test: build / boot Merged-In: I2c8fca44fe05e3a35f5580d23e23a4c033075613 Change-Id: I2c8fca44fe05e3a35f5580d23e23a4c033075613
-
Treehugger Robot authored
-
- Jun 05, 2018
-
-
Steven Moreland authored
-
Treehugger Robot authored
-
Steven Moreland authored
-
Wale Ogunwale authored
Bug: 80414790 Test: boots Change-Id: I3d6bb4e7da9d697ec8ff7502880543be89aee349
-
- Jun 04, 2018
-
-
Treehugger Robot authored
-
Steven Moreland authored
This was defined, but it had no users in the Android tree. Because of this, ODM manifests required extra sepolicy to be applied in vendor. Before this, there was no policy split, so that was okay, but now it is impossible. Bug: 91735839 Test: add an odm manifest for SE conditional on a system property (ro.boot.product.hardware.sku) and make sure it is read into the manifest (using the vintf tool) and also that a client can get the $ lshal | grep secure Y android.hardware.secure_element@1.0::ISecureElement/SIM1 0/2 881 2262 567 Change-Id: I94a2928943be6a17416b8bbd78106809c0c21198 Merged-In: I94a2928943be6a17416b8bbd78106809c0c21198
-
Neil Fuller authored
This commit contains the changes needed to add the new time detector system server service. Bug: 78217059 Test: make / booted device Change-Id: I7cfaac6cac876e4aa73e8af1aa5f837117bb9ad7
-
Jeff Vander Stoep authored
Clatd and zygote are all overprivileged as is storaged Test: Verify no "granted" messages from dogfooders. Build flash aosp_taimen-userdebug. Verify no denials. Change-Id: I735adcffed553962ad12072716a7200883930dcf
-
- Jun 01, 2018
-
-
Jeff Vander Stoep authored
The recommended solution is to not access encrypted storage until after the ACTION_USER_UNLOCKED intent is delivered. Test: build Fixes: 72811052 Fixes: 72550646 Change-Id: I80eb743e26047b7864de983c5a46c28b6f753a59
-
Jiyong Park authored
The attribute is used to capture system properties added from outside of AOSP (e.g. by OEM), but are not device-specific and thus are used only inside the system partition. Access to the the system properties from outside of the system partition is prevented by the neverallow rule. Bug: 80382020 Bug: 78598545 Test: m -j selinux_policy Merged-In: I22c083dc195dab84c9c21a79fbe3ad823a3bbb46 Change-Id: I22c083dc195dab84c9c21a79fbe3ad823a3bbb46 (cherry picked from commit c0f8f2f8)
-