Skip to content
Snippets Groups Projects
  1. Dec 10, 2018
  2. Dec 07, 2018
  3. Dec 06, 2018
  4. Dec 05, 2018
    • Treehugger Robot's avatar
      Merge "DO NOT MERGE" · 8155b44a
      Treehugger Robot authored
      8155b44a
    • Joel Galenson's avatar
      Allow dumpstate to call idmap over binder · 657470ac
      Joel Galenson authored
      This prevents denials while taking a bugreport.
      
      Bug: 116711254
      Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t
      android.security.cts.SELinuxHostTest#testNoBugreportDenials
      
      Change-Id: I5414141a1557d71e3ac0cf5bc89529685e9069c3
      657470ac
    • Xin Li's avatar
      DO NOT MERGE · 53fa0274
      Xin Li authored
      Merge pie-platform-release (PPRL.181105.017, history only) into master
      
      Bug: 118454372
      Change-Id: I44d2461c1d8845d453fe587a77c2c06f9e1da2eb
      53fa0274
    • xshu's avatar
      Wifi HAL SIOCETHTOOL sepolicy · 04fad007
      xshu authored
      Allow wifi HAL to use SIOCETHTOOL. This permission is needed to get
      factory MAC address of the device.
      
      Bug: 111634904
      Test: Manual check that the device can get factory MAC address
      Change-Id: I50e91ef7390ad4fba6e014990ee23feb777c4391
      04fad007
  5. Dec 04, 2018
  6. Dec 03, 2018
    • felkachang's avatar
      Track isolated_app app_data_file SELinux denial. · 22f86690
      felkachang authored
      The isolated service that do nothing except for both AIDL's basic
      skeleton and service binding. It still got the SELinux denied.
      This should fix presubmit test.
      
      01-01 00:00:29.196  6121  6121 I auditd  : type=1400 audit(0.0:6):
      avc: denied { getattr } for comm="convert.service"
      path="/data/data/com.android.externalstorage" dev="sda35" ino=655437
      scontext=u:r:isolated_app:s0:c0,c256,c512,c768
      tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0
      
      Test: ag/5681059 ag/5660144
      Bug: 120394782
      Change-Id: I7838def96da30b88d510dab860ed9779a0d4d5ed
      22f86690
    • Primiano Tucci's avatar
    • Daniel Mentz's avatar
      Allow hal_usb to call getsockopt on uevent socket · bbdb25f6
      Daniel Mentz authored
      We are making a change to uevent_open_socket() in libcutils related to
      setting the receive buffer size of netlink uevent sockets.
      
      After setting SO_RCVBUF, we immediately read it back using getsockopt()
      to verify that the setsockopt() call was effective. Only if it was not
      effective, we call setsockopt() with SO_RCVBUFFORCE.
      
      getsockopt() previously caused SELinux denials like the following:
      
       avc: denied { getopt } for comm="usb@1.1-service" scontext=u:r:hal_usb_default:s0 tcontext=u:r:hal_usb_default:s0 tclass=netlink_kobject_uevent_socket permissive=0
      
      Bug: 119933843
      Change-Id: I7bbb1eb1fa7ade2c94afc52ab1e28762f86a7d1f
      bbdb25f6
    • Neil Fuller's avatar
      Track add of RuntimeService in system server · f58b555d
      Neil Fuller authored
      Adds the necessary incantations for the new service.
      
      Bug: 118242715
      Bug: 119026403
      Test: build / boot / adb shell dumpsys
      Change-Id: Ibb1a356067863316d70586a61ede9f5973c1ae15
      f58b555d
    • Primiano Tucci's avatar
      Allow traced_probes to access battery coulomb counters · 353b93a9
      Primiano Tucci authored
      Allows battery counters to be logged in the trace. This
      is to allow high fidelity attribution of battery power.
      
      Matching feature CL: aosp/838951
      
      SELinux denials that lead to this:
      avc: denied { read } for comm="traced_probes" name="u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=0
      avc: denied { read } for comm="traced_probes" name="u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=0 duplicate messages suppressed
      avc: denied { read } for comm="traced_probes" name="u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { read } for comm="traced_probes" name="u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { open } for comm="traced_probes" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { open } for comm="traced_probes" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { getattr } for comm="traced_probes" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { getattr } for comm="traced_probes" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { call } for comm="traced_probes" scontext=u:r:traced_probes:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      avc: denied { call } for comm="traced_probes" scontext=u:r:traced_probes:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      avc: denied { search } for comm="hwservicemanage" name="26854" dev="proc" ino=4959346 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=dir permissive=1
      avc: denied { search } for comm="hwservicemanage" name="26854" dev="proc" ino=4959346 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=dir permissive=1
      avc: denied { read } for comm="hwservicemanage" name="current" dev="proc" ino=4959383 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=file permissive=1
      avc: denied { read } for comm="hwservicemanage" name="current" dev="proc" ino=4959383 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=file permissive=1
      avc: denied { open } for comm="hwservicemanage" path="/proc/26854/attr/current" dev="proc" ino=4959383 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=file permissive=1
      avc: denied { open } for comm="hwservicemanage" path="/proc/26854/attr/current" dev="proc" ino=4959383 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=file permissive=1
      avc: denied { getattr } for comm="hwservicemanage" scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=process permissive=1
      
      
      Bug: 113076327
      Change-Id: I4aabd0d70025105320c4a8d34470098807d56899
      353b93a9
    • Florian Mayer's avatar
      Allow heapprofd to read system_file_type. · 3f8c271d
      Florian Mayer authored
      Heapprofd needs to read binary files and library in order to support
      unwinding the stack. sytem_file does not include all thes files, e.g.
      zygote_exec is only labeled as system_file_type.
      
      Denials:
      
      12-03 10:50:37.485  9263  9263 I heapprofd: type=1400 audit(0.0:177): avc: denied { read } for name="app_process64" dev="dm-0" ino=2286 scontext=u:r:heapprofd:s0 tcontext=u:object_r:zygote_exec:s0 tclass=file permissive=1
      12-03 10:50:37.485  9263  9263 I heapprofd: type=1400 audit(0.0:178): avc: denied { open } for path="/system/bin/app_process64" dev="dm-0" ino=2286 scontext=u:r:heapprofd:s0 tcontext=u:object_r:zygote_exec:s0 tclass=file permissive=1
      12-03 10:50:37.485  9263  9263 I heapprofd: type=1400 audit(0.0:179): avc: denied { getattr } for path="/system/bin/app_process64" dev="dm-0" ino=2286 scontext=u:r:heapprofd:s0 tcontext=u:object_r:zygote_exec:s0 tclass=file permissive=1
      
      Change-Id: Ie04b722a78ff6367729930ee0ef96f48ccf6aa55
      Bug: 117762471
      3f8c271d
    • Jiyong Park's avatar
      Allow apexd to label apk_tmp_file to apex_data_file · ce15e5e5
      Jiyong Park authored
      Currently, when an APEX is staged, apexd moves the file from
      /data/app/vmdl*.tmp directory to /data/apex. However, the original file
      is labeled with apk_tmp_file and is not readable from apexd.
      
      We plan to resolve this issue by moving the file content via file
      descriptor in between the package manager and apexd.
      
      However, until the plan is implemented, temporarily allow apexd to
      relabel the file to apex_data_file that is readable to it. This unblocks
      the end-to-end test for APEX.
      
      Bug: 112669193
      Test: adb install --apex system/apex/apexd/apexd_testdata/test.apex
      adb reboot; adb root; adb shell; cmd apexservice getActivePackages
      The test APEX is activated
      
      Change-Id: Ib9d4f5c699261f1fa1e6d557731767ee4d7168f9
      ce15e5e5
  7. Dec 01, 2018
  8. Nov 30, 2018
Loading