Skip to content
Snippets Groups Projects
  1. Dec 11, 2018
  2. Dec 10, 2018
    • Fan Xu's avatar
      Remove unused bufferhub sepolicy · ffffed28
      Fan Xu authored
      These selinux policy rules were added for bufferhub to run a binder
      service. But later we decided to use a hwbinder service instead, and the
      original binder service was removed in git/master. Now we can safely
      remove these rules.
      
      Test: Build passed. Device boot successfully without selinux denial.
      Bug: 118891412
      Change-Id: I349b5f0f2fa8fb6a7cfe7869d936791355c20753
      ffffed28
    • Neil Fuller's avatar
      130fee6e
  3. Dec 07, 2018
  4. Dec 06, 2018
  5. Dec 05, 2018
    • Treehugger Robot's avatar
      Merge "DO NOT MERGE" · 8155b44a
      Treehugger Robot authored
      8155b44a
    • Joel Galenson's avatar
      Allow dumpstate to call idmap over binder · 657470ac
      Joel Galenson authored
      This prevents denials while taking a bugreport.
      
      Bug: 116711254
      Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t
      android.security.cts.SELinuxHostTest#testNoBugreportDenials
      
      Change-Id: I5414141a1557d71e3ac0cf5bc89529685e9069c3
      657470ac
    • Xin Li's avatar
      DO NOT MERGE · 53fa0274
      Xin Li authored
      Merge pie-platform-release (PPRL.181105.017, history only) into master
      
      Bug: 118454372
      Change-Id: I44d2461c1d8845d453fe587a77c2c06f9e1da2eb
      53fa0274
    • xshu's avatar
      Wifi HAL SIOCETHTOOL sepolicy · 04fad007
      xshu authored
      Allow wifi HAL to use SIOCETHTOOL. This permission is needed to get
      factory MAC address of the device.
      
      Bug: 111634904
      Test: Manual check that the device can get factory MAC address
      Change-Id: I50e91ef7390ad4fba6e014990ee23feb777c4391
      04fad007
  6. Dec 04, 2018
  7. Dec 03, 2018
    • felkachang's avatar
      Track isolated_app app_data_file SELinux denial. · 22f86690
      felkachang authored
      The isolated service that do nothing except for both AIDL's basic
      skeleton and service binding. It still got the SELinux denied.
      This should fix presubmit test.
      
      01-01 00:00:29.196  6121  6121 I auditd  : type=1400 audit(0.0:6):
      avc: denied { getattr } for comm="convert.service"
      path="/data/data/com.android.externalstorage" dev="sda35" ino=655437
      scontext=u:r:isolated_app:s0:c0,c256,c512,c768
      tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0
      
      Test: ag/5681059 ag/5660144
      Bug: 120394782
      Change-Id: I7838def96da30b88d510dab860ed9779a0d4d5ed
      22f86690
    • Primiano Tucci's avatar
    • Daniel Mentz's avatar
      Allow hal_usb to call getsockopt on uevent socket · bbdb25f6
      Daniel Mentz authored
      We are making a change to uevent_open_socket() in libcutils related to
      setting the receive buffer size of netlink uevent sockets.
      
      After setting SO_RCVBUF, we immediately read it back using getsockopt()
      to verify that the setsockopt() call was effective. Only if it was not
      effective, we call setsockopt() with SO_RCVBUFFORCE.
      
      getsockopt() previously caused SELinux denials like the following:
      
       avc: denied { getopt } for comm="usb@1.1-service" scontext=u:r:hal_usb_default:s0 tcontext=u:r:hal_usb_default:s0 tclass=netlink_kobject_uevent_socket permissive=0
      
      Bug: 119933843
      Change-Id: I7bbb1eb1fa7ade2c94afc52ab1e28762f86a7d1f
      bbdb25f6
    • Neil Fuller's avatar
      Track add of RuntimeService in system server · f58b555d
      Neil Fuller authored
      Adds the necessary incantations for the new service.
      
      Bug: 118242715
      Bug: 119026403
      Test: build / boot / adb shell dumpsys
      Change-Id: Ibb1a356067863316d70586a61ede9f5973c1ae15
      f58b555d
Loading