Skip to content
Snippets Groups Projects
  1. Jan 14, 2019
  2. Jan 12, 2019
    • Jeff Vander Stoep's avatar
      netdomain: move to public policy · 937f256b
      Jeff Vander Stoep authored
      Vendor domains may use net_domain() so it should be moved to public
      policy. This will allow removal of permissions such as rawip_socket
      in future releases without breaking Treble compatiblity.
      
      Bug: 122572608
      Test: build
      Change-Id: Id84feb11587d305334cd9dbbc6e4f6f71ffff6f2
      937f256b
  3. Jan 11, 2019
    • Victor Hsieh's avatar
      Allow fs-verity setup within system_server · 7397ebd1
      Victor Hsieh authored
      The original fs-verity implementation requires CAP_SYS_ADMIN and thus
      the actual setup is proxied through installd.  Instead, upstream
      FS_IOC_ENABLE_VERITY ioctl checks write permission to inode, and thus
      can happen in system_server.
      
      Also, replace the old measure ioctl with FS_IOC_SET_VERITY_MEASUREMENT.
      Note that although the number is name, they work differently.
      
      Test: set ro.apk_verity.mode=2, in-progress CTS passed without denial
      Bug: 112037636
      Change-Id: I3e8d14321df8904dfed68b83aae8b3dd99c211ac
      7397ebd1
    • Nick Kralevich's avatar
      rename rs_data_file to app_exec_data_file · fb66c6f8
      Nick Kralevich authored
      There are multiple trusted system components which may be responsible
      for creating executable code within an application's home directory.
      Renderscript is just one of those trusted components.
      
      Generalize rs_data_file to app_exec_data_file. This label is intended to
      be used for any executable code created by trusted components placed
      into an application's home directory.
      
      Introduce a typealias statement to ensure files with the previous label
      continue to be understood by policy.
      
      This change is effectively a no-op, as it just renames a type, but
      neither adds or removes any rules.
      
      Bug: 121375718
      Bug: 112357170
      Test: cts-tradefed run cts-dev -m CtsRenderscriptTestCases
      Change-Id: I17dca5e3e8a1237eb236761862174744fb2196c0
      fb66c6f8
    • Tao Bao's avatar
      Remove the file context rule for /system/bin/bspatch. · a22f9b80
      Tao Bao authored
      update_engine no longer needs a standalone bspatch executable since [1]
      (which first landed into O). And we don't ship /system/bin/bspatch on
      device by default.
      
      [1] https://android-review.googlesource.com/c/platform/system/update_engine/+/327365
      
      Test: Verify that /system/bin/bspatch doesn't exist on device.
      Test: Trigger an A/B OTA install for aosp_walleye-userdebug:
            `m dist`;
            `system/update_engine/scripts/update_device.py out/dist/aosp_walleye-ota.zip`.
            No update_engine related denial.
      Change-Id: Iff578bdb0b1909092dd19feff069755a44d29398
      a22f9b80
    • Steven Moreland's avatar
      system/etc/event-log-tags available to all · b7246ac0
      Steven Moreland authored
      This was a regression in Q, and the file is an implementation of
      liblog.
      
      Bug: 113083310
      Test: use tags from vendor and see no denials
      
      Change-Id: I726cc1fcfad39afc197b21e431a687a3e4c8ee4a
      b7246ac0
    • Sooraj Sasindran's avatar
      Rename ANS to ONS · 2cf336bf
      Sooraj Sasindran authored
      Rename AlternativeNetworkService to OpportunisticNetworkService
      Bug: 118347827
      Test: compile
      Merged-In: I23b0caadd1801c104806fa438fc9054d8a31962e
      Change-Id: I23b0caadd1801c104806fa438fc9054d8a31962e
      2cf336bf
    • Martijn Coenen's avatar
      Add persist.apexd. property context. · 97650f50
      Martijn Coenen authored
      For persistent properties related to apexd.
      
      Bug: 121302351
      Test: apexd can get the prop
      Change-Id: Id9fd25923385188f46a9804155168c52f6b1187e
      97650f50
    • Siarhei Vishniakou's avatar
      Permissions for InputClassifier HAL · 41a871ba
      Siarhei Vishniakou authored
      Add the required permissions for the InputClassifier HAL.
      
      Bug: 62940136
      Test: no selinux denials in logcat when HAL is used inside input flinger.
      Change-Id: Ibc9b115a83719421d56ecb4bca2fd196ec71fd76
      41a871ba
  4. Jan 10, 2019
    • Remi NGUYEN VAN's avatar
      Allow network_stack to use common app api services · d0f65ce2
      Remi NGUYEN VAN authored
      Bug: b/122620633
      Test: m
      Change-Id: I36fe66fc22a1664f9ef25c66f933a2613a6f346b
      d0f65ce2
    • Primiano Tucci's avatar
      Allow perfetto to ingest logs on userdebug/eng · a64d5bb7
      Primiano Tucci authored
      When recording hour-long traces, logcat messages help
      to interpret the trace, giving human readable context on what
      is happening on the system.
      Furthermore this is particularly helpful for startup
      debugging thanks to activity manager instrumentation events
      (am_on_create_called, am_on_start, ...).
      This is only allowed on userdebug/eng builds.
      
      Bug: 122243384
      Change-Id: I4dfaebf21107e9853b0bf42403fbab6c3b4d5141
      a64d5bb7
    • Chalard Jean's avatar
      Add sepolicy for IpMemoryStoreService · fb15c9f1
      Chalard Jean authored
      Bug: 116512211
      Test: Builds, boots, including upcoming changes needing this
      Change-Id: I6f119368c5a4f7ac6c0325915dff60124c5a6399
      fb15c9f1
    • Tri Vo's avatar
      Apply full_treble_only to whole rule. · 1e99de57
      Tri Vo authored
      The way we build and run CTS expects full_treble_only and
      compatible_property_only macros to be applied to whole rules and not be
      nested inside other rules.
      
      Fixes: 122601363
      Test: corresponding neverallow rule in auto-generated
      SELinuxNeverallowRulesTest.java is parsed correctly.
      Change-Id: Ibf5187cedca72510fe74c6dc55a75a54a86c02ff
      1e99de57
  5. Jan 09, 2019
    • Yabin Cui's avatar
      Add permissions in runas_app domain to debug/profile debuggable apps. · 770a4f65
      Yabin Cui authored
      runas_app domain is used by lldb/ndk-gdb/simpleperf to debug/profile
      debuggable apps. But it misses permissions to ptrace app processes and
      read /proc/<app_pid> directory.
      
      Bug: none
      Test: build and boot marlin.
      Test: run lldb and simpleperf on apps with target sdk version 24-29.
      Change-Id: I9e6f940ec81a8285eae8db3b77fb1251a25dedd0
      770a4f65
  6. Jan 08, 2019
  7. Jan 07, 2019
  8. Dec 30, 2018
    • Justin Yun's avatar
      sepolicy for vendor overlay · df9d7832
      Justin Yun authored
      Make /(product|system/product)/vendor_overlay/<ver> have the vendor
      file context.
      
      If vendor_overlay requires to mount on the vendor directories other
      than 'vendor_file', the contexts must be defined in the device
      specific sepolicy files.
      
      Bug: 119076200
      Test: build and check if the files are overided and have the required
      sepolicy contexts.
      
      Change-Id: I69ed38d4ea8e7d89f56865b1ca1e26f290e9892d
      df9d7832
  9. Dec 28, 2018
    • Zachary Iqbal's avatar
      Added placeholder SELinux policy for the biometric face HAL. · 893272d8
      Zachary Iqbal authored
      Notes:
      - Added face hal domain, context and file types for the default
        SELinux policy.
      - Please see aosp/q/topic:"Face+Authentication"
      
      Bug: 80155388
      Test: Built successfully.
      Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
      893272d8
    • Dario Freni's avatar
      Revert "Add StagingManager service." · ca861694
      Dario Freni authored
      This reverts commit 9eb3b8ff.
      
      Reason for revert: We are deciding for now not to make StagingManager a fully-fledged binder service, as it will only be accessed by PackageInstaller. We might re-evaluate this decision later if needed.
      
      Bug: 122072686
      Change-Id: Ic2a53fc92ddd7d7eeccc6a4a0117f28724346ec7
      ca861694
  10. Dec 27, 2018
    • Dario Freni's avatar
      Add StagingManager service. · 9eb3b8ff
      Dario Freni authored
      Adding a new high-level service which will handle staged installs, i.e.
      installs that require a reboot.
      
      Bug: 118865310
      Test: An initial implementation of StagingManager can be reached
      successfully by PackageManagerService and PackageInstallerService.
      Change-Id: I8859b463575f8ee85caae43570958347b82f967e
      9eb3b8ff
    • Michael Groover's avatar
      Merge "Add selinux policy for new SensorPrivacyService" · 09c86730
      Michael Groover authored
      Test: manually verified SensorPrivacyService is accessible
      Bug: 110842805
      Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      (cherry picked from commit 0ac3dea7)
      09c86730
  11. Dec 21, 2018
    • Nick Kralevich's avatar
      Revert "remove app_data_file execute" · 65a89c1b
      Nick Kralevich authored
      This reverts commit b3624743.
      
      Reason for revert:
      
      android.jvmti.cts.JvmtiHostTest1906#testJvmti unittest failures.
      
      Bug: 121333210
      Bug: 112357170
      Change-Id: I6e68855abaaaa1e9248265a468712fa8d70ffa74
      Test: compiles and boots
      65a89c1b
    • Nick Kralevich's avatar
      Revert "Audit execution of app_data_file native code." · fa3eb773
      Nick Kralevich authored
      This reverts commit 89041472.
      
      Unittest failures of JvmtiHostTest1906#testJvmti. To do a clean revert
      of b3624743, we need to also revert this
      change.
      
      Test: compiles
      Bug: 121333210
      Bug: 111338677
      fa3eb773
    • Emilian Peev's avatar
      sepolicy: Add "rs" and "rs_exec" to public policy · a34cfe7b
      Emilian Peev authored
      Add "rs" and "rs_exec" types to public policy. Access
      to these types might be needed for device specific
      customization.
      
      Bug: 121306110
      Test: Manual using application
      Change-Id: Ief35d3353625adfbf468447de74aa80651dd9451
      a34cfe7b
    • Florian Mayer's avatar
      Make heapprofd work with MLS. · 23e1f4c7
      Florian Mayer authored
      Arbitrary apps need to connect to heapprofd in order to send samples.
      
      Relevant denial trying to profile com.google.android.inputmethod.latin
      on userdebug:
      
      12-20 14:50:20.420 25219 25219 I heapprofd: type=1400 audit(0.0:1006): avc: denied { read } for path="/proc/24819/mem" dev="proc" ino=244219 scontext=u:r:heapprofd:s0 tcontext=u:r:untrusted_app_27:s0:c133,c256,c512,c768 tclass=file permissive=1
      
      Bug: 121370989
      
      Test: m
      Test: flash walleye
      Test: profile com.google.android.inputmethod.latin
      
      Change-Id: Iee82c8c49951e5a5726cd5ab0b9e8fa71226c802
      23e1f4c7
    • Remi NGUYEN VAN's avatar
      Add selinux policies for network stack service · 47c2dee5
      Remi NGUYEN VAN authored
      The policies allow the system server to register a network_stack_service
      used to communicate with the network stack process.
      
      Test: atest FrameworksNetTests
      Bug: b/112869080
      Change-Id: Ib9b7d9150fe4afcce03c8b3dbb36b81c67e39366
      47c2dee5
  12. Dec 20, 2018
    • Remi NGUYEN VAN's avatar
      sepolicy changes for network stack app · 5f3ba92c
      Remi NGUYEN VAN authored
      The networking stack app hosts services that used to be in the system
      server (IpClient, NetworkMonitor for now), but in a different process to
      be packaged as a mainline module.
      
      Test: booted, verified networking stack working when in app
      Change-Id: I300a556f51b35c17378af961cea1ec937444e597
      5f3ba92c
Loading