Skip to content
Snippets Groups Projects
  1. Jan 07, 2019
    • Dario Freni's avatar
      SEPolicy for Staged Installs. · 274c1ded
      Dario Freni authored
      Test: basic workflow between apexd and PackageManager tested with
      changes being developed.
      Bug: 118865310
      Change-Id: I1ae866f33e9b22493585e108c4fd45400493c7ac
      274c1ded
  2. Jan 02, 2019
    • Joel Galenson's avatar
      Allow dumpstate to read sysfs_loop files. · f0264fe2
      Joel Galenson authored
      This prevents denials while taking a bugreport.
      
      Bug: 116711254
      Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t
      android.security.cts.SELinuxHostTest#testNoBugreportDenials
      
      Change-Id: Ie190bfa62cf5aa172ebfff8bfd82dea2a7d1a016
      f0264fe2
  3. Dec 30, 2018
    • Justin Yun's avatar
      sepolicy for vendor overlay · df9d7832
      Justin Yun authored
      Make /(product|system/product)/vendor_overlay/<ver> have the vendor
      file context.
      
      If vendor_overlay requires to mount on the vendor directories other
      than 'vendor_file', the contexts must be defined in the device
      specific sepolicy files.
      
      Bug: 119076200
      Test: build and check if the files are overided and have the required
      sepolicy contexts.
      
      Change-Id: I69ed38d4ea8e7d89f56865b1ca1e26f290e9892d
      df9d7832
  4. Dec 28, 2018
    • Zachary Iqbal's avatar
      Added placeholder SELinux policy for the biometric face HAL. · 893272d8
      Zachary Iqbal authored
      Notes:
      - Added face hal domain, context and file types for the default
        SELinux policy.
      - Please see aosp/q/topic:"Face+Authentication"
      
      Bug: 80155388
      Test: Built successfully.
      Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
      893272d8
    • Dario Freni's avatar
      Revert "Add StagingManager service." · ca861694
      Dario Freni authored
      This reverts commit 9eb3b8ff.
      
      Reason for revert: We are deciding for now not to make StagingManager a fully-fledged binder service, as it will only be accessed by PackageInstaller. We might re-evaluate this decision later if needed.
      
      Bug: 122072686
      Change-Id: Ic2a53fc92ddd7d7eeccc6a4a0117f28724346ec7
      ca861694
  5. Dec 27, 2018
    • Dario Freni's avatar
      Add StagingManager service. · 9eb3b8ff
      Dario Freni authored
      Adding a new high-level service which will handle staged installs, i.e.
      installs that require a reboot.
      
      Bug: 118865310
      Test: An initial implementation of StagingManager can be reached
      successfully by PackageManagerService and PackageInstallerService.
      Change-Id: I8859b463575f8ee85caae43570958347b82f967e
      9eb3b8ff
    • Michael Groover's avatar
      Merge "Add selinux policy for new SensorPrivacyService" · 09c86730
      Michael Groover authored
      Test: manually verified SensorPrivacyService is accessible
      Bug: 110842805
      Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      (cherry picked from commit 0ac3dea7)
      09c86730
  6. Dec 22, 2018
  7. Dec 21, 2018
  8. Dec 20, 2018
  9. Dec 19, 2018
    • Nick Kralevich's avatar
      Ensure that hwservice_manager adds / finds make sense. · db43ee04
      Nick Kralevich authored
      Add a neverallow rule asserting that services registered or queried
      through hwservicemanager must have the attribute hwservice_manager_type.
      Attempting to add or query a service which does not have that
      attribute is malformed policy.
      
      Test: compiles
      Change-Id: Ib498508694f478c396f2d9273abaccbff06975e6
      db43ee04
    • Nick Kralevich's avatar
      Ensure that service_manager adds / finds make sense. · 5f154404
      Nick Kralevich authored
      Add a neverallow rule asserting that services registered or queried
      through servicemanager must have the attribute service_manager_type
      or vndservice_manager_type. Attempting to add or query a service which
      does not have one of those attributes is malformed policy.
      
      See
      https://android-review.googlesource.com/c/platform/system/sepolicy/+/826500/7/private/system_server.te#696
      as an example where this occurred.
      
      Test: compiles
      Change-Id: I339bde04b80819b07832d96797fd7f477a4b676a
      5f154404
    • Tri Vo's avatar
      sepolicy: fix mac build · ebf3eaca
      Tri Vo authored
      sed "-i" flag on Mac has different syntax than on Linux. Replace use of
      sed with grep.
      
      A simple fix like this should suffice for this case, but ideally, we
      should maintain our own utils instead of using tools on the host
      machine.
      
      Fixes: 121235932
      Test: m selinux_policy
      Change-Id: I46c3bdb90bf7de48d2c942b15a65ce82ae3041c5
      ebf3eaca
    • Nick Kralevich's avatar
      rs.te: Allow following /data/user/0 symlink · 5cbe41b1
      Nick Kralevich authored
      The bcc command line uses /data/user/0 paths, so renderscript needs to
      be able to follow those symlinks.
      
      Addresses the following denial:
      
        audit(1545249938.830:2274): avc: denied { read } for comm="bcc" name="0" dev="dm-6" ino=101 scontext=u:r:rs:s0:c184,c256,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=lnk_file permissive=1 app=android.rscpp.cts
      
      Test: cts-tradefed run cts -m CtsRsCppTestCases
      Bug: 121266184
      Bug: 112357170
      Change-Id: I16210f9b95f386bdee0863cf0044c956af99586d
      5cbe41b1
    • Tri Vo's avatar
      Separate product_file_contexts out of system sepolicy. · 3361ec43
      Tri Vo authored
      Bug: 119305624
      Test: boot blueline
      Change-Id: I3ecdeab3bb33c3cb5e80dc10ba1079c9853048f8
      3361ec43
  10. Dec 18, 2018
    • Yao Chen's avatar
      Allow statsd to write stats log events to perfd(running as shell) via pipes. · e1d25089
      Yao Chen authored
      Bug: 120921905
      Test: locally tested
      Change-Id: I23fda0f83daff8765f7946814a61588dac00c85a
      e1d25089
    • Tri Vo's avatar
      Merge changes from topic "product_sepolicy.cil" · 9ee4e3ae
      Tri Vo authored
      * changes:
        Separate product_sepolicy.cil out of system sepolicy
        Replace "grep -f" with python util.
      9ee4e3ae
    • Tri Vo's avatar
      Separate product_sepolicy.cil out of system sepolicy · 75887dd5
      Tri Vo authored
      Product-specific sepolicy will be installed into /product/etc/selinux/*.
      This change separates out /product/etc/selinux/product_sepolicy.cil out
      of system sepolicy.
      
      This file is merged into precompiled_sepolicy at build-time. In case
      precompiled_sepolicy can't be used (e.g. system-only-ota), init wll
      merge this file with the rest of the sepolicy at runtime.
      
      I left TODOs to separate other product-specific SELinux artifacts out of
      system.
      
      Bug: 119305624
      Test: boot aosp_taimen with product_sepolicy.cil
      Test: build selinux_policy for aosp_arm64; no product_sepolicy.cil
      produced
      Change-Id: Idb84a1c8ceb2de78f1460d954497c53fed08935f
      75887dd5
    • Treehugger Robot's avatar
      490cbfdb
    • Tri Vo's avatar
      Replace "grep -f" with python util. · d57789fd
      Tri Vo authored
      grep can potentially run out of memory on Mac builds for large input
      files. So we add a python util to handle filtering out files.
      
      We will also need this util to filter plat_sepolicy.cil out of
      product_sepolicy.cil
      
      Bug: 119305624
      Test: boot aosp_taimen
      Change-Id: I61cd68f407ea5de43a06bf522a5fc149e5067e8c
      d57789fd
    • Winson Chung's avatar
      Adding policy for content suggestions. · ac1a0a7b
      Winson Chung authored
      Bug: 120865921
      Test: Manual verification
      Change-Id: Ic0b3f85fad24ccedc0a8e9935c198bc8503bb415
      ac1a0a7b
  11. Dec 17, 2018
Loading