Skip to content
Snippets Groups Projects
  1. Jan 07, 2019
  2. Jan 02, 2019
    • Joel Galenson's avatar
      Allow dumpstate to read sysfs_loop files. · f0264fe2
      Joel Galenson authored
      This prevents denials while taking a bugreport.
      
      Bug: 116711254
      Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t
      android.security.cts.SELinuxHostTest#testNoBugreportDenials
      
      Change-Id: Ie190bfa62cf5aa172ebfff8bfd82dea2a7d1a016
      f0264fe2
  3. Dec 30, 2018
    • Justin Yun's avatar
      sepolicy for vendor overlay · df9d7832
      Justin Yun authored
      Make /(product|system/product)/vendor_overlay/<ver> have the vendor
      file context.
      
      If vendor_overlay requires to mount on the vendor directories other
      than 'vendor_file', the contexts must be defined in the device
      specific sepolicy files.
      
      Bug: 119076200
      Test: build and check if the files are overided and have the required
      sepolicy contexts.
      
      Change-Id: I69ed38d4ea8e7d89f56865b1ca1e26f290e9892d
      df9d7832
  4. Dec 28, 2018
    • Zachary Iqbal's avatar
      Added placeholder SELinux policy for the biometric face HAL. · 893272d8
      Zachary Iqbal authored
      Notes:
      - Added face hal domain, context and file types for the default
        SELinux policy.
      - Please see aosp/q/topic:"Face+Authentication"
      
      Bug: 80155388
      Test: Built successfully.
      Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
      893272d8
    • Dario Freni's avatar
      Revert "Add StagingManager service." · ca861694
      Dario Freni authored
      This reverts commit 9eb3b8ff.
      
      Reason for revert: We are deciding for now not to make StagingManager a fully-fledged binder service, as it will only be accessed by PackageInstaller. We might re-evaluate this decision later if needed.
      
      Bug: 122072686
      Change-Id: Ic2a53fc92ddd7d7eeccc6a4a0117f28724346ec7
      ca861694
  5. Dec 27, 2018
    • Dario Freni's avatar
      Add StagingManager service. · 9eb3b8ff
      Dario Freni authored
      Adding a new high-level service which will handle staged installs, i.e.
      installs that require a reboot.
      
      Bug: 118865310
      Test: An initial implementation of StagingManager can be reached
      successfully by PackageManagerService and PackageInstallerService.
      Change-Id: I8859b463575f8ee85caae43570958347b82f967e
      9eb3b8ff
    • Michael Groover's avatar
      Merge "Add selinux policy for new SensorPrivacyService" · 09c86730
      Michael Groover authored
      Test: manually verified SensorPrivacyService is accessible
      Bug: 110842805
      Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      (cherry picked from commit 0ac3dea7)
      09c86730
  6. Dec 22, 2018
  7. Dec 21, 2018
  8. Dec 20, 2018
  9. Dec 19, 2018
    • Nick Kralevich's avatar
      Ensure that hwservice_manager adds / finds make sense. · db43ee04
      Nick Kralevich authored
      Add a neverallow rule asserting that services registered or queried
      through hwservicemanager must have the attribute hwservice_manager_type.
      Attempting to add or query a service which does not have that
      attribute is malformed policy.
      
      Test: compiles
      Change-Id: Ib498508694f478c396f2d9273abaccbff06975e6
      db43ee04
    • Nick Kralevich's avatar
      Ensure that service_manager adds / finds make sense. · 5f154404
      Nick Kralevich authored
      Add a neverallow rule asserting that services registered or queried
      through servicemanager must have the attribute service_manager_type
      or vndservice_manager_type. Attempting to add or query a service which
      does not have one of those attributes is malformed policy.
      
      See
      https://android-review.googlesource.com/c/platform/system/sepolicy/+/826500/7/private/system_server.te#696
      as an example where this occurred.
      
      Test: compiles
      Change-Id: I339bde04b80819b07832d96797fd7f477a4b676a
      5f154404
    • Tri Vo's avatar
      sepolicy: fix mac build · ebf3eaca
      Tri Vo authored
      sed "-i" flag on Mac has different syntax than on Linux. Replace use of
      sed with grep.
      
      A simple fix like this should suffice for this case, but ideally, we
      should maintain our own utils instead of using tools on the host
      machine.
      
      Fixes: 121235932
      Test: m selinux_policy
      Change-Id: I46c3bdb90bf7de48d2c942b15a65ce82ae3041c5
      ebf3eaca
    • Nick Kralevich's avatar
      rs.te: Allow following /data/user/0 symlink · 5cbe41b1
      Nick Kralevich authored
      The bcc command line uses /data/user/0 paths, so renderscript needs to
      be able to follow those symlinks.
      
      Addresses the following denial:
      
        audit(1545249938.830:2274): avc: denied { read } for comm="bcc" name="0" dev="dm-6" ino=101 scontext=u:r:rs:s0:c184,c256,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=lnk_file permissive=1 app=android.rscpp.cts
      
      Test: cts-tradefed run cts -m CtsRsCppTestCases
      Bug: 121266184
      Bug: 112357170
      Change-Id: I16210f9b95f386bdee0863cf0044c956af99586d
      5cbe41b1
    • Tri Vo's avatar
      Separate product_file_contexts out of system sepolicy. · 3361ec43
      Tri Vo authored
      Bug: 119305624
      Test: boot blueline
      Change-Id: I3ecdeab3bb33c3cb5e80dc10ba1079c9853048f8
      3361ec43
  10. Dec 18, 2018
Loading