- Jan 11, 2019
-
-
Siarhei Vishniakou authored
Add the required permissions for the InputClassifier HAL. Bug: 62940136 Test: no selinux denials in logcat when HAL is used inside input flinger. Change-Id: Ibc9b115a83719421d56ecb4bca2fd196ec71fd76
-
- Jan 10, 2019
-
-
Chalard Jean authored
Bug: 116512211 Test: Builds, boots, including upcoming changes needing this Change-Id: I6f119368c5a4f7ac6c0325915dff60124c5a6399
-
Tri Vo authored
-
Tri Vo authored
The way we build and run CTS expects full_treble_only and compatible_property_only macros to be applied to whole rules and not be nested inside other rules. Fixes: 122601363 Test: corresponding neverallow rule in auto-generated SELinuxNeverallowRulesTest.java is parsed correctly. Change-Id: Ibf5187cedca72510fe74c6dc55a75a54a86c02ff
-
- Jan 09, 2019
-
-
Chong Zhang authored
bug: 111407413 Change-Id: Ica209ad9476b0597a206bf53823a1928643c8256
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Yabin Cui authored
runas_app domain is used by lldb/ndk-gdb/simpleperf to debug/profile debuggable apps. But it misses permissions to ptrace app processes and read /proc/<app_pid> directory. Bug: none Test: build and boot marlin. Test: run lldb and simpleperf on apps with target sdk version 24-29. Change-Id: I9e6f940ec81a8285eae8db3b77fb1251a25dedd0
-
David Anderson authored
-
Remi NGUYEN VAN authored
-
- Jan 08, 2019
-
-
Jeff Vander Stoep authored
Bug: 33308258 Test: atest CtsSelinuxTargetSdk25TestCases Change-Id: Ifeceecec7b2f38ebd38b6693712b8f65ee24dc5d
-
Chenbo Feng authored
Recent change in netd and bpfloader switched the creater of bpf maps from netd to bpfloader. Change the rules related to it to make sure it doesn't fail. Test: dumpsys netd trafficcontroller Bug: 112334572 Change-Id: I016ff68b58ef7b12bdfdebc2fd178be1d0206a62
-
Tri Vo authored
Bug: 119305624 Test: normal/recovery boot aosp_taimen Change-Id: I46da995886ce421bb87e741d577f659426ff79c4
-
Tri Vo authored
Bug: 119305624 Test: normal/recovery boot aosp_taimen Change-Id: I15aa275fa658b58f5a5d3e651d164f9fcd87c0af
-
Tri Vo authored
Bug: 119305624 Test: normal/recovery boot aosp_taimen Change-Id: Ia8d69be16011db8dd63fa41672449a4ade7302c2
-
Tri Vo authored
Bug: 119305624 Test: normal/recovery boot aosp_taimen Change-Id: Ib7a29a9f8f23dd917cc25c23c7612f9e4ae36ea0
-
Tri Vo authored
Bug: 119305624 Test: normal/recovery boot aosp_taimen Change-Id: I1009745686acd51563378dac56e857be0d60e794
-
Treehugger Robot authored
-
Narayan Kamath authored
For consistency with APKs, signature verification is performed in the system_server. This includes checking that the signature of an updated install matches the signature of the active package that it updates. For this, it requires search access to /data/apex and read access to the files under that directory. Test: m Change-Id: Ia073adb8892886e4767fa5529e95c110b9cbff1b
-
Dario Freni authored
-
Remi NGUYEN VAN authored
Test: flashed, booted, verified app running properly Bug: b/112869080 Change-Id: I10737736ca5da67ef08fca1055e0f702371aba58
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Jan 07, 2019
-
-
Dario Freni authored
Test: basic workflow between apexd and PackageManager tested with changes being developed. Bug: 118865310 Change-Id: I1ae866f33e9b22493585e108c4fd45400493c7ac
-
Joel Galenson authored
This prevents denials while taking a bugreport. Bug: 116711254 Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t android.security.cts.SELinuxHostTest#testNoBugreportDenials Change-Id: I64f441eb66c355d03eaf7755f2e9d3e970305ecd
-
Treehugger Robot authored
-
Tri Vo authored
-
Alex Buynytskyy authored
Used for e.g. abb. Test: Build, flash and boot, use `adb abb` to verify Change-Id: I4ad75498819edbcc0303f66420a58d06788ab5fb
-
Alan Stokes authored
This was originally implemented in commit 89041472 and reverted in commit fa3eb773. This effectively reverts the revert, with minimal changes to cope with the subsequent reversion of commit b3624743. Auditing is only enabled for apps targeting API <= 28. Test: Compiles, audit messages are seen. Bug: 121333210 Bug: 111338677 Change-Id: Ie38498a2b61f4b567902117f9ef293faa0e689dd
-
Tri Vo authored
Bug: 120080521 Test: removing a mapped type in the mapping file triggers new error message Change-Id: I04b21da7206777af8c281a843bd39ea5c4f0863a
-
- Jan 04, 2019
-
-
David Anderson authored
In order to boot into GSI, we need init's first-stage block-device machinery to find userdata. This will create its symlink before sepolicy is loaded, leading to denials in the second stage. Bug: 121209697 Test: device boots Change-Id: Ibf3398c811016e09747116cf17393e8d22541bb2
-
- Jan 03, 2019
-
-
Jiyong Park authored
e2bc9fe9d5ac82457bc6050bf705ff43a1b05cbf in platform/art project added the dynamic linker to the runtime APEX. Since the dynamic linker has been labeled as 'system_linker_exec' so does the linker in the APEX. Bug: 120266448 Test: ls -Z /apex/com.android.runtime/bin/linker u:object_r:system_linker_exec:s0 /apex/com.android.runtime/bin/linker Change-Id: I243b86a74d94058b3283830c32232c6584639ff3
-
- Jan 02, 2019
-
-
Joel Galenson authored
This prevents denials while taking a bugreport. Bug: 116711254 Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t android.security.cts.SELinuxHostTest#testNoBugreportDenials Change-Id: Ie190bfa62cf5aa172ebfff8bfd82dea2a7d1a016
-
- Dec 30, 2018
-
-
Justin Yun authored
Make /(product|system/product)/vendor_overlay/<ver> have the vendor file context. If vendor_overlay requires to mount on the vendor directories other than 'vendor_file', the contexts must be defined in the device specific sepolicy files. Bug: 119076200 Test: build and check if the files are overided and have the required sepolicy contexts. Change-Id: I69ed38d4ea8e7d89f56865b1ca1e26f290e9892d
-
- Dec 28, 2018
-
-
Zachary Iqbal authored
Notes: - Added face hal domain, context and file types for the default SELinux policy. - Please see aosp/q/topic:"Face+Authentication" Bug: 80155388 Test: Built successfully. Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
-
Dario Freni authored
This reverts commit 9eb3b8ff. Reason for revert: We are deciding for now not to make StagingManager a fully-fledged binder service, as it will only be accessed by PackageInstaller. We might re-evaluate this decision later if needed. Bug: 122072686 Change-Id: Ic2a53fc92ddd7d7eeccc6a4a0117f28724346ec7
-
- Dec 27, 2018
-
-
Dario Freni authored
Adding a new high-level service which will handle staged installs, i.e. installs that require a reboot. Bug: 118865310 Test: An initial implementation of StagingManager can be reached successfully by PackageManagerService and PackageInstallerService. Change-Id: I8859b463575f8ee85caae43570958347b82f967e
-
Michael Groover authored
Test: manually verified SensorPrivacyService is accessible Bug: 110842805 Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f (cherry picked from commit 0ac3dea7)
-
- Dec 22, 2018
-
-
Peiyong Lin authored
-