Skip to content
Snippets Groups Projects
  1. Apr 19, 2017
    • Jeff Hao's avatar
      Add dex2oat permissions to open and read the tmp apk. · 66191064
      Jeff Hao authored
      The PackageManager now passes previous code paths to dex2oat as shared
      libraries. dex2oat needs extra permissions in order to access and open
      the oat files of these libraries (if they were compiled).
      
      Part of a multi-project change.
      
      Bug: 34169257
      Test: cts-tradefed run singleCommand cts -d --module
      CtsAppSecurityHostTestCases -t android.appsecurity.cts.SplitTests
      
      Merged-In: I7b9cfd7f3c3509f3e41f0590ab650bd85faab340
      (cherry-picked from commit 1103f963)
      
      Change-Id: I6d69d463af7a0a93391dd4b7edd5b700012ba58c
      66191064
  2. Apr 17, 2017
    • Jerry Zhang's avatar
      Split mediaprovider as a separate domain from priv_app · 9f152d98
      Jerry Zhang authored
      MediaProvider requires permissions that diverge from those
      of a typical priv_app. This create a new domain and removes
      Mtp related permissions from priv_app.
      
      Bug: 33574909
      Test: Connect with MTP, download apps and files, select ringtones
      Test: DownloadProvider instrument tests, CtsProviderTestCases
      
      Change-Id: I950dc11f21048c34af639cb3ab81873d2a6730a9
      9f152d98
  3. Apr 14, 2017
    • Tianjie Xu's avatar
      Allow recovery to read thermal info on sailfish · b4e4565d
      Tianjie Xu authored
      Encountered more denials on sailfish:
      
      avc:  denied  { read } for  pid=439 comm="recovery" name="thermal"
      dev="sysfs" ino=28516 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=0
      
      avc:  denied  { read } for  pid=441 comm="recovery"
      name="thermal_zone9" dev="sysfs" ino=40364 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_thermal:s0 tclass=lnk_file permissive=0
      
      Bug: 36920500
      Test: sideload a package in sailfish
      Change-Id: Ib4e89ba48cdc383318e5f3b7b15f542434e43564
      b4e4565d
  4. Apr 13, 2017
    • Jeff Vander Stoep's avatar
      bluetooth: Remove domain_deprecated · ff1e0184
      Jeff Vander Stoep authored
      Remove domain_deprecated from bluetooth. This removes some unnecessarily
      permissive rules.
      
      Bug: 25433265
      Test: All of the permissions being removed were being audited. Verify
            that no audited (granted) avc messages for bluetooth exist in
            in the logs.
      
      Change-Id: Ifa12a0f1533edcb623bbb9631f88f1ff1d6d7085
      ff1e0184
    • Jerry Zhang's avatar
      Add configfs file permissions to init. · f3b5bd64
      Jerry Zhang authored
      These were previously in device specific sepolicies.
      They should be in core sepolicy to reflect their
      use by a core init file, init.usb.configfs.rc.
      
      Addresses denial:
      
      init    : type=1400 audit(0.0:135): avc: denied { unlink } for name="f1"
      dev="configfs" ino=10923 scontext=u:r:init:s0
      tcontext=u:object_r:configfs:s0 tclass=lnk_file permissive=0
      
      Test: denial addressed
      Change-Id: I869892f9d0c311b727462fb380f4160feb986215
      f3b5bd64
  5. Apr 11, 2017
    • Tom Cherry's avatar
      remove /dev/log · 8c60f74d
      Tom Cherry authored
      This was marked deprecated in 2014 and removed in 2015, let's remove
      the sepolicy now too.
      
      Test: see that logging still works on bullhead
      
      Change-Id: I4caa0dbf77956fcbc61a07897242b951c275b502
      8c60f74d
  6. Apr 06, 2017
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · a015186f
      Josh Gao authored
      Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log
      crashes to dmesg when logd isn't up yet (or is the one crashing).
      
      Bug: http://b/36574794
      Test: stop tombstoned; crasher; dmesg
      Change-Id: I249e11291c58fee77098dec3fd3271ea23363ac9
      a015186f
    • Tianjie Xu's avatar
      Allow recovery to read thermal info · 3da2f21f
      Tianjie Xu authored
      We want to track temperature metrics during an OTA update.
      
      denial message:
      denied  { search } for  pid=349 comm="recovery" name="thermal"
      dev="sysfs" ino=18029 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=0
      
      denied  { read } for  pid=326 comm="recovery" name="temp"
      dev="sysfs" ino=18479 scontext=u:r:recovery:s0
      tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
      
      Bug: 36920500
      Bug: 32518487
      Test: temperature logs on angler
      Change-Id: Ib70c1c7b4e05f91a6360ff134a11c80537d6015e
      3da2f21f
  7. Apr 04, 2017
    • Tianjie Xu's avatar
      Allow update_verifier to reboot the device · 1a60998a
      Tianjie Xu authored
      Currently update_verifier only verifies the blocks when dm-verity is in
      'enforcing' mode; and dm-verity will reboot the device upon detection of
      errors. However, sometimes the verity mode is not guaranteed to be
      correct. When mode is 'eio' for example, dm-verity will not trigger
      a reboot but rather fail the read. So update_verifier need to take the
      responsibility to reboot the device. Otherwise the device will continue
      to boot without setting the flag "isSlotMarkedSuccessful".
      
      Denial message:
      update_verifier: type=1400 audit(0.0:18): avc: denied { write } for
      name="property_service" dev="tmpfs" ino=14678 scontext=u:r:update_verifier:s0
      tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
      
      Bug: 36260064
      Test: powerctl property sets successfully
      Change-Id: I7431f87e2d61be1425397732aebb369d4ad4c26c
      1a60998a
    • Steven Moreland's avatar
      Remove hal_binderization_prop · d40474ec
      Steven Moreland authored
      Test: works on internal marlin
      Bug: 34274385
      Change-Id: Idd35e5cdccb595b4e5994eb1d78fdeece0aec0a6
      d40474ec
  8. Mar 30, 2017
    • Tom Cherry's avatar
      Grant vdc access to kmsg · bc4d3630
      Tom Cherry authored
      Init is no longer calling vdc with logwrapper, so it must take care of
      logging to kmsg directly.
      
      Change-Id: I529f5a95e19c08ef75e0da9a02bae1cb7187eec0
      avc: denied { write } for pid=367 comm="vdc" name="kmsg" dev="tmpfs" ino=11056 scontext=u:r:vdc:s0 tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0
      
      Test: observe vdc logging in kmsg on boot and stderr on normal usage
      
      Change-Id: Ie3678509d360f19b95cb03aeea75f29843728203
      bc4d3630
    • Myles Watson's avatar
      Disallow HAL access to Bluetooth data files · 02d9d21d
      Myles Watson authored
      Devices that store their BT MAC address in /data/misc/bluedroid/ need
      to find another place for that file.
      
      Bug: 36602160
      Test: Restart Bluetooth, check for selinux denials/files in /data/misc
      Change-Id: Ib8d610f201a8c35f95b464c24857c6639205bc66
      Merged-In: Ib8d610f201a8c35f95b464c24857c6639205bc66
      02d9d21d
  9. Mar 26, 2017
    • Jeff Sharkey's avatar
      Grant kernel access to new "virtual_disk" file. · 3f724c95
      Jeff Sharkey authored
      This is a special file that can be mounted as a loopback device to
      exercise adoptable storage code on devices that don't have valid
      physical media.  For example, they may only support storage media
      through a USB OTG port that is being used for an adb connection.
      
      avc: denied { read } for path="/data/misc/vold/virtual_disk" dev="sda35" ino=508695 scontext=u:r:kernel:s0 tcontext=u:object_r:vold_data_file:s0 tclass=file permissive=0
      
      Bug: 34903607
      Change-Id: I84721ec0e9495189a7d850461875df1839826212
      3f724c95
    • Jeff Sharkey's avatar
      Define policy for "loop-control" device. · a8e0f76c
      Jeff Sharkey authored
      Per loop(4), this device is the preferred way of allocating new
      loop devices since Linux 3.1.
      
      avc: denied { read write } for name="loop-control" dev="tmpfs" ino=15221 scontext=u:r:vold:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0
      
      Bug: 34903607
      Change-Id: I1f5f62cf0a1c24c6f6453100004812af4b8e1503
      a8e0f76c
  10. Mar 24, 2017
    • Alex Klyubin's avatar
      Mark all clients of Allocator HAL · 7cda44f4
      Alex Klyubin authored
      This change associates all domains which are clients of Allocator HAL
      with hal_allocator_client and the, required for all HAL client
      domains, halclientdomain.
      
      This enables this commit to remove the now unnecessary hwallocator_use
      macro because its binder_call(..., hal_allocator_server) is covered by
      binder_call(hal_allocator_client, hal_allocator_server) added in this
      commit.
      
      Unfortunately apps, except isolated app, are clients of Allocator HAL
      as well. This makes it hard to use the hal_client_domain(...,
      hal_allocator) macro because it translates into "typeattribute" which
      currently does not support being provided with a set of types, such as
      { appdomain -isolated_app }. As a workaround, hopefully until
      typeattribute is improved, this commit expresses the necessary
      association operation in CIL. private/technical_debt.cil introduced by
      this commit is appended into the platform policy CIL file, thus
      ensuring that the hack has effect on the final monolithic policy.
      
      P. S. This change also removes Allocator HAL access from isolated_app.
      Isolated app shouldn't have access to this HAL anyway.
      
      Test: Google Play Music plays back radios
      Test: Google Camera records video with sound and that video is then
            successfully played back with sound
      Test: YouTube app plays back clips with sound
      Test: YouTube in Chrome plays back clips with sound
      Bug: 34170079
      Change-Id: Id00bba6fde83e7cf04fb58bc1c353c2f66333f92
      7cda44f4
    • Alex Klyubin's avatar
      Vendor domains must not use Binder · f5446eb1
      Alex Klyubin authored
      On PRODUCT_FULL_TREBLE devices, non-vendor domains (except vendor
      apps) are not permitted to use Binder. This commit thus:
      * groups non-vendor domains using the new "coredomain" attribute,
      * adds neverallow rules restricting Binder use to coredomain and
        appdomain only, and
      * temporarily exempts the domains which are currently violating this
        rule from this restriction. These domains are grouped using the new
        "binder_in_vendor_violators" attribute. The attribute is needed
        because the types corresponding to violators are not exposed to the
        public policy where the neverallow rules are.
      
      Test: mmm system/sepolicy
      Test: Device boots, no new denials
      Test: In Chrome, navigate to ip6.me, play a YouTube video
      Test: YouTube: play a video
      Test: Netflix: play a movie
      Test: Google Camera: take a photo, take an HDR+ photo, record video with
            sound, record slow motion video with sound. Confirm videos play
            back fine and with sound.
      Bug: 35870313
      Change-Id: I0cd1a80b60bcbde358ce0f7a47b90f4435a45c95
      f5446eb1
  11. Mar 23, 2017
    • Steven Moreland's avatar
      Allow bugreport to dump some HAL processes. · f20b04ef
      Steven Moreland authored
      Whitelist several hals which can be dumped by bugreports. Don't want to
      dump more because of the time it takes and also certain hals have
      sensitive data which shouldn't be dumped (i.e. keymaster).
      
      Test: dumps work for given hals
      Bug: 36414311
      Change-Id: Ic0eddfa95fa33abbc983d3b5161e42c240663f22
      f20b04ef
    • Alex Deymo's avatar
      Allow update_engine to kill postinstall process. · b74017d3
      Alex Deymo authored
      This fixes the following denial in O:
      
       update_engine: type=1400 audit(0.0:2100): avc: denied { sigkill } for scontext=u:r:update_engine:s0 tcontext=u:r:postinstall:s0 tclass=process permissive=0
      
      Bug: 35111618
      Test: update_engine_client --cancel during postinstall
      Change-Id: I7456a95b5ca6fbdb268a5e16a13e2409758141f5
      b74017d3
    • Steven Moreland's avatar
      Allow hals to read hwservicemanager prop. · d3ce5dc3
      Steven Moreland authored
      Test: no relevant denials on marlin while booting
      Test: no relevant denials on angler while booting
      Bug: 36278706
      Change-Id: Ieba79e1c8fca4f74c63bc63e6dd0bdcf59204ca2
      d3ce5dc3
    • Nathan Harold's avatar
      Update Common NetD SEPolicy to allow Netlink XFRM · 7eb3dd3b
      Nathan Harold authored
      In order to perform XFRM operations NetD needs the
      ability to both read and write Netlink XFRM messages.
      
      Bug: 34811756
      Test: 34812052
      
      Change-Id: I26831c58b24a4c1f344b113f0b5cf47ed2c93fee
      7eb3dd3b
    • Nathan Harold's avatar
      Add IpSecService SEPolicy · 641b1a7a
      Nathan Harold authored
      Add a new type and context for IpSec to system SEPolicy
      
      Bug: 35923241
      Test: service starts + talks to NetD
      Change-Id: I69356c8525b426d344fcc4858fc499ab12405b20
      641b1a7a
    • Martijn Coenen's avatar
      Initial sepolicy for vndservicemanager. · e7d8f4c3
      Martijn Coenen authored
      vndservicemanager is the context manager for binder services
      that are solely registered and accessed from vendor processes.
      
      Bug: 36052864
      Test: vendorservicemanager runs
      Merged-In: Ifbf536932678d0ff13d019635fe6347e185ef387
      Change-Id: I430f1762eb83825f6cd4be939a69d46a8ddc80ff
      e7d8f4c3
  12. Mar 22, 2017
    • Alex Klyubin's avatar
      Remove unnecessary rules from NFC HAL clients · e5395706
      Alex Klyubin authored
      Rules in clients of NFC HAL due to the HAL running (or previously
      running) in passthrough mode are now targeting hal_nfc. Domains which
      are clients of NFC HAL are associated with hal_nfc only the the HAL
      runs in passthrough mode. NFC HAL server domains are always associated
      with hal_nfc and thus get these rules unconditionally.
      
      This commit also moves the policy of nfc domain to private. The only
      thing remaining in the public policy is the existence of this domain.
      This is needed because there are references to this domain in public
      and vendor policy.
      
      Test: Open a URL in Chrome, NFC-tap Android to another Android and
            observe that the same URL is opened in a web browser on the
            destination device. Do the same reversing the roles of the two
            Androids.
      Test: Install an NFC reader app, tap a passive NFC tag with the
            Android and observe that the app is displaying information about
            the tag.
      Test: No SELinux denials to do with NFC before and during and after
            the above tests on sailfish, bullhead, and angler.
      Bug: 34170079
      
      Change-Id: I29fe43f63d64b286c28eb19a3a9fe4f630612226
      e5395706
    • Jeff Vander Stoep's avatar
      Grant additional permissions for ASAN builds · 74434848
      Jeff Vander Stoep authored
      ASAN builds may require additional permissions to launch processes
      with ASAN wrappers. In this case, system_server needs permission to
      execute /system/bin/sh.
      
      Create with_asan() macro which can be used exclusively on debug
      builds. Note this means that ASAN builds with these additional
      permission will not pass the security portion of CTS - like any
      other debug build.
      
      Addresses:
      avc: denied { execute } for name="sh" dev="dm-0" ino=571
      scontext=u:r:system_server:s0 tcontext=u:object_r:shell_exec:s0
      tclass=file
      
      Test: lunch aosp_marlin-userdebug;
            cd system/sepolicy; mm SANITIZE_TARGET=address;
            Verify permissions granted using with_asan() are granted.
      Test: lunch aosp_marlin-userdebug;
            cd system/sepolicy; mm;
            Verify permissions granted using with_asan() are not granted.
      Test: lunch aosp_marlin-user;
            cd system/sepolicy; mm SANITIZE_TARGET=address;
            Verify permissions granted using with_asan() are not granted.
      Bug: 36138508
      Change-Id: I6e39ada4bacd71687a593023f16b45bc16cd7ef8
      74434848
    • Sandeep Patil's avatar
      dumpstate: allow HALs to read /proc/interrupts · a866a416
      Sandeep Patil authored
      
      /proc/interrupts may be dumped by dumpstate HAL if required.
      
      Bug: 36486169
      Test: 'adb shell bugreport' on sailfish
      
      Change-Id: Ifc41a516aeea846bc56b86b064bda555b43c58ed
      Signed-off-by: default avatarSandeep Patil <sspatil@google.com>
      a866a416
    • Roshan Pius's avatar
      wpa_supplicant: Remove unnecessary permissions from system_server · f27e8f09
      Roshan Pius authored
      Now that the android wifi framework has fully switched over to HIDL,
      remove the sepolicy permissions for accessing wpa_supplicant using
      socket control interface.
      
      While there, also removed the redundant |hwbinder_use|.
      
      Bug: 35707797
      Test: Device boots up and able to connect to wifi networks.
      Test: Wifi integration tests passed.
      Change-Id: I55e24b852558d1a905b189116879179d62bdc76c
      f27e8f09
    • Steven Moreland's avatar
      hwservicemanager: halserverdomain · e91cbcba
      Steven Moreland authored
      Test: no neverallows triggered
      Bug: 36494354
      Change-Id: I52e21a9be5400027d4e96a8befdd4faaffb06a93
      e91cbcba
  13. Mar 21, 2017
    • Josh Gao's avatar
      Mark system_ndebug_socket as mlstrustedobject. · 3d3d370b
      Josh Gao authored
      Address the following denial:
      
          audit(0.0:644): avc: denied { write } for name="ndebugsocket" dev="dm-2" ino=654091 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:system_ndebug_socket:s0 tclass=sock_file permissive=0
      
      Bug: http://b/36278094
      Test: mm
      Change-Id: I0df115a3682385cee72adbfc4687221cd7c51a4d
      3d3d370b
    • Alex Klyubin's avatar
      Remove unnecessary binder_call from cameraserver · 57ab0015
      Alex Klyubin authored
      This is a follow-up to 93391686
      which added both
      hal_client_domain(cameraserver, hal_graphics_allocator) and
      binder_call(cameraserver, hal_graphics_allocator). The latter
      binder_call rule is no longer needed because it is automatically
      granted by virtue of cameraserver being marked as a client of
      Graphics Allocator HAL --
      see 49274721.
      
      Test: Take a photo (both HDR and conventional) using Google Camera
      Test: Record video using Google Camera
      Test: Record slow motion video using Google Camera
      Test: No denials to do with cameraserver and hal_graphics_allocator*
      Bug: 34170079
      Change-Id: If93fe310fa62923b5107a7e78d158f6e4b4d0b3a
      57ab0015
    • Jeff Vander Stoep's avatar
      Enforce one HAL per domain. · 84b96a6b
      Jeff Vander Stoep authored
      HALs are intended to be limited responsibility and thus limited
      permission. In order to enforce this, place limitations on:
      1. What processes may transition into a HAL - currently only init
      2. What methods may be used to transition into a HAL - no using
         seclabel
      3. When HALs exec - only allow exec with a domain transition.
      
      Bug: 36376258
      Test: Build aosp_marlin, aosp_bullhead, aosp_dragon. Neverallow rules
            are compile time assertions, so building is a sufficient test.
      
      Change-Id: If4df19ced730324cf1079f7a86ceba7c71374131
      84b96a6b
    • Alex Klyubin's avatar
      Remove unused hal_impl_domain macro · cb839c64
      Alex Klyubin authored
      All previous users of this macro have been switched to
      hal_server_domain macro.
      
      Test: no hal_impl_domain in system/sepolicy/ and device/**/sepolicy
      Test: mmm system/sepolicy
      Bug: 34170079
      Change-Id: I4a71b3fd5046c0d215b056f1cae25fe6bda0fb45
      cb839c64
  14. Mar 20, 2017
    • Yin-Chia Yeh's avatar
      Camera: allow cameraserver access hal_graphics_allocator · 93391686
      Yin-Chia Yeh authored
      Test: Google camera app snapshot/record/
            slow motion recording
      Bug: 36383997
      Change-Id: I565fb441aec529464474e0dd0e01dbfe0b167c82
      93391686
    • Alex Klyubin's avatar
      Switch Allocator HAL policy to _client/_server · 08d6f566
      Alex Klyubin authored
      This switches Allocator HAL policy to the design which enables us to
      identify all SELinux domains which host HALs and all domains which are
      clients of HALs.
      
      Allocator HAL is special in the sense that it's assumed to be always
      binderized. As a result, rules in Camera HAL target hal_allocator_server
      rather than hal_allocator (which would be the server and any client, if
      the Allocator HAL runs in passthrough mode).
      
      Test: Device boots up, no new denials
      Test: YouTube video plays back
      Test: Take photo using Google Camera app, recover a video, record a slow
            motion video
      Bug: 34170079
      Change-Id: Ifbbca554ec221712361ee6cda94c82f254d84936
      08d6f566
    • Alex Klyubin's avatar
      Move Graphics Allocator HAL IPC rules to proper location · 49274721
      Alex Klyubin authored
      Every client of Graphics Allocator HAL needs permission to (Hw)Binder
      IPC into the HAL.
      
      Test: Device boots, no denials to do with hal_graphics_allocator
            (also, removing the binder_call(hal_graphics_allocator_client,
            hal_graphics_allocator_server) leads to denials)
      Test: GUI works, YouTube works
      Bug: 34170079
      
      Change-Id: I5c64d966862a125994dab903c2eda5815e336a94
      49274721
    • Alex Klyubin's avatar
      Recovery can use HALs only in passthrough mode · 00a03d42
      Alex Klyubin authored
      This adjusts the grants for recovery to make it explicit that recovery
      can use the Boot Control HAL only in passthrough mode.
      
      Test: Device boots up, no new denials
      Test: Reboot into recovery, sideload OTA update succeeds
      Test: Apply OTA update via update_engine:
            1. make dist
            2. Ensure device has network connectivity
            3. ota_call.py -s <serial here> out/dist/sailfish-ota-*.zip
      Bug: 34170079
      
      Change-Id: I0888816eca4d77939a55a7816e6cae9176713ee5
      00a03d42
    • Janis Danisevskis's avatar
      Fix sepolicy for Gatekeeper HAL · 12e960e6
      Janis Danisevskis authored
      This patch fixes Gatekeeper HAL rules.
      
      Bug: 34260418
      Test: Device boots with gatekeeper_hal using hwbinder and
            gatekeeperd does not fall back to software.
      Change-Id: I6aaacb08faaa7a90506ab569425dc525334c8171
      12e960e6
  15. Mar 18, 2017
    • Alex Klyubin's avatar
      Switch Boot Control HAL policy to _client/_server · 09d13e73
      Alex Klyubin authored
      This switches Boot Control HAL policy to the design which enables us
      to conditionally remove unnecessary rules from domains which are
      clients of Boot Control HAL.
      
      Domains which are clients of Boot Control HAL, such as update_server,
      are granted rules targeting hal_bootctl only when the Boot Control HAL
      runs in passthrough mode (i.e., inside the client's process). When the
      HAL runs in binderized mode (i.e., in another process/domain, with
      clients talking to the HAL over HwBinder IPC), rules targeting
      hal_bootctl are not granted to client domains.
      
      Domains which offer a binderized implementation of Boot Control HAL,
      such as hal_bootctl_default domain, are always granted rules targeting
      hal_bootctl.
      
      P. S. This commit removes direct access to Boot Control HAL from
      system_server because system_server is not a client of this HAL. This
      commit also removes bootctrl_block_device type which is no longer
      used. Finally, boot_control_hal attribute is removed because it is now
      covered by the hal_bootctl attribute.
      
      Test: Device boots up, no new denials
      Test: Reboot into recovery, sideload OTA update succeeds
      Test: Apply OTA update via update_engine:
            1. make dist
            2. Ensure device has network connectivity
            3. ota_call.py -s <serial here> out/dist/sailfish-ota-*.zip
      Bug: 34170079
      Change-Id: I9c410c092069e431a3852b66c04c4d2a9f1a25cf
      09d13e73
  16. Mar 17, 2017
    • Jorge Lucangeli Obes's avatar
      ppp: Allow specific ioctls on mtp:socket. · fd21dc0e
      Jorge Lucangeli Obes authored
      The fix for b/35100237 surfaced this error. This SELinux policy
      fragment was included only on Marlin, but needs to be included in core
      policy.
      
      Bug: 35100237
      Test: With https://android-review.googlesource.com/#/c/354292/
      Test: Set up PPTP VPN using http://www.vpnbook.com/ on Marlin.
      Test: Connect:
      03-17 15:41:22.602  3809  3809 I mtpd    : Starting pppd (pppox = 9)
      03-17 15:41:22.628  3811  3811 I pppd    : Using PPPoX (socket = 9)
      03-17 15:41:22.637  3811  3811 I pppd    : pppd 2.4.7 started by vpn, uid 1016
      03-17 15:41:22.639  3811  3811 I pppd    : Using interface ppp0
      03-17 15:41:22.639  3811  3811 I pppd    : Connect: ppp0 <-->
      03-17 15:41:22.770  3811  3811 I pppd    : CHAP authentication succeeded
      03-17 15:41:22.909  3811  3811 I pppd    : MPPE 128-bit stateless compression enabled
      03-17 15:41:23.065  3811  3811 I pppd    : local  IP address 172.16.36.113
      03-17 15:41:23.065  3811  3811 I pppd    : remote IP address 172.16.36.1
      03-17 15:41:23.065  3811  3811 I pppd    : primary   DNS address 8.8.8.8
      03-17 15:41:23.065  3811  3811 I pppd    : secondary DNS address 91.239.100.100
      
      Change-Id: I192b4dfc9613d1000f804b9c4ca2727d502a1927
      fd21dc0e
    • Andreas Gampe's avatar
      Sepolicy: Allow postinstall to read links · 3cc71b09
      Andreas Gampe authored
      Certain libraries may actually be links. Allow OTA dexopt to read
      those links.
      
      Bug: 25612095
      Test: m
      Change-Id: Iafdb899a750bd8d1ab56e5f6dbc09d836d5440ed
      3cc71b09
    • Andreas Gampe's avatar
      Sepolicy: Allow getattr for otapreopt_slot · f7c2613e
      Andreas Gampe authored
      Allow getattr on links for otapreopt_slot. It reads links (to the
      boot image oat files) when collecting the size of the artifacts
      for logging purposes.
      
      Bug: 30832951
      Test: m
      Change-Id: If97f7a77fc9bf334a4ce8a613c212ec2cfc4c581
      f7c2613e
Loading