Skip to content
Snippets Groups Projects
  1. May 15, 2018
  2. May 14, 2018
    • Treehugger Robot's avatar
      bdac534c
    • Jerry Zhang's avatar
      Allow mediaprovider to search /mnt/media_rw · ddb89ab7
      Jerry Zhang authored
      Mtp needs access to this path in order to
      change files on an sdcard.
      
      Fixes denial:
      
      05-14 17:40:58.803  3004  3004 W MtpServer: type=1400 audit(0.0:46):
      avc: denied { search } for name="media_rw" dev="tmpfs" ino=10113
      scontext=u:r:mediaprovider:s0:c512,c768
      tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0
      b/77925342 app=com.android.providers.media
      
      Bug: 77849654
      Test: no denials using mtp with emulated sdcard
      Change-Id: I27b5294fa211bb1eff6d011638b5fdc90334bc80
      ddb89ab7
  3. May 10, 2018
    • Andreas Gampe's avatar
      Sepolicy: Fix perfprofd permissions · 835881aa
      Andreas Gampe authored
      Let statsd find the service. The system server wants to read file
      attributes for the perfprofd dropbox file.
      
      Bug: 73175642
      Test: m
      Test: manual
      Change-Id: I0c0b1dac057af90fff440286226093ec15b5e247
      835881aa
    • Mark Salyzyn's avatar
      llkd: add live-lock daemon · e4b3e0b6
      Mark Salyzyn authored
      Introduce a standalone live-lock daemon (llkd), to catch kernel
      or native user space deadlocks and take mitigating actions.
      
      Test: llkd_unit_test
      Bug: 33808187
      Bug: 72838192
      Change-Id: If869ecd06e5ce7b04bba1dafd0a77971b71aa517
      e4b3e0b6
    • Paul Crowley's avatar
      Merge "Add wait_for_keymaster" · 11bfc05c
      Paul Crowley authored
      11bfc05c
  4. May 09, 2018
    • Calin Juravle's avatar
      Allow system server to write profile snapshots in /data/misc/profman · 6ff0f490
      Calin Juravle authored
      The goal is to allow creating profile snapshots from the shell command in
      order to be able to write CTS tests.
      
      The system server will dump profiles for debuggable in /data/misc/profman
      from where they will be pulled and verified by CTS tests.
      
      Test: adb shell cmd package snapshot-profile com.android.vending
      Bug: 74081010
      
      (cherry picked from commit 687d5e46)
      
      Merged-In: I54690305284b92c0e759538303cb98c93ce92dd5
      Change-Id: I54690305284b92c0e759538303cb98c93ce92dd5
      6ff0f490
    • Paul Crowley's avatar
      Add wait_for_keymaster · 9f760306
      Paul Crowley authored
      Bug: 79228237
      Test: audit2allow finds no relevant denials on boot
      Merged-In: Ia80b77ba9a1ec2354127cd0ef68d50ebcf593fb0
      Change-Id: Ia80b77ba9a1ec2354127cd0ef68d50ebcf593fb0
      9f760306
    • Mark Salyzyn's avatar
      Merge "init: support /dev/input" · 2a3f55b5
      Mark Salyzyn authored
      2a3f55b5
    • Dan Willemsen's avatar
    • Tri Vo's avatar
      Merge changes from topic "selinux_soong" · 41d35c6f
      Tri Vo authored
      * changes:
        Soong module for selinux files including board-specific directories.
        Soong module selinux compat maps
      41d35c6f
    • Dan Willemsen's avatar
      Remove unused `tags` property from Android.bp files · 76b7f7b3
      Dan Willemsen authored
      The tags property is (and has always been) unused by Soong. The property has
      been defined as a list of strings, and the `androidmk` converted any
      LOCAL_MODULE_TAGS entries over to it, but we've never done anything with it.
      
      In preparation for removing the definition from Soong, I'm removing it from all
      Android.bp files in the tree.
      
      Since this has never done anything, this is a no-op, but if you really did want
      the Android.mk behavior, the proper way to define a module to be installed in
      userdebug / eng builds is to use PRODUCT_PACKAGES_DEBUG or PRODUCT_PACKAGES_ENG
      in the appropriate product makefile.
      
      Change-Id: Ia9a9b1c35533e02047cbb183b317ab93f1eeec6b
      Exempt-From-Owner-Approval: global no-op build change
      Test: remove `tags` from Soong, see errors go away.
      76b7f7b3
    • Dongwon Kang's avatar
  5. May 08, 2018
  6. May 07, 2018
  7. May 04, 2018
    • Pavel Maltsev's avatar
      Move automotive HALs sepolicy to system/ · 43e172af
      Pavel Maltsev authored
      Bug: 70637118
      Test: build, flash and boot automotive builds
      
      Change-Id: I6db23258de30174d6db09d241e91b08aa5afedef
      Merged-In: I6db23258de30174d6db09d241e91b08aa5afedef
      (cherry picked from commit 394dbe34)
      43e172af
    • Pawin Vongmasa's avatar
      Put in sepolicies for Codec2.0 services · 19a74ec8
      Pawin Vongmasa authored
      Test: Builds
      
      Bug: 64121714
      Bug: 31973802
      Change-Id: Id37be8726a8bb297e35bca494964fdbcc48c6a73
      (cherry picked from commit 4be28894)
      19a74ec8
    • Jeff Vander Stoep's avatar
      Start the process of locking down proc/net · 7a4af30b
      Jeff Vander Stoep authored
      Files in /proc/net leak information. This change is the first step in
      determining which files apps may use, whitelisting benign access, and
      otherwise removing access while providing safe alternative APIs.
      
      To that end, this change:
      * Introduces the proc_net_type attribute which will assigned to any
      new SELinux types in /proc/net to avoid removing access to privileged
      processes. These processes may be evaluated later, but are lower
      priority than apps.
      * Labels /proc/net/{tcp,tcp6,udp,udp6} as proc_net_vpn due to existing
      use by VPN apps. This may be replaced by an alternative API.
      * Audits all other proc/net access for apps.
      * Audits proc/net access for other processes which are currently
      granted broad read access to /proc/net but should not be including
      storaged, zygote, clatd, logd, preopt2cachename and vold.
      
      Bug: 9496886
      Bug: 68016944
      Test: Boot Taimen-userdebug. On both wifi and cellular: stream youtube
          navigate maps, send text message, make voice call, make video call.
          Verify no avc "granted" messages in the logs.
      Test: A few VPN apps including "VPN Monster", "Turbo VPN", and
      "Freighter". Verify no logspam with the current setup.
      Test: atest CtsNativeNetTestCases
      Test: atest netd_integration_test
      Test: atest QtaguidPermissionTest
      Test: atest FileSystemPermissionTest
      
      Change-Id: I7e49f796a25cf68bc698c6c9206e24af3ae11457
      Merged-In: I7e49f796a25cf68bc698c6c9206e24af3ae11457
      (cherry picked from commit 08731895)
      7a4af30b
    • Roshan Pius's avatar
      sepolicy(hostapd): Add a HIDL interface for hostapd · d7b34a48
      Roshan Pius authored
      * Note on cherry-pick: Some of the dependent changes are not in AOSP.
      In order to keep hostapd running correctly in AOSP, I've modified this
      change to only include policy additions.
      
      Change sepolicy permissions to now classify hostapd as a HAL exposing
      HIDL interface.
      
      Sepolicy denial for accessing /data/vendor/misc/wifi/hostapd:
      12-27 23:40:55.913  4952  4952 W hostapd : type=1400 audit(0.0:19): avc:
      denied { write } for name="hostapd" dev="sda13" ino=4587601
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0
      
      01-02 19:07:16.938  5791  5791 W hostapd : type=1400 audit(0.0:31): avc:
      denied { search } for name="net" dev="sysfs" ino=30521
      scontext=u:r:hal_wifi_hostapd_default:s0
      tcontext=u:object_r:sysfs_net:s0 tclass=dir permissive=0
      
      Bug: 36646171
      Test: Device boots up and able to turn on SoftAp.
      Change-Id: Ibacfcc938deab40096b54b8d0e608d53ca91b947
      Merged-In: Ibacfcc938deab40096b54b8d0e608d53ca91b947
      (cherry picked from commit 5bca3e86)
      d7b34a48
    • android-build-prod (mdb)'s avatar
    • android-build-prod (mdb)'s avatar
      5d34bbcb
    • Jeffrey Vander Stoep's avatar
      54f61fe5
    • Dan Cashman's avatar
      Remove dcashman@google.com from OWNERS. · 9e4aa226
      Dan Cashman authored
      Buh-bye!
      Test: none
      
      Change-Id: Ib1917adf03f9e777c7fc4bcb749c34c051176860
      9e4aa226
    • Calin Juravle's avatar
    • Mark Salyzyn's avatar
      FrameworksServicesTests: allow access to test.sys.boot.reason property · 3443cafa
      Mark Salyzyn authored
      com.android.server.power.PowerManagerServiceTest#testGetLastShutdownReasonInternal due to "RuntimeException: failed to set system property"
      
      W/roidJUnitRunner: type=1400 audit(0.0:6): avc: denied { write } for name="property_service" dev="tmpfs" ino=13178 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
      W/libc    : Unable to set property "test.sys.boot.reason" to "shutdown,thermal": connection failed; errno=13 (Permission denied)
      
      Had to use precise property definition as com.android.phone accesses
      test properties as well.
      
      Test: compile
      Bug: 78245377
      Change-Id: I2cc810846f8615f2a2fae8e0d4f41de585b7abd7
      3443cafa
    • Jeffrey Vander Stoep's avatar
    • Jeff Vander Stoep's avatar
      Never expand proc_type attribute · a6295412
      Jeff Vander Stoep authored
      It's used in build-time tests and in CTS.
      
      Bug: 78898770
      Test: build user-build
      Change-Id: I254bf4d7ed0c0cb029b55110ceec982b84e4a91b
      Merged-In: I254bf4d7ed0c0cb029b55110ceec982b84e4a91b
      a6295412
    • Jeffrey Vander Stoep's avatar
      9c6749d7
    • Calin Juravle's avatar
      Allow system server to record its own profile · 71d8467b
      Calin Juravle authored
      On userdebug builds we can now profile system server without disabling
      selinux. This is the final piece, and allows the system server to save its
      own profile.
      
      Test: manual, on a device with system server profiling enabled
      Bug: 73313191
      Change-Id: Iaf9575d3cda19ae4c38f1e20a8e1b9288b7abc83
      71d8467b
  8. May 03, 2018
Loading