- Nov 13, 2018
-
-
Joel Galenson authored
This prevents denials while taking a bugreport. Bug: 116711254 Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t android.security.cts.SELinuxHostTest#testNoBugreportDenials Change-Id: I65dffda9806e0d627978ffdd392e3deb625149b7
-
- Nov 12, 2018
-
-
Tri Vo authored
mtd_device does not label any /dev node present on walleye, and the only permission to that type is: allow hal_telephony_server mtd_device:dir search; I suspect there is no need to keep mtd_device around. Bug: 110962171 Test: boot aosp_walleye Change-Id: If74b1258b21edeca38c8b7dc07a3a10b751a7e85
-
Treehugger Robot authored
-
Eugene Susla authored
Test: ensure no build failures; add RoleManagerService as a boot phase ensure no SecurityException in logcat on boot Change-Id: Ia0803c0fb084fe2b12f5c20f5e46354d0dd1aedf
-
- Nov 10, 2018
-
-
Nick Kralevich authored
system/sepolicy commit 619c1ef2 started enforcing ioctl whitelisting requirements for /dev/tun. Bluetooth needs the ability to issue TUNSETIFF on /dev/tun, so allow access. We also allow access to TUNGETIFF for good measure. Addresses the following denial: avc: denied { ioctl } for comm=425420536572766963652043616C6C path="/dev/tun" dev="tmpfs" ino=20047 ioctlcmd=0x54ca scontext=u:r:bluetooth:s0 tcontext=u:object_r:tun_device:s0 tclass=chr_file permissive=0 Test: policy compiles Change-Id: Ie4c138fc774373cec266c59de6663db147d60423
-
- Nov 09, 2018
-
-
Tri Vo authored
No coredomain domain has access to these types and corresponding /dev nodes don't exist on the device: audio_seq_device audio_timer_device full_device i2c_device vcs_device Bug: 110962171 Test: m selinux_policy Test: boot walleye Change-Id: I89ad4755e6760aa166cb22e2655567e5905dc672
-
Tri Vo authored
-
Hongyi Zhang authored
Test: m -j succeeded and manual tested on device Change-Id: I3415c58335361a9da4ef2368e61bc4e0250a91bb
-
Mårten Kongstad authored
These rules mirror those for /vendor/overlay and /odm/overlay, including the possilibity of a symlink like /system/vendor -> /vendor. Test: builds, boots Change-Id: I323e48fcc13c4ac7779902506539c2600708cc88
-
- Nov 08, 2018
-
-
Peiyong Lin authored
Historically GPU service lives in SurfaceFlinger as a convenient hack. Howerver, SurfaceFlinger doesn't need to know about anything specific about GPU capability, and shouldn't know about anything about GPU. This patch moves GPU service out of SurfaceFlinger. GPU service is a service that accesses to GPU driver, queries GPU capabilities and reports back. Currently we use this information in CTS and some benchmarks. BUG: 118347356 Test: Build, flash and boot, use `adb shell cmd gpu vkjson` to verify Change-Id: I007989e0f3f73b5caf80277979986820dd127c32
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Yabin Cui authored
* changes: Add runas_app domain to allow running app data file via run-as. Revert "Revert "Enforce execve() restrictions for API > 28""
-
Treehugger Robot authored
-
Florian Mayer authored
This allows to use adb pull on Perfetto traces on user. Bug: 118747482 Change-Id: Ie4deed90597b412ccb0e9e6512ffed2acead82d8
-
Martijn Coenen authored
* changes: Allow apexd to configure /sys/block/dm- Allow the kernel to access apexd file descriptors.
-
Martijn Coenen authored
To configure readahead for APEX dm-verity devices. Bug: 117823094 Test: apexd can change readahead Change-Id: Ie0396d59ef758ad55f499f65957697d26a48aae9
-
Martijn Coenen authored
In earlier kernel versions (<4.0), the loopback driver issues requests from a kernel thread. Therefore, the kernel needs access to APEX file descriptors and data files (which are loopback mounted). Bug: 119220815 Test: mounting works on sailfish Change-Id: I75b2bade41c64cf6fa6040d9c2f5489a206e04c6
-
Jiyong Park authored
apexd_prop is also defined in private/propery_contexts in order to make the type to exist even when PRODUCT_COMPATIBLE_PROPERTY is false (i.e., Pixel 1). Bug: 119220815 Test: m plat_property_contexts for sailfish the built plat_property_contexts has apexd_prop defined Change-Id: I9ef71410533c1f64fc6a3112cfcb199d23aaf3db
-
Mustafa Yigit Bilgen authored
Pass LOCAL_ADDITIONAL_M4DEFS to m4 when building vendor_file_contexts and odm_file_contexts. The build command attempts to use PRIVATE_ADDITIONAL_M4DEFS - but this is not set in the target-specific variables. This allows using custom M4 macros when building non-platform file_contexts. Change-Id: I5fa8d9ec91f1a97bee1dd735ba85af93eef91252
-
- Nov 07, 2018
-
-
Kevin Chyn authored
See aosp/660242 and aosp/608396 Fixes: 116530289 Test: builds Change-Id: I220ece0d6751839fe764ff91fd7bd20c50104f8f
-
Fan Xu authored
Test: build passed. Bug: 118614333 Change-Id: I3b33d73a2cc7e78119de8b0913b4e2d0ac4a3235
-
Fan Xu authored
-
Yabin Cui authored
Calling execve() on files in an app's home directory isn't allowed for targetApi >=29. But this is needed by simpleperf to profile a debuggable app via run-as. So workaround it by adding runas_app domain, which allows running app data file. And add a rule in seapp_contexts to use runas_app domain for setcontext requests from run-as. Bug: 118737210 Test: boot marlin and run CtsSimpleperfTestCases. Change-Id: I5c3b54c95337d6d8192861757b858708174ebfd5
-
- Nov 06, 2018
-
-
Tri Vo authored
-
Tri Vo authored
These /dev nodes are device-specific and should be labeled from device policy. Moreover, pixels don't have these /dev nodes. Bug: 110962171 Test: boot pixel 3 Change-Id: I37ca9a956130eb4763c75f5e8a0decbd4f7b97a7
-
Fan Xu authored
As b/116344577 is fixed, we no longer need the compatbility mapping any more. Test: build passed. Boot succeeded. Change-Id: I0d7f02c59853d34bdabaad6841d87e9ca1ee25d7
-
Felipe Leme authored
-
Tri Vo authored
-
Luke Huang authored
Test: built, flashed, booted Clatd works well Bug: 119006129 Change-Id: Ie3b2a7b44040755787787ff2b8e6199cac7aec8e
-
- Nov 05, 2018
-
-
Tri Vo authored
Bug: 111243627 Test: m selinux_policy Change-Id: I37d03906b93c8810f1d33af736f19fd6ab241c35
-
Felipe Leme authored
Bug: 111276913 Test: manual verification Change-Id: Icb309bb07e4e4b39cdc912b1d3dc1ece9cb55f5f
-
Kenny Root authored
Mark the ADB service as a system_api_service so that SystemUI can tell it that the device is accepted. Refactoring split the AdbService out of the UsbService. UsbService is marked as an app_api_service which SystemUI is allowed to connect to; AdbService must be marked similarly as either system_api_service or app_api_service. However, only system apps should talk to AdbService currently. SELinux : avc: denied { find } for service=adb pid=1737 uid=10041 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:adb_service:s0 tclass=service_manager permissive=0 Introduced in Change-Id Ibf23964665a115a5bc835820dcff98aaf7ba610f Test: Flash userdebug, accept ADB key, and replug USB Bug: 118999282 Change-Id: I47b5090908ed84d0ba7a9fca100b299011bf8796
-
- Nov 02, 2018
-
-
Nick Kralevich authored
Allow sgdisk to force the kernel to re-read the partition table. Addresses the following denial: avc: denied { ioctl } for path=/dev/block/vold/disk:7,0 dev=tmpfs ino=710640 ioctlcmd=125f scontext=u:r:sgdisk:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file permissive=0 Bug: 118890056 Test: policy compiles Test: 1) adb shell sm set-force-adoptable on 2) adb shell sm set-virtual-disk true 3) On device, pick the drop-down notification and choose "use as phone/internal storage" to adopt the virtual SD card. Change-Id: I6825cf526cc48aa2a17afab14eadb6134bfc56f9
-
Treehugger Robot authored
-
Nick Kralevich authored
-
Jiyong Park authored
A sysprop apexd.status is set by apexd, to that other components (i.e. init) can determine whether APEXs are all successfully mounted or no (i.e., being mounted). The sysprop is only writable by apexd. Bug: 117403679 Test: adb shell getprop apexd.status returns 'ready'. Change-Id: I81bcb96e6c5cb9d899f29ffa84f91eab3820be25
-
Nick Kralevich authored
Update access_vectors to support newer kernel functionality. This change does not grant any new access. Inspired by the following refpolicy commits: * https://github.com/SELinuxProject/refpolicy/commit/25a5b2427447eb14edb07ce302217d37528813bc * https://github.com/SELinuxProject/refpolicy/commit/109ab3296bce27281c453617d3629a238f5e4dbf * https://github.com/SELinuxProject/refpolicy/commit/437e48ac53307e1e2e13e49d349c0a09b12eb187 Bug: 118843234 Test: policy compiles Change-Id: I7c5a8dcf288dc2321adcf368bd0c0573c5257202
-
- Nov 01, 2018
-
-
Treehugger Robot authored
-