Skip to content
Snippets Groups Projects
  1. Apr 26, 2018
    • Steven Moreland's avatar
      Enforce parent hal attribute hierarchy. · 8a52c984
      Steven Moreland authored
      In order to support passthrough + binderized implementations
      with a simple switch, there is a hierarchy of attributes for
      different hal servers.
      
                 /------- hal_X --------\
                 |               **     |
                 v                      v
            hal_X_client           hal_X_server
                 |                      |
                 |                      |
                 v                      v
          halclientdomain        halserverdomain
      
      ** - hal_X -> hal_X_server is only on non-Treble devices. This
        is because on these devices, certain HALs are allowed to be
        loaded directly into the client process in "passthrough" mode
        as was the case in Android before Android O. This is a legacy
        compatibility mode. On Treble devices, any client can also be
        hal_X just by virtue of a server being able to also be a hal
        client.
      
      There is also one exception to this rule. su is not given every
      hal_* permission. If it is given all of these permissions on
      non-Treble devices, it must be added as an exemption to many
      other neverallow rules. As a sideeffect (which existed before
      this patch), su is not allowed to talk directly to all hardware
      on non-Treble devices as with Treble devices.
      
      Fixes: 34180936
      Test: compile only (neverallow rules are resolved at compile time)
      
      Change-Id: I47122daf95acd49cadaf8b7664e56268dac78945
      8a52c984
  2. Apr 24, 2018
  3. Apr 23, 2018
  4. Apr 20, 2018
  5. Apr 19, 2018
  6. Apr 18, 2018
  7. Apr 17, 2018
    • Tri Vo's avatar
      Sepolicy for rw mount point for vendors. · 8c1a1b24
      Tri Vo authored
      Bug: 64905218
      Test: device boots with /mnt/vendor present and selinux label
      mnt_vendor_file applied correctly.
      Change-Id: Ib34e2859948019d237cf2fe8f71845ef2533ae27
      Merged-In: Ib34e2859948019d237cf2fe8f71845ef2533ae27
      (cherry picked from commit 210a805b)
      8c1a1b24
    • Treehugger Robot's avatar
      53cabd6c
    • Treehugger Robot's avatar
      cc23e48f
    • Mark Salyzyn's avatar
      init: lock down access to keychord_device · f14f7354
      Mark Salyzyn authored
      The out-of-tree keychord driver is only intended for use by init.
      
      Test: build
      Bug: 64114943
      Bug: 78174219
      Change-Id: I96a7fbcd9a54a38625063606f5c4ab6d40d701f6
      f14f7354
    • Florian Mayer's avatar
      Make traced_probes mlstrustedsubject. · 4378ba7c
      Florian Mayer authored
      Denials:
      04-12 12:42:47.795   903   903 W traced_probes: type=1400 audit(0.0:5684): avc: denied { search } for name="1376" dev="proc" ino=204553 scontext=u:r:traced_probes:s0 tcontext=u:r:untrusted_app_27:s0:c512,c768 tclass=dir permissive=0
      04-12 12:42:47.795   903   903 W traced_probes: type=1400 audit(0.0:5685): avc: denied { search } for name="1402" dev="proc" ino=204554 scontext=u:r:traced_probes:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=dir permissive=0
      04-12 12:42:47.801   903   903 W traced_probes: type=1400 audit(0.0:5686): avc: denied { search } for name="1496" dev="proc" ino=204557 scontext=u:r:traced_probes:s0 tcontext=u:r:untrusted_app:s0:c85,c256,c512,c768 tclass=dir permissive=0
      04-12 12:42:47.805   903   903 W traced_probes: type=1400 audit(0.0:5687): avc: denied { search } for name="1758" dev="proc" ino=204563 scontext=u:r:traced_probes:s0 tcontext=u:r:priv_app:s0:c512,c768 tclass=dir permissive=0
      
      Bug: 77955286
      
      Change-Id: If0985d3ddd7d14c2b139be1c842c9c8df99b90db
      Merged-In: If0985d3ddd7d14c2b139be1c842c9c8df99b90db
      4378ba7c
    • Alan Stokes's avatar
      Revert "Revert "Add /sys/kernel/memory_state_time to sysfs_power."" · 19b03639
      Alan Stokes authored
      This reverts commit 12e73685.
      
      Reason for revert: Rolling original change forward again, more carefully.
      
      Change-Id: I266b181915c829d743c6d8d0b8c0d70b6bf3d620
      19b03639
  8. Apr 16, 2018
  9. Apr 13, 2018
Loading