Skip to content
Snippets Groups Projects
  1. Aug 31, 2017
    • Ray Essick's avatar
      Give media.metrics service access to uid/pkg info · 9b0924e1
      Ray Essick authored
      relax the sepolicy for media.metrics to allow access to
      package manager for uid->packagename mapping functionality.
      
      Bug: 65027506
      Test: read output of 'dumpsys media.metrics'
      Change-Id: I0d25af16c06dc65154cfda854e28ab70ada097c4
      9b0924e1
  2. Aug 29, 2017
  3. Aug 28, 2017
  4. Aug 26, 2017
  5. Aug 25, 2017
  6. Aug 24, 2017
    • Jeff Vander Stoep's avatar
      Fix label on /dev/input · a43209eb
      Jeff Vander Stoep authored
      Commit 780a71e7 changed ueventd's selinux label lookup from /dev/input/
      to /dev/input which no longer matches the regex in core policy
      file_contexts. Fix the regex to match /dev/input and /dev/input/.
      
      avc: denied { read } for name="input" dev="tmpfs" ino=14092
      scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:device:s0
      tclass=dir
      avc: denied { open } for path="/dev/input" dev="tmpfs"
      ino=14092 scontext=u:r:hal_camera_default:s0
      tcontext=u:object_r:device:s0 tclass=dir
      
      Change-Id: I8f42f5cd96fc8353bf21d3ee6c3de9e2872f229f
      Fixes: 64997761
      Fixes: 64954704
      Test: no camera HAL denials
      a43209eb
    • TreeHugger Robot's avatar
    • TreeHugger Robot's avatar
    • John Stultz's avatar
      sepolicy: Define and allow map permission for vendor dir · 9f3f3784
      John Stultz authored
      This patch tries to provide similar functionality as the previous
      change made here:
      https://android-review.googlesource.com/#/c/platform/system/sepolicy/+/432339/
      
      
      
      Only, making sure we add the same map permissions for the vendor
      directory.
      
      Signed-off-by: default avatarJohn Stultz <john.stultz@linaro.org>
      
      (cherry picked from commit 24537b2e)
      
      Bug: 65011018
      Test: policy compiles.
      Change-Id: I4d0319011ef4ef043134bf299dc4823a6c418717
      9f3f3784
    • Jeff Vander Stoep's avatar
      hal_configstore: use crash_dump fallback path · c5884836
      Jeff Vander Stoep authored
      Configstore HAL uses a seccomp filter which blocks the standard
      path of execing crash_dump to collect crash data. Add permission
      to use crash_dump's fallback mechanism.
      
      Allowing configstore to write to the socket provided by tombstoned
      required either exempting configstore from a neverallow rule, or
      removing the neverallow rule entirely. Since the neverallow rule
      could potentially prevent partners for doing security hardening,
      it has been removed.
      
      Bug: 64768925
      Bug: 36453956
      
      Test: killall -ABRT android.hardware.configstore@1.1-service
          Results in a call stack in logcat, and tombstone in
          /data/tombstones
      Test: configstore runs without crashing
      Test: SANITIZE_TARGET="address coverage" make vts -j64
          vts-tradefedrun commandAndExit vts --skip-all-system-status-check \
          -primary-abi-only --skip-preconditions -l VERBOSE --module \
          VtsHalConfigstoreV1_0IfaceFuzzer
      
      Change-Id: I1ed5265f173c760288d856adb9292c4026da43d6
      (cherry picked from commit 9924d782)
      c5884836
  7. Aug 23, 2017
    • Michael Wright's avatar
      O MR1 is API 27 · a9bfbbfe
      Michael Wright authored
      Bug: 64982450
      Test: manual
      Change-Id: Ic5d25b8a12271e5bfa71e30843a36fb643b914ff
      a9bfbbfe
  8. Aug 18, 2017
  9. Aug 17, 2017
  10. Aug 16, 2017
  11. Aug 15, 2017
  12. Aug 14, 2017
    • Dan Cashman's avatar
      Move compatibility files out of prebuilts dir. · 78b3d573
      Dan Cashman authored
      The treble compatibility tests check for policy differences between old
      and new policy.  To do this correctly, we must not modify the policy which
      represents the older policies.  Move the files meant to be changed to a
      different location from the ones that are not meant to be touched to avoid
      any undesired changes to old policy, e.g. commit:
      2bdefd65078d890889672938c6f0d2accdd25bc5
      
      Bug: 36899958
      Test: Build-time tests build.
      Change-Id: I8fa3947cfae756f37556fb34e1654382e2e48372
      78b3d573
    • TreeHugger Robot's avatar
  13. Aug 12, 2017
  14. Aug 11, 2017
    • TreeHugger Robot's avatar
    • Dan Cashman's avatar
      Add missing attribute to compatibility file. · 758d2561
      Dan Cashman authored
      untrusted_app_visible_hwservice was an attribute that was meant to
      give partners time to add their HALs to AOSP.  It was removed from mr1
      and so needs to be accounted for in the compatibility mapping.
      
      Bug: 64321916
      Test: Builds with treble policy tests.
      Change-Id: I359a842083016f0cf6c9d7ffed2116feb9e159c6
      758d2561
    • Steven Moreland's avatar
      Add screencap domain. · f27bba93
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      f27bba93
    • Martijn Coenen's avatar
      Prevent access to nonplat_service_contexts on full_treble. · 431a03bb
      Martijn Coenen authored
      On Full Treble devices, servicemanager should only service
      services from the platform service_contexts file.
      
      Created new type to separate plat_ and nonplat_service_contexts,
      and added new type to mapping (although I don't think this type
      should have been used by vendors).
      
      Bug: 36866029
      Test: Marlin/Taimen boot
      Change-Id: Ied112c64f22f8486a7415197660faa029add82d9
      431a03bb
  15. Aug 09, 2017
  16. Aug 08, 2017
    • Dan Cashman's avatar
      Add 26.0 api compatibility check infrastructure. · 7f7c3b82
      Dan Cashman authored
      Add support to the treble_sepolicy_tests suite that explicitly look at
      the old and current policy versions, as well as the compatibility file,
      to determine if any new types have been added without a compatibility
      entry.  This first test catches the most common and likely changes that
      could change the type label of an object for which vendor policy may have
      needed access.  It also should prove the basis for additional compatibility
      checks between old and new policies.
      
      Bug: 36899958
      Test: Policy builds and tests pass.
      Change-Id: I609c913e6354eb10a04cc1a029ddd9fa0e592a4c
      7f7c3b82
    • TreeHugger Robot's avatar
    • Dan Cashman's avatar
      Fix thermalserviced_tmpfs compat recording mistake. · 34f827fb
      Dan Cashman authored
      Commit: 2490f1ad meant to add
      thermalserviced_tmpfs to the new_object list in the mapping file,
      but copy-paste error resulted in thermalserviced_exec_tmpfs being
      recorded instead.  Fix this.
      
      (cherry-pick of commit: fbacc656)
      
      Bug: 62573845
      Test: None. prebuilt change.
      Change-Id: Iab4eaef04742187d6397a539aae854651caa9935
      34f827fb
Loading