Skip to content
Snippets Groups Projects
  1. Nov 16, 2018
  2. Nov 15, 2018
  3. Nov 14, 2018
  4. Nov 13, 2018
    • Risan's avatar
      SELinux changes for AppFuse · 0c1848b1
      Risan authored
      We are moving AppFuse mount from system_server's mount namespace to
      vold. Hence, we could reduce the SELinux permissions given to
      system_server, in the expense of adding allow rules to vold and
      letting appdomain have access to vold's fd.
      
      Bug: 110379912
      Test: testOpenProxyFileDescriptor passes (after vold and
      system_server code changes)
      
      Change-Id: I827a108bd118090542354360a8c90b295e6a0fef
      0c1848b1
    • Jiyong Park's avatar
      Move file_contexts for APEXes to under /system/sepolicy · 03ccac0e
      Jiyong Park authored
      For centralized development of sepolices, file_contexts files for APEXes
      are all moved to under /system/seplicy.
      
      Bug: 119034475
      Bug: 113373927
      Test: m apex.test com.android.tzdata com.android.runtime com.android.media
      Change-Id: I9bf4874793db4dbdb75cbd759ae95f72d7281007
      03ccac0e
    • Joel Galenson's avatar
      Allow dumpstate to call gpuservice over binder · 7c275a6b
      Joel Galenson authored
      This prevents denials while taking a bugreport.
      
      Bug: 116711254
      Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t
      android.security.cts.SELinuxHostTest#testNoBugreportDenials
      
      Change-Id: I65dffda9806e0d627978ffdd392e3deb625149b7
      7c275a6b
    • Bookatz's avatar
      Incidentd gets statsd incident section · d2f3d18f
      Bookatz authored
      There is now an incident section for statsd output data. These selinux
      changes must be made for incident to call dump on statsd to get the
      data.
      
      Bug: 115678461
      Test: adb shell incident -b 3023
      and confirm that a valid statsd section is obtained
      
      Change-Id: I761389c160ab3ab6c24556813a1a31088c0f5137
      d2f3d18f
    • Nick Kralevich's avatar
      OWNERS: add cbrubaker · a106218c
      Nick Kralevich authored
      He's already listed as an authorized +2er in
      https://android-review.googlesource.com/admin/groups/810,members
      
      Test: none
      Change-Id: Ifff6b3f8353d562b3386d0c2e3b575154f173e23
      a106218c
  5. Nov 12, 2018
  6. Nov 10, 2018
    • Nick Kralevich's avatar
      bluetooth: allow TUNGETIFF TUNSETIFF · 049c03d8
      Nick Kralevich authored
      system/sepolicy commit 619c1ef2 started
      enforcing ioctl whitelisting requirements for /dev/tun. Bluetooth needs
      the ability to issue TUNSETIFF on /dev/tun, so allow access. We also
      allow access to TUNGETIFF for good measure.
      
      Addresses the following denial:
      
      avc: denied { ioctl } for comm=425420536572766963652043616C6C path="/dev/tun" dev="tmpfs" ino=20047 ioctlcmd=0x54ca scontext=u:r:bluetooth:s0 tcontext=u:object_r:tun_device:s0 tclass=chr_file permissive=0
      
      Test: policy compiles
      Change-Id: Ie4c138fc774373cec266c59de6663db147d60423
      049c03d8
  7. Nov 09, 2018
    • Tri Vo's avatar
      Remove dead *_device types from system sepolicy. · b805adaa
      Tri Vo authored
      No coredomain domain has access to these types and corresponding /dev
      nodes don't exist on the device:
      
      audio_seq_device
      audio_timer_device
      full_device
      i2c_device
      vcs_device
      
      Bug: 110962171
      Test: m selinux_policy
      Test: boot walleye
      Change-Id: I89ad4755e6760aa166cb22e2655567e5905dc672
      b805adaa
Loading