Skip to content
Snippets Groups Projects
  1. Oct 17, 2017
  2. Oct 16, 2017
    • Robert Quattlebaum's avatar
      wpantund: Allow wpantund to call callbacks · 0b2d26de
      Robert Quattlebaum authored
      This change allows wpantund to call any binder callbacks that have
      been registered with it. Generally, only privileged apps are allowed
      to register callbacks with wpantund, so we are limiting the scope for
      callbacks to only privileged apps. We also add shell to allow the
      command-line utility `lowpanctl` to work properly from `adb shell`.
      
      Bug: b/67393078
      Test: manual
      Change-Id: I64c52cc5e202725a81230dc67e1cd7c911cf8e1c
      (cherry picked from commit 17319cb3)
      0b2d26de
    • Robert Quattlebaum's avatar
      lowpan: Add wpantund to SEPolicy · fd03d517
      Robert Quattlebaum authored
      Bug: b/64399219
      Test: Manual
      Change-Id: I4f6c7e4e3339ae95e43299bf364edff40d07c796
      (cherry picked from commit c8bd93d7)
      fd03d517
    • Tri Vo's avatar
      Merge "Remove proc access from hal_audio." · 28bc373d
      Tri Vo authored
      28bc373d
    • Tri Vo's avatar
      Remove proc access from hal_audio. · 5cccb249
      Tri Vo authored
      As a consequence, hal_audio_default (and any domain with hal_audio attribute)
      loses access to proc label.
      
      Bug: 65643247
      Test: sailfish boots, can play sound through speakers and headset
      (3.5mm, usb, and bluetooth) without denials from hal_audio to proc.
      Test: VtsHalAudioEffectV2_0Target
      Test: VtsHalAudioV2_0Target
      
      Change-Id: I3eead5a26ef36b8840d31c5e078f006b0c2266a3
      5cccb249
  3. Oct 14, 2017
    • Todd Poynor's avatar
      PowerUI access to thermalservice · bbc692c6
      Todd Poynor authored
      Allow PowerUI / platform_app to use thermalservice for receiving
      notifications of thermal events.
      
      Bug: 66698613
      Test: PowerNotificationWarningsTest, PowerUITest,
            manual: marlin and <redacted> with artificially low temperature
            threshold and logcat debugging messages
      Change-Id: I5428bd5f99424f83ef72d981afaf769bdcd03629
      Merged-In: I5428bd5f99424f83ef72d981afaf769bdcd03629
      bbc692c6
  4. Oct 13, 2017
  5. Oct 12, 2017
    • Tri Vo's avatar
      Label system_server's dependencies in sysfs. · 1960215c
      Tri Vo authored
      New types:
      sysfs_android_usb
      sysfs_ipv4
      sysfs_power
      sysfs_rtc
      sysfs_switch
      sysfs_wakeup_reasons
      
      Labeled:
      /sys/class/android_usb, /sys/devices/virtual/android_usb ->sysfs_android_usb
      /sys/class/rtc -> sysfs_rtc
      /sys/class/switch, /sys/devices/virtual/switch -> sysfs_switch
      /sys/power/state, /sys/power/wakeup_count -> sysfs_power
      /sys/kernel/ipv4 -> sysfs_ipv4
      /sys/kernel/wakeup_reasons -> sysfs_wakeup_reasons
      
      Removed access to sysfs and sysfs_type from system_server and added
      appropriate access to new types.
      
      Bug: 65643247
      Test: sailfish boots without violation from system_server or to new labels.
      Change-Id: I27250fd537d76c8226defa138d84fe2a4ce2d5d5
      1960215c
    • Chong Zhang's avatar
    • Jeff Vander Stoep's avatar
      Neverallow write access to /sys files for untrusted apps · 06cef4ff
      Jeff Vander Stoep authored
      Test: build aosp_sailfish
      Change-Id: Iaefe1df66885d3e78feb600c3d9845bd9fe671a2
      06cef4ff
  6. Oct 11, 2017
  7. Oct 10, 2017
    • Tao Bao's avatar
      Create sysfs_dm label. · 5b4bea43
      Tao Bao authored
      Prior to this CL, /sys/devices/virtual/block/dm-X was using the generic
      sysfs label. This CL creates sysfs_dm label and grants the following
      accesses:
       - update_verifier to read sysfs_dm dir and file at
         /sys/devices/virtual/block/dm-X.
       - vold to write sysfs_dm.
      
      Bug: 63440407
      Test: update_verifier successfully triggers blocks verification and
            marks a sucessful boot;
      Test: No sysfs_dm related denials on sailfish.
      Change-Id: I6349412707800f1bd3a2fb94d4fe505558400c95
      5b4bea43
    • Nick Kralevich's avatar
      Ensure /sys restrictions for isolated_apps · 62d3b4f1
      Nick Kralevich authored
      isolated_apps are intended to be strictly limited in the /sys files
      which can be read. Add a neverallow assertion to guarantee this on all
      Android compatible devices.
      
      Test: policy compiles.
      Change-Id: I2980291dcf4e74bb12c81199d61c5eb8a182036c
      62d3b4f1
  8. Oct 09, 2017
    • Treehugger Robot's avatar
      Merge "Remove reboot_data_file." · f3f194c0
      Treehugger Robot authored
      f3f194c0
    • Treehugger Robot's avatar
      f7196a88
    • Jeff Vander Stoep's avatar
      Remove unnecessary HAL permissions · 89d77187
      Jeff Vander Stoep authored
      Comments indicate that these permissions are used to access already
      open FDs. However, getattr of a directory is clearly not necessary
      for that, search of system_data_file is already granted to domain
      and following symlinks is clearly not needed for reading an already
      open FD.
      
      Bug: 34980020
      Test: boot marlin. Test drm with google play movies, no related
          denials
      Test: cts-tradefed run cts -m CtsMediaTestCases -t \
          android.media.cts.MediaCasTest
          5/6 tests fail with no related selinux denials. The same 5/6
          also fail in selinux permissive mode.
      Change-Id: Ib4b9a1e18bdc479d656b2d64917bbc0358515525
      89d77187
    • Dan Cashman's avatar
      Remove reboot_data_file. · 76d0e418
      Dan Cashman authored
      Bug: 64687998
      Test: Builds.
      Change-Id: I7a5b65d34382b8b76e55c523811a0f17dd9c1051
      76d0e418
    • Tri Vo's avatar
      Remove proc label access from kernel domain. · bc1c5453
      Tri Vo authored
      Bug: 65643247
      Test: sailfish boots, can take pictures, use browser without denials
      form kernel domain.
      Change-Id: I4fc0555f0b65fc5537e0b2765142b384ed0560c8
      bc1c5453
  9. Oct 08, 2017
  10. Oct 07, 2017
    • Treehugger Robot's avatar
      e22e99a6
    • Nick Kralevich's avatar
    • Nick Kralevich's avatar
      Revert "Ensure /sys restrictions for isolated_apps" · ae48ecbd
      Nick Kralevich authored
      Bullhead and dragon are broken. Revert until I can fix
      those builds.
      
      Dragon:
      
      libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26264 of policy.conf) violated by allow isolated_app sysfs_socinfo:file { ioctl read lock open }; 
      
      Bullhead:
      
      libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_power_management:file { ioctl read lock open }; 
      libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_socinfo:file { ioctl read lock open }; 
      libsepol.report_failure: neverallow on line 113 of system/sepolicy/private/isolated_app.te (or line 26283 of policy.conf) violated by allow isolated_app sysfs_thermal:file { ioctl read lock open }; 
      libsepol.check_assertions: 3 neverallow failures occurred 
      
      
      This reverts commit 579366a0.
      
      Change-Id: I1ea4824e226c06628769898299f2e322060d0d06
      Test: policy compiles.
      ae48ecbd
    • Treehugger Robot's avatar
    • Nick Kralevich's avatar
      mediaextractor: ensure no direct open()s · d329e7eb
      Nick Kralevich authored
      Mediaextractor should only be operating on data passed directly to it.
      It shouldn't be attempting to open /data files on it's own.
      
      Add a neverallow statement (compile time assertion + CTS test) to ensure
      this is the case.
      
      Bug: 67454004
      Test: policy compiles. No runtime impact.
      Change-Id: Ie94d4cb9aece7e72fbd13321f339dcf9d44d5d77
      d329e7eb
    • Treehugger Robot's avatar
    • Jeff Vander Stoep's avatar
      Allow redeclaring typeattributes · 74b7071b
      Jeff Vander Stoep authored
      Allows partners to add a new attribute definition to their public
      policy without causing a compatibility failure with the AOSP system
      image.
      
      Bug: 67092827
      Bug: 37915794
      Test: build and boot aosp_sailfish with new type declared in public
          policy
      
      Change-Id: I015c26fa7c399423e8a6e7079b5689007d031479
      74b7071b
  11. Oct 06, 2017
  12. Oct 05, 2017
Loading