Skip to content
Snippets Groups Projects
  1. Nov 14, 2018
  2. Nov 13, 2018
    • Risan's avatar
      SELinux changes for AppFuse · 0c1848b1
      Risan authored
      We are moving AppFuse mount from system_server's mount namespace to
      vold. Hence, we could reduce the SELinux permissions given to
      system_server, in the expense of adding allow rules to vold and
      letting appdomain have access to vold's fd.
      
      Bug: 110379912
      Test: testOpenProxyFileDescriptor passes (after vold and
      system_server code changes)
      
      Change-Id: I827a108bd118090542354360a8c90b295e6a0fef
      0c1848b1
    • Jiyong Park's avatar
      Move file_contexts for APEXes to under /system/sepolicy · 03ccac0e
      Jiyong Park authored
      For centralized development of sepolices, file_contexts files for APEXes
      are all moved to under /system/seplicy.
      
      Bug: 119034475
      Bug: 113373927
      Test: m apex.test com.android.tzdata com.android.runtime com.android.media
      Change-Id: I9bf4874793db4dbdb75cbd759ae95f72d7281007
      03ccac0e
    • Nick Kralevich's avatar
      OWNERS: add cbrubaker · a106218c
      Nick Kralevich authored
      He's already listed as an authorized +2er in
      https://android-review.googlesource.com/admin/groups/810,members
      
      Test: none
      Change-Id: Ifff6b3f8353d562b3386d0c2e3b575154f173e23
      a106218c
  3. Nov 12, 2018
  4. Nov 10, 2018
    • Nick Kralevich's avatar
      bluetooth: allow TUNGETIFF TUNSETIFF · 049c03d8
      Nick Kralevich authored
      system/sepolicy commit 619c1ef2 started
      enforcing ioctl whitelisting requirements for /dev/tun. Bluetooth needs
      the ability to issue TUNSETIFF on /dev/tun, so allow access. We also
      allow access to TUNGETIFF for good measure.
      
      Addresses the following denial:
      
      avc: denied { ioctl } for comm=425420536572766963652043616C6C path="/dev/tun" dev="tmpfs" ino=20047 ioctlcmd=0x54ca scontext=u:r:bluetooth:s0 tcontext=u:object_r:tun_device:s0 tclass=chr_file permissive=0
      
      Test: policy compiles
      Change-Id: Ie4c138fc774373cec266c59de6663db147d60423
      049c03d8
  5. Nov 09, 2018
  6. Nov 08, 2018
  7. Nov 07, 2018
  8. Nov 06, 2018
  9. Nov 05, 2018
    • Tri Vo's avatar
      Neverallow vendor access to system_file. · 9410105c
      Tri Vo authored
      Bug: 111243627
      Test: m selinux_policy
      Change-Id: I37d03906b93c8810f1d33af736f19fd6ab241c35
      9410105c
    • Felipe Leme's avatar
      New service: intelligence_service · 5bf0c636
      Felipe Leme authored
      Bug: 111276913
      Test: manual verification
      
      Change-Id: Icb309bb07e4e4b39cdc912b1d3dc1ece9cb55f5f
      5bf0c636
    • Kenny Root's avatar
      Allow SystemUI to talk to ADB service · 41ab29ee
      Kenny Root authored
      Mark the ADB service as a system_api_service so that SystemUI can tell
      it that the device is accepted. Refactoring split the AdbService out of
      the UsbService. UsbService is marked as an app_api_service which SystemUI
      is allowed to connect to; AdbService must be marked similarly as either
      system_api_service or app_api_service. However, only system apps should
      talk to AdbService currently.
      
      SELinux : avc:  denied  { find } for service=adb pid=1737 uid=10041 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:adb_service:s0 tclass=service_manager permissive=0
      
      Introduced in Change-Id Ibf23964665a115a5bc835820dcff98aaf7ba610f
      
      Test: Flash userdebug, accept ADB key, and replug USB
      Bug: 118999282
      Change-Id: I47b5090908ed84d0ba7a9fca100b299011bf8796
      41ab29ee
Loading