Skip to content
Snippets Groups Projects
  1. Jan 07, 2019
    • Alan Stokes's avatar
      Un-revert "Audit execution of app_data_file native code." · c6cbeadb
      Alan Stokes authored
      This was originally implemented in commit
      89041472 and reverted in commit
      fa3eb773. This effectively reverts the
      revert, with minimal changes to cope with the subsequent reversion of
      commit b3624743.
      
      Auditing is only enabled for apps targeting API <= 28.
      
      Test: Compiles, audit messages are seen.
      Bug: 121333210
      Bug: 111338677
      Change-Id: Ie38498a2b61f4b567902117f9ef293faa0e689dd
      c6cbeadb
  2. Jan 02, 2019
    • Joel Galenson's avatar
      Allow dumpstate to read sysfs_loop files. · f0264fe2
      Joel Galenson authored
      This prevents denials while taking a bugreport.
      
      Bug: 116711254
      Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t
      android.security.cts.SELinuxHostTest#testNoBugreportDenials
      
      Change-Id: Ie190bfa62cf5aa172ebfff8bfd82dea2a7d1a016
      f0264fe2
  3. Dec 30, 2018
    • Justin Yun's avatar
      sepolicy for vendor overlay · df9d7832
      Justin Yun authored
      Make /(product|system/product)/vendor_overlay/<ver> have the vendor
      file context.
      
      If vendor_overlay requires to mount on the vendor directories other
      than 'vendor_file', the contexts must be defined in the device
      specific sepolicy files.
      
      Bug: 119076200
      Test: build and check if the files are overided and have the required
      sepolicy contexts.
      
      Change-Id: I69ed38d4ea8e7d89f56865b1ca1e26f290e9892d
      df9d7832
  4. Dec 28, 2018
    • Zachary Iqbal's avatar
      Added placeholder SELinux policy for the biometric face HAL. · 893272d8
      Zachary Iqbal authored
      Notes:
      - Added face hal domain, context and file types for the default
        SELinux policy.
      - Please see aosp/q/topic:"Face+Authentication"
      
      Bug: 80155388
      Test: Built successfully.
      Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
      893272d8
    • Dario Freni's avatar
      Revert "Add StagingManager service." · ca861694
      Dario Freni authored
      This reverts commit 9eb3b8ff.
      
      Reason for revert: We are deciding for now not to make StagingManager a fully-fledged binder service, as it will only be accessed by PackageInstaller. We might re-evaluate this decision later if needed.
      
      Bug: 122072686
      Change-Id: Ic2a53fc92ddd7d7eeccc6a4a0117f28724346ec7
      ca861694
  5. Dec 27, 2018
    • Dario Freni's avatar
      Add StagingManager service. · 9eb3b8ff
      Dario Freni authored
      Adding a new high-level service which will handle staged installs, i.e.
      installs that require a reboot.
      
      Bug: 118865310
      Test: An initial implementation of StagingManager can be reached
      successfully by PackageManagerService and PackageInstallerService.
      Change-Id: I8859b463575f8ee85caae43570958347b82f967e
      9eb3b8ff
    • Michael Groover's avatar
      Merge "Add selinux policy for new SensorPrivacyService" · 09c86730
      Michael Groover authored
      Test: manually verified SensorPrivacyService is accessible
      Bug: 110842805
      Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      (cherry picked from commit 0ac3dea7)
      09c86730
  6. Dec 22, 2018
  7. Dec 21, 2018
  8. Dec 20, 2018
  9. Dec 19, 2018
    • Nick Kralevich's avatar
      Ensure that hwservice_manager adds / finds make sense. · db43ee04
      Nick Kralevich authored
      Add a neverallow rule asserting that services registered or queried
      through hwservicemanager must have the attribute hwservice_manager_type.
      Attempting to add or query a service which does not have that
      attribute is malformed policy.
      
      Test: compiles
      Change-Id: Ib498508694f478c396f2d9273abaccbff06975e6
      db43ee04
    • Nick Kralevich's avatar
      Ensure that service_manager adds / finds make sense. · 5f154404
      Nick Kralevich authored
      Add a neverallow rule asserting that services registered or queried
      through servicemanager must have the attribute service_manager_type
      or vndservice_manager_type. Attempting to add or query a service which
      does not have one of those attributes is malformed policy.
      
      See
      https://android-review.googlesource.com/c/platform/system/sepolicy/+/826500/7/private/system_server.te#696
      as an example where this occurred.
      
      Test: compiles
      Change-Id: I339bde04b80819b07832d96797fd7f477a4b676a
      5f154404
    • Tri Vo's avatar
      sepolicy: fix mac build · ebf3eaca
      Tri Vo authored
      sed "-i" flag on Mac has different syntax than on Linux. Replace use of
      sed with grep.
      
      A simple fix like this should suffice for this case, but ideally, we
      should maintain our own utils instead of using tools on the host
      machine.
      
      Fixes: 121235932
      Test: m selinux_policy
      Change-Id: I46c3bdb90bf7de48d2c942b15a65ce82ae3041c5
      ebf3eaca
    • Nick Kralevich's avatar
      rs.te: Allow following /data/user/0 symlink · 5cbe41b1
      Nick Kralevich authored
      The bcc command line uses /data/user/0 paths, so renderscript needs to
      be able to follow those symlinks.
      
      Addresses the following denial:
      
        audit(1545249938.830:2274): avc: denied { read } for comm="bcc" name="0" dev="dm-6" ino=101 scontext=u:r:rs:s0:c184,c256,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=lnk_file permissive=1 app=android.rscpp.cts
      
      Test: cts-tradefed run cts -m CtsRsCppTestCases
      Bug: 121266184
      Bug: 112357170
      Change-Id: I16210f9b95f386bdee0863cf0044c956af99586d
      5cbe41b1
    • Tri Vo's avatar
      Separate product_file_contexts out of system sepolicy. · 3361ec43
      Tri Vo authored
      Bug: 119305624
      Test: boot blueline
      Change-Id: I3ecdeab3bb33c3cb5e80dc10ba1079c9853048f8
      3361ec43
  10. Dec 18, 2018
    • Yao Chen's avatar
      Allow statsd to write stats log events to perfd(running as shell) via pipes. · e1d25089
      Yao Chen authored
      Bug: 120921905
      Test: locally tested
      Change-Id: I23fda0f83daff8765f7946814a61588dac00c85a
      e1d25089
    • Tri Vo's avatar
      Merge changes from topic "product_sepolicy.cil" · 9ee4e3ae
      Tri Vo authored
      * changes:
        Separate product_sepolicy.cil out of system sepolicy
        Replace "grep -f" with python util.
      9ee4e3ae
    • Tri Vo's avatar
      Separate product_sepolicy.cil out of system sepolicy · 75887dd5
      Tri Vo authored
      Product-specific sepolicy will be installed into /product/etc/selinux/*.
      This change separates out /product/etc/selinux/product_sepolicy.cil out
      of system sepolicy.
      
      This file is merged into precompiled_sepolicy at build-time. In case
      precompiled_sepolicy can't be used (e.g. system-only-ota), init wll
      merge this file with the rest of the sepolicy at runtime.
      
      I left TODOs to separate other product-specific SELinux artifacts out of
      system.
      
      Bug: 119305624
      Test: boot aosp_taimen with product_sepolicy.cil
      Test: build selinux_policy for aosp_arm64; no product_sepolicy.cil
      produced
      Change-Id: Idb84a1c8ceb2de78f1460d954497c53fed08935f
      75887dd5
    • Treehugger Robot's avatar
      490cbfdb
    • Tri Vo's avatar
      Replace "grep -f" with python util. · d57789fd
      Tri Vo authored
      grep can potentially run out of memory on Mac builds for large input
      files. So we add a python util to handle filtering out files.
      
      We will also need this util to filter plat_sepolicy.cil out of
      product_sepolicy.cil
      
      Bug: 119305624
      Test: boot aosp_taimen
      Change-Id: I61cd68f407ea5de43a06bf522a5fc149e5067e8c
      d57789fd
    • Winson Chung's avatar
      Adding policy for content suggestions. · ac1a0a7b
      Winson Chung authored
      Bug: 120865921
      Test: Manual verification
      Change-Id: Ic0b3f85fad24ccedc0a8e9935c198bc8503bb415
      ac1a0a7b
  11. Dec 17, 2018
Loading