Skip to content
Snippets Groups Projects
  1. May 18, 2018
    • Tom Cherry's avatar
      neverallow coredomain from writing vendor properties · cdb1624c
      Tom Cherry authored
      System properties can be abused to get around Treble requirements of
      having a clean system/vendor split.  This CL seeks to prevent that by
      neverallowing coredomain from writing vendor properties.
      
      Bug: 78598545
      Test: build 2017/2018 Pixels
      Test: build aosp_arm64
      Change-Id: I5e06894150ba121624d753228e550ba9b81f7677
      cdb1624c
  2. May 16, 2018
  3. May 14, 2018
    • Pavel Maltsev's avatar
      Allow to use sockets from hal server for auto · 4cafae77
      Pavel Maltsev authored
      Add an exemption to neverallow rule to use sockets from HAL servers only
      for automotive build
      
      Bug: 78901167
      Test: assign this attribute to hal_vehicle_default and try to open
      socket from HAL implementation
      Test: verify that new CTS test will fail for non-automotive build with
      this attribute buing used
      Test: make cts && cts-tradefed run singleCommand cts --skip-device-info
       --skip-preconditions --abi arm64-v8a --module CtsSecurityHostTestCases
       -t android.security.cts.SELinuxHostTest
      
      Change-Id: I27976443dad4fc5b7425c089512cac65bb54d6d9
      4cafae77
    • Joel Galenson's avatar
      Allow vendor_init to getattr vold_metadata_file. · 597be44e
      Joel Galenson authored
      This relaxes the neverallow rule blocking vendor_init from doing
      anything to vold_metadata_file.  The rules above it still prevent it
      from doing anything other than relabelto and getattr.
      
      Bug: 79681561
      Test: Boot device and see no denials.
      Change-Id: I1beb25bb9f8d69323c9fee53a140c2a084b12124
      597be44e
    • Logan Chien's avatar
      Add ro.vndk.lite to property_contexts · 9f55f345
      Logan Chien authored
      Bug: 78605339
      Test: aosp_walleye-userdebug builds
      Change-Id: I37c84e20f2284d50cbe29bfa1b7597dd2c01fb4b
      9f55f345
  4. May 12, 2018
    • Calin Juravle's avatar
      Whitelist dalvik.vm.profilebootimage · 54fc209a
      Calin Juravle authored
      The property is set on builds which profile the boot image.
      
      Test: m
      Bug: 73313191
      
      (cherry-pick form commit d99f4acf)
      
      Merged-In: Ie0cd54f23250df02850c38bb14e92d4b1fa04f16
      Change-Id: Ie0cd54f23250df02850c38bb14e92d4b1fa04f16
      54fc209a
  5. May 09, 2018
    • Calin Juravle's avatar
      Allow system server to write profile snapshots in /data/misc/profman · 687d5e46
      Calin Juravle authored
      The goal is to allow creating profile snapshots from the shell command in
      order to be able to write CTS tests.
      
      The system server will dump profiles for debuggable in /data/misc/profman
      from where they will be pulled and verified by CTS tests.
      
      Test: adb shell cmd package snapshot-profile com.android.vending
      Bug: 74081010
      Change-Id: I54690305284b92c0e759538303cb98c93ce92dd5
      687d5e46
    • Mark Salyzyn's avatar
      FrameworksServicesTests: allow access to test.sys.boot.reason property · 1b748766
      Mark Salyzyn authored
      com.android.server.power.PowerManagerServiceTest#testGetLastShutdownReasonInternal due to "RuntimeException: failed to set system property"
      
      W/roidJUnitRunner: type=1400 audit(0.0:6): avc: denied { write } for name="property_service" dev="tmpfs" ino=13178 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
      W/libc    : Unable to set property "test.sys.boot.reason" to "shutdown,thermal": connection failed; errno=13 (Permission denied)
      
      Had to use precise property definition as com.android.phone accesses
      test properties as well.
      
      Test: compile
      Bug: 78245377
      Change-Id: I2cc810846f8615f2a2fae8e0d4f41de585b7abd7
      1b748766
  6. May 07, 2018
  7. May 02, 2018
  8. May 01, 2018
    • Jaekyun Seok's avatar
      Allow vendor-init-settable for properties used in Android TV · d097ff95
      Jaekyun Seok authored
      The following properties will be whitelisted.
      - ro.hdmi.device_type, ro.hdmi.wake_on_hotplug and
      persist.sys.hdmi.keep_awake for hdmi
      - ro.sf.disable_triple_buffer for SurfaceFlinger
      - media.stagefright.cache-params and persist.sys.media.avsync for
      nuplayer
      
      Bug: 78205669
      Bug: 78430613
      Test: succeeded building
      Change-Id: I5ee1a1de72c265bca87aa041c6acd9554f5f8c07
      Merged-In: I5ee1a1de72c265bca87aa041c6acd9554f5f8c07
      (cherry picked from commit 18aaaad9)
      d097ff95
    • Dongwon Kang's avatar
      Allow sdcardfs:file read access on mediaextractor · e993b62c
      Dongwon Kang authored
      Test: pass Multimedia File Compatibility test
      Test: time to start playing mid file with GPM: ~10s => ~1.2s
      Bug: 76422052, Bug: 67480585, Bug: 30751071
      Change-Id: I4e9824b21dab1dafdcca5824367a7fe39a37e2f7
      e993b62c
    • Pavel Maltsev's avatar
      Revert "Allow auto HAL clients to access hw services" · 87ac80b8
      Pavel Maltsev authored
      This reverts commit aa38ce72.
      
      Reason for revert: broken build
      
      Change-Id: Ib6ca328576ef180fd1150ae6d6b3f90e928a07ac
      87ac80b8
    • Andreas Gampe's avatar
      Sepolicy: Modify postinstall_dexopt · b5c92718
      Andreas Gampe authored
      Grant fsetid as it was done for installd. Suppress write to
      profile files.
      
      (cherry picked from commit 006e160b)
      
      Bug: 77958490
      Test: m
      Test: manual
      Merged-In: I33f47db7c16f0eda41ffdb526cf43f8fa9484c62
      Change-Id: I33f47db7c16f0eda41ffdb526cf43f8fa9484c62
      b5c92718
  9. Apr 30, 2018
    • Calin Juravle's avatar
      Allow profman to resolve symlinks on dirs · 9e80bfc8
      Calin Juravle authored
      When opening the dex files we sometime need to check for the real location
      of the file (even if it was open via an fd).
      
      Denial example:
      
      avc: denied { getattr } for comm="profman" path="/data/app" dev="sda13"
      ino=1048577 scontext=u:r:profman:s0 tcontext=u:object_r:apk_data_file:s0
      tclass=dir permissive=0
      
      Test: verify we get no denials when taking a profile snapshot.
      Bug: 77922323
      Change-Id: Ifa5570656c644819d14f46af74e4c15e903a8a54
      9e80bfc8
  10. Apr 29, 2018
  11. Apr 26, 2018
  12. Apr 25, 2018
    • Chia-I Wu's avatar
      Make persist.sys.sf.native_mode an integer · f16afc09
      Chia-I Wu authored
      This allows for more native modes.
      
      Bug: 73824924
      Test: adb shell setprop persist.sys.sf.native_mode 2
      Change-Id: Iffdeadc8dc260de4b0c7f2b46aab08d64d25e3b1
      Merged-In: Iffdeadc8dc260de4b0c7f2b46aab08d64d25e3b1
      f16afc09
  13. Apr 23, 2018
    • Pavel Maltsev's avatar
      Move automotive HALs sepolicy to system/ · 394dbe34
      Pavel Maltsev authored
      Bug: 70637118
      Test: build, flash and boot bat_land and owl automotive builds
      
      Change-Id: I6db23258de30174d6db09d241e91b08aa5afedef
      394dbe34
    • Wei Wang's avatar
      Allow dumpstate to kill dumpstate vendor HAL in timeout case · 60d17674
      Wei Wang authored
      Bug: 77489941
      Test: simulate delay in dumpstate HAL and get BR, see below from dumpstate_log.txt
          dumpstateBoard timed out after 10s, killing dumpstate vendor HAL
          dumpstateBoard failed: Status(EX_TRANSACTION_FAILED): 'DEAD_OBJECT: '
      Change-Id: I90ed5cb8fe8da8ad21ae77676433936cb12d9d04
      60d17674
    • Lalit Maganti's avatar
      sepolicy: allow shell to read/write traced prop · 00c8e3d9
      Lalit Maganti authored
      This is to fix the CTS failures given by the bugs below where devices
      where traced is not enabled by default causes test failures.
      
      (cherry picked from commit 673b4db7)
      
      Bug: 78215159
      Bug: 78347829
      Change-Id: Ib0f6a1cdb770528dbbeb857368534ff5040e464e
      00c8e3d9
  14. Apr 20, 2018
    • Petri Gynther's avatar
      A2DP offload: switch to new properties · 683a60bd
      Petri Gynther authored
      Bug: 63932139
      Bug: 76201991
      Test: Manual A2DP testing (A2DP offload enabled and disabled)
      Change-Id: Icebb4a84cf241b3b6bc52e4826fdedd5a73d796a
      Merged-In: Icebb4a84cf241b3b6bc52e4826fdedd5a73d796a
      683a60bd
    • Jeff Vander Stoep's avatar
      vendor_init: allow stat() of /data dir · 6f8d2628
      Jeff Vander Stoep authored
      avc: denied { getattr } for path="/data" scontext=u:r:vendor_init:s0
      tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
      
      Bug: 78345561
      Test: build/boot device. Denial is gone.
      Change-Id: Ie858f1fe65aeb1845b00a5143c345e81aa2ec632
      6f8d2628
    • Paul Crowley's avatar
      Add metadata_file class for root of metadata folder. · 5f79b334
      Paul Crowley authored
      Bug: 77335096
      Test: booted device with metadata encryption and without
      Change-Id: I5bc5d46deb4e91912725c4887fde0c3a41c9fc91
      5f79b334
    • Tianjie Xu's avatar
      Allow dumpstate to read the update_engine logs · 4af699ae
      Tianjie Xu authored
      Denial message:
      avc: denied { read } for pid=2775 comm="dumpstate" name="update_engine_log"
      dev="sda35" ino=3850274 scontext=u:r:dumpstate:s0
      tcontext=u:object_r:update_engine_log_data_file:s0 tclass=dir permissive=0
      
      Bug: 78201703
      Test: take a bugreport
      Change-Id: I2c788c1211812aa0fcf58cee37a6e8f955424849
      (cherry picked from commit 7d474279)
      4af699ae
  15. Apr 19, 2018
  16. Apr 17, 2018
  17. Apr 16, 2018
    • Joel Galenson's avatar
      Let vold_prepare_subdirs completely clean deleted user data. · 2bae5b96
      Joel Galenson authored
      After adding a new user, deleting it, and rebooting, some of the user's data still remained.  This adds the SELinux permissions necessary to remove all of the data.  It fixes the followign denials:
      
      avc: denied { rmdir } for scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
      avc: denied { unlink } for scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      
      Bug: 74866238
      Test: Create user, delete user, reboot user, see no denials or
      leftover data.
      
      Change-Id: Ibc43bd2552b388a9708bf781b5ad206f21df62dc
      (cherry picked from commit 254a872c)
      2bae5b96
    • Jaekyun Seok's avatar
      Allow dumpstate to read property_type · f99c74cc
      Jaekyun Seok authored
      dumpstate needs to read all the system properties for debugging.
      
      Bug: 77277669
      Test: succeeded building and tested with taimen
      Change-Id: I3603854b3be67d4fc55d74f7925a21bfa59c81ee
      Merged-In: I3603854b3be67d4fc55d74f7925a21bfa59c81ee
      (cherry picked from commit 4de238e9)
      f99c74cc
    • Jeff Sharkey's avatar
      Add exFAT support; unify behind "sdcard_type". · b469c300
      Jeff Sharkey authored
      We're adding support for OEMs to ship exFAT, which behaves identical
      to vfat.  Some rules have been manually enumerating labels related
      to these "public" volumes, so unify them all behind "sdcard_type".
      
      Test: atest
      Bug: 67822822
      Change-Id: I09157fd1fc666ec5d98082c6e2cefce7c8d3ae56
      b469c300
    • Tri Vo's avatar
      Sepolicy for rw mount point for vendors. · 210a805b
      Tri Vo authored
      Bug: 64905218
      Test: device boots with /mnt/vendor present and selinux label
      mnt_vendor_file applied correctly.
      Change-Id: Ib34e2859948019d237cf2fe8f71845ef2533ae27
      210a805b
    • Jeff Vander Stoep's avatar
      tombstoned: allow unlinking anr files · fde3e6a0
      Jeff Vander Stoep authored
      Tombstoned unlinks "trace_XX" files if there are too many of them.
      
      avc: denied { unlink } for comm="tombstoned" name="trace_12"
      scontext=u:r:tombstoned:s0 tcontext=u:object_r:anr_data_file:s0
      tclass=file
      
      Bug: 77970585
      Test: Build/boot taimen. adb root; sigquit an app.
      
      (cherry picked from commit eb8f938f)
      
      Change-Id: I2f29d12f747d688f8f4e06b48cf72c5109adc2ae
      fde3e6a0
  18. Apr 13, 2018
    • Tom Cherry's avatar
      Allow vendor_init to write to misc_block_device · 1f6018ea
      Tom Cherry authored
      Vendors may use this to write custom messages to their bootloader, and
      as the bootloader is under vendor control, this makes sense to allow.
      
      Bug: 77881566
      Test: build
      Merged-In: I78f80400e5f386cad1327a9209ee1afc8e334e56
      Change-Id: I78f80400e5f386cad1327a9209ee1afc8e334e56
      (cherry picked from commit db465285)
      1f6018ea
    • Jaekyun Seok's avatar
      Whitelist vendor-init-settable bluetooth_prop and wifi_prop · a11b16c9
      Jaekyun Seok authored
      Values of the following properties are set by SoC vendors on some
      devices including Pixels.
      - persist.bluetooth.a2dp_offload.cap
      - persist.bluetooth.a2dp_offload.enable
      - persist.vendor.bluetooth.a2dp_offload.enable
      - ro.bt.bdaddr_path
      - wlan.driver.status
      
      So they should be whitelisted for compatibility.
      
      Bug: 77633703
      Test: succeeded building and tested with Pixels
      Change-Id: Ib2b81bcc1fd70ddd571dc7fb2b923b576d62b7d5
      Merged-In: Ib2b81bcc1fd70ddd571dc7fb2b923b576d62b7d5
      (cherry picked from commit 224921d1)
      a11b16c9
Loading