Skip to content
Snippets Groups Projects
  1. Sep 30, 2016
    • Janis Danisevskis's avatar
      fix lax service context lookup (II) · d6033b41
      Janis Danisevskis authored
      As fallout from the corresponding fix in libselinux,
      this patch adds the missing services without changing
      semantics.
      
      Test: bullhead builds and boots
      
      Bug: 31353148
      Change-Id: I21026c9435ffef956a59d61c4903174ac7b1ef95
      d6033b41
    • Janis Danisevskis's avatar
      fix lax service context lookup · 3e463294
      Janis Danisevskis authored
      Inform checkfc about new service label backend.
      
      Test: bullhead builds
      
      Bug: 31353148
      Change-Id: I499da36108e67483a4f9a18fd8cc7c8f13419abd
      3e463294
  2. Sep 27, 2016
  3. Sep 26, 2016
  4. Sep 24, 2016
  5. Sep 23, 2016
  6. Sep 22, 2016
  7. Sep 21, 2016
  8. Sep 19, 2016
    • Svet Ganov's avatar
      Move device serial behing a permission - selinux · 3286fca7
      Svet Ganov authored
      Build serial is non-user resettable freely available device
      identifier. It can be used by ad-netowrks to track the user
      across apps which violates the user's privacy.
      
      This change deprecates Build.SERIAL and adds a new Build.getSerial()
      API which requires holding the read_phone_state permission.
      The Build.SERIAL value is set to "undefined" for apps targeting
      high enough SDK and for legacy app the value is still available.
      
      bug:31402365
      
      Change-Id: I6309aa58c8993b3db4fea7b55aae05592408b6e4
      3286fca7
    • Mitchell Wills's avatar
      Add selinux policy for legacy Wifi HAL · a18b41e7
      Mitchell Wills authored
      avc: denied { call } for scontext=u:r:wificond:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      avc: denied { call } for scontext=u:r:wificond:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=binder permissive=1
      
      avc: denied { bind } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { call } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=1
      avc: denied { getattr } for path="/proc/4355/net/psched" dev="proc" ino=4026535370 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
      avc: denied { getattr } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { ioctl } for path="socket:[28193]" dev="sockfs" ino=28193 ioctlcmd=8933 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=1
      avc: denied { ioctl } for path="socket:[34821]" dev="sockfs" ino=34821 ioctlcmd=8933 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=1
      avc: denied { net_admin } for capability=12 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=capability permissive=1
      avc: denied { net_raw } for capability=13 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=capability permissive=1
      avc: denied { open } for path="/proc/2754/net/psched" dev="proc" ino=4026535377 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
      avc: denied { open } for path="/sys/class/net" dev="sysfs" ino=10488 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
      avc: denied { read } for name="net" dev="sysfs" ino=10488 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
      avc: denied { read } for name="psched" dev="proc" ino=4026535370 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
      avc: denied { read } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { setopt } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { transfer } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      avc: denied { write } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
      avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=0
      avc: denied { net_admin } for capability=12 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=capability permissive=0
      avc: denied { read } for name="net" dev="sysfs" ino=9862 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
      avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=0
      
      Bug: 31352200
      Test: can boot angler & bullhead and start/stop HAL repeatedly
      Change-Id: Ide93730d362fb93602742fc10b22fff6e7d56f6b
      a18b41e7
  9. Sep 16, 2016
  10. Sep 15, 2016
  11. Sep 14, 2016
  12. Sep 13, 2016
    • Andreas Gampe's avatar
      sepolicy: give otapreopt getattr · f9c741b8
      Andreas Gampe authored
      (cherry picked from commit 88c51465)
      
      Allow the otapreopt rename script to read file attributes. This is
      being used to print the aggregate artifact size for diagnostic
      purposes.
      
      Bug: 30832951
      Change-Id: Iee410adf59dcbb74fa4b49edb27d028025cd8bf9
      f9c741b8
    • Andreas Gampe's avatar
      Sepolicy: Add otapreopt_slot · a3a0bb44
      Andreas Gampe authored
      (cherry picked from commit eb717421)
      
      The new A/B OTA artifact naming scheme includes the target slot so
      that the system is robust with respect to unexpected reboots. This
      complicates the renaming code after reboot, so it is moved from the
      zygote into a simple script (otapreopt_slot) that is hooked into
      the startup sequence in init.
      
      Give the script the subset of the rights that the zygote had so that
      it can move the artifacts from /data/ota into /data/dalvik-cache.
      Relabeling will be done in the init rc component, so relabeling
      rights can be completely removed.
      
      Bug: 25612095
      Bug: 28069686
      Change-Id: Iad56dc3d78ac759f4f2cce65633cdaf1cab7631b
      a3a0bb44
    • Treehugger Robot's avatar
Loading