Skip to content
Snippets Groups Projects
  1. May 16, 2018
  2. May 15, 2018
    • Jerry Zhang's avatar
      Allow mediaprovider to search /mnt/media_rw · 31c4b4ea
      Jerry Zhang authored
      Mtp needs access to this path in order to
      change files on an sdcard.
      
      Fixes denial:
      
      05-14 17:40:58.803  3004  3004 W MtpServer: type=1400 audit(0.0:46):
      avc: denied { search } for name="media_rw" dev="tmpfs" ino=10113
      scontext=u:r:mediaprovider:s0:c512,c768
      tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0
      b/77925342 app=com.android.providers.media
      
      Bug: 77849654
      Test: no denials using mtp with emulated sdcard
      Change-Id: I27b5294fa211bb1eff6d011638b5fdc90334bc80
      31c4b4ea
  3. May 14, 2018
    • Pavel Maltsev's avatar
      Allow to use sockets from hal server for auto · 4cafae77
      Pavel Maltsev authored
      Add an exemption to neverallow rule to use sockets from HAL servers only
      for automotive build
      
      Bug: 78901167
      Test: assign this attribute to hal_vehicle_default and try to open
      socket from HAL implementation
      Test: verify that new CTS test will fail for non-automotive build with
      this attribute buing used
      Test: make cts && cts-tradefed run singleCommand cts --skip-device-info
       --skip-preconditions --abi arm64-v8a --module CtsSecurityHostTestCases
       -t android.security.cts.SELinuxHostTest
      
      Change-Id: I27976443dad4fc5b7425c089512cac65bb54d6d9
      4cafae77
    • Joel Galenson's avatar
      Allow vendor_init to getattr vold_metadata_file. · 597be44e
      Joel Galenson authored
      This relaxes the neverallow rule blocking vendor_init from doing
      anything to vold_metadata_file.  The rules above it still prevent it
      from doing anything other than relabelto and getattr.
      
      Bug: 79681561
      Test: Boot device and see no denials.
      Change-Id: I1beb25bb9f8d69323c9fee53a140c2a084b12124
      597be44e
    • Logan Chien's avatar
      Add ro.vndk.lite to property_contexts · 9f55f345
      Logan Chien authored
      Bug: 78605339
      Test: aosp_walleye-userdebug builds
      Change-Id: I37c84e20f2284d50cbe29bfa1b7597dd2c01fb4b
      9f55f345
  4. May 13, 2018
    • Jaegeuk Kim's avatar
      dumpstate: allow /metadata for df · 18096f9c
      Jaegeuk Kim authored
      
      [  196.680228] type=1400 audit(1526230655.786:26): avc: denied { getattr } for
       pid=7159 comm="df" path="/metadata" dev="sda20" ino=2 scontext=u:r:dumpstate:s0
       tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=0
      
      Bug: 66967195
      Bug: 79552162
      Test: adb bugreport
      Change-Id: Ib2abbc35e04a69992fa09a596694f428d3adc7c1
      Signed-off-by: default avatarJaegeuk Kim <jaegeuk@google.com>
      18096f9c
  5. May 12, 2018
    • Calin Juravle's avatar
      Whitelist dalvik.vm.profilebootimage · 54fc209a
      Calin Juravle authored
      The property is set on builds which profile the boot image.
      
      Test: m
      Bug: 73313191
      
      (cherry-pick form commit d99f4acf)
      
      Merged-In: Ie0cd54f23250df02850c38bb14e92d4b1fa04f16
      Change-Id: Ie0cd54f23250df02850c38bb14e92d4b1fa04f16
      54fc209a
  6. May 09, 2018
    • Paul Crowley's avatar
      Add wait_for_keymaster · 6af7af15
      Paul Crowley authored
      Bug: 79228237
      Test: audit2allow finds no relevant denials on boot
      Change-Id: Ia80b77ba9a1ec2354127cd0ef68d50ebcf593fb0
      6af7af15
    • Calin Juravle's avatar
      Allow system server to write profile snapshots in /data/misc/profman · 687d5e46
      Calin Juravle authored
      The goal is to allow creating profile snapshots from the shell command in
      order to be able to write CTS tests.
      
      The system server will dump profiles for debuggable in /data/misc/profman
      from where they will be pulled and verified by CTS tests.
      
      Test: adb shell cmd package snapshot-profile com.android.vending
      Bug: 74081010
      Change-Id: I54690305284b92c0e759538303cb98c93ce92dd5
      687d5e46
    • Mark Salyzyn's avatar
      FrameworksServicesTests: allow access to test.sys.boot.reason property · 1b748766
      Mark Salyzyn authored
      com.android.server.power.PowerManagerServiceTest#testGetLastShutdownReasonInternal due to "RuntimeException: failed to set system property"
      
      W/roidJUnitRunner: type=1400 audit(0.0:6): avc: denied { write } for name="property_service" dev="tmpfs" ino=13178 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
      W/libc    : Unable to set property "test.sys.boot.reason" to "shutdown,thermal": connection failed; errno=13 (Permission denied)
      
      Had to use precise property definition as com.android.phone accesses
      test properties as well.
      
      Test: compile
      Bug: 78245377
      Change-Id: I2cc810846f8615f2a2fae8e0d4f41de585b7abd7
      1b748766
    • Joel Galenson's avatar
      Track cppreopts SELinux denial. · 8e6b2d55
      Joel Galenson authored
      This should help fix presubmit tests.
      
      Bug: 79414024
      Test: Built policy.
      Change-Id: Ic840150767ff6c2799ac3b5ef22ba139108c94dd
      (cherry picked from commit 06e09abd)
      8e6b2d55
  7. May 07, 2018
    • Jean-Michel Trivi's avatar
      Whitelist reading property ro.aac_drc_effect_type · 41795cdf
      Jean-Michel Trivi authored
      Bug: 71430241
      Test: build/flash, grep for "avc: denied { read }" for mediacodec, should be empty on walleye
      Change-Id: I12e1b11a969d3f979ca0cfbe4ca7db2bc5e46165
      41795cdf
    • Ray Essick's avatar
      give audioserver access to media.metrics · 2306cc04
      Ray Essick authored
      Let the audioserver record metrics with media.metrics service.
      This is for 'audiopolicy' metrics.
      
      Bug: 78595399
      Test: record from different apps, see records in 'dumpsys media.metrics'
      Change-Id: I63f9d4ad2d2b08eb98a49b8de5f86b6797ba2995
      2306cc04
  8. May 04, 2018
    • Calin Juravle's avatar
      Allow system server to record its own profile · 035fcc46
      Calin Juravle authored
      On userdebug builds we can now profile system server without disabling
      selinux. This is the final piece, and allows the system server to save its
      own profile.
      
      Test: manual, on a device with system server profiling enabled
      Bug: 73313191
      
      (cherry picked from commit 71d8467b)
      
      Change-Id: I93e7e01bfbd3146a8cfd26a1f6e88b640e9c4e0f
      035fcc46
  9. May 03, 2018
  10. May 02, 2018
  11. May 01, 2018
  12. Apr 30, 2018
  13. Apr 13, 2018
    • Wale Ogunwale's avatar
      Finalizing P SDK · 49b79029
      Wale Ogunwale authored
      Bug: 77588754
      Test: builds
      Change-Id: I61ceb438cd532584847ddd55c0eeaefebdcfa51c
      49b79029
Loading