Skip to content
Snippets Groups Projects
  1. Dec 11, 2018
    • Benjamin Schwartz's avatar
      Add power.stats HAL 1.0 sepolicy · e7040ead
      Benjamin Schwartz authored
      Also giving statsd permission to access it. This change copies the internal sepolicy to AOSP.
      
      Bug: 111185513
      Bug: 120551881
      Test: make
      Change-Id: I7e0386777e05580299caf9b97cb7804459f1a9d0
      e7040ead
  2. Dec 07, 2018
    • Matt Pape's avatar
      SEPolicy updates for DeviceConfig Service. · 6aa44527
      Matt Pape authored
      Add a DeviceConfig service in system_server to edit configuration flags.
      This is intended to be a command line tool for local overrides and/or
      tool for tests that adopt shell permissions.
      
      Test: None
      Bug:109919982
      Bug:113101834
      Change-Id: Ib7bed752849b1ed102747e3202dd7aed48d2c6d5
      6aa44527
  3. Dec 06, 2018
    • Tri Vo's avatar
      Remove sepolicy for /dev/alarm. · 02c4c3fa
      Tri Vo authored
      After b/28357356 /dev/alarm is no longer used by android platform.
      Also, Pixel devices don't have /dev/alarm.
      
      Bug: 110962171
      Test: boot aosp_walleye
      Change-Id: Id9723996104a2548ddf366489890c098d1ea87be
      02c4c3fa
  4. Dec 03, 2018
  5. Nov 30, 2018
  6. Nov 19, 2018
    • Nick Kralevich's avatar
      Revert "Add placeholder iris and face policy for vold data directory" · 83f25e26
      Nick Kralevich authored
      This reverts commit 92bde4b9.
      
      Reason for revert: Rebooting after OTA fails due to the
      filesystem still seeing the old label on the device.
      
      Bug: 116528212
      Bug: 119747564
      Change-Id: Ib5f920f85c7e305e89c377369dca038d2c6c738c
      Test: rollback change
      83f25e26
    • Florian Mayer's avatar
      Property to enable heap profile from process startup. · 0f3decf2
      Florian Mayer authored
      This is world-readable so it can be checked in libc's process init.
      
      Test: m
      Test: flash sailfish
      
      Bug: 117821125
      
      Change-Id: Iac7317ceb75b5ad9cfb9adabdf16929263fa8a9d
      0f3decf2
    • Haibo Huang's avatar
      Add new cpu variant related rules to SELinux · 544a0d54
      Haibo Huang authored
      I added ro.bionic.(2nd_)?_(arch|cpu_variant) to vendor system
      properties. And have init to write them to files under dev/.
      
      This change set SELinux rules for these properties and files.
      
      For the system properties: vendor/default.prop will set them. init will
      read them.
      For the files /dev/cpu_variant:.*: init will write them. bionic libc
      will read them. (Basically world readable).
      
      This is to allow libc select the right optimized routine at runtime.
      Like memcpy / strcmp etc.
      
      Test: getprop to make sure the properties are set.
      Test: ls -laZ to make sure /dev/cpu_variant:.* are correctly labeled.
      
      Change-Id: I41662493dce30eae6d41bf0985709045c44247d3
      544a0d54
  7. Nov 17, 2018
    • Tri Vo's avatar
      Remove redundant cgroup type/labelings. · d918c8df
      Tri Vo authored
      cgroup is labeled from genfs_contexts. Also, cgroup filesystems can't be
      context mounted, i.e. it's not possible to mount them with a label other
      than "cgroup".
      
      Bug: 110962171
      Test: m selinux_policy
      Test: boot aosp_walleye
      Change-Id: I8319b10136c42a42d1edaee47b77ad1698e87f2c
      d918c8df
    • Hongyi Zhang's avatar
      sepolicies for sys prop enabling flag health check · da492f4f
      Hongyi Zhang authored
      device_config_flags_health_check_prop is used for enabling/disabling
      program flags_health_check which is executed during device booting.
      "1" means enabling health check actions in flags_health_check, other
      values mean flags_health_check will not perform any action.
      
      Test: build succeeded & manual test
      Change-Id: I93739dc5d155e057d72d08fd13097eb63c1193b5
      da492f4f
  8. Nov 16, 2018
  9. Nov 15, 2018
  10. Nov 12, 2018
    • Tri Vo's avatar
      Remove mtd_device type. · ced1751e
      Tri Vo authored
      mtd_device does not label any /dev node present on walleye, and the only
      permission to that type is:
      allow hal_telephony_server mtd_device:dir search;
      I suspect there is no need to keep mtd_device around.
      
      Bug: 110962171
      Test: boot aosp_walleye
      Change-Id: If74b1258b21edeca38c8b7dc07a3a10b751a7e85
      ced1751e
    • Eugene Susla's avatar
      Add SELinux service for RoleManagerService · c496db32
      Eugene Susla authored
      Test: ensure no build failures;
      add RoleManagerService as a boot phase
      ensure no SecurityException in logcat on boot
      Change-Id: Ia0803c0fb084fe2b12f5c20f5e46354d0dd1aedf
      c496db32
  11. Nov 09, 2018
    • Tri Vo's avatar
      Remove dead *_device types from system sepolicy. · b805adaa
      Tri Vo authored
      No coredomain domain has access to these types and corresponding /dev
      nodes don't exist on the device:
      
      audio_seq_device
      audio_timer_device
      full_device
      i2c_device
      vcs_device
      
      Bug: 110962171
      Test: m selinux_policy
      Test: boot walleye
      Change-Id: I89ad4755e6760aa166cb22e2655567e5905dc672
      b805adaa
    • Hongyi Zhang's avatar
      Sepolicies for server configural flags reset · b965e3c5
      Hongyi Zhang authored
      Test: m -j succeeded and manual tested on device
      
      Change-Id: I3415c58335361a9da4ef2368e61bc4e0250a91bb
      b965e3c5
  12. Nov 07, 2018
  13. Nov 06, 2018
    • Fan Xu's avatar
      Remove buffer_hub_service compat mapping · 2d74a45f
      Fan Xu authored
      As b/116344577 is fixed, we no longer need the compatbility mapping any
      more.
      
      Test: build passed. Boot succeeded.
      Change-Id: I0d7f02c59853d34bdabaad6841d87e9ca1ee25d7
      2d74a45f
  14. Nov 05, 2018
  15. Nov 02, 2018
    • Jiyong Park's avatar
      apexd exports its status via sysprop · b3b94614
      Jiyong Park authored
      A sysprop apexd.status is set by apexd, to that other components (i.e.
      init) can determine whether APEXs are all successfully mounted or no
      (i.e., being mounted).
      
      The sysprop is only writable by apexd.
      
      Bug: 117403679
      Test: adb shell getprop apexd.status returns 'ready'.
      Change-Id: I81bcb96e6c5cb9d899f29ffa84f91eab3820be25
      b3b94614
  16. Nov 01, 2018
  17. Oct 25, 2018
  18. Oct 15, 2018
    • Florian Mayer's avatar
      Add heapprofd selinux config. · 4fde9ec7
      Florian Mayer authored
      This does not actually grant any permissions but just adds the
      necessary boilerplate for a new service.
      
      Bug: 117762471
      Bug: 117761873
      
      Change-Id: I7cdd2ae368616cfd54fc685c15f775604bfc80d4
      4fde9ec7
  19. Oct 12, 2018
    • Tri Vo's avatar
      Add type for /system/bin/tcpdump. · e8b33c31
      Tri Vo authored
      We add this type with the intent to expose /system/bin/tcpdump to
      vendor on userdebug devices only.
      
      Bug: 111243627
      Test: device boots /system/bin/tcpdump correctly labeled as
      tcpdump_exec, can browse internet, turn wifi on/off
      Change-Id: Icb35e84c87120d198fbb2b44edfa5edf6021d0f0
      e8b33c31
    • Siarhei Vishniakou's avatar
      Allow system_server to read vendor_file · 3639f579
      Siarhei Vishniakou authored
      Input device configuration files .idc, .kl that are placed in /vendor
      are currently not accessible.
      Allow the read access here.
      
      Bug: 112880217
      Test: move .idc and .kl files from /system to /vendor, then observe
      logcat. With this patch, avc denials disappear.
      
      Change-Id: I72ad62b9adf415f787565adced73fd8aaff38832
      3639f579
  20. Oct 11, 2018
    • Chong Zhang's avatar
      add mediaswcodec service · bdbfff1b
      Chong Zhang authored
      Set up a new service for sw media codec services.
      
      Bug: 111407413
      
      Test: cts-tradefed run cts-dev --module CtsMediaTestCases --compatibility:module-arg CtsMediaTestCases:include-annotation:android.platform.test.annotations.RequiresDevice
      Change-Id: Ia1c6a9ef3f0c1d84b2be8756eb1853ffa0597f8e
      bdbfff1b
  21. Oct 08, 2018
  22. Oct 04, 2018
    • Martijn Coenen's avatar
      Add policy for apexd. · ac097ac4
      Martijn Coenen authored
      apexd is a new daemon for managing APEX packages installed
      on the device. It hosts a single binder service, "apexservice".
      
      Bug: 112455435
      Test: builds, binder service can be registered,
            apexes can be accessed, verified and mounted
      Change-Id: I634ad100f10b2edcd9a9c0df0d33896fa5d4ed97
      ac097ac4
  23. Oct 02, 2018
    • Tri Vo's avatar
      Only maintain maps between current and previous selinux versions. · 438684b3
      Tri Vo authored
      New maintenance scheme for mapping files:
      Say, V is the current SELinux platform version, then at any point in time we
      only maintain (V->V-1) mapping. (V->V-n) map is constructed from top (V->V-n+1)
      and bottom (V-n+1->V-n) without changes to previously maintained mapping files.
      
      Caveats:
      - 26.0.cil doesn't technically represent 27.0->26.0 map, but rather
      current->26.0. We'll fully migrate to the scheme with future releases.
      
      Bug: 67510052
      Test: adding new public type only requires changing the latest compat map
      Change-Id: Iab5564e887ef2c8004cb493505dd56c6220c61f8
      438684b3
  24. Oct 01, 2018
    • Tri Vo's avatar
      Address TODOs in 28.0.cil mapping. · 44383394
      Tri Vo authored
      Test: m selinux_policy
      Change-Id: I6a8ff2200c82b6ecdc1404bc7cf186f439950a30
      44383394
    • Jeff Vander Stoep's avatar
      Remove access to /proc/net/{tcp,udp} · 42451772
      Jeff Vander Stoep authored
      Remove these files from proc_net_type. Domains that need access must
      have permission explicitly granted. Neverallow app access except the
      shell domain.
      
      Bug: 114475727
      Test: atest CtsLibcoreOjTestCases
      Test: netstat, lsof
      Test: adb bugreport
      Change-Id: I2304e3e98c0d637af78a361569466aa2fbe79fa0
      42451772
  25. Sep 28, 2018
    • Howard Ro's avatar
      Update sepolicies for stats hal · 578a1891
      Howard Ro authored
      Bug: 116732452
      Test: No sepolicy violations observed with this change
      (cherry picked from commit I1958182dd8ecc496625da2a2a834f71f5d43e7bb)
      
      Change-Id: Ib386767d8acfacf9fedafd9a79dd555ce233f41c
      578a1891
  26. Sep 27, 2018
    • Wei Wang's avatar
      Add atrace HAL 1.0 sepolicy · bc71a610
      Wei Wang authored
      Bug: 111098596
      Test: atrace/systrace
      
      (cherry picked from commit 9ed5cf6e)
      
      Change-Id: I97772ff21754d03a0aea0d53b39e8da5312a17c0
      bc71a610
    • Nick Kralevich's avatar
      Label /system/usr/share/zoneinfo differently · ff1c765f
      Nick Kralevich authored
      /system/usr/share/zoneinfo is currently labeled zoneinfo_data_file,
      a label shared with /data/misc/zoneinfo. However, each of these
      directory locations has different security characteristics. In
      particular, the files in /system/usr/share/zoneinfo must never be
      writable, whereas /data/misc/zoneinfo may be written to by system_server.
      Reusing the same label hides these different security characteristics.
      
      Create a separate label for /system/usr/share/zoneinfo.
      
      Test: Device boots and no obvious problems.
      Change-Id: I8cf16ff038b06b38f77388e546d9b7a6865f7879
      ff1c765f
  27. Sep 24, 2018
    • Fan Xu's avatar
      Update SELinux Policy for bufferhubd · 26fa914c
      Fan Xu authored
      Create a new service type buffer_hub_binder_service for
      BufferHubBinderService and allow bufferhubd to publish the service.
      
      Add the service to 26.0, 27.0 and 28.0 compat ignore files since the
      service is not available in past versions.
      
      Fixes: 116022258
      Test: build passed
      
      Change-Id: I5a21f00329ed474433d96c8d1ce32377f20cada3
      26fa914c
  28. Sep 21, 2018
  29. Sep 20, 2018
    • Yifan Hong's avatar
      health.filesystem HAL renamed to health.storage · 1cef6a94
      Yifan Hong authored
      ...to reflect that the HAL operates on storage devices,
      not filesystem.
      
      Bug: 111655771
      Test: compiles
      Change-Id: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
      Merged-In: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
      1cef6a94
    • Tri Vo's avatar
      More granular vendor access to /system files. · 5c1fe61e
      Tri Vo authored
      This change limits global access to /system files down to:
      /system/bin/linker*
      /system/lib[64]/*
      /system/etc/ld.config*
      /system/etc/seccomp_policy/*
      /system/etc/security/cacerts/*
      /system/usr/share/zoneinfo/*
      
      Bug: 111243627
      Test: boot device, browse internet without denials to system_* types.
      Test: VtsHalDrmV1_{1, 0}TargetTest without denials
      Change-Id: I69894b29733979c2bc944ac80229e84de5d519f4
      5c1fe61e
Loading