Skip to content
Snippets Groups Projects
  1. Dec 11, 2018
    • Benjamin Schwartz's avatar
      Add power.stats HAL 1.0 sepolicy · e7040ead
      Benjamin Schwartz authored
      Also giving statsd permission to access it. This change copies the internal sepolicy to AOSP.
      
      Bug: 111185513
      Bug: 120551881
      Test: make
      Change-Id: I7e0386777e05580299caf9b97cb7804459f1a9d0
      e7040ead
  2. Dec 07, 2018
    • Matt Pape's avatar
      SEPolicy updates for DeviceConfig Service. · 6aa44527
      Matt Pape authored
      Add a DeviceConfig service in system_server to edit configuration flags.
      This is intended to be a command line tool for local overrides and/or
      tool for tests that adopt shell permissions.
      
      Test: None
      Bug:109919982
      Bug:113101834
      Change-Id: Ib7bed752849b1ed102747e3202dd7aed48d2c6d5
      6aa44527
  3. Dec 03, 2018
  4. Nov 30, 2018
  5. Nov 19, 2018
    • Nick Kralevich's avatar
      Revert "Add placeholder iris and face policy for vold data directory" · 83f25e26
      Nick Kralevich authored
      This reverts commit 92bde4b9.
      
      Reason for revert: Rebooting after OTA fails due to the
      filesystem still seeing the old label on the device.
      
      Bug: 116528212
      Bug: 119747564
      Change-Id: Ib5f920f85c7e305e89c377369dca038d2c6c738c
      Test: rollback change
      83f25e26
    • Florian Mayer's avatar
      Property to enable heap profile from process startup. · 0f3decf2
      Florian Mayer authored
      This is world-readable so it can be checked in libc's process init.
      
      Test: m
      Test: flash sailfish
      
      Bug: 117821125
      
      Change-Id: Iac7317ceb75b5ad9cfb9adabdf16929263fa8a9d
      0f3decf2
    • Haibo Huang's avatar
      Add new cpu variant related rules to SELinux · 544a0d54
      Haibo Huang authored
      I added ro.bionic.(2nd_)?_(arch|cpu_variant) to vendor system
      properties. And have init to write them to files under dev/.
      
      This change set SELinux rules for these properties and files.
      
      For the system properties: vendor/default.prop will set them. init will
      read them.
      For the files /dev/cpu_variant:.*: init will write them. bionic libc
      will read them. (Basically world readable).
      
      This is to allow libc select the right optimized routine at runtime.
      Like memcpy / strcmp etc.
      
      Test: getprop to make sure the properties are set.
      Test: ls -laZ to make sure /dev/cpu_variant:.* are correctly labeled.
      
      Change-Id: I41662493dce30eae6d41bf0985709045c44247d3
      544a0d54
  6. Nov 17, 2018
    • Hongyi Zhang's avatar
      sepolicies for sys prop enabling flag health check · da492f4f
      Hongyi Zhang authored
      device_config_flags_health_check_prop is used for enabling/disabling
      program flags_health_check which is executed during device booting.
      "1" means enabling health check actions in flags_health_check, other
      values mean flags_health_check will not perform any action.
      
      Test: build succeeded & manual test
      Change-Id: I93739dc5d155e057d72d08fd13097eb63c1193b5
      da492f4f
  7. Nov 16, 2018
  8. Nov 15, 2018
    • Mårten Kongstad's avatar
      Add idmap2 and idmap2d · f62362da
      Mårten Kongstad authored
      Bug: 78815803
      Test: builds, boots
      Test: manual: adb shell idmap2 create ...
      Test: manual: adb shell ps | grep -e idmap2d
      Change-Id: I60852e15d99329896ff9de6559d1e7cd1c67e33d
      f62362da
  9. Nov 12, 2018
  10. Nov 09, 2018
  11. Nov 07, 2018
  12. Nov 06, 2018
    • Fan Xu's avatar
      Remove buffer_hub_service compat mapping · 2d74a45f
      Fan Xu authored
      As b/116344577 is fixed, we no longer need the compatbility mapping any
      more.
      
      Test: build passed. Boot succeeded.
      Change-Id: I0d7f02c59853d34bdabaad6841d87e9ca1ee25d7
      2d74a45f
  13. Nov 05, 2018
  14. Nov 02, 2018
    • Jiyong Park's avatar
      apexd exports its status via sysprop · b3b94614
      Jiyong Park authored
      A sysprop apexd.status is set by apexd, to that other components (i.e.
      init) can determine whether APEXs are all successfully mounted or no
      (i.e., being mounted).
      
      The sysprop is only writable by apexd.
      
      Bug: 117403679
      Test: adb shell getprop apexd.status returns 'ready'.
      Change-Id: I81bcb96e6c5cb9d899f29ffa84f91eab3820be25
      b3b94614
  15. Nov 01, 2018
  16. Oct 25, 2018
  17. Oct 15, 2018
    • Florian Mayer's avatar
      Add heapprofd selinux config. · 4fde9ec7
      Florian Mayer authored
      This does not actually grant any permissions but just adds the
      necessary boilerplate for a new service.
      
      Bug: 117762471
      Bug: 117761873
      
      Change-Id: I7cdd2ae368616cfd54fc685c15f775604bfc80d4
      4fde9ec7
  18. Oct 12, 2018
    • Siarhei Vishniakou's avatar
      Allow system_server to read vendor_file · 3639f579
      Siarhei Vishniakou authored
      Input device configuration files .idc, .kl that are placed in /vendor
      are currently not accessible.
      Allow the read access here.
      
      Bug: 112880217
      Test: move .idc and .kl files from /system to /vendor, then observe
      logcat. With this patch, avc denials disappear.
      
      Change-Id: I72ad62b9adf415f787565adced73fd8aaff38832
      3639f579
  19. Oct 11, 2018
    • Chong Zhang's avatar
      add mediaswcodec service · bdbfff1b
      Chong Zhang authored
      Set up a new service for sw media codec services.
      
      Bug: 111407413
      
      Test: cts-tradefed run cts-dev --module CtsMediaTestCases --compatibility:module-arg CtsMediaTestCases:include-annotation:android.platform.test.annotations.RequiresDevice
      Change-Id: Ia1c6a9ef3f0c1d84b2be8756eb1853ffa0597f8e
      bdbfff1b
  20. Oct 08, 2018
  21. Oct 04, 2018
    • Martijn Coenen's avatar
      Add policy for apexd. · ac097ac4
      Martijn Coenen authored
      apexd is a new daemon for managing APEX packages installed
      on the device. It hosts a single binder service, "apexservice".
      
      Bug: 112455435
      Test: builds, binder service can be registered,
            apexes can be accessed, verified and mounted
      Change-Id: I634ad100f10b2edcd9a9c0df0d33896fa5d4ed97
      ac097ac4
  22. Oct 02, 2018
    • Tri Vo's avatar
      Only maintain maps between current and previous selinux versions. · 438684b3
      Tri Vo authored
      New maintenance scheme for mapping files:
      Say, V is the current SELinux platform version, then at any point in time we
      only maintain (V->V-1) mapping. (V->V-n) map is constructed from top (V->V-n+1)
      and bottom (V-n+1->V-n) without changes to previously maintained mapping files.
      
      Caveats:
      - 26.0.cil doesn't technically represent 27.0->26.0 map, but rather
      current->26.0. We'll fully migrate to the scheme with future releases.
      
      Bug: 67510052
      Test: adding new public type only requires changing the latest compat map
      Change-Id: Iab5564e887ef2c8004cb493505dd56c6220c61f8
      438684b3
  23. Sep 28, 2018
    • Howard Ro's avatar
      Update sepolicies for stats hal · 578a1891
      Howard Ro authored
      Bug: 116732452
      Test: No sepolicy violations observed with this change
      (cherry picked from commit I1958182dd8ecc496625da2a2a834f71f5d43e7bb)
      
      Change-Id: Ib386767d8acfacf9fedafd9a79dd555ce233f41c
      578a1891
  24. Sep 27, 2018
  25. Sep 24, 2018
    • Fan Xu's avatar
      Update SELinux Policy for bufferhubd · 26fa914c
      Fan Xu authored
      Create a new service type buffer_hub_binder_service for
      BufferHubBinderService and allow bufferhubd to publish the service.
      
      Add the service to 26.0, 27.0 and 28.0 compat ignore files since the
      service is not available in past versions.
      
      Fixes: 116022258
      Test: build passed
      
      Change-Id: I5a21f00329ed474433d96c8d1ce32377f20cada3
      26fa914c
  26. Sep 21, 2018
  27. Sep 20, 2018
    • Yifan Hong's avatar
      health.filesystem HAL renamed to health.storage · 1cef6a94
      Yifan Hong authored
      ...to reflect that the HAL operates on storage devices,
      not filesystem.
      
      Bug: 111655771
      Test: compiles
      Change-Id: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
      Merged-In: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
      1cef6a94
  28. Sep 06, 2018
  29. Sep 05, 2018
    • Makoto Onuki's avatar
      Add app_binding system service · 6af11813
      Makoto Onuki authored
      Bug: 109809543
      Test: Build and boot with the new service in the internal branch.
      
      Change-Id: Iaee365771c3e8e5b8f5f3b6112bbf902c6bb02bd
      6af11813
  30. Sep 04, 2018
    • Mark Salyzyn's avatar
      llkd: Add stack symbol checking · 275ea12d
      Mark Salyzyn authored
      llkd needs the ptrace capabilities and dac override to monitor for
      live lock conditions on the stack dumps.
      
      Test: compile
      Bug: 33808187
      Change-Id: Ibc1e4cc10395fa9685c4ef0ca214daf212a5e126
      275ea12d
  31. Aug 30, 2018
  32. Aug 22, 2018
  33. Aug 20, 2018
    • Hridya Valsaraju's avatar
      Define 'super_block_device' type · 4ae8fe9b
      Hridya Valsaraju authored
      Bug: 78793464
      Test: fastboot getvar partition-size:super
      
      'super_block_device' corresponds to the super partition
      required for flashing dynamic partitions.
      
      Change-Id: I323634b6797ead7c5face117a7028bf9ab947aea
      4ae8fe9b
  34. Aug 15, 2018
    • Jerry Zhang's avatar
      Add sepolicy for fastbootd · 1d85efa9
      Jerry Zhang authored
      Also allow adb and fastboot to talk to recovery
      through recovery_socket. This enables changing
      between modes with usb commands.
      
      Test: No selinux denials
      Bug: 78793464
      Change-Id: I80c54d4eaf3b94a1fe26d2280af4e57cb1593790
      1d85efa9
    • Florian Mayer's avatar
      Revert "Add sepolicy for fastbootd" · c2ab15b7
      Florian Mayer authored
      This reverts commit 0fd3ed3b.
      
      Reason for revert: Broke user builds.
      
      Change-Id: If95f1a25d22425a5a2b68a02d1561352fb5a52f0
      c2ab15b7
  35. Aug 14, 2018
    • Jerry Zhang's avatar
      Add sepolicy for fastbootd · 0fd3ed3b
      Jerry Zhang authored
      Also allow adb and fastboot to talk to recovery
      through recovery_socket. This enables changing
      between modes with usb commands.
      
      Test: No selinux denials
      Bug: 78793464
      Change-Id: I1f97659736429fe961319c642f458c80f199ffb4
      0fd3ed3b
    • Tri Vo's avatar
      Sepolicy for system suspend HAL. · dac2a4a3
      Tri Vo authored
      Bug: 78888165
      Test: device can boot with HAL running.
      Change-Id: I3bf7c8203e038b892176c97ec006152a2904c7be
      dac2a4a3
  36. Aug 10, 2018
Loading