"public/nfc.te" did not exist on "3fbeb180db7ac652f651b3724806b784c8604c50"
- Jan 11, 2019
-
-
Siarhei Vishniakou authored
Add the required permissions for the InputClassifier HAL. Bug: 62940136 Test: no selinux denials in logcat when HAL is used inside input flinger. Change-Id: Ibc9b115a83719421d56ecb4bca2fd196ec71fd76
-
- Jan 08, 2019
-
-
Chenbo Feng authored
Recent change in netd and bpfloader switched the creater of bpf maps from netd to bpfloader. Change the rules related to it to make sure it doesn't fail. Test: dumpsys netd trafficcontroller Bug: 112334572 Change-Id: I016ff68b58ef7b12bdfdebc2fd178be1d0206a62
-
Narayan Kamath authored
For consistency with APKs, signature verification is performed in the system_server. This includes checking that the signature of an updated install matches the signature of the active package that it updates. For this, it requires search access to /data/apex and read access to the files under that directory. Test: m Change-Id: Ia073adb8892886e4767fa5529e95c110b9cbff1b
-
- Jan 07, 2019
-
-
Dario Freni authored
Test: basic workflow between apexd and PackageManager tested with changes being developed. Bug: 118865310 Change-Id: I1ae866f33e9b22493585e108c4fd45400493c7ac
-
- Dec 28, 2018
-
-
Zachary Iqbal authored
Notes: - Added face hal domain, context and file types for the default SELinux policy. - Please see aosp/q/topic:"Face+Authentication" Bug: 80155388 Test: Built successfully. Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
-
- Dec 11, 2018
-
-
Benjamin Schwartz authored
Also giving statsd permission to access it. This change copies the internal sepolicy to AOSP. Bug: 111185513 Bug: 120551881 Test: make Change-Id: I7e0386777e05580299caf9b97cb7804459f1a9d0
- Dec 06, 2018
-
-
Tri Vo authored
After b/28357356 /dev/alarm is no longer used by android platform. Also, Pixel devices don't have /dev/alarm. Bug: 110962171 Test: boot aosp_walleye Change-Id: Id9723996104a2548ddf366489890c098d1ea87be
-
- Nov 29, 2018
-
-
Igor Murashkin authored
Bug: 72170747 Change-Id: I835e6a93cf797f939b808eb6025939d053d509ae
-
Tri Vo authored
According to go/sedenials (internal dogfooding), coredomain access to following types is not exercised and can be removed: iio_device radio_device tee_device Access to audio_device is still needed since some ALSA interfaces (/dev/snd/*) are directly used by system_server. Bug: 110962171 Test: m selinux_policy Change-Id: I740b99813e1f93136bfcaec087b74f0e03b259ad
-
- Nov 28, 2018
-
-
Florian Mayer authored
Bug: 117762471 Test: m Test: flash sailfish Test: profile all running processes with setenforce 1 Change-Id: I71d41d06d2a62190e33b7e3e425a1f7b8039196e
-
Yifan Hong authored
Test: bugreport Bug: 119809588 Change-Id: Ia688d68120daebc0a4feb51c4745535e1b371594
-
- Nov 27, 2018
-
-
Hongyi Zhang authored
server_configurable_flags_data_file is used for storing server configurable flags which have been reset during current booting. system_server needs to read the data to perform related disaster recovery actions. For how the data is read, see SettingsToPropertiesMapper.java. Test: build succeeds & manual on device Change-Id: Ifa22aecc13af2c574579299d28433622abbe6b85
-
- Nov 22, 2018
-
-
Neda Topoljanac authored
We introduced a new API to allow Device Owner to install an OTA file on disk. This in turn requires system_server to be able to copy the OTA file to a known OTA file location, call into update_engine to start the installation and let update_engine to call back to the system_server to deliver any error conditions asynchronously. This CL modifies the SELinux policy to allow these interaction. Test: manual in TestDPC, CTS tests for negative cases: atest com.android.cts.devicepolicy.DeviceOwnerTest#testInstallUpdate Change-Id: Id1fbea9111f753c5c80f270c269ecb9ef141cd79 Bug: 111173669
-
- Nov 21, 2018
-
-
Nick Kralevich authored
Used at: https://android.googlesource.com/platform/frameworks/base/+/7271c452a945a629c39fe885058c14c4ad11204e/services/core/jni/com_android_server_PersistentDataBlockService.cpp#60 Addresses the following denials: audit(0.0:413): avc: denied { ioctl } for comm="Binder:1365_1C" path="/dev/block/sdg1" dev="tmpfs" ino=20555 ioctlcmd=127d scontext=u:r:system_server:s0 tcontext=u:object_r:frp_block_device:s0 tclass=blk_file permissive=0 audit(0.0:410): avc: denied { ioctl } for comm="Binder:1365_3" path="/dev/block/sdg1" dev="tmpfs" ino=20555 ioctlcmd=1277 scontext=u:r:system_server:s0 tcontext=u:object_r:frp_block_device:s0 tclass=blk_file permissive=0 Test: policy compiles. Change-Id: I7614b6269031b7912a7b93dc5307f5687458fba8
-
- Nov 19, 2018
-
-
Dario Freni authored
This is used for querying the installed packages, as well as coordinating the installations of packages. Test: ran an app that queries PM, that queries apexd. Bug: 117589375 Change-Id: I38203ffe6d0d312d6cc38e131a29c14ace0ba10c
-
Hongyi Zhang authored
system server reads this property to keep track of whether server configurable flags have been reset during current boot. system server needs this information to decide whether to perform following disaster recovery actions on framework level. the get_prop added in this cl in system_server.te is not grouped in the same place as the set_prop in system_server.te in another cl (https://android-review.googlesource.com/c/platform/system/sepolicy/+/828284). This is because these 2 properties are serving for different purposes: device_config_flags_health_check_prop is used to control features(so will be all the future set_prop added by other feature teams under "# server configurable flags properties"), while device_config_reset_performed_prop is used by our API's internal implementation. So I feel like it might be clearer if I put this get_prop in a different place rather than appending to "# server configurable flags properties". Test: build suceeded. Change-Id: I64379aa8f0bbe093969b98d62093696a32aabe59
-
- Nov 17, 2018
-
-
Hongyi Zhang authored
device_config_flags_health_check_prop is used for enabling/disabling program flags_health_check which is executed during device booting. "1" means enabling health check actions in flags_health_check, other values mean flags_health_check will not perform any action. Test: build succeeded & manual test Change-Id: I93739dc5d155e057d72d08fd13097eb63c1193b5
-
- Nov 16, 2018
-
-
Nick Kralevich authored
Auditallow added in commit 72edbb3e ("Audit generic debugfs access for removal", May 01 2018) has not triggered. Remove allow rule and tighten up neverallow rule. Test: policy compiles Test: no collected SELinux denials. Change-Id: I9a90463575f9eab4711b72d6f444fa9d526b80e1
-
- Nov 15, 2018
-
-
Mårten Kongstad authored
Bug: 78815803 Test: builds, boots Test: manual: adb shell idmap2 create ... Test: manual: adb shell ps | grep -e idmap2d Change-Id: I60852e15d99329896ff9de6559d1e7cd1c67e33d
-
- Nov 14, 2018
-
-
Florian Mayer authored
Test: m Test: flash sailfish Test: profile system_server Change-Id: I577793af655146ee91be86bb286fcf9d6e6d081d
-
- Nov 13, 2018
-
-
Risan authored
We are moving AppFuse mount from system_server's mount namespace to vold. Hence, we could reduce the SELinux permissions given to system_server, in the expense of adding allow rules to vold and letting appdomain have access to vold's fd. Bug: 110379912 Test: testOpenProxyFileDescriptor passes (after vold and system_server code changes) Change-Id: I827a108bd118090542354360a8c90b295e6a0fef
-
- Nov 08, 2018
-
-
Peiyong Lin authored
Historically GPU service lives in SurfaceFlinger as a convenient hack. Howerver, SurfaceFlinger doesn't need to know about anything specific about GPU capability, and shouldn't know about anything about GPU. This patch moves GPU service out of SurfaceFlinger. GPU service is a service that accesses to GPU driver, queries GPU capabilities and reports back. Currently we use this information in CTS and some benchmarks. BUG: 118347356 Test: Build, flash and boot, use `adb shell cmd gpu vkjson` to verify Change-Id: I007989e0f3f73b5caf80277979986820dd127c32
-
- Nov 01, 2018
-
-
Nick Kralevich authored
Require all SELinux domains which have permission to perform ioctls on /dev/tun explicitly specify what ioctls they perform. Only allow the safe defaults FIOCLEX and FIONCLEX, which are alternate, uncommon ways to set and unset the O_CLOEXEC flag. Remove app's ability to issue *any* ioctls on /dev/tun, period. Add neverallow assertions (compile time assertion + CTS test) to prevent regressions. Limit system_server's ability to perform ioctls on /dev/tun to FIOCLEX, FIONCLEX, TUNGETIFF, and TUNSETIFF. Testing and source code examination shows that only TUNGETIFF and TUNSETIFF are used by system_server. The goal of this change is to put SELinux ioctl controls in place for /dev/tun, so we don't have to maintain the custom kernel patch at https://android.googlesource.com/kernel/common/+/11cee2be0c2062ba88f04eb51196506f870a3b5d%5E%21 Delete the neverallow assertion in isolated_app.te. This is already covered by the assertion present in app_neverallows.te. Test: cts-tradefed run cts -m CtsHostsideNetworkTests -t com.android.cts.net.HostsideVpnTests Test: cts-tradefed run cts -m CtsHostsideNetworkTests Test: cts-tradefed run cts -m CtsNetTestCases Bug: 111560739 Bug: 111560570 Change-Id: Ibe1c3a9e880db0bee438535554abdbc6d84eec45
-
- Oct 31, 2018
-
-
Nick Kralevich authored
Create a transient SELinux domain where system_server can perform certain JIT setup. The idea is that system_server will start in the system_server_startup domain, setup certain JIT pages, then perform a one-way transition into the system_server domain. From that point, further JITing operations are disallowed. Bug: 62356545 Test: device boots, no permission errors Change-Id: Ic55b2cc5aba420ebcf62736622e08881a4779004
-
- Oct 30, 2018
-
-
Nick Kralevich authored
This reverts commit 67ed4328. Reason for revert: Broken CTS test. See b/118642091 Bug: 118642091 Bug: 110379912 Change-Id: I5afd16bf23149c74f2740720cdd248a255ff1497
-
- Oct 26, 2018
-
-
Risan authored
We are moving AppFuse mount from system_server's mount namespace to vold. Hence, we could reduce the SELinux permissions given to system_server, in the expense of adding allow rules to vold and letting appdomain have access to vold's fd. Bug: 110379912 Test: testOpenProxyFileDescriptor passes (after vold and system_server code changes) Change-Id: I4731a8ec846c5cb84ec4b680d51938494e8ddd75
-
Tri Vo authored
Remove blanket coredomain access to same_process_hal_file in favor of granular access. This change takes into account audits from go/sedenials (our internal dogfood program) Bug: 37211678 Test: m selinux_policy Change-Id: I5634fb65c72d13007e40c131a600585a05b8c4b5
-
- Oct 12, 2018
-
-
Siarhei Vishniakou authored
Input device configuration files .idc, .kl that are placed in /vendor are currently not accessible. Allow the read access here. Bug: 112880217 Test: move .idc and .kl files from /system to /vendor, then observe logcat. With this patch, avc denials disappear. Change-Id: I72ad62b9adf415f787565adced73fd8aaff38832
-
- Oct 08, 2018
-
-
Howard Ro authored
We plan on migrating MetricsLogger to write to statsd socket. So we need to allow zygote, which writes to logd using MetricsLogger, to also be able to statsd. We also re-locate some sepolicies to write to statsd socket in their respective policy definitions. Bug: 110537511 Test: no failure/violations observed Change-Id: I21fd352a25ed946516f9a45ac3b5e9bf97b059bc
-
- Sep 24, 2018
-
-
Tej Singh authored
This adds /proc/uid_io/stats to the files that system server is able to read. Test: Manual test on master produces no selinux violations. Change-Id: I2c7afec149f893b000094739d91531dec559de6f
-
- Sep 14, 2018
-
-
Jeff Vander Stoep authored
Bug: 9496886 Bug: 109758967 Test: atest HostsideVpnTests Change-Id: I1716d9c740b374b861e691b31ab271c681cf6bff
-
- Sep 13, 2018
-
-
Yangster authored
Test: manual test BUG: b/112432890 Change-Id: If703cd25a2c0864ffd49bfdc83821fae291974b5
-
- Sep 12, 2018
-
-
Nick Kralevich authored
Test: comments only. Policy compiles. Change-Id: Ic51533d37fff6c553950a122f33a48e3c119c67c
-
- Aug 14, 2018
-
-
Tri Vo authored
Bug: 78888165 Test: device can boot with HAL running. Change-Id: I3bf7c8203e038b892176c97ec006152a2904c7be
-
- Aug 10, 2018
-
-
David Ng authored
Linux kernel 4.14+ SELinux starts explicit map permission check for file mmap operations. Add this permission to system_server for data file access, which is used in scenario such as "adb install" of APK's. test: no longer see SELinux map denial on "adb install" Change-Id: Id6016dd0b3f15dfdb0f02509ea812dee61ac78ed
-
- Aug 09, 2018
-
-
Chia-I Wu authored
This is needed to dump ANR traces for the process. Bug: 111604912 Test: adb shell am hang Change-Id: Icadc2de95a12818fe623271d1afb955843ccddbf
-
- Aug 02, 2018
-
-
Nick Kralevich authored
Currently, both untrusted apps and priv-apps use the SELinux file label "app_data_file" for files in their /data/data directory. This is problematic, as we really want different rules for such files. For example, we may want to allow untrusted apps to load executable code from priv-app directories, but disallow untrusted apps from loading executable code from their own home directories. This change adds a new file type "privapp_data_file". For compatibility, we adjust the policy to support access privapp_data_files almost everywhere we were previously granting access to app_data_files (adbd and run-as being exceptions). Additional future tightening is possible here by removing some of these newly added rules. This label will start getting used in a followup change to system/sepolicy/private/seapp_contexts, similar to: -user=_app isPrivApp=true domain=priv_app type=app_data_file levelFrom=user +user=_app isPrivApp=true domain=priv_app type=privapp_data_file levelFrom=user For now, this newly introduced label has no usage, so this change is essentially a no-op. Test: Factory reset and boot - no problems on fresh install. Test: Upgrade to new version and test. No compatibility problems on filesystem upgrade. Change-Id: I9618b7d91d1c2bcb5837cdabc949f0cf741a2837
-
- Jul 17, 2018
-
-
Josh Gao authored
Test: debuggerd -j `pidof system_server` Change-Id: I6cca98b20ab5a135305b91cbb7c0fe7b57872bd3
-