1. 18 Aug, 2015 1 commit
  2. 04 Aug, 2015 1 commit
    • Roozbeh Pournader's avatar
      Use the special CONSTRAINED font bucket for flo. · c761ab30
      Roozbeh Pournader authored
      This is a temporary font profile to get razor and razorg (Nexus 7,
      2013 version). It's not tested thoroughly, and should not be used for
      any other devices.
      
      The CONSTRAINED profile removes Bamum, Lisu, Mandaic, Mongolian, New
      Tai Lue, Syriac, Tibetan, and Vai fonts from razor[g] devices, and
      switches the CJK fonts to the limited pre-Lollipop fonts.
      
      Bug: 22929087
      Change-Id: I7edd001adf950fcf787a28c416aada9b449f2197
      c761ab30
  3. 12 Jun, 2015 1 commit
  4. 11 Jun, 2015 1 commit
  5. 05 May, 2015 1 commit
  6. 01 Apr, 2015 1 commit
  7. 06 Feb, 2015 1 commit
  8. 21 Nov, 2014 2 commits
  9. 20 Nov, 2014 1 commit
  10. 19 Aug, 2014 2 commits
  11. 15 Aug, 2014 1 commit
  12. 14 Aug, 2014 1 commit
  13. 17 Jul, 2014 3 commits
    • Nick Kralevich's avatar
      Update selinux rules for rmt_storage · 47f46121
      Nick Kralevich authored
      Google's internal master has been updated to not use
      /dev/mem. Update the SELinux rules to allow for this.
      
      Keep rmt in permissive for AOSP. The updated userspace / kernel
      aren't in AOSP, and we don't want to break those users.
      We'll flip this to enforcing in Google's internal tree.
      
      (cherry picked from commit 023162b9)
      
      Change-Id: Idcd3952608cac966c045dad3fc8c1dc73311e6e6
      47f46121
    • Nick Kralevich's avatar
      Update selinux rules for rmt_storage · 65650fd6
      Nick Kralevich authored
      Google's internal master has been updated to not use
      /dev/mem. Update the SELinux rules to allow for this.
      
      Keep rmt in permissive for AOSP. The updated userspace / kernel
      aren't in AOSP, and we don't want to break those users.
      We'll flip this to enforcing in Google's internal tree.
      
      (cherry picked from commit 023162b9)
      
      Change-Id: Ie9de15361c4f283baa912bcd15e3e3c93c897c6a
      65650fd6
    • Nick Kralevich's avatar
      Update selinux rules for rmt_storage · 023162b9
      Nick Kralevich authored
      Google's internal master has been updated to not use
      /dev/mem. Update the SELinux rules to allow for this.
      
      Keep rmt in permissive for AOSP. The updated userspace / kernel
      aren't in AOSP, and we don't want to break those users.
      We'll flip this to enforcing in Google's internal tree.
      
      Change-Id: I18fdc7d6c718252e1efe4f1a4dabfc6866c1dc8d
      023162b9
  14. 16 Jun, 2014 3 commits
  15. 04 Jun, 2014 1 commit
  16. 30 May, 2014 1 commit
    • Robert Craig's avatar
      Drop ppd selinux policy. · 159a3411
      Robert Craig authored
      
      The ppd service which runs the mm-pp-daemon binary appears
      to no longer be used. The last occurrence of the binary for
      either flo or deb is with the jss15r and jls36i builds
      respectively. In fact, current builds report that the ppd
      service is explicitly being disabled.
      
      <3>[    5.023345] init: cannot find '/system/bin/mm-pp-daemon', disabling 'ppd'
      
      Thus, just drop the selinux policy for it. While we're
      at it, drop the ppd service entries from the init.flo.rc
      file too.
      
      Change-Id: I5902b6876d5bea33bb65dcaa505fc4ee13a61677
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      159a3411
  17. 01 Apr, 2014 1 commit
  18. 06 Mar, 2014 1 commit
    • Robert Craig's avatar
      SELinux: Allow hostapd to read wifi data files under /persist. · 66cfafa5
      Robert Craig authored
      
      Addresses the following denials:
        avc:  denied  { search } for  pid=9143 comm="hostapd" name="wifi" dev="mmcblk0p16" ino=12 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=dir
        avc:  denied  { getattr } for  pid=9143 comm="hostapd" path="/persist/wifi/.macaddr" dev="mmcblk0p16" ino=19 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=file
        avc:  denied  { read } for  pid=9143 comm="hostapd" name=".macaddr" dev="mmcblk0p16" ino=19 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=file
        avc:  denied  { open } for  pid=9143 comm="hostapd" name=".macaddr" dev="mmcblk0p16" ino=19 scontext=u:r:hostapd:s0 tcontext=u:object_r:persist_wifi_file:s0 tclass=file
      
      Change-Id: I0e86c92d91601c341c1798f869b935b359c2577a
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      66cfafa5
  19. 20 Feb, 2014 2 commits
    • Robert Craig's avatar
      Move SELinux diag_device policy to userdebug/eng. · ba571057
      Robert Craig authored
      
      Also just remove all specific domain access and instead
      allow diag_device access for all domains on the
      userdebug/user builds.
      
      Change-Id: I2dc79eb47e05290902af2dfd61a361336ebc8bca
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      ba571057
    • Robert Craig's avatar
      Address SELinux denials with rild. · 62d77eec
      Robert Craig authored
      
      Allow r/w access to /dev/diag on userdebug/eng builds.
        avc:  denied  { read write } for  pid=204 comm="rild" name="diag" dev="tmpfs" ino=8404 scontext=u:r:rild:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file
        avc:  denied  { open } for  pid=204 comm="rild" name="diag" dev="tmpfs" ino=8404 scontext=u:r:rild:s0 tcontext=u:object_r:diag_device:s0 tclass=chr_file
      
      Grant radio sockets access to rild.
        avc:  denied  { write } for  pid=323 comm="rild" name="qmux_radio" dev="tmpfs" ino=1053 scontext=u:r:rild:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=dir
        avc:  denied  { write } for  pid=323 comm="rild" name="qmux_connect_socket" dev="tmpfs" ino=1309 scontext=u:r:rild:s0 tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file
        avc:  denied  { connectto } for  pid=323 comm="rild" path="/dev/socket/qmux_radio/qmux_connect_socket" scontext=u:r:rild:s0 tcontext=u:r:qmux:s0 tclass=unix_stream_socket
      
      Change-Id: I89f7531fb006bfcae9f97b979fba61f3ed6badde
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      62d77eec
  20. 03 Feb, 2014 1 commit
  21. 18 Dec, 2013 1 commit
  22. 12 Dec, 2013 1 commit
  23. 25 Nov, 2013 1 commit
    • Robert Craig's avatar
      SELinux policy updates. · df2aa61a
      Robert Craig authored
      * Make gpu_device a trusted object since all apps can
        write to the device.
          denied  { write } for  pid=3460 comm="ense_free.menus" name="kgsl-3d0" dev="tmpfs" ino=7606 scontext=u:r:untrusted_app:s0:c92,c256 tcontext=u:object_r:gpu_device:s0 tclass=chr_file
      
      * Drop dead type mpdecision_device.
      
      * Create policy for mm-pp-daemon and keep it permissive.
        Address the following initial denials.
          denied  { write } for  pid=220 comm="mm-pp-daemon" name="property_service" dev="tmpfs" ino=7289 scontext=u:r:ppd:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file
          denied  { connectto } for  pid=220 comm="mm-pp-daemon" path="/dev/socket/property_service" scontext=u:r:ppd:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket
          denied  { read write } for  pid=220 comm="mm-pp-daemon" name="fb0" dev="tmpfs" ino=8523 scontext=u:r:ppd:s0 tcontext=u:object_r:graphics_device:s0 tclass=chr_file
          denied  { open } for  pid=220 comm="mm-pp-daemon" name="fb0" dev="tmpfs" ino=8523 scontext=u:r:ppd:s0 tcontext=u:object_r:graphics_device:s0 tclass=chr_file
          denied  { ioctl } for  pid=220 comm="mm-pp-daemon" path="/dev/graphics/fb0" dev="tmpfs" ino=8523 scontext=u:r:ppd:s0 tcontext=u:object_r:graphics_device:s0 tclass=chr_file
      
      * Add kickstart_exec labels for kickstart binaries
        that are used by deb devices.
      
      * Add tee policy. Label /data/misc/playready and
        allow tee access.
          denied  { write } for  pid=259 comm="qseecomd" name="misc" dev="mmcblk0p30" ino=635233 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
          denied  { read } for  pid=232 comm="qseecomd" name="/" dev="mmcblk0p30" ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
          denied  { create } for  pid=306 comm="qseecomd" name="playready" scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir
          denied  { search } for  pid=282 comm="qseecomd" name="playready" dev="mmcblk0p30" ino=635262 scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir
          denied  { read } for  pid=282 comm="qseecomd" name="playready" dev="mmcblk0p30" ino=635262 scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir
          denied  { write } for  pid=265 comm="qseecomd" name="playready" dev="mmcblk0p30" ino=635262 scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=dir
          denied  { create } for  pid=252 comm="qseecomd" name="tzdrm.log" scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=file
          denied  { read write open } for  pid=271 comm="qseecomd" name="tzdrm.log" dev="mmcblk0p30" ino=635264 scontext=u:r:tee:s0 tcontext=u:object_r:drm_data_file:s0 tclass=file
      
      * Give surfaceflinger access to /dev/socket/pps and allow
        access to certain sysfs nodes.
          denied  { write } for  pid=181 comm="surfaceflinger" name="pps" dev="tmpfs" ino=7958 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:ppd_socket:s0 tclass=sock_file
          denied  { write } for  pid=182 comm="surfaceflinger" name="hpd" dev="sysfs" ino=9639 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:sysfs:s0 tclass=file
      
      Change-Id: Ia7a5c63365593af7ac5adc207b27fad113b01dd3
      df2aa61a
  24. 15 Nov, 2013 1 commit
    • Robert Craig's avatar
      Add to selinux policy. · 9d6624a0
      Robert Craig authored
      Bring policy over from the mako board which
      has a lot of similar domains and services.
      mako is also a Qualcomm board which allows
      a lot of that policy to be directly brought
      over and applied.
      
      Included in this are some radio specific
      pieces. Though not directly applicable to
      flo, the deb board inherits this policy.
      
      Change-Id: I6b294c7dc830189c08f1f981a239234a2c3f577f
      9d6624a0
  25. 14 Nov, 2013 3 commits
    • Robert Craig's avatar
      Create new security labels for device nodes. · 6e899c85
      Robert Craig authored
      Labeling nodes with appropriate types doesn't
      introduce any new denials to the mix. This
      list largely addresses the Qualcomm specific
      nodes.
      
      Various nodes are labeled with radio specific
      types. Since the deb build inherits from this flo
      policy, it is a good idea to include them.
      
      Change-Id: Ia55a80af027c8bde933d45c41f4ed287f01adb2e
      6e899c85
    • Robert Craig's avatar
      Label kgsl (graphics) nodes. · c1dd2c83
      Robert Craig authored
      Created a new label and addressed the following denials.
      
      * For system server
          denied  { read write } for  pid=800 comm="ndroid.systemui" name="kgsl-3d0" dev="tmpfs" ino=8426 scontext=u:r:platform_app:s0 tcontext=u:object_r:device:s0 tclass=chr_file
          denied  { open } for  pid=800 comm="ndroid.systemui" name="kgsl-3d0" dev="tmpfs" ino=8426 scontext=u:r:platform_app:s0 tcontext=u:object_r:device:s0 tclass=chr_file
          denied  { ioctl } for  pid=800 comm="ndroid.systemui" path="/dev/kgsl-3d0" dev="tmpfs" ino=8426 scontext=u:r:platform_app:s0 tcontext=u:object_r:device:s0 tclass=chr_file
      
      * For surfaceflinger
          denied  { ioctl } for  pid=286 comm="SurfaceFlinger" path="/dev/kgsl-3d0" dev="tmpfs" ino=8426 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:device:s0 tclass=chr_file
          denied  { read write } for  pid=286 comm="SurfaceFlinger" path="/dev/kgsl-3d0" dev="tmpfs" ino=8426 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:device:s0 tclass=chr_file
      
      * For app domains
          denied  { read write } for  pid=800 comm="ndroid.systemui" name="kgsl-3d0" dev="tmpfs" ino=8426 scontext=u:r:platform_app:s0 tcontext=u:object_r:device:s0 tclass=chr_file
          denied  { open } for  pid=800 comm="ndroid.systemui" name="kgsl-3d0" dev="tmpfs" ino=8426 scontext=u:r:platform_app:s0 tcontext=u:object_r:device:s0 tclass=chr_file
          denied  { ioctl } for  pid=800 comm="ndroid.systemui" path="/dev/kgsl-3d0" dev="tmpfs" ino=8426 scontext=u:r:platform_app:s0 tcontext=u:object_r:device:s0 tclass=chr_file
      
      Change-Id: I417bbd12fbdc17cd3d1110dcf3bff73dd5e385a4
      c1dd2c83
    • Nick Kralevich's avatar
      fix broken wifi on flo/deb · 226d605c
      Nick Kralevich authored
      00739e3d14f2f1ea9240037283c3edd836d2aa2f in external/sepolicy
      moved ueventd into enforcing. This broke wifi on flo/deb.
      Fix it.
      
      This addresses the following denials:
      
      <5>[  219.755523] type=1400 audit(1384456650.969:107): avc:  denied  { search } for  pid=2868 comm="ueventd" name="wifi" dev="mmcblk0p30" ino=637740 scontext=u:r:ueventd:s0 tcontext=u:object_r:wifi_data_file:s0 tclass=dir
      <5>[  219.755706] type=1400 audit(1384456650.969:108): avc:  denied  { read } for  pid=2868 comm="ueventd" name="WCNSS_qcom_cfg.ini" dev="mmcblk0p30" ino=637747 scontext=u:r:ueventd:s0 tcontext=u:object_r:wifi_data_file:s0 tclass=file
      <5>[  219.755889] type=1400 audit(1384456650.969:109): avc:  denied  { open } for  pid=2868 comm="ueventd" name="WCNSS_qcom_cfg.ini" dev="mmcblk0p30" ino=637747 scontext=u:r:ueventd:s0 tcontext=u:object_r:wifi_data_file:s0 tclass=file
      <5>[  219.756134] type=1400 audit(1384456650.969:110): avc:  denied  { getattr } for  pid=2868 comm="ueventd" path="/data/misc/wifi/WCNSS_qcom_cfg.ini" dev="mmcblk0p30" ino=637747 scontext=u:r:ueventd:s0 tcontext=u:object_r:wifi_data_file:s0 tclass=file
      
      Bug: 11688129
      Change-Id: Ice0d3432010cfbbce88dd0ede013af3b2297d3d6
      226d605c
  26. 08 Nov, 2013 1 commit
    • Nick Kralevich's avatar
      Move rmt into its own domain. · 40b7b28d
      Nick Kralevich authored
      Don't run rmt in init's domain. /system/bin/rmt_storage
      is a qualcomm specific daemon responsible for servicing modem
      filesystem requests. It doesn't make sense to run rmt_storage
      in init's domain, as doing so prevents us from fine tuning
      its policy.
      
      Keep the domain in permissive mode right now until we address
      the following denials:
      
      <5>[    7.497467] type=1400 audit(1383939680.983:5): avc:  denied  { read write } for  pid=193 comm="rmt_storage" name="mem" dev="tmpfs" ino=4010 scontext=u:r:rmt:s0 tcontext=u:object_r:kmem_device:s0 tclass=chr_file
      <5>[    7.497741] type=1400 audit(1383939680.983:6): avc:  denied  { open } for  pid=193 comm="rmt_storage" name="mem" dev="tmpfs" ino=4010 scontext=u:r:rmt:s0 tcontext=u:object_r:kmem_device:s0 tclass=chr_file
      
      We still need to get a better understanding of what rmt_storage
      does and what rules should be applied to it.
      
      Change-Id: I45d03fb93870f1b4bb64215f5dcd9a2a443f5566
      40b7b28d
  27. 06 Nov, 2013 1 commit
    • Nick Kralevich's avatar
      Label /dev/qseecom · 203fd0df
      Nick Kralevich authored
      Otherwise keystore in enforcing is broken.
      
      Bug: 11518274
      Change-Id: I10ead7cabe794d1752a8cba4dc3193217aad7805
      203fd0df
  28. 07 Oct, 2013 1 commit
  29. 06 Sep, 2013 2 commits
  30. 10 Jul, 2013 1 commit