- Nov 20, 2017
-
-
Jeff Vander Stoep authored
This reverts commit d4785c37. Temporarily revert to fix crosshatch. Test: crosshatch now builds
-
Jeff Vander Stoep authored
am: f9108496 Change-Id: If570c2eea00974f67253b1868973822c987f45e0
-
Jeff Vander Stoep authored
am: 497e7aeb Change-Id: I85c0ecaeabf37362b84497055db441aa64c92eb0
-
Jeff Vander Stoep authored
am: d4785c37 Change-Id: I41603590882cb4d70cb1636af5902edad1af0118
-
Jeff Vander Stoep authored
Sharing data folders by path will be disallowed because it violates the approved API between platform and vendor components tested by VTS. Move all violating permissions from core selinux policy to device specific policy so that we can exempt existing devices from the ban and enforce it on new devices. Bug: 34980020 Test: Move permissions. Build and test wifi, wifi AP, nfc, fingerprint and Play movies on Marlin and Taimen. Test: build on Angler, Bullhead, Dragon, Fugu, Marlin, Walleye Change-Id: Ib6fc9cf1403e74058aaae5a7b0784922f3172b4e
-
- Nov 17, 2017
-
-
Jeff Vander Stoep authored
am: 4eb9687f Change-Id: I4b31f1067f7e845afce4d1cf6c77176d2b97ff4b
-
Jeff Vander Stoep authored
am: 21ce3450 Change-Id: Ic4cabef801675f28f6fe81c6034cff377ec59791
-
Jeff Vander Stoep authored
am: 0f5ad4e5 Change-Id: Idcf4b52877a51c2c330a72ba416076c686e29535
-
Jeff Vander Stoep authored
Exclude vendor processes. Bug: 69309298 Test: cts-tradefed run cts -m CtsCompilationTestCases completed in 33s. 5 passed, 0 failed Test: runtest frameworks-services -c \ com.android.server.pm.dex.DexoptOptionsTests \ --install=".*FrameworksServicesTests.apk" OK (5 tests) Change-Id: Ic02caf373e2214b4b931a724ca8d4f4effbc0741
-
Tri Vo authored
-
Chenbo Feng authored
am: 997fcf16 Change-Id: Ic4fe495fb1064d32b4bac28242c53dae06e7ed70
-
Chenbo Feng authored
am: a6966554 Change-Id: I8c09069290ffe1827212206b81616e9302bfe7ea
-
Chenbo Feng authored
am: cd753d11 Change-Id: I01a332c51aa4a5c62e5b2bb4ba13565b48c46b88
-
Treehugger Robot authored
-
Vishnu Nair authored
am: 51871966 Change-Id: Id7363e8c5e6bc6a41bb74e0536eb80577189107d
-
Vishnu Nair authored
am: dcd0baf6 Change-Id: I07782169b7a9b4ad05d8915e43599c0ae158fb2b
-
Vishnu Nair authored
am: 97c86514 Change-Id: I170162843b04280105c76d4e5d7a8d3f89583588
-
Treehugger Robot authored
-
Tri Vo authored
Added access to proc_uptime and proc_asound to address these denials: avc: denied { read } for name="uptime" dev="proc" ino=4026532080 scontext=u:r:shell:s0 tcontext=u:object_r:proc_uptime:s0 tclass=file permissive=1 avc: denied { getattr } for path="/proc/asound/version" dev="proc" ino=4026532017 scontext=u:r:shell:s0 tcontext=u:object_r:proc_asound:s0 tclass=file permissive=1 Bug: 65643247 Test: device boots with no denial from 'shell' domain. Test: lsmod, ps, top, netstat Test: No denials triggered from CtsSecurityHostTestCases Test: external/toybox/run-tests-on-android.sh does not pass, but triggers no denials from 'shell' domain to 'proc' type. Change-Id: Ia4c26fd616e33e5962c6707a855dc24e338ec153
-
Tri Vo authored
-
Vishnu Nair authored
- Allow system_server to create and write to /data/misc/wmtrace/* - Allow surfaceflinger to create and write files from /data/misc/wmtrace/* - Allow dumpstate to read files from /data/misc/wmtrace/* permissions are restricted to userdebug or eng builds Bug: 64831661 Test: adb shell cmd window tracing start && adb shell cmd window tracing stop Test: adb shell su root service call SurfaceFlinger 1025 i32 1 >/dev/null && adb shell su root service call SurfaceFlinger 1025 i32 0 >/dev/null Test: adb bugreport ~/tmp.zip && adb shell su root dmesg | grep 'avc: ' Change-Id: I0b15166560739d73d7749201f3ad197dbcf5791c
-
Treehugger Robot authored
-
Tri Vo authored
Bug: 65643247 Test: cts-tradefed run cts-dev -m \ CtsMediaTestCases --compatibility:module-arg \ CtsMediaTestCases:include-annotation:\ android.platform.test.annotations.RequiresDevice No denials from mediaserver domain to sysfs type are observed. Change-Id: Icb5c12f04af213452d82e226993fe13085c5c33f
-
- Nov 16, 2017
-
-
Jeff Vander Stoep authored
am: c31c9096 Change-Id: I63b9ef7dc9ef200bdf4c520c6c93649655e63d33
-
Jeff Vander Stoep authored
am: f6aa0695 Change-Id: I109c44d4ebbb08aa5eb78e4d8a3b8ac106411dc2
-
Jeff Vander Stoep authored
am: 13c69b89 Change-Id: I81e8cc02afa5b87419a4e70ab46a70ca43b85c43
-
Tri Vo authored
Label /proc/sys/fs/pipe-max-size with new type proc_pipe_conf and give system_server access to it. Addresses this denial: avc: denied { read } for name="pipe-max-size" dev="proc" ino=93817 scontext=u:r:system_server:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0 Bug: 69175449 Bug: 69324398 Test: sailfish boots Test: adb bugreport Test: craft an unresponsive app, trigger ANR, make sure traces are dumped into /data/anr Above denial from system_server not observed, no denials to proc_pipe_conf observed. Change-Id: I7c71f05820a4945ba982e29f76e9d9f4458b2b59
-
Jeff Vander Stoep authored
Only getattr and read are necessary for lnk_file. Open violates a new neverallow for separating system and vendor data. Bug: 34980020 Test: Enroll fingerprint on Taimen Change-Id: I9434afbd5b4ecc1ead9f0ba47c7582fb5a6c6bf0
-
Nicolas Geoffray authored
am: fa7f3a9d Change-Id: Id56db24bfb5821d7a7255b8646fb2dfcf22271d9
-
Nicolas Geoffray authored
am: 0181d23f Change-Id: I7c75b607ce60eb60f8b0bfb58ed8a190940a8239
-
Nicolas Geoffray authored
am: 0d7e5047 Change-Id: I29fd343005136d580763eff843fa94e8e3318c06
-