- Mar 20, 2017
-
-
Alex Klyubin authored
am: 00a03d42 Change-Id: I0d66b07b8fa3f1a992fd2b3a864dafb3c9c7eb0c
-
Alex Klyubin authored
This adjusts the grants for recovery to make it explicit that recovery can use the Boot Control HAL only in passthrough mode. Test: Device boots up, no new denials Test: Reboot into recovery, sideload OTA update succeeds Test: Apply OTA update via update_engine: 1. make dist 2. Ensure device has network connectivity 3. ota_call.py -s <serial here> out/dist/sailfish-ota-*.zip Bug: 34170079 Change-Id: I0888816eca4d77939a55a7816e6cae9176713ee5
-
Alex Klyubin authored
am: 51a2238c Change-Id: I612c84a8e27d6b2db8008fd8f71dc5c5f8c7f6d8
-
Treehugger Robot authored
-
- Mar 18, 2017
-
-
Alex Klyubin authored
This switches Boot Control HAL policy to the design which enables us to conditionally remove unnecessary rules from domains which are clients of Boot Control HAL. Domains which are clients of Boot Control HAL, such as update_server, are granted rules targeting hal_bootctl only when the Boot Control HAL runs in passthrough mode (i.e., inside the client's process). When the HAL runs in binderized mode (i.e., in another process/domain, with clients talking to the HAL over HwBinder IPC), rules targeting hal_bootctl are not granted to client domains. Domains which offer a binderized implementation of Boot Control HAL, such as hal_bootctl_default domain, are always granted rules targeting hal_bootctl. P. S. This commit removes direct access to Boot Control HAL from system_server because system_server is not a client of this HAL. This commit also removes bootctrl_block_device type which is no longer used. Finally, boot_control_hal attribute is removed because it is now covered by the hal_bootctl attribute. Test: Device boots up, no new denials Test: Reboot into recovery, sideload OTA update succeeds Test: Apply OTA update via update_engine: 1. make dist 2. Ensure device has network connectivity 3. ota_call.py -s <serial here> out/dist/sailfish-ota-*.zip Bug: 34170079 Change-Id: I9c410c092069e431a3852b66c04c4d2a9f1a25cf
-
- Mar 17, 2017
-
-
Jorge Lucangeli Obes authored
am: 11ce09bc Change-Id: I8e964a15af674c16e8272fdcf3c617eb5821c64a
-
Treehugger Robot authored
-
Jorge Lucangeli Obes authored
The fix for b/35100237 surfaced this error. This SELinux policy fragment was included only on Marlin, but needs to be included in core policy. Bug: 35100237 Test: With https://android-review.googlesource.com/#/c/354292/ Test: Set up PPTP VPN using http://www.vpnbook.com/ on Marlin. Test: Connect: 03-17 15:41:22.602 3809 3809 I mtpd : Starting pppd (pppox = 9) 03-17 15:41:22.628 3811 3811 I pppd : Using PPPoX (socket = 9) 03-17 15:41:22.637 3811 3811 I pppd : pppd 2.4.7 started by vpn, uid 1016 03-17 15:41:22.639 3811 3811 I pppd : Using interface ppp0 03-17 15:41:22.639 3811 3811 I pppd : Connect: ppp0 <--> 03-17 15:41:22.770 3811 3811 I pppd : CHAP authentication succeeded 03-17 15:41:22.909 3811 3811 I pppd : MPPE 128-bit stateless compression enabled 03-17 15:41:23.065 3811 3811 I pppd : local IP address 172.16.36.113 03-17 15:41:23.065 3811 3811 I pppd : remote IP address 172.16.36.1 03-17 15:41:23.065 3811 3811 I pppd : primary DNS address 8.8.8.8 03-17 15:41:23.065 3811 3811 I pppd : secondary DNS address 91.239.100.100 Change-Id: I192b4dfc9613d1000f804b9c4ca2727d502a1927
-
Andreas Gampe authored
am: 3cc71b09 Change-Id: I09b098573619738cfaf8da9c84e6321bad72e6fa
-
Andreas Gampe authored
am: f7c2613e Change-Id: I8153d6c7fa3d2aa05851f9d3c7de6011165f1302
-
Andreas Gampe authored
Certain libraries may actually be links. Allow OTA dexopt to read those links. Bug: 25612095 Test: m Change-Id: Iafdb899a750bd8d1ab56e5f6dbc09d836d5440ed
-
Andreas Gampe authored
Allow getattr on links for otapreopt_slot. It reads links (to the boot image oat files) when collecting the size of the artifacts for logging purposes. Bug: 30832951 Test: m Change-Id: If97f7a77fc9bf334a4ce8a613c212ec2cfc4c581
-
Alex Klyubin authored
am: 37f7ffa3 Change-Id: I57b6b54327d79011bf0366f46c77cecb2b8826ac
-
Treehugger Robot authored
-
Alex Klyubin authored
This switches most remaining HALs to the _client/_server approach. To unblock efforts blocked on majority of HALs having to use this model, this change does not remove unnecessary rules from clients of these HALs. That work will be performed in follow-up commits. This commit only adds allow rules and thus does not break existing functionality. The HALs not yet on the _client/_server model after this commit are: * Allocator HAL, because it's non-trivial to declare all apps except isolated apps as clients of this HAL, which they are. * Boot HAL, because it's still on the non-attributized model and I'm waiting for update_engine folks to answer a couple of questions which will let me refactor the policy of this HAL. Test: mmm system/sepolicy Test: Device boots, no new denials Test: Device boots in recovery mode, no new denials Bug: 34170079 Change-Id: I03e6bcec2fa02f14bdf17d11f7367b62c68a14b9
-
Calin Juravle authored
am: 83011a26 Change-Id: Ice0df08e8cd5bd6c12a4396c358f6e69a8ee9576
-
Calin Juravle authored
-
- Mar 16, 2017
-
-
Mathias Agopian authored
am: 312e7eaa Change-Id: Ifc9b2ad755b35908b96b887f9223a81c1fd358ce
-
Mathias Agopian authored
Test: take a screenshot Test: run CTS ImageReaderTest Bug: 36194109 (cherry picked from commit 49ed0cd6) Change-Id: I331bce37b35e30084ba9f7ecd063a344a79c5232
-
Jeff Vander Stoep authored
am: 156ccbb2 Change-Id: Ib5709ccd17861915626baf8c7e3864be81a911fe
-
Jiwen 'Steve' Cai authored
am: bfb6a6c5 Change-Id: I884087ec40b5d08b36a6bfc6380c13388078afd2
-
Treehugger Robot authored
-
Calin Juravle authored
The secondary dex files are application dex files which gets reported back to the framework when using BaseDexClassLoader. Also, give dex2oat lock permissions as it needs to lock the profile during compilation. Example of SElinux denial: 03-15 12:38:46.967 7529 7529 I profman : type=1400 audit(0.0:225): avc: denied { read } for path="/data/data/com.google.android.googlequicksearchbox/files/velour/verified_jars/JDM5LaUbYP1JPOLzJ81GLzg_1.jar.prof" dev="sda35" ino=877915 scontext=u:r:profman:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1 Test: adb shell cmd package bg-dexopt-job works for sercondary dex files Bug: 26719109 Change-Id: Ie1890d8e36c062450bd6c54f4399fc0730767dbf
-
Yifan Hong authored
am: 08900a01 Change-Id: I3cee521ec8649fafc161736b873770c9761b0137
-
Treehugger Robot authored
-
Jaesoo Lee authored
am: d363b0f9 Change-Id: I51f72ccf06551aa609e4013ccb50ee628a7af7b7
-
Jaesoo Lee authored
This change defines new policy for modprobe (/sbin/modprobe) that should be used in both recovery and android mode. Denials: [ 16.986440] c0 437 audit: type=1400 audit(6138546.943:5): avc: denied { read } for pid=437 comm="modprobe" name="modules" dev="proc" ino=4026532405 scontext=u:object_r:modprobe:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1 [ 16.986521] c0 437 audit: type=1400 audit(6138546.943:6): avc: denied { open } for pid=437 comm="modprobe" path="/proc/modules" dev="proc" ino=4026532405 scontext=u:object_r:modprobe:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1 [ 16.986544] c0 437 audit: type=1400 audit(6138546.943:7): avc: denied { getattr } for pid=437 comm="modprobe" path="/proc/modules" dev="proc" ino=4026532405 scontext=u:object_r:modprobe:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1 Bug: 35633646 Test: Build and tested it works in sailfish recovery. The modprobe is invoked in init.rc (at the end of 'on init') with following command line exec u:r:modprobe:s0 -- /sbin/modprobe -a nilfs2 ftl Change-Id: Ie70be6f918bea6059f806e2eb38cd48229facafa
-
- Mar 15, 2017
-
-
Jiwen 'Steve' Cai authored
bufferhubd should be able to use sync fence fd from mediacodec; and mediacodec should be able to use a gralloc buffer fd from the bufferhubd. Bug: 32213311 Test: Ran exoplayer_demo and verify mediacodec can plumb buffer through bufferhub. Change-Id: Id175827c56c33890ecce33865b0b1167d872fc56
-
Yifan Hong authored
Test: no log spam for graphics allocator Test: dmesg | audit2allow does not show denial for hal_graphics_allocator_default Test: system is responsive after boot (because android.hardware.graphics.allocator@2.0::IAllocator getService() will not be blocked) Bug: 36220026 Change-Id: I3e103f88988fe4a94888e92ee8c5b1f27845ad9e
-
Jeff Vander Stoep authored
Policy intermediates are being placed in a seemingly random intermediates directories. Currently: out/target/product/marlin/obj_arm/SHARED_LIBRARIES/libsoftkeymaster_intermediates Instead, place intermediates in the sepolicy_intermediates dir. Test: intermediates now placed in: out/target/product/marlin/obj/ETC/sepolicy_intermediates Test: Marlin builds, no change to sepolicy on device. Bug: 36269118 Change-Id: Ib6e9d9033be4dc8db0cc66cb47d9dc35d38703fe
-
Alex Klyubin authored
am: bb26f904 Change-Id: If001b0d0a373297fe425aab37bc4c550aa49bb9c
-
Treehugger Robot authored
-
Fyodor Kupolov authored
am: 2d22fd81 Change-Id: Ideb1e0e24cab235ea209d7b5d675793df00b726e
-
Fyodor Kupolov authored
-
Alex Klyubin authored
This file is no longer needed because it was needed for supporting reloadable/dynamic SELinux policy which is no longer supported. Test: Clean build, flash, device boots without additional denials. Reboot to recovery works, no additional denials. Bug: 33642277 Change-Id: I7fffe2fd12f586ed9b3ae54e35d17abdebbe7bce
-
Treehugger Robot authored
-
Nick Kralevich authored
am: 3b97552f Change-Id: I32ca6642f29a75d572961e86e6be9ef45b277af7
-
Fyodor Kupolov authored
Untrusted apps should only access /data/preloads/media and demo directory. Bug: 36197686 Test: Verified retail mode. Checked non-privileged APK cannot access /data/preloads Change-Id: I8e9c21ff6aba799aa31bf06893cdf60dafc04446
-