- May 30, 2017
-
-
Narayan Kamath authored
Applications connect to tombstoned via a unix domain socket and request an open FD to which they can write their traces. This socket has a new label (tombstoned_java_trace_socket) and appdomain and system_server are given permissions to connect and write to it. Apps no longer need permissions to open files under /data/anr/ and these permissions will be withdrawn in a future change. Bug: 32064548 Test: Manual (cherry picked from commit a8832dabc7f3b7b2381760d2b95f81abf78db709) Change-Id: I70a3e6e230268d12b454e849fa88418082269c4f
-
- May 27, 2017
-
-
Ruchi Kandoi authored
am: cd591483 Change-Id: If3b128bcc0dbeb043f9476c28334d83912ed53e4
-
Ruchi Kandoi authored
am: e95974b0 Change-Id: I29eeb3ec90a67fe4377fe10f0884608a5fa52ea9
-
Ruchi Kandoi authored
am: f23230c8 Change-Id: I2214556e60abce3bf0801bc01d86e8c481e44c38
-
Ruchi Kandoi authored
am: c3f4afef Change-Id: I8810383b62d3c678c289867a0e17732242ee6679
-
Treehugger Robot authored
-
- May 26, 2017
-
-
TreeHugger Robot authored
-
Yifan Hong authored
-
Dan Cashman authored
am: 11b239f0 -s ours Change-Id: Ifabe749bffbc196782476129fdc34bd746f64b47
-
Dan Cashman authored
am: 33d7e90b Change-Id: I72b51db1d65df6a82b396187e982df1e4336c6be
-
TreeHugger Robot authored
* changes: Restrict BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIRS to one dir. Add BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIRS
-
Josh Gao authored
This reverts commit a015186f. Bug: http://b/62101480 Change-Id: I8e889e3d50cf1749168acc526f8a8901717feb46
-
- May 25, 2017
-
-
Yifan Hong authored
Test: pass Bug: 62073522 Change-Id: I3d53d0d5ec701c87fb3d45080799f424f7ba3792
-
Ruchi Kandoi authored
SELinux : avc: denied { find } for service=vrmanager pid=2364 uid=1027 scontext=u:r:nfc:s0 tcontext=u:object_r:vr_manager_service:s0 tclass=service_manager permissive=0 Test: manual Bug: 35889571 Change-Id: If95bb5c286def99a0439b36a31b52fa9dfd4a2f4 Signed-off-by:
Ruchi Kandoi <kandoiruchi@google.com>
-
Jeff Vander Stoep authored
Cutting down on the number of attributes associated with each type speeds up policy lookup times when there is an access vector cache miss. This change cuts down on the number of attributes associate with system_server from 19 to 8. The total number of attributes is reduced from 159 to 64. Bug: 36508258 Test: build and boot Marlin Change-Id: I8cdb6fb783ded869e88c5a9868fd7c8f838190f9
-
Andy Hung authored
-
Sandeep Patil authored
am: 3abc81ce Change-Id: If6350ea61bd6447af7913a7b474e719e0f7707d3
-
Sandeep Patil authored
am: d5a2f3e2 Change-Id: Ie35b0b80c929066186c35d31b8f8d803f374d969
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Dan Cashman authored
These directories were added to allow for partner extensions to the android framework without needing to add changes to the AOSP global sepolicy. There should only ever be one owner of the framework and corresponding updates, so enforce this restriction to prevent accidental accrual of policy in the system image. Bug: 36467375 Test: Add public and private files to policy and verify that they are added to the appropriate policy files. Also test that specifying multiple directories for public or private results in an error. Change-Id: I397ca4e7d6c8233d1aefb2a23e7b44315052678f Merged-In: I397ca4e7d6c8233d1aefb2a23e7b44315052678f (cherry picked from commit 1633da06)
-
Dan Cashman authored
Add new build variables for partner customization (additions) to platform sepolicy. This allows partners to add their own policy without having to touch the AOSP sepolicy directories and potentially disrupting compatibility with an AOSP system image. Bug: 36467375 Test: Add public and private files to sailfish policy and verify that they are added to the appropriate policy files, but that the policy is otherwise identical. Also add private/mapping/*.cil files in both locations and change the BOARD_SEPOLICY_VERS to trigger use of prebuilt mapping files and verify that they are appropriately combined and built in policy. Change-Id: I38efe2248520804a123603bb050bba75563fe45c Merged-In: I38efe2248520804a123603bb050bba75563fe45c (cherry picked from commit f893700c)
-
Josh Gao authored
-
- May 24, 2017
-
-
Sandeep Patil authored
vendor implementations need to be able to run modprobe as part of init.rc scripts. They cannot do so because of the strict neverallow currently in place that disallows all coredomains (including init) to execute vendor toybox. Fix this by adding init to the exception list for the neverallow so vendors can then run modprobe from .rc scripts and also add the rule to allow init to transition to modprobe domain using vendor_toolbox. Bug: b/38212864 Test: Boot sailfish Change-Id: Ib839246954e9002859f3ba986094f206bfead137 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Michael Schwartz authored
am: aa15c0af Change-Id: I2472fae6dec8202842dc35d36eb03248256dcd45
-
Michael Schwartz authored
am: 1c8e8e0e Change-Id: I45c6a937eea4a110c0137d1e1573fe50fd71f4cd
-
Michael Schwartz authored
-
Josh Gao authored
Fix the following denial: avc: denied { append } for pid=1093 comm="mediaextractor" path="pipe:[68438]" dev="pipefs" ino=68438 scontext=u:r:mediaextractor:s0 tcontext=u:r:dumpstate:s0 tclass=fifo_file permissive=1 ppid=1 pcomm="init" pgid=1 pgcomm="init" Bug: http://b/38444258 Test: none Change-Id: I58162e3a28b744a58396e77d6b0e2becb5633d6a (cherry picked from commit 5efadd91)
-