- Jan 12, 2018
-
-
Andreas Gampe authored
Give rights to call dropbox via binder. Test: m Test: manual Change-Id: I968c432a27bc8fbe677a2dd03671908d555f9df6
-
- Jan 11, 2018
-
-
Tom Cherry authored
-
Tom Cherry authored
Bug: 71861796 Test: no more denials on walleye for shell init scripts Change-Id: I51eab267c95a915f927b0aaa7db9d678a83093c7
-
Holly Jiuyu Sun authored
-
Holly Jiuyu Sun authored
Bug: 38206971 Test: test on phone Change-Id: Id34ab2673c7a16744fba77eb5c176e2e8b474299 Merged-In: Id34ab2673c7a16744fba77eb5c176e2e8b474299
-
Jeff Vander Stoep authored
/proc/net/xt_qtaguid is used by apps to track their network data use. Limit access to just zygote spawned processes - apps and system_server, omitting access to isolated_app which is not allowed to create network sockets. As Android moves to eBPF for app's network data stats, access to /proc/net/xt_qtaguid will be removed entirely. Segmenting access off is the first step. Bug: 68774956 This change also helps further segment and whitelist access to files in /proc/net and is a step in the lockdown of /proc/net. Bug: 9496886 Test: boot Taimen. Walk through setup-wizard. Make phone call and video call. Browse web. Watch youtube. Navigate in maps. Test: cts-tradefed run cts -m CtsAppSecurityHostTestCases -t \ android.appsecurity.cts.AppSecurityTests Test: cts-tradefed run cts -m CtsNativeNetTestCases Test: cts-tradefed run cts -m CtsIncidentHostTestCases -t \ com.android.server.cts.NetstatsIncidentTest Test: cts-tradefed run cts -m CtsOsTestCases -t \ android.os.cts.StrictModeTest Test: cts-tradefed run cts -m CtsNetTestCases -t \ android.net.cts.TrafficStatsTest Test: cts-tradefed run cts -m CtsUsageStatsTestCases -t \ android.app.usage.cts.NetworkUsageStatsTest Test: vts-tradefed run vts -m VtsQtaguidTest Change-Id: Idddd318c56b84564142d37b11dcc225a2f2800ea
-
- Jan 10, 2018
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
* changes: vold_prepare_subdirs: grant chown statsd: annotate boot denials
-
Jeff Vander Stoep authored
Test: none Change-Id: I42f2c2a09235d907b020c4924b91a3428f6c9d8e
-
Jeff Vander Stoep authored
Addresses: avc: denied { chown } for comm="vold_prepare_su" capability=0 scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability Bug: 71796118 Test: build Change-Id: I64b2f1ad8d6e0748c5820b8a37a4fc4f4101d1fb
-
Jeff Vander Stoep authored
Point logspam to its owner. Bug: 71537285 Test: build Change-Id: I9db561ee6f2857214b7945b312e6d303630724ea
-
Jaekyun Seok authored
This CL lists all the exported platform properties in private/exported_property_contexts. Additionally accessing core_property_type from vendor components is restricted. Instead public_readable_property_type is used to allow vendor components to read exported platform properties, and accessibility from vendor_init is also specified explicitly. Note that whitelisting would be applied only if PRODUCT_COMPATIBLE_PROPERTY is set on. Bug: 38146102 Test: tested on walleye with PRODUCT_COMPATIBLE_PROPERTY=true Change-Id: I304ba428cc4ca82668fec2ddeb17c971e7ec065e
-
yro authored
and pulling metrics Bug: 63757906 Test: manual testing conducted Change-Id: Ieba524ee676dfb4a457d39d025d203bf02a70831
-
Primiano Tucci authored
Perfetto is a performance instrumentation and logging framework, living in AOSP's /external/pefetto. Perfetto introduces in the system one binary and two daemons (the binary can specialize in either depending on the cmdline). 1) traced: unprivileged daemon. This is architecturally similar to logd. It exposes two UNIX sockets: - /dev/socket/traced_producer : world-accessible, allows to stream tracing data. A tmpfs file descriptor is sent via SCM_RIGHTS from traced to each client process, which needs to be able to mmap it R/W (but not X) - /dev/socket/traced_consumer : privilege-accessible (only from: shell, statsd). It allows to configure tracing and read the trace buffer. 2) traced_probes: privileged daemon. This needs to: - access tracingfs (/d/tracing) to turn tracing on and off. - exec atrace - connect to traced_producer to stream data to traced. init.rc file: https://android-review.googlesource.com/c/platform/external/perfetto/+/575382/14/perfetto.rc Bug: 70942310 Change-Id: Ia3b5fdacbd5a8e6e23b82f1d6fabfa07e4abc405
-
- Jan 09, 2018
-
-
yro authored
communicate with statsd Test: manual testing conducted Change-Id: Icd268e258f7cbdd9310baab53fe0c66f4f303d5e
-
Treehugger Robot authored
-
Etan Cohen authored
-
Treehugger Robot authored
-
- Jan 08, 2018
-
-
Tom Cherry authored
This reverts commit d711d4d2. Reason for revert: Shouldn't have submitted... Change-Id: I5b88101f381ca59132ec7d24990ea41ac1b84171
-
Tom Cherry authored
getprop is broken out from toolbox/toybox, however its permissions should remain the same, so label it appropriately. Bug: 36001741 Test: boot bullhead with the new getprop Change-Id: I4114ea21998da95173d882038bc6aebf39b64d7f
-
Luis Hector Chavez authored
This reverts commit 640e595a. The corresponding code in libcutils was removed, so this is now unneeded. Bug: 71632076 Test: aosp_sailfish still works Change-Id: I615bab83e9a83bc14439b8ab90c00d3156b0a7c4
-
Treehugger Robot authored
-
- Jan 05, 2018
-
-
Joel Galenson authored
This fixes an incorrect exception in the neverallow rule. Test: Built policy for all lunch targets. Change-Id: I283833131c6f1fd741e934de24c838594ac38a18
-
Tom Cherry authored
-
Etan Cohen authored
Finalize Wi-Fi RTT service name per API review. Note: CL 2 of 2 - removing old entry. Bug: 65108607 Test: integration tests Change-Id: Id2b3d91ea2ca578a5834a299275df188c68475da
-
Etan Cohen authored
Finalize Wi-Fi RTT service name per API review. Note: CL 1 of 2 - adding new entry here, will remove old entry in next CL. Bug: 65108607 Test: integration tests Change-Id: I065ce9d570510180fa8c8f09e1025ac795706405
-
- Jan 04, 2018
-
-
Chen Xu authored
-
Joel Galenson authored
-
Joel Galenson authored
This reverts commit b40eb255. Change-Id: I04d9e76152ed11ada4cabcc79bb4eec827f8abef
-
Treehugger Robot authored
-
fionaxu authored
Bug: 64131637 Test: Manual Change-Id: I0170c5eb465aa663582e3974348380a8f0c9b27f
-
Tom Cherry authored
1) fc_sort is not needed as there is no reason to sort system properties, so this is removed and replaced with a simply copy 2) Use the new property_info_checker instead of checkfc for validating property information. This supports exact match properties and will be extended to verify property schemas in the future. Bug: 36001741 Test: verify bullhead's property contexts correct Test: verify faulty property contexts result in failures Change-Id: Id9bbf401f385206e6907449a510e3111424ce59e
-
Joel Galenson authored
After offline discussions, we decided that this was the proper exception to the neverallow rule. Test: Built policy. Change-Id: Ic1603bfdd803151ccfb79f90195b83b616acc873
-
Treehugger Robot authored
-
- Jan 03, 2018
-
-
Jeff Tinker authored
This fixes failing vts drm tests bug:67675811 Test:vts-tradefed run commandAndExit vts -m VtsHalDrmV1_0Target Change-Id: I2f7e1c97e8c70fc312ca3c2c901f0a9607b05e83
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Shawn Willden authored
Test: Boot the device Change-Id: Ia468941e78803edebe311c73f424a41ac1faeaee
-
Jeff Vander Stoep authored
zygote->webview_zygote. Forgot to ammend local change. Test: webview_zygote denials are gone. Change-Id: I02869812feafd127b39e567c28e7278133770e97
-