Skip to content
Snippets Groups Projects
  1. Feb 14, 2018
  2. Feb 13, 2018
    • Treehugger Robot's avatar
      1f447485
    • Treehugger Robot's avatar
      5670dd1f
    • Christopher Ferris's avatar
      Allow read-only of new property for malloc hooks. · 6766543a
      Christopher Ferris authored
      Bug: 30561479
      
      Test: Booted on walleye and verified that read denials of the property
      Test: do not generate warnings.
      Change-Id: I61a4a7d3a360a6d27d8986eb8f3f9662272233b1
      (cherry picked from commit 2f35f5ca)
      6766543a
    • Jeff Vander Stoep's avatar
      OWNERS: add tomcherry and bowgotsai · 31e1ddd6
      Jeff Vander Stoep authored
      Test: n/a
      Change-Id: I7041cc0f17ece86c01db1d9c17f68b58473cf27c
      31e1ddd6
    • Treehugger Robot's avatar
    • Bookatz's avatar
      Statsd allow shell in selinux policy · 022ab0e7
      Bookatz authored
      CTS tests need to be able to call, from hostside:
      adb shell cmd stats dump-report (and others)
      On a user build, this will fail because of an selinux policy violation
      from shell. This cl fixes this by granting shell permission.
      
      Similarly, Settings needs to communicate with statsd, so
      system_app-statsd binder calls are given permission.
      
      Bug: 72961153
      Bug: 73255014
      Test: run cts-dev -m CtsStatsdHostTestCases -t android.cts.statsd.atom.HostAtomTests
      Test: manual confirmation
      Change-Id: I6589ab4ef5c91a4a7f78eb97b63d9bb43e3d8f02
      022ab0e7
    • Primiano Tucci's avatar
      Allow perfetto traced_probes to access tracefs on user · b4b31f9d
      Primiano Tucci authored
      Allows the traced_probes daemon to access the core ftrace
      functionalities on user builds. Specifically this involves:
      - Whitelisting the per_cpu/ subdirectory to access:
        1) trace_pipe_raw file to allow perfetto to read the raw
           ftrace buffer (rather than the text-based /trace endpoint)
        2) cpuX/stats and cpuX/buffer_size_kb that allow to
           tune the buffer size per-cpu pipe and to get basic
           statistics about the ftrace buffer (#events, overruns)
      - Whitelistiing the full event directories rather than the
        /enable files. This gives also access to the /format files
        for the events that are already enabled on user builds.
        /format files simply describe the memory layout
        of the binary logs. Example: https://ghostbin.com/paste/f8m4k
      
      This still does NOT allow enabling the events labeled as
      "_debug" (mostly events that return activity on inodes).
      We'll deal with that separately as soon as we get a POC
      of inode resolution and a sensible blacklist/whitelist model.
      
      Bug: 70942310
      Change-Id: Ic15cca0a9d7bc0e45aa48097a94eadef44c333f8
      b4b31f9d
  3. Feb 12, 2018
  4. Feb 09, 2018
  5. Feb 08, 2018
  6. Feb 07, 2018
  7. Feb 06, 2018
  8. Feb 05, 2018
    • Chris Morin's avatar
      prevent benign dex2oat selinux denial temporarily · 9644df47
      Chris Morin authored
      Since we now call patchoat --verify in zygote art loading code, we have
      the unintended effect of webview zygote calling patchoat --verify. This
      is undesireable since webview zygote doesn't need to verify the .art
      files after the app_process zygote has already done so. The exec of
      patchoat fails for webview zygote, and this change hides that. This
      change should be reverted when b/72957399 is resolved.
      
      Bug: 66697305
      Test: Ensure no new selinux denials were introduced.
      Change-Id: I4152edc920e5c436516b958b8c861dcc1c4751d8
      9644df47
    • Treehugger Robot's avatar
      cfbe2a1f
    • Treehugger Robot's avatar
      cbe2d7d7
    • Treehugger Robot's avatar
      Merge changes from topic "user-build-traceur" · 0fe4586b
      Treehugger Robot authored
      * changes:
        Use a whitelisting strategy for tracefs.
        Enable Traceur on user builds.
      0fe4586b
    • Mark Salyzyn's avatar
      lmkd: add live-lock killer daemon · d583e596
      Mark Salyzyn authored
      llkd needs the ability to forcibly crash the kernel if
      cause is unlikely to result in an orderly shutdown. It
      also needs to scan /proc/<pid> for additional process
      information.
      
      Test: lmkd_unit_test --gtest_filter=llkd.*
      Bug: 33808187
      Change-Id: I7f158a13814e79d5ec71fe90dbc7461abb521945
      d583e596
    • Jaekyun Seok's avatar
      Add tests for compatible property (1/2) · 64ade65d
      Jaekyun Seok authored
      The feature of compatible property has its own neverallow rules and it
      is enforced on devices launchig with Android P.
      
      This CL changes hal_nfc to hal_nfc_server in neverallow rules because
      sepolicy-analyze doesn't recognize it. Additionally one more neverallow
      rule is added to restrict reading nfc_prop.
      
      Bug: 72013705
      Bug: 72678352
      Test: 'run cts -m CtsSecurityHostTestCases' on walleye with
      ro.product.first_api_level=28
      
      Change-Id: I753cc81f7ca0e4ad6a2434b2a047052678f57671
      64ade65d
Loading