- Apr 04, 2018
-
-
Kweku Adams authored
am: 985db6d8 Change-Id: I1c05fb2469df71f5572aaf8ed88333dc3c92d3c5
-
Kweku Adams authored
Bug: 72177715 Test: flash device and check incident output Change-Id: I16c172caec235d985a6767642134fbd5e5c23912
-
Jeff Vander Stoep authored
am: 38a84cf8 Change-Id: I76cbd596ac70b065c288b30855db956fd456b5f6
-
Treehugger Robot authored
-
- Apr 03, 2018
-
-
Chenbo Feng authored
am: c69cbe55 Change-Id: I741c90bf96d43b6ab5227696ac24d8891cf5dc97
-
Treehugger Robot authored
-
Nathan Harold authored
am: 252b0153 Change-Id: I1800da081c5f164c35a470978053514f67c016da
-
Nathan Harold authored
Because applications should be able to set the receive timeout on UDP encapsulation sockets, we need to allow setsockopt(). getsockopt() is an obvious allowance as well. Bug: 68689438 Test: compilation Merged-In: I2eaf72bcce5695f1aee7a95ec03111eca577651c Change-Id: I2eaf72bcce5695f1aee7a95ec03111eca577651c
-
Jeff Vander Stoep authored
Test: build Bug: 68774956 Change-Id: I0f9fd87eb41e67e14f35e49eba13e3d1de745250
-
Chenbo Feng authored
The file under /proc/net/xt_qtaguid is going away in future release. Apps should use the provided public api instead of directly reading the proc file. This change will block apps that based on SDK 28 or above to directly read that file and we will delete that file after apps move away from it. Test: Flashed with master branch on marlin, verified phone boot, can browse web, watch youtube video, make phone call and use google map for navigation with wifi on and off. run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest run cts -m CtsAppSecurityHostTestCases -t \ android.appsecurity.cts.AppSecurityTests Change-Id: I4c4d6c9ab28b426acef23db53f171de8f20be1dc (cherry picked from commit 5ec8f843)
-
Jeff Vander Stoep authored
am: 3aa7ca56 Change-Id: I964ce5b658d73b7ccfbc7b1d86ca11b1c7ad8459
-
Jeff Vander Stoep authored
This is a partial cherry pick of commit 6231b4d9 'Enforce per-app data protections for targetSdk 28+'. Untrusted_app_27 remains unreachable, but it's existence prevents future merge conflicts. Bug: 63897054 Test: build/boot aosp_walleye-userdebug Change-Id: I64b013874fe87b55f47e817a1279e76ecf86b7c0 Merged-In: I64b013874fe87b55f47e817a1279e76ecf86b7c0 (cherry picked from commit 6231b4d9)
-
Jeff Vander Stoep authored
am: 0d1e52a5 Change-Id: I82c95f1fa1494d6b380823c4fd4436081e62bea0
-
Jeff Vander Stoep authored
tagSocket() now results in netd performing these actions on behalf of the calling process. Remove direct access to: /dev/xt_qtaguid /proc/net/xt_qtaguid/ctrl Bug: 68774956 Test: -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.AppSecurityTests -m CtsNativeNetTestCases Test: stream youtube, browse chrome Test: go/manual-ab-ota Change-Id: I6a044f304c3ec4e7c6043aebeb1ae63c9c5a0beb
-
- Apr 02, 2018
-
-
Jaekyun Seok authored
am: f22c062c Change-Id: I1c1a4c68adb49113ef6b6ff95326de8cb2ce8e25
-
Treehugger Robot authored
-
Andreas Gampe authored
am: c8fe29ff Change-Id: I70261798153c0151aa04f64064e58edb81e87805
-
Jiyong Park authored
am: a6d9d6b6 Change-Id: If482dd99535d544fa39e287ed5787aa156dcac56
-
Andreas Gampe authored
Update for debugfs labeling changes. Update for simpleperf behavior with stack traces (temp file). Bug: 73175642 Test: m Test: manual - run profiling, look for logs Change-Id: Ie000a00ef56cc603f498d48d89001f566c03b661
-
Jaekyun Seok authored
A default value of persist.sys.sf.native_mode could be set by SoC partners in some devices including some pixels. So it should have vendor_init_settable accessibility. Bug: 74266614 Test: succeeded building and tested with a pixel device with PRODUCT_COMPATIBLE_PROPERTY_OVERRIDE=true. Change-Id: I5d7a029f82505983d21dc722541fb55761a8714d
-
Jiyong Park authored
This reverts commit 942500b9. Bug: 75287236 Test: boot a device Change-Id: If81a2d2a46979ffbd536bb95528c3b4ebe3483df
-
- Mar 31, 2018
-
-
Treehugger Robot authored
- Mar 30, 2018
-
-
Treehugger Robot authored
-
yro authored
Test: manually tested to prevent sepolicy violation Change-Id: I9ebcc86464a9fc61a49d5c9be40f19f3523b6785
-
Chenbo Feng authored
am: 4fb1a145 Change-Id: Idc53868180280f2710d75dacb42918f6e27599a7
-
Treehugger Robot authored
-
Yi Jin authored
Bug: 73354384 Test: manual Change-Id: Iaaeded69c287eae757aaf68dc18bc5a0c53b94e6
-
Treehugger Robot authored
-
Florian Mayer authored
am: 9fcf22bb Change-Id: Ic61e460916a6bd07c117367d240e8883f4ca1fa2
-
Joel Galenson authored
am: 4b625e4a Change-Id: Iee12d5e7573c0681b4adba682085ceb3cc26e0ee
-
Florian Mayer authored
See also go/perfetto-io-tracing-security. * Grant CAP_DAC_READ_SEARCH to traced_probes. * Allow traced_probes to list selected labels. * Change ext4 and f2fs events to be available on user builds. Bug: 74584014 Change-Id: I891a0209be981d760a828a69e4831e238248ebad
- Mar 29, 2018
-
-
Tri Vo authored
This will test that system/sepolicy/{public/, private/} are identical to prebuilts if PLATFORM_SEPOLICY_VERSION is not 10000.0. Bug: 74622750 Test: build policy Test: correctly catches divergence from prebuilts for frozen policies Change-Id: I2fa14b672544a021c2d42ad5968dfbac21b72f6a
-
Joel Galenson authored
This allows init to write to it, which it does for atrace. Bug: 72643420 Test: Boot two devices, observe no denials, test atrace. Change-Id: I6810e5dcdfaff176bd944317e66d4fe612ccebed (cherry picked from commit dce07413)
-
Elliott Hughes authored
am: 242399a1 Change-Id: I62e7477947cb7e8f7210aaeb0740c969cadfa8d7
-
Elliott Hughes authored
-
Alan Stokes authored
am: 9a76c280 Change-Id: I7a6b5de668d06fe709a0ae922623fcc76474de12
-
Treehugger Robot authored
-