- Apr 06, 2017
-
-
Sandeep Patil authored
am: 42424f13 Change-Id: Id9375a6dc3688408e306bdc051fec4d8754d07eb
-
TreeHugger Robot authored
-
Sandeep Patil authored
am: ed3458c2 Change-Id: I47746d594572760d25b569fb877351c4f1ea1628
-
Sandeep Patil authored
am: f79d1904 Change-Id: I7bda1cd1af603adc5fbf142c66bdf5b6b146ad7f
-
Sandeep Patil authored
am: df679fdb Change-Id: I4f0d343f42d8bc5c97b2a7c129c63c8e7c50cd3d
-
Sandeep Patil authored
am: 9075699a Change-Id: If3e3e246b7ef5ed0142bc7b180d4d7cfb559ea03
-
Sandeep Patil authored
am: 1b5f81a2 Change-Id: Ic9e87837f68ac31cfedd735bd20a44cdf029c79e
-
TreeHugger Robot authored
* changes: sepolicy: fix comments around 'domain' access to search in /vendor sepolicy: remove redudant rule for symlinks in /vendor/app sepolicy: restrict access for /vendor/framework. sepolicy: restrict /vendor/overlay from most coredomains sepolicy: restrict /vendor/app from most coredomains
-
Dan Cashman authored
am: 38416182 Change-Id: I9e08b187ccad4f4263de54aae1248b1691aa7d08
-
TreeHugger Robot authored
-
Sandeep Patil authored
Some of the same process HAL labeling was missing from Marlin. These are identified by tracking library dependencies. Bug: 37084733 Test: Build and boot sailfish. The change allows the labelled libraries to be opened by any domain. So, the boot test is sufficient. Change-Id: Id55e834d6863ca644f912efdd690fccb71d3eaf3 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Martijn Coenen authored
am: 133a9c41 Change-Id: I2991bcea9893c2b9cd2b320e4ef1b071126f133e
-
Sandeep Patil authored
All accesses to /vendor/app within platform include permissions to read symlinks in the location. This rule is redundant now. Bug: 36806861 Test: Boot sailfish and find no denials for 'vendor_app_file' Change-Id: Ic17a67521cff6717d83b78bb4ad8e21e772f6d4f Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
/vendor/framework is now designated location for vendor's platform libraries. The directory is thus only made available for 'dex2oat' coredomain. Bug: 36680116 Test: Boot sailfish & angler and launch gApps, dialer w/ no denials for 'vendor_framework_file' Change-Id: I24c2ec30f836330005a972ae20d839bef9dcb8aa Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
The change makes 'vendor_overlay_file' accessible only to few platform domains like idmap, system_server, zygote and appdomain. The overlay files contains RROs (runtime resource overlays) Bug: 36681210 Test: Boot sailfish (treble device) from wiped flashall Test: Connect to wifi and launch chrome to load few websites. Test: Launch camera and record + playback video Change-Id: I3596ca89ad51d0e7d78c75121f22ea71209ee332 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
Effectively removes TODOs and finalizes the initial solution to allow all domains access to 'vendor_file'. Bug: 36681074 Test: Build and boot sailfish (no policy changes in the CL) Change-Id: I50c05e20175c5273b34901809d967dd3e48bdb0e Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Sandeep Patil authored
The change makes 'vendor_app_file' accessible only to few platform domains like dex2oat, idmap, installd, system_server and appdomain. Bug: 36681210 Test: Boot sailfish (treble device) from wiped flashall Test: Connect to wifi and launch chrome to load few websites. Test: Launch camera and record + playback video Change-Id: Ib8757fedbf2e19c8381c8cd0f8f2693b2345534b Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Martijn Coenen authored
-
Mark Salyzyn authored
am: dd9ba982 Change-Id: I5f0a5d7e8dd238f2f105bfac101897c1fda7aa44
-
Mark Salyzyn authored
-
Dan Cashman authored
am: a902511f Change-Id: Idb05d766da22a1f52252e27f632af49928779987
-
TreeHugger Robot authored
-
Martijn Coenen authored
Bug: 34454312 Bug: 36052864 Test: device boots, works Change-Id: If61d9b736a74c5944cef4449de4dfbaf78d9ccfa
-
Ningyuan Wang authored
am: 705a3d0b Change-Id: I3b934fc0fb674051c8227b2a6f405e454ff9fa42
-
Ningyuan Wang authored
-
Dan Cashman authored
This is a necessary first step to finalizing the SELinux policy build process. The mapping_sepolicy.cil file is required to provide backward compatibility with the indicated vendor-targeted version. This still needs to be extended to provide N mapping files and corresponding SHA256 outputs, one for each of the N previous platform versions with which we're backward-compatible. Bug: 36783775 Test: boot device with matching sha256 and non-matching and verify that device boots and uses either precompiled or compiled policy as needed. Also verify that mapping_sepolicy.cil has moved. Change-Id: I5692fb87c7ec0f3ae9ca611f76847ccff9182375
-
Dan Cashman authored
sepolicy-analyze allows users to see all types that have a given attribute, but not the reverse case: all attributes of a given type. Add a '--reverse' option which enables this, but keeps the previous interface. Usage: sepolicy-analyze sepolicy attribute -r init Bug: 36508258 Test: Build and run against current policy. (cherry picked from commit d444ebed) Change-Id: I9813ebf61d50fb5abbc8e52be4cf62751979bbd4
-
Mark Salyzyn authored
logcatd is the same as logcat, except that the -L flag, if supplied, runs once, then the command re-runs itself without the -L flag with the same argument set. By introducing a logcatd daemon executable we can solve the problem of the longish reads from pstore that sometimes occur when the system is excessively busy spinning in a foreground task starving this daemon as we absorb the delay in an init service, rather than in an init exec. This would not have been efficiently possible without the introduction of liblogcat. Test: gTest logcat-unit-tests Test: Manual check logpersist operations Bug: 28788401 Bug: 30041146 Bug: 30612424 Bug: 35326290 Change-Id: I3454bad666c66663f59ae03bcd72e0fe8426bb0a
-
Alex Klyubin authored
am: 7c3dbfeb Change-Id: I5480d47059b876ceffdf029ea14f6480516b43ef
-
Alex Klyubin authored
-
Alex Klyubin authored
am: cfcffa9a Change-Id: I5979d4ea8a54944a7762cee2db04a078d0bd66bd
-
TreeHugger Robot authored
-
Sandeep Patil authored
am: 37792cec Change-Id: I469f6de852f10515148ef824c85ff2febf31322e
-
Andreas Gampe authored
am: 82071b68 Change-Id: Ia3bd034033f82aaed63b173e5205e7449e2743ef
-
TreeHugger Robot authored
* changes: sepolicy: relabel /vendor Sepolicy: Add ASAN-Extract
-
Nathan Harold authored
am: 516c9abf Change-Id: I59f1abcdb1f7184fc795c2164a5799e7ff7f4772
-
Nathan Harold authored
am: 63a93156 Change-Id: I26a67ce475de966ec979cf4dfddd8b3210802552
-
Nathan Harold authored
* changes: Add IpSecService SEPolicy Update Common NetD SEPolicy to allow Netlink XFRM
-
- Apr 05, 2017
-
-
Sandeep Patil authored
The CL splits /vendor labeling from /system. Which was allowing all processes read, execute access to /vendor. Following directories will remain world readable /vendor/etc /vendor/lib(64)/hw/ Following are currently world readable but their scope will be minimized to platform processes that require access /vendor/app /vendor/framework/ /vendor/overlay Files labelled with 'same_process_hal_file' are allowed to be read + executed from by the world. This is for Same process HALs and their dependencies. Bug: 36527360 Bug: 36832490 Bug: 36681210 Bug: 36680116 Bug: 36690845 Bug: 36697328 Bug: 36696623 Bug: 36806861 Bug: 36656392 Bug: 36696623 Bug: 36792803 All of the tests were done on sailfish, angler, bullhead, dragon Test: Boot and connect to wifi Test: Run chrome and load websites, play video in youtube, load maps w/ current location, take pictures and record video in camera, playback recorded video. Test: Connect to BT headset and ensure BT audio playback works. Test: OTA sideload using recovery Test: CTS SELinuxHostTest pass Change-Id: I278435b72f7551a28f3c229f720ca608b77a7029 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Andreas Gampe authored
Add selinux policies for init script and shell script to unzip a tar containing ASAN libraries on boot. Bug: 36458146 Test: m && m SANITIZE_TARGET=address Test: manual (build steps for tar missing) Change-Id: I5c3cb233aae93ee9985431090af902b0e3c1b0a7 (cherry picked from commit 0b743050) Merged-In: I5c3cb233aae93ee9985431090af902b0e3c1b0a7
-