- Apr 06, 2017
-
-
Mark Salyzyn authored
am: dd9ba982 Change-Id: I5f0a5d7e8dd238f2f105bfac101897c1fda7aa44
-
Mark Salyzyn authored
-
Dan Cashman authored
am: a902511f Change-Id: Idb05d766da22a1f52252e27f632af49928779987
-
TreeHugger Robot authored
-
Ningyuan Wang authored
am: 705a3d0b Change-Id: I3b934fc0fb674051c8227b2a6f405e454ff9fa42
-
Ningyuan Wang authored
-
Dan Cashman authored
This is a necessary first step to finalizing the SELinux policy build process. The mapping_sepolicy.cil file is required to provide backward compatibility with the indicated vendor-targeted version. This still needs to be extended to provide N mapping files and corresponding SHA256 outputs, one for each of the N previous platform versions with which we're backward-compatible. Bug: 36783775 Test: boot device with matching sha256 and non-matching and verify that device boots and uses either precompiled or compiled policy as needed. Also verify that mapping_sepolicy.cil has moved. Change-Id: I5692fb87c7ec0f3ae9ca611f76847ccff9182375
-
Mark Salyzyn authored
logcatd is the same as logcat, except that the -L flag, if supplied, runs once, then the command re-runs itself without the -L flag with the same argument set. By introducing a logcatd daemon executable we can solve the problem of the longish reads from pstore that sometimes occur when the system is excessively busy spinning in a foreground task starving this daemon as we absorb the delay in an init service, rather than in an init exec. This would not have been efficiently possible without the introduction of liblogcat. Test: gTest logcat-unit-tests Test: Manual check logpersist operations Bug: 28788401 Bug: 30041146 Bug: 30612424 Bug: 35326290 Change-Id: I3454bad666c66663f59ae03bcd72e0fe8426bb0a
-
Alex Klyubin authored
am: 7c3dbfeb Change-Id: I5480d47059b876ceffdf029ea14f6480516b43ef
-
Alex Klyubin authored
-
Alex Klyubin authored
am: cfcffa9a Change-Id: I5979d4ea8a54944a7762cee2db04a078d0bd66bd
-
TreeHugger Robot authored
-
Sandeep Patil authored
am: 37792cec Change-Id: I469f6de852f10515148ef824c85ff2febf31322e
-
Andreas Gampe authored
am: 82071b68 Change-Id: Ia3bd034033f82aaed63b173e5205e7449e2743ef
-
TreeHugger Robot authored
* changes: sepolicy: relabel /vendor Sepolicy: Add ASAN-Extract
-
Nathan Harold authored
am: 516c9abf Change-Id: I59f1abcdb1f7184fc795c2164a5799e7ff7f4772
-
Nathan Harold authored
am: 63a93156 Change-Id: I26a67ce475de966ec979cf4dfddd8b3210802552
-
Nathan Harold authored
* changes: Add IpSecService SEPolicy Update Common NetD SEPolicy to allow Netlink XFRM
-
- Apr 05, 2017
-
-
Sandeep Patil authored
The CL splits /vendor labeling from /system. Which was allowing all processes read, execute access to /vendor. Following directories will remain world readable /vendor/etc /vendor/lib(64)/hw/ Following are currently world readable but their scope will be minimized to platform processes that require access /vendor/app /vendor/framework/ /vendor/overlay Files labelled with 'same_process_hal_file' are allowed to be read + executed from by the world. This is for Same process HALs and their dependencies. Bug: 36527360 Bug: 36832490 Bug: 36681210 Bug: 36680116 Bug: 36690845 Bug: 36697328 Bug: 36696623 Bug: 36806861 Bug: 36656392 Bug: 36696623 Bug: 36792803 All of the tests were done on sailfish, angler, bullhead, dragon Test: Boot and connect to wifi Test: Run chrome and load websites, play video in youtube, load maps w/ current location, take pictures and record video in camera, playback recorded video. Test: Connect to BT headset and ensure BT audio playback works. Test: OTA sideload using recovery Test: CTS SELinuxHostTest pass Change-Id: I278435b72f7551a28f3c229f720ca608b77a7029 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Andreas Gampe authored
Add selinux policies for init script and shell script to unzip a tar containing ASAN libraries on boot. Bug: 36458146 Test: m && m SANITIZE_TARGET=address Test: manual (build steps for tar missing) Change-Id: I5c3cb233aae93ee9985431090af902b0e3c1b0a7 (cherry picked from commit 0b743050) Merged-In: I5c3cb233aae93ee9985431090af902b0e3c1b0a7
-
Steven Moreland authored
am: 6821bb40 Change-Id: I90f1ae5f671cbf7bcdcab728dd0bfac673f95050
-
TreeHugger Robot authored
-
Steven Moreland authored
Test: adbd_test (with and without adb root) Note: one test fails without root with and without this change because of an unrelated shell selinux denial. Test: adb screencap, pull, and verify Test: Android Studio screenshot Bug: 36643190 Change-Id: Ib534240bc9bb3a1f32b8865ca66db988902a0f4a
-
Nick Kralevich authored
am: 6f108fd8 Change-Id: I98a793c05260b9f469902c17375693ef7c68b238
-
Nick Kralevich authored
-
Tianjie Xu authored
am: c0e6cb58 Change-Id: If2cc73c4f4b14fb46273b97aae151e735ccddaa0
-
TreeHugger Robot authored
-
Nick Kralevich authored
Remove system_file:file { lock ioctl } from domain_deprecated. The only domains triggering this were dex2oat and netd, which are fixed in this change. Addresses the following logspam similar to: avc: granted { lock } for comm="iptables" path="/system/etc/xtables.lock" dev="sda22" ino=3745 scontext=u:r:netd:s0 tcontext=u:object_r:system_file:s0 tclass=file avc: granted { lock } for comm="dex2oat" path="/system/framework/arm/boot-okhttp.art" dev="dm-0" ino=1295 scontext=u:r:dex2oat:s0 tcontext=u:object_r:system_file:s0 tclass=file Test: device boots and no obvious problems. Bug: 28760354 Bug: 36879751 Change-Id: Iac851c0e49a52ce4000fdfe16e68c17ff819693f
-
- Apr 04, 2017
-
-
Steven Moreland authored
am: ccbea503 Change-Id: I55fab2ec9b63c5d9393bd18d9c340030ee9f1cc5
-
Ningyuan Wang authored
This is used for wificond to check if it is allowed to dump logs. Bug: 31336376 Test: compile, manual test Change-Id: I8a1b681255398f9a1f2cf79fd0891e58283aa747
-
TreeHugger Robot authored
-
Yifan Hong authored
am: abaf415c Change-Id: I89396424e62a09f8e111212b920fc0897b6a517e
-
TreeHugger Robot authored
-
Alex Klyubin authored
am: e311d669 Change-Id: Ibeb5854ca377048726b01288030a421e7f1a9bc2
-
TreeHugger Robot authored
-
Ray Essick authored
am: 72f6219f Change-Id: I93bd189fc07ee4386b1a1c14cf345ca739f9f64b
-
Ray Essick authored
-
Amit Mahajan authored
am: 8b080ee2 Change-Id: Ieba9f9055b78d349c883ca1132336c318e490b17
-
Alex Klyubin authored
Wifi Keystore HAL is a HwBinder service (currently offered by keystore daemon) which is used by Wifi Supplicant HAL. This commit thus switches the SELinux policy of Wifi Keystore HAL to the approach used for non-HAL HwBinder services. The basic idea is simimilar to how we express Binder services in the policy, with two tweaks: (1) we don't have 'hwservicemanager find' and thus there's no add_hwservice macro, and (2) we need loosen the coupling between core and vendor components. For example, it should be possible to move a HwBinder service offered by a core component into another core component, without having to update the SELinux policy of the vendor image. We thus annotate all components offering HwBinder service x across the core-vendor boundary with x_server, which enables the policy of clients to contain rules of the form: binder_call(mydomain, x_server), and, if the service uses IPC callbacks, also binder_call(x_server, mydomain). Test: mmm system/sepolicy Test: sesearch indicates to changes to binder { call transfer} between keystore and hal_wifi_supplicant_default domains Bug: 36896667 Change-Id: I45c4ce8159b63869d7bb6df5c812c5291776d892
-
Mark Salyzyn authored
am: 0dd37a3b Change-Id: I91a8cfce767c1b280bbea788038cc8a24363f662
-