- Jun 16, 2017
-
-
Sandeep Patil authored
am: 8aa283fe Change-Id: I7593dd0f7f2888fb5b2aa5a20b258d3a370146fe
-
Sandeep Patil authored
am: d3381cd9 Change-Id: Iaabe00cb6e919b4e35896c0d9ef1770aee3b2363
-
- Jun 15, 2017
-
-
Tom Cherry authored
am: 24d0cad3 Change-Id: Ieffac9d2e5ff8500534cf9935eff9918989c2fb4
-
Tom Cherry authored
am: 04306859 Change-Id: I3eb542cced980ce94425110d8dc8e58aeb122607
-
Tom Cherry authored
am: 2122f1fe Change-Id: I05f0b28b9e6622477fe2fa4b041ea03c5744f82c
-
Tom Cherry authored
-
- Jun 14, 2017
-
-
Android Build Merger (Role) authored
Merge "Add debug selinux permission to write saved_cmdlines_size. am: e9381d5e am: d651e0b7" into oc-dr1-dev-plus-aosp
-
Carmen Jackson authored
am: e180a613 Change-Id: Iaa5b2f434ebf712884d5823caf87e93de317e14e
-
Carmen Jackson authored
am: d651e0b7 Change-Id: I99c911d119c300e7035a111a24b0d900f435fca8
-
Carmen Jackson authored
am: e9381d5e Change-Id: I784011fc804dd43f431be62804761b100846dfbf
-
Carmen Jackson authored
am: e9381d5e Change-Id: Ic2192d5128543f28d2f91c4aedabab08b01669e5
-
Carmen Jackson authored
Now that we're expected to use this when taking traces, we need to add this permission so that Traceur can also access this file. Test: Used Traceur and saw the traces appear in the bugreports directory, as expected. Bug: 62493544 Change-Id: Ib4304176abbb51e2e3b45c566ff14574e1cfaa82 Merged-In: I464b0df30fabfc5f1c7cd7430e53e8d04bfacb53 (this merged-in is not the same change; it's a conflicting change in master)
-
Sandeep Patil authored
This violates the socket comms ban between coredomain (radio) and non coredomain (rild) in the platform policy. Bug: 62616897 Bug: 62343727 Test: Build and boot sailfish Change-Id: I48303bbd8b6eb62c120a551d0f584b9733fc2d43 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Joel Scherpelz authored
am: 14a3cb28 Change-Id: Ib3b7dc9a8a702a32330ccb31f22cf746df8764fb
-
Joel Scherpelz authored
am: 5ee87b00 Change-Id: Id2dc995f88a60fe865387453234e3630a9975381
-
Joel Scherpelz authored
am: abb1ba65 Change-Id: I7765bfd350deb50847e83a1d3b5d7399206b4b9d
-
- Jun 13, 2017
-
-
Tom Cherry authored
In libprocessgroup, we want to only send signals once to processes, particularly for SIGTERM. We must send the signal both to all processes within a POSIX process group and a cgroup. To ensure that we do not duplicate the signals being sent, we check the processes in the cgroup to see if they're in the POSIX process groups that we're killing. If they are, we skip sending a second signal. This requires getpgid permissions, hence this SELinux change. avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=797 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:system_app:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1 avc: denied { getpgid } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:system_server:s0 tclass=process permissive=1 Bug: 37853905 Bug: 62418791 Test: Boot, kill zygote, reboot Change-Id: Ib6c265dbaac8833c47145ae28fb6594ca8545570
-
Jeff Vander Stoep authored
am: 5c383688 Change-Id: Iaf28a1b178427e5b2bd13f45485cc3504464f6fc
-
Jeff Vander Stoep authored
am: 77fe1de7 Change-Id: I71b4bca350a9a29dd45dfafe8c3d1938cb54a46f
-
Jeff Vander Stoep authored
am: b236eb6c Change-Id: I87eb8bad11fc9c011289b8d97219835a08d18cd1
-
Jeff Vander Stoep authored
am: b236eb6c Change-Id: I60a92781a5b923889e627d73e8922aca2607b67b
-
Jeff Vander Stoep authored
[ 7.674739] selinux: selinux_android_file_context: Error getting file context handle (No such file or directory) Bug: 62564629 Test: build and flash marlin. Successfully switch between regular and recovery modes Change-Id: I0f871f8842d95322c844fb7b13ad1b4b42578e35
-
- Jun 12, 2017
-
-
Jeff Vander Stoep authored
am: aee782ca Change-Id: I9210f221529abc0195dc39d198b042d02ca223ab
-
Jeff Vander Stoep authored
am: 82658116 Change-Id: I653ab6e4d8ff7a859ac489d4b05fdddb0668ae4e
-
Jeff Vander Stoep authored
am: 7a68c5ae Change-Id: Ic9f658984340b255114bb0f8d505fa6774f1cb04
-
Jeff Vander Stoep authored
am: 7a68c5ae Change-Id: Ide9c5ccdc2002972f311c9829c573b98f12fea44
-
Jeff Vander Stoep authored
am: f965a0a1 Change-Id: I444ffb0b0e03fc718acbf6a82bac1501fa725c5f
-
Joel Scherpelz authored
This is used to persist RFC 7217 stable secrets across device reboots. First submit caused a merge conflict. This revision replaces netd_prop with a more unique name netd_stable_secret_prop. Test: as follows - Manually tested that stable_secret is generated on first use and persists until reset of user data partition (factory reset). - Tested that "adb shell getprop" was denied access to persist.netd.stable_secret after running "adb unroot". Bug: 17613910 Change-Id: I0a609c724799a15b1926e62534c16810d34f2275
-
- Jun 10, 2017
-
-
Jeff Vander Stoep authored
This change is primarily to fix CTS which checks file ordering of file_contexts. Having two separate means of loading file_contexts has resulted in ordering variations. Previously the binary file_contexts was preferred since it loaded faster. However with the move to libpcre2, there is no difference in loading time between text and binary file_contexts. This leaves us with build system complexity with no benefit. Thus removing this unnecessary difference between devices. Bug: 38502071 Test: build and boot non-Treble Bullhead, run CTS tests below Test: build and boot Treble Marlin, run CTS tests below Test: cts-tradefed run singleCommand cts --skip-device-info \ --skip-preconditions --skip-connectivity-check --abi arm64-v8a \ --module CtsSecurityHostTestCases \ -t android.security.cts.SELinuxHostTest#testAospFileContexts Test: cts-tradefed run singleCommand cts --skip-device-info \ --skip-preconditions --skip-connectivity-check --abi arm64-v8a \ --module CtsSecurityHostTestCases \ -t android.security.cts.SELinuxHostTest#testValidFileContexts Change-Id: I088b3aeafaaab320f6658feb058a1fb89cbb65e1
-
Jeff Vander Stoep authored
This change is primarily to fix CTS which checks file ordering of file_contexts. Having two separate means of loading file_contexts has resulted in ordering variations. Previously the binary file_contexts was preferred since it loaded faster. However with the move to libpcre2, there is no difference in loading time between text and binary file_contexts. This leaves us with build system complexity with no benefit. Thus removing this unnecessary difference between devices. Bug: 38502071 Test: build and boot non-Treble Bullhead, run CTS tests below Test: build and boot Treble Marlin, run CTS tests below Test: cts-tradefed run singleCommand cts --skip-device-info \ --skip-preconditions --skip-connectivity-check --abi arm64-v8a \ --module CtsSecurityHostTestCases \ -t android.security.cts.SELinuxHostTest#testAospFileContexts Test: cts-tradefed run singleCommand cts --skip-device-info \ --skip-preconditions --skip-connectivity-check --abi arm64-v8a \ --module CtsSecurityHostTestCases \ -t android.security.cts.SELinuxHostTest#testValidFileContexts Change-Id: I088b3aeafaaab320f6658feb058a1fb89cbb65e1
-
Jerry Zhang authored
am: 6aa9869a Change-Id: I5ee6145cfa3c6701450f2984eacdde41ccd505ec
-
Jerry Zhang authored
-
- Jun 09, 2017
-
-
Dan Cashman authored
am: 96c619c8 Change-Id: Ib2d0ad551b0a8c4e3bf8529dd89fb8f563e5b651
-
- Jun 08, 2017
-
-
Dan Cashman authored
This reverts commit 50889ce0. Bug: 62427402 Test: Build and boot. Change-Id: I32eae7997c901981d3228b61f33322a7c2c84301
-
Bartosz Fabianowski authored
am: 0f52004b Change-Id: I5df1b7411cc87c6b983d80d716d9ec05f1ba9339
-
Bartosz Fabianowski authored
am: edcfb2e1 Change-Id: I86565448fa4d5ccd412772825decb5dc62cd6343
-
Bartosz Fabianowski authored
am: 06486796 Change-Id: Ia575329a0d4e83ff0d3a70b30ad3ef7e026c42f1
-
Bartosz Fabianowski authored
This broke the build on master. See b/17613910#comment17 for details. This reverts commit ef1fd98b. Change-Id: I11f7d463061a9b6340c11827135586266e26f016
-
Joel Scherpelz authored
am: 36efd0c4 Change-Id: I31b2eda5c305723b1f35ce2ba284e6593ac891b6
-
Joel Scherpelz authored
am: 9381cb3d Change-Id: I3ae9005ee76b51105ec215cefc5a81c25405c482
-