Skip to content
Snippets Groups Projects
  1. Mar 12, 2018
  2. Mar 10, 2018
    • Amit Mahajan's avatar
      Move rild from public to vendor. · aed57d4e
      Amit Mahajan authored
      Also change the neverallow exceptions to be for hal_telephony_server
      instead of rild.
      
      Test: Basic telephony sanity, treehugger
      Bug: 36427227
      Merged-in: If892b28416d98ca1f9c241c5fcec70fbae35c82e
      Change-Id: If892b28416d98ca1f9c241c5fcec70fbae35c82e
      aed57d4e
  3. Mar 09, 2018
    • Jaekyun Seok's avatar
      Allow public-readable to persist.rcs.supported · 7ff848c5
      Jaekyun Seok authored
      Bug: 74266614
      Test: succeeded building and tested on pixel
      PRODUCT_COMPATIBLE_PROPERTY_OVERRIDE=true
      
      Change-Id: I926eb4316c178a39693300fe983176acfb9cabec
      Merged-In: I926eb4316c178a39693300fe983176acfb9cabec
      (cherry picked from commit 9ddba296)
      7ff848c5
  4. Mar 08, 2018
    • Joel Galenson's avatar
      Use user policy when checking neverallow rules. · 8c72eea5
      Joel Galenson authored
      When building userdebug or eng builds, we still want to build the user
      policy when checking neverallow rules so that we can catch compile
      errors.
      
      Commit c0713e86 split out a helper function but lost one instance of
      using user instead of the real variant.  This restores that one and
      adds it to the neverallow check.
      
      Bug: 74344625
      Test: Added a rule that referred to a type defined only
      in userdebug and eng and ensure we throw a compile error when building
      userdebug mode.
      
      Change-Id: I1a6ffbb36dbeeb880852f9cbac880f923370c2ae
      (cherry picked from commit 053cb341)
      8c72eea5
  5. Mar 07, 2018
  6. Mar 06, 2018
    • Chenbo Feng's avatar
      Fix sepolicy for bpf object · bfa95fcd
      Chenbo Feng authored
      With the new patches backported to 4.9 kernels, the bpf file system now
      take the same file open flag as bpf_obj_get. So system server now need
      read permission only for both bpf map and fs_bpf since we do not need
      system server to edit the map. Also, the netd will always pass stdin
      stdout fd to the process forked by it and do allow it will cause the
      fork and execev fail. We just allow it pass the fd to bpfloader for now
      until we have a better option.
      
      Test: bpfloader start successful on devices with 4.9 kernel.
            run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest
      Bug: 74096311
      Bug: 30950746
      
      Change-Id: I747a51cb05ae495c155e7625a3021fc77f921e0d
      bfa95fcd
  7. Mar 02, 2018
    • Primiano Tucci's avatar
      perfetto: allow traced_probes to execute atrace · 54a86e2b
      Primiano Tucci authored
      This CL adds the SELinux permissions required to execute
      atrace and get userspace tracing events from system services.
      This is to enable tracing of events coming from surfaceflinger,
      audio HAL, etc.
      atrace, when executed, sets a bunch of debug.atrace. properties
      and sends an IPC via binder/hwbinder to tell the services to
      reload that property.
      
      Change-Id: I2b0a66dcb519cb296e1d0e6e3f15a425dc809089
      Bug: 73340039
      54a86e2b
  8. Mar 01, 2018
  9. Feb 28, 2018
  10. Feb 27, 2018
    • Jaekyun Seok's avatar
      Allow vendor-init-settable to persist.sys.zram_enabled · b47efe34
      Jaekyun Seok authored
      persist.sys.zram_enabled is set in vendor/build.prop in taimen and walleye,
      which was added after the initial whitelist.
      go/treble-sysprop-compatibility requires whitelisting such a property to
      allow it to be overridden by vendor/{default|build}.prop.
      
      Bug: 73905119
      Test: succeeded building and test with taimen
      Change-Id: I931182aa05eb90c14df6e2c7cc26913f3874fa18
      b47efe34
    • Treehugger Robot's avatar
    • Tri Vo's avatar
      Enable treble_sepolicy_tests against 27.0 release. · 9299d939
      Tri Vo authored
      Bug: 69390067
      Test: build sepolicy
      Change-Id: I4fc7438e4f825281d93a2849be9d2db819bea4ca
      9299d939
    • Tri Vo's avatar
      Refactor build rule for treble sepolicy tests. · 1406926d
      Tri Vo authored
      Bug: 69390067
      Test: policy builds
      Change-Id: I9b29a88ec071a17fc429892b5a8720b15fcbcf32
      1406926d
    • Joel Galenson's avatar
      Clean up bug_map. · 40c112c8
      Joel Galenson authored
      Remove a fixed bug from bug_map.
      
      Bug: 73068008
      Test: Built policy.
      Change-Id: Id0072788953cb6b939a11caace0158da7799f540
      40c112c8
    • Treehugger Robot's avatar
    • Alan Stokes's avatar
      Suppress noisy performanced denials in permissive mode. · cf71a5ae
      Alan Stokes authored
      The sheer volume of these can cause confusion.
      
      Sample denials (repeated for many processes):
      denied { getattr } for path="/proc/1/status" dev="proc" ino=24427 scontext=u:r:performanced:s0 tcontext=u:r:init:s0 tclass=file permissive=1
      denied { open } for path="/proc/1" dev="proc" ino=18608 scontext=u:r:performanced:s0 tcontext=u:r:init:s0 tclass=dir permissive=1
      denied { open } for path="/proc/1/status" dev="proc" ino=24427 scontext=u:r:performanced:s0 tcontext=u:r:init:s0 tclass=file permissive=1
      denied { read } for name="status" dev="proc" ino=24427 scontext=u:r:performanced:s0 tcontext=u:r:init:s0 tclass=file permissive=1
      
      Bug: 72643420
      Test: Denials no longer present in permissive mode.
      Change-Id: Ic07b9b0b59ca2122c4843095b63075ab8fd2c70b
      cf71a5ae
    • Alan Stokes's avatar
      Allow init to create & write to vibrator/trigger. · 5a570606
      Alan Stokes authored
      The write is here: https://android.googlesource.com/platform/system/core/+/master/rootdir/init.rc#257.
      
      Denials (on a device with the sysfs_vibrator label properly applied):
      denied { write } for name="vibrator" dev="sysfs" ino=49613 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_vibrator:s0 tclass=dir
      denied { write } for name="trigger" dev="sysfs" ino=49620 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_vibrator:s0 tclass=file
      denied { open } for path="/sys/devices/<redacted>/vibrator/trigger" dev="sysfs" ino=49620 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_vibrator:s0 tclass=file
      
      Bug: b/72643420
      Test: Device boots, denials gone
      
      Change-Id: Ib50d9a8533303daccb1330685e3204bea3fbd8a8
      5a570606
Loading