Skip to content
Snippets Groups Projects
  1. Apr 03, 2018
    • Jeff Vander Stoep's avatar
      Rename qtaguid_proc to conform to name conventions · bdf2a9c4
      Jeff Vander Stoep authored
      Test: build
      Bug: 68774956
      Change-Id: I0f9fd87eb41e67e14f35e49eba13e3d1de745250
      bdf2a9c4
    • Chenbo Feng's avatar
      Block SDK 28 app from using proc/net/xt_qtaguid · c411ff70
      Chenbo Feng authored
      The file under /proc/net/xt_qtaguid is going away in future release.
      Apps should use the provided public api instead of directly reading the
      proc file. This change will block apps that based on SDK 28 or above to
      directly read that file and we will delete that file after apps move
      away from it.
      
      Test: Flashed with master branch on marlin, verified phone boot, can
            browse web, watch youtube video, make phone call and use google
            map for navigation with wifi on and off.
            run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest
            run cts -m CtsAppSecurityHostTestCases -t \
            		android.appsecurity.cts.AppSecurityTests
      
      Change-Id: I4c4d6c9ab28b426acef23db53f171de8f20be1dc
      (cherry picked from commit 5ec8f843)
      c411ff70
    • Jeff Vander Stoep's avatar
      Add untrusted_app_27 · 3aa7ca56
      Jeff Vander Stoep authored
      This is a partial cherry pick of commit 6231b4d9
      'Enforce per-app data protections for targetSdk 28+'.
      
      Untrusted_app_27 remains unreachable, but it's existence
      prevents future merge conflicts.
      
      Bug: 63897054
      Test: build/boot aosp_walleye-userdebug
      Change-Id: I64b013874fe87b55f47e817a1279e76ecf86b7c0
      Merged-In: I64b013874fe87b55f47e817a1279e76ecf86b7c0
      (cherry picked from commit 6231b4d9)
      3aa7ca56
    • Jeff Vander Stoep's avatar
      Remove deprecated tagSocket() permissions · 0d1e52a5
      Jeff Vander Stoep authored
      tagSocket() now results in netd performing these actions on behalf
      of the calling process.
      
      Remove direct access to:
      /dev/xt_qtaguid
      /proc/net/xt_qtaguid/ctrl
      
      Bug: 68774956
      Test: -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.AppSecurityTests
          -m CtsNativeNetTestCases
      Test: stream youtube, browse chrome
      Test: go/manual-ab-ota
      Change-Id: I6a044f304c3ec4e7c6043aebeb1ae63c9c5a0beb
      0d1e52a5
  2. Apr 02, 2018
  3. Mar 31, 2018
  4. Mar 30, 2018
  5. Mar 29, 2018
  6. Mar 28, 2018
  7. Mar 27, 2018
    • Tri Vo's avatar
      Fix aosp healthd. · dd7d5a70
      Tri Vo authored
      We only need this change for aosp devices. Internal sepolicy for healthd
      domain is different and does not need this.
      
      Addresses this denial:
      avc: denied { open } for path="/sys/class/power_supply" dev="sysfs"
      ino=25340 scontext=u:r:healthd:s0 tcontext=u:object_r:sysfs:s0
      tclass=dir permissive=1
      
      Test: $OUT/vendor/etc/selinux/precompiled_sepolicy contains the new
      permission.
      Change-Id: Ie47c231af800026fd9d8a1f752253bb338768c13
      dd7d5a70
    • Janis Danisevskis's avatar
      Keystore needs to be able to call apps · 3de9cd95
      Janis Danisevskis authored
      The ConfirmationUI API has a callback interface by which confirmation
      results are presented to the calling app. This requires keystore to call
      into apps.
      
      Test: Device boots and no more denials when call back is delivered to
            apps.
      Bug: 63928580
      Change-Id: Ie23211aeb74c39956c3c3b8b32843d35afa1315a
      3de9cd95
    • Andreas Gampe's avatar
      Statsd: Allow statsd to contact perfprofd in userdebug · 488030ee
      Andreas Gampe authored
      Give statsd rights to connect to perfprofd in userdebug.
      
      Test: mmma system/extras/perfprofd
      Change-Id: Idea0a6b757d1b16ec2e6c8719e24900f1e5518fd
      488030ee
Loading