Skip to content
Snippets Groups Projects
  1. May 01, 2018
  2. Apr 13, 2018
    • Wale Ogunwale's avatar
      Finalizing P SDK · 49b79029
      Wale Ogunwale authored
      Bug: 77588754
      Test: builds
      Change-Id: I61ceb438cd532584847ddd55c0eeaefebdcfa51c
      49b79029
  3. Sep 26, 2017
  4. Mar 16, 2017
    • Calin Juravle's avatar
      Allow profman to analyze profiles for the secondary dex files · ebcec9b8
      Calin Juravle authored
      The secondary dex files are application dex files which gets reported
      back to the framework when using BaseDexClassLoader.
      
      Also, give dex2oat lock permissions as it needs to lock the profile
      during compilation.
      
      Example of SElinux denial:
      03-15 12:38:46.967  7529  7529 I profman : type=1400 audit(0.0:225):
      avc: denied { read } for
      path="/data/data/com.google.android.googlequicksearchbox/files/velour/verified_jars/JDM5LaUbYP1JPOLzJ81GLzg_1.jar.prof"
      dev="sda35" ino=877915 scontext=u:r:profman:s0
      tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1
      
      Test: adb shell cmd package bg-dexopt-job works for sercondary dex files
      Bug: 26719109
      Change-Id: Ie1890d8e36c062450bd6c54f4399fc0730767dbf
      ebcec9b8
  5. Jan 31, 2017
    • Calin Juravle's avatar
      Remove SElinux audit to libart_file · 01ee59a7
      Calin Juravle authored
      Since it was introduced it caused quite a few issues and it spams the
      SElinux logs unnecessary.
      
      The end goal of the audit was to whitelist the access to the
      interpreter. However that's unfeasible for now given the complexity.
      
      Test: devices boots and everything works as expected
            no more auditallow logs
      
      Bug: 29795519
      Bug: 32871170
      Change-Id: I9a7a65835e1e1d3f81be635bed2a3acf75a264f6
      01ee59a7
  6. Nov 08, 2016
    • Nick Kralevich's avatar
      profman/debuggerd: allow libart_file:file r_file_perms · 364fd197
      Nick Kralevich authored
      Addresses the following auditallow spam:
      
      avc: granted { read open } for comm="profman"
      path="/system/lib/libart.so" dev="dm-0" ino=1368 scontext=u:r:profman:s0
      tcontext=u:object_r:libart_file:s0 tclass=file
      
      avc: granted { read open } for comm="debuggerd64"
      path="/system/lib64/libart.so" dev="dm-0" ino=1897
      scontext=u:r:debuggerd:s0 tcontext=u:object_r:libart_file:s0 tclass=file
      
      avc: granted { getattr } for comm="debuggerd64"
      path="/system/lib64/libart.so" dev="dm-0" ino=1837
      scontext=u:r:debuggerd:s0 tcontext=u:object_r:libart_file:s0 tclass=file
      
      Test: Policy compiles. Not a tightening of rules.
      Change-Id: I501b0a6a343c61b3ca6283647a18a9a15deddf2a
      364fd197
  7. Oct 06, 2016
    • dcashman's avatar
      Split general policy into public and private components. · cc39f637
      dcashman authored
      Divide policy into public and private components.  This is the first
      step in splitting the policy creation for platform and non-platform
      policies.  The policy in the public directory will be exported for use
      in non-platform policy creation.  Backwards compatibility with it will
      be achieved by converting the exported policy into attribute-based
      policy when included as part of the non-platform policy and a mapping
      file will be maintained to be included with the platform policy that
      maps exported attributes of previous versions to the current platform
      version.
      
      Eventually we would like to create a clear interface between the
      platform and non-platform device components so that the exported policy,
      and the need for attributes is minimal.  For now, almost all types and
      avrules are left in public.
      
      Test: Tested by building policy and running on device.
      
      Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
      cc39f637
  8. Jun 06, 2016
  9. Jun 01, 2016
  10. Mar 28, 2016
    • Calin Juravle's avatar
      Give profman getattr rights on profiles. · 070f5625
      Calin Juravle authored
      We do a bit more work checks in the runtime for the profiles and call
      stat on the files to see if they exists and their are not empty.
      
      SElinux error
      [  297.842210] type=1400 audit(1459106986.097:7): avc: denied { getattr
      } for pid=4504 comm="profman"
      path="/data/misc/profiles/cur/0/com.google.android.youtube/primary.prof"
      dev="dm-1" ino=636936 scontext=u:r:profman:s0
      tcontext=u:object_r:user_profile_data_file:s0:c512,c768 tclass=file
      permissive=0
      
      Bug: 27860201
      Change-Id: Ic97882e6057a4b5c3a16089b9b99b64bc1a3cd98
      070f5625
  11. Feb 19, 2016
Loading