Skip to content
Snippets Groups Projects
  1. Sep 11, 2017
  2. Sep 08, 2017
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 521742e9
      Josh Gao authored
      Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log
      crashes to dmesg when logd isn't up yet (or is the one crashing).
      
      (Originally commited in a015186f)
      (cherry-pick of commit: 3458ec13)
      
      Bug: 37916906
      Bug: 36574794
      Bug: 62101480
      Test: Builds and boots.
      Change-Id: I83aa392f49bb412d96534925fb02921a8f4731fa
      521742e9
    • Dan Cashman's avatar
      Update sepolicy 26.0 prebuilts again, again. · 9aefc916
      Dan Cashman authored
      (cherry-pick of commit: 55c77504)
      
      Bug: 37916906
      Bug: 37896931
      Test: none, just prebuilt update.
      Change-Id: I55b5179f98703026699a59cce4b2e1afb166fd1d
      9aefc916
    • Dan Cashman's avatar
      Update 26.0 SELinux prebuilts. · 3686efca
      Dan Cashman authored
      More changes went into oc-dev after the freeze-date.  Reflect them.
      (cherry-pick of commit: 148578a6)
      
      Bug: 37916906
      Bug: 37896931
      Test: prebuilts - none.
      Change-Id: I3300751ea7362d5d96b327138544be65eb9fc483
      3686efca
    • Dan Cashman's avatar
      Add mapping compatibility file for sepolicy api lvl 26.0 · de51e7de
      Dan Cashman authored
      commit: 5c6a227e added the oc-dev
      sepolicy prebuilts (api 26.0), but did not include the corresponding
      base mapping file, which is to be maintained along with current
      platform development in order to ensure backwards compatibility.
      (cherry-pick of commit: 5e4e0d7f)
      
      Bug: 37916906
      Bug: 37896931
      Test: none, this just copies the old mapping file to prebuilts.
      Change-Id: Ia5c36ddab036352845878178fa9c6a9d649d238f
      de51e7de
    • Dan Cashman's avatar
      Commit oc-dev sepolicy to prebuilts. · fff3fe2f
      Dan Cashman authored
      Copy the final system sepolicy from oc-dev to its prebuilt dir
      corresponding to its version (26.0) so that we can uprev policy and
      start maintaining compatibility files, as well as use it for CTS
      tests targeting future platforms.
      
      (cherry-pick of commit: 5c6a227e)
      
      Bug: 37896931
      Bug: 37916906
      Test: none, this just copies the old policy.
      Change-Id: Ib069d505e42595c467e5d1164fb16fcb0286ab93
      fff3fe2f
  3. Sep 06, 2017
    • Tao Bao's avatar
      Allow init to relabelto to misc_block_device. · 28fde232
      Tao Bao authored
      avc:  denied  { relabelto } for  pid=1 comm="init" name="misc" dev="tmpfs" ino=3855 scontext=u:r:init:s0 tcontext=u:object_r:misc_block_device:s0 tclass=lnk_file
      
      If misc partition is used during early mount, it will carry a label of
      tmpfs (instead of block_device), which will fail restorecon with the
      above denial.
      
      Bug: 65378733
      Test: Build and flash a target that uses misc in early mount. No longer
            observe the above denial.
      Change-Id: I44cd43dbd2a8a4f9f423ebc8ac0dd046b167ef72
      28fde232
    • Hung-ying Tyan's avatar
      Don't create nonplat_service_contexts on full_treble devices · e83f1e56
      Hung-ying Tyan authored
      On full Treble devices, servicemanager should only host services
      served from processes on /system; nonplat_service_contexts
      should not be created at all in this case.
      
      Bug: 36866029
      Test: Build marlin and make sure nonplat_service_contexts is not
            created.
      
      Change-Id: Id02c314abbb98fc69884198779488c52231d22c3
      Merged-In: Id02c314abbb98fc69884198779488c52231d22c3
  4. Sep 05, 2017
    • Steven Moreland's avatar
      Revert "Add screencap domain." · 5b2ebd3b
      Steven Moreland authored
      This reverts commit 9216a6ad.
      
      Bug: 65206688
      
      Merged-In: I8e61b77a1abe9543e4fba77defb8062407676fcf
      Change-Id: I8e61b77a1abe9543e4fba77defb8062407676fcf
      5b2ebd3b
    • Peter Enderborg's avatar
      Only allow init to start vold · acb4871f
      Peter Enderborg authored
      Hardening vold. Vold has much rights to system sensitive parts and
      are started by init. Enforce this security.
      
      Bug: 64791922
      Test: Manual
      Change-Id: I077d251d1eb7b7292e1a4a785093cb7bf5524a83
      acb4871f
  5. Sep 01, 2017
  6. Aug 31, 2017
  7. Aug 30, 2017
    • Robert Benea's avatar
      Allow lmkd read memcg stats. · 1a05283c
      Robert Benea authored
      Currently lmkd is not able to read memcg info. The mem/swap usage
      info are used by lmkd to ugrade medium pressure events to critical
      level.
      
      Test: tested on gobo
      Bug: 65180281
      Change-Id: I19d0eb53d5e754c176ffeda1b5d07049e6af8570
      1a05283c
  8. Aug 29, 2017
  9. Aug 28, 2017
    • Jeff Vander Stoep's avatar
      Allow all domains to stat symlinks in sysfs · 8d021a94
      Jeff Vander Stoep authored
      This is needed to retain app's previous access to
      /sys/devices/system/cpu. When these files were previously
      labeled in file_contexts, symlinks were labeled as
      sysfs_devices_system_cpu. When labeling was moved to genfs_contexts
      symlinks all have the default sysfs label.
      
      avc: denied { getattr } for comm="main"
      path="/sys/devices/system/cpu/cpu0/cpufreq" dev="sysfs" ino=41897
      scontext=u:r:untrusted_app_25:s0:c512,c768
      tcontext=u:object_r:sysfs:s0 tclass=lnk_file permissive=0
      
      Change-Id: Idaa565390bca13d3819e147fcea4214956c0f589
      Bug: 64270911
      Test: build aosp_marlin
      8d021a94
    • Bowgo Tsai's avatar
      Moving adbd from rootdir to system/bin · 5846c79e
      Bowgo Tsai authored
      Bug: 63910933
      Test: boot sailfish in normal mode, checks adbd is started
      Test: boot sailfish in recovery mode, checks adbd is started
      Test: boot bullhead in normal mode, checks adbd is started
      Test: boot bullhead in recovery mode, checks adbd is started
      
      Change-Id: I35ed78a15a34626fbd3c21d030e2bf51033f7b79
      Merged-In: I35ed78a15a34626fbd3c21d030e2bf51033f7b79
      (cherry picked from commit e2423d14)
      5846c79e
  10. Aug 25, 2017
  11. Aug 24, 2017
    • Mark Salyzyn's avatar
      Switch /data/misc/reboot/last_reboot_reason to persistent property · 006c2e99
      Mark Salyzyn authored
      Switch from /data/misc/reboot/last_reboot_reason to persistent
      Android property persist.sys.boot.reason for indicating why the
      device is rebooted or shutdown.
      
      Introduce protection for all boot reason properties
      
      Protect the following properties with these labels
      
      ro.boot.bootreason      u:object_r:bootloader_boot_reason_prop:s0
      sys.boot.reason         u:object_r:sys_boot_reason_prop:s0
      persist.sys.boot.reason u:object_r:last_boot_reason_prop:s0
      
      Setup the current as-need access rules for each.
      
      ToDo: Remove u:object_r:reboot_data_file after internal fixes.
      
      Test: system/core/bootstat/boot_reason_test.sh
      Bug: 64687998
      Change-Id: I3771c73933e8ae2d94aee936c7a38b6282611b80
      006c2e99
  12. Aug 23, 2017
  13. Aug 17, 2017
  14. Aug 16, 2017
    • Tianjie Xu's avatar
      Allow update_verifier to write to kmsg · d499e914
      Tianjie Xu authored
      Denial message:
      avc: denied { write } for pid=640 comm="update_verifier" name="kmsg"
      dev="tmpfs" ino=13951 scontext=u:r:update_verifier:s0
      tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0
      
      Bug: 64713327
      Test: update_verifier logs successfully during boot time.
      Change-Id: I421b1e6660239e5ffc624e504f5945d400510407
      d499e914
    • Martijn Coenen's avatar
      Remove display.qservice from service_contexts. · e1887359
      Martijn Coenen authored
      This is a Qualcomm proprietary service,
      and does not belong here.
      
      Test: boot Marlin
      Bug: 63391760
      Merged-In: If7469051f6cef3e2440f7021ae26c9815ff54820
      Change-Id: If7469051f6cef3e2440f7021ae26c9815ff54820
      e1887359
  15. Aug 14, 2017
    • TreeHugger Robot's avatar
    • Steven Moreland's avatar
      Add screencap domain. · 0bf4d0db
      Steven Moreland authored
      am: 6b780b35  -s ours
      
      Change-Id: I61d2951d682b236e7643b7b81eb5c52f84024950
      0bf4d0db
    • Steven Moreland's avatar
      Add screencap domain. · 9216a6ad
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Merged-In: I9f31d2067e002e7042646ee38dbfc06687481ac7
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      9216a6ad
    • Steven Moreland's avatar
      Add screencap domain. · 6b780b35
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Merged-In: I9f31d2067e002e7042646ee38dbfc06687481ac7
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      6b780b35
  16. Aug 11, 2017
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 530e168c
      Josh Gao authored
      am: 94e2a921
      
      Change-Id: I3cb9bd4305fe3f6d720f757a232d4bb38de98895
      530e168c
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 94e2a921
      Josh Gao authored
      Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log
      crashes to dmesg when logd isn't up yet (or is the one crashing).
      
      Bug: http://b/36574794
      Test: stop tombstoned; crasher; dmesg
      Change-Id: I6ffe11bc613e88198893e82712719522b74fe1be
      94e2a921
Loading