- Feb 15, 2018
-
-
Robert Sesek authored
In this architecture, the system_server instructs the zygote to fork a child-zygote to be the webview_zygote. The system_server tells this new zygote to listen for fork requests on a random abstract unix socket of its choosing. A follow-up CL will remove the rules for starting webview_zygote via init. Bug: 63749735 Test: m Test: Launch "Third-party licenses" activity from Settings, and it renders correctly via the WebView. Merged-In: I864743943c11c18de386010ecd4b616721cb9954 Change-Id: I1c352e47b66eca3a3fa641daa6ecc3e7a889b54e
-
- Feb 13, 2018
-
-
Bookatz authored
CTS tests need to be able to call, from hostside: adb shell cmd stats dump-report (and others) On a user build, this will fail because of an selinux policy violation from shell. This cl fixes this by granting shell permission. Similarly, Settings needs to communicate with statsd, so system_app-statsd binder calls are given permission. Bug: 72961153 Bug: 73255014 Test: run cts-dev -m CtsStatsdHostTestCases -t android.cts.statsd.atom.HostAtomTests Test: manual confirmation Change-Id: I6589ab4ef5c91a4a7f78eb97b63d9bb43e3d8f02
-
Primiano Tucci authored
Allows the traced_probes daemon to access the core ftrace functionalities on user builds. Specifically this involves: - Whitelisting the per_cpu/ subdirectory to access: 1) trace_pipe_raw file to allow perfetto to read the raw ftrace buffer (rather than the text-based /trace endpoint) 2) cpuX/stats and cpuX/buffer_size_kb that allow to tune the buffer size per-cpu pipe and to get basic statistics about the ftrace buffer (#events, overruns) - Whitelistiing the full event directories rather than the /enable files. This gives also access to the /format files for the events that are already enabled on user builds. /format files simply describe the memory layout of the binary logs. Example: https://ghostbin.com/paste/f8m4k This still does NOT allow enabling the events labeled as "_debug" (mostly events that return activity on inodes). We'll deal with that separately as soon as we get a POC of inode resolution and a sensible blacklist/whitelist model. Bug: 70942310 Change-Id: Ic15cca0a9d7bc0e45aa48097a94eadef44c333f8
-
- Feb 12, 2018
-
-
Joel Galenson authored
This should fix presubmit tests. Bug: 68319037 Test: Built policy. Change-Id: I0c3bc08c9b114e7a3737cdb3005fb59b2df47d55
-
- Feb 09, 2018
-
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72550646 Test: Built policy. Change-Id: Ib17d2a5e1635ff661d39d14169652f88b7a6e4f5
-
- Feb 08, 2018
-
-
Joel Galenson authored
This should fix presubmit tests. Bug: 73128755 Test: Built policy. Change-Id: Ie389de04360090594e627e629a59a60092dda6ca
-
Jeff Vander Stoep authored
Restrictions introduced in vendor init mean that new devices may not no longer exempt vendor init from writing to system_data_file. This means we must introduce a new label for /data/vendor which vendor_init may write to. Bug: 73087047 Test: build and boot Taimen and Marlin. Complete SUW, enroll fingerprint No new denials. Change-Id: I65f904bb28952d4776aab947515947e14befbe34
-
- Feb 07, 2018
-
-
Tri Vo authored
Bug: 72878750 Test: build sepolicy Change-Id: Ifa6822e042beed0e5971c85155aa526912807c8a
-
Joel Galenson authored
This should fix presubmit tests. Bug: 73068008 Test: Built policy. Change-Id: Ib27fbad2803eb86ff12526f0ae42eb35917ce59b
-
- Feb 06, 2018
-
-
Niklas Brunlid authored
A change in the "open" syscall between kernel 4.4 and 4.9 means that the "create" action is now checked and makes system_server trigger an SELinux denial when PackageSettings is removing a user ID from Settings.java/writeKernelRemoveUserLPr() in PackageManager. Bug: 70150770 Test: Manual - Add a new user on the device, no need to perform setup. - Wait 30s - Remove the added user - While running, check the result of: adb logcat -v time -b events | grep audit | grep system_server Change-Id: I1f490ea95d5bcb2adc76cba041bffbea131b447a
-
Tri Vo authored
Bug: 69390067 Test: build sepolicy Test: 27.0.ignore.cil is a subset 26.0.ignore.cil Change-Id: I6b9a1cfa8b38df4e97e5d63e2938ee9d5a4c83ec
-
Tri Vo authored
reboot_data_file was already removed from 26.cil by aosp/505397 Bug: 69390067 Test: build sepolicy Change-Id: Ieff68cbdaf5b0ddc02d0d3e463765ba3716994ba
-
- Feb 05, 2018
-
-
Chris Morin authored
Since we now call patchoat --verify in zygote art loading code, we have the unintended effect of webview zygote calling patchoat --verify. This is undesireable since webview zygote doesn't need to verify the .art files after the app_process zygote has already done so. The exec of patchoat fails for webview zygote, and this change hides that. This change should be reverted when b/72957399 is resolved. Bug: 66697305 Test: Ensure no new selinux denials were introduced. Change-Id: I4152edc920e5c436516b958b8c861dcc1c4751d8
-
Carmen Jackson authored
This changes tracefs files to be default-enabled in debug mode, but default-disabled with specific files enabled in user mode. Bug: 64762598 Test: Successfully took traces in user mode. Change-Id: I572ea22253e0c1e42065fbd1d2fd7845de06fceb
-
Andrew Scull authored
Bug: 71527305 Test: compile and boot Change-Id: I91097bd62d99b8dd9eb6f53060badbaf0f4b8b4a (cherry picked from commit 1aedf4b5)
-
Bowgo Tsai authored
This change renames the non-platform sepolicy files on a DUT from nonplat_* to vendor_*. It also splits the versioned platform sepolicy from vendor_sepolicy.cil to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps vendor customizations in vendor_sepolicy.cil. Build variable BOARD_SEPOLICY_DIRS is also renamed to BOARD_VENDOR_SEPOLICY_DIRS. Bug: 64240127 Test: boot bullhead/taimen Change-Id: Iea2210c9c8ab30c9ecbcd8146f074e76e90e6943
-
- Feb 02, 2018
-
-
Jeff Vander Stoep authored
Test: Standard Traceur workflow works successfully with no selinux denials on a user build. Bug: 64762598 Change-Id: I0dfe506d463b63d70c5bda03f8706041ea7ab448
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72749888 Test: Built policy. Change-Id: Ie55127f1b570832c03878d1c697262239ac14003
-
Bowgo Tsai authored
This reverts commit 9aa8496f. Fix angler/bullhead boot failure. Bug: 72787689 Test: build Change-Id: I77671a74cd952544a1dbb3daabc2bb449a7c2cf2
-
- Feb 01, 2018
-
-
Paul Crowley authored
Bug: 63927601 Test: Enable metadata encryption in fstab on Taimen, check boot success. Change-Id: Iddbcd05501d360d2adc4edf8ea7ed89816642d26
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72811052 Test: Built policy. Change-Id: Ifcfe71c717a3b1e59cd1810c7f9be588d48c99a5
-
Bowgo Tsai authored
Need use 'nonplat_service_contexts_file' as the file context for /vendor_service_context on non full-treble device. Otherwise, servicemanager can't read the file. Bug: 72787689 Test: build Change-Id: Ib54e4f2501c7bbf8b397eacf4afadfae344ddd03
-
- Jan 31, 2018
-
-
Yi Jin authored
command to fetch data from shell. Bug: 72502621 Test: N/A Change-Id: I5b581f647c2f2932f0e3711965b98351ef7e6063
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72749888 Test: Built policy. Change-Id: I588bba52d26bcc7d93ebb16e28458d9125f73108
-
Bowgo Tsai authored
This change renames the non-platform sepolicy files on a DUT from nonplat_* to vendor_*. It also splits the versioned platform sepolicy from vendor_sepolicy.cil to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps vendor customizations in vendor_sepolicy.cil. Build variable BOARD_SEPOLICY_DIRS is also renamed to BOARD_VENDOR_SEPOLICY_DIRS. Bug: 64240127 Test: boot an existing device Change-Id: Iea87a502bc6191cfaf8a2201f29e4a2add4ba7bf
-
Siarhei Vishniakou authored
Bug: 62940136 Test: read /dev/v4l-touchX from inputflinger Change-Id: Ifcece4192c567e0cbaba1b7ad40d25c8f34f8e40
-
- Jan 30, 2018
-
-
Joel Galenson authored
Remove bugs that have been fixed, re-map duped bugs, and alphabetize the list. Test: Booted Walleye and Sailfish, tested wifi and camera, and observed no new denials. Change-Id: I94627d532ea13f623fe29cf259dd404bfd850c13
-
Jeff Vander Stoep authored
Bug: 72668919 Test: build Change-Id: Id156b40a572dc0dbfae4500865400939985949d9
-
- Jan 29, 2018
-
-
Ruchi Kandoi authored
Test: App startup on boot Change-Id: I7740aafc088aadf676328e3f1bb8db5175d97102
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72472544 Test: Built policy. Change-Id: I01f0fe3dc759db66005e26d15395893d494c4bb7
-
Tom Cherry authored
vendor_init exists on the system partition, but it is meant to be an extention of init that runs with vendor permissions for executing vendor scripts, therefore it is not meant to be in coredomain. Bug: 62875318 Test: boot walleye Merged-In: I01af5c9f8b198674b15b90620d02725a6e7c1da6 Change-Id: I01af5c9f8b198674b15b90620d02725a6e7c1da6
-
Primiano Tucci authored
Instead of having statsd linking the perfetto client library and talk directly to its socket, we let just statsd exec() the /system/bin/perfetto cmdline client. There are two reasons for this: 1) Simplify the interaction between statsd and perfetto, reduce dependencies, binary size bloat and isolate faults. 2) The cmdline client also takes care of handing the trace to Dropbox. This allows to expose the binder interaction surface to the short-lived cmdline client and avoid to grant binder access to the perfetto traced daemon. This cmdline client will be used by: - statsd - the shell user (for our UI and Studio) Bug: 70942310 Change-Id: I8cdde181481ad0a1a5cae5937ac446cedac54a1f
-
- Jan 28, 2018
-
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72550646 Test: Built policy. Change-Id: I51345468b7e74771bfa2958efc45a2a839c50283
-
- Jan 25, 2018
-
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72507494 Test: Built policy. Change-Id: I56944d92232c7a715f0c88c13e24f65316805c39
-
Tom Cherry authored
The exception for vendor_init in this neverallow was never needed. Bug: 62875318 Test: Build walleye, bullhead Change-Id: Iac2b57df30b376492851d7520994e0400a87f1e1
-
Joel Galenson authored
We are occasionally seeing the following SELinux denial: avc: denied { read } for comm="idmap" path="/proc/947/mounts" scontext=u:r:idmap:s0 tcontext=u:r:installd:s0 tclass=file This commit suppresses that exact denial. We believe this is occurring when idmap is forked from installd, which is reading its mounts file in another thread. Bug: 72444813 Test: Boot Walleye and test wifi and camera. Change-Id: I3440e4b00c7e5a708b562a93b304aa726b6a3ab9
-
Andreas Gampe authored
Allow dumpstate & system server watchdog to dump statsd stacks. Bug: 72461610 Test: m Change-Id: I4c3472881da253f85d54b5e5b767b06e2618af9c
-
Joel Galenson authored
This should fix presubmit tests. Bug: 72444813 Test: Built policy. Change-Id: I5b8661b34c9417cd95cb0d6b688443dcbe0d1c0b
-
- Jan 24, 2018
-
-
Jaekyun Seok authored
Since /product is an extension of /system, its file contexts should be consistent with ones of /system. Bug: 64195575 Test: tested installing a RRO, apps, priv-apps and permissions Change-Id: I7560aaaed852ba07ebe1eb23b303301481c897f2
-
yinxu authored
Bug: 64131518 Test: Compile and flash the device, check whether service vendor.radio-config-hal-1-0 starts Change-Id: Id728658b4acdda87748259b74e6b7438f6283ea5
-