- Dec 14, 2018
-
-
Michael Groover authored
Test: manually verified SensorPrivacyService is accessible Bug: 110842805 Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
-
Tri Vo authored
-
Adam Vartanian authored
am: 5dcc6149 Change-Id: I5fdeeab0c23e2844bd4c7acbfc868487a6b010ff
-
- Dec 13, 2018
-
-
Adam Vartanian authored
am: 9f2b0fa0 Change-Id: Ib89d44bf3ed7f29f10d6fe1adc2244aa509ef9d5
-
Adam Vartanian authored
am: 66334bd0 Change-Id: I0062431fcb446d9377297b074145c7a8bad01aa1
-
Jeff Sharkey authored
am: 3ab95b5f Change-Id: If36cd59ef2bbf3326df7e84e514d25459b5b137e
-
Treehugger Robot authored
-
Paul Crowley authored
am: 11a25e68 Change-Id: Ia4a5856762782fcac2169a0bbcef470c07004cdc
-
Nick Kralevich authored
am: cc6a492a Change-Id: If9752183919006022057a44522396543e2eb3970
-
Yu-Han Yang authored
am: d42cd8b5 Change-Id: I70c9ce2598bed332929124d212d4e77c98759487
-
Jeff Sharkey authored
am: a6c1e72c Change-Id: I9a2bca6871c45a6e617f20b0a9cd6ab8461faacc
-
Paul Crowley authored
am: fb3d22c3 Change-Id: I1b477738c794a1130920fab2a6941a3bf6ccb206
-
Nick Kralevich authored
am: fffad07d Change-Id: I53596dc86dc4377ea30e7f4bf3abe82515eaed59
-
Yu-Han Yang authored
am: c668a9ab Change-Id: I48a434ad13d25df616569579f0eb97b58c0134e4
-
Jeff Sharkey authored
am: 7f82c3eb Change-Id: Ia2b34d40119a04f80c677c64b24549294c39e3d3
-
Paul Crowley authored
am: ecccfc84 Change-Id: Ie03c9a3df54c840b6f658c0387b4958e307a6269
-
Nick Kralevich authored
am: 42abd423 Change-Id: I50471d01ded8896d617522e2168ebaecec2d77cf
-
Yu-Han Yang authored
am: 66f75b69 Change-Id: Ide6874b7889363a6a78e35adb5637c085e83a12e
-
Tri Vo authored
It doesn't seem like any of our (Google's) devices use BOARD_ODM_SEPOLICY_DIRS, but this will be helpful for partners. Also, use BOARD_VENDOR_SEPOLICY_DIRS instead BOARD_SEPOLICY_DIRS for readability. Bug: n/a Test: m selinux_policy Change-Id: I23f64a24d51ccdb8aa616d0fd8a06d70b6efed32
-
Nick Kralevich authored
am: 423f9e4e Change-Id: Ie811470257694f6c6ff1ee642da1168f07d779a0
-
Nick Kralevich authored
am: 11ca80b2 Change-Id: I53f86dddd20fc2faf6c3629d7699d77b3682a015
-
Nick Kralevich authored
am: f523218d Change-Id: I891c0d542d3157eaa94007d14892ff0044ee5cd5
-
Benjamin Schwartz authored
-
Jeff Sharkey authored
-
Paul Crowley authored
-
Sudheer Shanka authored
Bug: 111789719 Test: manual Change-Id: I5a5c1da69fd5d55e3276bb7384a94b9831e3cccd
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Dec 12, 2018
-
-
Treehugger Robot authored
-
Paul Crowley authored
Test: Compiles - neverallow rules are compile time checks Change-Id: I2e1177897d2697cde8a190228ba83381d9a1877a
-
Yu-Han Yang authored
Bug: 112260995 Bug: 120277977 Test: atest VtsHalGnssV2_0TargetTest Change-Id: I196d8506b2f7c2153e1f647ea5ba61b81bf3d881
-
Nick Kralevich authored
Remove the ability for applications to dlopen() executable code from their home directory for newer API versions. API versions <= 28 are uneffected by this change. Bug: 112357170 Test: cts-tradefed run cts -m CtsRenderscriptTestCases Change-Id: I1d7f3a1015d54b8610d1c561f38a1a3c2bcf79e4
-
Nick Kralevich authored
When an app uses renderscript to compile a Script instance, renderscript compiles and links the script using /system/bin/bcc and /system/bin/ld.mc, then places the resulting shared library into the application's code_cache directory. The application then dlopen()s the resulting shared library. Currently, this executable code is writable to the application. This violates the W^X property (https://en.wikipedia.org/wiki/W%5EX), which requires any executable code be immutable. This change introduces a new label "rs_data_file". Files created by /system/bin/bcc and /system/bin/ld.mc in the application's home directory assume this label. This allows us to differentiate in security policy between app created files, and files created by renderscript on behalf of the application. Apps are allowed to delete these files, but cannot create or write these files. This is enforced through a neverallow compile time assertion. Several exceptions are added to Treble neverallow assertions to support this functionality. However, because renderscript was previously invoked from an application context, this is not a Treble separation regression. This change is needed to support blocking dlopen() for non-renderscript /data/data files, which will be submitted in a followup change. Bug: 112357170 Test: cts-tradefed run cts -m CtsRenderscriptTestCases Change-Id: Ie38bbd94d26db8a418c2a049c24500a5463698a3
-
Florian Mayer authored
am: 0f094e30 Change-Id: Ibb7cf3bae4e92e618d16d292c848dd257d6f68a2
-
Florian Mayer authored
am: 4935f908 Change-Id: I6ea6fee7f042ced9298c931257341ea77d47f48e
-
Florian Mayer authored
am: c32ca901 Change-Id: Ifa37f085f897789fc93a7e7ac7f41890f60e42bc
-
Florian Mayer authored
This is analoguous to what Perfetto does with persist.traced.enable. Test: m Test: flash walleye Test: setprop persist.heapprofd.enable 1 setprop persist.heapprofd.enable 0 Change-Id: I997272ef8c6fe078aca2388ed0cf2ecc3de612a5
-