- Jan 14, 2019
-
-
Joel Fernandes authored
* changes: Add permissions for bpf.progs_loaded property Allow executing bpfloader from init and modify rules Assign bpfloader with CAP_SYS_ADMIN
-
Jeff Vander Stoep authored
Grant for icmp_socket for devices with 4.14 or greater kernel, and rawip_socket for devices with earlier kernels. Bug: 122572608 Test: build Change-Id: I1c9d2ce6761dbd2c4db3635600c5f5c335461083
-
Jeffrey Vander Stoep authored
-
Joel Fernandes authored
Change-Id: If4e550e4186415c5a1088bb53b0755b69f92560a Signed-off-by:
Joel Fernandes <joelaf@google.com>
-
Joel Fernandes authored
init needs to execute bpfloader as a one-shot service. Add sepolicy for the same. Also update old rules allowing init to fork/exec bpfloader and remove rules allowing netd to do so. Bug: 112334572 Change-Id: Ic242cd507731ed8af3f8e94d4fccc95819831d37 Signed-off-by:
Joel Fernandes <joelaf@google.com>
-
Joel Fernandes authored
bpfloader needs to load bpf programs with tracepoints in them. The tracepoint programs are not activated but are just loaded and pinned. The kernel expects the process doing this to have CAP_SYS_ADMIN. Since bpfloader was intended to be a 1-shot run and exit process with security privileges, lets assign it CAP_SYS_ADMIN so that it is able to load the tracepoint programs. Bug: 112334572 Change-Id: Icf9b5d95615e69f5c28dc28f021b07f49710c97d Signed-off-by:
Joel Fernandes <joelaf@google.com>
-
Martijn Coenen authored
-
- Jan 12, 2019
-
-
Sooraj Sasindran authored
-
Treehugger Robot authored
-
Jeff Vander Stoep authored
Vendor domains may use net_domain() so it should be moved to public policy. This will allow removal of permissions such as rawip_socket in future releases without breaking Treble compatiblity. Bug: 122572608 Test: build Change-Id: Id84feb11587d305334cd9dbbc6e4f6f71ffff6f2
-
Nick Kralevich authored
-
- Jan 11, 2019
-
-
Tim Van Patten authored
-
Treehugger Robot authored
-
Victor Hsieh authored
The original fs-verity implementation requires CAP_SYS_ADMIN and thus the actual setup is proxied through installd. Instead, upstream FS_IOC_ENABLE_VERITY ioctl checks write permission to inode, and thus can happen in system_server. Also, replace the old measure ioctl with FS_IOC_SET_VERITY_MEASUREMENT. Note that although the number is name, they work differently. Test: set ro.apk_verity.mode=2, in-progress CTS passed without denial Bug: 112037636 Change-Id: I3e8d14321df8904dfed68b83aae8b3dd99c211ac
-
Nick Kralevich authored
There are multiple trusted system components which may be responsible for creating executable code within an application's home directory. Renderscript is just one of those trusted components. Generalize rs_data_file to app_exec_data_file. This label is intended to be used for any executable code created by trusted components placed into an application's home directory. Introduce a typealias statement to ensure files with the previous label continue to be understood by policy. This change is effectively a no-op, as it just renames a type, but neither adds or removes any rules. Bug: 121375718 Bug: 112357170 Test: cts-tradefed run cts-dev -m CtsRenderscriptTestCases Change-Id: I17dca5e3e8a1237eb236761862174744fb2196c0
-
Eino-Ville Talvala authored
Test: Adding a camera.provider@2.5 to a device works correctly Merged-In: I516698afedad1294c0af3f4efedb0aed0a141780 Change-Id: I516698afedad1294c0af3f4efedb0aed0a141780
-
Tao Bao authored
update_engine no longer needs a standalone bspatch executable since [1] (which first landed into O). And we don't ship /system/bin/bspatch on device by default. [1] https://android-review.googlesource.com/c/platform/system/update_engine/+/327365 Test: Verify that /system/bin/bspatch doesn't exist on device. Test: Trigger an A/B OTA install for aosp_walleye-userdebug: `m dist`; `system/update_engine/scripts/update_device.py out/dist/aosp_walleye-ota.zip`. No update_engine related denial. Change-Id: Iff578bdb0b1909092dd19feff069755a44d29398
-
Steven Moreland authored
This was a regression in Q, and the file is an implementation of liblog. Bug: 113083310 Test: use tags from vendor and see no denials Change-Id: I726cc1fcfad39afc197b21e431a687a3e4c8ee4a
-
Treehugger Robot authored
-
Sooraj Sasindran authored
Rename AlternativeNetworkService to OpportunisticNetworkService Bug: 118347827 Test: compile Merged-In: I23b0caadd1801c104806fa438fc9054d8a31962e Change-Id: I23b0caadd1801c104806fa438fc9054d8a31962e
-
Martijn Coenen authored
For persistent properties related to apexd. Bug: 121302351 Test: apexd can get the prop Change-Id: Id9fd25923385188f46a9804155168c52f6b1187e
-
Primiano Tucci authored
-
Treehugger Robot authored
-
Remi NGUYEN VAN authored
-
Siarhei Vishniakou authored
Add the required permissions for the InputClassifier HAL. Bug: 62940136 Test: no selinux denials in logcat when HAL is used inside input flinger. Change-Id: Ibc9b115a83719421d56ecb4bca2fd196ec71fd76
-
- Jan 10, 2019
-
-
Remi NGUYEN VAN authored
Bug: b/122620633 Test: m Change-Id: I36fe66fc22a1664f9ef25c66f933a2613a6f346b
-
Primiano Tucci authored
When recording hour-long traces, logcat messages help to interpret the trace, giving human readable context on what is happening on the system. Furthermore this is particularly helpful for startup debugging thanks to activity manager instrumentation events (am_on_create_called, am_on_start, ...). This is only allowed on userdebug/eng builds. Bug: 122243384 Change-Id: I4dfaebf21107e9853b0bf42403fbab6c3b4d5141
-
Tim Van Patten authored
Create the system property ro.gfx.angle.supported that indicates if the device supports ANGLE. The current planned use of this property is to allow CTS to validate ANGLE functionality if the device indicates ANGLE is supported. Bug: 80239516 Test: Flash the build and verify the property is 'false' for marlin. Test: Flash the build and verify the property is 'true' for walleye. Change-Id: I00387db9ade34152f79d75453ea17d5ea7b063cd
-
Chalard Jean authored
Bug: 116512211 Test: Builds, boots, including upcoming changes needing this Change-Id: I6f119368c5a4f7ac6c0325915dff60124c5a6399
-
Tri Vo authored
-
Tri Vo authored
The way we build and run CTS expects full_treble_only and compatible_property_only macros to be applied to whole rules and not be nested inside other rules. Fixes: 122601363 Test: corresponding neverallow rule in auto-generated SELinuxNeverallowRulesTest.java is parsed correctly. Change-Id: Ibf5187cedca72510fe74c6dc55a75a54a86c02ff
-
- Jan 09, 2019
-
-
Chong Zhang authored
bug: 111407413 Change-Id: Ica209ad9476b0597a206bf53823a1928643c8256
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Yabin Cui authored
runas_app domain is used by lldb/ndk-gdb/simpleperf to debug/profile debuggable apps. But it misses permissions to ptrace app processes and read /proc/<app_pid> directory. Bug: none Test: build and boot marlin. Test: run lldb and simpleperf on apps with target sdk version 24-29. Change-Id: I9e6f940ec81a8285eae8db3b77fb1251a25dedd0
-
Jiyong Park authored
In order to use the bionic libs and the dynamic linker from the runtime APEX for all processes that are started after the APEX is activated, the paths /system/lib/{libc.so|libm.so|libdl.so} and /system/bin/linker are bind-mounted to the corresponding bionic libs and the dynamic linker in the runtime APEX. This bind mount allows us to keep other part of the platform and the tests having implicit assumption that bionic libs are located at /system/lib and loaded from the default linker namespace. Bug: 120266448 Test: device boots Change-Id: Ied611b267d187ee3d75a139c378ee12242d5b8d8
-
David Anderson authored
-
Remi NGUYEN VAN authored
-
- Jan 08, 2019
-
-
Jeff Vander Stoep authored
Bug: 33308258 Test: atest CtsSelinuxTargetSdk25TestCases Change-Id: Ifeceecec7b2f38ebd38b6693712b8f65ee24dc5d
-