- Dec 19, 2018
-
-
Nick Kralevich authored
The bcc command line uses /data/user/0 paths, so renderscript needs to be able to follow those symlinks. Addresses the following denial: audit(1545249938.830:2274): avc: denied { read } for comm="bcc" name="0" dev="dm-6" ino=101 scontext=u:r:rs:s0:c184,c256,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=lnk_file permissive=1 app=android.rscpp.cts Test: cts-tradefed run cts -m CtsRsCppTestCases Bug: 121266184 Bug: 112357170 Change-Id: I16210f9b95f386bdee0863cf0044c956af99586d
-
Tri Vo authored
Bug: 119305624 Test: boot blueline Change-Id: I3ecdeab3bb33c3cb5e80dc10ba1079c9853048f8
-
- Dec 18, 2018
-
-
Tri Vo authored
* changes: Separate product_sepolicy.cil out of system sepolicy Replace "grep -f" with python util.
-
Tri Vo authored
Product-specific sepolicy will be installed into /product/etc/selinux/*. This change separates out /product/etc/selinux/product_sepolicy.cil out of system sepolicy. This file is merged into precompiled_sepolicy at build-time. In case precompiled_sepolicy can't be used (e.g. system-only-ota), init wll merge this file with the rest of the sepolicy at runtime. I left TODOs to separate other product-specific SELinux artifacts out of system. Bug: 119305624 Test: boot aosp_taimen with product_sepolicy.cil Test: build selinux_policy for aosp_arm64; no product_sepolicy.cil produced Change-Id: Idb84a1c8ceb2de78f1460d954497c53fed08935f
-
Treehugger Robot authored
-
Tri Vo authored
grep can potentially run out of memory on Mac builds for large input files. So we add a python util to handle filtering out files. We will also need this util to filter plat_sepolicy.cil out of product_sepolicy.cil Bug: 119305624 Test: boot aosp_taimen Change-Id: I61cd68f407ea5de43a06bf522a5fc149e5067e8c
-
Winson Chung authored
Bug: 120865921 Test: Manual verification Change-Id: Ic0b3f85fad24ccedc0a8e9935c198bc8503bb415
-
- Dec 17, 2018
-
-
Chong Zhang authored
Make mediaextractor use hidl memory allocated by hidl allocator, instead of constructing hidl memory from IMemory. bug: 112766913 bug: 111407253 Change-Id: I7902f18768005c995925bc9a7947299e9988b68a (Needed for internal commit I39e131718ea41f9cb23177c28213ddf7b7741338)
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Stan Iliev authored
Test: Booted with Vulkan rendering Change-Id: I00485c16e5a878321a699f35d28fb85834991255
-
Todd Kennedy authored
We're creating a new PermissionManagerService that will handle all of the permission related APIs. These are currently being routed through PackageManagerService. Test: Device boots Change-Id: I7d08561dd33b692209c30d413cdca0ff567358f1
-
Treehugger Robot authored
-
Alan Stokes authored
-
- Dec 16, 2018
-
-
Peter Kalauskas authored
-
Martijn Coenen authored
-
- Dec 15, 2018
-
-
Rafal Slawik authored
rss_hwm_reset is binary that reset RSS high-water mark counters for all currently running processes. It runs in a separate process because it needs dac_override capability. Bug: 119603799 Test: no errors in logcat Change-Id: I6221a5eca3427bf532830575d8fba98eb3e65c29
-
- Dec 14, 2018
-
-
Peter Kalauskas authored
Test: Run CtsMediaTestCases on aosp_marlin_svelte Change-Id: Ie7d491fbc11ef5c24826a0d69e479bc03bd2ad08
-
Felipe Leme authored
Bug: 111276913 Test: manual verification Merged-In: If76dc7bfdad87789a58fc94e0fd280deae1a41ab Change-Id: If76dc7bfdad87789a58fc94e0fd280deae1a41ab (cherry picked from commit 73e7fa88)
-
Alan Stokes authored
On debug builds, introduce audit logging of apps targeting SDK <= 28 that execute native code from a non-priv app home directory via execve() or dl_open(). Bug: 111338677 Test: Builds + boots. Test: Launch app that uses private .so files, see granted logs. Change-Id: I5880801d3a29cbf2c1cf4e0d72adc69a9d548952
-
Martijn Coenen authored
To work around a kernel bug where pages that are read before changing the loop device offset are not invalidated correctly. Bug: 120853401 Test: apexd mounts APEX files on gphone_sdk_x86_64 Change-Id: I89f23f8f9d472e599f053553b73cc0618dcb3747
-
Tri Vo authored
-
- Dec 13, 2018
-
-
Treehugger Robot authored
-
Tri Vo authored
It doesn't seem like any of our (Google's) devices use BOARD_ODM_SEPOLICY_DIRS, but this will be helpful for partners. Also, use BOARD_VENDOR_SEPOLICY_DIRS instead BOARD_SEPOLICY_DIRS for readability. Bug: n/a Test: m selinux_policy Change-Id: I23f64a24d51ccdb8aa616d0fd8a06d70b6efed32
-
Jeff Sharkey authored
-
Florian Mayer authored
When daemonizing perfetto, SIGINT should be sent to ensure clean shutdown. Denial: 12-06 11:12:16.566 3099 3099 I sh : type=1400 audit(0.0:462): avc: denied { signal } for scontext=u:r:shell:s0 tcontext=u:r:perfetto:s0 tclass=process permissive=1 Test: m Test: flash walleye Test: SIGINT perfetto from shell Change-Id: I8d34b447ea90c315faf88f020f1dfc49e4abbcce
-
Paul Crowley authored
-
Sudheer Shanka authored
Bug: 111789719 Test: manual Change-Id: I5a5c1da69fd5d55e3276bb7384a94b9831e3cccd
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Dec 12, 2018
-
-
Treehugger Robot authored
-
Paul Crowley authored
Test: Compiles - neverallow rules are compile time checks Change-Id: I2e1177897d2697cde8a190228ba83381d9a1877a
-
Yu-Han Yang authored
Bug: 112260995 Bug: 120277977 Test: atest VtsHalGnssV2_0TargetTest Change-Id: I196d8506b2f7c2153e1f647ea5ba61b81bf3d881
-
Nick Kralevich authored
Remove the ability for applications to dlopen() executable code from their home directory for newer API versions. API versions <= 28 are uneffected by this change. Bug: 112357170 Test: cts-tradefed run cts -m CtsRenderscriptTestCases Change-Id: I1d7f3a1015d54b8610d1c561f38a1a3c2bcf79e4
-
Nick Kralevich authored
When an app uses renderscript to compile a Script instance, renderscript compiles and links the script using /system/bin/bcc and /system/bin/ld.mc, then places the resulting shared library into the application's code_cache directory. The application then dlopen()s the resulting shared library. Currently, this executable code is writable to the application. This violates the W^X property (https://en.wikipedia.org/wiki/W%5EX), which requires any executable code be immutable. This change introduces a new label "rs_data_file". Files created by /system/bin/bcc and /system/bin/ld.mc in the application's home directory assume this label. This allows us to differentiate in security policy between app created files, and files created by renderscript on behalf of the application. Apps are allowed to delete these files, but cannot create or write these files. This is enforced through a neverallow compile time assertion. Several exceptions are added to Treble neverallow assertions to support this functionality. However, because renderscript was previously invoked from an application context, this is not a Treble separation regression. This change is needed to support blocking dlopen() for non-renderscript /data/data files, which will be submitted in a followup change. Bug: 112357170 Test: cts-tradefed run cts -m CtsRenderscriptTestCases Change-Id: Ie38bbd94d26db8a418c2a049c24500a5463698a3
-
Florian Mayer authored
This is analoguous to what Perfetto does with persist.traced.enable. Test: m Test: flash walleye Test: setprop persist.heapprofd.enable 1 setprop persist.heapprofd.enable 0 Change-Id: I997272ef8c6fe078aca2388ed0cf2ecc3de612a5
-
Treehugger Robot authored
-
Sunny Goyal authored
- Update policy for new system service, used for SystemUI/Apps to present predicted apps in their UI. Bug: 111701043 Test: manual verification Change-Id: Ia3b5db987097d2d71bf774ca550041e03214471d
-
- Dec 11, 2018
-
-
Michael Butler authored
-
Fan Xu authored
-