Skip to content
Snippets Groups Projects
  1. Dec 19, 2018
  2. Dec 18, 2018
    • Tri Vo's avatar
      Merge changes from topic "product_sepolicy.cil" · 9ee4e3ae
      Tri Vo authored
      * changes:
        Separate product_sepolicy.cil out of system sepolicy
        Replace "grep -f" with python util.
      9ee4e3ae
    • Tri Vo's avatar
      Separate product_sepolicy.cil out of system sepolicy · 75887dd5
      Tri Vo authored
      Product-specific sepolicy will be installed into /product/etc/selinux/*.
      This change separates out /product/etc/selinux/product_sepolicy.cil out
      of system sepolicy.
      
      This file is merged into precompiled_sepolicy at build-time. In case
      precompiled_sepolicy can't be used (e.g. system-only-ota), init wll
      merge this file with the rest of the sepolicy at runtime.
      
      I left TODOs to separate other product-specific SELinux artifacts out of
      system.
      
      Bug: 119305624
      Test: boot aosp_taimen with product_sepolicy.cil
      Test: build selinux_policy for aosp_arm64; no product_sepolicy.cil
      produced
      Change-Id: Idb84a1c8ceb2de78f1460d954497c53fed08935f
      75887dd5
    • Treehugger Robot's avatar
      490cbfdb
    • Tri Vo's avatar
      Replace "grep -f" with python util. · d57789fd
      Tri Vo authored
      grep can potentially run out of memory on Mac builds for large input
      files. So we add a python util to handle filtering out files.
      
      We will also need this util to filter plat_sepolicy.cil out of
      product_sepolicy.cil
      
      Bug: 119305624
      Test: boot aosp_taimen
      Change-Id: I61cd68f407ea5de43a06bf522a5fc149e5067e8c
      d57789fd
    • Winson Chung's avatar
      Adding policy for content suggestions. · ac1a0a7b
      Winson Chung authored
      Bug: 120865921
      Test: Manual verification
      Change-Id: Ic0b3f85fad24ccedc0a8e9935c198bc8503bb415
      ac1a0a7b
  3. Dec 17, 2018
  4. Dec 16, 2018
  5. Dec 15, 2018
    • Rafal Slawik's avatar
      SELinux policy for rss_hwm_reset · 4e1c5764
      Rafal Slawik authored
      rss_hwm_reset is binary that reset RSS high-water mark counters for all
      currently running processes. It runs in a separate process because it
      needs dac_override capability.
      
      Bug: 119603799
      Test: no errors in logcat
      Change-Id: I6221a5eca3427bf532830575d8fba98eb3e65c29
      4e1c5764
  6. Dec 14, 2018
  7. Dec 13, 2018
  8. Dec 12, 2018
    • Treehugger Robot's avatar
      f523218d
    • Paul Crowley's avatar
      Remove overpermissive neverallow exceptions. · 90e68e92
      Paul Crowley authored
      Test: Compiles - neverallow rules are compile time checks
      Change-Id: I2e1177897d2697cde8a190228ba83381d9a1877a
      90e68e92
    • Yu-Han Yang's avatar
      Add sepolicy for GNSS HAL 2.0 and 1.1 · 63de8591
      Yu-Han Yang authored
      Bug: 112260995
      Bug: 120277977
      Test: atest VtsHalGnssV2_0TargetTest
      Change-Id: I196d8506b2f7c2153e1f647ea5ba61b81bf3d881
      63de8591
    • Nick Kralevich's avatar
      remove app_data_file execute · b3624743
      Nick Kralevich authored
      Remove the ability for applications to dlopen() executable code from
      their home directory for newer API versions. API versions <= 28 are
      uneffected by this change.
      
      Bug: 112357170
      Test: cts-tradefed run cts -m CtsRenderscriptTestCases
      Change-Id: I1d7f3a1015d54b8610d1c561f38a1a3c2bcf79e4
      b3624743
    • Nick Kralevich's avatar
      bless app created renderscript files · 0eb0a16f
      Nick Kralevich authored
      When an app uses renderscript to compile a Script instance,
      renderscript compiles and links the script using /system/bin/bcc and
      /system/bin/ld.mc, then places the resulting shared library into the
      application's code_cache directory. The application then dlopen()s the
      resulting shared library.
      
      Currently, this executable code is writable to the application. This
      violates the W^X property (https://en.wikipedia.org/wiki/W%5EX), which
      requires any executable code be immutable.
      
      This change introduces a new label "rs_data_file". Files created by
      /system/bin/bcc and /system/bin/ld.mc in the application's home
      directory assume this label. This allows us to differentiate in
      security policy between app created files, and files created by
      renderscript on behalf of the application.
      
      Apps are allowed to delete these files, but cannot create or write these
      files. This is enforced through a neverallow compile time assertion.
      
      Several exceptions are added to Treble neverallow assertions to support
      this functionality. However, because renderscript was previously invoked
      from an application context, this is not a Treble separation regression.
      
      This change is needed to support blocking dlopen() for non-renderscript
      /data/data files, which will be submitted in a followup change.
      
      Bug: 112357170
      Test: cts-tradefed run cts -m CtsRenderscriptTestCases
      Change-Id: Ie38bbd94d26db8a418c2a049c24500a5463698a3
      0eb0a16f
    • Florian Mayer's avatar
      Add persist.heapprofd.enable property. · c32ca901
      Florian Mayer authored
      This is analoguous to what Perfetto does with persist.traced.enable.
      
      Test: m
      Test: flash walleye
      Test: setprop persist.heapprofd.enable 1
            setprop persist.heapprofd.enable 0
      
      Change-Id: I997272ef8c6fe078aca2388ed0cf2ecc3de612a5
      c32ca901
    • Treehugger Robot's avatar
    • Sunny Goyal's avatar
      New system service: app_prediction_service · 2a2d638e
      Sunny Goyal authored
      - Update policy for new system service, used for SystemUI/Apps to
        present predicted apps in their UI.
      
      Bug: 111701043
      Test: manual verification
      Change-Id: Ia3b5db987097d2d71bf774ca550041e03214471d
      2a2d638e
  9. Dec 11, 2018
Loading