Skip to content
Snippets Groups Projects
  1. Jul 17, 2018
  2. Jul 14, 2018
    • Steven Thomas's avatar
      Selinux changes for vr flinger vsync service · 7bec9674
      Steven Thomas authored
      Add selinux policy for the new Binder-based vr flinger vsync service.
      
      Bug: 72890037
      
      Test: - Manually confirmed that I can't bind to the new vsync service
      from a normal Android application, and system processes (other than
      vr_hwc) are prevented from connecting by selinux.
      
      - Confirmed the CTS test
        android.security.cts.SELinuxHostTest#testAospServiceContexts, when
        built from the local source tree with this CL applied, passes.
      
      - Confirmed the CTS test
        android.cts.security.SELinuxNeverallowRulesTest#testNeverallowRules521,
        when built from the local source tree with this CL applied, passes.
      
      Change-Id: Ib7a6bfcb1c2ebe1051f3accc18b481be1b188b06
      7bec9674
  3. Jul 13, 2018
  4. Jul 12, 2018
  5. Jul 11, 2018
  6. Jul 03, 2018
  7. Jul 02, 2018
    • Yabin Cui's avatar
      Merge "Export more files in proc_perf." · 74f86551
      Yabin Cui authored
      74f86551
    • Yabin Cui's avatar
      Export more files in proc_perf. · 09464811
      Yabin Cui authored
      Export /proc/sys/kernel/perf_cpu_time_max_percent and
      /proc/sys/kernel/perf_event_mlock_kb in proc_perf. So
      they can be read in shell and written by init.
      
      This is needed by simpleperf to control cpu percent and
      memory used for profiling.
      
      Bug: 110706031
      Test: build and boot hikey960 successfully.
      
      Change-Id: I2a01f583508003ab73427bab30a7982a27dfa677
      09464811
    • Yongqin Liu's avatar
      public/netd.te: allow netd to operate icmp_socket that passed to it · 8a8d4ef5
      Yongqin Liu authored
      This should be supplement for the change here:
      https://android-review.googlesource.com/c/platform/system/sepolicy/+/708638
      
      
      
      When test the cts libcore.libcore.io.OsTest#test_socketPing test case, it will fail
      with avc denial message like following:
      
      [ 1906.617027] type=1400 audit(1530527518.195:10496): avc: denied { read write } for comm="netd" path="socket:[32066]" dev="sockfs" ino=32066 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617189] type=1400 audit(1530527518.195:10496): avc: denied { read write } for comm="netd" path="socket:[32066]" dev="sockfs" ino=32066 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617206] type=1400 audit(1530527518.195:10497): avc: denied { getopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617313] type=1400 audit(1530527518.195:10497): avc: denied { getopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617330] type=1400 audit(1530527518.195:10498): avc: denied { setopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1907.832425] type=1400 audit(1530527518.195:10498): avc: denied { setopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      
      Test: run cts -m CtsLibcoreTestCases -t libcore.libcore.io.OsTest#test_socketPing
      
      Change-Id: If41cb804292834b8994333f170d1f7f837bcd7df
      Signed-off-by: default avatarYongqin Liu <yongqin.liu@linaro.org>
      8a8d4ef5
    • Pawin Vongmasa's avatar
      Allow surfaceflinger to call into mediacodec · ff2dccaf
      Pawin Vongmasa authored
      Test: adb logcat | grep "Wrong interface type."
      
      Bug: 77924251
      Change-Id: Idf9d7ae6db0d41bb0c2f94b2183bfe23f0c21155
      ff2dccaf
  8. Jun 29, 2018
  9. Jun 28, 2018
  10. Jun 27, 2018
  11. Jun 26, 2018
    • Jian Yu's avatar
      Fix issue that ro.telephony.default_network can't be read per slot · bbb439e7
      Jian Yu authored
      "ro.telephony.default_network" can define as comma-separated Sting per
      slot for multi SIM device. However, it cannot be read correctly due to
      it defined as Int in property_contexts file.
      
      Bug: 110626665
      Test: manual - Checked the ro.telephony.default_network can be read per
      slot for multi SIM device.
      Change-Id: I900620e46c819c14bf339751f00a1db1473fd45f
      bbb439e7
    • Yi Jin's avatar
      Allow incidentd to read kernel version · 880de35b
      Yi Jin authored
      Bug: 110230810
      Test: N/A
      Change-Id: Ide135dd5a8da05f0ea639bf03ce9612862108225
      880de35b
    • Samuel Ha's avatar
      Revert "Revert "Reduce the number of processes that can start adbd"" · 22f98197
      Samuel Ha authored
      This reverts commit b5dc6137.
      
      Reason for revert: Reverted incorrect change
      
      Change-Id: Ieafa3338e28ffeed40bcceb73486cffbfbd08b9d
      22f98197
    • Samuel Ha's avatar
      Revert "Reduce the number of processes that can start adbd" · b5dc6137
      Samuel Ha authored
      This reverts commit faebeaca.
      
      Reason for revert: broke the build
      
      Change-Id: I3d61ce011ad42c6ff0e9f122de3daa37e846407a
      b5dc6137
    • Luis Hector Chavez's avatar
      Reduce the number of processes that can start adbd · faebeaca
      Luis Hector Chavez authored
      This change makes it such that only init can start adbd directly. It
      also introduces new rules for ctl.{start,stop,restart} properties such
      that only usbd and recovery (and su, since it's permissive) can directly
      ask init to start adbd.
      
      Bug: 64720460
      Test: adbd still runs
      Test: /data/nativetest64/adbd_test/adbd_test
      Test: python system/core/adb/test_adb.py
      Test: "USB debugging" in System Settings still start/stop adbd
      Test: Recovery menu still make the device show as "recovery" in adb
            devices
      Test: "Apply update from ADB" in recovery menu still works
      Change-Id: Iafcda8aa44e85129afcc958036b472d856fa1192
      faebeaca
  12. Jun 25, 2018
    • Eino-Ville Talvala's avatar
      Make system property audio.camerasound.force a vendor-writable property, · 3ac71f8d
      Eino-Ville Talvala authored
      This property is read by the audio service in system server to toggle
      camera shutter sound enforcement on a device-specific basis.
      
      Test: Camera shutter sound enforcement works when audio.camerasound.force is set
      Bug: 110126976
      Change-Id: I2720d3c699c4712d1a328f59dde0b16bbf1016f3
      3ac71f8d
    • Neil Fuller's avatar
      Add label for time (zone) system properties · b794ad0f
      Neil Fuller authored
      This adds a label for system properties that will affect system-wide
      time / time detection logic.
      
      The first example will be something like:
      persist.time.detection_impl_version
      
      Bug: 78217059
      Test: build
      Change-Id: I46044f1e28170760001da9acf2496a1e3037e48a
      b794ad0f
  13. Jun 22, 2018
    • Treehugger Robot's avatar
      0474b119
    • Treehugger Robot's avatar
      4b9a3128
    • Peiyong Lin's avatar
      Allow SurfaceFlinger to use Power HAL. · 02be5975
      Peiyong Lin authored
      When we have wide color gamut content, SurfaceFlinger might want to send a
      PowerHint through Power Hal to boost GPU to higher frequency, to make sure GPU
      composition can finish in time.
      
      BUG: 110112323
      Test: adb shell cat /sys/class/kgsl/kgsl-3d0/devfreq/cur_freq
      Change-Id: If60c13aedc4ff84eaefd3430794dc15a478c5a73
      02be5975
    • Dario Freni's avatar
      512e1c4d
    • Jeff Vander Stoep's avatar
      Update socket ioctl restrictions · 0597ade1
      Jeff Vander Stoep authored
      Grant access to icmp_socket to netdomain. This was previously
      labeled as rawip_socket which apps are allowed to use. Neverallow
      all other new socket types for apps.
      
      Kernels versions > 4.9 redefine ICMP sockets from rawip_socket
      to icmp_socket. To pass neverallow tests, we need to define
      which IOCTLs are allowed (and disallowed).
      
      Note that this does not change behavior on devices with
      kernel versions <=4.9. However, it is necessary (although not
      sufficient) to pass CTS on kernel version 4.14.
      
      Bug: 110520616
      Test: Grant icmp_socket in net.te and build.
      Change-Id: I5c7cb6867d1a4cd1554a8da0d55daa8e06daf803
      0597ade1
Loading