Skip to content
Snippets Groups Projects
  1. Jan 19, 2018
  2. Jan 18, 2018
  3. Jan 17, 2018
  4. Jan 16, 2018
  5. Jan 15, 2018
    • Nathan Harold's avatar
      Allow More Apps to Recv UDP Sockets from SystemServer · ee268643
      Nathan Harold authored
      This gives the privilege to system apps, platform apps,
      ephemeral apps, and privileged apps to receive a
      UDP socket from the system server. This is being added
      for supporting UDP Encapsulation sockets for IPsec, which
      must be provided by the system.
      
      This is an analogous change to a previous change that
      permitted these sockets for untrusted_apps:
      0f75a62e
      
      Bug: 70389346
      Test: IpSecManagerTest, System app verified with SL4A
      Change-Id: Iec07e97012e0eab92a95fae9818f80f183325c31
      ee268643
  6. Jan 12, 2018
    • Andreas Gampe's avatar
      Sepolicy: Allow perfprofd to contact dropbox · 3fa95acb
      Andreas Gampe authored
      Give rights to call dropbox via binder.
      
      Test: m
      Test: manual
      Change-Id: I968c432a27bc8fbe677a2dd03671908d555f9df6
      3fa95acb
    • Joel Galenson's avatar
      Improve neverallow error messages and allow disabling them on userdebug builds. · 5988b565
      Joel Galenson authored
      This patch adds a flag that can be used to ignore neverallow rules.
      By adding
      SELINUX_IGNORE_NEVERALLOWS := true
      into the BoardConfig.mk file, neverallow violations will be ignored
      silently.  This flag can only be enabled on userdebug and eng builds.
      
      Users of this flag should be very careful.  Since it does not work on
      user builds, it must be disabled to pass CTS, and enabling it for
      too long could hide issues that need to be addressed.
      
      As a happy side effect, this patch should also improve the error
      messages when violating a neverallow rules.  Specifically, the file
      and line number should be correct.
      
      Bug: 70950899
      Bug: 33960443
      Test: Built walleye-{user,eng} with and without this new option and
      a neverallow violation.  Built policy for all targets.
      
      Change-Id: Id0d65123cdd230d6b90faa6bb460d544054bb906
      5988b565
    • Tri Vo's avatar
      Files under /vendor must have attribute vendor_file_type. · 30c3c2a8
      Tri Vo authored
      Label /vendor/etc/selinux/* as vendor_configs_file.
      
      Bug: 62041836
      Test: build system/sepolicy
      Test: walleye boots
      Change-Id: I617a3287860e965c282e9e82b4375ea68dbca785
      30c3c2a8
  7. Jan 11, 2018
    • Tom Cherry's avatar
      Merge "Add toolbox to vendor partition" · 1d2c3f44
      Tom Cherry authored
      1d2c3f44
    • Tom Cherry's avatar
      Add toolbox to vendor partition · b7255bf2
      Tom Cherry authored
      Bug: 71861796
      Test: no more denials on walleye for shell init scripts
      Change-Id: I51eab267c95a915f927b0aaa7db9d678a83093c7
      b7255bf2
    • Holly Jiuyu Sun's avatar
    • Holly Jiuyu Sun's avatar
      Add EuiccCardManager and EuiccCardController. · d41ec0ed
      Holly Jiuyu Sun authored
      Bug: 38206971
      Test: test on phone
      Change-Id: Id34ab2673c7a16744fba77eb5c176e2e8b474299
      Merged-In: Id34ab2673c7a16744fba77eb5c176e2e8b474299
      d41ec0ed
    • Jeff Vander Stoep's avatar
      relabel files in /proc/net/xt_qtaguid/ · 43303c8b
      Jeff Vander Stoep authored
      /proc/net/xt_qtaguid is used by apps to track their network data
      use. Limit access to just zygote spawned processes - apps and
      system_server, omitting access to isolated_app which is not allowed
      to create network sockets.
      As Android moves to eBPF for app's network data stats, access to
      /proc/net/xt_qtaguid will be removed entirely. Segmenting access off
      is the first step.
      Bug: 68774956
      
      This change also helps further segment and whitelist access to
      files in /proc/net and is a step in the lockdown of /proc/net.
      Bug: 9496886
      
      Test: boot Taimen. Walk through setup-wizard. Make phone call and
          video call. Browse web. Watch youtube. Navigate in maps.
      Test: cts-tradefed run cts -m CtsAppSecurityHostTestCases -t \
          android.appsecurity.cts.AppSecurityTests
      Test: cts-tradefed run cts -m CtsNativeNetTestCases
      Test: cts-tradefed run cts -m CtsIncidentHostTestCases -t \
          com.android.server.cts.NetstatsIncidentTest
      Test: cts-tradefed run cts -m CtsOsTestCases -t \
          android.os.cts.StrictModeTest
      Test: cts-tradefed run cts -m CtsNetTestCases -t \
          android.net.cts.TrafficStatsTest
      Test: cts-tradefed run cts -m CtsUsageStatsTestCases -t \
          android.app.usage.cts.NetworkUsageStatsTest
      Test: vts-tradefed run vts -m VtsQtaguidTest
      Change-Id: Idddd318c56b84564142d37b11dcc225a2f2800ea
      43303c8b
  8. Jan 10, 2018
Loading