- May 17, 2018
-
-
Bowgo Tsai authored
This is needed when ueventd needs to read device tree files (/proc/device-tree). Prior to acccess, it tries to read "androidboot.android_dt_dir" from kernel cmdline for a custom Android DT path. Bug: 78613232 Test: boot a device without unknown SELinux denials Change-Id: Iff9c882b4fcad5e384757a1e42e4a1d1259bb574
-
Treehugger Robot authored
-
- May 16, 2018
-
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Pavel Maltsev authored
Bug: 70637118 Test: m && emulator ; also verified Change-Id: I39dd17d20acc8d380f36e207679b8b1eba63a72e Merged-In: I39dd17d20acc8d380f36e207679b8b1eba63a72e (cherry picked from commit 368ae61f)
-
Treehugger Robot authored
-
Andreas Huber authored
shipping API version: For devices shipped on O-MR1 nothing changes, data is stored under /data/system/users/<user-id>/fpdata/... Devices shipped from now on will instead store fingerprint data under /data/vendor_de/<user-id>/fpdata. Support for /data/vendor_de and /data/vendor_ce has been added to vold. Bug: 36997597 Change-Id: Ibc7cc33b756f64abe68a749c0ada0ca4f6d92514 Merged-In: Ibc7cc33b756f64abe68a749c0ada0ca4f6d92514 Test: manually (cherry picked from commit 6116daa7)
-
Pavel Maltsev authored
For automotive (and I assume for other verticals) it make sense to keep vertical-specific policies outside of /system/sepolicy as those not used by the phones. However, there's no way to do it rather than using BOARD_PLAT_{PUBLIC|PRIVATE}_SEPOLICY_DIR build variables. Bug: 70637118 Test: lunch device && m Test: verify it builds, boots and logs seems to be reasonable Test: enable full treble for aosp_car_x86 - verify it builds, boots and no denials in the logs Change-Id: Ia5fd847f7a6152ff6cf99bbbc12e1e322f7946ab (cherry picked from commit 34f23364)
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- May 15, 2018
-
-
Pavel Maltsev authored
Add an exemption to neverallow rule to use sockets from HAL servers only for automotive build Bug: 78901167 Test: assign this attribute to hal_vehicle_default and try to open socket from HAL implementation Test: verify that new CTS test will fail for non-automotive build with this attribute buing used Test: make cts && cts-tradefed run singleCommand cts --skip-device-info --skip-preconditions --abi arm64-v8a --module CtsSecurityHostTestCases -t android.security.cts.SELinuxHostTest Merged-In: I27976443dad4fc5b7425c089512cac65bb54d6d9 (cherry picked from commit 4cafae77) Change-Id: I58e25a0f86579073aa568379b10b6599212134c6
-
Treehugger Robot authored
-
Yongqin Liu authored
to workaround some VTS VtsKernelLtp failures introduced by change on vfs_iter_write here: https://android.googlesource.com/kernel/hikey-linaro/+/abbb65899aecfc97bda64b6816d1e501754cfe1f%5E%21/#F3 for discussion please check threads here: https://www.mail-archive.com/seandroid-list@tycho.nsa.gov/msg03348.html Sandeep suggest to re-order the events in that thread, that should be the right solution, this change is only a tempory workaround before that change. Test: manually with -m VtsKernelLtp -t VtsKernelLtp#fs.fs_fill_64bit Change-Id: I3f46ff874d3dbcc556cfbeb27be21878574877d1 Signed-off-by:
Yongqin Liu <yongqin.liu@linaro.org>
-
Jerry Zhang authored
-
Joel Galenson authored
This relaxes the neverallow rule blocking vendor_init from doing anything to vold_metadata_file. The rules above it still prevent it from doing anything other than relabelto and getattr. Bug: 79681561 Test: Boot device and see no denials. Change-Id: I1beb25bb9f8d69323c9fee53a140c2a084b12124 (cherry picked from commit 597be44e)
-
Steven Moreland authored
hwservicemanager lost the permission to tell init to start the dumpstate HAL when dumpstate was given this permission exclusively. Bug: 77489941 # problem introduced Bug: 78509314 # converting dumpstate to lazy hals Test: convert an instance of dumpstate into a lazy HAL, run bugreport, see denial, then add permission, and see bugreport start to work again. Change-Id: I033701d8306200bebc0f250afe3d08f9e6ab98a1 (cherry picked from commit 0b1797b8) Merged-In: I033701d8306200bebc0f250afe3d08f9e6ab98a1
-
- May 14, 2018
-
-
Treehugger Robot authored
-
Jerry Zhang authored
Mtp needs access to this path in order to change files on an sdcard. Fixes denial: 05-14 17:40:58.803 3004 3004 W MtpServer: type=1400 audit(0.0:46): avc: denied { search } for name="media_rw" dev="tmpfs" ino=10113 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 b/77925342 app=com.android.providers.media Bug: 77849654 Test: no denials using mtp with emulated sdcard Change-Id: I27b5294fa211bb1eff6d011638b5fdc90334bc80
-
- May 10, 2018
-
-
Andreas Gampe authored
Let statsd find the service. The system server wants to read file attributes for the perfprofd dropbox file. Bug: 73175642 Test: m Test: manual Change-Id: I0c0b1dac057af90fff440286226093ec15b5e247
-
Mark Salyzyn authored
Introduce a standalone live-lock daemon (llkd), to catch kernel or native user space deadlocks and take mitigating actions. Test: llkd_unit_test Bug: 33808187 Bug: 72838192 Change-Id: If869ecd06e5ce7b04bba1dafd0a77971b71aa517
-
Paul Crowley authored
-
- May 09, 2018
-
-
Calin Juravle authored
The goal is to allow creating profile snapshots from the shell command in order to be able to write CTS tests. The system server will dump profiles for debuggable in /data/misc/profman from where they will be pulled and verified by CTS tests. Test: adb shell cmd package snapshot-profile com.android.vending Bug: 74081010 (cherry picked from commit 687d5e46) Merged-In: I54690305284b92c0e759538303cb98c93ce92dd5 Change-Id: I54690305284b92c0e759538303cb98c93ce92dd5
-
Tri Vo authored
Part of an effort to remove Treble-specifics from the way be build sepolicy. Bug: 70851112 Test: build and boot bullhead. Change-Id: I236f031e1b017875fb1afcc4f1b201699139516a
-
Paul Crowley authored
Bug: 79228237 Test: audit2allow finds no relevant denials on boot Merged-In: Ia80b77ba9a1ec2354127cd0ef68d50ebcf593fb0 Change-Id: Ia80b77ba9a1ec2354127cd0ef68d50ebcf593fb0
-
Mark Salyzyn authored
-
Dan Willemsen authored
-
Tri Vo authored
* changes: Soong module for selinux files including board-specific directories. Soong module selinux compat maps
-
Dan Willemsen authored
The tags property is (and has always been) unused by Soong. The property has been defined as a list of strings, and the `androidmk` converted any LOCAL_MODULE_TAGS entries over to it, but we've never done anything with it. In preparation for removing the definition from Soong, I'm removing it from all Android.bp files in the tree. Since this has never done anything, this is a no-op, but if you really did want the Android.mk behavior, the proper way to define a module to be installed in userdebug / eng builds is to use PRODUCT_PACKAGES_DEBUG or PRODUCT_PACKAGES_ENG in the appropriate product makefile. Change-Id: Ia9a9b1c35533e02047cbb183b317ab93f1eeec6b Exempt-From-Owner-Approval: global no-op build change Test: remove `tags` from Soong, see errors go away.
-
Dongwon Kang authored
-
- May 08, 2018
-
-
android-build-prod (mdb) authored
-
Tri Vo authored
se_filegroup is used to export selinux files from board-specific directories (e.g. device/google/wahoo/sepolicy). Use se_filegroup module to export partner extension of compatibility mapping to build logic in system/sepolicy. Bug: 33691272 Bug: 74669108 Test: .cil mapping files can be correctly added from vendor directory. Change-Id: Iaa2a95d0e326cb03a478fc12c1a14ba40e57e117
-
Tri Vo authored
And migrate 26.0.cil and 27.0.cil build targets from Android.mk to Android.bp Bug: 33691272 Test: 26.0.cil and 27.0.cil mapping files on the device are unchanged. Change-Id: Id0ea45c149e096996bc0657615ea98915df3c9e1
-
Joel Galenson authored
This should help fix presubmit tests. Bug: 79414024 Test: Built policy. Change-Id: Ic840150767ff6c2799ac3b5ef22ba139108c94dd
-
- May 07, 2018
-
-
android-build-prod (mdb) authored
-
Ray Essick authored
Let the audioserver record metrics with media.metrics service. This is for 'audiopolicy' metrics. Bug: 78595399 Test: record from different apps, see records in 'dumpsys media.metrics' Change-Id: Ie5c403d0e5ac8c6d614db5e7b700611ddd6d07e9 Merged-In: I63f9d4ad2d2b08eb98a49b8de5f86b6797ba2995
-
Max Bires authored
Keymaster hal needs to be able to read the vendor SPL for purposes of rollback protection. Test: Keymaster can access the hal_keymaster_default property Change-Id: Ifa53adb23f6ab79346e9dd9616b34d8b24395a0a
-
Tri Vo authored
Bug: 33691272 Test: make clean && mmma system/sepolicy Change-Id: I6bbd6271c375338e7d24cd6089c6f826080c98b6
-
Mark Salyzyn authored
Test: compile Bug: 64114943 Change-Id: I2bbf84a6e472d720f02282e10d56795b75ac62d1
-
- May 04, 2018
-
-
Pavel Maltsev authored
Bug: 70637118 Test: build, flash and boot automotive builds Change-Id: I6db23258de30174d6db09d241e91b08aa5afedef Merged-In: I6db23258de30174d6db09d241e91b08aa5afedef (cherry picked from commit 394dbe34)
-
Pawin Vongmasa authored
Test: Builds Bug: 64121714 Bug: 31973802 Change-Id: Id37be8726a8bb297e35bca494964fdbcc48c6a73 (cherry picked from commit 4be28894)
-