Skip to content
Snippets Groups Projects
  1. May 29, 2018
    • Jeff Vander Stoep's avatar
      Improve tests protecting private app data · ab82125f
      Jeff Vander Stoep authored
      In particular, add assertions limiting which processes may
      directly open files owned by apps. Reduce this to just apps, init,
      and installd. App data is protected by a combination of selinux
      permissions and Unix permissions, so limiting the open permission to
      just apps (which are not allowed to have CAP_DAC_OVERRIDE or
      CAP_DAC_READ_SEARCH) ensures that only installd and init have
      complete access an app's private directory.
      
      In addition to apps/init/installd, other processes currently granted
      open are mediaserver, uncrypt, and vold. Uncrypt's access appears to
      be deprecated (b/80299612). Uncrypt now uses /data/ota_package
      instead. b/80418809 and b/80300620 track removal for vold and
      mediaserver.
      
      Test: build/boot aosp_taimen-userdebug. Verify no "granted" audit
      messages in the logs.
      Bug: 80190017
      Bug: 80300620
      Bug: 80418809
      Fixes: 80299612
      Change-Id: I153bc7b62294b36ccd596254a5976dd887fed046
      ab82125f
  2. May 21, 2018
  3. May 18, 2018
  4. May 17, 2018
  5. May 16, 2018
  6. May 15, 2018
  7. May 14, 2018
    • Treehugger Robot's avatar
      bdac534c
    • Jerry Zhang's avatar
      Allow mediaprovider to search /mnt/media_rw · ddb89ab7
      Jerry Zhang authored
      Mtp needs access to this path in order to
      change files on an sdcard.
      
      Fixes denial:
      
      05-14 17:40:58.803  3004  3004 W MtpServer: type=1400 audit(0.0:46):
      avc: denied { search } for name="media_rw" dev="tmpfs" ino=10113
      scontext=u:r:mediaprovider:s0:c512,c768
      tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0
      b/77925342 app=com.android.providers.media
      
      Bug: 77849654
      Test: no denials using mtp with emulated sdcard
      Change-Id: I27b5294fa211bb1eff6d011638b5fdc90334bc80
      ddb89ab7
  8. May 10, 2018
    • Andreas Gampe's avatar
      Sepolicy: Fix perfprofd permissions · 835881aa
      Andreas Gampe authored
      Let statsd find the service. The system server wants to read file
      attributes for the perfprofd dropbox file.
      
      Bug: 73175642
      Test: m
      Test: manual
      Change-Id: I0c0b1dac057af90fff440286226093ec15b5e247
      835881aa
    • Mark Salyzyn's avatar
      llkd: add live-lock daemon · e4b3e0b6
      Mark Salyzyn authored
      Introduce a standalone live-lock daemon (llkd), to catch kernel
      or native user space deadlocks and take mitigating actions.
      
      Test: llkd_unit_test
      Bug: 33808187
      Bug: 72838192
      Change-Id: If869ecd06e5ce7b04bba1dafd0a77971b71aa517
      e4b3e0b6
    • Paul Crowley's avatar
      Merge "Add wait_for_keymaster" · 11bfc05c
      Paul Crowley authored
      11bfc05c
  9. May 09, 2018
    • Calin Juravle's avatar
      Allow system server to write profile snapshots in /data/misc/profman · 6ff0f490
      Calin Juravle authored
      The goal is to allow creating profile snapshots from the shell command in
      order to be able to write CTS tests.
      
      The system server will dump profiles for debuggable in /data/misc/profman
      from where they will be pulled and verified by CTS tests.
      
      Test: adb shell cmd package snapshot-profile com.android.vending
      Bug: 74081010
      
      (cherry picked from commit 687d5e46)
      
      Merged-In: I54690305284b92c0e759538303cb98c93ce92dd5
      Change-Id: I54690305284b92c0e759538303cb98c93ce92dd5
      6ff0f490
    • Tri Vo's avatar
      Always build system and vendor policies (and related artifacts). · 1f4a28b1
      Tri Vo authored
      Part of an effort to remove Treble-specifics from the way be build
      sepolicy.
      
      Bug: 70851112
      Test: build and boot bullhead.
      Change-Id: I236f031e1b017875fb1afcc4f1b201699139516a
      1f4a28b1
    • Paul Crowley's avatar
      Add wait_for_keymaster · 9f760306
      Paul Crowley authored
      Bug: 79228237
      Test: audit2allow finds no relevant denials on boot
      Merged-In: Ia80b77ba9a1ec2354127cd0ef68d50ebcf593fb0
      Change-Id: Ia80b77ba9a1ec2354127cd0ef68d50ebcf593fb0
      9f760306
    • Mark Salyzyn's avatar
      Merge "init: support /dev/input" · 2a3f55b5
      Mark Salyzyn authored
      2a3f55b5
Loading