Skip to content
Snippets Groups Projects
  1. Dec 12, 2018
    • Nick Kralevich's avatar
      remove app_data_file execute · b3624743
      Nick Kralevich authored
      Remove the ability for applications to dlopen() executable code from
      their home directory for newer API versions. API versions <= 28 are
      uneffected by this change.
      
      Bug: 112357170
      Test: cts-tradefed run cts -m CtsRenderscriptTestCases
      Change-Id: I1d7f3a1015d54b8610d1c561f38a1a3c2bcf79e4
      b3624743
    • Nick Kralevich's avatar
      bless app created renderscript files · 0eb0a16f
      Nick Kralevich authored
      When an app uses renderscript to compile a Script instance,
      renderscript compiles and links the script using /system/bin/bcc and
      /system/bin/ld.mc, then places the resulting shared library into the
      application's code_cache directory. The application then dlopen()s the
      resulting shared library.
      
      Currently, this executable code is writable to the application. This
      violates the W^X property (https://en.wikipedia.org/wiki/W%5EX), which
      requires any executable code be immutable.
      
      This change introduces a new label "rs_data_file". Files created by
      /system/bin/bcc and /system/bin/ld.mc in the application's home
      directory assume this label. This allows us to differentiate in
      security policy between app created files, and files created by
      renderscript on behalf of the application.
      
      Apps are allowed to delete these files, but cannot create or write these
      files. This is enforced through a neverallow compile time assertion.
      
      Several exceptions are added to Treble neverallow assertions to support
      this functionality. However, because renderscript was previously invoked
      from an application context, this is not a Treble separation regression.
      
      This change is needed to support blocking dlopen() for non-renderscript
      /data/data files, which will be submitted in a followup change.
      
      Bug: 112357170
      Test: cts-tradefed run cts -m CtsRenderscriptTestCases
      Change-Id: Ie38bbd94d26db8a418c2a049c24500a5463698a3
      0eb0a16f
  2. Dec 11, 2018
  3. Dec 10, 2018
    • Fan Xu's avatar
      Remove unused bufferhub sepolicy · ffffed28
      Fan Xu authored
      These selinux policy rules were added for bufferhub to run a binder
      service. But later we decided to use a hwbinder service instead, and the
      original binder service was removed in git/master. Now we can safely
      remove these rules.
      
      Test: Build passed. Device boot successfully without selinux denial.
      Bug: 118891412
      Change-Id: I349b5f0f2fa8fb6a7cfe7869d936791355c20753
      ffffed28
    • Neil Fuller's avatar
      130fee6e
  4. Dec 08, 2018
    • Michael Butler's avatar
      Allow NN HAL to mmap client-provided fd by default · 3ff7bf86
      Michael Butler authored
      Currently all NN services include this, so making it a default will
      reduce NN service configuration.
      
      Change-Id: I18531e57a7069076a208aefac4a545ba6c4379b0
      Fixes: 120283437
      Test: mma
      Test: NeuralNetworksTest_static
      Test: VtsHalNeuralnetworksV1_*TargetTest
      3ff7bf86
  5. Dec 07, 2018
  6. Dec 06, 2018
  7. Dec 05, 2018
    • Treehugger Robot's avatar
      Merge "DO NOT MERGE" · 8155b44a
      Treehugger Robot authored
      8155b44a
    • Joel Galenson's avatar
      Allow dumpstate to call idmap over binder · 657470ac
      Joel Galenson authored
      This prevents denials while taking a bugreport.
      
      Bug: 116711254
      Test: cts-tradefed run cts -m CtsSecurityHostTestCases -t
      android.security.cts.SELinuxHostTest#testNoBugreportDenials
      
      Change-Id: I5414141a1557d71e3ac0cf5bc89529685e9069c3
      657470ac
    • Xin Li's avatar
      DO NOT MERGE · 53fa0274
      Xin Li authored
      Merge pie-platform-release (PPRL.181105.017, history only) into master
      
      Bug: 118454372
      Change-Id: I44d2461c1d8845d453fe587a77c2c06f9e1da2eb
      53fa0274
    • xshu's avatar
      Wifi HAL SIOCETHTOOL sepolicy · 04fad007
      xshu authored
      Allow wifi HAL to use SIOCETHTOOL. This permission is needed to get
      factory MAC address of the device.
      
      Bug: 111634904
      Test: Manual check that the device can get factory MAC address
      Change-Id: I50e91ef7390ad4fba6e014990ee23feb777c4391
      04fad007
  8. Dec 04, 2018
Loading