Skip to content
Snippets Groups Projects
  1. Jul 18, 2018
  2. Jul 17, 2018
  3. Jul 14, 2018
    • Steven Thomas's avatar
      Selinux changes for vr flinger vsync service · 7bec9674
      Steven Thomas authored
      Add selinux policy for the new Binder-based vr flinger vsync service.
      
      Bug: 72890037
      
      Test: - Manually confirmed that I can't bind to the new vsync service
      from a normal Android application, and system processes (other than
      vr_hwc) are prevented from connecting by selinux.
      
      - Confirmed the CTS test
        android.security.cts.SELinuxHostTest#testAospServiceContexts, when
        built from the local source tree with this CL applied, passes.
      
      - Confirmed the CTS test
        android.cts.security.SELinuxNeverallowRulesTest#testNeverallowRules521,
        when built from the local source tree with this CL applied, passes.
      
      Change-Id: Ib7a6bfcb1c2ebe1051f3accc18b481be1b188b06
      7bec9674
  4. Jul 13, 2018
  5. Jul 12, 2018
  6. Jul 11, 2018
  7. Jul 03, 2018
  8. Jul 02, 2018
    • Yabin Cui's avatar
      Merge "Export more files in proc_perf." · ca685e9e
      Yabin Cui authored
      am: 74f86551
      
      Change-Id: I16f29c89431a5ca4ac604869e21cd8312bd37f9e
      ca685e9e
    • Yabin Cui's avatar
      Merge "Export more files in proc_perf." · 74f86551
      Yabin Cui authored
      74f86551
    • Yongqin Liu's avatar
      public/netd.te: allow netd to operate icmp_socket that passed to it · 29ed5f16
      Yongqin Liu authored
      am: 8a8d4ef5
      
      Change-Id: Ib48576d7f47811870661e0bb66cebad0f26a6782
      29ed5f16
    • Yabin Cui's avatar
      Export more files in proc_perf. · 09464811
      Yabin Cui authored
      Export /proc/sys/kernel/perf_cpu_time_max_percent and
      /proc/sys/kernel/perf_event_mlock_kb in proc_perf. So
      they can be read in shell and written by init.
      
      This is needed by simpleperf to control cpu percent and
      memory used for profiling.
      
      Bug: 110706031
      Test: build and boot hikey960 successfully.
      
      Change-Id: I2a01f583508003ab73427bab30a7982a27dfa677
      09464811
    • Yongqin Liu's avatar
      public/netd.te: allow netd to operate icmp_socket that passed to it · 8a8d4ef5
      Yongqin Liu authored
      This should be supplement for the change here:
      https://android-review.googlesource.com/c/platform/system/sepolicy/+/708638
      
      
      
      When test the cts libcore.libcore.io.OsTest#test_socketPing test case, it will fail
      with avc denial message like following:
      
      [ 1906.617027] type=1400 audit(1530527518.195:10496): avc: denied { read write } for comm="netd" path="socket:[32066]" dev="sockfs" ino=32066 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617189] type=1400 audit(1530527518.195:10496): avc: denied { read write } for comm="netd" path="socket:[32066]" dev="sockfs" ino=32066 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617206] type=1400 audit(1530527518.195:10497): avc: denied { getopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617313] type=1400 audit(1530527518.195:10497): avc: denied { getopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1906.617330] type=1400 audit(1530527518.195:10498): avc: denied { setopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      [ 1907.832425] type=1400 audit(1530527518.195:10498): avc: denied { setopt } for comm="netd" lport=2 scontext=u:r:netd:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=icmp_socket permissive=1
      
      Test: run cts -m CtsLibcoreTestCases -t libcore.libcore.io.OsTest#test_socketPing
      
      Change-Id: If41cb804292834b8994333f170d1f7f837bcd7df
      Signed-off-by: default avatarYongqin Liu <yongqin.liu@linaro.org>
      8a8d4ef5
    • Pawin Vongmasa's avatar
      Allow surfaceflinger to call into mediacodec · ff2dccaf
      Pawin Vongmasa authored
      Test: adb logcat | grep "Wrong interface type."
      
      Bug: 77924251
      Change-Id: Idf9d7ae6db0d41bb0c2f94b2183bfe23f0c21155
      ff2dccaf
  9. Jun 30, 2018
  10. Jun 29, 2018
Loading