Skip to content
Snippets Groups Projects
  1. May 03, 2018
  2. May 02, 2018
  3. May 01, 2018
  4. Apr 30, 2018
  5. Apr 29, 2018
    • Jaekyun Seok's avatar
      Allow vendor-init-settable for properties used in Android TV · 18aaaad9
      Jaekyun Seok authored
      The following properties will be whitelisted.
      - ro.hdmi.device_type, ro.hdmi.wake_on_hotplug and
      persist.sys.hdmi.keep_awake for hdmi
      - ro.sf.disable_triple_buffer for SurfaceFlinger
      - media.stagefright.cache-params and persist.sys.media.avsync for
      nuplayer
      
      Bug: 78205669
      Bug: 78430613
      Test: succeeded building
      Change-Id: I5ee1a1de72c265bca87aa041c6acd9554f5f8c07
      18aaaad9
  6. Apr 27, 2018
  7. Apr 26, 2018
    • Paul Crowley's avatar
      Allow vold_prepare_subdirs to delete more files. · 80966397
      Paul Crowley authored
      Bug: 78591623
      Test: Create a new user with a fingerprint. Reboot. Delete that user.
          Check for denials, files left over in /data/*_{c,d}e/10
      Merged-In: Ib818e112a98c5b954ee829e93ebd69c3b12940cf
      Change-Id: Ib818e112a98c5b954ee829e93ebd69c3b12940cf
      80966397
    • android-build-prod (mdb)'s avatar
    • Steven Moreland's avatar
      Enforce parent hal attribute hierarchy. · 8a52c984
      Steven Moreland authored
      In order to support passthrough + binderized implementations
      with a simple switch, there is a hierarchy of attributes for
      different hal servers.
      
                 /------- hal_X --------\
                 |               **     |
                 v                      v
            hal_X_client           hal_X_server
                 |                      |
                 |                      |
                 v                      v
          halclientdomain        halserverdomain
      
      ** - hal_X -> hal_X_server is only on non-Treble devices. This
        is because on these devices, certain HALs are allowed to be
        loaded directly into the client process in "passthrough" mode
        as was the case in Android before Android O. This is a legacy
        compatibility mode. On Treble devices, any client can also be
        hal_X just by virtue of a server being able to also be a hal
        client.
      
      There is also one exception to this rule. su is not given every
      hal_* permission. If it is given all of these permissions on
      non-Treble devices, it must be added as an exemption to many
      other neverallow rules. As a sideeffect (which existed before
      this patch), su is not allowed to talk directly to all hardware
      on non-Treble devices as with Treble devices.
      
      Fixes: 34180936
      Test: compile only (neverallow rules are resolved at compile time)
      
      Change-Id: I47122daf95acd49cadaf8b7664e56268dac78945
      8a52c984
    • Jeff Vander Stoep's avatar
      app: removed unused /dev/ion write permissions · c20ba5bd
      Jeff Vander Stoep authored
      The /dev/ion driver's file operations structure does not specify a
      write operation. Granting write is meaningless. This audit statement
      has been around since Android Oreo and logs collected from dogfooders
      shows that no apps are attempting to open the file with write
      permissions.
      
      Bug: 28760354
      Test: build
      Test: verify no "granted" messages from dogfood devices.
      Change-Id: Id4f3540bba8c9f30f9d912f7a7473933be779cbb
      c20ba5bd
    • android-build-prod (mdb)'s avatar
      aa2185bb
    • android-build-prod (mdb)'s avatar
    • Alan Stokes's avatar
      Allow wpa_supplicant to write to files in /proc/net. · 72ed6152
      Alan Stokes authored
      This is needed for interface configuration - see e.g. nl80211_configure_data_frame_filters.
      
      Bug: 77903086
      Test: WiFi still working
      
      Change-Id: I4b5e2b59eeeb6d0ac19dbcbcf0e7e80942247893
      72ed6152
    • Jeff Vander Stoep's avatar
      vendor_init: allow stat() of /data dir · 4cd7aa59
      Jeff Vander Stoep authored
      avc: denied { getattr } for path="/data" scontext=u:r:vendor_init:s0
      tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
      
      Bug: 78345561
      Test: build/boot device. Denial is gone.
      Change-Id: Ie858f1fe65aeb1845b00a5143c345e81aa2ec632
      (cherry picked from commit 6f8d2628)
      4cd7aa59
  8. Apr 25, 2018
    • yro's avatar
      Setting up sepolicies for statsd planB of listening to its own socket · 64c7a758
      yro authored
      Test: manual
      Bug: 78318738
      Change-Id: I45c3511860fbe6a1de45c6930052a8865b38986a
      64c7a758
    • Zheng Zhang's avatar
      Allow mediaserver to access vendor_app_file · 3623c2b6
      Zheng Zhang authored
      Currently, when vendor APK try to use MediaPlayer to play its audio
      resource, it would fail due to this neverallow rules.
      
      avc: denied { read } for path="/vendor/app/TicFitness/TicFitness.apk" dev="dm-1" ino=183 scontext=u:r:mediaserver:s0 tcontext=u:object_r:vendor_app_file:s0 tclass=file permissive=0
      
      Bug: 78436043
      Change-Id: Id910184c16955f9e4e4c8d3bb6eca2253ab59063
      3623c2b6
  9. Apr 24, 2018
  10. Apr 23, 2018
  11. Apr 20, 2018
Loading