- Apr 21, 2017
-
-
Chia-I Wu authored
Bug: 37152880 Bug: 37554633 Test: adb shell am hang --allow-restart Test: adb shell dumpstate Change-Id: Ie68607f3e3245a40056bdde7dd810ddf212b4295
-
Alex Klyubin authored
-
Alex Klyubin authored
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Alex Klyubin authored
This lets dumpstate obtain the list of currently registered HwBinder services. Test: adb bugreport -- no denials to do with dumpstate access to hwservicemanager list functionality. Bug: 37554633 Change-Id: I95512168948ca45a0dd830c20922e3c776ffaf41
-
Alex Klyubin authored
This adds fine-grained policy about who can register and find which HwBinder services in hwservicemanager. Test: Play movie in Netflix and Google Play Movies Test: Play video in YouTube app and YouTube web page Test: In Google Camera app, take photo (HDR+ and conventional), record video (slow motion and normal), and check that photos look fine and videos play back with sound. Test: Cast screen to a Google Cast device Test: Get location fix in Google Maps Test: Make and receive a phone call, check that sound works both ways and that disconnecting the call frome either end works fine. Test: Run RsHelloCompute RenderScript demo app Test: Run fast subset of media CTS tests: make and install CtsMediaTestCases.apk adb shell am instrument -e size small \ -w 'android.media.cts/android.support.test.runner.AndroidJUnitRunner' Test: Play music using Google Play music Test: Adjust screen brightness via the slider in Quick Settings Test: adb bugreport Test: Enroll in fingerprint screen unlock, unlock screen using fingerprint Test: Apply OTA update: Make some visible change, e.g., rename Settings app. make otatools && \ make dist Ensure device has network connectivity ota_call.py -s <serial here> --file out/dist/sailfish-ota-*.zip Confirm the change is now live on the device Bug: 34454312 (cherry picked from commit 632bc494) Merged-In: Iecf74000e6c68f01299667486f3c767912c076d3 Change-Id: I7a9a487beaf6f30c52ce08e04d415624da49dd31
-
Jeff Vander Stoep authored
Fixes warning: system/sepolicy/public/install_recovery.te:14:WARNING 'unrecognized character' at token ''' on line 13335: allow install_recovery vendor_file:file { { getattr open read ioctl lock } { getattr execute execute_no_trans } };' Bug: 37105075 Test: Fugu policy builds without this warning. Change-Id: I8f417c51a816f3983a918c7e36dd804c5b85543f
-
Chia-I Wu authored
-
Pavel Grafov authored
Currently ro.device_owner and persist.logd.security aren't accessible without root, so "adb shell getprop" returns empty reply which is confusing. Also these properties aren't seen from bugreport unless their change happened recently. Bug: 37053313 Test: manual, took bugreport and ran getprop after "adb unroot". Change-Id: Id41cdabc282f2ebcdfc0ac7fe9df756322a0863d
-
- Apr 20, 2017
-
-
Andy Hung authored
-
Chia-I Wu authored
This fixes avc: denied { call } for comm="screencap" scontext=u:r:dumpstate:s0 tcontext=u:r:hal_graphics_allocator_default:s0 tclass=binder permissive=0 Bug: 37360953 Test: adb shell dumpstate -p -o <path> Change-Id: Ia9387559e3ec1ba51b614bb9d24294fbbbd51b1a
-
TreeHugger Robot authored
-
- Apr 19, 2017
-
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Phil Burk authored
Bug: 37504387 Test: aaudio example write_sine, needs MMAP support Change-Id: I7fbd87ad4803e8edbde4ba79220cb5c0bd6e85a0 Signed-off-by:
Phil Burk <philburk@google.com>
-
Jeff Hao authored
-
Sandeep Patil authored
Bug: 37485771 Test: sideloaded OTA through recovery on sailfish Change-Id: I98bb4e0e919db585131391f57545f1a9a0096701 Signed-off-by:
Sandeep Patil <sspatil@google.com>
-
Chong Zhang authored
-
TreeHugger Robot authored
-
Jeff Hao authored
The PackageManager now passes previous code paths to dex2oat as shared libraries. dex2oat needs extra permissions in order to access and open the oat files of these libraries (if they were compiled). Part of a multi-project change. Bug: 34169257 Test: cts-tradefed run singleCommand cts -d --module CtsAppSecurityHostTestCases -t android.appsecurity.cts.SplitTests (cherry-picked from commit 1103f963) Change-Id: I3cf810ef5f4f4462f6082dc30d3a7b144dcce0d9
-
Chong Zhang authored
hal_client_domain no longer allows read dir permission, in order to load .so from /system/lib, we have to add this permission ourselves. bug: 37476803 Change-Id: I1711d158c2f4580f50ac244da10c489df003cc18
-
Andy Hung authored
Permit mediaextractor its own file source for apk and ringtone files. Previously we fall back to the mediaserver file source. This does not affect behavior as the fallback works fine; however, the log messages may cause confusion. [73402.683908] type=1400 audit(1491338955.878:121): avc: denied { read } for pid=18381 comm="generic" path="/data/system_de/0/ringtones/alarm_alert_cache" dev="sda35" ino=2490374 scontext=u:r:mediaextractor:s0 tcontext=u:object_r:ringtone_file:s0 tclass=file permissive=0 [73402.683932] type=1400 audit(1491338955.884:122): avc: denied { read } for pid=18383 comm="generic" path="/data/system_de/0/ringtones/ringtone_cache" dev="sda35" ino=2490376 scontext=u:r:mediaextractor:s0 tcontext=u:object_r:ringtone_file:s0 tclass=file permissive=0 Test: Ringtone and CTS Bug: 37500781 Change-Id: Ie6d8e6d2b7301d00957733f173aeebbe9d0d1998
-
TreeHugger Robot authored
-
- Apr 18, 2017
-
-
Carmen Jackson authored
-
Carmen Jackson authored
These rules allow the additional tracepoints we need for running traceur in userdebug builds to be writeable. Bug: 37110010 Test: I'm testing by running atrace -l and confirming that the tracepoints that I'm attempting to enable are available. Change-Id: Ia352100ed67819ae5acca2aad803fa392d8b80fd
-
Dan Cashman authored
vndservicemanager is a copy of servicemanager, and so has the exact same properties. This should be reflected in the sharing of an object manager in SELinux policy, rather than creating a second one, which is effectively an attempt at namespacing based on object rather than type labels. hwservicemanager, however, provides different and additional functionality that may be reflected in changed permissions, though they currently map to the existing servicemanager permissions. Keep the new hwservice_manager object manager but remove the vndservice_manager one. Bug: 34454312 Bug: 36052864 Test: policy builds and device boots. Change-Id: I9e0c2757be4026101e32ba780f1fa67130cfa14e
-
Alex Klyubin authored
This commit marks surfaceflinger and app domain (except isolated_app) as clients of Configstore HAL. This cleans up the policy and will make it easier to restrict access to HwBinder services later. Test: Play YouTube clip in YouTube app and YouTube web page in Chrome Test: Take an HDR+ photo, a normal photo, a video, and slow motion video in Google Camera app. Check that photos show up fine and that videos play back with sound. Test: Play movie using Google Play Movies Test: Google Maps app displays the Android's correct location Bug: 34454312 Change-Id: I0f468a4289132f4eaacfb1d13ce4e61604c2a371
-
- Apr 17, 2017
-
-
Alex Klyubin authored
This commit marks system_server and app domains (except isolated_app) as clients of Graphics Allocator HAL. This makes the policy cleaner and prepares ground for restricting access to HwBinder services. Test: Play video in YouTube app and in Google Chrome YouTube web page Test: Using Google Camera app, take an HDR+ photo, a conventional photo, record a video with sound and a slow motion video with sound, then check that photos look good and videos play back fine, including sound. Bug: 34454312 Change-Id: Iea04d38fa5520432f06af94570fa6ce16ed7979a
-
TreeHugger Robot authored
-
- Apr 16, 2017
-
-
Tianjie Xu authored
-
Martijn Coenen authored
Bug: 36604251 Test: Netflix protected content, Play movies Change-Id: I5c2c542007abddbe56b933ff44d65bd376b6691e
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
Martijn Coenen authored
The new binder_call() lines had to be added because this change removes mediacodec from binderservicedomain (on full-treble), hence domains that could previously reach mediacodec with binder_call(domain, binderservicedomain) now need explicit calls instead. Test: Youtube, Netflix, Maps, Chrome, Music Change-Id: I3325ce20d9304bc07659fd435554cbcbacbc9829
-
Martijn Coenen authored
-
- Apr 15, 2017
-
-
TreeHugger Robot authored
-
Martijn Coenen authored
Test: WIP Change-Id: I678b0d0e9750b25628b86060574fd516d3749cdf
-
Sandeep Patil authored
Temporary attribute (checked against in CTS) to point out vendor processes that run /system executables. These are currently only down to 2-3 of them that are related to telephony on sailfish Bug: 36463595 Test: Build succeeds for sailfish Test: ./cts-tradefed run cts -m CtsSecurityHostTestCases -t \ android.security.cts.SELinuxHostTest#testNoExemptionsForVendorExecutingCore \ --skip-device-info --skip-preconditions --skip-connectivity-check \ --abi arm64-v8a Change-Id: I9eb40ad259aefba73869d6a1b40186d33fa475dd Signed-off-by:
Sandeep Patil <sspatil@google.com>
-