Skip to content
Snippets Groups Projects
  1. Dec 13, 2018
  2. Dec 12, 2018
    • Treehugger Robot's avatar
      f523218d
    • Paul Crowley's avatar
      Remove overpermissive neverallow exceptions. · 90e68e92
      Paul Crowley authored
      Test: Compiles - neverallow rules are compile time checks
      Change-Id: I2e1177897d2697cde8a190228ba83381d9a1877a
      90e68e92
    • Yu-Han Yang's avatar
      Add sepolicy for GNSS HAL 2.0 and 1.1 · 63de8591
      Yu-Han Yang authored
      Bug: 112260995
      Bug: 120277977
      Test: atest VtsHalGnssV2_0TargetTest
      Change-Id: I196d8506b2f7c2153e1f647ea5ba61b81bf3d881
      63de8591
    • Nick Kralevich's avatar
      remove app_data_file execute · b3624743
      Nick Kralevich authored
      Remove the ability for applications to dlopen() executable code from
      their home directory for newer API versions. API versions <= 28 are
      uneffected by this change.
      
      Bug: 112357170
      Test: cts-tradefed run cts -m CtsRenderscriptTestCases
      Change-Id: I1d7f3a1015d54b8610d1c561f38a1a3c2bcf79e4
      b3624743
    • Nick Kralevich's avatar
      bless app created renderscript files · 0eb0a16f
      Nick Kralevich authored
      When an app uses renderscript to compile a Script instance,
      renderscript compiles and links the script using /system/bin/bcc and
      /system/bin/ld.mc, then places the resulting shared library into the
      application's code_cache directory. The application then dlopen()s the
      resulting shared library.
      
      Currently, this executable code is writable to the application. This
      violates the W^X property (https://en.wikipedia.org/wiki/W%5EX), which
      requires any executable code be immutable.
      
      This change introduces a new label "rs_data_file". Files created by
      /system/bin/bcc and /system/bin/ld.mc in the application's home
      directory assume this label. This allows us to differentiate in
      security policy between app created files, and files created by
      renderscript on behalf of the application.
      
      Apps are allowed to delete these files, but cannot create or write these
      files. This is enforced through a neverallow compile time assertion.
      
      Several exceptions are added to Treble neverallow assertions to support
      this functionality. However, because renderscript was previously invoked
      from an application context, this is not a Treble separation regression.
      
      This change is needed to support blocking dlopen() for non-renderscript
      /data/data files, which will be submitted in a followup change.
      
      Bug: 112357170
      Test: cts-tradefed run cts -m CtsRenderscriptTestCases
      Change-Id: Ie38bbd94d26db8a418c2a049c24500a5463698a3
      0eb0a16f
    • Florian Mayer's avatar
      Add persist.heapprofd.enable property. · c32ca901
      Florian Mayer authored
      This is analoguous to what Perfetto does with persist.traced.enable.
      
      Test: m
      Test: flash walleye
      Test: setprop persist.heapprofd.enable 1
            setprop persist.heapprofd.enable 0
      
      Change-Id: I997272ef8c6fe078aca2388ed0cf2ecc3de612a5
      c32ca901
    • Treehugger Robot's avatar
    • Sunny Goyal's avatar
      New system service: app_prediction_service · 2a2d638e
      Sunny Goyal authored
      - Update policy for new system service, used for SystemUI/Apps to
        present predicted apps in their UI.
      
      Bug: 111701043
      Test: manual verification
      Change-Id: Ia3b5db987097d2d71bf774ca550041e03214471d
      2a2d638e
  3. Dec 11, 2018
  4. Dec 10, 2018
    • Fan Xu's avatar
      Remove unused bufferhub sepolicy · ffffed28
      Fan Xu authored
      These selinux policy rules were added for bufferhub to run a binder
      service. But later we decided to use a hwbinder service instead, and the
      original binder service was removed in git/master. Now we can safely
      remove these rules.
      
      Test: Build passed. Device boot successfully without selinux denial.
      Bug: 118891412
      Change-Id: I349b5f0f2fa8fb6a7cfe7869d936791355c20753
      ffffed28
    • Neil Fuller's avatar
      130fee6e
  5. Dec 08, 2018
    • Michael Butler's avatar
      Allow NN HAL to mmap client-provided fd by default · 3ff7bf86
      Michael Butler authored
      Currently all NN services include this, so making it a default will
      reduce NN service configuration.
      
      Change-Id: I18531e57a7069076a208aefac4a545ba6c4379b0
      Fixes: 120283437
      Test: mma
      Test: NeuralNetworksTest_static
      Test: VtsHalNeuralnetworksV1_*TargetTest
      3ff7bf86
  6. Dec 07, 2018
  7. Dec 06, 2018
Loading