- Dec 13, 2018
-
-
Paul Crowley authored
-
Treehugger Robot authored
-
Treehugger Robot authored
-
- Dec 12, 2018
-
-
Treehugger Robot authored
-
Paul Crowley authored
Test: Compiles - neverallow rules are compile time checks Change-Id: I2e1177897d2697cde8a190228ba83381d9a1877a
-
Yu-Han Yang authored
Bug: 112260995 Bug: 120277977 Test: atest VtsHalGnssV2_0TargetTest Change-Id: I196d8506b2f7c2153e1f647ea5ba61b81bf3d881
-
Nick Kralevich authored
Remove the ability for applications to dlopen() executable code from their home directory for newer API versions. API versions <= 28 are uneffected by this change. Bug: 112357170 Test: cts-tradefed run cts -m CtsRenderscriptTestCases Change-Id: I1d7f3a1015d54b8610d1c561f38a1a3c2bcf79e4
-
Nick Kralevich authored
When an app uses renderscript to compile a Script instance, renderscript compiles and links the script using /system/bin/bcc and /system/bin/ld.mc, then places the resulting shared library into the application's code_cache directory. The application then dlopen()s the resulting shared library. Currently, this executable code is writable to the application. This violates the W^X property (https://en.wikipedia.org/wiki/W%5EX), which requires any executable code be immutable. This change introduces a new label "rs_data_file". Files created by /system/bin/bcc and /system/bin/ld.mc in the application's home directory assume this label. This allows us to differentiate in security policy between app created files, and files created by renderscript on behalf of the application. Apps are allowed to delete these files, but cannot create or write these files. This is enforced through a neverallow compile time assertion. Several exceptions are added to Treble neverallow assertions to support this functionality. However, because renderscript was previously invoked from an application context, this is not a Treble separation regression. This change is needed to support blocking dlopen() for non-renderscript /data/data files, which will be submitted in a followup change. Bug: 112357170 Test: cts-tradefed run cts -m CtsRenderscriptTestCases Change-Id: Ie38bbd94d26db8a418c2a049c24500a5463698a3
-
Florian Mayer authored
This is analoguous to what Perfetto does with persist.traced.enable. Test: m Test: flash walleye Test: setprop persist.heapprofd.enable 1 setprop persist.heapprofd.enable 0 Change-Id: I997272ef8c6fe078aca2388ed0cf2ecc3de612a5
-
Treehugger Robot authored
-
Sunny Goyal authored
- Update policy for new system service, used for SystemUI/Apps to present predicted apps in their UI. Bug: 111701043 Test: manual verification Change-Id: Ia3b5db987097d2d71bf774ca550041e03214471d
-
- Dec 11, 2018
-
-
Michael Butler authored
-
Fan Xu authored
-
Hridya Valsaraju authored
These address the following denials: avc: denied { getattr } for pid=547 comm="fastbootd" path="/dev/block" dev="tmpfs" ino=18532 scontext=u:r:fastbootd:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1␍ avc: denied { read } for pid=547 comm="fastbootd" name="fstab" dev="sysfs" ino=25820 scontext=u:r:fastbootd:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=dir permissive=1␍␊ avc: denied { open } for pid=547 comm="fastbootd" path="/sys/firmware/devicetree/base/firmware/android/fstab" dev="sysfs"] ino=25820 scontext=u:r:fastbootd:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=dir permissive=1 Bug: 119115481 Test: fastboot flashall Change-Id: I97dc783ceef396145e3baa5d79194560fc0634f7
-
Benjamin Schwartz authored
-
Wei Wang authored
* changes: Revert "Move thermal service into system_server" Revert "Expose thermal service to all apps"
-
Wei Wang authored
* changes: Expose thermal service to all apps Move thermal service into system_server
-
Carmen Jackson authored
Bug: 116754732 Test: Started a trace in Traceur using Perfetto successfully. Change-Id: I217857bf1f43f1b7b24454687d1f26b9d5c6c56a
-
Wei Wang authored
Thermal API has been added to PowerManager and this CL is to grant IThermal access to app. Bug: 119613338 Test: PowerManager CTS test Change-Id: I977530a9a5490bdc53af1548788b885e7c649f01
-
Benjamin Schwartz authored
Also giving statsd permission to access it. This change copies the internal sepolicy to AOSP. Bug: 111185513 Bug: 120551881 Test: make Change-Id: I7e0386777e05580299caf9b97cb7804459f1a9d0
-
- Dec 10, 2018
-
-
Fan Xu authored
These selinux policy rules were added for bufferhub to run a binder service. But later we decided to use a hwbinder service instead, and the original binder service was removed in git/master. Now we can safely remove these rules. Test: Build passed. Device boot successfully without selinux denial. Bug: 118891412 Change-Id: I349b5f0f2fa8fb6a7cfe7869d936791355c20753
-
Neil Fuller authored
-
- Dec 08, 2018
-
-
Michael Butler authored
Currently all NN services include this, so making it a default will reduce NN service configuration. Change-Id: I18531e57a7069076a208aefac4a545ba6c4379b0 Fixes: 120283437 Test: mma Test: NeuralNetworksTest_static Test: VtsHalNeuralnetworksV1_*TargetTest
-
- Dec 07, 2018
-
-
Matt Pape authored
-
Treehugger Robot authored
-
Alan Stokes authored
-
Matt Pape authored
Add a DeviceConfig service in system_server to edit configuration flags. This is intended to be a command line tool for local overrides and/or tool for tests that adopt shell permissions. Test: None Bug:109919982 Bug:113101834 Change-Id: Ib7bed752849b1ed102747e3202dd7aed48d2c6d5
-
Alan Stokes authored
I572ea22253e0c1e42065fbd1d2fd7845de06fceb introduced a whitelist, so everything under tracing/ is assumed to be debugfs_tracing_debug unless explicitly marked as debugfs_tracing. Test: Device boots, labels under /sys/kernel/debug/tracing are unchanged. Change-Id: Id0f0cbcc9e5540551bd2906fbf75f8e939dc4d4c
-
Hector Dearman authored
Allow traced_probes to read /sys/kernel/debug/tracing directories in userdebug mode. We read the directory when enabling events with the wild card syntax: "oom/*" which attmpts to read the directory /sys/kernel/debug/tracing/events/oom to work out what oom events exist. Denial: avc: denied { read } for name="oom" dev="tracefs" ino=11353 scontext=u:r:traced_probes:s0 tcontext=u:object_r:debugfs_tracing_debug:s0 tclass=dir permissive=0 Bug: 119662403 Test: perfetto -t 10s 'oom/*' -o /data/misc/perfetto-traces/trace Change-Id: I2cb171c3c5292d2eb55e71376f965b924a563572
-
Neil Fuller authored
Code in bionic / libcore will now look in the runtime APEX module for data files. Bug: 119293618 Bug: 119390260 Test: build / treehugger only Change-Id: I965c763e7f0452b8ef5ffbf730733e9a41254beb
-
- Dec 06, 2018
-
-
Treehugger Robot authored
-
Paul Crowley authored
-
Oscar Shu authored
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Anton Hansson authored
All these modules are being unconditionally added to LOCAL_REQUIRED_MODULES a few lines down. Test: make Change-Id: I474c5d41e1a6dd34fd2c2f2d10299048df4c2b70
-
Treehugger Robot authored
-