Commit graph

22578 commits

Author SHA1 Message Date
Kiyoung Kim
0658613b86 Merge "Allow linkerconfig to be executed with logwrap"
am: 6ee440bd0f

Change-Id: I811eeb9a5bcee3c4eb478fec1e9075cff781a00e
2019-12-19 19:33:26 -08:00
Kiyoung Kim
6ee440bd0f Merge "Allow linkerconfig to be executed with logwrap" 2019-12-20 03:30:33 +00:00
Nikita Ioffe
aaa1481ac5 Merge "Add ro.init.userspace_reboot.is_supported property"
am: af004c339e

Change-Id: I1855c7425fff98040ac61427f6cfc7ffb5ae0568
2019-12-19 16:12:11 -08:00
Nikita Ioffe
af004c339e Merge "Add ro.init.userspace_reboot.is_supported property" 2019-12-19 23:44:06 +00:00
Anton Hansson
44bd665f11 Merge "Create filegroup for sdkext file contexts"
am: b26066cb10

Change-Id: I9cfff521d4b34c50dd52fc10c3afbff327301c0f
2019-12-19 07:02:33 -08:00
Anton Hansson
b26066cb10 Merge "Create filegroup for sdkext file contexts" 2019-12-19 14:26:03 +00:00
Anton Hansson
70b3800301 Create filegroup for sdkext file contexts
So that they can be reused in the test apex.

Bug: 137191822
Test: m
Change-Id: Iea23fee906d7c4dc9267bd3220f9d41c86fbb5db
2019-12-19 13:17:00 +00:00
Nikita Ioffe
8351252c69 Add ro.init.userspace_reboot.is_supported property
Devices that support userspace reboot are required to set this property
to true.

Test: builds
Bug: 135984674
Change-Id: I6cbff586e8813cf0a44d2ff8d6a2cf6dbdc295f0
2019-12-19 12:57:42 +00:00
markchien
23e52ea0b2 Merge "Change Tethering package name"
am: 78ec8f6546

Change-Id: I929f66a416720def3975a549e251225a94c7926d
2019-12-19 04:38:30 -08:00
Treehugger Robot
78ec8f6546 Merge "Change Tethering package name" 2019-12-19 12:35:49 +00:00
Ashwini Oruganti
dd63f771e8 Merge "gmscore_app: anr_data_file permissions"
am: 4bcc37904c

Change-Id: Id04f88d2b32b9cf53f5cd6f6b0f57df9d977436f
2019-12-19 02:04:27 -08:00
Treehugger Robot
4bcc37904c Merge "gmscore_app: anr_data_file permissions" 2019-12-19 09:55:36 +00:00
Songchun Fan
5447ebdee1 Merge "[incremental] labels for incfs and directory root"
am: 753ff93ac9

Change-Id: I8d8ca561df04a48edfeb0bc063ff80d3de5dd3c3
2019-12-18 22:06:08 -08:00
Songchun Fan
753ff93ac9 Merge "[incremental] labels for incfs and directory root" 2019-12-19 05:47:42 +00:00
Kenny Root
58b31517b1 Add device file for Resume on Reboot
am: 2073d5b685

Change-Id: Id8614af9b899d3e231ba3d497c9d6085bc1e4d9b
2019-12-18 18:19:07 -08:00
Songchun Fan
743f9eddf6 [incremental] labels for incfs and directory root
Adding two labels: "incfs" for the incremental filesystem and
"incremental_root_file" for file paths /data/incremental/*.

Doc: go/incremental-selinux

Test: manual
Change-Id: I7d45ed1677e3422119b2861dfc7b541945fcb7a2
2019-12-18 16:59:31 -08:00
Ashwini Oruganti
c9de5b531f gmscore_app: anr_data_file permissions
More historical context in http://b/18504118

This also adds an auditallow to the same rule for priv_app, so we can
delete it once no logs show up in go/sedenials for this rule
triggering.

Bug: 142672293
Test: TH
Change-Id: I5729b89af83090e6e31c012c8acb0f0114c87d3d
2019-12-18 22:15:08 +00:00
Kenny Root
2073d5b685 Add device file for Resume on Reboot
This adds the type and permissions for the default implementation to talk to
its kernel module.

Bug: 63928581
Test: boot Pixel 4 with default implementation

Change-Id: Ie847e4db975b95e90ea64937401e8d8a8ed812cb
2019-12-18 10:39:21 -08:00
Ashwini Oruganti
c1420961e8 Merge "Allow gmscore to write to /cache"
am: 4c78a608f9

Change-Id: I6c004da5909958d87700079f6630413b4bf08afa
2019-12-18 10:02:29 -08:00
Treehugger Robot
4c78a608f9 Merge "Allow gmscore to write to /cache" 2019-12-18 17:56:34 +00:00
markchien
ba38521156 Change Tethering package name
Tethering apex module is renmae from com.android.tethering.aepx to
com.android.tethering. Renmae tethering apex file context accordingly.
Also add filegroup for tethering apex.

Bug: 146471733
Test: build, flash, boot
      atest TetheringTests
      atest CtsTetheringTest

Change-Id: I41ec17604067c684123085841182408c4e315ec2
Merged-In: I41ec17604067c684123085841182408c4e315ec2
2019-12-18 13:06:00 +00:00
Kiyoung Kim
6f73396d4c Allow linkerconfig to be executed with logwrap
As part of extending linkerconfig execution based on mount namespace and
APEX status, linkerconfig will be executed from init with logwrap. To
support this there should be an extra sepolicy to allow linkerconfig to
be executed with logwrap.

Bug: 144664390
Test: m -j passed & cuttlefish booted
Change-Id: Ia8b970a1c396a769eff4b102afbf4d33802923cf
2019-12-18 13:30:28 +09:00
Hall Liu
89bc2f87f8 Merge "Add filegroup for telephony file context"
am: 58798f2aa6

Change-Id: I59f81c669414ec089334369813014829ae3d6e3a
2019-12-17 19:04:25 -08:00
Ashwini Oruganti
ab401c4ecd Merge "gmscore_app: shell_data_file permissions"
am: cc5cf1c125

Change-Id: Ibfc92a22f2e342ff19edab36217aad37beb59113
2019-12-17 19:04:09 -08:00
Hall Liu
58798f2aa6 Merge "Add filegroup for telephony file context" 2019-12-18 02:13:23 +00:00
Ashwini Oruganti
cc5cf1c125 Merge "gmscore_app: shell_data_file permissions" 2019-12-18 02:04:02 +00:00
Jeffrey Huang
1759d39fc0 Merge "system_server: create StatsManagerService"
am: cfe10227fc

Change-Id: I7395580a50876274227acd86db9e892a08becd9c
2019-12-17 15:24:32 -08:00
Jeffrey Huang
cfe10227fc Merge "system_server: create StatsManagerService" 2019-12-17 23:22:25 +00:00
Ashwini Oruganti
f31e862cac gmscore_app: shell_data_file permissions
This also adds an auditallow to the same rule for priv_app, so we can
delete it once no logs show up in go/sedenials for this rule
triggerring.

Bug: 142672293
Test: TH
Change-Id: I554e0cb00a53fd254c450c20e6c632e58472c3c8
2019-12-17 15:09:30 -08:00
Ashwini Oruganti
fe746ae453 Allow gmscore to write to /cache
Bug: 142672293
Test: TH
Change-Id: If3c2a5c91ffb497330531ad8a57ac5840d602d34
2019-12-17 14:55:01 -08:00
Suren Baghdasaryan
6a306acedd Merge "allow system_server to access files under /sys/kernel/ion/"
am: a8ca12d1c0

Change-Id: Ib827504eb5ce46c53ad614e8bd767f852233bbc8
2019-12-17 14:26:00 -08:00
Suren Baghdasaryan
a8ca12d1c0 Merge "allow system_server to access files under /sys/kernel/ion/" 2019-12-17 22:21:17 +00:00
Songchun Fan
c60705d77e [incremental] allow system server to read /proc/filesystems
am: 024bc59798

Change-Id: I3346445cde3f1a9d0fcbe17f817e4e3811ba270a
2019-12-17 12:26:39 -08:00
Suren Baghdasaryan
4da970f372 allow system_server to access files under /sys/kernel/ion/
In order for system_server to report ION allocations in dumpsys meminfo
report it needs access to ION sysfs nodes.

Bug: 138148041
Test: dumpsys meminfo
Change-Id: I8b1efebe8f4b06a3975e96ddd6a8cbcacdb52fb2
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
2019-12-17 18:36:25 +00:00
Songchun Fan
024bc59798 [incremental] allow system server to read /proc/filesystems
Also allow binder service "incremental_service" to be found by service
manager.

Test: boots
BUG: 136132412
Change-Id: I3584a9b69a7e1909f096e3c4579c1834bdfba22e
2019-12-17 09:57:42 -08:00
markchien
94e42255ed Merge "Allow application to find tethering service"
am: f1f79242f3

Change-Id: I250015bf239d2abe3c4e8869546f1d4c80c8d7f5
2019-12-17 02:49:47 -08:00
Treehugger Robot
f1f79242f3 Merge "Allow application to find tethering service" 2019-12-17 10:45:45 +00:00
Songchun Fan
a60dad9fe0 Merge "[incremental] allow service manager to find incremental_service"
am: 6914e5d1fa

Change-Id: Ie582a9b03c67cd3ecda602fbb3166b531430d7be
2019-12-16 16:19:58 -08:00
Songchun Fan
6914e5d1fa Merge "[incremental] allow service manager to find incremental_service" 2019-12-17 00:12:17 +00:00
Songchun Fan
d2b6c685b7 [incremental] allow service manager to find incremental_service
Test: boots
BUG: 136132412
Change-Id: I8728be360d4b37c6bc846a60bfef33af495ba289
2019-12-16 20:55:21 +00:00
Chris Weir
5278bbd3e6 Merge "Move usb_serial_device to device.te"
am: 1b6f5af52c

Change-Id: I4ac24a2b4121eec4ebda3bba8ea7820375439d00
2019-12-16 12:39:20 -08:00
Chris Weir
1b6f5af52c Merge "Move usb_serial_device to device.te" 2019-12-16 20:34:29 +00:00
Jeffrey Huang
215dd2aa9b system_server: create StatsManagerService
Refactor to split the logic within statscompanion_service
The goal of the refactor is to simplify the binder calls to statsd

This service will talk to statsd.

At the end of the refactor, this service should be the only
service that talks to statsd.

Bug: 146074223
Test: Manual by creating the service with empty implementation
Change-Id: Ib9c2e10ec195d41062f1001e5a82b374696de939
2019-12-16 11:50:16 -08:00
Ashwini Oruganti
8dbb8f841b Allow gmscore_app to write to /data/ota_package for OTA packages
am: 384858e0ec

Change-Id: I4e2da6fd240cfe22287d3ca3e5ba0ccf44adbef5
2019-12-16 11:18:49 -08:00
Ashwini Oruganti
384858e0ec Allow gmscore_app to write to /data/ota_package for OTA packages
This also adds an auditallow to the same rule for priv_app, so we can
delete it once no logs show up in go/sedenials for this rule
triggerring.

Bug: 142672293
Test: TH
Change-Id: I57f887e96d721ca69a7228df0a75515596776778
2019-12-16 10:00:07 -08:00
Jeff Vander Stoep
0cc9c77efe Prevent apps from causing presubmit failures
am: 607bc67cc9

Change-Id: I301ebb5420ef19a80b58c7e7ded064dcb501d9fa
2019-12-16 06:32:41 -08:00
markchien
9cc39d9acf Allow application to find tethering service
Mark tethering_service as app_api_service to allow applications to find
tethering service. Apps should able to use tethering service to
know tethering state if they have ACCESS_NETWORK_STATE permission, but
they may need privileged permission if they want to change tethering.

Bug: 144320246
Test: -build, flash, boot
      -ON/OFF hotspot

Change-Id: Ie414618766144c4a4ad89c5cf03398a472638e71
2019-12-16 21:32:04 +08:00
Jeff Vander Stoep
607bc67cc9 Prevent apps from causing presubmit failures
Apps can cause selinux denials by accessing CE storage
and/or external storage. In either case, the selinux denial is
not the cause of the failure, but just a symptom that
storage isn't ready. Many apps handle the failure appropriately.

These denials are not helpful, are not the cause of a problem,
spam the logs, and cause presubmit flakes. Suppress them.

Bug: 145267097
Test: build
Change-Id: If87b9683e5694fced96a81747b1baf85ef6b2124
2019-12-16 11:19:05 +01:00
Henry Tung
150bdab002 Merge "Create new system property type for Factory OTA could write system property"
am: a75fa8058c

Change-Id: If54b496dd648d6f5cb558f8d4dbd42cc5facfa48
2019-12-15 11:28:33 -08:00
Treehugger Robot
a75fa8058c Merge "Create new system property type for Factory OTA could write system property" 2019-12-15 19:26:39 +00:00