Commit graph

816 commits

Author SHA1 Message Date
Florian Mayer
94782041d1 Merge "[MTE] Add property to specify default MTE mode for apps." 2022-02-10 23:38:23 +00:00
Alexander Potapenko
0a64d100b8 dmesgd: sepolicies
dmesgd is a daemon that collects kernel memory error reports.

When system_server notices that a kernel error occured, it sets the
dmesgd.start system property to 1, which results in init starting
dmesgd.

Once that happens, dmesgd runs `dmesg` and parses its output to collect
the last error report. That report, together with the headers containing
device- and build-specific information is stored in Dropbox.

Empirically, dmesgd needs the following permissions:
- execute shell (for popen()) and toolbox (for dmesg),
  read system_log (for dmesg)
- read /proc/version (to generate headers)
- perform Binder calls to servicemanager and system_server,
  find dropbox_service (for dropbox)
- create files in /data/misc/dmesgd (to store persistent state)

Bug: 215095687
Test: run dmesgd on a user device with injected KFENCE bugs
Change-Id: Iff21a2ffd99fc31b89a58ac774299b5e922721ea
2022-02-10 17:42:52 +00:00
Florian Mayer
360ddf5583 [MTE] Add property to specify default MTE mode for apps.
Bug: 216305376
Change-Id: I9374c8681510037279deaf3e5ae011e8f9111f17
2022-02-09 22:13:59 +00:00
Steven Moreland
c27d24c37c Allow BPF programs from vendor.
Who needs all those context switches?

bpfloader controls which types of vendor programs can be used.

Bug: 140330870
Bug: 162057235
Test: successfully load bpf programs from vendor
Change-Id: I36e4f6550da33fea5bad509470dfd39f301f13c8
2022-02-08 22:46:54 +00:00
Florian Mayer
6020c42f2b Rename property for default MTE mode.
This was requested in aosp/1959650.

Change-Id: I96f8771a39606b0934e4455991a6a34aea40235b
2022-02-07 11:27:20 -08:00
Treehugger Robot
7b7a42e6cf Merge "bluetooth.device.class_of_device should be type string" 2022-02-04 00:38:52 +00:00
Sal Savage
724381a97a bluetooth.device.class_of_device should be type string
Bug: 217452259
Test: Manual, set property in system.prop, build, flash, make sure value
is reflected in getprop | grep bluetooth.device

Change-Id: Id4bfebb4da5bcd64ea4bac8e3c9e9754c96256c6
2022-02-02 14:13:41 -08:00
Andrew Scull
87ac3c3f80 Tag new hypervisor properties
The properties that report hypervisor capabilities are grouped with the
other hypervisor properties for sepolicy.

Bug: 216639283
Test: buid
Change-Id: I013894de637bb7e40a450df6439ebbd5cba28c2b
2022-02-01 18:17:10 +00:00
Etienne Ruffieux
cdd0c11743 Bluetooth boot time start service
Added new sysprops to retrieve Bluetooth configs

Tag: #feature
Test: manual
Bug: 216497194
Change-Id: I94c771f87fdeb5497b81d2098193b4cd230654b6
2022-01-28 14:44:15 +00:00
Sal Savage
568662f953 Add sepolicy for new bluetooth device/profile sysprops
Bug: 215225542
Test: make -j; atest BluetoothInstrumentationTests
Change-Id: Ia532eca413a778b46ea392586d7affc2fd43b90b
2022-01-26 13:09:17 -08:00
Florian Mayer
0f30f3d8ff Merge "[mte] add property to globally enable mte." 2022-01-25 23:59:01 +00:00
Florian Mayer
be3197c996 [mte] add property to globally enable mte.
Bug: 216305376

Change-Id: I25d0b3c9d0e7e6bba14eedf9b833c5e07786ec71
2022-01-25 17:21:58 +00:00
Etienne Ruffieux
bde2fc6c48 Added new context declaration for Bluetooth configs
As we need to create new sysprops for Bluetooth mainline
configs, we need to have a property context available to
vendors and be able to access configs from other packages.

Tag: #feature
Bug: 211570675
Test: Added overlays and logs
Change-Id: If9c61f251578b61c070619069519e0aa563a9573
2022-01-25 01:18:05 +00:00
Akilesh Kailash
20cc7e22c7 Merge "New property to control Async I/O for snapuserd" am: 9de6ad61ff am: f3262f89ef am: 5a333c328c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1936919

Change-Id: Iafd1a572298d93c5c050d1a1ccfd2e2cc986f81d
2022-01-14 00:58:34 +00:00
Akilesh Kailash
5c5fd255d2 New property to control Async I/O for snapuserd
io_uring_setup() system call requires ipc_lock.

(avc: denied { ipc_lock } for comm="snapuserd" capability=14 scontext=u:r:snapuserd:s0 tcontext=u:r:snapuserd:s0 tclass=capability permissive=0)

Add selinux policy.

Bug: 202784286
Test: OTA tests
Signed-off-by: Akilesh Kailash <akailash@google.com>
Change-Id: I806714c7ade0a5d4821b061396c9f064ee5ed8b6
2022-01-13 06:27:46 +00:00
Treehugger Robot
01aca6282a Merge "Add apexd_payload_metadata_prop" am: a6d6b6aee8 am: a4e0ed83dc am: ebd1ff5b25
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1885013

Change-Id: I04921eee21ea7a5f1020c83ed560dd811d0562d4
2021-12-16 20:46:04 +00:00
Richard Fung
0c7c2679b0 Add apexd_payload_metadata_prop
This should be read-only and corresponds to apexd.payload_metadata.path

Bug: 191097666
Test: android-sh -c 'setprop apexd.payload_metadata.path'
See permission denied
atest MicrodroidHostTestCases

Change-Id: Ifcb7da1266769895974d4fef86139bad5891a4ec
2021-12-16 03:00:06 +00:00
Etienne Ruffieux
6b40b2a548 Merge "Adding Bluetooth module sysprop" am: ac45ef86f5 am: b24560a1a3 am: 409e13a954
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1924341

Change-Id: I90173e9518b4c9ca9197e943bad3d97fd6604798
2021-12-15 20:33:32 +00:00
Etienne Ruffieux
ac45ef86f5 Merge "Adding Bluetooth module sysprop" 2021-12-15 19:14:41 +00:00
Etienne Ruffieux
9203c915d1 Adding Bluetooth module sysprop
Added Bluetooth sysprop to be able to remove calls to
SystemProperty.set in Bluetooth module.

Tag: #feature
Bug: 197210455
Test: set/get sysprop with SystemProperties
Merged-In: I8070a493fa082ddaa16cd793ed25ad99971950c0
Change-Id: Ia390bd8b3bb064fcae252edb6307e26f07bd53e7
2021-12-15 13:44:33 +00:00
Treehugger Robot
497884ce80 Merge "Add rule for new gesture_prop." am: ac9f469ff0 am: 29be9a0edf am: f3ece72da2
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1918579

Change-Id: I95521666de397326e70f296aa8abaf71ba77d388
2021-12-15 05:53:21 +00:00
Super Liu
078141a921 Add rule for new gesture_prop.
Bug: 209713977
Bug: 193467627
Test: local build and manual check.
Signed-off-by: Super Liu <supercjliu@google.com>
Change-Id: Ib1d2d6dcc7d6ddc6243c806a883d9252d7c081af
2021-12-15 09:32:01 +08:00
Navinprashath
98e74881cf sepolicy: Add badge for gsm properties am: d35bd44109 am: f924bd13f9 am: c8f99840b8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1901412

Change-Id: I12da2746152a44f133f4aaca79642f0cd5fca847
2021-11-24 11:59:41 +00:00
Navinprashath
d35bd44109 sepolicy: Add badge for gsm properties
Add badge for gsm.operator.iso-country and gsm.sim.operator.iso-country.

Test: Manual test
Bug: 205807505
Change-Id: If4f399cd97b2297094ef9431450f29e0a91e5300
2021-11-24 16:46:55 +08:00
Akilesh Kailash
fb1cf1f0c1 Merge "New property to control virtual a/b user-space snapshots" am: b295d44694 am: ec750298c3 am: 328ce9cccb
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1885106

Change-Id: Ib77dd526257fa5b399adeaccd3cc412e916a36c6
2021-11-22 20:59:46 +00:00
Akilesh Kailash
8a9ec2a496 New property to control virtual a/b user-space snapshots
Bug: 193863443
Test: OTA on pixel
Signed-off-by: Akilesh Kailash <akailash@google.com>
Change-Id: I89e5d105071c2529c9ceb661c04588ff88ffdd76
2021-11-19 23:35:32 +00:00
Daniel Norman
7fdcce2f15 Merge "Revert "Revert "Adds a new prop context for choosing between mul..."" am: 0dd5118c74 am: a8570d7e9c am: 8d50c9d1a9
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1894203

Change-Id: I7291a7bf46690584bba8a0963399423e51947eee
2021-11-17 21:48:20 +00:00
Daniel Norman
0dd5118c74 Merge "Revert "Revert "Adds a new prop context for choosing between mul..."" 2021-11-17 21:24:28 +00:00
Daniel Norman
2f8ce0d9c1 Revert "Revert "Adds a new prop context for choosing between mul..."
Revert "Revert "Adds multi_install_skip_symbol_files field (defa..."

Revert submission 1893459-revert-1869814-vapex-multi-config-VKODFOVCWY

Reason for revert: Fix-forward in https://r.android.com/1894088
Reverted Changes:
I087bfe0dc:Revert "Adds a new prop context for choosing betwe...
I27a498506:Revert "Load persist props before starting apexd."...
Ib5344edc0:Revert "Allow users to choose between multi-instal...
If09bf590e:Revert "Adds multi_install_skip_symbol_files field...
I905dac14c:Revert "Demonstrate multi-installed APEXes."

Change-Id: I03fb124d4e7044f236539a132816fd96cb814775
2021-11-16 20:28:29 +00:00
Treehugger Robot
edf285ba5a Merge "Add camera.disable_preview_scheduler property" am: a594876cfe am: 1b4714c8e8 am: 1d36f66a48
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1887227

Change-Id: I1141daf446b8205621adb8d8e92a33c8b5850b5f
2021-11-16 15:55:54 +00:00
Owen Kim
29e1bf186a Merge "Revert "Adds a new prop context for choosing between multi-insta..."" am: 95d7aaa339 am: a6bd8d83f0 am: 755dee1782
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1893458

Change-Id: I49c519594590927e560fc3cdf5b0f0e2e397cd0f
2021-11-16 09:34:00 +00:00
Owen Kim
95d7aaa339 Merge "Revert "Adds a new prop context for choosing between multi-insta..."" 2021-11-16 08:39:27 +00:00
Owen Kim
780cd02d52 Revert "Adds a new prop context for choosing between multi-insta..."
Revert "Adds multi_install_skip_symbol_files field (default fals..."

Revert submission 1869814-vapex-multi-config

Bug: 206551398
Reason for revert: DroidMonitor-triggered revert due to breakage https://android-build.googleplex.com/builds/tests/view?invocationId=I55600009996329947&testResultId=TR93527797572038984, bug b/206551398
Reverted Changes:
I0cd9d748d:Adds multi_install_skip_symbol_files field (defaul...
I5912a18e3:Demonstrate multi-installed APEXes.
I0e6881e3a:Load persist props before starting apexd.
I932442ade:Adds a new prop context for choosing between multi...
I754ecc3f7:Allow users to choose between multi-installed vend...

Change-Id: I087bfe0dcf8d6ab38d861b82196bac4e9147e8e6
2021-11-16 07:08:15 +00:00
Daniel Norman
bdb51edfe3 Merge "Adds a new prop context for choosing between multi-installed APEXes." am: 8e276eae6b am: d6746bd67a am: bee9f24f08
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1869814

Change-Id: I65f054653bd0337cd9f3348b9a160c19315ce4a2
2021-11-16 01:31:11 +00:00
Daniel Norman
8e276eae6b Merge "Adds a new prop context for choosing between multi-installed APEXes." 2021-11-16 00:45:32 +00:00
Daniel Norman
6b0049dcf0 Adds a new prop context for choosing between multi-installed APEXes.
Bug: 199290365
Test: see https://r.android.com/1872018
Change-Id: I932442adefc7ad10d7cd81e61e95efd41f8cf379
2021-11-11 19:11:11 +00:00
Shuzhen Wang
73be025636 Add camera.disable_preview_scheduler property
Test: Build and boot
Bug: 200306379
Change-Id: I7d0b40de33a2d19c88322eacefe9d7342d55a6f4
2021-11-10 12:22:57 -08:00
Yabin Cui
9119543a23 Merge "Add persist properties for app profiling itself." am: c1a51d1400 am: 4d053aa5b6 am: eb0ea30ebb am: 76bc699869
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1877597

Change-Id: I1cbf9ece16af9306a5f581db8005d841c1031284
2021-11-02 20:19:33 +00:00
Yabin Cui
ee7f40a2a2 Add persist properties for app profiling itself.
Bug: 204601121
Test: build and boot.
Change-Id: If731c77dd6f2b587178b4f6b8a908df2d96e5d9a
2021-11-01 16:42:08 -07:00
Treehugger Robot
ae198a288a Merge "Add the property context for ro.lmk.use_minfree_levels" am: b754ebe4d9 am: 4b144d6a21 am: f4abed157b am: a718092cd3
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1871573

Change-Id: I66ade200fbbc916629e18e6bceef1ae0e22773e3
2021-10-28 01:33:02 +00:00
Robin Lee
0b0dd684e7 Add the property context for ro.lmk.use_minfree_levels
This is not settable by vendor init at the moment, which appears to be a mistake
because it is often used as a board-level configuration.

Change-Id: I7a49d55712e9606446b3e6307627a208657d5da2
Test: adb shell getprop -Z | grep lmk
Bug: 184041905
2021-10-27 13:17:54 +00:00
Bowgo Tsai
7a7e88bddc Set context for partition.odm.verified[.*] properties. am: ef1f630c69 am: b986f376ce am: 44d3ea4ae9 am: 992f7fbe90
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1864479

Change-Id: I1107a7515d4db25a25f4537053700a88c177c8f9
2021-10-21 11:22:34 +00:00
Bowgo Tsai
ef1f630c69 Set context for partition.odm.verified[.*] properties.
Some devices might have the ODM partition so set those properties
as well.

Bug: 203720638
Test: Presubmit
Change-Id: I50ee65e21c471f0691f4c1dfc93be8eb1677ad1b
2021-10-21 16:38:06 +08:00
Ian Hua
dd33b990cd Update sepolicy for adding nnapi_native namespace. am: 91d153e9b5 am: 45d71cd3fc am: 46d20eaa3a am: 8b42e1fa31
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1844919

Change-Id: I3b28582f6063322f21fc4c3163e3bc365f6b8dae
2021-10-12 16:45:33 +00:00
Ian Hua
91d153e9b5 Update sepolicy for adding nnapi_native namespace.
Test: mm
Bug: 201399117
Change-Id: I40a2431b6f5a54deae27fe68f503aff9b99e2793
2021-10-12 11:50:26 +01:00
Andrew Scull
9e242fb119 Allow vendor_init to read AVF device configs am: aedd65ac20 am: 6b6f64b021 am: 9ae672976a am: d1cf781917
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1849821

Change-Id: Icb3e737ac7fd6bb61b8fbf8ddbf2f66ac07f1cd1
2021-10-08 21:20:05 +00:00
Andrew Scull
aedd65ac20 Allow vendor_init to read AVF device configs
Bug: 192819132
Test: build
Change-Id: Iefa4d2d2dc0a13a9a6c95779d6ebde5cb2834295
2021-10-08 14:51:30 +00:00
Treehugger Robot
52262b0f2a Merge "Add media.resolution.limit.32bit to media_config_prop" am: a257817b5d am: 21dac7a746 am: 52046c257f am: 7175ca9712
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1840355

Change-Id: Icd8abb865cae9378e0478d34c107ca843bcb3ab9
2021-10-05 23:25:03 +00:00
Treehugger Robot
21dac7a746 Merge "Add media.resolution.limit.32bit to media_config_prop" am: a257817b5d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1840355

Change-Id: Icd70009f62d023fb68bb1355f804f9489362c0ed
2021-10-05 17:33:32 +00:00
Treehugger Robot
a257817b5d Merge "Add media.resolution.limit.32bit to media_config_prop" 2021-10-05 17:13:35 +00:00
Enrico Granata
1eb92d8726 Merge "Introduce ro.boot.hypervisor properties" am: dd35626853 am: 393ebdda04 am: 73aa6e0429 am: 69c4be40af
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1843773

Change-Id: I4f2a3af3d2f4929658db44a980f65b55edf99236
2021-10-04 20:01:03 +00:00
Enrico Granata
393ebdda04 Merge "Introduce ro.boot.hypervisor properties" am: dd35626853
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1843773

Change-Id: I4ff9a7c008590a5ca17987aac95c5afab441f392
2021-10-04 19:20:47 +00:00
Enrico Granata
dd35626853 Merge "Introduce ro.boot.hypervisor properties" 2021-10-04 19:10:28 +00:00
Enrico Granata
645c390d1a Introduce ro.boot.hypervisor properties
In virtualized deployments of Android, it can be useful to have
access to a description of the hypervisor/host environment being
used to run the guest OS instance.

This is represented by means of a new system property
ro.boot.hypervisor.version, which is meant to convey a
free-form descriptor of the current host/hypervisor version

The property is meant to be provided to Android as androidboot.
by whatever host-specific means are used to supply other boot
properties to the target Android instance. Access could be later
opened to other vendor processes to set if needed for specific
setups where init is not a sufficiently-early stage for
host/guest communication. Such setups are not known at this time.

For a native Android incantation, the property defaults to
being missing

Other properties could later be added to this same namespace
and context if they turn out to be useful in specific scenarios.

Bug: 178749018
Test: build cuttlefish
Change-Id: Id721c14ef1958b525c2866a660dcae8fd176a79d
2021-10-04 11:14:03 -06:00
Beth Thibodeau
79485f5e45 Merge "make ril.cdma.inecmmode system property internal so that it cannot reveal a system api that requires READ_PRIVILEGED_PHONE_STATE" 2021-10-01 22:58:31 +00:00
Nazanin
b373dd0df2 make ril.cdma.inecmmode system property internal
so that it cannot reveal a system api that requires
READ_PRIVILEGED_PHONE_STATE

Bug: 183410189
Bug: 197722115
Test: adb shell getprop -Z
Change-Id: I65f4121fc300447af7d516676166bc8b0b53b727
Merged-In: I65f4121fc300447af7d516676166bc8b0b53b727
2021-10-01 21:36:49 +00:00
Justin Yun
d204e3ff22 Define ro.vendor.api_level am: 785bb7a815 am: 7ad553f5d5 am: 325090e08d am: ac268263ff
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1839637

Change-Id: Ie30064889141e1fb314e7702f1a679a69e403cde
2021-10-01 04:09:42 +00:00
Justin Yun
7ad553f5d5 Define ro.vendor.api_level am: 785bb7a815
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1839637

Change-Id: I4dbca94dc1f04fac3fdbfd5b69ebd7621e6af93c
2021-10-01 03:32:50 +00:00
Wonsik Kim
f648327a97 Add media.resolution.limit.32bit to media_config_prop
Bug: 194771349
Test: cts/media/device-small
Change-Id: I79cb1580604780e8829844cba2502d2196d93f27
2021-09-30 00:44:58 -07:00
Justin Yun
785bb7a815 Define ro.vendor.api_level
ro.vendor.api_level will have the api_level that the vendor images
are required to implement based on the various api level properties.

Bug: 200258600
Test: getprop ro.vendor.api_level
Change-Id: Ie4f71ef920f03bdbc0a904936c26f092429fcd7f
2021-09-29 15:34:19 +09:00
Jiakai Zhang
cfd5f04013 Merge "Remove dalvik.vm.dex2oat-updatable-bcp-packages-file from sepolicy." am: b9443cc3fa am: 20c36de280 am: c90712bb7b am: 8eb0687e1b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1832481

Change-Id: I127d93c5a721f3b02c254979ce001a1c08a876a0
2021-09-27 12:43:58 +00:00
Jiakai Zhang
20c36de280 Merge "Remove dalvik.vm.dex2oat-updatable-bcp-packages-file from sepolicy." am: b9443cc3fa
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1832481

Change-Id: Idebce55dcf5f6cfe2c7a6eb5e695c9bf4b7018ed
2021-09-27 11:55:00 +00:00
Jiakai Zhang
e0f7873436 Remove dalvik.vm.dex2oat-updatable-bcp-packages-file from sepolicy.
This system properly is no longer needed.

Bug: 200241946
Test: Presubmits
Change-Id: I82258d7ccf125fd30655873a1b15582654dafac3
2021-09-27 09:15:17 +00:00
Jean-Michel Trivi
27871845ab Spatial audio: add property for spatializer effect am: 2abed0062f
Original change: https://googleplex-android-review.googlesource.com/c/platform/system/sepolicy/+/15883632

Change-Id: Ib46c6571acb05c922fd7dad83d77be8ce5080cd5
2021-09-22 08:13:06 +00:00
Jean-Michel Trivi
2abed0062f Spatial audio: add property for spatializer effect
Ignore-AOSP-First: confidential feature

Add a property to be read by system_server's AudioService that
indicates whether a spatializer effect is available on the device.
If true, spatialization functionality will be initialized.

Bug: 188502620
Test: adb shell dumpsys audio | grep -A 4 Spatial
Change-Id: I759e2fb32087b6e8e2a578b6ec804fb7c4f1d4f1
2021-09-21 23:16:11 -07:00
Jiyong Park
a0bac44805 Add virtualizationservice.state.last_cid am: b804de2943
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1827500

Change-Id: I007226b8d1a64f162f65bf49eb929b7dc7ed1658
2021-09-17 09:14:09 +00:00
Jiyong Park
b804de2943 Add virtualizationservice.state.last_cid
It is a system property that keeps the last CID used by the
virtualizationservice. Although the information is local to the
process, a new system property is justified because the information has
to be kept across multiple runs of the process. A file however is not
desirable because the information shouldn't be persisted.

Bug: 196015427
Test: atest MicrodroidHostTestCases
Change-Id: If8ca4b6ad8d9c8cb3bb33dc9ef45de0ae6481d15
2021-09-17 09:35:58 +09:00
Suren Baghdasaryan
0e0d0ad652 sepolicy updates for adding native flag namespace for lmkd
sepolicy updates for running lmkd experiments.

Bug: 194316048
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I21df3b76cce925639385111bd23adf419f026a65
Merged-In: I21df3b76cce925639385111bd23adf419f026a65
2021-09-08 21:12:09 +00:00
Tianjie Xu
60587b5246 Merge "Set context for partition.*.verified.root_digest properties." am: e4623f3219
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1814306

Change-Id: Ifeafda46ef76a11118efa5b0094fc5453331d384
2021-09-01 17:59:03 +00:00
TreeHugger Robot
842d75a7e6 Merge "Revert "Reland: Add ro.vendor.build.dont_use_vabc to property_contexts"" into sc-dev 2021-08-31 17:22:23 +00:00
Tianjie
ade005f8dd Set context for partition.*.verified.root_digest properties.
This is requested by the partner engineer team to uniquely identify
a partition.

Bug: 197973981
Test: boot the device
Change-Id: Id0393698d730391eb8e438e424e527451f54d4ea
2021-08-30 17:13:51 -07:00
Kelvin Zhang
e52b7716cb Revert "Reland: Add ro.vendor.build.dont_use_vabc to property_contexts"
This reverts commit 2e7abeb570.

Reason for revert: b/197917451

Bug: 197917451

Change-Id: I570fe494976b3676074a9b8794859db75b827120
2021-08-30 16:26:48 +00:00
Treehugger Robot
28515dd083 Merge "sepolicy: Add new crypto type ro.crypto.type=managed" am: aedbe31acb
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1802147

Change-Id: I0e8e1faed5cc0cb92a4cae6debeb6d67a7430049
2021-08-26 04:51:40 +00:00
Treehugger Robot
aedbe31acb Merge "sepolicy: Add new crypto type ro.crypto.type=managed" 2021-08-26 04:37:37 +00:00
Satoshi Niwa
dd9d2871d8 sepolicy: Add new crypto type ro.crypto.type=managed
This type is used when device encryption is managed by the host system.
(e.g. ARC++)
Please see b/136127632#comment10 for the reason why we introduce this.

Bug: 169207445
Test: m
Change-Id: I8c4eaa57389e591b2c520b59bb95408d43daf22c
2021-08-25 10:40:57 +09:00
Paul Crowley
f87e5bafb5 Merge "Revert^2 "Allow vold to deleteAllKeys in Keystore"" into sc-dev 2021-08-13 02:33:43 +00:00
Paul Crowley
449a6e1351 Revert^2 "Allow vold to deleteAllKeys in Keystore"
Revert submission 15536724-revert-15521094-vold-deleteAllKeys-GDJSMLXRVZ

Reason for revert: Underlying KM problem fixed
Reverted Changes:
I8e2621bef:Revert "Detect factory reset and deleteAllKeys"
I546b980bb:Revert "Add deleteAllKeys to IKeystoreMaintenance"...
I1ed68dd9e:Revert "Allow vold to deleteAllKeys in Keystore"

Bug: 187105270
Test: booted Cuttlefish twice
Change-Id: I6a9981ace72b133082d1d600f8e45b55bdb34b44
2021-08-13 01:44:22 +00:00
Shawn Willden
4b8112473d Revert "Allow vold to deleteAllKeys in Keystore"
Revert submission 15521094-vold-deleteAllKeys

Reason for revert: Causes infinite loop in Trusty KeyMint
Reverted Changes:
I9c5c54714:Detect factory reset and deleteAllKeys
I2fb0e94db:Allow vold to deleteAllKeys in Keystore
Id23f25c69:Add deleteAllKeys to IKeystoreMaintenance
Ife779307d:Enable deleteAllKeys from vold
I4312b9a11:Enable deleteAllKeys from vold

Bug: 187105270
Change-Id: I1ed68dd9ee9a6f14152307d610af0b16dd3219ac
2021-08-12 01:08:37 +00:00
Paul Crowley
cb00759831 Merge "Allow vold to deleteAllKeys in Keystore" am: d46569c261 am: 66b0b41923
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1789529

Change-Id: I03d240d980763f3a84971f185f207204bac2602d
2021-08-11 18:13:25 +00:00
Paul Crowley
d46569c261 Merge "Allow vold to deleteAllKeys in Keystore" 2021-08-11 17:39:55 +00:00
Paul Crowley
4a664e8d5d Allow vold to deleteAllKeys in Keystore
Add deleteAllKeys to IKeystoreMaintenance and allow vold to call it.
Allow vold to read the property
`ro.crypto.metadata_init_delete_all_keys.enabled`

Bug: 187105270
Test: booted twice on Cuttlefish
Ignore-AOSP-First: no merge path to this branch from AOSP.
Merged-In: I2fb0e94db9d35c1f19ca7acb2f541cfb13c23524
Change-Id: I2fb0e94db9d35c1f19ca7acb2f541cfb13c23524
2021-08-11 10:16:28 -07:00
EdenSu
ee495b312c sepolicy: Add supporting for property name with phone id
Add debug property name with phone id.

Bug: 194281028
Test: Build and verified there is no avc denied in the log
Change-Id: Ia7ca93a3390b2f59e894ca7ebce4cae9c0f83d28
Merged-In: Ia7ca93a3390b2f59e894ca7ebce4cae9c0f83d28
2021-08-11 16:37:03 +00:00
Treehugger Robot
866963a32d Merge "sepolicy: Add supporting for property name with phone id" am: d456d11251 am: ed9f1e9225
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1790287

Change-Id: I9651f6973b09d4b8d15838c303def18bc51170bd
2021-08-11 09:26:02 +00:00
Treehugger Robot
d456d11251 Merge "sepolicy: Add supporting for property name with phone id" 2021-08-11 09:03:40 +00:00
EdenSu
8d82a8f10b sepolicy: Add supporting for property name with phone id
Add debug property name with phone id.

Bug: 194281028
Test: Build and verified there is no avc denied in the log
Change-Id: Ia7ca93a3390b2f59e894ca7ebce4cae9c0f83d28
2021-08-11 13:57:54 +08:00
Paul Crowley
bf29c3a2dc Allow vold to deleteAllKeys in Keystore
Add deleteAllKeys to IKeystoreMaintenance and allow vold to call it.
Allow vold to read the property
`ro.crypto.metadata_init_delete_all_keys.enabled`

Bug: 187105270
Test: booted twice on Cuttlefish
Change-Id: I2fb0e94db9d35c1f19ca7acb2f541cfb13c23524
2021-08-10 21:51:09 -07:00
Treehugger Robot
1a8547d3ff Merge "sepolicy updates for adding native flag namespace for lmkd" am: 6d0f93af27 am: 001dc104c8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1786669

Change-Id: I38688b1dffd50f1f70fe35183fa8c9a78e86abb8
2021-08-10 02:31:05 +00:00
Suren Baghdasaryan
592e06c910 sepolicy updates for adding native flag namespace for lmkd
sepolicy updates for running lmkd experiments.

Bug: 194316048
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I21df3b76cce925639385111bd23adf419f026a65
2021-08-09 17:35:09 -07:00
Kelvin Zhang
c1a240a90b Merge "Add sepolicy for build prop for go/vabc-xor" am: 4b68fb3ff5 am: cf42f44966
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1778305

Change-Id: Id2e9811a41f56914e8bce829ff3c5e2b20c53e14
2021-08-09 15:30:40 +00:00
Kelvin Zhang
80e0d50643 Add sepolicy for build prop for go/vabc-xor
Add a new build prop for the new Vritual AB Compression with XOR
feature. This allows each lunch target to control if they want to use
the new feature.

Test: th
Bug: 177104308
Change-Id: Ibafc231daecef5e482652d1769ad0f3729206c0f
2021-08-05 18:20:03 +00:00
David Anderson
8429ed5bdf Merge "Add new snapuserd socket and property rules." am: f595435798 am: f9d4e5003b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1778706

Change-Id: Ie1d65724b6b8e4e3cfb2413bd7838c27c310559c
2021-07-28 22:25:06 +00:00
David Anderson
f595435798 Merge "Add new snapuserd socket and property rules." 2021-07-28 21:59:59 +00:00
Martijn Coenen
3f1c5d5c14 Merge "Allow odsign to stop itself." into sc-dev 2021-07-28 15:06:47 +00:00
Martijn Coenen
3ca856a1a9 Merge "Allow odsign to stop itself." am: 359aea7d49 am: 632c8e428f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1779988

Change-Id: I863a95342f0a37f14107827df145a49f2a911c19
2021-07-28 12:20:34 +00:00
Martijn Coenen
28377a8a17 Allow odsign to stop itself.
Carve out a label for the property, and allow odsign to set it.

Bug: 194334176
Test: no denials
Change-Id: I9dafefabc27c679ed9f36e617e824f44f3b16bbd
Merged-In: I9dafefabc27c679ed9f36e617e824f44f3b16bbd
2021-07-28 11:52:48 +00:00
Martijn Coenen
5f21a0fa92 Allow odsign to stop itself.
Carve out a label for the property, and allow odsign to set it.

Bug: 194334176
Test: no denials
Change-Id: I9dafefabc27c679ed9f36e617e824f44f3b16bbd
2021-07-28 10:50:35 +02:00
David Anderson
bf5b6ce422 Add new snapuserd socket and property rules.
This adds a new property prefix owned by snapuserd, for communicating
when the service is ready to accept connections (snapuserd.ready and
snapuserd.proxy_ready).

This also adds a new socket context. This is a seqpacket socket used to
communicate with a special instance of snapuserd that bridges to the
first-stage daemon.

Bug: 193833730
Test: no denials after OTA applies and boots
Change-Id: Ibad03659eba5c25e205ba00f27d0b4f98585a84b
2021-07-27 10:50:59 -07:00
Suren Baghdasaryan
ff51a7bf96 property_contexts: Add ro.lmk.filecache_min_kb property context
ro.lmk.filecache_min_kb property allows vendors to specify min filecache
size in KB that should be reached after thrashing is detected.

Bug: 193293513
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I927f4a1c81db3f284353fe4ab93bf454acff69b7
Merged-In: I927f4a1c81db3f284353fe4ab93bf454acff69b7
2021-07-19 09:48:54 +00:00
Suren Baghdasaryan
232678f309 property_contexts: Add ro.lmk.filecache_min_kb property context am: cb343e8013 am: 1d90fdbe53
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1766839

Change-Id: Id5189426f4584b38ccfb6d28ce8d769145dd88ab
2021-07-16 16:55:21 +00:00
Suren Baghdasaryan
cb343e8013 property_contexts: Add ro.lmk.filecache_min_kb property context
ro.lmk.filecache_min_kb property allows vendors to specify min filecache
size in KB that should be reached after thrashing is detected.

Bug: 193293513
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I927f4a1c81db3f284353fe4ab93bf454acff69b7
2021-07-15 23:14:53 +00:00
Hasini Gunasinghe
806c7eb133 Allow keystore to read and write keystore.crash_count system property.
Additionally, remove the obsolete permission which allows keystore to
register callbacks with statsd. There's no direct communication between
keystore and statsd now.

Ignore-AOSP-First: Resolving merge conflicts.
Bug: 188590587
Test: statsd TestDrive script.
Merged-In: I31d202751ba78bb547822020260a7e366cb8826e

Change-Id: I31d202751ba78bb547822020260a7e366cb8826e
2021-07-09 16:20:07 +00:00
Hasini Gunasinghe
4fa6b1a037 Allow keystore to read and write keystore.crash_count system property.
Additionally, remove the obsolete permission which allows keystore to
register callbacks with statsd. There's no direct communication between
keystore and statsd now.

Ignore-AOSP-First: No mergepath to AOSP.
Bug: 188590587
Test: statsd TestDrive script.
Merged-In: I31d202751ba78bb547822020260a7e366cb8826e

Change-Id: I31d202751ba78bb547822020260a7e366cb8826e
2021-07-08 17:54:58 +00:00
Hasini Gunasinghe
9fe1532ade Allow keystore to read and write keystore.crash_count system property.
Additionally, remove the obsolete permission which allows keystore to
register callbacks with statsd. There's no direct communication between
keystore and statsd now.

Ignore-AOSP-First: No mergepath to AOSP.
Bug: 188590587
Test: statsd TestDrive script.
Merged-In: I31d202751ba78bb547822020260a7e366cb8826e

Change-Id: I31d202751ba78bb547822020260a7e366cb8826e
2021-07-08 14:29:44 +00:00
Treehugger Robot
01bfd5d032 Merge "Add persist.nfc property" am: cb83d70584 am: 41ac67c619
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1733494

Change-Id: I2b3d1c2374533b3f5946a735e8e359ad12d624a2
2021-07-06 08:52:25 +00:00
Treehugger Robot
cb83d70584 Merge "Add persist.nfc property" 2021-07-06 08:05:46 +00:00
Jayant Chowdhary
487df8589b Merge "Define property ro.camera.enableCamera1MaxZsl" into sc-dev am: cf2b1eff87
Original change: https://googleplex-android-review.googlesource.com/c/platform/system/sepolicy/+/14683766

Change-Id: I21a6b1cc1e6311c256110d2764300617fe583173
2021-07-02 23:18:27 +00:00
Jayant Chowdhary
8394a04840 Define property ro.camera.enableCamera1MaxZsl
Bug: 184617195

Test: atest CameraGLTest.java (basic validity)

Change-Id: I30f8fb647cb8f67ff75d41718e3cc475d206a29a
Signed-off-by: Jayant Chowdhary <jchowdhary@google.com>
2021-07-01 08:15:39 -07:00
Rachel Lee
7f4f05c01c Merge "Add sepolicy SF native boot namespace." am: cf8f6ef363 am: 835446fd04
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1753141

Change-Id: Idb6ae17461c7715677bcb161d115e06511eabca3
2021-07-01 02:13:26 +00:00
rnlee
b6142ecc22 Add sepolicy SF native boot namespace.
Following go/android-native-flag-api-manual.

Bug: 190769260
Test: make.
Change-Id: I84fe7e9d046fbbe737f09043589b19e71981f521
2021-06-30 14:07:44 -07:00
TreeHugger Robot
254cf3a1a5 Merge "Reland: Add ro.vendor.build.dont_use_vabc to property_contexts" into sc-dev 2021-06-22 19:25:01 +00:00
Diego Wilson
11d810a7fb Add camera2 extension property policies
These properties allow to vendors to provide their
own camera2 extensions service. The properties
must be accesible to any android app that wishes
to use camera2 extensions.

Bug: 183533362
Change-Id: I94c7ac336b3103355124830320787472f0d2a8b6
Merged-In: I94c7ac336b3103355124830320787472f0d2a8b6
2021-06-21 22:34:29 +00:00
Diego Wilson
0bc6711577 Merge "Add camera2 extension property policies" am: 1c1525198a am: 5df6558de9
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1736939

Change-Id: I216c3230210c7b182ab922475afa24fbe2574fbb
2021-06-19 01:52:38 +00:00
Diego Wilson
5908c353e3 Add camera2 extension property policies
These properties allow to vendors to provide their
own camera2 extensions service. The properties
must be accesible to any android app that wishes
to use camera2 extensions.

Change-Id: I94c7ac336b3103355124830320787472f0d2a8b6
2021-06-18 23:59:41 +00:00
Kelvin Zhang
2e7abeb570 Reland: Add ro.vendor.build.dont_use_vabc to property_contexts
Bug: 185400304
Test: mm

Change-Id: Iae58ef223073f7d4c3135f7387fc28d813291be6
Merged-In: I7d06d0c1d137471a0d7b78678a372b29158f1be7
(cherry picked from commit 407b21b3cd)
2021-06-18 12:15:43 -04:00
Ray Chi
087c63461a Add sys.usb.mtp.batchcancel to usb_config_prop
Add sys.usb.mtp.batchcancel to usb_config_prop to allow
mediaprovider to read this property.

Bug: 181729410
Test: boot the device, and confirm the property could be read
Change-Id: I2964efde0cc831bb7e91fcafb7b35e57438ef306
Merged-In: I44b2d9c36bfa439cdbf8b8a874ead424381e3e50
(cherry picked from commit 07bb5d076a)
2021-06-17 06:47:03 +00:00
Fiona Campbell
36adb7232b Revert "Add sys.usb.mtp.batchcancel to usb_config_prop"
Revert submission 14910151-mtp_cancel-sc-dev

Reason for revert: DroidMonitor-triggered revert due to breakage https://android-build.googleplex.com/builds/quarterdeck?branch=git_sc-dev&target=cf_x86_64_phone-userdebug&lkgb=7458085&lkbb=7458560&fkbb=7458104, bug b/191120942

Reverted Changes:
I44b2d9c36:Add sys.usb.mtp.batchcancel to usb_config_prop
I4e172fa62:MTP: add a new parameter for cancelEvents function...
Iad744e27e:usb: set sys.usb.mtp.batchcancel to true
Bug: 191120942
Change-Id: Ib2668f2c682fcde8d3c957b0a9cd75f2cc447cc0
2021-06-15 09:15:38 +00:00
Treehugger Robot
665f84e2af Merge "Add ro.vendor.build.dont_use_vabc to property_contexts" am: 49de475b86 am: c72ac915a5
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1734833

Change-Id: Icaaf50dcc9045e031be474d6bcc53e397c5a4ddc
2021-06-14 19:13:17 +00:00
Kelvin Zhang
7ce2af4c23 Add ro.vendor.build.dont_use_vabc to property_contexts
Test: mm
Change-Id: I7d06d0c1d137471a0d7b78678a372b29158f1be7
2021-06-11 10:00:40 -04:00
Jack Yu
4412ba4942 Add persist.nfc property
Allow system_app to set and get system property persist.nfc..

Bug: 187083201
Test: access persist.nfc.debug_enabled
Change-Id: Ia952f83d6206be458bcb56a9c4d44bc3e6db5e73
2021-06-11 00:28:31 +08:00
Ray Chi
050bc4bdca Add sys.usb.mtp.batchcancel to usb_config_prop
Add sys.usb.mtp.batchcancel to usb_config_prop to allow
mediaprovider to read this property.

Bug: 181729410
Test: boot the device, and confirm the property could be read
Change-Id: I44b2d9c36bfa439cdbf8b8a874ead424381e3e50
Merged-In: I44b2d9c36bfa439cdbf8b8a874ead424381e3e50
(cherry picked from commit 07bb5d076a)
2021-06-09 14:52:45 +00:00
Treehugger Robot
5f9494ab91 Merge "Add sys.usb.mtp.batchcancel to usb_config_prop" am: c73a91f49d am: 132707a3c2
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1728031

Change-Id: Ia6a66eb6fe335e30bd18c0bdf5e25199bc4d85e1
2021-06-09 02:32:35 +00:00
Treehugger Robot
c73a91f49d Merge "Add sys.usb.mtp.batchcancel to usb_config_prop" 2021-06-09 01:52:39 +00:00
Wei Wang
c687832ba1 Merge "Rename surfaceflinger uclamp.min property" am: 0e139d0a3a am: f362d255a2
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1729184

Change-Id: Ic88adc3f4ee51a4fffd5575c64265c77c9f69731
2021-06-08 06:34:56 +00:00
Ray Chi
07bb5d076a Add sys.usb.mtp.batchcancel to usb_config_prop
Add sys.usb.mtp.batchcancel to usb_config_prop to allow
mediaprovider to read this property.

Bug: 181729410
Test: boot the device, and confirm the property could be read
Change-Id: I44b2d9c36bfa439cdbf8b8a874ead424381e3e50
2021-06-08 02:32:20 +00:00
Wei Wang
3aad6d014a Add a new SF property for setting uclamp.min
Bug: 190137562
Test: boot and check uclamp.min of SF
Signed-off-by: Wei Wang <wvw@google.com>
Change-Id: I2acca834f6257f5e718413b831b78c487520b0cd
2021-06-07 18:56:16 -07:00
Wei Wang
4d9438808e Rename surfaceflinger uclamp.min property
Bug: 190137562
Test: boot and check uclamp.min of SF
Signed-off-by: Wei Wang <wvw@google.com>
Change-Id: I058c72012a28cebe09f001688a35fb4c6839e6cc
2021-06-07 18:52:50 -07:00
Treehugger Robot
9a37e1385c Merge "Add a new SF property for setting uclamp.min" am: 6a94b64583 am: b6f2c42245
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1729630

Change-Id: I1d864b312a7284e66ab31d2abf97153020ad5d61
2021-06-07 21:34:31 +00:00
Wei Wang
7dc88f080b Add a new SF property for setting uclamp.min
Bug: 190137562
Test: boot and check uclamp.min of SF
Signed-off-by: Wei Wang <wvw@google.com>
Change-Id: I2acca834f6257f5e718413b831b78c487520b0cd
2021-06-07 11:51:56 -07:00
Calin Juravle
d802bd8964 Enable ART properties modularization
ART is becoming a module and we need to be able to add new properties
without modifying the non updatable part of the platform:

- convert ART properties to use prefix in the namespace of
[ro].dalvik.vm.
- enable appdomain and coredomain to read device_config properties
that configure ART

(cherry picked from commit 0b2ca6c22c)

Test: boot
Bug: 181748174
Merged-In: Id23ff78474dba947301e1b6243a112b0f5b4a832
Change-Id: Id23ff78474dba947301e1b6243a112b0f5b4a832
2021-06-02 21:18:13 +00:00
Calin Juravle
cc3a1f61da Merge "Enable ART properties modularization" am: c4efcbdc06 am: e6bf8c1409
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1710967

Change-Id: Ie7eb5d035677f7021851679909e9b075799fde8d
2021-06-02 15:04:25 +00:00
Calin Juravle
0b2ca6c22c Enable ART properties modularization
ART is becoming a module and we need to be able to add new properties
without modifying the non updatable part of the platform:

- convert ART properties to use prefix in the namespace of
[ro].dalvik.vm.
- enable appdomain and coredomain to read device_config properties
that configure ART

Test: boot
Bug: 181748174
Change-Id: Id23ff78474dba947301e1b6243a112b0f5b4a832
2021-06-01 16:14:55 -07:00
Tianjie Xu
9f4a48f700 Merge "Add ro.vendor.build.fingerprint_has_digest to property context" am: 3b71803647 am: 8a58939f11
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1717076

Change-Id: I23f39248fbc632f28577ddeac796fd46e4b0a89a
2021-06-01 05:08:17 +00:00
Tianjie Xu
3b71803647 Merge "Add ro.vendor.build.fingerprint_has_digest to property context" 2021-06-01 04:31:07 +00:00
Michael Ayoubi
7614182aa9 Merge "Change dck properties to int" am: 880e0ee101 am: 98c9e96324
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1718111

Change-Id: I294589441eac6159d7d50fd1f50de488cffb0154
2021-05-27 01:26:17 +00:00
Michael Ayoubi
730d6d0651 Change dck properties to int
Change dck r2/r3 properties to wcc levels.

Bug: 186488185
Test: Confirm GMSCore access

Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: I9aab231d3e4bb7bd696e26652b9215d91d07b8b3
Merged-In: I9aab231d3e4bb7bd696e26652b9215d91d07b8b3
2021-05-27 00:52:19 +00:00
Tianjie
8428a105b4 Add ro.vendor.build.fingerprint_has_digest to property context
This property indicates if the new fingerprint format is in use.
It's read by VTS to put the correct fingerprint in test report.

Bug: 188824341
Test: boot the device, check build prop
Change-Id: I2694d613e8d91d355506a4c7aaad4bdc191a800a
2021-05-26 11:21:24 -07:00
Michael Ayoubi
c14bc7ef3c Change dck properties to int
Change dck r2/r3 properties to wcc levels.

Bug: 186488185
Test: Confirm GMSCore access

Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: I9aab231d3e4bb7bd696e26652b9215d91d07b8b3
2021-05-26 15:04:02 +00:00
Michael Ayoubi
45333650ec Add DCK eligibility properties
Bug: 186488185
Test: Confirm GMSCore access
Change-Id: I20baf5c9ae9fbebc9e43d2798401ad49776fb74a
Merged-In: I20baf5c9ae9fbebc9e43d2798401ad49776fb74a
2021-05-25 21:39:51 +00:00
Michael Ayoubi
6080fdc9ec Merge "Add DCK eligibility properties" am: 20af5f1e4e am: 64c125adc0
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1715931

Change-Id: I1765b987167e49e102f6725af797e2ce6e7857be
2021-05-25 01:48:39 +00:00
Michael Ayoubi
20af5f1e4e Merge "Add DCK eligibility properties" 2021-05-25 01:06:03 +00:00
Calin Juravle
e5cdecd7bd Merge "Add SELinux context for pm.dexopt.cmdline property" into sc-dev 2021-05-24 21:34:29 +00:00
Calin Juravle
f86eb205fc Add SELinux context for pm.dexopt.cmdline property
Test: boot
Bug: 188655918
Merged-In: I4e5bd0e0c72adc76017f15c35df5c373fb2bf220
(cherry picked from commit aca5d73453)
Change-Id: If529bae92c00e110475b33510717bfe9d51f80aa
2021-05-24 09:54:29 -07:00
Calin Juravle
242ca0df97 Merge "Add SELinux context for pm.dexopt.cmdline property" am: 11c6d45e7c am: 49c9420233
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1710948

Change-Id: If27ae4c36940964c95a851ae3c82f72f012343e2
2021-05-24 15:48:03 +00:00
Michael Ayoubi
77c10eff1e Add DCK eligibility properties
Bug: 186488185
Test: Confirm GMSCore access
Change-Id: I20baf5c9ae9fbebc9e43d2798401ad49776fb74a
2021-05-21 23:31:09 +00:00
Calin Juravle
aca5d73453 Add SELinux context for pm.dexopt.cmdline property
Test: boot
Bug: 188655918
Change-Id: I4e5bd0e0c72adc76017f15c35df5c373fb2bf220
2021-05-21 14:48:14 +00:00
Christian Wailes
3bdd47894a Merge "Added SELinux context for dalvik.vm.dexopt.thermal-cutoff property" into sc-dev 2021-05-20 22:26:34 +00:00
Chris Wailes
8af578c3e9 Added SELinux context for dalvik.vm.dexopt.thermal-cutoff property
Test: Boot
Bug: 165935246
Bug: 181795682
Change-Id: I266623fab1053ad1e058f041ccbe39880d74b768
Merged-In: I266623fab1053ad1e058f041ccbe39880d74b768
2021-05-20 22:25:42 +00:00
hkuang
227bb14c8a Allow mediaserver start transcoding service.
Merged-In: 1708946

Bug: 187271658
Test: atest MediaTranscodeManagerTest; unit tests
Change-Id: I847a83ec3e0d852266b7b0c624767e72d48b45d5
2021-05-19 15:43:29 +00:00
Hangyu Kuang
bd346cc476 Merge "Allow mediaserver start transcoding service." am: f7578e0b04 am: f1d242a0e7
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1708946

Change-Id: Ib54bfdb2848e48df0dcf4c64c76da33397d21313
2021-05-18 06:53:42 +00:00
Hangyu Kuang
f7578e0b04 Merge "Allow mediaserver start transcoding service." 2021-05-18 06:13:17 +00:00
hkuang
de370e5161 Allow mediaserver start transcoding service.
Bug: 187271658
Test: atest MediaTranscodeManagerTest; unit tests
Change-Id: I847a83ec3e0d852266b7b0c624767e72d48b45d5
2021-05-17 13:52:38 -07:00
Christian Wailes
081c6ad136 Merge "Added SELinux context for dalvik.vm.dexopt.thermal-cutoff property" am: 82ce869794 am: 15fee58b2b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1705661

Change-Id: Iec14f8f266cb7cc3f518be00c2b9797f4b5650b3
2021-05-17 20:19:12 +00:00
liuyg
87fc7e06db Revert "Allow the MediaProvider app to set FUSE passthrough property" am: 04c85dcfc4 am: 97e0c02e9e am: bdfad42b09
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1705066

Change-Id: I07875bd5e07c5b2b45fb5fdd064790b50ad7eeb7
2021-05-13 19:55:46 +00:00
Alessio Balsini
4e758d5a43 Allow the MediaProvider app to set FUSE passthrough property am: c1e2918fd9 am: bafbd5eeb0 am: 3c7f9b1c7a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1693545

Change-Id: I4340d1aa457cf190eba110b74ef63f76abe6613d
2021-05-13 19:55:35 +00:00
liuyg
04c85dcfc4 Revert "Allow the MediaProvider app to set FUSE passthrough property"
This reverts commit c1e2918fd9.

Reason for revert: Build broke

Change-Id: I4b95e977cf66c586b0d0b465f1b3654c01074152
2021-05-13 18:18:28 +00:00
Alessio Balsini
c1e2918fd9 Allow the MediaProvider app to set FUSE passthrough property
Allow the MediaProvider app to write the system property
fuse.passthrough.enabled in case FUSE passthrough is enabled.
The need for this additional system property is due to the ScopedStorage
CTS tests that are assuming FUSE passtrhough is always on for devices
supporting it, but there may be some cases (e.g., GSI mixed builds)
where this is not possible true and the feature is disabled at runtime,
thus causing the tests to fail.
This additional system property is only set when FUSE passthrough is
actually being used by the system.

Bug: 186635810
Test: CtsScopedStorageDeviceOnlyTest
Signed-off-by: Alessio Balsini <balsini@google.com>
Change-Id: I623042d67399253a9167188c3748d93eb0f2d41f
2021-05-13 17:38:16 +00:00
Chris Wailes
2e44672a75 Added SELinux context for dalvik.vm.dexopt.thermal-cutoff property
Test: Boot
Bug: 165935246
Change-Id: I266623fab1053ad1e058f041ccbe39880d74b768
2021-05-12 17:23:49 -07:00
JJ Lee
448ca882b3 Add ro.audio.offload_wakelock to audio_config_prop am: dcc9b45e3b am: 8369aed9cf am: c3b03a2c5b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1699887

Change-Id: I6ced2f6ae881e05eb5d42eb2c7b38cda41db01f9
2021-05-11 14:32:33 +00:00
JJ Lee
dcc9b45e3b Add ro.audio.offload_wakelock to audio_config_prop
Add ro.audio.offload_wakelock to audio_config_prop to allow
AudioFlinger to read this property.

Bug: 178789331
Test: build pass, property can be successfully set and read
Signed-off-by: JJ Lee <leejj@google.com>
Change-Id: I4650e03eb0a406b7531c08001adcfebe822bd75b
2021-05-10 14:36:15 +08:00
Treehugger Robot
7fdad52919 Merge "Add profile saver properties to selinux rules" am: 9395fb4b78 am: a1b84ce3c5 am: c573c46b0a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1697662

Change-Id: Ib90c09933ab8174948ce486d4b8273771a039bcf
2021-05-06 16:47:06 +00:00
Treehugger Robot
9395fb4b78 Merge "Add profile saver properties to selinux rules" 2021-05-06 16:01:15 +00:00
Nathalie Le Clair
251e236446 Merge "Add existing ro.hdmi sysprop to sepolicy" am: ce32e9bcdb am: f9b4893515 am: cc9f0aa013
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1697046

Change-Id: If6261aa1083f8daf0499d1ee2fe987164f6f7805
2021-05-06 07:22:47 +00:00
Nathalie Le Clair
ce32e9bcdb Merge "Add existing ro.hdmi sysprop to sepolicy" 2021-05-06 06:30:30 +00:00
Calin Juravle
4e3599e2f9 Add profile saver properties to selinux rules
Test: manual

Bug: 184714236
Bug: 185979271
Change-Id: I5135e182ba26150cd917ded72d2af72c1c5b15a1
2021-05-05 17:12:22 -07:00
Nathalie Le Clair
f696109b23 Add existing ro.hdmi sysprop to sepolicy
Bug: 186998799
Test: make
Change-Id: If99e3c029b992cea5b4af1b4f062d3b19e601df9
2021-05-05 09:06:09 +02:00
Alex Hong
3d360b561b Label the odm_dlkm properties in "odm_dlkm/etc/build.prop" am: ec6d12f2bf am: 1a7f964293 am: f981eae405
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1695585

Change-Id: Ic550811122c92786b6fac19c337b63303bf23808
2021-05-04 10:36:30 +00:00
Alex Hong
ec6d12f2bf Label the odm_dlkm properties in "odm_dlkm/etc/build.prop"
Test: make selinux_policy
Bug: 185920634
Change-Id: I09eec15a8a2e2b2f64075f148b414bf89f8ebcd6
2021-05-04 16:06:50 +08:00
Nazanin Bakhshi
bdd847070d Merge "make ril.cdma.inecmmode system property internal so that it cannot reveal a system api that requires READ_PRIVILEGED_PHONE_STATE" into sc-dev 2021-04-30 18:41:21 +00:00
Nazanin
d65a7bf37e make ril.cdma.inecmmode system property internal
so that it cannot reveal a system api that requires
READ_PRIVILEGED_PHONE_STATE

Bug: 183410189
Test: adb shell getprop -Z
Change-Id: I65f4121fc300447af7d516676166bc8b0b53b727
2021-04-30 10:08:01 -07:00
Oleg Matcovschi
102883c1e0 Merge "sepolicy: add ro.product.vendor_dlkm coverage" 2021-04-29 18:32:11 +00:00
Oleg Matcovschi
db8fa96ac6 sepolicy: add ro.product.vendor_dlkm coverage
Bug: 186747827
Signed-off-by: Oleg Matcovschi <omatcovschi@google.com>
Change-Id: I51801feeaf67537e6628cf34b4b7425b075f711b
2021-04-29 08:38:17 -07:00
Nicolas Geoffray
82bf10a79c Merge "Allow boot animation to update boot status." 2021-04-29 07:53:05 +00:00
Nicolas Geoffray
6a311471a6 Allow boot animation to update boot status.
This CL was missed from the topic:
https://android-review.googlesource.com/q/topic:bootanim-percent

Test: update ART module, see animation go to 100%
Bug: 184881321
Change-Id: I59706718af11751a7e1f4b5ab1ff2793f554fb19
2021-04-28 15:17:09 +01:00
Midas Chien
3c24ea1793 Add a sysprop to set display update imminent timeout
Adding 'ro.surface_flinger.display_update_imminent_timeout_ms' to set
timeout for rate limit display update imminent notifications.

Bug: 164411401
Change-Id: I90a00fe7f8df3aa505f08081d096fd83b3342f59
2021-04-27 20:45:29 +08:00
Treehugger Robot
206d6d80a1 Merge "Fix permissions for vold.post_fs_data_done" 2021-04-26 20:36:34 +00:00
Eric Biggers
040ce199b2 Fix permissions for vold.post_fs_data_done
The system property "vold.post_fs_data_done" is used by init and vold to
communicate with each other in order to set up FDE on devices that use
FDE.  It needs to be gettable and settable by vold, and settable by init
and vendor_init.  This was the case in Android 11 and earlier; however,
the change
https://android-review.googlesource.com/c/platform/system/sepolicy/+/1277447
("Rename exported and exported2 vold prop") broke this by giving this
property the type "vold_config_prop", which made it no longer settable
by vold.

Since none of the existing property types appear to be appropriate for
this particular property, define a new type "vold_post_fs_data_prop" and
grant the needed domains permission to get/set it.

This is one of a set of changes that is needed to get FDE working again
so that devices that launched with FDE can be upgraded to Android 12.

Bug: 186165644
Test: Tested FDE on Cuttlefish
Change-Id: I2fd8af0091f8b921ec37381ad3b85a156d074566
2021-04-26 12:43:05 -07:00
Robert Horvath
dbfe4809ba Merge "Add bootanim property context, ro.bootanim.quiescent.enabled property" 2021-04-23 16:45:32 +00:00
Treehugger Robot
e0646ba15b Merge "sepolicy: Give access to ahal to flinger standby prop" 2021-04-22 02:36:46 +00:00
Treehugger Robot
f5ec134342 Merge "Add a property to enable runtime debugfs restrictions in non-user builds" 2021-04-20 06:07:53 +00:00
Treehugger Robot
e2133c2f3a Merge "Add existing ro.hdmi sysprops to sepolicy" 2021-04-19 08:29:45 +00:00
Roman Kiryanov
08f51ea1c0 Mark ro.kernel properties as deprecated
emulator migrated to `ro.boot`

Bug: 182291166
Test: presubmit
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: I9cd443801ff7120ebb628acdc811f0eb339a02c9
2021-04-15 22:46:40 -07:00
Hridya Valsaraju
8403ed70de Add a property to enable runtime debugfs restrictions in non-user builds
This patch adds ro.product.enforce_debugfs_restrictions to
property_contexts. When the property is set to true in non-user builds,
init mounts debugfs in early-init to enable boot-time debugfs
initializations and unmounts it on boot complete. Similarly dumpstate
will mount debugfs to collect information from debugfs during bugreport
collection via the dumpstate HAL and unmount debugfs once done. Doing
so will allow non-user builds to keep debugfs disabled during runtime.

Test: make with/without PRODUCT_SET_DEBUGFS_RESTRICTIONS, adb shell am
bugreport
Bug: 184381659

Change-Id: Ib720523c7f94a4f9ce944d46977a3c01ed829414
2021-04-15 22:38:23 -07:00
Robert Horvath
8504938690 Add bootanim property context, ro.bootanim.quiescent.enabled property
Add property & property context to configure whether the bootanimation
should be played in a quiescent boot.

Bug: 185118020
Test: Set property through PRODUCT_PRODUCT_PROPERTIES
Test: Read property from bootanimation process
Change-Id: Ib9e88444da7f5e8000d7367199f5230f1e4d26d9
2021-04-15 14:56:17 +00:00
Roman Kiryanov
640a58d3c1 Label ro.boot.qemu
This is an Android Studio Emulator (aka ranchu)
specific property, it is used for emulator
specific workarounds.

Bug: 182291166
Test: presubmit
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: I2b8daf7c8ddb05b4082e4229f7b606c6ad4e717e
2021-04-14 23:51:11 -07:00
Marvin Ramin
157957b9ec Add existing ro.hdmi sysprops to sepolicy
Bug: 185198967
Change-Id: I8efaa7b220c7bba34f2431b1a044c21cd6a1e198
Test: make
2021-04-14 13:20:13 +00:00
Emilian Peev
a974640390 Define vendor side property "ro.camerax.extensions.enabled"
Add "ro.camerax.extensions.enabled" vendor-specific property.
Allow public apps to read this property.

Bug: 171572972
Test: Camera CTS
Change-Id: Id5fadedff6baaaebe5306100c2a054e537aa61ed
2021-04-13 16:42:10 -07:00
Treehugger Robot
c73f064573 Merge "Define ro.board.api_level property" 2021-04-08 00:15:06 +00:00
Kalesh Singh
326fc27064 Sepolicy for mm_events
Allow mm_events to periodically arm the mm_events
perfetto trace config if mm_events is enabled.

Bug: 183037386
Test: boot; setprop persist.mm_events.enabled true; No avc denials
Change-Id: Ia9760001e7fb591f18e3e816a63281167a658c74
2021-04-06 22:46:32 -04:00
Justin Yun
02e5045a87 Define ro.board.api_level property
ro.board.api_level shows the current vendor api level under GRF.
It can be manually defined by setting BOARD_API_LEVEL. Unless
BOARD_API_LEVEL is defined, the ro.board.api_level property will be
defined automatically based on BOARD_SHIPPING_API_LEVEL and
PLATFORM_SDK_VERSION.

Bug: 176950752
Test: getprop ro.board.api_level
Change-Id: I03eeec8d8206abdd0565423d1b6a507d86d9b168
2021-04-07 09:02:44 +09:00
Suren Baghdasaryan
c461b3b778 Add lmkd. ro.lmk.thrashing_limit_critical property policies
Add policies to control ro.lmk.thrashing_limit_critical lmkd property.

Bug: 181778155
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I25eeb84e6e073510e2f516fd38b80c67afe26917
2021-04-06 00:40:56 +00:00
Josh Gao
f15793fa09 Merge "Make init.svc.adbd globally readable." 2021-04-05 23:47:56 +00:00
Arun Mirpuri
fa23ae1247 sepolicy: Give access to ahal to flinger standby prop
Allow Vendor Audio HAL to update Audio Flinger standby
idle timeout.

Bug: 181967247
Change-Id: I7ae992bde5fdcf81ce2ca7a5a93e5e70aab1b56c
2021-03-31 09:14:39 -07:00
Lajos Molnar
3720bcced5 Merge "media: add codec2_config_prop" 2021-03-24 05:30:39 +00:00
Lajos Molnar
9b03782d4e media: add codec2_config_prop
This covers properties required by codec2 hal clients/service

Bug: 181380463
Change-Id: I88f87d8693fa49beda0a26c6d0492a12177f108b
2021-03-24 01:17:05 +00:00
Yi Kong
665c18ebc9 Merge "Allow profcollectd to store and read its application specific node ID in properties" 2021-03-23 05:27:56 +00:00
Yi Kong
9b65845b4a Allow profcollectd to store and read its application specific node ID in properties
This node ID will be used to uniquely and anonymously identify a device
by profcollectd on engineering (userdebug or eng) builds.

Test: build
Change-Id: If01f71c62479d63d4d19aac15da24bc835621e66
2021-03-22 19:40:03 +00:00
Weilun Du
aa5611337e [Bug Fix] Add exact string to property qemu.hw.mainkeys
qemu.hw.mainkeys exists both in plat_property_contexts and
vendor_property_contexts. This would cause breakage in GSI build
for certain vendors. To fix, add `exact {type}` to make the property
defined in system takes precedence.

Bug: 180412668

Signed-off-by: Weilun Du <wdu@google.com>
Change-Id: I1268e6a202d561a1e43f3d71fb38c6000042306b
2021-03-22 17:11:31 +00:00
Michael Rosenfeld
133496f8a4 Merge "Permit dropping caches from the shell through sys.drop_caches." 2021-03-22 16:04:32 +00:00
Michael Rosenfeld
3ccbebb415 Permit dropping caches from the shell through sys.drop_caches.
*   Permits setting the sys.drop_caches property from shell.
*   Permits init to read and write to the drop_caches file.
*   Can only be set to 3 (drop_caches) and 0 (unset).

Bug: 178647679
Test: flashed user build and set property; no avc denials.
Test: flashed userdebug build and dropped caches w/o root.
Change-Id: Idcedf83f14f6299fab383f042829d8d548fb4f5d
2021-03-19 10:55:51 -07:00
Janis Danisevskis
b488a8fe1a Keystore 2.0: Remove keystore2.enable property.
Bug: 171563717
Test: N/A
Change-Id: I85819a71dc24777a9d54f0c83b8b29da9f48cec1
2021-03-19 10:07:49 -07:00
Martijn Coenen
0b47552028 Merge "Add odsign status properties." 2021-03-19 10:30:20 +00:00
Treehugger Robot
12f3121d79 Merge "Define ro.board.first_api_level property" 2021-03-19 08:50:36 +00:00
Peter Collingbourne
228c1c396c Merge "Add support for a hw_timeout_multiplier system property." 2021-03-17 18:18:51 +00:00
Justin Yun
0839607a0c Define ro.board.first_api_level property
When a device define BOARD_SHIPPING_API_LEVEL with an API level, it
sets a vendor property ro.board.first_api_level in vendor/build.prop.
This property is initiated by vendor_init and read-only.

Bug: 176950752
Test: getprop ro.board.first_api_level
Change-Id: Ia09d2e80f1ca4a79dbe4eb0dc11b189644819cad
2021-03-17 15:06:44 +09:00
Martijn Coenen
f2e4ee6498 Add odsign status properties.
These properties are used to communicate odsign status, and allow init
to evict keys and start zygote at the correct moments in time.

Bug: 165630556
Test: no denials from init/odsign
Change-Id: I813e5c1c93d6f00a251a9cce02d0b74e5372c1ce
2021-03-16 09:14:29 +01:00
Nikita Ioffe
360e0f91c3 Add apexd_config_prop type
This type is used for properties that provides per-device configuration
for apexd behaviour (so far - timeouts for creating/deleting dm device).

Test: builds
Bug: 182296338
Change-Id: Ib815f081d3ab94aa8c941ac68b57ebe661acedb9
2021-03-15 00:35:38 +00:00
Peter Collingbourne
01e58e0fe3 Add support for a hw_timeout_multiplier system property.
In order to test the platform in emulators that are orders of magnitude
slower than real hardware we need to be able to avoid hitting timeouts
that prevent it from coming up properly. For this purpose introduce
a system property, ro.hw_timeout_multiplier, which may be set to
an integer value that acts as a multiplier for various timeouts on
the system.

Bug: 178231152
Change-Id: I6d7710beed0c4c5b1720e74e7abe3a586778c678
Merged-In: I6d7710beed0c4c5b1720e74e7abe3a586778c678
2021-03-11 14:04:18 -08:00
Lajos Molnar
b92fdbb393 Add media performance class property to sepolicy
Bug: 175813535
Change-Id: Ic47e6b2871e8085808462070d8bd28b16c07839d
2021-03-10 19:41:56 -08:00
Lorenzo Colitti
26d3d4a5a2 Properly set the property_context for net.tcp_init_rwnd.
This property is many years old and it does not have a property
context associated with it. It is set by the system server (in
particular, ConnectivityService code, in the Tethering module)
and read by init, which does:

on property:net.tcp_def_init_rwnd=*
    write /proc/sys/net/ipv4/tcp_default_init_rwnd ${net.tcp_def_init_rwnd}

There is no need to add read access to init because init can read
and write any property.

Test: m
Fix: 170917042
Change-Id: I594b09656a094cd2ef3e4fd9703e46bf7b2edd4c
2021-03-10 20:28:26 +09:00
Lorenzo Colitti
082ebd2107 Add selinux policy for the new net.464xlat.cellular.enabled prop.
This property is written by an .rc file - see aosp/1553819 - and
read by the connectivity mainline code in the system server.

Test: m
Bug: 182333299
Change-Id: Ibac622f6a31c075b64387aadb201ad6cdd618ebd
2021-03-10 15:58:48 +09:00
Martijn Coenen
b01e0a22a5 Merge "Add external_storage.cross_user.enabled property" 2021-03-08 12:46:23 +00:00
Chun-Wei Wang
75e3fa6ead Merge "Add persist.rollback.is_test (6/n)" 2021-03-06 14:33:38 +00:00
Zim
aa1499dd27 Add external_storage.cross_user.enabled property
This allows the FUSE daemon handle FUSE_LOOKUP requests across user boundaries.

Workaround to support some OEMs for their app cloning feature in R

Bug: 162476851
Bug: 172177780
Test: Manual
Change-Id: Ic1408f413ec3dc4917d3acfda2c5f62f9c16f187
2021-03-04 08:41:04 +00:00
JW Wang
0f8cf04965 Add persist.rollback.is_test (6/n)
This property is set to true in rollback tests to prevent
fallback-to-copy when enabling rollbacks by hard linking.

This gives us insights into how hard linking fails where
it shouldn't.

Bug: 168562373
Test: m
Change-Id: Iab22954e9b9da21f0c3c26487cda60b8a1293b47
2021-03-03 10:34:06 +08:00
Paul Crowley
28befc841c Merge "init sets keystore.boot_level, keystore reads" 2021-02-27 05:05:50 +00:00
Paul Crowley
b0c5571da6 init sets keystore.boot_level, keystore reads
Bug: 176450483
Test: init can set, and keystore2 read, keystore.boot_level
Test: `adb shell getprop -Z | grep boot_level` returns
      [keystore.boot_level]: [u:object_r:keystore_listen_prop:s0]
Change-Id: Iedb37db19e9153995800fc97de6ee8c536179caa
2021-02-23 21:08:05 -08:00
Roman Kiryanov
f6afebf934 Move qemu.sf.lcd_density into system/sepolicy
qemu.sf.lcd_density is rerefenced by surfaceflinger
and zygote.

Bug: 178144237
Test: presubmit
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: Iede75d1170aeac9d020d60a3a66a1f69cee46abf
Merged-In: Iede75d1170aeac9d020d60a3a66a1f69cee46abf
2021-02-23 20:15:33 -08:00
Ady Abraham
a476e99e21 Merge "Add a sysprop to control layer caching" 2021-02-19 01:59:48 +00:00
Weilun Du
e76978cef7 Merge "Revert^2 "Add qemu.hw.mainkeys to system property_contexts"" 2021-02-18 21:40:53 +00:00
Ady Abraham
48f3dd6a25 Add a sysprop to control layer caching
Adding 'ro.surface_flinger.enable_layer_caching' to control
whether layer caching feature should be enabled or not.

Bug: 158790260
Change-Id: I3ceb84d2a9209b2c422ba93057e9323ca6816ca5
2021-02-18 19:22:02 +00:00
Tianjie Xu
4bda81af5d Merge "Give ota.other.vbmeta_digest the proper context" 2021-02-18 04:10:37 +00:00
Tianjie
63fd05d579 Give ota.other.vbmeta_digest the proper context
Give it the u:object_r:ota_prop:s0 since the prop is only set
after an update.

Bug: 177625570
Test: boot the device, check the prop is written by update_engine
Change-Id: I4cf21d2a6af2a2083d4a5eba7751011cc6d0c522
2021-02-17 16:33:52 -08:00
Treehugger Robot
ad580990c4 Merge "Add sepolicy swcodec native flag namespace." 2021-02-17 21:30:16 +00:00
Weilun Du
e2a8a145ec Revert^2 "Add qemu.hw.mainkeys to system property_contexts"
509b35e5d9

Bug: 180412668
Merged-In: I4067bba36613fa41e3c7a085da76cda4784753ad
Change-Id: I4067bba36613fa41e3c7a085da76cda4784753ad
2021-02-17 18:29:59 +00:00
Ram Muthiah
523a649401 Merge "Revert "Add qemu.hw.mainkeys to system property_contexts"" 2021-02-16 19:05:10 +00:00
Ram Muthiah
509b35e5d9 Revert "Add qemu.hw.mainkeys to system property_contexts"
Revert submission 1582845-qemu-prop

Reason for revert: aosp_hawk-userdebug is broken on an RVC branch
Reverted Changes:
Idfc2bffa5:Add qemu.hw.mainkeys to system property_contexts
If013ff33f:Remove qemu.hw.mainkeys from vendor_qemu_prop
Bug: 180412668
Change-Id: I335afb931eaeb019f66e3feedea80b0c8888f7a3
2021-02-16 18:58:10 +00:00
Nick Chalko
81a4dd40d6 Add sepolicy swcodec native flag namespace.
Test: add sepolicy, build, check GetServerConfigurableFlag function
Bug: 179286276
Change-Id: Ia16d110900251b3fb3e3959d73524c8814199270
2021-02-16 09:22:16 -08:00
Weilun Du
23bb01756e Merge "Add qemu.hw.mainkeys to system property_contexts" 2021-02-16 16:44:00 +00:00
Galia Peycheva
201414cff6 Add blur sysprop to sepolicy
Bug: 170378891
Test: m
Change-Id: I6876e3bfe9dfdf066bfa54334555fdab5b3598d5
2021-02-11 17:32:30 +00:00
Weilun Du
180a277d67 Add qemu.hw.mainkeys to system property_contexts
Bug: 178143857

Signed-off-by: Weilun Du <wdu@google.com>
Change-Id: Idfc2bffa52016d1e880974bb193025400e90a538
2021-02-11 04:18:54 +00:00
Treehugger Robot
0137685e55 Merge "Keystore 2.0: Rename Keystore 2.0 enable property." 2021-02-08 20:04:38 +00:00
Janis Danisevskis
54dd67128f Keystore 2.0: Rename Keystore 2.0 enable property.
Test: N/A
Bug: 160623310
Change-Id: Ic15db9c913c777665340c4132bc9d21daff0522d
2021-02-05 12:22:36 -08:00
Xiao Ma
2d6c9f0fe8 Allow connectivity namespace to enable native level access flags.
Follow the steps: go/android-native-flag-api-manual

Bug: 179099277
Test: m -j
Test: manually verify connection to wifi after flash
Change-Id: Ieb5355d40aec9ed7a42b7ae5b250b696fcf00810
2021-02-04 05:31:33 +00:00
Oliver Woodman
bc41c14ffd Merge "Define SOC sysprop policy" 2021-01-28 09:12:52 +00:00
Tianjie Xu
ca2775667a Merge "Set context for hash algorithm properties." 2021-01-28 03:03:21 +00:00
Oliver Woodman
164ba2bd39 Define SOC sysprop policy
BUG: 158284209
Test: atest android.os.cts.BuildTest
Change-Id: I7df7e575072c37ca379b97f60cc6c0850a02bcd1
2021-01-27 13:49:00 +00:00
Tianjie
c3752cf5dd Set context for hash algorithm properties.
Also move verity_status_prop to system_restricted_prop since we
need to query it in cts tests

Bug: 175236047
Test: atest CtsNativeVerifiedBootTestCases
Change-Id: I82b26edaf5c5ad233bd83dff77eaafb9174646ef
2021-01-20 19:06:47 -08:00
Roman Kiryanov
8fff579ad5 Add the service.adb.transport property
adbd reads this property.

Bug: 176210699
Test: boot the system image, check if adb works
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: I78847022413100331678b68a720aa1f1c8a31130
2021-01-20 14:47:14 -08:00
Inseob Kim
e0ebc571bd Add ro.zygote.disable_gl_preload to policy
It's used by ZygoteInit, and vendor_init should be able to set it.

Bug: 176210699
Test: boot
Change-Id: I27bb59c145f3257281fb8d6007be60eb2bcc93ca
2021-01-18 02:11:57 +00:00
Maciej Żenczykowski
ce0fbd4218 Revert "property_contexts: Add ro.kernel.ebpf.supported"
This reverts commit 0ee31c1aab.

As of Android S devices are required to support ebpf.

Test: builds, atest, TreeHugger
Bug: 167500195
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: If8dedb4671f7ab8d0f056fddf8e6c5158ad99334
2021-01-15 02:58:35 +00:00
Mitch Phillips
e0bab54ba6 Merge "[MTE] Add memtag sysprop sepolicy." 2021-01-13 18:07:36 +00:00
Alan Stokes
0fff6e504c Merge "Remove ro.vold.level_from_user." 2021-01-12 11:17:50 +00:00
Mitch Phillips
eaf1404d8a [MTE] Add memtag sysprop sepolicy.
These flags should be writeable to the shell for both root and non-root
users. They should be readable everywhere, as they're read in libc
during initialization (and there's nothing secret to hide). We just
don't want to allow apps to set these properties.

These properties are non-persistent, are for local developer debugging
only.

Bug: 135772972
Bug: 172365548
Test: `adb shell setprop memtag.123 0` in non-root shell succeeds.
Change-Id: If9ad7123829b0be27c29050f10081d2aecdef670
2021-01-11 08:35:58 -08:00
Ady Abraham
41e369e70f Add a sysprop to control frame rate override
Adding 'ro.surface_flinger.enable_frame_rate_override' to control
whether frame rate override feature should be enabled or not.

Bug: 170502573
Bug: 176940141
Change-Id: Ida0e13f9a7c420f5f363d1feeacf882d8b76a8fa
Test: atest FrameRateOverrideHostTest
2021-01-09 02:33:48 +00:00
Alan Stokes
c8f0e804c1 Remove ro.vold.level_from_user.
This is on everywhere, we no longer have any need for it.

Fix: 171462631
Test: Presubmits
Change-Id: Iaccda19ca7dd1d4f201208ea812a73bb2eed1e74
2021-01-05 09:49:11 +00:00
Nicolas Geoffray
7c8073e175 Add boot animation progress system property.
Test: m
Bug: 175686819
Change-Id: I52bcd0b9f94d91e963620278042ba076215143db
2020-12-15 18:36:18 +00:00
Inseob Kim
d3dbcc1b82 Fix malformed property_contexts entry
Prefix entries should not have the suffix '*'.

Test: set property and invoke getprop -Z
Change-Id: I33dc7c6ac1bc05ecc1e3a7b331bc827717afa252
2020-12-14 13:24:14 +00:00
Treehugger Robot
c0d1040d58 Merge "Export ro.vendor.product.cpu.abilist*" 2020-12-10 09:01:40 +00:00
Chris Wailes
4540efcf73 Added permissions for new dexopt flags.
Bug: 173137187
Test: build
Merged-In: Iad1d23277915e1dbf655b0f2820320f15462ab33
Change-Id: Iad1d23277915e1dbf655b0f2820320f15462ab33
2020-12-07 16:15:24 -08:00
SzuWei Lin
4293743c23 Export ro.vendor.product.cpu.abilist*
Bug: 173452246
Test: Read these properties from system_server
Change-Id: I26b8bbe153d55a2761ecc304a490a03a27156667
2020-11-26 17:37:30 +08:00