Commit graph

20876 commits

Author SHA1 Message Date
Tao Bao
1520895967 Merge "Add persist.sys.theme." into qt-dev
am: 890dba4999

Change-Id: Ia747bf55b5275a8b05a3dbb971c82747b4292807
2019-06-18 20:25:32 -07:00
Tao Bao
890dba4999 Merge "Add persist.sys.theme." into qt-dev 2019-06-19 00:36:03 +00:00
Nicolas Geoffray
2cb1a28193 Merge "Allow zygote to create fds and map executable." am: 3a9a6f51c1
am: db0279bf5c

Change-Id: Ie238fa5903393a9ac842fee381d8f0e8bf1cf5bb
2019-06-18 00:15:43 -07:00
Nicolas Geoffray
db0279bf5c Merge "Allow zygote to create fds and map executable."
am: 3a9a6f51c1

Change-Id: I26fbc628077486aa10b06fdd677895a637c15aec
2019-06-18 00:07:42 -07:00
Nicolas Geoffray
3a9a6f51c1 Merge "Allow zygote to create fds and map executable." 2019-06-18 06:51:39 +00:00
Hridya Valsaraju
c93ce14b80 Merge "Add permission required by libdm_test" am: c25272db17
am: e286e6a99c

Change-Id: I79aac351040749eddb4aabaabee4c6f7324ab35e
2019-06-17 21:37:38 -07:00
Hridya Valsaraju
e286e6a99c Merge "Add permission required by libdm_test"
am: c25272db17

Change-Id: Ie340c09b834d3cf5bd902d725aefe80a993abb42
2019-06-17 21:25:35 -07:00
Hridya Valsaraju
351f85a4ee Add permission required by libdm_test
am: 9bb71537ac

Change-Id: I18326abc7713f95ee027e476a96ce32905a9525f
2019-06-17 21:15:34 -07:00
Treehugger Robot
c25272db17 Merge "Add permission required by libdm_test" 2019-06-18 03:49:24 +00:00
Hridya Valsaraju
faa29331cd Add permission required by libdm_test
This CL fixes the following denials during libdm_test
that is part of VTS.

avc: denied { read } for comm="loop1" path=2F6D656D66643A66696C655F32202864656C6574656429
dev="tmpfs" ino=97742 scontext=u:r:kernel:s0 tcontext=u:object_r:appdomain_tmpfs:s0
tclass=file permissive=0
W loop1   : type=1400 audit(0.0:371): avc: denied { read } for
path=2F6D656D66643A66696C655F32202864656C6574656429 dev="tmpfs" ino=97742 scontext=u:r:kernel:s0
tcontext=u:object_r:appdomain_tmpfs:s0 tclass=file permissive=0

Bug: 135004816
Test: adb shell libdm_test
Change-Id: Ifb6d58ee6f032cdf3952a05667aa8696d6e2a2fa
Merged-Id: Ifb6d58ee6f032cdf3952a05667aa8696d6e2a2fa
2019-06-18 03:47:58 +00:00
Hridya Valsaraju
9bb71537ac Add permission required by libdm_test
This CL fixes the following denials during libdm_test
that is part of VTS.

avc: denied { read } for comm="loop1" path=2F6D656D66643A66696C655F32202864656C6574656429
dev="tmpfs" ino=97742 scontext=u:r:kernel:s0 tcontext=u:object_r:appdomain_tmpfs:s0
tclass=file permissive=0
W loop1   : type=1400 audit(0.0:371): avc: denied { read } for
path=2F6D656D66643A66696C655F32202864656C6574656429 dev="tmpfs" ino=97742 scontext=u:r:kernel:s0
tcontext=u:object_r:appdomain_tmpfs:s0 tclass=file permissive=0

Bug: 135004816
Test: adb shell libdm_test
Change-Id: Ifb6d58ee6f032cdf3952a05667aa8696d6e2a2fa
2019-06-17 22:46:03 +00:00
Matthias Kramm
cf010dcb85 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." am: 9faeec71f2
am: c58cd73209

Change-Id: I102966877e40ec5c56033feb510e519c033aa407
2019-06-17 12:48:25 -07:00
Matthias Kramm
c58cd73209 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*."
am: 9faeec71f2

Change-Id: I34adc91ee393b35360135df318c4fc4054b918a8
2019-06-17 12:39:29 -07:00
Matthias Kramm
9faeec71f2 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." 2019-06-17 19:31:50 +00:00
Nicolas Geoffray
f77e8c1b0c Allow zygote to create fds and map executable.
This is so that zygote can create the JIT cache with memfd_create
(or ashmem when memfd is not available).

Test: boot
Bug: 119800099
Change-Id: I88f1f6b1c930a8d22985b306a238f60b4af59f9c
2019-06-17 20:18:23 +01:00
Valerie Hau
5162b0c3d0 Add IMapper2.1 same process hal permissions am: d3499df3cf
am: 178ef8ccad

Change-Id: Ifaef339d29e8f0547cc5c3eb4992b14f1c7a81f3
2019-06-17 11:42:02 -07:00
Valerie Hau
178ef8ccad Add IMapper2.1 same process hal permissions
am: d3499df3cf

Change-Id: Ie66ef51b970b0bee118fc9995a817895ca1aa805
2019-06-17 11:33:59 -07:00
Tao Bao
75182a1ea6 Add persist.sys.theme.
This property will be set by system_server (to indicate the currently
selected theme for device), and can be accessed by vendor init.rc.

avc:  denied  { read } for property=persist.sys.theme pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:theme_prop:s0 tclass=file

Bug: 113028175
Test: Set a vendor init trigger that waits on `persist.sys.theme`. Check
      that the trigger fires without denial.
Change-Id: Ibb4e392d5059b76059f36f7d11ba82cd65cbe970
2019-06-17 10:48:21 -07:00
Jeff Vander Stoep
b4ad398ca9 Merge "system_server_startup: allow SIGCHLD to zygote" into qt-dev
am: 6dc831d2fb

Change-Id: I1f83d7940955d3c20bc025f106cd9580a5811d7f
2019-06-15 17:45:03 -07:00
TreeHugger Robot
6dc831d2fb Merge "system_server_startup: allow SIGCHLD to zygote" into qt-dev 2019-06-16 00:29:00 +00:00
Jeff Vander Stoep
e0d9e50c96 system_server_startup: allow SIGCHLD to zygote
avc: denied { sigchld } for comm="main"
scontext=u:r:system_server_startup:s0 tcontext=u:r:zygote:s0
tclass=process permissive=0

Test: build
Bug: 134496658
Change-Id: I98c106b17ba1740f953c3108bd0fc927c150096f
(cherry picked from commit 67dc274f87)
2019-06-14 16:56:05 -07:00
Valerie Hau
d3499df3cf Add IMapper2.1 same process hal permissions
Bug: 135166668
Test: build, boot, VtsHalGraphicsComposerV2_2TargetTest
Change-Id: Iedc11b73d3e3ba54dcd622b128cb513adec11d69
2019-06-14 12:31:17 -07:00
Pirama Arumuga Nainar
da437c3a8f Merge "In native coverage builds, allow all domains to access /data/misc/trace" am: 1eb45b5606
am: f6a95d82d8

Change-Id: Iac5840a4b2a5edf394954dff0a14e307fed28778
2019-06-14 12:05:15 -07:00
Pirama Arumuga Nainar
f6a95d82d8 Merge "In native coverage builds, allow all domains to access /data/misc/trace"
am: 1eb45b5606

Change-Id: Ic70c7f2ccfe1d2c969f8807bbdf7bdf3134fa8b7
2019-06-14 11:56:59 -07:00
Treehugger Robot
1eb45b5606 Merge "In native coverage builds, allow all domains to access /data/misc/trace" 2019-06-14 18:35:25 +00:00
Rick Yiu
358a4bb66d Merge "Add macro for dumping hal debug info" am: f1f2b514fe
am: 2446e21855

Change-Id: I3c308ede14b5c033cafd78c3202e1275d59a748d
2019-06-14 08:57:20 -07:00
Rick Yiu
2446e21855 Merge "Add macro for dumping hal debug info"
am: f1f2b514fe

Change-Id: I482156c2a004422a7e5c50674525cf9ad79aa1ba
2019-06-14 08:49:21 -07:00
Treehugger Robot
f1f2b514fe Merge "Add macro for dumping hal debug info" 2019-06-14 15:38:24 +00:00
Rick Yiu
1a94b30d9a Add macro for dumping hal debug info
Hal debug info could be dumped in user build by using this macro.

Bug: 134545528
Test: build pass
Change-Id: I650d69607c75b73e95efb3647de5dd03b86cb143
2019-06-14 15:37:59 +00:00
Pirama Arumuga Nainar
ce9c0c5a5f In native coverage builds, allow all domains to access /data/misc/trace
Bug: http://b/135139675

Coverage files are written to /data/misc/trace (governed by the
method_trace_data_file selinux type).  Allow all domains to access
(create directories, access files) this directory when native coverage
is enabled (by setting NATIVE_COVERAGE to true) in an userdebug or eng
build.

Also relax neverallow constraints to allow access to
method_trace_data_file for native coverage builds.

Test: Build 32-bit cuttlefish with coverage:
          m NATIVE_COVERAGE=true COVERAGE_PATHS="*"
      and verify that there are no selinux denials in kernel log and
      logcat.

Change-Id: I3fe7c77612854b9de7de7a0ddd5cbf44a2f5c21e
2019-06-14 08:31:51 -07:00
Matthias Kramm
3a44b17897 Allow hal_face to write to /data/vendor/camera_calibration/*.
Also, allow hal_camera to read from there.

Bug: 133792720
Change-Id: Iedec8d7325b4424d166f8e4d09182e1f29808ef2
Test: Running presubmit.
2019-06-14 05:53:59 -07:00
Jiyong Park
fa9e9176f8 Merge "Allow apexd to stop itself" am: 7436dba4c4
am: 6b9060cf15

Change-Id: Id9302af08aec77b69ca7a2c889c7c45e4428a439
2019-06-13 23:50:06 -07:00
Jiyong Park
6b9060cf15 Merge "Allow apexd to stop itself"
am: 7436dba4c4

Change-Id: I25b636bdf4f45252da8152016334731ad1198090
2019-06-13 23:42:22 -07:00
Treehugger Robot
7436dba4c4 Merge "Allow apexd to stop itself" 2019-06-14 06:30:05 +00:00
Ryan Savitski
83e291ca3e [automerger skipped] userdebug: support perfetto traces as a section in incident reports
am: 72f247f5ff -s ours
am skip reason: change_id I2aa27e25f0209b3a5cdf5d550d0312693932b808 with SHA1 ce3a33ff18 is in history

Change-Id: Ie4d41a9f751fd01a8539eb944f8fed0e223a8a0f
2019-06-13 16:51:15 -07:00
Tri Vo
73ce5b8e02 Merge "sepolicy: fix 28.0.ignore.cil build" am: 0d5455a111
am: 01c235c93c

Change-Id: I1cacfb23f7bb1d7ac9f6a1450785b3c9e4dc9e96
2019-06-13 14:01:05 -07:00
Tri Vo
01c235c93c Merge "sepolicy: fix 28.0.ignore.cil build"
am: 0d5455a111

Change-Id: Ic344c1618a1c7fc929ce6d06cd43661040b4729a
2019-06-13 13:54:50 -07:00
Tri Vo
0d5455a111 Merge "sepolicy: fix 28.0.ignore.cil build" 2019-06-13 20:25:41 +00:00
Neil Fuller
789eb70d89 Merge "Track removal of tz data files from runtime module" am: a83de7b4ac
am: 6b103ab141

Change-Id: I39b61d8db3186889433d61f0e0e2759fcc675cba
2019-06-13 07:32:53 -07:00
Neil Fuller
6b103ab141 Merge "Track removal of tz data files from runtime module"
am: a83de7b4ac

Change-Id: I2b24116607b58612bfce58c5db60f853dee40e50
2019-06-13 07:25:50 -07:00
Neil Fuller
a83de7b4ac Merge "Track removal of tz data files from runtime module" 2019-06-13 14:13:19 +00:00
Jiyong Park
6e823dd597 Allow apexd to stop itself
apexd stops itself when it finds that it is running on a device with
flattened APEXes (i.e. ro.apex.updatable = false).

Bug: 133907211
Test: launch sdk_phone_x86_64
adb logcat -d | grep apexd | wc -l
returns 3

Change-Id: I7fa161b069aa34adb028194b55f367fe740a0cfc
2019-06-13 09:45:05 +09:00
Tri Vo
e381deb759 sepolicy: fix 28.0.ignore.cil build
29.0.ignore.cil/29.0.cil should be expanded into
28.0.ignore.cil/28.0.cil, so that there is no need to duplicate changes
in both places.

Test: adding a type to 29.0.ignore.cil/29.0.cil only doesn't trigger a
build error.
Change-Id: I543c0fc5e3749211e5bede81aabb0b520435a510
2019-06-12 15:56:05 -07:00
David Anderson
45e8c91045 Merge "Allow gsid to read dm nodes from sysfs." am: 4afae94836
am: 0524b03d8d

Change-Id: If235259b37b61532ba281da7585433cb1fd6c735
2019-06-12 14:34:30 -07:00
David Anderson
0524b03d8d Merge "Allow gsid to read dm nodes from sysfs."
am: 4afae94836

Change-Id: If61d1504843a0ea09372830801dde9f6706934f8
2019-06-12 14:27:24 -07:00
David Anderson
4afae94836 Merge "Allow gsid to read dm nodes from sysfs." 2019-06-12 21:09:59 +00:00
Dan Willemsen
754da1e102 Merge "Sync all_plat_keys to keys.conf" am: 63521329b4
am: 6d30472751

Change-Id: I5b6b6d61b9bfdcfe24790d752da75708ac2ec935
2019-06-10 18:17:53 -07:00
Dan Willemsen
6d30472751 Merge "Sync all_plat_keys to keys.conf"
am: 63521329b4

Change-Id: Icc533bd92b030e26e0a9e76b296d81c47eb64f63
2019-06-10 18:08:22 -07:00
Treehugger Robot
63521329b4 Merge "Sync all_plat_keys to keys.conf" 2019-06-10 23:28:53 +00:00
Dan Willemsen
3afe235071 Sync all_plat_keys to keys.conf
Since this rule does read the networkstack key.

Bug: 130111713
Test: treehugger
Test: run this on RBE, which only exposes the source files depended upon
Change-Id: Ib4c7e0680158e7892c062f00fe64c2da4195da2b
2019-06-10 20:09:14 +00:00