Commit graph

20883 commits

Author SHA1 Message Date
David Anderson
45e8c91045 Merge "Allow gsid to read dm nodes from sysfs." am: 4afae94836
am: 0524b03d8d

Change-Id: If235259b37b61532ba281da7585433cb1fd6c735
2019-06-12 14:34:30 -07:00
David Anderson
0524b03d8d Merge "Allow gsid to read dm nodes from sysfs."
am: 4afae94836

Change-Id: If61d1504843a0ea09372830801dde9f6706934f8
2019-06-12 14:27:24 -07:00
David Anderson
4afae94836 Merge "Allow gsid to read dm nodes from sysfs." 2019-06-12 21:09:59 +00:00
Dan Willemsen
754da1e102 Merge "Sync all_plat_keys to keys.conf" am: 63521329b4
am: 6d30472751

Change-Id: I5b6b6d61b9bfdcfe24790d752da75708ac2ec935
2019-06-10 18:17:53 -07:00
Dan Willemsen
6d30472751 Merge "Sync all_plat_keys to keys.conf"
am: 63521329b4

Change-Id: Icc533bd92b030e26e0a9e76b296d81c47eb64f63
2019-06-10 18:08:22 -07:00
Treehugger Robot
63521329b4 Merge "Sync all_plat_keys to keys.conf" 2019-06-10 23:28:53 +00:00
Dan Willemsen
3afe235071 Sync all_plat_keys to keys.conf
Since this rule does read the networkstack key.

Bug: 130111713
Test: treehugger
Test: run this on RBE, which only exposes the source files depended upon
Change-Id: Ib4c7e0680158e7892c062f00fe64c2da4195da2b
2019-06-10 20:09:14 +00:00
Joel Galenson
d181604ce1 Merge "Give hal_drm_server appdomain fd access." am: 7d258073df
am: 2c465fa2bb

Change-Id: I89eff6ce6cb82ad2a65c79a3c4e934b9a6ea81b6
2019-06-10 11:43:41 -07:00
Joel Galenson
2c465fa2bb Merge "Give hal_drm_server appdomain fd access."
am: 7d258073df

Change-Id: I82895792df44e2b3a1bfee6820cb05667a8f4a8c
2019-06-10 11:38:53 -07:00
Treehugger Robot
7d258073df Merge "Give hal_drm_server appdomain fd access." 2019-06-10 18:20:47 +00:00
Neil Fuller
073271071a Track removal of tz data files from runtime module
Track the removal of time zone data files from the runtime mainline module.

Bug: 132168458
Test: build / boot only
Change-Id: I67e596e4da2b23726c36866ff1648a833d2853c7
2019-06-10 15:39:19 +01:00
Tri Vo
8500aa74eb Merge "Use BOARD_VENDOR_SEPOLICY_DIRS instead of BOARD_SEPOLICY_DIRS" am: 48d81b1c9e
am: 47dc6bc87d

Change-Id: I9adf001c85f5570d56b3c2dcde29d4ea3c137335
2019-06-09 09:51:29 -07:00
Tri Vo
47dc6bc87d Merge "Use BOARD_VENDOR_SEPOLICY_DIRS instead of BOARD_SEPOLICY_DIRS"
am: 48d81b1c9e

Change-Id: I442397e058a4034756c1978111dfd8234234e5ae
2019-06-09 09:46:27 -07:00
Treehugger Robot
48d81b1c9e Merge "Use BOARD_VENDOR_SEPOLICY_DIRS instead of BOARD_SEPOLICY_DIRS" 2019-06-09 16:33:55 +00:00
Kalesh Singh
f2f848690c Merge "Add core domain attribute to perfprofd for all targets" am: ab1e359761
am: 4890ad499d

Change-Id: I6678dd975ed32464e37e544e401e4806ab055d74
2019-06-07 23:26:30 -07:00
Kalesh Singh
deb8024fd0 Merge "Sepolicy for vendor hals to access IAshmem" am: 06984017b7
am: 3b3bc95112

Change-Id: Icf6c0569d988f09d3edca1d1d8ed030099ddbc61
2019-06-07 23:26:26 -07:00
Kalesh Singh
4890ad499d Merge "Add core domain attribute to perfprofd for all targets"
am: ab1e359761

Change-Id: Iea1e8444ee56df958268f602a5117d51270e0bb5
2019-06-07 23:21:28 -07:00
Kalesh Singh
3b3bc95112 Merge "Sepolicy for vendor hals to access IAshmem"
am: 06984017b7

Change-Id: I0ad0f27bb7eb0de48899d3ca6ae6682a2b5f6d74
2019-06-07 23:21:25 -07:00
Treehugger Robot
ab1e359761 Merge "Add core domain attribute to perfprofd for all targets" 2019-06-08 06:06:17 +00:00
Treehugger Robot
06984017b7 Merge "Sepolicy for vendor hals to access IAshmem" 2019-06-08 06:06:17 +00:00
Tri Vo
c7b6667921 Merge "README: Use BOARD_VENDOR_SEPOLICY_DIRS" am: 3b0ce13eef
am: 39127fffc5

Change-Id: I0c19cf78a31db843c344b880b6a054a5c5500695
2019-06-07 16:51:17 -07:00
Tri Vo
39127fffc5 Merge "README: Use BOARD_VENDOR_SEPOLICY_DIRS"
am: 3b0ce13eef

Change-Id: I921d2cfa76429545b69bf005bdfb0df2c3545763
2019-06-07 16:46:16 -07:00
Tri Vo
3b0ce13eef Merge "README: Use BOARD_VENDOR_SEPOLICY_DIRS" 2019-06-07 23:35:18 +00:00
Kalesh Singh
55181e7f9b Sepolicy for vendor hals to access IAshmem
Although this may appear very permissive, it ok since the current allow
rule already gives every domain access to /dev/ashmem.

Change-Id: I1f121a3c6a911819b2c3e0605a0544a039cb5503
Bug: 134161662
Test: Check logcat for Sepolicy denials (logcat -d | grep shmem)
2019-06-07 15:50:44 -07:00
David Anderson
95fbedd1b0 Allow gsid to read dm nodes from sysfs.
This is needed now that libfiemap_writer reads from dm/name to find
device-mapper names.

Bug: 134536978
Test: gsi_tool install
Change-Id: I10e1234f2ea39c92b43ace97fa76878358dfc476
2019-06-07 14:59:00 -07:00
Ryan Savitski
72f247f5ff userdebug: support perfetto traces as a section in incident reports
This set of patches adds a way for the perfetto command line client to
save a trace to a hardcoded location,
/data/misc/perfetto-traces/incident-trace, and call into incidentd to
start a report, which will include said trace in a new section.

This is not a long-term solution, and is structured to minimize changes
to perfetto and incidentd. The latter is currently architected in a way
where it can only pull pre-defined information out of the system, so
we're resorting to persisting the intermediate results in a hardcoded
location.

This will introduce at most two more linked files at the same time.

Bug: 130543265
Bug: 134706389
Tested: manually on crosshatch-userdebug
Merged-In: I2aa27e25f0209b3a5cdf5d550d0312693932b808
Change-Id: I2aa27e25f0209b3a5cdf5d550d0312693932b808
(cherry picked from commit ce3a33ff18)
2019-06-07 16:59:49 +01:00
Ryan Savitski
b09be7d3a8 userdebug: support perfetto traces as a section in incident reports am: ce3a33ff18
am: 25d6ad4a41

Change-Id: I1eec93260bc224f1156ad4d4329df7f818568494
2019-06-07 08:30:21 -07:00
Ryan Savitski
25d6ad4a41 userdebug: support perfetto traces as a section in incident reports
am: ce3a33ff18

Change-Id: I7d1513b600d662733dd0c852920550b3925d3ebb
2019-06-07 08:23:57 -07:00
Felix
ec3ac470a9 README: Use BOARD_VENDOR_SEPOLICY_DIRS
BOARD_SEPOLICY_DIRS is deprecated and references should be updated.

Signed-off-by: Felix <google@ix5.org>
Change-Id: I063940a63256a881206740e8a7ecae215f3a5ca8
2019-06-07 09:23:00 +02:00
Tri Vo
fd3c3e2b2d Use BOARD_VENDOR_SEPOLICY_DIRS instead of BOARD_SEPOLICY_DIRS
bug_map is not picked up correctly when BOARD_VENDOR_SEPOLICY_DIRS is
used. And BOARD_SEPOLICY_DIRS is deprecated.

Test: m selinux_policy
Change-Id: I1dcc6ac6f7b6d0f41f29d5894bef81f3fbf841e6
2019-06-06 17:10:15 -07:00
Ryan Savitski
ce3a33ff18 userdebug: support perfetto traces as a section in incident reports
This set of patches adds a way for the perfetto command line client to
save a trace to a hardcoded location,
/data/misc/perfetto-traces/incident-trace, and call into incidentd to
start a report, which will include said trace in a new section.

This is not a long-term solution, and is structured to minimize changes
to perfetto and incidentd. The latter is currently architected in a way
where it can only pull pre-defined information out of the system, so
we're resorting to persisting the intermediate results in a hardcoded
location.

This will introduce at most two more linked files at the same time.

Bug: 130543265
Bug: 134706389
Tested: manually on blueline-userdebug
Change-Id: I2aa27e25f0209b3a5cdf5d550d0312693932b808
2019-06-07 01:00:53 +01:00
Kalesh Singh
1fc57087b4 Add core domain attribute to perfprofd for all targets
We want "vendor domain" which is referred to as { domain -coredomain
-appdomain }, to behave the same on user vs userdebug builds.

Bug: 134161662
Test: m selinux_policy / Check logcat for denials
Change-Id: If6757c820ed657ba2b70263bb546a456adcc7cff
2019-06-06 20:57:28 +00:00
Joel Galenson
0608ab5f9d Give hal_drm_server appdomain fd access.
Test: Build.
Change-Id: I29f68964f4ae2ad2c3a00c96f57f48448d8b6dfb
2019-06-05 10:12:28 -07:00
Luke Huang
ec338079f8 Merge "Clean sepolicy of unused netd_socket" am: 848075e330
am: f015b8fc08

Change-Id: Ib8c49501831dfc1087b6cd42d6c4538ffd779ded
2019-06-02 23:55:06 -07:00
Luke Huang
f015b8fc08 Merge "Clean sepolicy of unused netd_socket"
am: 848075e330

Change-Id: Iaa22ab4d8c42c0bcae2907626ae397c03b050f27
2019-06-02 23:49:03 -07:00
Luke Huang
848075e330 Merge "Clean sepolicy of unused netd_socket" 2019-06-03 06:39:15 +00:00
Tri Vo
6cbe828e13 Reland "Add 29.0 mapping files" am: 50aa029f4b
am: 5d1701a3ee

Change-Id: Ibdfcb99c0a49eca4107ea19e06e480d9a893a34a
2019-06-02 18:14:46 -07:00
Tri Vo
53fcfa94a3 [automerger skipped] Reland "Fake 29.0 sepolicy prebuilts" am: 336d0fed4e
am: 74c4220074 -s ours
am skip reason: change_id I3e091652fa8d1757b1f71f7559186d5b32f000d5 with SHA1 94b7372534 is in history

Change-Id: I88136b522be57d54dd3b198f30efde621efb6822
2019-06-02 18:14:41 -07:00
Tri Vo
5d1701a3ee Reland "Add 29.0 mapping files"
am: 50aa029f4b

Change-Id: I6ea1cc54d313ecdb393c7a7f867d2527b35d42cd
2019-06-02 18:09:43 -07:00
Tri Vo
74c4220074 Reland "Fake 29.0 sepolicy prebuilts"
am: 336d0fed4e

Change-Id: I634c299ebc0910cb7a3aee72738369076ca5691c
2019-06-02 18:09:39 -07:00
Tri Vo
50aa029f4b Reland "Add 29.0 mapping files"
Steps taken to produce the mapping files:

1. Add prebuilts/api/29.0/[plat_pub_versioned.cil|vendor_sepolicy.cil]
plat_pub_versioned.cil contains all public attributes and types from Q
Leave vendor_sepolicy.cil is empty.

2. Add new file private/compat/29.0/29.0.cil by doing the following:
- copy /system/etc/selinux/mapping/29.0.cil from pi-dev aosp_arm64-eng
device to private/compat/29.0/29.0.cil
- remove all attribute declaration statement (typeattribute ...) and
sort lines alphabetically
- some selinux types were added/renamed/deleted w.r.t 29 sepolicy.
Find all such types using treble_sepolicy_tests_29.0 test.
- for all these types figure out where to map them by looking at
28.0.[ignore.]cil files and add approprite entries to 29.0.[ignore.]cil.

This change also enables treble_sepolicy_tests_29.0 and installs
29.0.cil mapping file onto the device.

Bug: 133155528
Bug: 133196056
Test: m treble_sepolicy_tests_29.0
Test: m 29.0_compat_test
Test: m selinux_policy
Change-Id: I9e83e9bf118c8b8f8fcf84d5c0dcb6eb588e0d55
2019-06-01 17:20:34 -07:00
Tri Vo
336d0fed4e Reland "Fake 29.0 sepolicy prebuilts"
I took current AOSP policy as base, then removed sepolicy so that the
set of type and attributes was a subset of types and attributes in Q
sepolicy, with exception of those that have not yet been cleand up in
current AOSP:

mediaswcodec_server
netd_socket
mediaextractor_update_service
thermalserviced
thermalserviced_exec

Bug: 133196056
Test: n/a
Change-Id: I863429d61d3fad0272c1d3f1e429cd997513a74a
Merged-In: I3e091652fa8d1757b1f71f7559186d5b32f000d5
2019-06-01 17:20:18 -07:00
Anders Fridlund
84f48f5493 Merge "Set context for files in the com.android.bootanimation apex" am: 7b54926292
am: d90d539fbd

Change-Id: If055c247c0b784b10acbb39769a27f542eb34c2e
2019-05-30 04:20:21 -07:00
Anders Fridlund
d90d539fbd Merge "Set context for files in the com.android.bootanimation apex"
am: 7b54926292

Change-Id: I6a8a336fe7632d1af9d8ea125de40ccc34ecf07b
2019-05-30 04:15:19 -07:00
Treehugger Robot
7b54926292 Merge "Set context for files in the com.android.bootanimation apex" 2019-05-30 11:10:09 +00:00
Luke Huang
3a97f5ae8c Clean sepolicy of unused netd_socket
Bug: 65862741
Test: built, flashed, booted
Change-Id: I25578e54f8c222d381c8f8ea0ec143b5b503b6a6
Merged-In: I726aadd54b04df68cff992b70443c0335ca50972
2019-05-30 17:41:16 +08:00
Kalesh Singh
533363bb54 Merge "Sepolicy for IAshmem HIDL interface" am: b374835ffb
am: 99a5e65385

Change-Id: I15778c78f997acdc3422ea941301f0ea61dabff4
2019-05-30 00:52:03 -07:00
Kalesh Singh
99a5e65385 Merge "Sepolicy for IAshmem HIDL interface"
am: b374835ffb

Change-Id: I7cfad6fdfc003b476a1de2abde21b7b80af0325e
2019-05-30 00:47:29 -07:00
Treehugger Robot
b374835ffb Merge "Sepolicy for IAshmem HIDL interface" 2019-05-30 07:36:41 +00:00
Jooyung Han
6eeaaa4394 Merge "Test files on intermediates dir, not on /system" am: 0ae642542a
am: 6b9eae8622

Change-Id: I5ab27a3ebbe9927b53c72992a94a70f8cd62657b
2019-05-29 18:07:04 -07:00