Commit graph

23881 commits

Author SHA1 Message Date
Ashwini Oruganti
77f66ce1e8 Fix typo: s/com.google.android.gfs/com.google.android.gsf am: efc3bdb255
Change-Id: I4e8eecac55ec0ca13781d134e90573f3de9a76b6
2020-04-22 19:23:03 +00:00
Ashwini Oruganti
efc3bdb255 Fix typo: s/com.google.android.gfs/com.google.android.gsf
Bug: 154597032
Test: TH
Change-Id: Ia8de313a9573649c456568abb3a8190dc2960bc3
2020-04-22 10:22:45 -07:00
Inseob Kim
9815e0250c Merge "Rename exported_dalvik_prop to dalvik_config_prop" am: 0476c0a680
Change-Id: I3ef86ec33e95bffbc5fbeac0c83b6fba8b4f736b
2020-04-22 01:18:38 +00:00
Inseob Kim
0476c0a680 Merge "Rename exported_dalvik_prop to dalvik_config_prop" 2020-04-22 00:56:35 +00:00
Ashwini Oruganti
7cde3c1c95 Route com.google.android.gsf to gmscore_app am: 4a1630133d
Change-Id: I4714284837445e4ec84da78895ff72a00a85f50a
2020-04-21 19:05:38 +00:00
Ashwini Oruganti
4a1630133d Route com.google.android.gsf to gmscore_app
com.google.android.gms and com.google.android.gsf have a sharedUserId
but were being routed to two different domains:

com.google.android.gms 10145 0 /data/user/0/com.google.android.gms google:privapp:targetSdkVersion=10000
com.google.android.gsf 10145 0 /data/user/0/com.google.android.gsf google:privapp:targetSdkVersion=10000

This change routes them to the same domain: gmscore_app

Bug: 154597032
Test: TH
Change-Id: I0a309a687eb8608604cabf65b58763a1a3262153
2020-04-21 09:29:08 -07:00
Inseob Kim
d8c39d9e56 Rename exported_dalvik_prop to dalvik_config_prop
This is to clean up bad name "exported_dalvik_prop"

Bug: 154465224
Test: sepolicy_tests
Test: treble_sepolicy_tests 26.0 ~ 29.0
Change-Id: Ie5e738b5985c1db1bca7a857971d8490a7980b5b
2020-04-20 19:37:34 +09:00
David Sehr
3dec6dc023 Merge "Control use of dex2oat64 by device property" am: a1d78f908e
Change-Id: I8ba9dba9a76d5d2ffe7c683bb5f0d6207ace33c1
2020-04-20 04:20:38 +00:00
David Sehr
a1d78f908e Merge "Control use of dex2oat64 by device property" 2020-04-20 04:08:26 +00:00
David Sehr
80a1403c62 Control use of dex2oat64 by device property
Gate use of dex2oat64 by a device property.

Bug: 153380900
Test: atest -c  installd_dexopt_test
Change-Id: I640085b5cd744cdc4563f565f8a914f9b1adc3ab
2020-04-19 12:09:38 -07:00
Treehugger Robot
204f42b18e Merge "Enable incidentd access to ro.boot.bootreason" am: a545e89f75
Change-Id: Id7c9f13bd5c439e05659b8ea3d2ae940908429b5
2020-04-17 22:55:43 +00:00
Treehugger Robot
a545e89f75 Merge "Enable incidentd access to ro.boot.bootreason" 2020-04-17 22:34:44 +00:00
Treehugger Robot
fc3775aee4 Merge "Escape '.' in com.android.permission" am: 0785c93fef
Change-Id: Ief1313f8242bbc1ba104f8e4b51e058d6d53a941
2020-04-17 21:09:46 +00:00
Treehugger Robot
0785c93fef Merge "Escape '.' in com.android.permission" 2020-04-17 20:50:46 +00:00
Rambo Wang
ad67e32182 Merge "Add policy to allow EmergencyAffordanceService to dump state" am: 018214dd8e
Change-Id: Ic77cf38acdb3069bd3effcd407bde47630111b45
2020-04-17 15:39:42 +00:00
Rambo Wang
018214dd8e Merge "Add policy to allow EmergencyAffordanceService to dump state" 2020-04-17 15:19:54 +00:00
Martijn Coenen
6d91301b2e Merge "Add external_storage properties." am: c3917f0ea9
Change-Id: I509ac458d95fc6d8ba8efb6a62c22282ed517b4d
2020-04-16 08:21:00 +00:00
Martijn Coenen
c3917f0ea9 Merge "Add external_storage properties." 2020-04-16 08:06:53 +00:00
Treehugger Robot
ec800dee2e Merge "sepolicy: clean up redundant rules around gpuservice" am: 68598f7ff4
Change-Id: I419e248f2685d758f9a1f5eb082f49fb36e51259
2020-04-15 18:31:02 +00:00
Treehugger Robot
68598f7ff4 Merge "sepolicy: clean up redundant rules around gpuservice" 2020-04-15 18:10:04 +00:00
Treehugger Robot
d3d5699412 Merge "sepolicy: allow app to access gpuservice" am: 359cc52f32
Change-Id: I1b68b73fcc147094520be6fb129e0df14feff036
2020-04-15 17:14:38 +00:00
Treehugger Robot
359cc52f32 Merge "sepolicy: allow app to access gpuservice" 2020-04-15 17:10:19 +00:00
Treehugger Robot
2ac31e9741 Merge "sepolicy: Add a new property for aware iface" am: e12775e350
Change-Id: Ic4dababd452c1b428a509f075a46d20f16af0283
2020-04-15 17:05:17 +00:00
Zim
1f817d7fcc Grant MediaProvider read file access on /mnt/pass_through am: 85d87cfa6e
Change-Id: Iec94b6c5462e238335b40f7c01c957958b0b844b
2020-04-15 17:03:02 +00:00
Yiwei Zhang
3db5a3140f sepolicy: clean up redundant rules around gpuservice
Test: m selinux_policy
Change-Id: I67389253aa3c6071a553e123fa9883cbdb331614
2020-04-15 09:24:16 -07:00
Martijn Coenen
01234d371e Add external_storage properties.
Since these need to be set from a vendor context.

Bug: 152170470
Bug: 153525566
Test: N/A
Change-Id: I2e90ad08fa0a5bd2b4759d92f95d35cec2b316df
2020-04-15 17:30:41 +02:00
Treehugger Robot
e12775e350 Merge "sepolicy: Add a new property for aware iface" 2020-04-15 14:03:53 +00:00
Yiwei Zhang
f3adf2eaaf sepolicy: allow app to access gpuservice
Previously we have allowed many kinds of app processes to access
gpuservice. However, upon sharing files through bluetooth, bluetooth
process starts an activity to handle this task. At the meanwhile, any
processes with an activity launched shall access gpuservice for stats
purpose. This change amends the rules so that we don't miss anything.

Bug: 153472854
Test: use bluetooth to share a photo and check logcat
Change-Id: I3d620b703d3afe92ac1f61cfb2a2f343352ddd4d
2020-04-15 05:36:23 -07:00
Zim
85d87cfa6e Grant MediaProvider read file access on /mnt/pass_through
It already has read dir access, but was missing file access which
would allow it read /sdcard symlink (/mnt/pass_through/0/self/primary)

Test: adb shell am broadcast -a
android.intent.action.MEDIA_SCANNER_SCAN_FILE
--receiver-include-background -d file:///sdcard
Bug: 153151011

Change-Id: If4d3fa3d96de6dd9672c0c3aa25fb25f196fe295
2020-04-15 09:13:09 +01:00
Roshan Pius
49ff30da83 sepolicy: Add a new property for aware iface
Bug: 153852667
Test: Compiles
Change-Id: I696cd9334ecf5e947e0459910de258bf904eb520
2020-04-14 22:00:59 -07:00
Rambo Wang
25e527634a Add policy to allow EmergencyAffordanceService to dump state
Bug: 152506122
Test: adb shell dumpsys emergency_affordance
Change-Id: I4dcc227ba949a02a0393999c8065f8bd8b981959
2020-04-14 14:54:52 -07:00
Treehugger Robot
10f1c3bc07 Merge "Allow traced to create files within /data/misc/perfetto-traces" am: 951106b990
Change-Id: Id4afcc38e9793b754c9772eec19ef32daa005838
2020-04-14 13:55:32 +00:00
Treehugger Robot
951106b990 Merge "Allow traced to create files within /data/misc/perfetto-traces" 2020-04-14 13:34:05 +00:00
Robert Shih
c5bf73f0d8 Merge "Allow drm hals to access allocator hal" am: b60b51d352
Change-Id: I3f3b8b19543b38646dbb6524e9f4db845b5e1194
2020-04-13 22:51:19 +00:00
Robert Shih
b60b51d352 Merge "Allow drm hals to access allocator hal" 2020-04-13 22:27:18 +00:00
Nikita Ioffe
3edcd77985 Merge "Add init.userspace_reboot.started.timeoutmillis property" am: bbdf8e4d95
Change-Id: Id2693e3939ab7abc424f65459969d5da4e225614
2020-04-13 19:36:38 +00:00
Nikita Ioffe
bbdf8e4d95 Merge "Add init.userspace_reboot.started.timeoutmillis property" 2020-04-13 19:14:56 +00:00
Robert Shih
0ade37909c Allow drm hals to access allocator hal
Bug: 150468341
Test: atest VtsHalDrmV1_3TargetTest
Change-Id: Iea8934567cda343dedf17f75cb0807a68742764d
2020-04-13 17:30:18 +00:00
Ytai Ben-Tsvi
2859764ea3 Allow system_server to set audio properties am: d107a05402
Change-Id: Ibb54fa735fcd48cf221619196ca422ee430470ee
2020-04-13 04:31:05 +00:00
Nikita Ioffe
7947d580e3 Add init.userspace_reboot.started.timeoutmillis property
This property controls how much userspace reboot watchdog will wait for
userspace reboot to start before falling back to hard reboot.

Test: builds
Bug: 152803929
Change-Id: I6955e8c94708e7e4161e4f334b03c052d42c0f9f
2020-04-11 02:00:01 +01:00
Ytai Ben-Tsvi
d107a05402 Allow system_server to set audio properties
Defined a new signal intended to allow the system to reboot
the audio/soundtrigger HAL process.

Fixes: 153461865
Test: See main change in topic
Change-Id: I1e4a770670bb1274fa6a23cd0641f2554d4679f7
2020-04-10 15:58:51 -07:00
Luca Stefani
ddcbbd7644 Escape '.' in com.android.permission
Change-Id: I83d7f81855b0facee3a07ad6fd2068e5e114db30
2020-04-10 19:22:50 +00:00
Xin Li
0008e99da3 DO NOT MERGE - Merge qt-qpr1-dev-plus-aosp@6382244 into stag-aosp-master
Bug: 151763422
Change-Id: Ia7054b3e76b3831ce3315a45329ef48bf2399197
2020-04-09 18:41:53 -07:00
Wenjie Zhou
27d52551b1 Enable incidentd access to ro.boot.bootreason
incident report contains similar data as in a bugreport, but in proto
format.

Test: adb shell incident -p LOCAL 1000
Bug: 152173578
Change-Id: Iee53a3b8a6c95629a1d5c15b4d17f3d680b14178
2020-04-09 15:57:06 -07:00
Steven Moreland
62cd997a58 treble_sepolicy_tests.py: require recognized loc am: 000ec93900 am: e3834b6de2
Change-Id: I9579db3caf9243cd8f327e1ad94b6a7f4ac94944
2020-04-09 17:59:00 +00:00
Steven Moreland
e3834b6de2 treble_sepolicy_tests.py: require recognized loc am: 000ec93900
Change-Id: If42957f4780d41233e20af3b8307397aa82b2504
2020-04-09 17:46:44 +00:00
Steven Moreland
000ec93900 treble_sepolicy_tests.py: require recognized loc
Before, we were silently ignoring unrecognized paths.

Bug: 152813275
Test: m (runs this test)
Test: reproduce every error I've added
Change-Id: I4a0b8fb9fff070d16126caa1499590693a6d2895
2020-04-08 23:17:16 +00:00
Primiano Tucci
386d95b15f Allow traced to create files within /data/misc/perfetto-traces
Together with aosp/1282157 this change allows the service to
create trace files in the /data/misc/perfetto-traces folder.
Before this change they needed to be created by the perfetto
cmdline client and pass the FD.
This doesn't work for host tools like Android GPU Inspector
(https://gpuinspector.dev/) which talk to the UNIX socket
over adb forward and cannot pass a FD from the host.

Bug: 153519149
Test: manual: adb shell perfetto --txt -c -
  buffers { size_kb: 65536 }
  data_sources {
    config {
      name: "linux.ftrace"
      ftrace_config { ftrace_events: "sched_switch" }
    }
  }
  duration_ms: 5000
  write_into_file: true
  output_path: "/data/misc/perfetto-traces/ttt"

Change-Id: I184329805741654983843e6a29c1fac19a836f59
2020-04-08 19:44:53 +00:00
Inseob Kim
7aab78440c Rename exported and exported2 vold prop am: 3f5a7d247a am: ea1deefaf2
Change-Id: I4d79641c342b7855a94603b843f207d3ce8d7824
2020-04-07 15:21:45 +00:00
Inseob Kim
ea1deefaf2 Rename exported and exported2 vold prop am: 3f5a7d247a
Change-Id: I235c1078d9c8ac8c76950174c73c8994a443a746
2020-04-07 15:00:25 +00:00