Treehugger Robot
9640e3c44d
Merge "Android.mk: Support SYSTEM_EXT* sepolicy" am: 5b238f9799
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1277793
Change-Id: I245db072c495f1b6a10ee7522836549fc912eb1b
2020-10-12 04:20:32 +00:00
Treehugger Robot
08dea35ec5
Merge "build: Rename Plat->SystemExt*SepolicyDirs" am: 9a0cff4756
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1274773
Change-Id: I9dc23057e1c512f0604bccc0ef6b1b98a8b51ff0
2020-10-12 04:20:10 +00:00
Treehugger Robot
5b238f9799
Merge "Android.mk: Support SYSTEM_EXT* sepolicy"
2020-10-12 03:49:24 +00:00
Treehugger Robot
9a0cff4756
Merge "build: Rename Plat->SystemExt*SepolicyDirs"
2020-10-12 03:49:24 +00:00
Xin Li
6355987626
Skip ab/6749736 in stage.
...
Merged-In: Ie19dbe9d24525ea2612b7c7616efb852613b8ff3
Change-Id: If40e43eea59eb97e0b294d38d730d206955b7bee
2020-10-08 17:24:04 -07:00
Yifan Hong
fab3665eac
Merge "Revert "Add /boot files as ramdisk_boot_file."" am: 271ba1c3ff
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1454917
Change-Id: I2f63826ee6da31b8925f9df72cabcd61c3cc5126
2020-10-08 22:36:33 +00:00
Yifan Hong
271ba1c3ff
Merge "Revert "Add /boot files as ramdisk_boot_file.""
2020-10-08 22:28:43 +00:00
Yifan Hong
f5f4c1207a
Revert "Add /boot files as ramdisk_boot_file."
...
This reverts commit 2576a2fc30
.
Reason for revert: conflict with device-specific sepolicy
Bug: 170411692
Change-Id: Ie5fde9dd91b603f155cee7a9d7ef432a05dc6827
Test: pass
2020-10-08 22:13:44 +00:00
Steven Moreland
96bfdd55c7
Merge changes from topic "b163478173-I" am: eacff783ee
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1454056
Change-Id: Ic084c4bca152d9334fe3ccb180116b0304d8f7b0
2020-10-08 22:10:45 +00:00
linpeter
dfe96e800d
sepolicy: remove hal_light_severice exception am: d62ddfef9c
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1454055
Change-Id: I6d9692fde0cb3df98bab89275ee1dba37843c55e
2020-10-08 22:10:24 +00:00
Steven Moreland
eacff783ee
Merge changes from topic "b163478173-I"
...
* changes:
Rem /vendor app neverallow to get vendor services
sepolicy: remove hal_light_severice exception
2020-10-08 21:52:21 +00:00
Treehugger Robot
fbe4b3458c
Merge "Add F2FS_IOC_SEC_TRIM_FILE ioctl code" am: b4a08cb2cc
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1452355
Change-Id: I188f6dfa9a01f6d0de6a1b125b8a6d13b012d855
2020-10-08 19:01:46 +00:00
Treehugger Robot
b4a08cb2cc
Merge "Add F2FS_IOC_SEC_TRIM_FILE ioctl code"
2020-10-08 18:09:29 +00:00
Yifan Hong
9e5e5af767
Merge "Add /boot files as ramdisk_boot_file." am: 02b3681931
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1454915
Change-Id: I35ed71ba12c0d5586684476154520c111cfa27cf
2020-10-08 16:56:03 +00:00
Yifan Hong
02b3681931
Merge "Add /boot files as ramdisk_boot_file."
2020-10-08 16:30:28 +00:00
Marin Shalamanov
651b41749a
Add sysprop for updating device product info am: 01dbd09c8c
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1454016
Change-Id: If180fe8b83d5358b137e10d253c88c277ff094b8
2020-10-08 16:02:31 +00:00
Yifan Hong
2576a2fc30
Add /boot files as ramdisk_boot_file.
...
/boot/etc/build.prop is a file available at first_stage_init to
be moved into /second_stage_resources.
The file is only read by first_stage_init before SELinux is
initialized. No other domains are allowed to read it.
Test: build aosp_hawk
Test: boot and getprop
Bug: 170364317
Change-Id: I0f8e3acc3cbe6d0bae639d2372e1423acfc683c7
2020-10-08 07:55:12 -07:00
Marin Shalamanov
01dbd09c8c
Add sysprop for updating device product info
...
Test: read the prop from SurfaceFlinger; test on device
Change-Id: I4cde2244a9991e7051b3a3d52882ed4430ed046f
2020-10-08 15:49:50 +02:00
Florian Mayer
752e48d4c2
Allow heapprofd to read shell_data_file.
...
This allows to profile binaries pushed by the user.
Test: run profile of out of tree perfetto on flame userdebug.
Bug: 170208766
Change-Id: I152d6d244cc5065ee2de24f839e4ad467bc22cdc
2020-10-08 12:49:06 +00:00
Adam Shih
2ee80e720b
Merge "Suppress errors that are not needed" am: b5f770a8b8
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1450517
Change-Id: Ie6f174cc7f9f235d12084420a5bc54a9720b7607
2020-10-08 02:18:24 +00:00
Adam Shih
b5f770a8b8
Merge "Suppress errors that are not needed"
2020-10-08 01:53:52 +00:00
Treehugger Robot
5c9d1b7d4d
Merge "Create selinux_policy_* for /product and /system_ext" am: fb4d45a762
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1450518
Change-Id: Ief1b983b4467685b3256878c9f47bed2464f5a7e
2020-10-08 00:59:57 +00:00
Treehugger Robot
fb4d45a762
Merge "Create selinux_policy_* for /product and /system_ext"
2020-10-08 00:49:44 +00:00
Benjamin Schwartz
034a9c4e34
Rename PowerStats HAL service am: 92bb74c851
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1449837
Change-Id: I926dacec3f6cc4f44e0a76db29b6c69b8dde4105
2020-10-08 00:04:41 +00:00
Steven Moreland
52b0886903
Rem /vendor app neverallow to get vendor services
...
This CL changes a neverallow for /vendor apps accessing vendor_service.
Originally, /vendor apps ({appdomain -coredomain}) were disallowed from
accessing all AIDL services since they are platform implementation
details that may change over time, and these apps run in a system
context. However, now, vendor services can be stable. So, in order to
give the flexibility needed for vendor framework components installed to
the /vendor partition to access AIDL HALs, opening this up.
Bug: 163478173
Test: build (validates neverallows)
Change-Id: Ic2280021e875671ad99e3f1ba820c6e4408fd645
2020-10-07 22:38:46 +00:00
linpeter
d62ddfef9c
sepolicy: remove hal_light_severice exception
...
Bug: 148154485
test: build pass, HBM switch
Change-Id: I775ee6015b03817ed1394f3b6c306f4b5153190e
Merged-In: I775ee6015b03817ed1394f3b6c306f4b5153190e
(cherry picked from commit 0c09c42f23
)
2020-10-07 22:34:35 +00:00
Benjamin Schwartz
92bb74c851
Rename PowerStats HAL service
...
Bug: 169864180
Test: m
Merged-In: I79ddf26acf398e80c6ff4a96c26b04aef73feac3
Change-Id: Ic458514285f819f44e50e2bee26a08fc6cf54261
2020-10-07 21:56:53 +00:00
Yifan Hong
73f9b6cc84
Add /second_stage_resources tmpfs.
...
At build time, the directory is created as an empty directory. At
runtime, init mounts tmpfs at this path to preserve files from first
stage init to second stage init.
Right now, first stage init copies the following file to this tmpfs
before switching root:
- /boot/etc/build.prop -> /second_stage_resources/boot/etc/build.prop
After init property service finishes loading all properties, this tmpfs
is umounted, and this directory is left empty.
Bug: 169169031
Test: run and init loads props properly.
Change-Id: Ic6e62b10d8aec446b51c6bc67fdc2dbc943096ba
2020-10-07 11:55:20 -07:00
Yifan Hong
6bb5a76d29
Add ro.bootimage.* property contexts
...
In addition, allow shell to read this property.
Test: getprop -Z
Test: cts-tradefed run cts -m CtsGestureTestCases
and check /sdcard/device-info-files/PropertyDeviceInfo.deviceinfo.json
Bug: 169169031
Change-Id: Ib71b01bac326354696e159129f9dea4c2e918c51
2020-10-07 11:55:20 -07:00
Yo Chiang
e939cbdd37
Add F2FS_IOC_SEC_TRIM_FILE ioctl code
...
`secdiscard` calls ioctl(F2FS_IOC_SEC_TRIM_FILE). Add the ioctl
definition and allow rule.
Bug: 170275781
Bug: 140759142
Bug: 168571434
Test: Build pass
Change-Id: I967e0a3c1216f36174f08d5ace2f7a6bcd4103b6
2020-10-07 17:39:46 +00:00
Lais Andrade
b75a857210
Add sepolicy for vibrator manager am: ac2da76606
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1426692
Change-Id: Ie83856bbd279a3f99321216c155ebfe1134f062c
2020-10-07 15:07:36 +00:00
Lais Andrade
ac2da76606
Add sepolicy for vibrator manager
...
This will allow SystemServer to add the new vibrator manager service.
Bug: 166586119
Test: manually build and install on test device
Change-Id: I496f46e2f5482aaa7bfba31d6c6b2967486941cc
2020-10-07 13:17:58 +00:00
Justin Yun
0f722695e0
Create selinux_policy_* for /product and /system_ext
...
Separate selinux_policy_system_ext and selinux_policy_product from
the selinux_policy_nonsystem module. With this CL,
selinux_policy_nonsystem will include the files for /vendor and /odm
partitions only. It will still include selinux_policy_system_ext and
selinux_policy_product as required modules.
Bug: 170282998
Test: build and check boot
Change-Id: Ie2f646a217ec86ede95caec101622bc530d12cfc
2020-10-07 18:28:47 +09:00
Adam Shih
e712c3db12
Suppress errors that are not needed
...
The purpose of misc_writer is to write misc partition. However,
when it includes libfstab, it will probe files like kernal command
line (proc/cmdline) and metadata, which are permissions it does not
need.
Bug: 170189742
Test: Boot under permissive mode and find the errors gone.
Change-Id: Icda3200660a3bee5cadb6f5e0026fa71941ae5dc
2020-10-07 08:52:51 +00:00
Treehugger Robot
6525b0e885
Merge "Allow media.transcoding to access package manager native" am: cee3b93a91
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1449300
Change-Id: I140ac54baa976d58c300acbd217a7e343f873577
2020-10-06 21:53:44 +00:00
Treehugger Robot
cee3b93a91
Merge "Allow media.transcoding to access package manager native"
2020-10-06 21:28:24 +00:00
Nikita Ioffe
d6bba5a014
Merge "Allow apexd to read ro.cold_boot_done prop" am: a45bb1a6f6
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1447015
Change-Id: I7772133e1e70bc6d80e9ca259cd2f58a36a5313f
2020-10-06 15:26:24 +00:00
Nikita Ioffe
a45bb1a6f6
Merge "Allow apexd to read ro.cold_boot_done prop"
2020-10-06 14:52:20 +00:00
Jooyung Han
1fd5bead9c
Merge "Use file_contexts files for flattened APEXes" am: 9cd0f8e73d
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1435471
Change-Id: I63bf8f6d17e56c9ad103115237f49b22921be35e
2020-10-06 03:43:54 +00:00
Jooyung Han
9cd0f8e73d
Merge "Use file_contexts files for flattened APEXes"
2020-10-06 03:26:14 +00:00
Marco Ballesio
8dd1201f0c
sepolicy: allow tracing access to irq/ipi am: 550f926a03
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1449302
Change-Id: I93c30418b3b5c6b0ffc6196bcc3ded285cd2851e
2020-10-05 23:32:06 +00:00
Marco Ballesio
550f926a03
sepolicy: allow tracing access to irq/ipi
...
irq and ipi tracepoint are required for Traceur's irq category.
Bug: 153486528
Test: manually captured a Traceur trace on user builds, verified that the
tracepoints were present.
Change-Id: I2f42fc293e87e2a3567ab55f7533fe6a5d7852bf
2020-10-05 14:08:28 -07:00
Chong Zhang
ce3c1f3ba1
Allow media.transcoding to access package manager native
...
This is needed to retrieve package names for dumpsys and metrics.
bug: 154733526
Change-Id: Ibe376a961d29e6ffd10326b625683fdc28a1924e
2020-10-05 12:12:19 -07:00
Treehugger Robot
f898f27368
Merge "Rename service android.security.keystore2 to android.system.keystore2." am: 2c7b055751
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1448096
Change-Id: I0095654a52348a1c4cdd00a2a3e53f69af590d48
2020-10-05 18:19:29 +00:00
Treehugger Robot
2c7b055751
Merge "Rename service android.security.keystore2 to android.system.keystore2."
2020-10-05 17:59:48 +00:00
Mohammad Islam
fb167d50ce
Merge "Allow system_server to rename file from /data/app-staging folder" am: df63b17eec
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1435499
Change-Id: I8a66242d71fbfb676dd4c17f3f7e62b8348ce66d
2020-10-05 17:36:38 +00:00
Mohammad Islam
df63b17eec
Merge "Allow system_server to rename file from /data/app-staging folder"
2020-10-05 16:01:59 +00:00
Janis Danisevskis
381c8421ae
Rename service android.security.keystore2 to android.system.keystore2.
...
Keystore2 to is now a system/hardware/interfaces service.
Test: N/A
Change-Id: I97f356a94a9da710354c6c282a4f1dbf66b5a3b5
2020-10-05 08:56:08 -07:00
Jakub Pawlowski
a627a3a642
Merge "Revert "Add vendor_property_type to vendor_default_prop"" am: 63ef2b68ae
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1448579
Change-Id: I969a21f8064b021b3b135fbc40f45116a479c0da
2020-10-05 12:12:51 +00:00
Jakub Pawlowski
63ef2b68ae
Merge "Revert "Add vendor_property_type to vendor_default_prop""
2020-10-05 11:53:47 +00:00