Commit graph

570 commits

Author SHA1 Message Date
Yan Wang
5f8faa8547 sepolicy: Allow iorapd process to send signal to prefetch and am: 9ef72aae58
Original change: undetermined

Change-Id: I4539a7361694dd4b41d58f94d65652ee3297ff24
2020-06-02 10:43:29 +00:00
Yan Wang
9ef72aae58 sepolicy: Allow iorapd process to send signal to prefetch and
inode2filename process.

Bug: 157282668
Test: Check no avc: denied in logcat.
Change-Id: I298cea931c8d6f178bc0195bfced0e8efc51fcad
2020-06-01 20:05:30 +00:00
Mohammad Samiul Islam
be5c4de29f Create sepolicy for allowing system_server rw in /metadata/staged-install
Bug: 146343545
Test: presubmit
Change-Id: I4a7a74ec4c5046d167741389a40da7f330d4c63d
2020-06-01 12:35:27 +01:00
TreeHugger Robot
f6c47992b1 Merge "Remove unused sepolicy by fsverity_init" into rvc-dev am: 13cc42dbda am: 442d242e23
Change-Id: I1b06c383bc504a06577219a8d65d9539c8da355a
2020-05-29 23:12:15 +00:00
TreeHugger Robot
13cc42dbda Merge "Remove unused sepolicy by fsverity_init" into rvc-dev 2020-05-29 22:45:30 +00:00
Treehugger Robot
ad79659e21 Merge "Remove unused sepolicy by fsverity_init" am: 5503debd17 am: fa8419175a
Change-Id: I6da607dc5c87bafbc41c3ea7ebe45c47725dead4
2020-05-29 22:30:26 +00:00
Treehugger Robot
fa8419175a Merge "Remove unused sepolicy by fsverity_init" am: 5503debd17
Change-Id: I90e8d3661203a4fa5ab5f4528a9038d8de1d0a68
2020-05-29 22:21:17 +00:00
Victor Hsieh
bad0743a1b Remove unused sepolicy by fsverity_init
Keystore access was reverted a while ago in ag/10598373.

Bug: 112038744
Test: atest CtsAppSecurityHostTestCases:android.appsecurity.cts.ApkVerityInstallTest
Test: atest GtsPlayFsiTestCases GtsPlayFsiHostTestCases ApkVerityTest
Change-Id: Ic170624f5a718806adf54ab12e8f4b9f17c7775b
Merged-In: Ic170624f5a718806adf54ab12e8f4b9f17c7775b
2020-05-29 10:04:47 -07:00
Martijn Coenen
a302a0e218 Merge "Add sepolicy for FUSE control filesystem." into rvc-dev am: 79d9949046 am: f9f78b7883
Change-Id: I96fd6dda792c79e1a480b2ad3176aefd3e118bdb
2020-05-29 15:07:00 +00:00
Martijn Coenen
f6af506e21 Merge "Add sepolicy for FUSE control filesystem." into rvc-dev am: 79d9949046
Change-Id: Ia17b054acfd730e226abf83321caf029129a4da1
2020-05-29 14:54:54 +00:00
Martijn Coenen
79d9949046 Merge "Add sepolicy for FUSE control filesystem." into rvc-dev 2020-05-29 14:41:20 +00:00
Martijn Coenen
bf6009da7e Add sepolicy for FUSE control filesystem.
To allow vold to abort it.

Bug: 153411204
Test: vold can access it
Change-Id: I334eaf3459905c27d614db8eda18c27e62bea5fa
2020-05-29 15:11:24 +02:00
Victor Hsieh
f6756b9fb3 Remove unused sepolicy by fsverity_init
Keystore access was reverted a while ago in ag/10598373.

Bug: 112038744
Test: atest CtsAppSecurityHostTestCases:android.appsecurity.cts.ApkVerityInstallTest
Test: atest GtsPlayFsiTestCases GtsPlayFsiHostTestCases ApkVerityTest
Change-Id: Ic170624f5a718806adf54ab12e8f4b9f17c7775b
2020-05-28 17:58:16 -07:00
TreeHugger Robot
e39b473aa4 Merge "Add sepolicy for ro.boot.fstab_suffix" into rvc-dev am: 3d4696513d am: 4d15abe70c
Change-Id: Id442814d40f4a80900359872e760a45629fbaa76
2020-05-28 17:51:17 +00:00
TreeHugger Robot
3d4696513d Merge "Add sepolicy for ro.boot.fstab_suffix" into rvc-dev 2020-05-28 17:05:49 +00:00
Alistair Delva
534c9412ab Add sepolicy for ro.boot.fstab_suffix
The fstab_suffix can be passed as 'androidboot.fstab_suffix=' on the
kernel command line, or as an Android DT node. It specifies an
override suffix for the fsmgr fstab search:

/odm/etc/fstab.${fstab_suffix}
/vendor/etc/fstab.${fstab_suffix}
/fstab.${fstab_suffix}

Bug: 142424832
Change-Id: I9c0acf7a5ae3cdba505460247decf2de9997cac1
Merged-In: I9c0acf7a5ae3cdba505460247decf2de9997cac1
2020-05-28 00:07:22 +00:00
Marin Shalamanov
4aa8bda4e3 Allow the boot animation to receive display events am: 0fc93a21dd am: 518d43751b
Change-Id: I2cf7247be65975f4b705987b003afe22e668e39d
2020-05-27 12:37:16 +00:00
Marin Shalamanov
0fc93a21dd Allow the boot animation to receive display events
Test: manually make sure that boot animation is resizing
      when display is changed
Bug: 156448328

Merged-In: I9f754900a0b32551f656ce2097a3a41245b02218
Change-Id: I9f754900a0b32551f656ce2097a3a41245b02218
2020-05-27 12:57:51 +02:00
Daniel Rosenberg
97ddd0476e Merge "Add sdcardfs variable to storage_config_props" into rvc-dev am: 0ed6138bd7 am: 442b4e5b2f
Change-Id: Icd4be52e4819cef802e77f37702cc6add2e0a03d
2020-05-21 09:01:53 +00:00
Daniel Rosenberg
0ed6138bd7 Merge "Add sdcardfs variable to storage_config_props" into rvc-dev 2020-05-21 08:31:23 +00:00
TreeHugger Robot
ee2a208ba6 Merge "Support TCP based fastbootd in recovery mode." into rvc-dev am: b293b49206 am: 5347a6d869
Change-Id: I905f89d767d4fe2f3e07d87401eaed9b2ff6f98e
2020-05-20 17:00:24 +00:00
TreeHugger Robot
b293b49206 Merge "Support TCP based fastbootd in recovery mode." into rvc-dev 2020-05-20 16:31:18 +00:00
Daniel Rosenberg
73dede86b4 Add sdcardfs variable to storage_config_props
This property allows us to disable sdcardfs if it is present. The old
property ended up getting repurposed, so a new one was needed.
Mediaprovider will also need to access this to determine what actions it
needs to take.

Test: builds
Bug: 155222498
Change-Id: I66ac106613cbb374f54659601e4ba3f61eaecd2f
Merged-In: I66ac106613cbb374f54659601e4ba3f61eaecd2f
2020-05-20 04:50:13 +00:00
Hongguang Chen
b79c462f1b Support TCP based fastbootd in recovery mode.
The IPv6 link-local address is used to avoid expose device to out of
network segment.

BUG: 152544169
BUG: 155198345
Test: manual test.
Change-Id: I0ce8c12de9976c01e57a6433c7fb50235e907dc5
Merged-In: I0ce8c12de9976c01e57a6433c7fb50235e907dc5
Merged-In: I409aeccd31293bf0ae3be5b1dbafe5a74daaaa9d
2020-05-19 19:12:25 +00:00
Yiming Jing
a8ad4ee58e DO NOT MERGE: Remove duplicate neverallow for hal_audio_server am: 8df611bb46 am: 78be1e7839
Change-Id: I9d76b092bea6d37391fc98c1a0da3e43dda28e0c
2020-05-19 01:01:53 +00:00
Yiming Jing
f35b5af243 DO NOT MERGE: Remove duplicate neverallow for hal_audio_server am: 8df611bb46
Change-Id: I20e10db0cd5d5e64d856a7c375351578a53b1e83
2020-05-19 00:53:07 +00:00
Yiming Jing
78be1e7839 DO NOT MERGE: Remove duplicate neverallow for hal_audio_server am: 8df611bb46
Change-Id: Ic08d6f5a8d5934c06c1b2c88bbe93b46a6cf0607
2020-05-19 00:52:53 +00:00
TreeHugger Robot
0d883b8acc Merge "DO NOT MERGE: Remove duplicate neverallow for hal_audio_server" into rvc-dev 2020-05-19 00:41:33 +00:00
Collin Fijalkovich
1a7769af58 Merge "Allow ActivityManagerService to start cacheDump service." into rvc-dev am: 148998495c am: fbb31f63e1
Change-Id: I532fa9543be8373b2580b0b8a574e30cf726f31c
2020-05-19 00:05:19 +00:00
Collin Fijalkovich
3227125cc7 Merge "Allow ActivityManagerService to start cacheDump service." into rvc-dev am: 148998495c
Change-Id: I0e0ec5fd5f6e1ad65682574451d9850febffae29
2020-05-18 20:59:01 +00:00
Collin Fijalkovich
148998495c Merge "Allow ActivityManagerService to start cacheDump service." into rvc-dev 2020-05-18 20:52:43 +00:00
TreeHugger Robot
4fb48e44f1 Merge "Allow sgdisk to use BLKPBSZGET ioctl" into rvc-dev am: ca26a345db am: 7393546d42
Change-Id: I653a9348178000fabca137f80d931c87e0bd4c2e
2020-05-18 08:42:48 +00:00
Jeffrey Vander Stoep
6e33f1edbd Merge "incident_service: only disallow untrusted access" into rvc-dev am: 6dc1e5f472 am: 9f9272a21f
Change-Id: I56d71a6034d169772b886bcc6c0ebec85732a21a
2020-05-18 08:42:41 +00:00
TreeHugger Robot
976b9be5ba Merge "Allow sgdisk to use BLKPBSZGET ioctl" into rvc-dev am: ca26a345db
Change-Id: I79c925cb0a572e7a3f6645afc46e3d60b40bb449
2020-05-18 08:31:57 +00:00
Jeffrey Vander Stoep
ba56e3f31c Merge "incident_service: only disallow untrusted access" into rvc-dev am: 6dc1e5f472
Change-Id: Ibd2f83f84afe803050ab069f30c5da663fefcd45
2020-05-18 08:31:51 +00:00
TreeHugger Robot
ca26a345db Merge "Allow sgdisk to use BLKPBSZGET ioctl" into rvc-dev 2020-05-18 08:25:01 +00:00
Jeffrey Vander Stoep
6dc1e5f472 Merge "incident_service: only disallow untrusted access" into rvc-dev 2020-05-18 08:19:19 +00:00
Alistair Delva
35895ddb79 Allow sgdisk to use BLKPBSZGET ioctl
The gpt_fdisk project was updated recently, but sepolicy was not updated
with it :) Now sgdisk can use BLKPBSZGET to detect the physical block
size. Seen on cuttlefish when adding external SD Card support to it.

avc: denied { ioctl } for comm="sgdisk" path="/dev/block/vold/disk:252,16"
dev="tmpfs" ino=8625 ioctlcmd=0x127b scontext=u:r:sgdisk:s0
tcontext=u:object_r:vold_device:s0 tclass=blk_file permissive=0

Bug: 156286088
Change-Id: I9f2df88ee253261b52f3022838380fbb1cab6da0
2020-05-17 12:32:44 -07:00
Steven Moreland
44d14522f7 servicemanager: add dump fd permissions am: d895b40f2e am: 8b2eecebfd
Change-Id: I576448a2bc88e55cdf4664e65f61cc0175d6c999
2020-05-15 00:41:45 +00:00
Steven Moreland
d895b40f2e servicemanager: add dump fd permissions
Getting hit when bugreport tries to dump this.

Fixes: 155835324
Test: adb bugreport, check denials
(cherry picked from commit b0fb5b44f8)
Merged-In: I189aeba2d3a5dfafccb8f8a4db224db71820faca
Change-Id: Ic044f245d8fee9f7a49cf23f76961f7dedbb3d8b
2020-05-14 17:27:14 +00:00
Jeff Vander Stoep
fdda81a521 incident_service: only disallow untrusted access
Allow device-specific domains to access the incident_service.

Test: build
Bug: 156479626
(Cherry picked from commit 2aa8042f9d)
Change-Id: I64d844f7a549afb4224d91b086c1f5fd76d0664c
2020-05-13 18:53:30 +00:00
Collin Fijalkovich
77efb419f3 Allow ActivityManagerService to start cacheDump service.
Configures SELinux to allow ActivityManagerService to start a cacheinfo
service that is responsible for dumping per-process cache state.

Bug: 153661880
Test: adb shell dumpsys cacheinfo
Test: adb bugreport
Change-Id: Id6a4bdf2a9cb6d7f076b08706e0f91d377f38603
2020-05-13 11:20:10 -07:00
Xiangyu/Malcolm Chen
5d7b063d92 Merge "Expose max.active.modem to be vendor inittable." into rvc-dev am: 554bcfe5e8 am: ee66ca210e
Change-Id: Iac68125b65b330df736d4e3d162e37fc9caead1e
2020-05-12 20:42:55 +00:00
TreeHugger Robot
b4e5047298 Merge "Sync prebuilts with NNAPI enablement change" into rvc-dev am: fd40037003 am: 470cc075f1
Change-Id: I6526113f19462f77d61c6dd530f5fcd74c54368f
2020-05-12 19:38:34 +00:00
Evan Severson
2d940e837f Merge "Allow permission controller to use radio service" into rvc-dev am: 8ba72f3280 am: f269dedbc9
Change-Id: I524b603c4107472ef6686f891f42fcc3f7855957
2020-05-12 19:38:18 +00:00
Xiangyu/Malcolm Chen
554bcfe5e8 Merge "Expose max.active.modem to be vendor inittable." into rvc-dev 2020-05-12 18:12:53 +00:00
TreeHugger Robot
357be6e27c Merge "Sync prebuilts with NNAPI enablement change" into rvc-dev am: fd40037003
Change-Id: I2e6aab913ed86cf9b4b7ececc043b4e2ddff9b0e
2020-05-12 06:53:43 +00:00
TreeHugger Robot
fd40037003 Merge "Sync prebuilts with NNAPI enablement change" into rvc-dev 2020-05-12 06:43:33 +00:00
Evan Severson
10fd395499 Merge "Allow permission controller to use radio service" into rvc-dev am: 8ba72f3280
Change-Id: I573ca5d7a93d846f37698dd3ce84419a4af0f639
2020-05-11 22:56:16 +00:00
Evan Severson
8ba72f3280 Merge "Allow permission controller to use radio service" into rvc-dev 2020-05-11 22:55:33 +00:00
Evan Severson
a6d6f677a2 Allow permission controller to use radio service
Test: Observe denial go away
Bug: 153997991

Change-Id: I9a11e226867a5d68f2490f5143963cc66bd09538
2020-05-11 22:54:38 +00:00
Malcolm Chen
4062937968 Expose max.active.modem to be vendor inittable.
And rename it properly.

Bug: 154072245
Test: manual
Change-Id: I85b060ef90a747b43e1ab386337ffc5b49d29e57
Merged-In: I85b060ef90a747b43e1ab386337ffc5b49d29e57
2020-05-11 10:31:17 -07:00
Yiming Jing
8df611bb46 DO NOT MERGE: Remove duplicate neverallow for hal_audio_server
Cherry picked from commit 996059 (rvc-dev-plus-aosp), which is
auto merged from aosp/1290960 (master).

In addition, 'prebuilts/api/30.0/public/hal_audio.te' is updated to
be consistent with 'public/hal_audio.te'.

Bug: 155306710
Test: tested with the following rules in 'vendor/hal_audio_default.te'
Test: type hal_audio_socket, domain;
Test: typeattribute hal_audio_default hal_automotive_socket_exemption;
Test: allow hal_audio_default hal_audio_socket:tcp_socket connect;
Test: m -j should compile sepolicy without complaints

Change-Id: I0b8a5f9c9d826680223dbb9204862ea46c557856
(cherry picked from commit 9960590f8d)
2020-05-11 17:15:21 +00:00
Inseob Kim
15ac715abf Add 30.0 mapping files am: ace36abec5 am: 119a73a113
Change-Id: Ie00184eaa3e77cf8923892dbdca266b367a8bcc3
2020-05-11 10:27:39 +00:00
Inseob Kim
119a73a113 Add 30.0 mapping files am: ace36abec5
Change-Id: Ie7cbffc33e506de9530f6906acdcf4400b05930d
2020-05-11 10:11:37 +00:00
Inseob Kim
190212c7a2 DO NOT MERGE Add fake 30.0 prebuilts am: 5131ff6544
Change-Id: Iee1d122830060eb2439650ccb28f40aa2c67870d
2020-05-11 10:11:34 +00:00
Stefano Galarraga
ec7b180bc8 Sync prebuilts with NNAPI enablement change
Synchronizing changes in prebuilt dumpstate.te with changes in
Ibad9b68736ccbdc3ed796606fd1d78ca04f98ad0.

Test: build + boot
Bug: 145388549
Bug: 154169913
Change-Id: I8ad5245181d79e787e26910ee4e701e2ae6812c9
2020-05-11 08:28:05 +01:00
Inseob Kim
ace36abec5 Add 30.0 mapping files
Steps taken to produce the mapping files:

1. Add prebuilts/api/30.0/plat_pub_versioned.cil from the
/vendor/etc/selinux/plat_pub_versioned.cil file built on rvc-dev with
lunch target aosp_arm64-eng. Add prebuilts/api/30.0/vendor_sepolicy.cil
as an empty file.

2. Add new file private/compat/30.0/30.0.cil by doing the following:
- copy /system/etc/selinux/mapping/30.0.cil from rvc-dev aosp_arm64-eng
device to private/compat/30.0/30.0.cil
- remove all attribute declaration statement (typeattribute ...) and
sort lines alphabetically
- some selinux types were added/renamed/deleted w.r.t 30 sepolicy.
Find all such types using treble_sepolicy_tests_30.0 test.
- for all these types figure out where to map them by looking at
29.0.[ignore.]cil files and add approprite entries to 30.0.[ignore.]cil.

This change also enables treble_sepolicy_tests_30.0 and installs
30.0.cil mapping file onto the device.

Bug: 153661471
Test: m treble_sepolicy_tests_30.0
Test: m 30.0_compat_test
Test: m selinux_policy
Change-Id: I6dfae41fbd5f245119ede540d2c321688d6e7929
2020-05-11 04:32:00 +00:00
Inseob Kim
5131ff6544 DO NOT MERGE Add fake 30.0 prebuilts
This prebuilt is based on the AOSP policy, but slightly manipulated so
that the set of types and attributes are identical with R policy.

Following types are removed.

boot_status_prop
dalvik_config_prop
gnss_device
surfaceflinger_color_prop
surfaceflinger_prop
systemsound_config_prop
vold_config_prop
vold_status_prop

Following type is renamed.

wificond_service -> wifinl80211_service

Bug: 153661471
Test: N/A
Change-Id: I018d5e43f53c2bf721db1d13f5f4be42b9782b29
2020-05-11 13:18:52 +09:00
Suren Baghdasaryan
b2b5a54b60 resolve merge conflicts of 9436677538 to rvc-d1-dev
Bug: 155149944
Merged-In: I6ba598bad7ebb40fd6f23de473f25f32e53c996d
Change-Id: I45aeeadfd8909e7ca2982d4bf8924aa9fb836855
2020-05-08 20:12:31 +00:00
Suren Baghdasaryan
9436677538 Add lmkd. property policies
lmkd.reinit property allows vendors to trigger lmkd reinitialization. Add
lmkd_prop to support lmkd.* properties inlcuding lmkd.reinit.

Bug: 155149944
Test: setprop lmkd.reinit 1
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Merged-In: I6ba598bad7ebb40fd6f23de473f25f32e53c996d
Change-Id: I6ba598bad7ebb40fd6f23de473f25f32e53c996d
2020-05-08 15:35:16 +00:00
Suren Baghdasaryan
ff4789185a sepolicy: Allow lmkd to communicate with its other instance for reinit
Lmkd should implement reinit functionality and to do so it needs to
communicate with its running instance using socket.

Bug: 155149944
Test: lmkd --reinit
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Merged-In: I81455fe187830081d88f001b4588f7607b1bd1d0
Change-Id: I81455fe187830081d88f001b4588f7607b1bd1d0
2020-05-08 15:35:05 +00:00
PO HUNG CHEN
642066b303 Merge changes from topic "vabse" into rvc-dev am: 3e81d5dd6b
Change-Id: I17ecae329bc5bc272d77b2514b710e619673c17a
2020-05-08 09:40:48 +00:00
PO HUNG CHEN
96c7dd3d25 Merge changes from topic "vabse" into rvc-dev am: 3e81d5dd6b
Change-Id: Ib90c924bd39e32c593d19d6f2a4143b93ca03880
2020-05-08 09:40:28 +00:00
PO HUNG CHEN
3e81d5dd6b Merge changes from topic "vabse" into rvc-dev
* changes:
  Allow update_engine to get gsid property
  Allow update_engine to get gsid property
2020-05-08 09:03:19 +00:00
TreeHugger Robot
f76f7d171a Merge "allow modprobe to read /proc/cmdline" into rvc-dev am: 249b79c680
Change-Id: Ib286e33c3e2777a53dfa6ee420e47f26b606d445
2020-05-08 06:54:54 +00:00
TreeHugger Robot
249b79c680 Merge "allow modprobe to read /proc/cmdline" into rvc-dev 2020-05-08 06:43:25 +00:00
Howard Chen
f6b2db0be7 Allow update_engine to get gsid property
Allow the update_engine to use the gsid property and to avoid the VAB
merge when running a DSU.

Bug:147071959
Test: ota_e2etest.py

Change-Id: I4a8d179e7e71f74d0c7ad34767de1f619f134d20
2020-05-08 10:10:46 +08:00
Steve Muckle
9316da8e12 allow modprobe to read /proc/cmdline
This is needed for libmodprobe to pass module options on the kernel
commandline to kernel modules when they are loaded.

Bug: 155422904
Change-Id: I9df7e211765268815bfb9269365264f5ca468712
Merged-In: I9df7e211765268815bfb9269365264f5ca468712
2020-05-07 11:28:50 -07:00
TreeHugger Robot
030eb1e795 Merge changes from topic "b/154795779" into rvc-dev am: 5e85b38286
Change-Id: I2eb44f8b85a91ae792e0e0cd7d088ad733306528
2020-05-07 03:26:30 +00:00
TreeHugger Robot
9e184ddc6c Merge changes from topic "b/154795779" into rvc-dev am: 5e85b38286
Change-Id: I1d0b1d64be267faeb7bb80b6b05e67d8aa3b76e6
2020-05-07 03:26:14 +00:00
TreeHugger Robot
5e85b38286 Merge changes from topic "b/154795779" into rvc-dev
* changes:
  Update prebuilt sepolicy
  mediaserver, mediaextractor, drmserver: allow vendor_overlay_file
2020-05-07 03:10:31 +00:00
Przemysław Szczepaniak
c0978e5b16 Allow neuralnetworks hal service to read files from /sdcard am: 2f30c18778
Change-Id: Icb4bdab517af1a73fd52835ab9e8cbcb56e6826a
2020-05-06 16:45:12 +00:00
Przemysław Szczepaniak
2f30c18778 Allow neuralnetworks hal service to read files from /sdcard
Bug: 138457453
Test: tflite nnapi benchmark app against /sdcard file
Change-Id: I368629f9177141d59eb5862cd29dd65da68d3ad7
Merged-In: I368629f9177141d59eb5862cd29dd65da68d3ad7
(cherry picked from commit 94be98073d)
2020-05-06 14:20:21 +01:00
Jeongik Cha
1fa5d6a7c5 Update prebuilt sepolicy
Updating sepolicy in ag/11322695, accrodingly, update prebuilt dir as
well

> cp -r public/ prebuilts/api/${SDK_INT}.0/
> cp -r private/ prebuilts/api/${SDK_INT}.0/

Bug: 154795779
Test: m
Change-Id: I55c2917e9c26cc44dd462c5434b78d36943bd195
2020-05-06 14:16:06 +09:00
Songchun Fan
5974c8b538 [rvc] Define vendor-specific property ro.incremental.enable
[already merged in master and AOSP]

Make ro.incremental.enable a vendor-specific property. Allow
system_server and vold to read this property.

Test: manual
BUG: 155212902
Merged-In: I8ff8837af635fa8e7b5bb02e5f6de5ac15b5023b
Change-Id: Id432390023de232deb4cc4d0ff3fb73904093b60
2020-05-04 12:04:18 -07:00
Svet Ganov
836124e880 Updading selinux policy for R
* Update se policy prebuilts

Test: build + boot

bug:150281259

Exempt-From-Owner-Approval: merge conflict resolution

Change-Id: I0a0e94bc230f7726e7a9dd84b17c3a90e5601120
Merged-In: I0a0e94bc230f7726e7a9dd84b17c3a90e5601120
2020-05-02 14:22:03 -07:00
Svet Ganov
395b2d4318 Updading selinux policy for R
* Update se policy prebuilts

Test: build + boot

bug:150281259

Change-Id: I0a0e94bc230f7726e7a9dd84b17c3a90e5601120
Merged-In: I0a0e94bc230f7726e7a9dd84b17c3a90e5601120
2020-04-30 15:57:06 -07:00
Ioannis Ilkos
d723f38fe9 Enable tracing of the ion/ion_stat events
These events supersede the ion_heap_grow / ion_heap_shrink events on
4.19+ kernels.

Bug: 154302786
Test: build, run on cuttlefish with new kernel, ls -lZ /sys/kernel/tracing/events/ion/ion_stat/enable
Merged-In: I262d8c3269d4261701361ad4b1bdc322f1f03969
Change-Id: I262d8c3269d4261701361ad4b1bdc322f1f03969
2020-04-28 07:59:39 +01:00
Ioannis Ilkos
b7a4c2eb85 Merge "Enable tracing of the ion/ion_stat events" am: e597605e01 am: 6d89f47641
Change-Id: Ie412e230a1c0d6ae0926d2a8f169bd554fff2d17
2020-04-27 14:15:46 +00:00
Ioannis Ilkos
6d89f47641 Merge "Enable tracing of the ion/ion_stat events" am: e597605e01
Change-Id: I7364756d418c170570322e14221aa0a9692fc04c
2020-04-27 14:06:04 +00:00
Ioannis Ilkos
2e03e77f0a Enable tracing of the ion/ion_stat events
These events supersede the ion_heap_grow / ion_heap_shrink events on
4.19+ kernels.

Bug: 154302786
Test: build, run on cuttlefish with new kernel, ls -lZ /sys/kernel/tracing/events/ion/ion_stat/enable
Change-Id: I262d8c3269d4261701361ad4b1bdc322f1f03969
2020-04-24 10:10:35 +01:00
Collin Fijalkovich
c6c9229cfa Allow Traceur record the mm_event trace event.
Bug: 150130660
Test: Took a trace with Traceur and verified mm_event records
were included when the memory category was enabled.

Merged-In: I5e783fbbe91dbe330b49fb11cd7d32ac820e7a5c
Change-Id: I5e783fbbe91dbe330b49fb11cd7d32ac820e7a5c
(cherry picked from commit 45be3aa649)
2020-04-07 16:29:50 +00:00
Collin Fijalkovich
f47e5a828d Merge "Allow Traceur record the mm_event trace event." am: 25e9ff9ddc am: 119d0a451a
Change-Id: Ic5e210a743a04b7b963af492137e816aa80ac062
2020-04-01 17:28:17 +00:00
Collin Fijalkovich
84a845d84c Merge "Allow Traceur record the mm_event trace event." am: 25e9ff9ddc am: 119d0a451a
Change-Id: Iad6489ec58d558395310318b9250b814c751cf05
2020-04-01 17:28:04 +00:00
Collin Fijalkovich
119d0a451a Merge "Allow Traceur record the mm_event trace event." am: 25e9ff9ddc
Change-Id: I72becf852437b269aab4bf70d14810175985f22c
2020-04-01 17:14:15 +00:00
Collin Fijalkovich
2d1e4ce577 Allow Traceur record the mm_event trace event.
Bug: 150130660
Test: Took a trace with Traceur and verified mm_event records
were included when the memory category was enabled.

Change-Id: Iea39467d0d37d12a78fbde57b8d9649fad45b652
2020-03-30 16:23:32 -07:00
Tao Bao
6131110763 Ignore the denial due to vendor_misc_writer reading DT fstab. am: ab38d7073e am: 086085b8ad
Change-Id: I0d9fbabdd5402a0ea3d25b8137fd11d89fc08e24
2020-03-30 14:35:31 +00:00
Tao Bao
086085b8ad Ignore the denial due to vendor_misc_writer reading DT fstab. am: ab38d7073e
Change-Id: I33416cf74bab1bd45fb7eec879391976943c9b00
2020-03-30 14:19:01 +00:00
Tao Bao
ff229fc4b8 Ignore the denial due to vendor_misc_writer reading DT fstab. am: ab38d7073e
Change-Id: I5522be992b05e51d6af245eebb728a57691a56c5
2020-03-30 14:18:56 +00:00
Tao Bao
ab38d7073e Ignore the denial due to vendor_misc_writer reading DT fstab.
This CL addresses the following denial, when vendor_misc_writer tries to
read DT fstab (i.e. device tree fstab) for /misc entry.

avc: denied { search } for comm="misc_writer" name="android" dev="sysfs" ino=17456 scontext=u:r:vendor_misc_writer:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=dir

DT fstab was used for devices shipped prior to Q, for early-mounting
partitions (e.g. /system, /vendor, /product), which has been disallowed
for Q launch devices. vendor_misc_writer is a new module added since Q,
so it doesn't need to worry about the legacy code path; in practice
there's no benefit of putting /misc entry into DT fstab either.

Bug: 134122603
Bug: 152718206
Test: Build and flash taimen with the change that enables
      vendor_misc_writer. Check that it no longer gives the above denial
      during boot.
Change-Id: Id2fb206706f7cd19a4cde2701e4155bfc03f01b4
2020-03-30 11:49:35 +02:00
Steven Thomas
1454af74a3 Allow access to the "refresh_rate_switching" system property
Bug: 147233255
Bug: 136592946
Bug: 138261472

Test: Ran with the patch applied, confirmed surface flinger can access
the system property.

Change-Id: I259a488399c5e698de384322852ea81ea1a96e7d
Merged-In: I259a488399c5e698de384322852ea81ea1a96e7d
Exempt-From-Owner-Approval: Approved internally
2020-03-23 16:01:38 -07:00
Steven Thomas
4ee8089356 Allow access to the "refresh_rate_switching" system property
Bug: 147233255
Bug: 136592946
Bug: 138261472

Test: Ran with the patch applied, confirmed surface flinger can access
the system property.

Change-Id: I259a488399c5e698de384322852ea81ea1a96e7d
Merged-In: I259a488399c5e698de384322852ea81ea1a96e7d
Exempt-From-Owner-Approval: Approved internally
2020-03-20 22:32:15 -07:00
Xin Li
a4a80b828e DO NOT MERGE - Merge qt-qpr1-dev-plus-aosp@6304901 into stage-aosp-master
Bug: 151763422
Change-Id: Ib2023d4664aaf6bbb555a2acc71666d8601693f8
2020-03-19 10:10:44 -07:00
Treehugger Robot
282735ec15 Merge "Allow XML file paths to be customized with sysprop" am: fa4a015fa1 am: e899ee1913
Change-Id: I1a0a851f5a70bc347c981a348eab5e34cf5551aa
2020-03-18 23:26:12 +00:00
Treehugger Robot
9a61042ffe Merge "Allow XML file paths to be customized with sysprop" am: fa4a015fa1 am: e899ee1913
Change-Id: I2ba3cb14676e2e76fe24951812b9a83b225f1e84
2020-03-18 23:26:01 +00:00
Pawin Vongmasa
76d7cf961e Allow XML file paths to be customized with sysprop
Three properties are declared as vendor-init-settable:
ro.media.xml_variant.codecs
ro.media.xml_variant.codecs_performance
ro.media.xml_variant.profiles

media_codecs.xml can now be named
media_codecs${ro.media.xml_variant.codecs}.xml

media_codecs_performance.xml can now be named
media_codecs_performance${ro.media.xml_variant.codecs_performance}.xml

media_profiles_V1_0 can now be named
media_profiles${ro.media.xml_variant.profiles}.xml

Test: Rename "media_codecs.xml" to "media_codecs_test.xml",
set ro.media.xml_variant.codecs to "_test", then
call "stagefright -i".

Test: Rename "media_codecs_performance.xml" to
"media_codecs_performance_test.xml",
set ro.media.xml_variant.codecs_performance to "_test", then
run android.media.cts.VideoDecoderPerfTest.

Test: Rename "media_profiles_V1_0.xml" to "media_profiles_test.xml",
set ro.media.xml_variant.profiles to "_test", then
run vts_mediaProfiles_validate_test.

Bug: 142102953
Change-Id: I407a0a327fcc8e799bb4079b11048a497565be48
2020-03-18 06:02:55 -07:00
Jeff Vander Stoep
a68dd136aa Prevent apps from causing presubmit failures
Apps can cause selinux denials by accessing CE storage
and/or external storage. In either case, the selinux denial is
not the cause of the failure, but just a symptom that
storage isn't ready. Many apps handle the failure appropriately.

These denials are not helpful, are not the cause of a problem,
spam the logs, and cause presubmit flakes. Suppress them.

Bug: 145267097
Bug: 151188413
Test: build

Merged-In: If87b9683e5694fced96a81747b1baf85ef6b2124
Change-Id: If87b9683e5694fced96a81747b1baf85ef6b2124
2020-03-12 08:38:05 +00:00
Jaegeuk Kim
2f5e44eb49 sepolicy: introduce boottime props in public
Bug: 146053177
Bug: 146053658
Bug: 149844577
Change-Id: Iddfefedc4538044c6abcc2eea29b86e3f038aee0
Merged-In: Iddfefedc4538044c6abcc2eea29b86e3f038aee0
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2020-03-08 03:31:10 +00:00
Jaegeuk Kim
9a8ba7f64b sepolicy: introduce boottime props in public
Bug: 146053177
Bug: 146053658
Bug: 149844577
Change-Id: Iddfefedc4538044c6abcc2eea29b86e3f038aee0
Merged-In: Iddfefedc4538044c6abcc2eea29b86e3f038aee0
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
(cherry picked from commit 19df15400e)
2020-03-06 16:48:29 +00:00
Automerger Merge Worker
7ab65fadb7 Add property contexts for dex2oat cpu-set properties am: 23098ec3bb
Change-Id: Ifebf2c5b2780da8175f73135d8c534ce669473b4
2020-03-06 16:19:26 +00:00
Automerger Merge Worker
39aacfaf27 Add property contexts for dex2oat cpu-set properties am: 23098ec3bb
Change-Id: I0efdff9c0d1a911d6b9abd345169b1bb745de7cf
2020-03-06 09:05:39 +00:00
Orion Hodson
23098ec3bb Add property contexts for dex2oat cpu-set properties
New properties are:

 dalvik.vm.dex2oat-cpu-set [default compiler thread affinity]
 dalvik.vm.boot-dex2oat-cpu-set [compiler thread affinity for boot]
 dalvik.vm.image-dex2oat-cpu-set [thread affinity recompiling the boot image]

Bug: 141446571
Bug: 149395059
Test: Run installd tests with new properties defined in target mk file.
Change-Id: Idcbb1332aa9c18f6082b827eae0334d063644a41
(cherry picked from commit 7b2ee48cd2)
2020-03-05 08:48:53 +00:00
Automerger Merge Worker
daa110d022 Update Q sepolicy prebuilt am: 5f6290f3a9
Change-Id: Ie2970158c52e3675e17421ef4973cc926ddd4db5
2020-02-13 04:13:10 +00:00
Automerger Merge Worker
f4ccc4ba1a Update Q sepolicy prebuilt am: 1dd6321a00
Change-Id: I8caa160f6c9e7b86f6bab5848f9027a45c0a16c5
2020-02-12 12:18:45 +00:00
Alex Hong
5f6290f3a9 Update Q sepolicy prebuilt
This updates 29.0 api for dumpstate restart control property contexts

Bug: 147730517
Change-Id: I0aa7450dc0fb34de321cf8d2ba357b2ecabbcf43
2020-02-12 12:07:43 +08:00
Alex Hong
1dd6321a00 Update Q sepolicy prebuilt
This updates 29.0 api for dumpstate restart control property contexts

Bug: 147730517
Change-Id: I0aa7450dc0fb34de321cf8d2ba357b2ecabbcf43
2020-02-11 13:53:22 +08:00
Jaegeuk Kim
028f2c3453 Merge "block: allow init.rc to tune max discard size" into qt-qpr1-dev 2020-02-01 01:49:24 +00:00
Jaegeuk Kim
2b1e595e8f block: allow init.rc to tune max discard size
Init.rc requires to limit max discard to avoid long latencies.

Bug: 148209614
Change-Id: Idf3b295ac15efd5edf979ca896fdf826b9fc3c99
Merged-In: Idf3b295ac15efd5edf979ca896fdf826b9fc3c99
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2020-01-23 20:02:58 +00:00
Automerger Merge Worker
b354eba19c Merge "Allow adb start/stop mdnsd via ctl.start/stop" into qt-qpr1-dev am: 2192ec6223
Change-Id: I1bafff0ae8087a3c72209eb2a6edcaddc1e5d463
2020-01-17 18:44:15 +00:00
TreeHugger Robot
2192ec6223 Merge "Allow adb start/stop mdnsd via ctl.start/stop" into qt-qpr1-dev 2020-01-17 18:31:09 +00:00
Automerger Merge Worker
4e77006163 system_server: TelephonyManager reads /proc/cmdline am: 2951b4859d
Change-Id: I37906d269428d5e691395a1908aed9f647c27e11
2020-01-16 17:03:55 +00:00
Changyeon Jo
60c4276c15 Allow adb start/stop mdnsd via ctl.start/stop
Bug: 128345139
Test: make selinux_policy
Change-Id: I477d6d94c16974f23f703d5f334ef108279ab3bb
Signed-off-by: Changyeon Jo <changyeon@google.com>
(cherry picked from commit cfeaa1c664)
2020-01-16 08:26:51 -08:00
Jeff Vander Stoep
2951b4859d system_server: TelephonyManager reads /proc/cmdline
Bug: 124466646
Test: build
Change-Id: Ib4868826eb153543c65503bfb4d3623c4158ffae
(cherry picked from commit 29b76e2ceec2ab1e04715657a79b6544afdf09c9)
2020-01-15 13:43:33 -08:00
Automerger Merge Worker
5872ab6c4b Merge "Allow adb forward to traced consumer socket" into qt-qpr1-dev am: 49807a6c26
Change-Id: I74e1c98fa883a287139a714b1e263ad85c5e8bf0
2020-01-11 00:45:21 +00:00
TreeHugger Robot
49807a6c26 Merge "Allow adb forward to traced consumer socket" into qt-qpr1-dev 2020-01-11 00:32:36 +00:00
Hector Dearman
c0bad7b98f Allow adb forward to traced consumer socket
Currently shell can connect to the traced_consumer_socket allowing it to
configure/start/stop and collect traces. This allows a host tool (e.g. Android Studio or
https://ui.perfetto.dev) to connect to the device via adb and collect traces. It would
be better if rather than executing shell commands the host tool could directly communicate
with the consumer socket. This is possible using adb forward:

adb forward tcp:9903 localfilesystem:/dev/socket/traced_consumer

However in this case adbd is connecting to the socket - not shell.

This CL allows adbd to connect to the socket which allows host tools to collect
traces without having to do everything though shell commands.

Note that this patch also has additional change on prebuilts in order to
backport.

Denial:
08-30 11:28:05.809 10254 10254 W adbd    : type=1400 audit(0.0:1129): avc: denied { write } for name="traced_consumer" dev="tmpfs" ino=6719 scontext=u:r:adbd:s0 tcontext=u:object_r:traced_consumer_socket:s0 tclass=sock_file permissive=0

Test: Cherry pick CL to master, make, flash
adb logcat | grep denied
adb forward tcp:9903 localfilesystem:/dev/socket/traced_consumer

Bug: b/139536756
Change-Id: Ie08e687c0b06d0e1121009e8cd70319a8f907ae2
(cherry-picked from commit b56a49d979)
2020-01-10 09:17:27 -08:00
Automerger Merge Worker
ffbc6ab3ad Revert "Revert "Allow dumpstate to dumpsys gpu"" am: b5c47df035
Change-Id: Ic486302dbcf93e2987fe250ef87bc23b4e9d5897
2020-01-10 08:15:48 +00:00
Yiwei Zhang
b5c47df035 Revert "Revert "Allow dumpstate to dumpsys gpu""
This reverts commit 6daec46264.

Reason for revert: b/147458874

Bug: 132402890
Test: build passes on coral-userdebug

Change-Id: Ibcbc06e99561be424aa953e62985abb5b5864c56
2020-01-09 18:51:24 -08:00
Automerger Merge Worker
c188e2deca Merge "Create new system property type for Factory OTA could write system property" am: a75fa8058c am: 150bdab002
Change-Id: I092b89446bf37e9fa23163519835491c5e4cb07c
2019-12-15 19:38:22 +00:00
Treehugger Robot
a75fa8058c Merge "Create new system property type for Factory OTA could write system property" 2019-12-15 19:26:39 +00:00
Henry Tung
6d57b494c0 Create new system property type for Factory OTA could write system property
Due to Factory OTA client install in product partition but it also declare coredomian in
its sepolicy setting. That will let Factory OTA unable to find a property type could write system property.
But now Factory OTA have a restore NFC wake function need to write system property for communicate with bootloader.
So we need to create a new property type in system framework which could allow Factory OTA client to write system property.

Bug: 145178094
Test: Manual
Change-Id: Ic549cc939893ec67a46bf28a23ebeb9f9b81bd0b
2019-12-13 09:39:19 +00:00
Automerger Merge Worker
2225c5ea6e Allow vendor_init to modify pm.dexopt.disable_bg_dexopt am: 4c06707b5e
Change-Id: I7cded22281ade995b060641209ae84d37c55a583
2019-12-11 21:55:50 +00:00
Jaegeuk Kim
aec7c5fed4 Merge "block: allow init.rc to tune max discard size" 2019-12-06 21:59:19 +00:00
Eric Jeong
4c06707b5e Allow vendor_init to modify pm.dexopt.disable_bg_dexopt
- Android Auto has disabled background dexopt (b/142753051).
- The modification is in car_base.mk which is included by vendor device
file.
- So, vendor_init needs to be able to modify
pm.dexopt.disable_bg_dexopt property.

Bug: 145348176
Test: Check pm.dexopt.disable_bg_dexopt is set to true in Android Auto
device.

Cherry-Picked-From: 03b1992d0bf363e438b0fd7efca1e2a1d7249320
Change-Id: I84d19ea62f1abe1bf9206a60ca103614616e312b
2019-12-06 10:40:12 -08:00
Jaegeuk Kim
a47abdbe16 block: allow init.rc to tune max discard size
Init.rc requires to limit max discard to avoid long latencies.

Change-Id: Idf3b295ac15efd5edf979ca896fdf826b9fc3c99
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2019-12-04 12:26:19 -08:00
Florian Mayer
d77fec4796 Allow shell to unlink perfetto_traces_data_file.
Bug: 141704436
Test:
blueline:/ $ ls -lZa /data/misc/perfetto-traces
total 186
drwxrwx-wx  2 root   shell u:object_r:perfetto_traces_data_file:s0    3488 2019-09-30 14:12 .
drwxrwx--t 46 system misc  u:object_r:system_data_file:s0             3488 2019-09-30 14:08 ..
-rw-------  1 shell  shell u:object_r:perfetto_traces_data_file:s0  180467 2019-09-30 14:12 profile-shell
blueline:/ $ rm /data/misc/perfetto-traces/profile-shell
rm ro /data/misc/perfetto-traces/profile-shell (y/N):y
blueline:/ $ ls -lZa /data/misc/perfetto-traces
total 6
drwxrwx-wx  2 root   shell u:object_r:perfetto_traces_data_file:s0  3488 2019-09-30 14:13 .
drwxrwx--t 46 system misc  u:object_r:system_data_file:s0           3488 2019-09-30 14:08 ..
blueline:/ $

Cherry pick of c069bc134e

Change-Id: Ia710068c3cca53a415347fb0a7064740e500d15d
Merged-In: Ia710068c3cca53a415347fb0a7064740e500d15d
2019-10-29 10:32:35 +00:00
Xin Li
7883f6b3c1 DO NOT MERGE - Merge QD1A.190821.011 into stage-aosp-master
Bug: 141248619
Change-Id: I3186316d366cc7c9fee29cef5d2cd6ef37ff3926
2019-10-14 22:53:21 +00:00
Pierre-Hugues Husson
03f2bb6792 Merge "Mark mediacodec_2{6,7,8} as hal_omx_server" am: cc3f943436 am: 0608b6cdfb
am: 95dbe16e99

Change-Id: Ied2eaa4c259bec3460926d4ad892514bd6e6e5e7
2019-10-01 19:22:00 -07:00
Pierre-Hugues Husson
95dbe16e99 Merge "Mark mediacodec_2{6,7,8} as hal_omx_server" am: cc3f943436
am: 0608b6cdfb

Change-Id: I0d3e5a2becbe1f94f91aafa1defb7f63fe9af14e
2019-10-01 19:15:58 -07:00
Pierre-Hugues Husson
0608b6cdfb Merge "Mark mediacodec_2{6,7,8} as hal_omx_server"
am: cc3f943436

Change-Id: Ie70d97c980afe0d830344c011408eb9110f73752
2019-10-01 19:09:57 -07:00
Pierre-Hugues Husson
1019870fba Mark mediacodec_2{6,7,8} as hal_omx_server
The commit 7baf725ea6 broke OMX on O/O-MR1(/P?) vendors.
Previous to this commit, all OMX codecs had to use "mediacodec" type,
after this commit, omx codecs just had to get hal_omx_server attribute.
This commit left to the vendor the charge of adding "hal_omx_server"
attribute to mediacodec.

However this can't work on non-Q vendors.

On P vendor, versioned_plat_pub contains the appdomain <=> mediacodec
allows, so OMX isn't technically broken on those devices.
But to ensure it won't break in the future, mark 28's mediacodec as
hal_omx_server as well

This fixes broken OMX decoding on O/O-MR1 vendors, failing with the
following denial:
avc: denied { call } for comm=4E444B204D65646961436F6465635F scontext=u:r:platform_app:s0:c512,c768 tcontext=u:r:mediacodec:s0 tclass=binder permissive=0

Bug: 141186440

Change-Id: I018f8d9aabc77e7ea86ca14734b1ab2edfdf8ed1
2019-10-01 20:48:01 +00:00
Paul Crowley
908a9c6f16 Merge "Export vold FDE algorithm properties" am: 8cb6460058 am: fa2cc0539e
am: fb0c7a23e2

Change-Id: I853eda4a989719d6112ffb2d14d64c54c32c3709
2019-09-25 10:16:17 -07:00
Paul Crowley
fb0c7a23e2 Merge "Export vold FDE algorithm properties" am: 8cb6460058
am: fa2cc0539e

Change-Id: I72c5085569b8a8e9fd9ea8777979d1ddf44de0f2
2019-09-25 10:09:38 -07:00
Paul Crowley
fa2cc0539e Merge "Export vold FDE algorithm properties"
am: 8cb6460058

Change-Id: I912cca35978e934dfc1458cee946f0f0c24760f5
2019-09-25 10:02:47 -07:00
yuguoxu
a894a1aa66 Export vold FDE algorithm properties
ro.crypto.fde_algorithm
ro.crypto.fde_sector_size
ro.crypto.volume.contents_mode

These properties were not added to sepolicy export2vold. vold can't access
crypto algorithm type when flashing a GSI image and when the properties are in
/vendor/build.prop. This prevents FDE from working.

Bug: 141518844
Change-Id: I234bda439f6be7a2211a194856baf75800396232
Signed-off-by: yuguoxu <yuguoxu@allwinnertech.corp-partner.google.com>
2019-09-25 16:29:54 +00:00
Paul Crowley
859f9211d8 Allow toolbox to rm -rf /data/per_boot
Bug: 140882488
Test: create files and dirs in /data/per_boot, check they're removed.
Cherry-Picked-From: 2367ba358f
Merged-In: Idf0ba09cbe51cbff6a7b2a464c4651a1f7fcf343
Change-Id: Idf0ba09cbe51cbff6a7b2a464c4651a1f7fcf343
2019-09-17 18:44:13 +00:00
Roland Levillain
695e2c15bb Allow dexoptanalyzer to mmap files with Linux 4.14+ that it can already access.
am: d8a9a493c5

Change-Id: I016d5846fc9bc21c46882c16ff17de535fa5974e
2019-09-13 12:30:17 -07:00
Roland Levillain
d8a9a493c5 Allow dexoptanalyzer to mmap files with Linux 4.14+ that it can already access.
SELinux has a separate file mmap permission in 4.14+ kernels. Add this
to dexoptanalyzer(d) in cases where it could already access files (in
particular, secondary dex files).

Addresses denials of the form:

  avc: denied { map } for […] path="/data/data/[…]" […]
  scontext=u:r:dexoptanalyzer:s0 tcontext=u:object_r:app_data_file:s0

(cherry picked from commit c72b7d1731)

Test: Reproduce steps in bug 138683603 on a device with a 4.14+ kernel
      and check the absence of SELinux denials
Bug: 138683603

Change-Id: Ieba53eb431c0ba3914dcb5e5abdae667bd063555
2019-09-13 13:45:40 +01:00
Xin Li
36edee480d Merge qt-r1-dev-plus-aosp-without-vendor (5817612) into stage-aosp-master
Bug: 135460123
Change-Id: Ie43761a96540ce489b65d9ba467ebdfa2dfe6066
Merged-In: I87a1ce741a77f5bd3a4ea81f1c519f7c1955a3c6
2019-09-08 13:07:03 -07:00
Paul Lawrence
9f38ee2021 Merge "Fix ext4/metadata/udc problem" am: 4d40aefa4b am: 31e6fa2075
am: 8134966f21

Change-Id: Ifdb5da049d4c1cd60e68d684b7e96ddf6c287500
2019-08-27 09:09:59 -07:00
Paul Lawrence
31e6fa2075 Merge "Fix ext4/metadata/udc problem"
am: 4d40aefa4b

Change-Id: I6d445070b533d3353a714fb043102c0be00cc883
2019-08-27 08:44:48 -07:00
Paul Lawrence
4d40aefa4b Merge "Fix ext4/metadata/udc problem" 2019-08-27 15:21:58 +00:00
Daniel Solomon
8e65285ec5 selinux: Update Q sepolicy prebuilt
am: 3248182855

Change-Id: I35a78cd9208439c9fc89c20ea546081fb5d4b4f2
2019-08-26 23:44:02 -07:00
Xin Li
65227a4be7 DO NOT MERGE - Merge build QP1A.190711.019 into stage-aosp-master
Bug: 139893257
Change-Id: I4a36357883efe369754e3ec08541e05f847b28ce
2019-08-23 06:45:27 +00:00
Daniel Solomon
732de6c2da selinux: Update Q sepolicy prebuilt
am: 3248182855

Change-Id: I0bb332cbb95c64d67c62527c5b34ff0298102e3d
2019-08-21 20:05:23 -07:00
Daniel Solomon
3248182855 selinux: Update Q sepolicy prebuilt
Tag gpu_service as app_api_service. This is the corresponding api 29.0
change to the public service.te from commit aosp/1105058
(I30a951cd712b0ae4aacd2c4d6d42e74fac5c0707).

Bug: 139685237
Test: m selinux_policy
Change-Id: Ia23cdd5f59b40a3e99cae424d9cf41d5e7442631
2019-08-21 17:10:37 -07:00
Carmen Jackson
afac97a16d Allow Traceur to record the suspend_resume trace event
This should be available in user and userdebug builds.

Bug: 137289935
Test: Alongside atrace changes, recorded a trace using Traceur and
verified that the tracepoints were included in the recorded trace in
both user and userdebug builds.

Change-Id: I6131557bdd0a298be9e75b39759599b189b9b988
Merged-In: I6131557bdd0a298be9e75b39759599b189b9b988
2019-08-13 17:13:00 +00:00
Carmen Jackson
dc43a0049b Allow Traceur to record the suspend_resume trace event am: 1e414b5355 am: 5860205f67
am: e46d7c3ce4

Change-Id: Icc034caa25d2cc57ff2988e7a89e33a8f5aa0dec
2019-08-13 01:35:36 -07:00
Carmen Jackson
e46d7c3ce4 Allow Traceur to record the suspend_resume trace event am: 1e414b5355
am: 5860205f67

Change-Id: I3881e0a4acac844f93822e9a28fe052d199c5c40
2019-08-13 01:28:53 -07:00
Carmen Jackson
5860205f67 Allow Traceur to record the suspend_resume trace event
am: 1e414b5355

Change-Id: I32de6f61520474f1cb9895e416ba409847082e6d
2019-08-13 01:13:23 -07:00
Carmen Jackson
1e414b5355 Allow Traceur to record the suspend_resume trace event
This should be available in user and userdebug builds.

Bug: 137289935
Test: Alongside atrace changes, recorded a trace using Traceur and
verified that the tracepoints were included in the recorded trace in
both user and userdebug builds.

Change-Id: I6131557bdd0a298be9e75b39759599b189b9b988
2019-08-09 10:56:15 -07:00
Paul Lawrence
37739146b6 Fix ext4/metadata/udc problem
Test: Cannot currently test since no device supports this combo
Bug: 137924328
Change-Id: Ie59e6c37e293c983e99618eacda9fd09c2ce01ed
2019-08-08 08:55:29 -07:00
Ady Abraham
f8aebbaa5d Merge "Add ro.surface_flinger.set_display_power_timer_ms to sepolicy" into qt-r1-dev
am: 74395f1ff4

Change-Id: I2abb139843bc425d276145d27d00c0f3acf5d30a
2019-07-16 15:54:52 -07:00
Ady Abraham
74395f1ff4 Merge "Add ro.surface_flinger.set_display_power_timer_ms to sepolicy" into qt-r1-dev 2019-07-16 22:40:52 +00:00
Daniel Rosenberg
eb1cf76b70 sepolicy: Adjust policy for migrate_legacy_obb_data.sh
Required to check if migration is necessary and migrate obb contents

Bug: 136199978
Test: make
Change-Id: I23890e4eeea1da7791e25ce5c9584b1abe94f440
(cherry picked from commit 793dc8f8da)
2019-07-16 02:55:25 +00:00
Daniel Rosenberg
0f6312f1d2 Merge "sepolicy: Adjust policy for migrate_legacy_obb_data.sh" into qt-dev am: a85c5360ab
am: 73c8c81d7e

Change-Id: I785f5c739ef9e96d0b8bc5d2939281fc5c7e8c18
2019-07-15 13:32:57 -07:00
Daniel Rosenberg
73c8c81d7e Merge "sepolicy: Adjust policy for migrate_legacy_obb_data.sh" into qt-dev
am: a85c5360ab

Change-Id: Id7800116e2ad5f2b4ce4a757b3c9c6bd61685c5e
2019-07-15 13:22:06 -07:00
Daniel Rosenberg
640ead1a51 Merge "sepolicy: Adjust policy for migrate_legacy_obb_data.sh" into qt-dev
am: a85c5360ab

Change-Id: I9cf4bf773a5c7d36922bb590f74e283c565673c8
2019-07-15 13:21:54 -07:00
Daniel Rosenberg
a85c5360ab Merge "sepolicy: Adjust policy for migrate_legacy_obb_data.sh" into qt-dev 2019-07-15 19:56:35 +00:00
Daniel Rosenberg
793dc8f8da sepolicy: Adjust policy for migrate_legacy_obb_data.sh
Required to check if migration is necessary and migrate obb contents

Bug: 136199978
Test: make
Change-Id: I23890e4eeea1da7791e25ce5c9584b1abe94f440
2019-07-12 16:35:20 -07:00
Ady Abraham
40909f65a6 Add ro.surface_flinger.set_display_power_timer_ms to sepolicy
Bug: 135550670
Test: Boot with SELinux enforcing
Change-Id: I61c30abc39909a263a2c402a5c0eb1de570748bb
2019-07-12 12:43:25 -07:00
Thierry Strudel
b8c28bdc96 Merge "SF: enable device-specific dataspace for color space agnostic surfaces" into qt-r1-dev
am: d519b1ca7c

Change-Id: I65664b9072278b2dd6d43ad564670a03defdaed7
2019-07-08 17:34:13 -07:00
Thierry Strudel
d519b1ca7c Merge "SF: enable device-specific dataspace for color space agnostic surfaces" into qt-r1-dev 2019-07-09 00:15:22 +00:00
Sidath Senanayake
0ea109059f Update API 29 prebuilts to include gpu_frequency tracepoint am: 31056ae11d am: 72883eff9c
am: b76450761a

Change-Id: I868cdaac753727f3ccaf92fceca00cbc8aabc2f1
2019-07-03 19:17:17 -07:00
Sidath Senanayake
72883eff9c Update API 29 prebuilts to include gpu_frequency tracepoint
am: 31056ae11d

Change-Id: I4ff4a43d337dff01e90fcea9d78e7eb241d4aaf5
2019-07-03 17:25:39 -07:00
Sidath Senanayake
31056ae11d Update API 29 prebuilts to include gpu_frequency tracepoint
Bug: 136289121
Change-Id: I2fb013d46ab72b29a83754b5199816d080bce534
2019-07-03 16:32:18 +01:00
Yichi Chen
39efa50184 SF: enable device-specific dataspace for color space agnostic surfaces
To reduce the DPU loading in color conversion, we enable device-specific
dataspace for color space agnostic surfaces. Since the type of surfaces
usually provide gray-level surfaces to users, it can be acceptable to
ignore the color conversion on them.

Bug: 134783740
Bug: 135140940
Test: Check ScreenDecorOverlays in expected dataspace
Test: Play HDR video on C2 and check dataspace
Change-Id: Ief32f0ff3867b2e154fecd6c9ebd6610b0e6ed11
2019-07-03 20:24:42 +08:00
Sidath Senanayake
b1d6eb979e Allow perfetto to access gpu_frequency tracepoint in user
am: 9bfaa1c4dd

Change-Id: Ie0ec9a00dab4c2d8aea365fb95b708aee8ef09d0
2019-07-02 13:00:52 -07:00
Sidath Senanayake
9bfaa1c4dd Allow perfetto to access gpu_frequency tracepoint in user
This will allow Perfetto to capture GPU frequency changes
on the target, which is useful to graphics developers
using Perfetto to profile graphics HW usage.

This change also updates the private prebuilt at version
29.0 to match the update.

Bug: 136062452
Merged-In: Idb7870b2f674f1359ef3b4487dbeff190b394248
Change-Id: Ib98ba10d96caa199d7030be3a17148045576a80c
2019-06-28 20:13:05 +01:00
Todd Kennedy
efc2dbb26e Allow rule to let settings access apex files
am: 9067699d9d

Change-Id: Id3541133ffa48e7685f8e8195f5c585ea8fe9630
2019-06-28 10:32:32 -07:00
Andrew Sapperstein
ea1bd922f6 Merge "Revert "Revert "Allow rule to let settings access apex files""" am: 6eaf8a2d62 am: 48353bf0af
am: 41ca891c57

Change-Id: Idf332f592d50734b9751b145c237f2c9d29e34fe
2019-06-28 10:06:56 -07:00
Cosmo Hsieh
1d84c81370 Merge "Revert "Allow rule to let settings access apex files"" am: 71e1c36956 am: be678acc85
am: 7f1dd65024

Change-Id: Ie1ca6f6bf2e1b7d956583a7eaa32ebbe7c04a89e
2019-06-28 09:39:54 -07:00
Andrew Sapperstein
41ca891c57 Merge "Revert "Revert "Allow rule to let settings access apex files""" am: 6eaf8a2d62
am: 48353bf0af

Change-Id: I91b9edc07fbc1cbefae611017c409a9bfd27bf0e
2019-06-28 09:30:18 -07:00
Cosmo Hsieh
7f1dd65024 Merge "Revert "Allow rule to let settings access apex files"" am: 71e1c36956
am: be678acc85

Change-Id: I29ea36768d5b129777eb41cd3275f25b14f8edf0
2019-06-28 09:16:02 -07:00
Andrew Sapperstein
a8b6c0f0bf Merge "Allow rule to let settings access apex files" am: bfe6fdedba am: f7c9b8a1fc
am: 9b6ad1d5b0

Change-Id: I8384127510e8e45821ea4ec9785e4e784135e506
2019-06-28 09:13:29 -07:00
Andrew Sapperstein
9b6ad1d5b0 Merge "Allow rule to let settings access apex files" am: bfe6fdedba
am: f7c9b8a1fc

Change-Id: Ie8a88d458f234477d2311a6a8f0f9fde3533de5c
2019-06-28 09:03:26 -07:00
Andrew Sapperstein
544a9b1c51 Revert "Revert "Allow rule to let settings access apex files""
This reverts commit e47d2365a8.

Reason for revert: Original CL was not the cause of the breakage. It went green before this revert landed. https://android-build.googleplex.com/builds/branches/aosp-master/grid?

Original CL went in 5695273.
Went green in 5695399.
Revert went in 5695588.

Change-Id: Ie4d7065fe7d3c58cdff99c2b7d76b50b941895bb
2019-06-28 15:28:28 +00:00
Cosmo Hsieh
e47d2365a8 Revert "Allow rule to let settings access apex files"
This reverts commit 0c0ba46192.

Reason for revert: <Broken build 5695273 on aosp-master on aosp_x86_64-eng>

Change-Id: I763f19aa5b72f2e1aaebbc78bb8ab3020c3d2a7b
2019-06-28 09:51:28 +00:00
Todd Kennedy
0c0ba46192 Allow rule to let settings access apex files
In order to show licensing information, we need to read it from
an asset stored in the .apex file.

Bug: 135183006
Test: Manual; settings can access apex files stored on /data
Change-Id: I71fbde6e295d9c890c9b9b0449e5150834a6680e
2019-06-27 18:34:25 +00:00
Todd Kennedy
9067699d9d Allow rule to let settings access apex files
In order to show licensing information, we need to read it from
an asset stored in the .apex file.

Bug: 135183006
Test: Manual; settings can access apex files stored on /data
Change-Id: I71fbde6e295d9c890c9b9b0449e5150834a6680e
Merged-In: I71fbde6e295d9c890c9b9b0449e5150834a6680e
2019-06-27 11:32:49 -07:00
Oliver Nguyen
bf513525a4 Merge "In native coverage builds, allow all domains to access /data/misc/trace" into qt-dev am: 72a75ffe19
am: 75f2c87c8a

Change-Id: Iae83e01bc56d5bc0c631251be18f7395a6d1bd87
2019-06-20 16:17:04 -07:00
Oliver Nguyen
0012d6574c Merge "In native coverage builds, allow all domains to access /data/misc/trace" into qt-dev
am: 72a75ffe19

Change-Id: I93de590b94ce57c8ad87361ddb3b6188552854c7
2019-06-20 15:42:32 -07:00
Oliver Nguyen
75f2c87c8a Merge "In native coverage builds, allow all domains to access /data/misc/trace" into qt-dev
am: 72a75ffe19

Change-Id: I86d660a7402876aa9bfad72ef6c6e75771f376cd
2019-06-20 15:38:24 -07:00
Oliver Nguyen
72a75ffe19 Merge "In native coverage builds, allow all domains to access /data/misc/trace" into qt-dev 2019-06-20 19:07:41 +00:00
Kevin Chyn
741f8214cb Add rules to dump hal traces am: 6d976f4d5d
am: 20ca587019

Change-Id: Ia6bd656a5cfaf4f408178352a5c164e979ad4c74
2019-06-19 19:59:58 -07:00
Kevin Chyn
15ff564438 Add rules to dump hal traces
am: 6d976f4d5d

Change-Id: Ia0e7b39d215b9306b724135f7d888593f3c76aae
2019-06-19 19:06:04 -07:00
Kevin Chyn
20ca587019 Add rules to dump hal traces
am: 6d976f4d5d

Change-Id: I7077ceb75ff9e5c4d13acebbffe03089b9952a99
2019-06-19 18:39:21 -07:00
Pirama Arumuga Nainar
b65824642b In native coverage builds, allow all domains to access /data/misc/trace
Bug: http://b/135139675

Coverage files are written to /data/misc/trace (governed by the
method_trace_data_file selinux type).  Allow all domains to access
(create directories, access files) this directory when native coverage
is enabled (by setting NATIVE_COVERAGE to true) in an userdebug or eng
build.

Also relax neverallow constraints to allow access to
method_trace_data_file for native coverage builds.

Test: Build 32-bit cuttlefish with coverage:
          m NATIVE_COVERAGE=true COVERAGE_PATHS="*"
      and verify that there are no selinux denials in kernel log and
      logcat.

Change-Id: I3fe7c77612854b9de7de7a0ddd5cbf44a2f5c21e
(cherry picked from commit ce9c0c5a5f)
2019-06-19 16:27:17 -07:00
Kevin Chyn
6d976f4d5d Add rules to dump hal traces
Test: manual
Bug: 126802513

Change-Id: If037483f305e161a158e30f6322d5e25b7770952
2019-06-19 19:55:14 +00:00
Benjamin Schwartz
f324a869a7 Merge "Add power stats HAL to ANR list" into qt-r1-dev
am: 9af52722db

Change-Id: I94fb6bd5122593180359df4437689ab912e12f9c
2019-06-19 12:07:36 -07:00
TreeHugger Robot
9af52722db Merge "Add power stats HAL to ANR list" into qt-r1-dev 2019-06-19 18:53:05 +00:00
Benjamin Schwartz
8273f1915f Add power stats HAL to ANR list
Bug: 135111122
Test: Ran "adb shell am hang" and verified that power.stats HAL
information is in /data/anr/<anr_file>
Change-Id: I60a6191626a20c737124033e8ad453fa91425e39
2019-06-19 15:36:22 +00:00
Tao Bao
1520895967 Merge "Add persist.sys.theme." into qt-dev
am: 890dba4999

Change-Id: Ia747bf55b5275a8b05a3dbb971c82747b4292807
2019-06-18 20:25:32 -07:00
Tao Bao
a999e39423 Add persist.sys.theme.
This property will be set by system_server (to indicate the currently
selected theme for device), and can be accessed by vendor init.rc.

avc:  denied  { read } for property=persist.sys.theme pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:theme_prop:s0 tclass=file

Bug: 113028175
Test: Set a vendor init trigger that waits on `persist.sys.theme`. Check
      that the trigger fires without denial.
Change-Id: Ia85b1a8dfc118efdbb9337ca017c8fb7958dc386
Merged-In: Ibb4e392d5059b76059f36f7d11ba82cd65cbe970
(cherry picked from commit 75182a1ea6)
2019-06-18 17:36:21 -07:00
Tao Bao
890dba4999 Merge "Add persist.sys.theme." into qt-dev 2019-06-19 00:36:03 +00:00
Hridya Valsaraju
351f85a4ee Add permission required by libdm_test
am: 9bb71537ac

Change-Id: I18326abc7713f95ee027e476a96ce32905a9525f
2019-06-17 21:15:34 -07:00
Hridya Valsaraju
9bb71537ac Add permission required by libdm_test
This CL fixes the following denials during libdm_test
that is part of VTS.

avc: denied { read } for comm="loop1" path=2F6D656D66643A66696C655F32202864656C6574656429
dev="tmpfs" ino=97742 scontext=u:r:kernel:s0 tcontext=u:object_r:appdomain_tmpfs:s0
tclass=file permissive=0
W loop1   : type=1400 audit(0.0:371): avc: denied { read } for
path=2F6D656D66643A66696C655F32202864656C6574656429 dev="tmpfs" ino=97742 scontext=u:r:kernel:s0
tcontext=u:object_r:appdomain_tmpfs:s0 tclass=file permissive=0

Bug: 135004816
Test: adb shell libdm_test
Change-Id: Ifb6d58ee6f032cdf3952a05667aa8696d6e2a2fa
2019-06-17 22:46:03 +00:00
Tao Bao
75182a1ea6 Add persist.sys.theme.
This property will be set by system_server (to indicate the currently
selected theme for device), and can be accessed by vendor init.rc.

avc:  denied  { read } for property=persist.sys.theme pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:theme_prop:s0 tclass=file

Bug: 113028175
Test: Set a vendor init trigger that waits on `persist.sys.theme`. Check
      that the trigger fires without denial.
Change-Id: Ibb4e392d5059b76059f36f7d11ba82cd65cbe970
2019-06-17 10:48:21 -07:00
Jeff Vander Stoep
b4ad398ca9 Merge "system_server_startup: allow SIGCHLD to zygote" into qt-dev
am: 6dc831d2fb

Change-Id: I1f83d7940955d3c20bc025f106cd9580a5811d7f
2019-06-15 17:45:03 -07:00