Commit graph

22357 commits

Author SHA1 Message Date
evitayan
ddcaa5810f Add file_contexts for com.android.ipsec
com.android.ipsec will be shipped as a mainline module in APEX
format. A file_contexts is required for building an APEX.

Bug: 143905344
Test: Built and installed apex on device
Change-Id: I9f9a6190886181e9e4254ea2a984d338fda533da
2019-11-08 22:03:33 +00:00
Tri Vo
af9214d16a Merge "system_suspend access to suspend, wakeup stats" 2019-11-08 21:58:33 +00:00
Suren Baghdasaryan
b7203825f2 Merge "allow init to communicate with lmkd and lmkd to kill native processes"
am: 812f7da4dc

Change-Id: Ib9d97975e6f51f2a8a31c40547b54bcc5b0bbfaa
2019-11-08 09:41:15 -08:00
Suren Baghdasaryan
812f7da4dc Merge "allow init to communicate with lmkd and lmkd to kill native processes" 2019-11-08 17:25:10 +00:00
Yifan Hong
667b71010a snapshotctl: talk to bootcontrol HAL
Test: OTA then merge
Change-Id: Ifdb23070de4e7d8ae4a7ef7d5a6435f101c8b410
2019-11-07 14:49:25 -08:00
Tri Vo
5f1ac02157 system_suspend access to suspend, wakeup stats
Android is moving away from debugfs. Information from /d/wakeup_sources
and /d/suspend_stats is now also exposed in sysfs under
/sys/class/wakeup/* and /sys/power/suspend_stats/* respectively:

  https://lkml.org/lkml/2019/7/31/1349
  https://lkml.org/lkml/2019/8/6/1275

Allow SystemSuspend to read those sysfs nodes.

One caveat is that /sys/class/wakeup/wakeupN can be a symlink to a
device-specific location. In this case, device sepolicy should label
that the files appropriately. This is similar to how device policy
applies "sysfs_net" and "sysfs_batteryinfo" labels.

Bug: 144095608
Bug: 129087298
Test: boot cuttlefish; system_suspend is able to read
/sys/power/suspend_stats/* and /sys/class/wakeup/*
Change-Id: I350c88a271c0f422d0557aeb5e05e1537dc97bc9
2019-11-07 13:50:32 -08:00
Eric Laurent
13f4f2ddee Merge "audioserver: allow audioserver to generate audio HAL tombstones"
am: 8751aa64d7

Change-Id: Ib5c4a182dc6c56766ab6e633e5f6ee7fdb0e16f8
2019-11-07 10:40:26 -08:00
Sudheer Shanka
55f9229ec4 Merge "Add a new system service "blob_store"."
am: 426f2e77c0

Change-Id: I1613cdda7213b2c842cb9e7e43cbfdf4d69c2f39
2019-11-07 10:25:17 -08:00
Eric Laurent
8751aa64d7 Merge "audioserver: allow audioserver to generate audio HAL tombstones" 2019-11-07 18:20:19 +00:00
Suren Baghdasaryan
ee57f177d8 allow init to communicate with lmkd and lmkd to kill native processes
init should register native services with lmkd so that they can be killed
when necessary. Allow init to communicate with lmkd over dedicated socket
the same way AMS does. Allow lmkd to kill and manipulate native processes
that were registered with lmkd.

Bug: 129011369
Test: boot and verify native service registration
Test: verify lmkd can kill registered native processes using lmkd_unit_test
Change-Id: Idfc814bd08115c548e97f11a6bdb006790cbb4ed
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
2019-11-07 18:19:44 +00:00
Sudheer Shanka
426f2e77c0 Merge "Add a new system service "blob_store"." 2019-11-07 18:04:24 +00:00
James Lin
5f4ff281ba Merge "[RCS] Add service context of sepolicy of Context.TELEPHONY_IMS_SERVICE"
am: bd0628f347

Change-Id: I436942e946e5385bf108507c6d808fd90ba397b3
2019-11-06 19:33:27 -08:00
James Lin
bd0628f347 Merge "[RCS] Add service context of sepolicy of Context.TELEPHONY_IMS_SERVICE" 2019-11-07 03:26:08 +00:00
Ashwini Oruganti
955ae05149 Merge "Don't require seinfo for priv-apps"
am: 0febe659aa

Change-Id: I6d4c4656f8b31e6aaa2420940acff6486bc11d96
2019-11-06 17:27:45 -08:00
Ashwini Oruganti
0febe659aa Merge "Don't require seinfo for priv-apps" 2019-11-07 01:05:09 +00:00
Ram Muthiah
1e26f6b72b Update kernel permissions to pass libdm snapshot unit test
am: b46ef107f9

Change-Id: Icf5c7248f1006b5004e6defc03d0408d2063fe31
2019-11-06 15:39:14 -08:00
Ashwini Oruganti
04f771dee4 Don't require seinfo for priv-apps
Relax the requirement to have both seinfo and name specified for
privapps. The original reason for requiring both was because, normally,
a package can only be uniquely specified by both name and signature,
otherwise package squatting could occur. However, privapps are
pre-installed, so the concerns about the potential for package squatting
are eliminated. This change will drastically simplify sepolicy
configuration for priv-apps.

Bug: 142672293
Test: Flashed a device with this build and verified
com.google.android.permissioncontroller still  runs in the
permissioncontroller_app domain.
Change-Id: I5bb2bf84b9db616c4492bd1402550821c70fdd07
2019-11-06 08:37:03 -08:00
James.cf Lin
b5a0c1c0a2 [RCS] Add service context of sepolicy of Context.TELEPHONY_IMS_SERVICE
Bug: 139260938
Test: Manual
Change-Id: I335a955ee7cc2b8e82acd2987c93076fc50dc20a
2019-11-06 21:17:23 +08:00
Ram Muthiah
b46ef107f9 Update kernel permissions to pass libdm snapshot unit test
Bug: 143654050
Test: libdm_test
Change-Id: I671937b3f3144066bf3529e11ad19a73b0eb685e
2019-11-05 23:54:29 +00:00
Josh Gao
9d8be27256 Merge "Move adbd to an apex."
am: b5d60d7789

Change-Id: I2465c3ea586b7e5c26baf0991519970b8eb9bc3f
2019-11-05 15:50:48 -08:00
Josh Gao
b5d60d7789 Merge "Move adbd to an apex." 2019-11-05 23:36:39 +00:00
Ashwini Oruganti
60bae2693a Merge "Update permissioncontroller_app domain rules"
am: 20daed135d

Change-Id: Ic117c0b1c894940062844495bd7fe514bed15cb0
2019-11-04 18:07:25 -08:00
Eric Laurent
685eab6ca2 audioserver: allow audioserver to generate audio HAL tombstones
Allow audioserver to signal audio HAL processes and
generate tombstones in case of watchdog restart.

Bug: 141528385
Test: Force watchdog and verify tombstone creation
Change-Id: I39bb4a63aa93efab68baad3890b8f49fc5f79ead
2019-11-04 18:05:28 -08:00
Treehugger Robot
20daed135d Merge "Update permissioncontroller_app domain rules" 2019-11-05 01:56:39 +00:00
Yifan Hong
6a271f6b7f Merge "Allow snapshotctl to create ota_metadata_file."
am: 73554435ed

Change-Id: Ib67b97bf71f129ce5e58e7c007d04ad1dea96eb6
2019-11-04 16:23:27 -08:00
Ashwini Oruganti
c557ca61dd Update permissioncontroller_app domain rules
Add some rules based on the SELinux denials observed.

Bug: 143905061
Bug: 142672293
Test: Green builds, no more denials for the 7 services added.
Change-Id: I27e4634cb1df03166e734f6c12c8cb9147568d72
2019-11-04 16:03:54 -08:00
Yifan Hong
73554435ed Merge "Allow snapshotctl to create ota_metadata_file." 2019-11-04 22:10:06 +00:00
Hector Dearman
a73d9b851a Merge "Allow Perfetto to log to statsd"
am: 5b43f023dc

Change-Id: Icbdcb5e61aedb7a58150a1b707ec5d7afb354fa8
2019-11-04 08:31:10 -08:00
Hector Dearman
5b43f023dc Merge "Allow Perfetto to log to statsd" 2019-11-04 13:04:11 +00:00
Hector Dearman
776a6169a0 Allow Perfetto to log to statsd
Denial:
10-31 21:17:11.150  8148  8148 W perfetto: type=1400 audit(0.0:135): avc: denied { write } for name="statsdw" dev="tmpfs" ino=33205 scontext=u:r:perfetto:s0 tcontext=u:object_r:statsdw_socket:s0 tclass=sock_file permissive=0

Bug: b/139351286
Test: adb shell perfetto -c :test --dropbox perfetto, watch logcat
  for denials
Change-Id: I401f1625212f85831ce54116271752578db29578
2019-11-04 12:23:27 +00:00
Jing Ji
861c3475f9 Allow system_server to read system_lmk_prop
System_server will read this property to determine if it should
expect the lmkd sends notification to it on low memory kills.

Bug: 136036078
Test: atest CtsAppExitTestCases:ActivityManagerAppExitInfoTest
Change-Id: Iff90f7d28dc7417994f5906333d58fb18cb4a04c
2019-11-01 17:45:45 -07:00
Yifan Hong
7143e1c106 Merge "Allow charger to open health passthrough HAL"
am: 242dbece51

Change-Id: Iefcc02fd4d90589be0cd7803fbb921541cc7a0c9
2019-11-01 16:53:38 -07:00
Yifan Hong
242dbece51 Merge "Allow charger to open health passthrough HAL" 2019-11-01 23:46:31 +00:00
Peter Collingbourne
330ee2ca22 sepolicy: Allow system_server to use execmem in emulator builds with software rendering.
In emulator builds without OpenGL passthrough, we use software rendering
via SwiftShader, which requires JIT support. Therefore, we need to allow
system_server to use execmem so that it can run JITed code. These builds
are never shipped to users.

Bug: 142352330
Change-Id: I4d55b5a1b4ebae2fc8198ef66107c22bde41ad7e
2019-11-01 15:27:29 -07:00
Steven Moreland
416aa29a30 Merge "stable aidl vibrator policy"
am: a71c74c188

Change-Id: I1b002a203b0c5eb592b78c4d0b3f3e20bf7ed3ac
2019-11-01 14:34:23 -07:00
Tomasz Wasilczyk
3846fc25f6 Vehicle HAL: allow communication with CAN bus HAL and alternative service naming
Bug: 143779011
Test: implemented a VHAL service prototype that communicates with VHAL
Change-Id: I8f449510fc638e29a5cb23c0e32f3d87386ba9bc
2019-11-01 14:21:03 -07:00
Steven Moreland
a71c74c188 Merge "stable aidl vibrator policy" 2019-11-01 21:09:52 +00:00
Chong Zhang
9fef0f7b8b allow mediaserver to access configstore
am: 0ee3eecbfa

Change-Id: I499932c0a31819389479af4cf3c288092828884f
2019-11-01 13:26:50 -07:00
Yifan Hong
070d35916f Allow snapshotctl to create ota_metadata_file.
When snapshotctl merge is called on sys.boot_completed
and /metadata/ota/state does not exist, it now tries
to initialize it by creating one.

Test: no selinux denials on boot
Bug: 143551390
Change-Id: I6ee268270e8f788d90610d7a1a90f252ea9baa3a
2019-11-01 11:55:54 -07:00
Chong Zhang
0ee3eecbfa allow mediaserver to access configstore
This is needed to use graphics RenderEngine, creation will
try to access configstore.

bug: 135717526
test: run MediaMetadataRetrieverTest, there shouldn't be any
avc denials in logcat.

Change-Id: Ie26ffe4844edd52684f254e77d9f515550dc82fb
2019-11-01 10:07:36 -07:00
Yifan Hong
cedb97ee9b Merge "dumpstate: reads ota_metadata_file"
am: 38c47f1bc0

Change-Id: Ib87cc6f69d2ca88a11c22702d589f966cff325f0
2019-10-31 18:41:56 -07:00
Treehugger Robot
38c47f1bc0 Merge "dumpstate: reads ota_metadata_file" 2019-11-01 01:34:48 +00:00
David Anderson
d14cbfd082 Merge "Add fastbootd to the sys_rawio whitelist."
am: 69e3af2d70

Change-Id: I59455428a2c4f89331930ee27289ba6468f934e5
2019-10-31 13:38:29 -07:00
David Anderson
69e3af2d70 Merge "Add fastbootd to the sys_rawio whitelist." 2019-10-31 20:20:39 +00:00
TreeHugger Robot
fa2e6ea73b Merge "DO NOT MERGE - qt-qpr1-dev-plus-aosp-without-vendor@5915889 into stage-aosp-master" into stage-aosp-master 2019-10-31 18:38:53 +00:00
Ashwini Oruganti
001d3ce97a Merge "Create a separate domain for permissioncontroller"
am: 9a85143b4d

Change-Id: I80a0fc5942f25838cda666ee126ca60f8602a378
2019-10-31 09:44:46 -07:00
Ashwini Oruganti
9a85143b4d Merge "Create a separate domain for permissioncontroller" 2019-10-31 16:38:56 +00:00
Tom Cherry
b314448fa9 logpersist is now a shell script, so give it the appropriate permissions
am: bf2f37325b

Change-Id: I46101555d3df93845c7a967f6a9277026053337f
2019-10-31 06:58:45 -07:00
Ashwini Oruganti
9bc81125ef Create a separate domain for permissioncontroller
This creates an SELinux domain for permissioncontroller and moves it out of the
priv_app SELinux domain.

Bug: 142672293
Test: Flashed a device with this build and verified
com.google.android.permissioncontroller runs in the
permissioncontroller_app domain.
Change-Id: Ieb2e4cb806d18aaeb2e5c458e138975d1d5b64fe
2019-10-30 14:59:12 -07:00
Tom Cherry
bf2f37325b logpersist is now a shell script, so give it the appropriate permissions
Test: logcatd / logpersist work
Change-Id: Id283e24b0b48ddfa056ff842eecb51ee52b44c5e
2019-10-30 13:54:35 -07:00