Commit graph

342 commits

Author SHA1 Message Date
Jeff Vander Stoep
fdda81a521 incident_service: only disallow untrusted access
Allow device-specific domains to access the incident_service.

Test: build
Bug: 156479626
(Cherry picked from commit 2aa8042f9d)
Change-Id: I64d844f7a549afb4224d91b086c1f5fd76d0664c
2020-05-13 18:53:30 +00:00
Xiangyu/Malcolm Chen
554bcfe5e8 Merge "Expose max.active.modem to be vendor inittable." into rvc-dev 2020-05-12 18:12:53 +00:00
TreeHugger Robot
fd40037003 Merge "Sync prebuilts with NNAPI enablement change" into rvc-dev 2020-05-12 06:43:33 +00:00
Evan Severson
8ba72f3280 Merge "Allow permission controller to use radio service" into rvc-dev 2020-05-11 22:55:33 +00:00
Evan Severson
a6d6f677a2 Allow permission controller to use radio service
Test: Observe denial go away
Bug: 153997991

Change-Id: I9a11e226867a5d68f2490f5143963cc66bd09538
2020-05-11 22:54:38 +00:00
Malcolm Chen
4062937968 Expose max.active.modem to be vendor inittable.
And rename it properly.

Bug: 154072245
Test: manual
Change-Id: I85b060ef90a747b43e1ab386337ffc5b49d29e57
Merged-In: I85b060ef90a747b43e1ab386337ffc5b49d29e57
2020-05-11 10:31:17 -07:00
Stefano Galarraga
ec7b180bc8 Sync prebuilts with NNAPI enablement change
Synchronizing changes in prebuilt dumpstate.te with changes in
Ibad9b68736ccbdc3ed796606fd1d78ca04f98ad0.

Test: build + boot
Bug: 145388549
Bug: 154169913
Change-Id: I8ad5245181d79e787e26910ee4e701e2ae6812c9
2020-05-11 08:28:05 +01:00
Suren Baghdasaryan
9436677538 Add lmkd. property policies
lmkd.reinit property allows vendors to trigger lmkd reinitialization. Add
lmkd_prop to support lmkd.* properties inlcuding lmkd.reinit.

Bug: 155149944
Test: setprop lmkd.reinit 1
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Merged-In: I6ba598bad7ebb40fd6f23de473f25f32e53c996d
Change-Id: I6ba598bad7ebb40fd6f23de473f25f32e53c996d
2020-05-08 15:35:16 +00:00
Suren Baghdasaryan
ff4789185a sepolicy: Allow lmkd to communicate with its other instance for reinit
Lmkd should implement reinit functionality and to do so it needs to
communicate with its running instance using socket.

Bug: 155149944
Test: lmkd --reinit
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Merged-In: I81455fe187830081d88f001b4588f7607b1bd1d0
Change-Id: I81455fe187830081d88f001b4588f7607b1bd1d0
2020-05-08 15:35:05 +00:00
PO HUNG CHEN
3e81d5dd6b Merge changes from topic "vabse" into rvc-dev
* changes:
  Allow update_engine to get gsid property
  Allow update_engine to get gsid property
2020-05-08 09:03:19 +00:00
TreeHugger Robot
249b79c680 Merge "allow modprobe to read /proc/cmdline" into rvc-dev 2020-05-08 06:43:25 +00:00
Howard Chen
f6b2db0be7 Allow update_engine to get gsid property
Allow the update_engine to use the gsid property and to avoid the VAB
merge when running a DSU.

Bug:147071959
Test: ota_e2etest.py

Change-Id: I4a8d179e7e71f74d0c7ad34767de1f619f134d20
2020-05-08 10:10:46 +08:00
Steve Muckle
9316da8e12 allow modprobe to read /proc/cmdline
This is needed for libmodprobe to pass module options on the kernel
commandline to kernel modules when they are loaded.

Bug: 155422904
Change-Id: I9df7e211765268815bfb9269365264f5ca468712
Merged-In: I9df7e211765268815bfb9269365264f5ca468712
2020-05-07 11:28:50 -07:00
TreeHugger Robot
5e85b38286 Merge changes from topic "b/154795779" into rvc-dev
* changes:
  Update prebuilt sepolicy
  mediaserver, mediaextractor, drmserver: allow vendor_overlay_file
2020-05-07 03:10:31 +00:00
Przemysław Szczepaniak
2f30c18778 Allow neuralnetworks hal service to read files from /sdcard
Bug: 138457453
Test: tflite nnapi benchmark app against /sdcard file
Change-Id: I368629f9177141d59eb5862cd29dd65da68d3ad7
Merged-In: I368629f9177141d59eb5862cd29dd65da68d3ad7
(cherry picked from commit 94be98073d)
2020-05-06 14:20:21 +01:00
Jeongik Cha
1fa5d6a7c5 Update prebuilt sepolicy
Updating sepolicy in ag/11322695, accrodingly, update prebuilt dir as
well

> cp -r public/ prebuilts/api/${SDK_INT}.0/
> cp -r private/ prebuilts/api/${SDK_INT}.0/

Bug: 154795779
Test: m
Change-Id: I55c2917e9c26cc44dd462c5434b78d36943bd195
2020-05-06 14:16:06 +09:00
Songchun Fan
5974c8b538 [rvc] Define vendor-specific property ro.incremental.enable
[already merged in master and AOSP]

Make ro.incremental.enable a vendor-specific property. Allow
system_server and vold to read this property.

Test: manual
BUG: 155212902
Merged-In: I8ff8837af635fa8e7b5bb02e5f6de5ac15b5023b
Change-Id: Id432390023de232deb4cc4d0ff3fb73904093b60
2020-05-04 12:04:18 -07:00
Svet Ganov
395b2d4318 Updading selinux policy for R
* Update se policy prebuilts

Test: build + boot

bug:150281259

Change-Id: I0a0e94bc230f7726e7a9dd84b17c3a90e5601120
Merged-In: I0a0e94bc230f7726e7a9dd84b17c3a90e5601120
2020-04-30 15:57:06 -07:00
Ioannis Ilkos
d723f38fe9 Enable tracing of the ion/ion_stat events
These events supersede the ion_heap_grow / ion_heap_shrink events on
4.19+ kernels.

Bug: 154302786
Test: build, run on cuttlefish with new kernel, ls -lZ /sys/kernel/tracing/events/ion/ion_stat/enable
Merged-In: I262d8c3269d4261701361ad4b1bdc322f1f03969
Change-Id: I262d8c3269d4261701361ad4b1bdc322f1f03969
2020-04-28 07:59:39 +01:00
Collin Fijalkovich
c6c9229cfa Allow Traceur record the mm_event trace event.
Bug: 150130660
Test: Took a trace with Traceur and verified mm_event records
were included when the memory category was enabled.

Merged-In: I5e783fbbe91dbe330b49fb11cd7d32ac820e7a5c
Change-Id: I5e783fbbe91dbe330b49fb11cd7d32ac820e7a5c
(cherry picked from commit 45be3aa649)
2020-04-07 16:29:50 +00:00
Tao Bao
086085b8ad Ignore the denial due to vendor_misc_writer reading DT fstab. am: ab38d7073e
Change-Id: I33416cf74bab1bd45fb7eec879391976943c9b00
2020-03-30 14:19:01 +00:00
Tao Bao
ab38d7073e Ignore the denial due to vendor_misc_writer reading DT fstab.
This CL addresses the following denial, when vendor_misc_writer tries to
read DT fstab (i.e. device tree fstab) for /misc entry.

avc: denied { search } for comm="misc_writer" name="android" dev="sysfs" ino=17456 scontext=u:r:vendor_misc_writer:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=dir

DT fstab was used for devices shipped prior to Q, for early-mounting
partitions (e.g. /system, /vendor, /product), which has been disallowed
for Q launch devices. vendor_misc_writer is a new module added since Q,
so it doesn't need to worry about the legacy code path; in practice
there's no benefit of putting /misc entry into DT fstab either.

Bug: 134122603
Bug: 152718206
Test: Build and flash taimen with the change that enables
      vendor_misc_writer. Check that it no longer gives the above denial
      during boot.
Change-Id: Id2fb206706f7cd19a4cde2701e4155bfc03f01b4
2020-03-30 11:49:35 +02:00
Steven Thomas
4ee8089356 Allow access to the "refresh_rate_switching" system property
Bug: 147233255
Bug: 136592946
Bug: 138261472

Test: Ran with the patch applied, confirmed surface flinger can access
the system property.

Change-Id: I259a488399c5e698de384322852ea81ea1a96e7d
Merged-In: I259a488399c5e698de384322852ea81ea1a96e7d
Exempt-From-Owner-Approval: Approved internally
2020-03-20 22:32:15 -07:00
Jeff Vander Stoep
a68dd136aa Prevent apps from causing presubmit failures
Apps can cause selinux denials by accessing CE storage
and/or external storage. In either case, the selinux denial is
not the cause of the failure, but just a symptom that
storage isn't ready. Many apps handle the failure appropriately.

These denials are not helpful, are not the cause of a problem,
spam the logs, and cause presubmit flakes. Suppress them.

Bug: 145267097
Bug: 151188413
Test: build

Merged-In: If87b9683e5694fced96a81747b1baf85ef6b2124
Change-Id: If87b9683e5694fced96a81747b1baf85ef6b2124
2020-03-12 08:38:05 +00:00
Jaegeuk Kim
2f5e44eb49 sepolicy: introduce boottime props in public
Bug: 146053177
Bug: 146053658
Bug: 149844577
Change-Id: Iddfefedc4538044c6abcc2eea29b86e3f038aee0
Merged-In: Iddfefedc4538044c6abcc2eea29b86e3f038aee0
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2020-03-08 03:31:10 +00:00
Automerger Merge Worker
7ab65fadb7 Add property contexts for dex2oat cpu-set properties am: 23098ec3bb
Change-Id: Ifebf2c5b2780da8175f73135d8c534ce669473b4
2020-03-06 16:19:26 +00:00
Orion Hodson
23098ec3bb Add property contexts for dex2oat cpu-set properties
New properties are:

 dalvik.vm.dex2oat-cpu-set [default compiler thread affinity]
 dalvik.vm.boot-dex2oat-cpu-set [compiler thread affinity for boot]
 dalvik.vm.image-dex2oat-cpu-set [thread affinity recompiling the boot image]

Bug: 141446571
Bug: 149395059
Test: Run installd tests with new properties defined in target mk file.
Change-Id: Idcbb1332aa9c18f6082b827eae0334d063644a41
(cherry picked from commit 7b2ee48cd2)
2020-03-05 08:48:53 +00:00
Automerger Merge Worker
f4ccc4ba1a Update Q sepolicy prebuilt am: 1dd6321a00
Change-Id: I8caa160f6c9e7b86f6bab5848f9027a45c0a16c5
2020-02-12 12:18:45 +00:00
Alex Hong
1dd6321a00 Update Q sepolicy prebuilt
This updates 29.0 api for dumpstate restart control property contexts

Bug: 147730517
Change-Id: I0aa7450dc0fb34de321cf8d2ba357b2ecabbcf43
2020-02-11 13:53:22 +08:00
Jaegeuk Kim
028f2c3453 Merge "block: allow init.rc to tune max discard size" into qt-qpr1-dev 2020-02-01 01:49:24 +00:00
Jaegeuk Kim
2b1e595e8f block: allow init.rc to tune max discard size
Init.rc requires to limit max discard to avoid long latencies.

Bug: 148209614
Change-Id: Idf3b295ac15efd5edf979ca896fdf826b9fc3c99
Merged-In: Idf3b295ac15efd5edf979ca896fdf826b9fc3c99
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2020-01-23 20:02:58 +00:00
Automerger Merge Worker
b354eba19c Merge "Allow adb start/stop mdnsd via ctl.start/stop" into qt-qpr1-dev am: 2192ec6223
Change-Id: I1bafff0ae8087a3c72209eb2a6edcaddc1e5d463
2020-01-17 18:44:15 +00:00
TreeHugger Robot
2192ec6223 Merge "Allow adb start/stop mdnsd via ctl.start/stop" into qt-qpr1-dev 2020-01-17 18:31:09 +00:00
Automerger Merge Worker
4e77006163 system_server: TelephonyManager reads /proc/cmdline am: 2951b4859d
Change-Id: I37906d269428d5e691395a1908aed9f647c27e11
2020-01-16 17:03:55 +00:00
Changyeon Jo
60c4276c15 Allow adb start/stop mdnsd via ctl.start/stop
Bug: 128345139
Test: make selinux_policy
Change-Id: I477d6d94c16974f23f703d5f334ef108279ab3bb
Signed-off-by: Changyeon Jo <changyeon@google.com>
(cherry picked from commit cfeaa1c664)
2020-01-16 08:26:51 -08:00
Jeff Vander Stoep
2951b4859d system_server: TelephonyManager reads /proc/cmdline
Bug: 124466646
Test: build
Change-Id: Ib4868826eb153543c65503bfb4d3623c4158ffae
(cherry picked from commit 29b76e2ceec2ab1e04715657a79b6544afdf09c9)
2020-01-15 13:43:33 -08:00
Automerger Merge Worker
5872ab6c4b Merge "Allow adb forward to traced consumer socket" into qt-qpr1-dev am: 49807a6c26
Change-Id: I74e1c98fa883a287139a714b1e263ad85c5e8bf0
2020-01-11 00:45:21 +00:00
TreeHugger Robot
49807a6c26 Merge "Allow adb forward to traced consumer socket" into qt-qpr1-dev 2020-01-11 00:32:36 +00:00
Hector Dearman
c0bad7b98f Allow adb forward to traced consumer socket
Currently shell can connect to the traced_consumer_socket allowing it to
configure/start/stop and collect traces. This allows a host tool (e.g. Android Studio or
https://ui.perfetto.dev) to connect to the device via adb and collect traces. It would
be better if rather than executing shell commands the host tool could directly communicate
with the consumer socket. This is possible using adb forward:

adb forward tcp:9903 localfilesystem:/dev/socket/traced_consumer

However in this case adbd is connecting to the socket - not shell.

This CL allows adbd to connect to the socket which allows host tools to collect
traces without having to do everything though shell commands.

Note that this patch also has additional change on prebuilts in order to
backport.

Denial:
08-30 11:28:05.809 10254 10254 W adbd    : type=1400 audit(0.0:1129): avc: denied { write } for name="traced_consumer" dev="tmpfs" ino=6719 scontext=u:r:adbd:s0 tcontext=u:object_r:traced_consumer_socket:s0 tclass=sock_file permissive=0

Test: Cherry pick CL to master, make, flash
adb logcat | grep denied
adb forward tcp:9903 localfilesystem:/dev/socket/traced_consumer

Bug: b/139536756
Change-Id: Ie08e687c0b06d0e1121009e8cd70319a8f907ae2
(cherry-picked from commit b56a49d979)
2020-01-10 09:17:27 -08:00
Automerger Merge Worker
ffbc6ab3ad Revert "Revert "Allow dumpstate to dumpsys gpu"" am: b5c47df035
Change-Id: Ic486302dbcf93e2987fe250ef87bc23b4e9d5897
2020-01-10 08:15:48 +00:00
Yiwei Zhang
b5c47df035 Revert "Revert "Allow dumpstate to dumpsys gpu""
This reverts commit 6daec46264.

Reason for revert: b/147458874

Bug: 132402890
Test: build passes on coral-userdebug

Change-Id: Ibcbc06e99561be424aa953e62985abb5b5864c56
2020-01-09 18:51:24 -08:00
Automerger Merge Worker
c188e2deca Merge "Create new system property type for Factory OTA could write system property" am: a75fa8058c am: 150bdab002
Change-Id: I092b89446bf37e9fa23163519835491c5e4cb07c
2019-12-15 19:38:22 +00:00
Treehugger Robot
a75fa8058c Merge "Create new system property type for Factory OTA could write system property" 2019-12-15 19:26:39 +00:00
Henry Tung
6d57b494c0 Create new system property type for Factory OTA could write system property
Due to Factory OTA client install in product partition but it also declare coredomian in
its sepolicy setting. That will let Factory OTA unable to find a property type could write system property.
But now Factory OTA have a restore NFC wake function need to write system property for communicate with bootloader.
So we need to create a new property type in system framework which could allow Factory OTA client to write system property.

Bug: 145178094
Test: Manual
Change-Id: Ic549cc939893ec67a46bf28a23ebeb9f9b81bd0b
2019-12-13 09:39:19 +00:00
Automerger Merge Worker
2225c5ea6e Allow vendor_init to modify pm.dexopt.disable_bg_dexopt am: 4c06707b5e
Change-Id: I7cded22281ade995b060641209ae84d37c55a583
2019-12-11 21:55:50 +00:00
Jaegeuk Kim
aec7c5fed4 Merge "block: allow init.rc to tune max discard size" 2019-12-06 21:59:19 +00:00
Eric Jeong
4c06707b5e Allow vendor_init to modify pm.dexopt.disable_bg_dexopt
- Android Auto has disabled background dexopt (b/142753051).
- The modification is in car_base.mk which is included by vendor device
file.
- So, vendor_init needs to be able to modify
pm.dexopt.disable_bg_dexopt property.

Bug: 145348176
Test: Check pm.dexopt.disable_bg_dexopt is set to true in Android Auto
device.

Cherry-Picked-From: 03b1992d0bf363e438b0fd7efca1e2a1d7249320
Change-Id: I84d19ea62f1abe1bf9206a60ca103614616e312b
2019-12-06 10:40:12 -08:00
Jaegeuk Kim
a47abdbe16 block: allow init.rc to tune max discard size
Init.rc requires to limit max discard to avoid long latencies.

Change-Id: Idf3b295ac15efd5edf979ca896fdf826b9fc3c99
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2019-12-04 12:26:19 -08:00
Florian Mayer
d77fec4796 Allow shell to unlink perfetto_traces_data_file.
Bug: 141704436
Test:
blueline:/ $ ls -lZa /data/misc/perfetto-traces
total 186
drwxrwx-wx  2 root   shell u:object_r:perfetto_traces_data_file:s0    3488 2019-09-30 14:12 .
drwxrwx--t 46 system misc  u:object_r:system_data_file:s0             3488 2019-09-30 14:08 ..
-rw-------  1 shell  shell u:object_r:perfetto_traces_data_file:s0  180467 2019-09-30 14:12 profile-shell
blueline:/ $ rm /data/misc/perfetto-traces/profile-shell
rm ro /data/misc/perfetto-traces/profile-shell (y/N):y
blueline:/ $ ls -lZa /data/misc/perfetto-traces
total 6
drwxrwx-wx  2 root   shell u:object_r:perfetto_traces_data_file:s0  3488 2019-09-30 14:13 .
drwxrwx--t 46 system misc  u:object_r:system_data_file:s0           3488 2019-09-30 14:08 ..
blueline:/ $

Cherry pick of c069bc134e

Change-Id: Ia710068c3cca53a415347fb0a7064740e500d15d
Merged-In: Ia710068c3cca53a415347fb0a7064740e500d15d
2019-10-29 10:32:35 +00:00
Xin Li
7883f6b3c1 DO NOT MERGE - Merge QD1A.190821.011 into stage-aosp-master
Bug: 141248619
Change-Id: I3186316d366cc7c9fee29cef5d2cd6ef37ff3926
2019-10-14 22:53:21 +00:00