- Jan 02, 2018
-
-
Max Bires authored
This CL creates a traceur_app domain with userdebug privileges akin to what shell has with regards to being able to find most services on device. Previously, traceur was running as shell which was an unintentional abuse of selinux architecture. Bug: 68126425 Test: Traceur functions outside of shell user privilege Change-Id: Ib5090e7e8225ad201b3ec24b506fe2717101d0f1
-
Chenbo Feng authored
Some necessary sepolicy rule changes for init process to create directory, mount cgroupv2 module and mount bpf filesystem. Also allow netd to create and pin bpf object as files and read it back from file under the directory where bpf filesystem is mounted. Test: bpf maps show up under /sys/fs/bpf/ Change-Id: I579d04f60d7e20bd800d970cd28cd39fda9d20a0
-
Ricky Wai authored
Bug: 63908748 Test: Able to boot Change-Id: I14d8856d7aac7be9d1f26ecf5bfff69ea5ee9607
-
- Dec 29, 2017
-
-
Andreas Gampe authored
Add policy for the perfprofd binder service. For now, only allow su to talk to it. Test: m Change-Id: I690f75460bf513cb326314cce633fa25453515d6
-
- Dec 20, 2017
-
-
Tony Mak authored
CrossProfileAppsService allows apps to do limited cross profile operations, like checking the caller package is installed in the specified user. It is similar to LauncherAppsService in some sense. Merged-In: I26e383a57c32c4dc9b779752b20000b283a5bfdc Change-Id: I26e383a57c32c4dc9b779752b20000b283a5bfdc Fix: 67765768 Test: Built with ag/3063260. Can boot and verified those APIs are working. (cherry picked from commit 6536c9e0)
-
- Dec 19, 2017
-
-
yro authored
Bug: 63757906 Test: manual testing conducted Change-Id: Id03413ce82b5646d4bceddc59e16c7d5ee5bc193
-
- Dec 18, 2017
-
-
xshu authored
we are aiming to improve logging performance by having wifi hal directly write to the flash. Wifi hal need to be able to create, write, and delete files in a directory. This will be restricted to userdebug and eng builds only. Bug: 70170285 Test: compile, run on device Change-Id: Id0cd317411f4c393d7529aa31b501046d7350edb
-
- Dec 16, 2017
-
-
yro authored
Test: manual testing conducted see if it interfere's with AOSP Change-Id: If47a663557b2ebf825fc082edb838ae085ec66b3
- Dec 13, 2017
-
-
Tom Cherry authored
Allow init to create a serialized property_info file and allow all processes to read it. Bug: 36001741 Test: boot bullhead, walleye using property_info Change-Id: Ie51d4c0f0221b128dd087029c811fda15b4d7093
-
- Dec 05, 2017
-
-
Jason Monk authored
Test: make/sync Bug: 68751119 Change-Id: Ie3c60ff68b563cef07f20d15f298d6b62e9356bc
-
- Nov 30, 2017
-
-
Ricky Wai authored
Bug: 63908748 Test: built, flashed, able to boot Change-Id: I3cfead1d687112b5f8cd485c8f84083c566fbce2
-
- Nov 17, 2017
-
-
Vishnu Nair authored
- Allow system_server to create and write to /data/misc/wmtrace/* - Allow surfaceflinger to create and write files from /data/misc/wmtrace/* - Allow dumpstate to read files from /data/misc/wmtrace/* permissions are restricted to userdebug or eng builds Bug: 64831661 Test: adb shell cmd window tracing start && adb shell cmd window tracing stop Test: adb shell su root service call SurfaceFlinger 1025 i32 1 >/dev/null && adb shell su root service call SurfaceFlinger 1025 i32 0 >/dev/null Test: adb bugreport ~/tmp.zip && adb shell su root dmesg | grep 'avc: ' Change-Id: I0b15166560739d73d7749201f3ad197dbcf5791c
-
- Nov 09, 2017
-
-
Hakan Kvist authored
Add label update_engine_log_data_file for log files created by update engine in directory /data/misc/update_engine_log. Bug: 65568605 Test: manual Change-Id: I379db82a0ea540e41cb3b8e03f93d9ce64fac7c9
-
- Oct 25, 2017
-
-
Tom Cherry authored
First pass at adding vendor_init.te Bug: 62875318 Test: boot sailfish with vendor_init Change-Id: I35cc9be324075d8baae866d6de4166c37fddac68
-
- Oct 23, 2017
-
-
Max Bires authored
Instead of removing the denial generating code, a dontaudit and a service label will be provided so that the team working on this new feature doesn't have to get slowed up with local revision patches. The dontaudit should be removed upon resolution of the linked bug. Bug: 67468181 Test: statscompanion denials aren't audited Change-Id: Ib4554a7b6c714e7409ea504f5d0b82d5e1283cf7
-
- Oct 17, 2017
-
-
Paul Crowley authored
Bug: 25861755 Test: Boot device, observe logs Change-Id: I6c13430d42e9794003eb48e6ca219b874112b900 Merged-In: I6c13430d42e9794003eb48e6ca219b874112b900 (cherry picked from commit 47f3ed09)
-
- Oct 16, 2017
-
-
Robert Quattlebaum authored
Bug: b/64399219 Test: Manual Change-Id: I4f6c7e4e3339ae95e43299bf364edff40d07c796 (cherry picked from commit c8bd93d7)
-
- Sep 28, 2017
-
-
Dan Cashman authored
Bug: 37916906 Test: Builds 'n' boots. Change-Id: Ia1d86264446ebecc1ca79f32f11354921bc77668 Merged-In: I208ec6a864127a059fb389417a9c6b259d7474cb
-
- Sep 26, 2017
-
-
Dan Cashman authored
Bug: 37916906 Test: Builds 'n' boots. Change-Id: Ia1d86264446ebecc1ca79f32f11354921bc77668 Merged-In: I208ec6a864127a059fb389417a9c6b259d7474cb
-
- Sep 01, 2017
-
-
Steven Moreland authored
This reverts commit f27bba93. Bug: 65206688 Change-Id: I8e61b77a1abe9543e4fba77defb8062407676fcf
-
- Aug 28, 2017
-
-
Tomasz Wasilczyk authored
Bug: 63600413 Test: VTS, instrumentation, audit2allow Change-Id: I57c0150a52c13f1ce21f9ae2147e3814aad0fb7e
-
- Aug 25, 2017
-
-
Mark Salyzyn authored
Test: trust me Bug: 64687998 Change-Id: I901565222d658917ce5ad7bc280dc4acc0f9e9b7 (cherry picked from commit 267b43a1)
-
- Aug 16, 2017
-
-
Bowgo Tsai authored
Bug: 63910933 Test: boot sailfish in normal mode, checks adbd is started Test: boot sailfish in recovery mode, checks adbd is started Test: boot bullhead in normal mode, checks adbd is started Test: boot bullhead in recovery mode, checks adbd is started Change-Id: I35ed78a15a34626fbd3c21d030e2bf51033f7b79
-
- Aug 14, 2017
-
-
Dan Cashman authored
The treble compatibility tests check for policy differences between old and new policy. To do this correctly, we must not modify the policy which represents the older policies. Move the files meant to be changed to a different location from the ones that are not meant to be touched to avoid any undesired changes to old policy, e.g. commit: 2bdefd65078d890889672938c6f0d2accdd25bc5 Bug: 36899958 Test: Build-time tests build. Change-Id: I8fa3947cfae756f37556fb34e1654382e2e48372
-
- Aug 11, 2017
-
-
Steven Moreland authored
Only seeing this denial in permissive: allow shell screencap_exec:file getattr; Bug: 37565047 Test: adb shell screencap w/o root Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
-
- Aug 08, 2017
-
-
Dan Cashman authored
Commit: 2490f1ad meant to add thermalserviced_tmpfs to the new_object list in the mapping file, but copy-paste error resulted in thermalserviced_exec_tmpfs being recorded instead. Fix this. (cherry-pick of commit: fbacc656) Bug: 62573845 Test: None. prebuilt change. Change-Id: Iab4eaef04742187d6397a539aae854651caa9935
-
- Aug 04, 2017
-
-
Todd Kennedy authored
A new API [getNamesForUids] was recently added to the PackageManager and this API needs to be accessible to native code. However, there were two constraints: 1) Instead of hand-rolling the binder, we wanted to auto generate the bindings directly from the AIDL compiler. 2) We didn't want to expose/annotate all 180+ PackageManager APIs when only a single API is needed. So, we chose to create a parallel API that can be used explicitly for native bindings without exposing the entirety of the PackageManager. Bug: 62805090 Test: Manual Test: Create a native application that calls into the new service Test: See the call works and data and returned Change-Id: I0d469854eeddfa1a4fd04b5c53b7a71ba3ab1f41
-
Dan Cashman authored
Commit: ec3b6b7e added a new daemon and corresponding types to sepolicy. The explicitly declared types were added to 26.0.ignore.cil to reflect the labeling of new objects, but another type, thermalserviced_tmpfs was created by macro and was missed in code review. Add it as well. Bug: 62573845 Test: None. prebuilt change. Change-Id: Ia8968448eea0be889911f46fe255f581659eb548 (cherry picked from commit 2490f1ad)
-
Todd Poynor authored
Add sepolicy for thermalserviced daemon, IThermalService binder service, IThermalCallback hwservice, and Thermal HAL revision 1.1. Test: manual: marlin with modified thermal-engine.conf Bug: 30982366 Change-Id: I207fa0f922a4e658338af91dea28c497781e8fe9 (cherry picked from commit ec3b6b7e)
-
- Jul 31, 2017
-
-
Dan Cashman authored
Commit: 5aef6a94 added a new type, system_net_netd_hwservice, for a new hwservice. Record this in the compatibility infrastructure as labeling a new object, rather than relabeling one from O. Bug: 62573845 Test: None. Prebuilt change only. Change-Id: If360eb9e05684d9b47316d53e494aa773485e93f
-
Dan Cashman authored
Commit: 3eed3eac added the compatibility statement for the new mediaprovider app domain, but it missed another new, private type, mediaprovider_tmpfs, that is automatically created for all appdomains. It replaces priv_app_tmpfs, but since both types are private, they do not need to be added to the actual mapping (vendor policy cannot use it). Bug: 62573845 Test: None. Prebuilt-only change. Change-Id: I62229a5be74cd928fe0ca82a45b73cb61d6f5223
-
Dan Cashman authored
Commit: 632bc494 added hwservice labeling and was cherry-picked to oc-dev, but the hal_wifi_offload_hwservice type was not part of the cherry-pick because the service was not in oc-dev. Record the type for compatibility purposes. Bug: 62573845 Test: None. Prebuilt change only. Change-Id: Ib2c0fe862eddb566fbe6b0287238fa93dddae7b8
-
- Jul 25, 2017
-
-
Michael Butler authored
Bug: 63905942 Test: mm -j40 Change-Id: I354ee863475aedd2dc9d2b436a00bcd82931456f (cherry picked from commit 4fc5fb5e521347d65dc921f8c1fb751c66f9a92c)
-
- Jul 18, 2017
-
-
Dan Cashman authored
This type was removed in commit: 93166cef and no longer needs to be included in compatibility infrastructure. Bug: 62573845 Test: None, prebuilt change. Change-Id: I9dc05512c7fcb3ef4445c4c6b040809a1d595282
-
- Jul 12, 2017
-
-
Lorenzo Colitti authored
This reinstates the exception for netd_stable_secret_prop, which was added after O sepolicy freeze. This exception, along with the corresponding core sepolicy change, was reverted in order to allow these policies to be added to per-device sepolicy. DO NOT SUBMIT until http://ag/2528214 has automerged to master. This reverts commit 777c8ee0. Bug: 17613910 Bug: 62573845 Test: make -j64 bootimage Change-Id: I20b52f1d8e1c0cbb18a339bf45586dacbc7405ad
-
- Jul 11, 2017
-
-
Lorenzo Colitti authored
This will allow removing the netd_stable_secret_prop from common policy in master. It will be re-added after the wahoo-specific sepolicy for netd_stable_secret_prop lands in oc-dr1-dev, is automerged to master, and then is reverted in master. This reverts commit ebea2b45. Bug: 17613910 Bug: 62573845 Test: None, prebuilt change only. Change-Id: I1234326d2fe6446e7e09ba9e97187518fa9bce33
-
- Jul 07, 2017
-
-
Dan Cashman authored
Commit: e58a8de5 added a new type which has no analogue in 26.0. Record it as such. Bug: 62573845 Test: None. Prebuilt change only. Change-Id: I6b6d2aa64e0ac2c39c8d0427d333e6c7fc2b0bb1
-
Dan Cashman authored
Commit: 86cb5215 gave /dev/memcg a new label, but also explicitly prohibited access to vendor domains. Add the type to the 'new types' and don't map it to any other type for backwards compatibility. Bug: 62573845 Test: None. Prebuilt change only. Change-Id: I8902716830b162ead69834544ace9e02a94c65b4
-
Dan Cashman authored
Commit: 38f0928f added a type for a new system service. This service did not exist previously, so mark the type as not needing any compat entry. Bug: 62573845 Test: None. Prebuilt change only. Change-Id: I52d8e144c614b27f5c52fa99be6cfac87159bbcd
-