Skip to content
Snippets Groups Projects
  1. Jan 12, 2018
  2. Jan 11, 2018
  3. Jan 10, 2018
    • Primiano Tucci's avatar
      Perfetto SELinux policies · c80f9e03
      Primiano Tucci authored
      Perfetto is a performance instrumentation and logging framework,
      living in AOSP's /external/pefetto.
      Perfetto introduces in the system one binary and two daemons
      (the binary can specialize in either depending on the cmdline).
      
      1) traced: unprivileged daemon. This is architecturally similar to logd.
         It exposes two UNIX sockets:
         - /dev/socket/traced_producer : world-accessible, allows to stream
           tracing data. A tmpfs file descriptor is sent via SCM_RIGHTS
           from traced to each client process, which needs to be able to
           mmap it R/W (but not X)
         - /dev/socket/traced_consumer : privilege-accessible (only from:
           shell, statsd). It allows to configure tracing and read the trace
           buffer.
      2) traced_probes: privileged daemon. This needs to:
         - access tracingfs (/d/tracing) to turn tracing on and off.
         - exec atrace
         - connect to traced_producer to stream data to traced.
      
      init.rc file:
      https://android-review.googlesource.com/c/platform/external/perfetto/+/575382/14/perfetto.rc
      
      Bug: 70942310
      Change-Id: Ia3b5fdacbd5a8e6e23b82f1d6fabfa07e4abc405
      c80f9e03
  4. Jan 08, 2018
  5. Jan 04, 2018
  6. Jan 02, 2018
  7. Dec 19, 2017
  8. Dec 18, 2017
    • xshu's avatar
      Wifi hal - Firmware dump permissions · 6ad3c891
      xshu authored
      we are aiming to improve logging performance by having wifi hal
      directly write to the flash.
      
      Wifi hal need to be able to create, write, and delete files in
      a directory. This will be restricted to userdebug and eng builds only.
      
      Bug: 70170285
      Test: compile, run on device
      Change-Id: Id0cd317411f4c393d7529aa31b501046d7350edb
      6ad3c891
  9. Dec 16, 2017
  10. Dec 15, 2017
  11. Dec 13, 2017
    • Tom Cherry's avatar
      Add /dev/__properties__/property_info · 8b5433a9
      Tom Cherry authored
      Allow init to create a serialized property_info file and allow all
      processes to read it.
      
      Bug: 36001741
      Test: boot bullhead, walleye using property_info
      
      Change-Id: Ie51d4c0f0221b128dd087029c811fda15b4d7093
      8b5433a9
  12. Dec 12, 2017
    • Bowgo Tsai's avatar
      Switch file context of odm(/.*) to vendor_file · e9ae7735
      Bowgo Tsai authored
      /odm partition is the extension of /vendor partition, so we should not
      use system_file for it. Currently there is no ABI between vendor and
      odm. We can use 'odm_file' when needed in the future.
      
      Bug: 64240127
      Test: boot a device
      Change-Id: I4e8300d597aeeba60a255c8d114a54b24bc39470
      e9ae7735
  13. Dec 08, 2017
  14. Dec 07, 2017
    • Elliott Hughes's avatar
      Add a /bin symlink for convenience. · 2b42fe4b
      Elliott Hughes authored
      Bug: http://b/63142920
      Test: `make dist`
      Change-Id: Iae363fd5e7181941408d3d75cbf248e651bc8b49
      2b42fe4b
    • Bo Hu's avatar
      Revert "Renames nonplat_* to vendor_*" · 283dd9eb
      Bo Hu authored
      This reverts commit 8b562206.
      
      Reason for revert: broke mac build
      
      b/70273082
      
      FAILED: out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil
      /bin/bash -c "(out/host/darwin-x86/bin/version_policy -b out/target/product/generic_x86/obj/FAKE/selinux_policy_intermediates/plat_pub_policy.cil -t out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_policy_raw.cil -n 10000.0 -o out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil.tmp ) && (grep -Fxv -f out/target/product/generic_x86/obj/ETC/plat_pub_versioned.cil_intermediates/plat_pub_versioned.cil out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil.tmp > out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil ) && (out/host/darwin-x86/bin/secilc -m -M true -G -N -c 30 		out/target/product/generic_x86/obj/ETC/plat_sepolicy.cil_intermediates/plat_sepolicy.cil out/target/product/generic_x86/obj/ETC/plat_pub_versioned.cil_intermediates/plat_pub_versioned.cil out/target/product/generic_x86/obj/ETC/10000.0.cil_intermediates/10000.0.cil out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_sepolicy.cil -o /dev/null -f /dev/null )"
      Parsing out/target/product/generic_x86/obj/FAKE/selinux_policy_intermediates/plat_pub_policy.cil
      Parsing out/target/product/generic_x86/obj/ETC/vendor_sepolicy.cil_intermediates/vendor_policy_raw.cil
      grep: out of memory
      
      Change-Id: I14f0801fdd6b9be28e53dfcc0f352b844005db59
      283dd9eb
  15. Dec 06, 2017
    • kaichieh's avatar
      Renames nonplat_* to vendor_* · 8b562206
      kaichieh authored
      This change renames the non-platform sepolicy files on a DUT from
      nonplat_* to vendor_*.
      
      It also splits the versioned platform sepolicy from vendor_sepolicy.cil
      to a new file /vendor/etc/selinux/plat_pub_versioned.cil. And only keeps
      vendor customizations in vendor_sepolicy.cil.
      
      Build variable BOARD_SEPOLICY_DIRS is also renamed to
      BOARD_VENDOR_SEPOLICY_DIRS.
      
      Bug: 64240127
      Test: boot an existing device
      Change-Id: I53a9715b2f9ddccd214f4cf9ef081ac426721612
      8b562206
  16. Dec 05, 2017
  17. Dec 02, 2017
    • Andreas Gampe's avatar
      Sepolicy: Fix perfprofd path · 99e4f402
      Andreas Gampe authored
      Corresponds to commit 410cdebaf966746d6667d6d0dd4cee62262905e1 in
      system/extras.
      
      Bug: 32286026
      Test: m
      Change-Id: I1e0934aa5bf4649d598ec460128de6f02711597f
      99e4f402
  18. Nov 22, 2017
    • Jiyong Park's avatar
      Label /vendor/priv-app as vendor_app_file · 76311578
      Jiyong Park authored
      In P, we will be supporting privileged apps in vendor partition, thus
      need to label /vendor/priv-app as vendor_app_file so that apps can exist
      under the dir.
      
      Bug: 35301609
      Test: N/A since there is no /vendor/priv-app yet. Framework change
      which is currently in the internal is required.
      
      Change-Id: I86a765ef9da5267113e64a7cbb38ba0abf5c2835
      76311578
  19. Nov 17, 2017
    • Vishnu Nair's avatar
      Add window trace files SELinux policy rules · 2d6942d3
      Vishnu Nair authored
      - Allow system_server to create and write to /data/misc/wmtrace/*
      - Allow surfaceflinger to create and write files from /data/misc/wmtrace/*
      - Allow dumpstate to read files from /data/misc/wmtrace/*
      permissions are restricted to userdebug or eng builds
      
      Bug: 64831661
      
      Test: adb shell cmd window tracing start && adb shell cmd window tracing stop
      Test: adb shell su root service call SurfaceFlinger 1025 i32 1 >/dev/null && adb shell su root service call SurfaceFlinger 1025 i32 0 >/dev/null
      Test: adb bugreport ~/tmp.zip && adb shell su root dmesg | grep 'avc: '
      
      Change-Id: I0b15166560739d73d7749201f3ad197dbcf5791c
      2d6942d3
  20. Nov 09, 2017
  21. Oct 23, 2017
  22. Oct 17, 2017
  23. Oct 16, 2017
  24. Sep 28, 2017
    • Bowgo Tsai's avatar
      Removing $(PRODUCT_OUT)/root/root · 4cc4096a
      Bowgo Tsai authored
      Bug: 65570851
      Test: boot sailfish
      Change-Id: I008bf5386595c614236de44131afcda7d3fd6d98
      Merged-In: I008bf5386595c614236de44131afcda7d3fd6d98
      (cherry picked from commit 82ca9c2e)
      4cc4096a
    • Dan Cashman's avatar
      Fix build. · 66bafcd4
      Dan Cashman authored
      (This reverts internal commit: 82ca9c2e)
      Test: None.
      
      Change-Id: I48bbbe197c8e793bd9888b6ef4dadb2b3466423b
      (cherry picked from commit 852aca05)
      66bafcd4
    • Dan Cashman's avatar
      Sync internal master and AOSP sepolicy. · df5469d8
      Dan Cashman authored
      Bug: 37916906
      Test: Builds 'n' boots.
      Change-Id: Ia1d86264446ebecc1ca79f32f11354921bc77668
      Merged-In: I208ec6a864127a059fb389417a9c6b259d7474cb
      df5469d8
  25. Sep 27, 2017
    • Dan Cashman's avatar
      Fix build. · 7d1130f1
      Dan Cashman authored
      (This reverts internal commit: 82ca9c2e)
      Test: None.
      
      Merged-in: I97ffdd48b64ef5c35267387079204512a093a356
      Change-Id: I97ffdd48b64ef5c35267387079204512a093a356
      7d1130f1
    • Dan Cashman's avatar
      Fix build. · 852aca05
      Dan Cashman authored
      (This reverts internal commit: 82ca9c2e)
      Test: None.
      
      Change-Id: I97ffdd48b64ef5c35267387079204512a093a356
      852aca05
  26. Sep 26, 2017
  27. Sep 11, 2017
  28. Sep 05, 2017
  29. Sep 01, 2017
  30. Aug 28, 2017
    • Bowgo Tsai's avatar
      Moving adbd from rootdir to system/bin · 5846c79e
      Bowgo Tsai authored
      Bug: 63910933
      Test: boot sailfish in normal mode, checks adbd is started
      Test: boot sailfish in recovery mode, checks adbd is started
      Test: boot bullhead in normal mode, checks adbd is started
      Test: boot bullhead in recovery mode, checks adbd is started
      
      Change-Id: I35ed78a15a34626fbd3c21d030e2bf51033f7b79
      Merged-In: I35ed78a15a34626fbd3c21d030e2bf51033f7b79
      (cherry picked from commit e2423d14)
      5846c79e
  31. Aug 24, 2017
    • Mark Salyzyn's avatar
      Switch /data/misc/reboot/last_reboot_reason to persistent property · 006c2e99
      Mark Salyzyn authored
      Switch from /data/misc/reboot/last_reboot_reason to persistent
      Android property persist.sys.boot.reason for indicating why the
      device is rebooted or shutdown.
      
      Introduce protection for all boot reason properties
      
      Protect the following properties with these labels
      
      ro.boot.bootreason      u:object_r:bootloader_boot_reason_prop:s0
      sys.boot.reason         u:object_r:sys_boot_reason_prop:s0
      persist.sys.boot.reason u:object_r:last_boot_reason_prop:s0
      
      Setup the current as-need access rules for each.
      
      ToDo: Remove u:object_r:reboot_data_file after internal fixes.
      
      Test: system/core/bootstat/boot_reason_test.sh
      Bug: 64687998
      Change-Id: I3771c73933e8ae2d94aee936c7a38b6282611b80
      006c2e99
    • Jeff Vander Stoep's avatar
      Fix label on /dev/input · a43209eb
      Jeff Vander Stoep authored
      Commit 780a71e7 changed ueventd's selinux label lookup from /dev/input/
      to /dev/input which no longer matches the regex in core policy
      file_contexts. Fix the regex to match /dev/input and /dev/input/.
      
      avc: denied { read } for name="input" dev="tmpfs" ino=14092
      scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:device:s0
      tclass=dir
      avc: denied { open } for path="/dev/input" dev="tmpfs"
      ino=14092 scontext=u:r:hal_camera_default:s0
      tcontext=u:object_r:device:s0 tclass=dir
      
      Change-Id: I8f42f5cd96fc8353bf21d3ee6c3de9e2872f229f
      Fixes: 64997761
      Fixes: 64954704
      Test: no camera HAL denials
      a43209eb
Loading