- Mar 15, 2018
-
-
Bowgo Tsai authored
Bug: 64195575 Test: boot a device Change-Id: I7f7deb5e2c5c6e0a75cf22eb610a7973b5be0d7e
-
- Mar 13, 2018
-
-
Jaekyun Seok authored
vendor-init-settable should be allowed to ro.enable_boot_charger_mode so that SoC vendors can set its default value. Bug: 74421250 Test: succeeded building and tested with taimen Change-Id: I2859aab29fefb7882989413a089b0de55142d2f1
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Treehugger Robot authored
* changes: sepolicy: Read access to audioserver for Bluetooth properties Bluetooth A2DP offload: Binder call to audio HAL
-
- Mar 12, 2018
-
-
Treehugger Robot authored
-
Aniket Kumar Lata authored
Provide read/write access to audioserver for Bluetooth properties used with A2DP offload. Bug: 68824150 Test: Manual; TestTracker/148125 Change-Id: I40c932d085ac55bc45e6654f966b2c9d244263d0 (cherry picked from commit 041049bc7a4e29dcca48e2c068b92aa8a8157d90)
-
Sunny Kapdi authored
Add rule to allow Binder call from Bluetooth process to Bluetooth audio HIDL interface running in audio HAL service process. Bug: 72242910 Test: Manual; TestTracker/148125 Change-Id: I1981a78bece10b8e516f218d3edde8b77943d130 (cherry picked from commit e8cfac90e8bf14466b6431a21bc5ccd4bf6ca3ea)
-
Treehugger Robot authored
-
Amit Mahajan authored
This reverts commit 016f0a58. Reason for revert: Was temporarily reverted, merging back in with fix. Test: Basic telephony sanity, treehugger Bug: 74486619 Bug: 36427227 Merged-in: Ide68726a90d5485c2758673079427407aee1e4f2 Change-Id: Ide68726a90d5485c2758673079427407aee1e4f2 (cherry picked from commit 312248ff)
-
Jakub Pawlowski authored
Bug: 69623109 Change-Id: I7d194a3489fc5ff278cef7bebe9bfe6c39d3b2b8
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Amit Mahajan authored
This reverts commit aed57d4e. Reason for revert: This CL is expected to break pre-submit tests (b/74486619) Merged-in: I103c3faa1604fddc27b3b4602b587f2d733827b1 Change-Id: I0eb7a744e0d43ab15fc490e7e7c870d0f44e1401
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Bowgo Tsai authored
/odm partition isn't mandatory and the following symlinks will exist on a device without /odm partition. /odm/app ->/vendor/odm/app /odm/bin ->/vendor/odm/bin /odm/etc ->/vendor/odm/etc /odm/firmware ->/vendor/odm/firmware /odm/framework ->/vendor/odm/framework /odm/lib -> /vendor/odm/lib /odm/lib64 -> /vendor/odm/lib64 /odm/overlay -> /vendor/odm/overlay /odm/priv-app -> /vendor/odm/priv-app This CL allows all domains to access the symlinks, also removes the Treble compliance neverallows on them because the actual restrictions should apply to the real path directly. Bug: 70678783 Test: boot a device Change-Id: If1522780a13710d8a592272dc688685cbae29f52
-
Joel Galenson authored
It should instead write to /data/vendor/wifi. Bug: 36645291 Test: Built policy. Change-Id: Ib7ba3477fbc03ebf07b886c60bcf4a64b954934a
-
- Mar 10, 2018
-
-
Amit Mahajan authored
Also change the neverallow exceptions to be for hal_telephony_server instead of rild. Test: Basic telephony sanity, treehugger Bug: 36427227 Merged-in: If892b28416d98ca1f9c241c5fcec70fbae35c82e Change-Id: If892b28416d98ca1f9c241c5fcec70fbae35c82e
-
- Mar 09, 2018
-
-
Jaekyun Seok authored
Bug: 74266614 Test: succeeded building and tested on pixel PRODUCT_COMPATIBLE_PROPERTY_OVERRIDE=true Change-Id: I926eb4316c178a39693300fe983176acfb9cabec Merged-In: I926eb4316c178a39693300fe983176acfb9cabec (cherry picked from commit 9ddba296)
-
- Mar 08, 2018
-
-
Joel Galenson authored
When building userdebug or eng builds, we still want to build the user policy when checking neverallow rules so that we can catch compile errors. Commit c0713e86 split out a helper function but lost one instance of using user instead of the real variant. This restores that one and adds it to the neverallow check. Bug: 74344625 Test: Added a rule that referred to a type defined only in userdebug and eng and ensure we throw a compile error when building userdebug mode. Change-Id: I1a6ffbb36dbeeb880852f9cbac880f923370c2ae (cherry picked from commit 053cb341)
-
- Mar 07, 2018
-
-
Treehugger Robot authored
-
Joel Galenson authored
This should fix presubmit tests. Bug: 74331887 Test: Built policy. Change-Id: Ie9ef75a7f9eaebf1103e3d2f3b4521e9abaf2fe7 (cherry picked from commit 2995e996)
-
Treehugger Robot authored
-
Treehugger Robot authored
-
Joel Galenson authored
Remove a fixed bug from bug_map. Bug: 62140539 Test: Built policy. Change-Id: I2ce9e48de92975b6e37ca4a3a4c53f9478b006ef (cherry picked from commit f3f93eaf)
-
Jiyong Park authored
Sub directories under /odm (or /vendor/odm when there isn't an odm partition) are labeled so that artifacts under the sub directories are treated the same as their counterpart in the vendor partition. For example, /odm/app/* is labeled as vendor_app_file just like /vendor/app/*. Bug: 71366495 Test: m -j Change-Id: I72a14fd55672cd2867edd88ced9828ea49726694
-
Treehugger Robot authored
-
Ruchi Kandoi authored
Test: eSE initializes at boot Bug: 64881253 Change-Id: Ib2388b7368c790c402c000adddf1488bee492cce
-
Primiano Tucci authored
-
Primiano Tucci authored
This reverts commit 54a86e2b. Reason for revert: Broke user builds, see go/twqpd system/sepolicy/private/traced_probes.te:46:ERROR 'unknown type atrace' at token ';' on line 34879: # scontext=u:r:atrace:s0 tcontext=u:r:traced_probes:s0 tclass=fd allow atrace traced_probes:fd use; checkpolicy: error(s) encountered while parsing configuration out/host/linux-x86/bin/checkpolicy: loading policy configuration from out/target/product/taimen/obj/ETC/sepolicy_neverallows_intermediates/policy.conf Change-Id: I24440e1928700530b63b70b658c63046cdcdc5de
-
Treehugger Robot authored
-
Kenny Root authored
ADB is being separated from USB service since it's not tied to the USB transport. This duplicates the usb_service's settings to adb_service for this purpose. Bug: 63820489 Test: make Change-Id: Idbcfbe470d7568f9cba51f0c8d4a8ee9503db93d
-
Kweku Adams authored
Bug: 72177715 Bug: 72384374 Test: flash device and make sure incidentd is getting data without SELinux denials Change-Id: I684fe014e19c936017a466ec2d6cd2e1f03022c0
-
- Mar 06, 2018
-
-
Chenbo Feng authored
With the new patches backported to 4.9 kernels, the bpf file system now take the same file open flag as bpf_obj_get. So system server now need read permission only for both bpf map and fs_bpf since we do not need system server to edit the map. Also, the netd will always pass stdin stdout fd to the process forked by it and do allow it will cause the fork and execev fail. We just allow it pass the fd to bpfloader for now until we have a better option. Test: bpfloader start successful on devices with 4.9 kernel. run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest Bug: 74096311 Bug: 30950746 Change-Id: I747a51cb05ae495c155e7625a3021fc77f921e0d
-
- Mar 05, 2018
-
-
Joel Galenson authored
This commit adds new SELinux permissions and neverallow rules so that taking a bugreport does not produce any denials. Bug: 73256908 Test: Captured bugreports on Sailfish and Walleye and verified that there were no denials. Merged-In: If3f2093a2b51934938e3d7e5c42036b2e2bf6de9 Change-Id: I10882e7adda0bb51bf373e0e62fda0acc8ad34eb
-
- Mar 02, 2018
-
-
Primiano Tucci authored
This CL adds the SELinux permissions required to execute atrace and get userspace tracing events from system services. This is to enable tracing of events coming from surfaceflinger, audio HAL, etc. atrace, when executed, sets a bunch of debug.atrace. properties and sends an IPC via binder/hwbinder to tell the services to reload that property. Change-Id: I2b0a66dcb519cb296e1d0e6e3f15a425dc809089 Bug: 73340039
-
- Mar 01, 2018
-
-
Jerry Zhang authored
UsbDeviceManager in system_server now helps set up the endpoint files. Bug: 72877174 Test: No selinux denials Change-Id: I96b11ee68799ac29b756d2034e7f5e4660dbed98
-
Alan Stokes authored
We already grant rw file access, but without dir search it's not much use. denied { search } for name="vibrator" dev="sysfs" ino=49606 scontext=u:r:hal_vibrator_default:s0 tcontext=u:object_r:sysfs_vibrator:s0 tclass=dir permissive=0 Bug: 72643420 Test: Builds, denial gone Change-Id: I3513c0a14f0ac1e60517009046e2654f1fc45c66
-
huans authored
Bug: 73952536 Test: run cts -m CtsCameraTestCases -t android.hardware.camera2.cts.IdleUidTest#testCameraAccessBecomingInactiveUid Change-Id: I508352671367dfa106e80108c3a5c0255b5273b2
-