Skip to content
Snippets Groups Projects
  1. Mar 26, 2018
    • Tom Cherry's avatar
      a8b42c97
    • Treehugger Robot's avatar
    • Tom Cherry's avatar
      Verify the SELabels used in property_contexts · a15df75d
      Tom Cherry authored
      Verify that the SELabels used in property_contexts correspond to a
      real type in the SEPolicy and that this type has the property_type attribute.
      
      Additionally add a check that vendor property_context files do not
      duplicate entries in plat property_contexts, and a similar check that
      odm property_contexts doesn't duplicate either plat or vendor
      property_contexts.
      
      Bug: 74078792
      Test: Build property_contexts on bullhead successfully
      Test: See failure when using a faulty SELabel in property_contexts
      Test: See failure when duplicating label in vendor and plat property_contexts
      Change-Id: I4d2338dab68f1c5a8ed110aa7821f0677f61bafb
      a15df75d
    • Primiano Tucci's avatar
      Revert "Allow system server to set persist.traced.enable" · 4f673cf4
      Primiano Tucci authored
      This reverts commit 6f2040f8.
      
      Reason for revert: not needed anymore after ag/3773705
      This was meant to allow system_server toggling the property on/off.
      Later we realized that we needed a separate property for that 
      (see discussion in b/76077784) and system server happens to
      have already permissions to write to sys.* properties even without
      this CL.
      Reverting because at this point this creates just unnecessary clutter.
      
      Change-Id: Ia73d000aad3c4288a5652047dfe10896e231b0b1
      Test: perfetto_integrationtests
      Bug: 76077784
      4f673cf4
    • Primiano Tucci's avatar
      perfetto: allow traced to write into FDs received by the client · 5d317326
      Primiano Tucci authored
      This allows an optimization that consists in the "perfetto" cmdline
      client passing directly the file descriptor for the output trace
      to traced (as opposite to having traced streaming back the trace
      data to "perfetto" and having that one doing the write() into file).
      This reduces sensibly the memory traffic and CPU overhead of traces
      with a minor change.
      
      Bug: 73625179
      Test: builds + perfetto_integrationtests w/ long_trace.cfg
      Change-Id: I81f5a230338ced20dc543fd91c5a0bd0e58725f2
      5d317326
  2. Mar 24, 2018
  3. Mar 23, 2018
  4. Mar 22, 2018
    • Mikhail Naganov's avatar
      Allow system_server to update timerslack_ns for hal_audio_default · e6293b1c
      Mikhail Naganov authored
      Based on the following audit message:
      
      type=1400 audit(1521738979.005:385): avc: denied { write } for pid=1269
      comm="Binder:1269_B" name="timerslack_ns" dev="proc" ino=254190
      scontext=u:r:system_server:s0 tcontext=u:r:hal_audio_default:s0
      tclass=file permissive=1
      
      Bug: 74110604
      Test: adb shell dmesg | grep hal_audio_default
      Change-Id: I4c2e787588eb9d223d5e50e1bc8f67876de97c2e
      e6293b1c
    • Primiano Tucci's avatar
      Fix selinux brekage on user for atrace · 68240241
      Primiano Tucci authored
      Follow up to aosp/635599. It broke user builds again
      despite being tree hugged because of b/74344625.
      Adding missing ignore entries.
      
      Bug: b/73340039
      Change-Id: Iba195d571aec9579195d79d4970f760e417608c6
      68240241
    • Treehugger Robot's avatar
    • Primiano Tucci's avatar
      Reland: perfetto: allow traced_probes to execute atrace · feaf22b1
      Primiano Tucci authored
      This CL adds the SELinux permissions required to execute
      atrace and get userspace tracing events from system services.
      This is to enable tracing of events coming from surfaceflinger,
      audio HAL, etc.
      atrace, when executed, sets a bunch of debug.atrace. properties
      and sends an IPC via binder/hwbinder to tell the services to
      reload that property.
      
      This CL does NOT affect systrace. In that case (i.e. when
      atrace is executed from adb/shell) atrace still runs in
      the shell domain and none of those changes apply.
      
      Change-Id: I11b096d5c5c5593f18bce87f06c1a7b1ffa7910e
      Bug: b/73340039
      feaf22b1
  5. Mar 21, 2018
    • Treehugger Robot's avatar
      cd175e0e
    • Treehugger Robot's avatar
      Merge "Fix mapping file build." · cc4b960f
      Treehugger Robot authored
      cc4b960f
    • Chenbo Feng's avatar
      Allow netd to setup xt_bpf iptable rules · 5c95c168
      Chenbo Feng authored
      To better record the network traffic stats for each network interface.
      We use xt_bpf netfilter module to do the iface stats accounting instead
      of the cgroup bpf filter we currently use for per uid stats accounting.
      The xt_bpf module will take pinned eBPF program as iptables rule and run
      the program when packet pass through the netfilter hook. To setup the
      iptables rules. netd need to be able to access bpf filesystem and run the
      bpf program at boot time. The program used will still be created and
      pinned by the bpfloader process.
      
      Test: With selinux enforced, run "iptables -L -t raw" should show the
      xt_bpf related rule present in bw_raw_PREROUTING chain.
      Bug: 72111305
      
      Change-Id: I11efe158d6bd5499df6adf15e8123a76cd67de04
      5c95c168
    • Tri Vo's avatar
      silence innocuous denials to /proc and /sys · 422fb98e
      Tri Vo authored
      Bug: 74182216
      Test: build bullhead, sailfish sepolicy
      Change-Id: I6d0635a49c025870c9ecb46147e6c9a1c407fe16
      422fb98e
    • Tri Vo's avatar
    • Tri Vo's avatar
      Revert "silence innocuous denials to /proc and /sys" · cee3f687
      Tri Vo authored
      This reverts commit 09b1d962.
      
      Reason for revert: bullhead broken
      
      Change-Id: Ib4562f944cdc2618cc3ed3beb4f612f0ef8b3223
      cee3f687
    • Tri Vo's avatar
      Fix mapping file build. · bbb8f5bd
      Tri Vo authored
      Location of mapping files has changed from private/mapping/V.v.cil to
      private/compat/V.v/V.v.cil
      Change the build rule for current_mapping.cil to reflect that.
      
      Test: Build current mapping file with  BOARD_SEPOLICY_VERS := 27.0 and
      make sure that $OUT/obj/ETC/27.0.cil_intermediates/27.0.cil is not empty
      Change-Id: I996a717e1c659265cb067da5d621d71ff3b3b63b
      bbb8f5bd
  6. Mar 20, 2018
  7. Mar 19, 2018
    • Alan Stokes's avatar
      Add alanstokes as an owner. · ac40afad
      Alan Stokes authored
      Test: n/a
      Change-Id: Iba86b7d77582e85de7469bedaf31465205e42433
      ac40afad
    • Tri Vo's avatar
      silence innocuous denials to /proc and /sys · 09b1d962
      Tri Vo authored
      Bug: 74182216
      Test: build policy
      Change-Id: Idf90c1a96943266d52508ce72b8554d8b5c594c9
      09b1d962
    • Tri Vo's avatar
      proc_type attribute for files under /proc. · 41bf08e5
      Tri Vo authored
      With this attribute it will be easier to reference /proc files.
      
      Bug: 74182216
      Test: policy builds
      Change-Id: I5b7da508d821e45f122832261a742a201e8fdf2c
      41bf08e5
    • Chong Zhang's avatar
      allow mediaprovider to use media extractor · 8e3fef3d
      Chong Zhang authored
      When extraction exif info, certain file formats may requires
      parsing the container. Allow mediaprovider to use extractor
      to do the parsing.
      
      bug: 73978990
      Test: manually test the scenario in b/73978990 and verify
            the Exif is extracted correctly.
      
      Change-Id: I1cd46d793ebc9c38b816a3b63f361967e551d046
      8e3fef3d
Loading