- Mar 22, 2018
-
-
Primiano Tucci authored
-
Primiano Tucci authored
This CL adds the SELinux permissions required to execute atrace and get userspace tracing events from system services. This is to enable tracing of events coming from surfaceflinger, audio HAL, etc. atrace, when executed, sets a bunch of debug.atrace. properties and sends an IPC via binder/hwbinder to tell the services to reload that property. This CL does NOT affect systrace. In that case (i.e. when atrace is executed from adb/shell) atrace still runs in the shell domain and none of those changes apply. Change-Id: I11b096d5c5c5593f18bce87f06c1a7b1ffa7910e Merged-In: I11b096d5c5c5593f18bce87f06c1a7b1ffa7910e Merged-In: Iba195d571aec9579195d79d4970f760e417608c6 Bug: b/73340039
-
TreeHugger Robot authored
-
TreeHugger Robot authored
-
- Mar 21, 2018
-
-
Fyodor Kupolov authored
-
Chenbo Feng authored
To better record the network traffic stats for each network interface. We use xt_bpf netfilter module to do the iface stats accounting instead of the cgroup bpf filter we currently use for per uid stats accounting. The xt_bpf module will take pinned eBPF program as iptables rule and run the program when packet pass through the netfilter hook. To setup the iptables rules. netd need to be able to access bpf filesystem and run the bpf program at boot time. The program used will still be created and pinned by the bpfloader process. Test: With selinux enforced, run "iptables -L -t raw" should show the xt_bpf related rule present in bw_raw_PREROUTING chain. Bug: 72111305 Change-Id: I11efe158d6bd5499df6adf15e8123a76cd67de04 (cherry picked from aosp commit 5c95c168)
-
TreeHugger Robot authored
* changes: Add /odm/etc/selinux/odm_mac_permissions.xml Add /odm/etc/selinux/odm_hwservice_contexts Add /odm/etc/selinux/odm_property_contexts Add /odm/etc/selinux/odm_seapp_contexts Add /odm/etc/selinux/odm_file_contexts Add /odm/etc/selinux/odm_sepolicy.cil
-
Fyodor Kupolov authored
Test: manual Bug: 75318418 Merged-In: I700c1b8b613dba1c99f4fbffdd905c0052c1b2e7 Change-Id: I700c1b8b613dba1c99f4fbffdd905c0052c1b2e7
-
- Mar 20, 2018
-
-
Tri Vo authored
* changes: silence innocuous denials to /proc and /sys proc_type attribute for files under /proc.
-
TreeHugger Robot authored
-
Joel Galenson authored
This should fix audio on non-Treble devices. Bug: 75949883 Test: Built policy. Merged-In: I90a4648aaf975d59be36afd5f62c88a015af10f7 Change-Id: I90a4648aaf975d59be36afd5f62c88a015af10f7 (cherry picked from commit 6e8bfa2d)
-
Alan Stokes authored
Bug: 72643420 Test: n/a Change-Id: Iba86b7d77582e85de7469bedaf31465205e42433
-
Bowgo Tsai authored
Bug: 64240127 Test: normal boot a device Change-Id: I276ba6bc88eabb0d5562e4e96d3860eedb76aed5 Merged-In: I276ba6bc88eabb0d5562e4e96d3860eedb76aed5 (cherry picked from commit af7d85f8)
-
Bowgo Tsai authored
Bug: 64240127 Test: normal boot and recovery boot a device Change-Id: I22d29e8476380d19aca1be359e0228ab6bbc3b0f Merged-In: I22d29e8476380d19aca1be359e0228ab6bbc3b0f (cherry picked from commit ad6231f5)
-
Bowgo Tsai authored
Bug: 64240127 Test: normal boot and recovery boot a device Change-Id: Ibd71219f60644e57370c0293decf11d82f1cb35c Merged-In: Ibd71219f60644e57370c0293decf11d82f1cb35c (cherry picked from commit 1f717b10)
-
Bowgo Tsai authored
Bug: 64240127 Test: normal boot a device Change-Id: I3626357237cc18a99511f1ebd9dd3ff5a7655963 Merged-In: I3626357237cc18a99511f1ebd9dd3ff5a7655963 (cherry picked from commit ecf656b0)
-
Bowgo Tsai authored
Bug: 64240127 Test: normal boot and recovery boot a device Change-Id: I087292fb23d05fc17272778d668ac78a721b2593 Merged-In: I087292fb23d05fc17272778d668ac78a721b2593 (cherry picked from commit bae1517a)
-
Bowgo Tsai authored
This change adds the support of odm sepolicy customization, which can be configured through the newly added build varaible: - BOARD_ODM_SEPOLICY_DIRS += device/${ODM_NAME}/${BOM_NAME}/sepolicy Also moving precompiled sepolicy to /odm when BOARD_ODM_SEPOLICY_DIRS is set. On a DUT, precompiled sepolicy on /odm will override the one in /vendor. This is intentional because /odm is the hardware customization for /vendor and both should be updated together if desired. Bug: 64240127 Test: boot a device with /odm partition Change-Id: Ia8f81a78c88cbfefb3ff19e2ccd2648da6284d09 Merged-In: Ia8f81a78c88cbfefb3ff19e2ccd2648da6284d09 (cherry picked from commit 45457e3a)
-
Bowgo Tsai authored
This reverts commit 88cd813f. Bug: 75287236 Test: boot a device Change-Id: Id1bc324e7bd0722065d8a410af31fd6b7aaa9d1c Merged-In: Id1bc324e7bd0722065d8a410af31fd6b7aaa9d1c (cherry picked from commit 942500b9)
-
TreeHugger Robot authored
-
- Mar 19, 2018
-
-
Chong Zhang authored
-
Chong Zhang authored
When extraction exif info, certain file formats may requires parsing the container. Allow mediaprovider to use extractor to do the parsing. bug: 73978990 Test: manually test the scenario in b/73978990 and verify the Exif is extracted correctly. Change-Id: I1cd46d793ebc9c38b816a3b63f361967e551d046 (cherry picked from commit 8e3fef3d)
-
Jaekyun Seok authored
persist.sys.usb.usbradio.config can be read in vendor init scripts. Bug: 75202311 Bug: 74266614 Test: succeeded building and tested on pixels Change-Id: Ib07a436dd22b4b445fd114cc1d0df7c3e7a21527
-
TreeHugger Robot authored
-
Bowgo Tsai authored
Several /odm/* symlinks are added in the following change, to fallback to /vendor/odm/* when there is no /odm partition on the device. https://android-review.googlesource.com/#/c/platform/system/sepolicy/+/638159/ This change allows dexopt operations to 'getattr' those symlinks during OTA. Bug: 75287236 Test: boot a device Change-Id: I2710ce5e2c47eb1a3432123ab49f1b6f3dcb4ffe Merged-In: I2710ce5e2c47eb1a3432123ab49f1b6f3dcb4ffe (cherry picked from commit 88cd813f)
-
- Mar 18, 2018
-
-
Jaekyun Seok authored
Bug: 74866333 Test: succeeded building and tested with taimen Change-Id: Id19fec168ab266e386ea4c710a4c5cedfc4df33c Merged-In: Id19fec168ab266e386ea4c710a4c5cedfc4df33c (cherry picked from commit 62acbce4)
-
TreeHugger Robot authored
-
- Mar 16, 2018
-
-
TreeHugger Robot authored
-
padarshr authored
Allow init the ability to relabel recovery block devices. In the case where we have recovery as a chain partition, due to its presence in early mount node, init, in first stage itself would require relabel permissions for the restorecon operation on recovery block device. Bug: 73642793 Test: On bootup, recovery partition gets the appropriate se-label. Perform OTA on non-A/B device with recovery as chain partition, now the recovery partition gets upgraded successfully, now that it has the correct se-label. Change-Id: I370c510320e78ab78c9c55573073415b4983d0f6 Merged-In: I370c510320e78ab78c9c55573073415b4983d0f6 (cherry picked from commit bc14ee3c)
-
Bowgo Tsai authored
Bug: 64195575 Test: boot a device Change-Id: I7f7deb5e2c5c6e0a75cf22eb610a7973b5be0d7e Merged-In: I7f7deb5e2c5c6e0a75cf22eb610a7973b5be0d7e (cherry picked from commit a47a1c25)
-
- Mar 13, 2018
-
-
Jaekyun Seok authored
vendor-init-settable should be allowed to ro.enable_boot_charger_mode so that SoC vendors can set its default value. Bug: 74421250 Test: succeeded building and tested with taimen Change-Id: I2859aab29fefb7882989413a089b0de55142d2f1 Merged-In: I2859aab29fefb7882989413a089b0de55142d2f1 (cherry picked from commit 46bc518c)
-
TreeHugger Robot authored
-
Jakub Pawlowski authored
Bug: 69623109 Change-Id: I7d194a3489fc5ff278cef7bebe9bfe6c39d3b2b8 (cherry-picked from 4a40c592404bdc2032067f4a3fac2f33b9246aa0)
-
Petri Gynther authored
-
Petri Gynther authored
-
- Mar 12, 2018
-
-
TreeHugger Robot authored
-
Joel Galenson authored
It should instead write to /data/vendor/wifi. Bug: 36645291 Test: Built policy. Change-Id: Ib7ba3477fbc03ebf07b886c60bcf4a64b954934a (cherry picked from commit cc9b30a1)
-
TreeHugger Robot authored
-