Skip to content
Snippets Groups Projects
  1. May 09, 2018
    • Paul Crowley's avatar
      Add wait_for_keymaster · 6af7af15
      Paul Crowley authored
      Bug: 79228237
      Test: audit2allow finds no relevant denials on boot
      Change-Id: Ia80b77ba9a1ec2354127cd0ef68d50ebcf593fb0
      6af7af15
    • Calin Juravle's avatar
      Allow system server to write profile snapshots in /data/misc/profman · 687d5e46
      Calin Juravle authored
      The goal is to allow creating profile snapshots from the shell command in
      order to be able to write CTS tests.
      
      The system server will dump profiles for debuggable in /data/misc/profman
      from where they will be pulled and verified by CTS tests.
      
      Test: adb shell cmd package snapshot-profile com.android.vending
      Bug: 74081010
      Change-Id: I54690305284b92c0e759538303cb98c93ce92dd5
      687d5e46
  2. May 07, 2018
    • Jean-Michel Trivi's avatar
      Whitelist reading property ro.aac_drc_effect_type · 41795cdf
      Jean-Michel Trivi authored
      Bug: 71430241
      Test: build/flash, grep for "avc: denied { read }" for mediacodec, should be empty on walleye
      Change-Id: I12e1b11a969d3f979ca0cfbe4ca7db2bc5e46165
      41795cdf
    • Ray Essick's avatar
      give audioserver access to media.metrics · 2306cc04
      Ray Essick authored
      Let the audioserver record metrics with media.metrics service.
      This is for 'audiopolicy' metrics.
      
      Bug: 78595399
      Test: record from different apps, see records in 'dumpsys media.metrics'
      Change-Id: I63f9d4ad2d2b08eb98a49b8de5f86b6797ba2995
      2306cc04
  3. May 04, 2018
    • Calin Juravle's avatar
      Allow system server to record its own profile · 035fcc46
      Calin Juravle authored
      On userdebug builds we can now profile system server without disabling
      selinux. This is the final piece, and allows the system server to save its
      own profile.
      
      Test: manual, on a device with system server profiling enabled
      Bug: 73313191
      
      (cherry picked from commit 71d8467b)
      
      Change-Id: I93e7e01bfbd3146a8cfd26a1f6e88b640e9c4e0f
      035fcc46
  4. May 03, 2018
  5. May 02, 2018
  6. May 01, 2018
  7. Apr 30, 2018
  8. Apr 13, 2018
    • Wale Ogunwale's avatar
      Finalizing P SDK · 49b79029
      Wale Ogunwale authored
      Bug: 77588754
      Test: builds
      Change-Id: I61ceb438cd532584847ddd55c0eeaefebdcfa51c
      49b79029
  9. Feb 01, 2018
    • Tri Vo's avatar
      Add prebuilts/api/27.0/nonplat_sepolicy.cil. · 9bcce08b
      Tri Vo authored
      This file is /vendor/etc/selinux/nonplat_sepolicy.cil from aosp_arm64-eng
      from mr1-dev
      
      Bug: 69390067
      Test: prebuilt only change
      Change-Id: I717513ae66e806afe0071cf5b42e9f709264d0b6
      9bcce08b
  10. Dec 06, 2017
  11. Oct 16, 2017
    • Jin Qian's avatar
      storaged: add storaged_pri service · 37ab7c09
      Jin Qian authored
      "storaged" service will be used by external clients, e.g. vold, dumpsys
      "storaged_pri" service will only be used by storaged cmdline.
      
      Bug: 63740245
      Change-Id: I7a60eb4ce321aced9589bbb8474d2d9e75ab7042
      37ab7c09
  12. Sep 26, 2017
  13. Sep 19, 2017
    • Daniel Cashman's avatar
      Bug revert AOSP cherry-picks to enable big diff. · 46f41134
      Daniel Cashman authored
      The following commits were cherry-picked from internal master to AOSP,
      but to avoid merge-conflicts we'll do a large diff instead of individual
      cherry-picks:
      521742e9
      9aefc916
      3686efca
      de51e7de
      fff3fe2f
      
      Bug: 37916906
      Test: angler builds and boots.
      Merged-In: Ie010cc12ae866dbb97c387471f433158d3b699f3
      Change-Id: I5126ebe88b9c76a74690ecf95851d389cfc22d1f
      46f41134
    • Dan Cashman's avatar
      Bulk-revert changes caused by AOSP cherry-picks. · c3f9ebda
      Dan Cashman authored
      In order to bring AOSP development back in-line with master development,
      some CLs were cherry-picked individually from internal master to AOSP,
      which were then merged back into internal master (MERGED-IN was missing).
      Due to merge-conflict pain, these are being reverted in favor of one
      big diff.  This CL reverts the changes that were auto-merged in as a result,
      and can be used as the target of MERGED-IN when reverting the individual
      cherry-picks in AOSP.
      
      This reverts commit a08fe91e, reversing
      changes made to 11481d1d.
      
      This reverts commit 7ec5ecfb, reversing
      changes made to 6fecbbb2.
      
      Bug: 37916906
      Test: Builds 'n' boots.
      c3f9ebda
  14. Sep 08, 2017
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 521742e9
      Josh Gao authored
      Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log
      crashes to dmesg when logd isn't up yet (or is the one crashing).
      
      (Originally commited in a015186f)
      (cherry-pick of commit: 3458ec13)
      
      Bug: 37916906
      Bug: 36574794
      Bug: 62101480
      Test: Builds and boots.
      Change-Id: I83aa392f49bb412d96534925fb02921a8f4731fa
      521742e9
    • Dan Cashman's avatar
      Update sepolicy 26.0 prebuilts again, again. · 9aefc916
      Dan Cashman authored
      (cherry-pick of commit: 55c77504)
      
      Bug: 37916906
      Bug: 37896931
      Test: none, just prebuilt update.
      Change-Id: I55b5179f98703026699a59cce4b2e1afb166fd1d
      9aefc916
    • Dan Cashman's avatar
      Update 26.0 SELinux prebuilts. · 3686efca
      Dan Cashman authored
      More changes went into oc-dev after the freeze-date.  Reflect them.
      (cherry-pick of commit: 148578a6)
      
      Bug: 37916906
      Bug: 37896931
      Test: prebuilts - none.
      Change-Id: I3300751ea7362d5d96b327138544be65eb9fc483
      3686efca
    • Dan Cashman's avatar
      Add mapping compatibility file for sepolicy api lvl 26.0 · de51e7de
      Dan Cashman authored
      commit: 5c6a227e added the oc-dev
      sepolicy prebuilts (api 26.0), but did not include the corresponding
      base mapping file, which is to be maintained along with current
      platform development in order to ensure backwards compatibility.
      (cherry-pick of commit: 5e4e0d7f)
      
      Bug: 37916906
      Bug: 37896931
      Test: none, this just copies the old mapping file to prebuilts.
      Change-Id: Ia5c36ddab036352845878178fa9c6a9d649d238f
      de51e7de
    • Dan Cashman's avatar
      Commit oc-dev sepolicy to prebuilts. · fff3fe2f
      Dan Cashman authored
      Copy the final system sepolicy from oc-dev to its prebuilt dir
      corresponding to its version (26.0) so that we can uprev policy and
      start maintaining compatibility files, as well as use it for CTS
      tests targeting future platforms.
      
      (cherry-pick of commit: 5c6a227e)
      
      Bug: 37896931
      Bug: 37916906
      Test: none, this just copies the old policy.
      Change-Id: Ib069d505e42595c467e5d1164fb16fcb0286ab93
      fff3fe2f
  15. Aug 14, 2017
    • Dan Cashman's avatar
      Move compatibility files out of prebuilts dir. · 78b3d573
      Dan Cashman authored
      The treble compatibility tests check for policy differences between old
      and new policy.  To do this correctly, we must not modify the policy which
      represents the older policies.  Move the files meant to be changed to a
      different location from the ones that are not meant to be touched to avoid
      any undesired changes to old policy, e.g. commit:
      2bdefd65078d890889672938c6f0d2accdd25bc5
      
      Bug: 36899958
      Test: Build-time tests build.
      Change-Id: I8fa3947cfae756f37556fb34e1654382e2e48372
      78b3d573
  16. Aug 11, 2017
    • Dan Cashman's avatar
      Add missing attribute to compatibility file. · 758d2561
      Dan Cashman authored
      untrusted_app_visible_hwservice was an attribute that was meant to
      give partners time to add their HALs to AOSP.  It was removed from mr1
      and so needs to be accounted for in the compatibility mapping.
      
      Bug: 64321916
      Test: Builds with treble policy tests.
      Change-Id: I359a842083016f0cf6c9d7ffed2116feb9e159c6
      758d2561
    • Steven Moreland's avatar
      Add screencap domain. · f27bba93
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      f27bba93
    • Martijn Coenen's avatar
      Prevent access to nonplat_service_contexts on full_treble. · 431a03bb
      Martijn Coenen authored
      On Full Treble devices, servicemanager should only service
      services from the platform service_contexts file.
      
      Created new type to separate plat_ and nonplat_service_contexts,
      and added new type to mapping (although I don't think this type
      should have been used by vendors).
      
      Bug: 36866029
      Test: Marlin/Taimen boot
      Change-Id: Ied112c64f22f8486a7415197660faa029add82d9
      431a03bb
  17. Aug 08, 2017
    • Dan Cashman's avatar
      Fix thermalserviced_tmpfs compat recording mistake. · 34f827fb
      Dan Cashman authored
      Commit: 2490f1ad meant to add
      thermalserviced_tmpfs to the new_object list in the mapping file,
      but copy-paste error resulted in thermalserviced_exec_tmpfs being
      recorded instead.  Fix this.
      
      (cherry-pick of commit: fbacc656)
      
      Bug: 62573845
      Test: None. prebuilt change.
      Change-Id: Iab4eaef04742187d6397a539aae854651caa9935
      34f827fb
  18. Aug 07, 2017
    • Dan Cashman's avatar
      Fix thermalserviced_tmpfs compat recording mistake. · fbacc656
      Dan Cashman authored
      Commit: 2490f1ad meant to add
      thermalserviced_tmpfs to the new_object list in the mapping file,
      but copy-paste error resulted in thermalserviced_exec_tmpfs being
      recorded instead.  Fix this.
      
      Bug: 62573845
      Test: None. prebuilt change.
      Change-Id: Iab4eaef04742187d6397a539aae854651caa9935
      fbacc656
  19. Aug 04, 2017
    • Todd Kennedy's avatar
      Allow PackageManager to create a new service · 8bb80471
      Todd Kennedy authored
      A new API [getNamesForUids] was recently added to the PackageManager
      and this API needs to be accessible to native code. However, there
      were two constraints:
      1) Instead of hand-rolling the binder, we wanted to auto generate
      the bindings directly from the AIDL compiler.
      2) We didn't want to expose/annotate all 180+ PackageManager APIs
      when only a single API is needed.
      So, we chose to create a parallel API that can be used explicitly
      for native bindings without exposing the entirety of the
      PackageManager.
      
      Bug: 62805090
      Test: Manual
      Test: Create a native application that calls into the new service
      Test: See the call works and data and returned
      Change-Id: I0d469854eeddfa1a4fd04b5c53b7a71ba3ab1f41
      8bb80471
    • Dan Cashman's avatar
      Record thermalserviced_tmpfs for compat infrastructure. · e772a5cf
      Dan Cashman authored
      Commit: ec3b6b7e added a new daemon
      and corresponding types to sepolicy.  The explicitly declared types
      were added to 26.0.ignore.cil to reflect the labeling of new objects,
      but another type, thermalserviced_tmpfs was created by macro and was
      missed in code review.  Add it as well.
      
      Bug: 62573845
      Test: None. prebuilt change.
      Change-Id: Ia8968448eea0be889911f46fe255f581659eb548
      (cherry picked from commit 2490f1ad)
      e772a5cf
    • Todd Poynor's avatar
      thermal: sepolicy for thermalservice and Thermal HAL revision 1.1 · e9b2def7
      Todd Poynor authored
      Add sepolicy for thermalserviced daemon, IThermalService binder
      service, IThermalCallback hwservice, and Thermal HAL revision 1.1.
      
      Test: manual: marlin with modified thermal-engine.conf
      Bug: 30982366
      Change-Id: I207fa0f922a4e658338af91dea28c497781e8fe9
      (cherry picked from commit ec3b6b7e)
      e9b2def7
  20. Aug 03, 2017
    • Dan Cashman's avatar
      Record thermalserviced_tmpfs for compat infrastructure. · 2490f1ad
      Dan Cashman authored
      Commit: ec3b6b7e added a new daemon
      and corresponding types to sepolicy.  The explicitly declared types
      were added to 26.0.ignore.cil to reflect the labeling of new objects,
      but another type, thermalserviced_tmpfs was created by macro and was
      missed in code review.  Add it as well.
      
      Bug: 62573845
      Test: None. prebuilt change.
      Change-Id: Ia8968448eea0be889911f46fe255f581659eb548
      2490f1ad
  21. Aug 01, 2017
    • Dan Cashman's avatar
      Record hal_wifi_offload_hwservice type for compatibility. · 0ff9aa21
      Dan Cashman authored
      Commit: 5aef6a94 added a new type,
      system_net_netd_hwservice, for a new hwservice.  Record this in the
      compatibility infrastructure as labeling a new object, rather than
      relabeling one from O.
      
      (cherry-pick of commit: 3fc7f836)
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: If360eb9e05684d9b47316d53e494aa773485e93f
      0ff9aa21
  22. Jul 31, 2017
    • Dan Cashman's avatar
      Record hal_wifi_offload_hwservice type for compatibility. · 3fc7f836
      Dan Cashman authored
      Commit: 5aef6a94 added a new type,
      system_net_netd_hwservice, for a new hwservice.  Record this in the
      compatibility infrastructure as labeling a new object, rather than
      relabeling one from O.
      
      Bug: 62573845
      Test: None. Prebuilt change only.
      Change-Id: If360eb9e05684d9b47316d53e494aa773485e93f
      3fc7f836
    • Dan Cashman's avatar
      Record mediaprovider_tmpfs type for compatibility. · 079a98b8
      Dan Cashman authored
      Commit: 3eed3eac added the compatibility
      statement for the new mediaprovider app domain, but it missed another
      new, private type, mediaprovider_tmpfs, that is automatically created for
      all appdomains.  It replaces priv_app_tmpfs, but since both types are
      private, they do not need to be added to the actual mapping (vendor policy
      cannot use it).
      
      Bug: 62573845
      Test: None.  Prebuilt-only change.
      Change-Id: I62229a5be74cd928fe0ca82a45b73cb61d6f5223
      079a98b8
Loading