aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* | sepolicy: Address denials for legacy last_kmsg fileBruno Martins2020-02-0414-0/+16
| | | | | | | | | | | | | | | | | | | | * Android's system server still requests access to /proc/last_kmsg as alternative to /sys/fs/pstore/console-ramoops for fs shutdown time logging purposes. * Also allow init.rc to chmod/chown the file. Change-Id: I6beb064778da4af86f8735f663349f6153d4a3f8
* | Allow init to write to /proc/cpu/alignmentKevin F. Haggerty2020-01-2712-0/+12
| | | | | | | | | | | | | | | | | | | | * AOSP init.rc attempts to write to /proc/cpu/alignment, but following 84e181bc, general access to procfs nodes is prohibited. * Add an appropriate type, genfscon, and allow to permit this action. Change-Id: I31ad8eaa6ebb6dd57d1b9c4395cb22cdd0d7b3d3 (cherry picked from commit 6213f5041a6e9242b2a23c8cc85d0d76cbc1fc45)
* | sepolicy: Treat proc-based DT fstab the same and sys-basedKevin F. Haggerty2020-01-1520-0/+36
| | | | | | | | | | | | | | * Older devices have a DT fstab in proc, so we need to expand our policy to make this first-class like the fancy, new, sys devices Change-Id: I3cfed1e8e9fdf8665f1348fa07fa42d4f37873e9
* | Fix storaged access to /sys/block/mmcblk0/stat after 48027a00Vladimir Oltean2020-01-1510-0/+18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Commit "storaged: remove access to sysfs_type" denied the storaged daemon access to the sysfs node it needed to do its work. * It also didn't provide any means necessary for adding the necessary rules at a device level, since its sepolicy is private. * Here we define a new sysfs_disk_stat security label, which device maintainers are supposed to add to their genfs_contexts file. This is similar to how hal_health_default and sysfs_batteryinfo is handled. * What prevents the genfs_contexts from being added here directly is that in a typical vendor implementation, these sysfs files are actually symlinks and not a single, unified path SELinux-wise. Change-Id: I13ca09cf2458b22ffb6c70b8a353e891e810c606 Signed-off-by: Vladimir Oltean <olteanv@gmail.com>
* | file_contexts: Include legacy /system/vendor pathsFelix2020-01-142-8/+8
| | | | | | | | | | | | | | | | | | | | Probably flew under the radar because Google only tests on devices that include devices with a physical /vendor partition. Test: "make selinux_policy", confirm correct labels on a legacy device Change-Id: I1aa856c6e3774912d1f4c0a09bbc2d174016f59d Signed-off-by: Felix <google@ix5.org>
* | app_zygote need access to oem partitionHenrik Baard2020-01-132-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | app_zygote used by for example Google Chrome needs access to at least search /oem partition. Google chrome version: 76.0.3809.132 is running in app_zygote and the following access is blocked by selinux causing Chrome to hang. avc: denied { search } for pid=813 comm="d.chrome_zygote" name="/" dev="sda42" ino=2 scontext=u:r:app_zygote:s0:c214,c256,c512,c768 tcontext=u:object_r:oemfs:s0 tclass=dir permissive=0 ppid=798 pcomm="d.chrome_zygote" pgid=798 pgcomm="d.chrome_zygote" Bug: b/146481702 Bug: b/146532583 Test: run vts -m CtsAppTestCases && CtsExternalServiceTestCases Change-Id: Idcce1a5ad1a8be3d7bd057c12ec477baa9669235 Merged-In: Idcce1a5ad1a8be3d7bd057c12ec477baa9669235 (cherry picked from commit 8c94186ca599ddea6d4177626ea5232ac5cbf036)
* | Set odm and vendor build.version.incremental to be publicly readableHsin-Yi Chen2020-01-132-0/+4
| | | | | | | | | | | | | | | | | | | | | | | | VTS and CTS-on-GSI report the device's ro.odm.build.version.incremental or ro.vendor.build.version.incremental. The properties need to be readable without root privilege. Test: adb shell getprop ro.odm.build.version.incremental Bug: 145255132 Change-Id: Ibb71185888cce022cb3a9be3e6fb2199d5f438d9 Merged-In: Ibb71185888cce022cb3a9be3e6fb2199d5f438d9 (cherry picked from commit 26f34a497bc627d670346efcf8da027cf353340e)
* | Allow vendor to configure lmkd propertiesGreg Hartman2020-01-132-0/+16
| | | | | | | | | | | | | | BUG: 138399045 Test: Boot cuttlefish. properties set Change-Id: I3138048e9d13f8c0aee1ad3eb4e761809bafcf1d (cherry picked from commit 626114424f3fda033834fb241d11c45a73972172)
* | Mark mediacodec_2{6,7,8} as hal_omx_serverPierre-Hugues Husson2020-01-136-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The commit 7baf725ea6 broke OMX on O/O-MR1(/P?) vendors. Previous to this commit, all OMX codecs had to use "mediacodec" type, after this commit, omx codecs just had to get hal_omx_server attribute. This commit left to the vendor the charge of adding "hal_omx_server" attribute to mediacodec. However this can't work on non-Q vendors. On P vendor, versioned_plat_pub contains the appdomain <=> mediacodec allows, so OMX isn't technically broken on those devices. But to ensure it won't break in the future, mark 28's mediacodec as hal_omx_server as well This fixes broken OMX decoding on O/O-MR1 vendors, failing with the following denial: avc: denied { call } for comm=4E444B204D65646961436F6465635F scontext=u:r:platform_app:s0:c512,c768 tcontext=u:r:mediacodec:s0 tclass=binder permissive=0 Bug: 141186440 Change-Id: I018f8d9aabc77e7ea86ca14734b1ab2edfdf8ed1
* | Export vold FDE algorithm propertiesyuguoxu2020-01-132-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ro.crypto.fde_algorithm ro.crypto.fde_sector_size ro.crypto.volume.contents_mode These properties were not added to sepolicy export2vold. vold can't access crypto algorithm type when flashing a GSI image and when the properties are in /vendor/build.prop. This prevents FDE from working. Bug: 141518844 Change-Id: I234bda439f6be7a2211a194856baf75800396232 Signed-off-by: yuguoxu <yuguoxu@allwinnertech.corp-partner.google.com> (cherry picked from a894a1aa66405eebd151ae61fff0fa219d720aec)
* | Snap for 5885124 from 859f9211d802e1c210ccf15674c3bd6dc60c3681 to ↵android-build-team Robot2019-09-194-2/+10
|\| | | | | | | | | | | qt-qpr1-release Change-Id: I86bb9be9c129846714919f3c4a4568a4e4f9b4f4
| * Allow toolbox to rm -rf /data/per_bootPaul Crowley2019-09-174-2/+10
| | | | | | | | | | | | | | | | Bug: 140882488 Test: create files and dirs in /data/per_boot, check they're removed. Cherry-Picked-From: 2367ba358f0ec0c0c591e3e2feadabf891f38eef Merged-In: Idf0ba09cbe51cbff6a7b2a464c4651a1f7fcf343 Change-Id: Idf0ba09cbe51cbff6a7b2a464c4651a1f7fcf343
* | Snap for 5876498 from d8a9a493c5315b15888ffde43b3aa67baa67584c to ↵android-build-team Robot2019-09-142-2/+2
|\| | | | | | | | | | | qt-qpr1-release Change-Id: Ic80c46084072e15fdd0f7dbd3bf5de60577a381a
| * Allow dexoptanalyzer to mmap files with Linux 4.14+ that it can already access.Roland Levillain2019-09-132-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | SELinux has a separate file mmap permission in 4.14+ kernels. Add this to dexoptanalyzer(d) in cases where it could already access files (in particular, secondary dex files). Addresses denials of the form: avc: denied { map } for […] path="/data/data/[…]" […] scontext=u:r:dexoptanalyzer:s0 tcontext=u:object_r:app_data_file:s0 (cherry picked from commit c72b7d17310499f6bd6545e0e509fd603045d329) Test: Reproduce steps in bug 138683603 on a device with a 4.14+ kernel and check the absence of SELinux denials Bug: 138683603 Change-Id: Ieba53eb431c0ba3914dcb5e5abdae667bd063555
* | Snap for 5834835 from 8e65285ec529399164d702f294a5bf676ec39081 to ↵android-build-team Robot2019-08-282-2/+2
|\| | | | | | | | | | | qt-qpr1-release Change-Id: I335936148da2273575dff19062339cff4f80c7df
| * selinux: Update Q sepolicy prebuiltDaniel Solomon2019-08-261-1/+1
| |\ | | | | | | | | | | | | | | | am: 3248182855 Change-Id: I35a78cd9208439c9fc89c20ea546081fb5d4b4f2
| | * selinux: Update Q sepolicy prebuiltDaniel Solomon2019-08-211-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Tag gpu_service as app_api_service. This is the corresponding api 29.0 change to the public service.te from commit aosp/1105058 (I30a951cd712b0ae4aacd2c4d6d42e74fac5c0707). Bug: 139685237 Test: m selinux_policy Change-Id: Ia23cdd5f59b40a3e99cae424d9cf41d5e7442631
| * | selinux: tag gpu_service as app_api_serviceTri Vo2019-08-261-1/+1
| |\| | | | | | | | | | | | | | | | am: 32f279c096 Change-Id: I03466cdb7fe4c3c5c52a8e57d0cd5cd394ee0dfe
| | * selinux: tag gpu_service as app_api_serviceTri Vo2019-08-211-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | gpu_service is already accessible to untrusted 3p apps aosp/898376. Otherwise, vendor apps can't access gpu_service. Bug: 139685237 Test: m selinux_policy Change-Id: I30a951cd712b0ae4aacd2c4d6d42e74fac5c0707
* | | Snap for 5800161 from afac97a16da6a2d80600201e5ce4ccdc6fb76c14 to ↵android-build-team Robot2019-08-142-0/+4
|\| | | | | | | | | | | | | | | | | qt-qpr1-release Change-Id: I94df70b3f929a8af5915b45152d7b4b6340a2a21
| * | Allow Traceur to record the suspend_resume trace eventCarmen Jackson2019-08-132-0/+4
| |/ | | | | | | | | | | | | | | | | | | | | | | This should be available in user and userdebug builds. Bug: 137289935 Test: Alongside atrace changes, recorded a trace using Traceur and verified that the tracepoints were included in the recorded trace in both user and userdebug builds. Change-Id: I6131557bdd0a298be9e75b39759599b189b9b988 Merged-In: I6131557bdd0a298be9e75b39759599b189b9b988
* | Snap for 5733681 from 74395f1ff47a3bab17dc6b806bc19dd3aacc4815 to ↵android-build-team Robot2019-07-172-0/+2
|\| | | | | | | | | | | qt-qpr1-release Change-Id: I04f76fabac9931d4423fd02d44868edff7d34999
| * Merge "Add ro.surface_flinger.set_display_power_timer_ms to sepolicy" into ↵Ady Abraham2019-07-162-0/+2
| |\ | | | | | | | | | qt-r1-dev
| | * Add ro.surface_flinger.set_display_power_timer_ms to sepolicyAdy Abraham2019-07-122-0/+2
| | | | | | | | | | | | | | | | | | Bug: 135550670 Test: Boot with SELinux enforcing Change-Id: I61c30abc39909a263a2c402a5c0eb1de570748bb
* | | Snap for 5730547 from 640ead1a51655a50eb17b3a8ba989ec95a75e7e1 to ↵android-build-team Robot2019-07-162-0/+16
|\| | | | | | | | | | | | | | | | | qt-qpr1-release Change-Id: I5a85c5f98d41739613df19b0960541c82a81afd0
| * | Merge "sepolicy: Adjust policy for migrate_legacy_obb_data.sh" into qt-devDaniel Rosenberg2019-07-152-0/+16
| |\ \ | | |/ | |/| | | | | | | | | | am: a85c5360ab Change-Id: I9cf4bf773a5c7d36922bb590f74e283c565673c8
| | * Merge "sepolicy: Adjust policy for migrate_legacy_obb_data.sh" into qt-devDaniel Rosenberg2019-07-152-0/+16
| | |\
| | | * sepolicy: Adjust policy for migrate_legacy_obb_data.shDaniel Rosenberg2019-07-122-0/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Required to check if migration is necessary and migrate obb contents Bug: 136199978 Test: make Change-Id: I23890e4eeea1da7791e25ce5c9584b1abe94f440
* | | | Snap for 5713042 from d519b1ca7cf37810e880a55d47fed9246f08c616 to ↵android-build-team Robot2019-07-092-0/+2
|\| | | | | | | | | | | | | | | | | | | | | | | qt-qpr1-release Change-Id: Id2ebcde52ad378194a25fd6808c1b0fcd1aa52b5
| * | | Merge "SF: enable device-specific dataspace for color space agnostic ↵Thierry Strudel2019-07-092-0/+2
| |\ \ \ | | | | | | | | | | | | | | | surfaces" into qt-r1-dev
| | * | | SF: enable device-specific dataspace for color space agnostic surfacesYichi Chen2019-07-032-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | To reduce the DPU loading in color conversion, we enable device-specific dataspace for color space agnostic surfaces. Since the type of surfaces usually provide gray-level surfaces to users, it can be acceptable to ignore the color conversion on them. Bug: 134783740 Bug: 135140940 Test: Check ScreenDecorOverlays in expected dataspace Test: Play HDR video on C2 and check dataspace Change-Id: Ief32f0ff3867b2e154fecd6c9ebd6610b0e6ed11
* | | | | Snap for 5704937 from b1d6eb979ee60f7e36d088cacaa21fc7a9678a9e to ↵android-build-team Robot2019-07-032-0/+4
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | qt-qpr1-release Change-Id: I786416297808c47dc1a8c1b54164c8e8bb60841b
| * | | | Allow perfetto to access gpu_frequency tracepoint in userSidath Senanayake2019-07-022-0/+4
| |\ \ \ \ | | | |/ / | | |/| | | | | | | | | | | | | | | | | am: 9bfaa1c4dd Change-Id: Ie0ec9a00dab4c2d8aea365fb95b708aee8ef09d0
| | * | | Allow perfetto to access gpu_frequency tracepoint in userSidath Senanayake2019-06-282-0/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This will allow Perfetto to capture GPU frequency changes on the target, which is useful to graphics developers using Perfetto to profile graphics HW usage. This change also updates the private prebuilt at version 29.0 to match the update. Bug: 136062452 Merged-In: Idb7870b2f674f1359ef3b4487dbeff190b394248 Change-Id: Ib98ba10d96caa199d7030be3a17148045576a80c
* | | | | Snap for 5698755 from efc2dbb26e0f7d313317d668d584b57f8e544312 to ↵android-build-team Robot2019-06-296-4/+16
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | qt-qpr1-release Change-Id: I95e9cee47faa690ea4aec2d1792ff969e66d82b5
| * | | | Allow rule to let settings access apex filesTodd Kennedy2019-06-286-4/+16
| |\| | | | | |/ / | |/| | | | | | | | | | | | | | am: 9067699d9d Change-Id: Id3541133ffa48e7685f8e8195f5c585ea8fe9630
| | * | Allow rule to let settings access apex filesTodd Kennedy2019-06-276-4/+16
| | |/ | | | | | | | | | | | | | | | | | | | | | | | | | | | In order to show licensing information, we need to read it from an asset stored in the .apex file. Bug: 135183006 Test: Manual; settings can access apex files stored on /data Change-Id: I71fbde6e295d9c890c9b9b0449e5150834a6680e Merged-In: I71fbde6e295d9c890c9b9b0449e5150834a6680e
* | | Snap for 5681502 from 75f2c87c8a96a47dad8f37214591cfd02016492d to ↵android-build-team Robot2019-06-2233-10/+130
|\| | | | | | | | | | | | | | | | | qt-qpr1-release Change-Id: I39b68a117f4e81f96a895a7c9d5096b7d7a385bb
| * | Merge "In native coverage builds, allow all domains to access ↵Oliver Nguyen2019-06-2027-10/+124
| |\| | | | | | | | | | | | | | | | | | | | | | /data/misc/trace" into qt-dev am: 72a75ffe19 Change-Id: I86d660a7402876aa9bfad72ef6c6e75771f376cd
| | * Merge "In native coverage builds, allow all domains to access ↵Oliver Nguyen2019-06-2027-10/+124
| | |\ | | | | | | | | | | | | /data/misc/trace" into qt-dev
| | | * In native coverage builds, allow all domains to access /data/misc/tracePirama Arumuga Nainar2019-06-1927-10/+124
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Bug: http://b/135139675 Coverage files are written to /data/misc/trace (governed by the method_trace_data_file selinux type). Allow all domains to access (create directories, access files) this directory when native coverage is enabled (by setting NATIVE_COVERAGE to true) in an userdebug or eng build. Also relax neverallow constraints to allow access to method_trace_data_file for native coverage builds. Test: Build 32-bit cuttlefish with coverage: m NATIVE_COVERAGE=true COVERAGE_PATHS="*" and verify that there are no selinux denials in kernel log and logcat. Change-Id: I3fe7c77612854b9de7de7a0ddd5cbf44a2f5c21e (cherry picked from commit ce9c0c5a5fbd3fda8e1fd102d2bf1ca6afebbdf9)
| * | | Add rules to dump hal tracesKevin Chyn2019-06-196-0/+6
| |\| | | | | | | | | | | | | | | | | | | | | | am: 6d976f4d5d Change-Id: I7077ceb75ff9e5c4d13acebbffe03089b9952a99
| | * | Add rules to dump hal tracesKevin Chyn2019-06-196-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Test: manual Bug: 126802513 Change-Id: If037483f305e161a158e30f6322d5e25b7770952
* | | | Snap for 5674428 from 9af52722db628060b7fd66cddca00a60f1ba4faa to ↵android-build-team Robot2019-06-2012-0/+16
|\| | | | | | | | | | | | | | | | | | | | | | | qt-qpr1-release Change-Id: I1b90dda0749c93c50632f43f110b4254e5ffbb32
| * | | Merge "Add power stats HAL to ANR list" into qt-r1-devTreeHugger Robot2019-06-192-0/+2
| |\ \ \
| | * | | Add power stats HAL to ANR listBenjamin Schwartz2019-06-192-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Bug: 135111122 Test: Ran "adb shell am hang" and verified that power.stats HAL information is in /data/anr/<anr_file> Change-Id: I60a6191626a20c737124033e8ad453fa91425e39
| * | | | Merge "Add persist.sys.theme." into qt-devTao Bao2019-06-1812-0/+14
| |\ \ \ \ | | |/ / / | |/| / / | | |/ / | | | | | | | | am: 890dba4999 Change-Id: I7071270ce19cc650663f196de839e82e793ee206
| | * | Merge "Add persist.sys.theme." into qt-devTao Bao2019-06-1912-0/+14
| | |\ \
| | | * | Add persist.sys.theme.Tao Bao2019-06-1712-0/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This property will be set by system_server (to indicate the currently selected theme for device), and can be accessed by vendor init.rc. avc: denied { read } for property=persist.sys.theme pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:theme_prop:s0 tclass=file Bug: 113028175 Test: Set a vendor init trigger that waits on `persist.sys.theme`. Check that the trigger fires without denial. Change-Id: Ibb4e392d5059b76059f36f7d11ba82cd65cbe970
* | | | | Snap for 5671249 from 866a5773aa338f7a58d7f53113a6e87a8fec9763 to ↵android-build-team Robot2019-06-192-0/+6
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | qt-qpr1-release Change-Id: I40a38173c0ece44f5aa1dfeb2633a4cdd777b886