| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* Android's system server still requests access to /proc/last_kmsg
as alternative to /sys/fs/pstore/console-ramoops for fs shutdown
time logging purposes.
* Also allow init.rc to chmod/chown the file.
Change-Id: I6beb064778da4af86f8735f663349f6153d4a3f8
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* AOSP init.rc attempts to write to /proc/cpu/alignment, but
following 84e181bc, general access to procfs nodes is prohibited.
* Add an appropriate type, genfscon, and allow to permit this
action.
Change-Id: I31ad8eaa6ebb6dd57d1b9c4395cb22cdd0d7b3d3
(cherry picked from commit 6213f5041a6e9242b2a23c8cc85d0d76cbc1fc45)
|
| |
| |
| |
| |
| |
| |
| | |
* Older devices have a DT fstab in proc, so we need to expand our
policy to make this first-class like the fancy, new, sys devices
Change-Id: I3cfed1e8e9fdf8665f1348fa07fa42d4f37873e9
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* Commit "storaged: remove access to sysfs_type" denied the storaged
daemon access to the sysfs node it needed to do its work.
* It also didn't provide any means necessary for adding the necessary
rules at a device level, since its sepolicy is private.
* Here we define a new sysfs_disk_stat security label, which device
maintainers are supposed to add to their genfs_contexts file. This is
similar to how hal_health_default and sysfs_batteryinfo is handled.
* What prevents the genfs_contexts from being added here directly is
that in a typical vendor implementation, these sysfs files are
actually symlinks and not a single, unified path SELinux-wise.
Change-Id: I13ca09cf2458b22ffb6c70b8a353e891e810c606
Signed-off-by: Vladimir Oltean <olteanv@gmail.com>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Probably flew under the radar because Google only tests on devices that
include devices with a physical /vendor partition.
Test: "make selinux_policy", confirm correct labels on a legacy device
Change-Id: I1aa856c6e3774912d1f4c0a09bbc2d174016f59d
Signed-off-by: Felix <google@ix5.org>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
app_zygote used by for example Google Chrome needs access
to at least search /oem partition.
Google chrome version: 76.0.3809.132 is running in app_zygote
and the following access is blocked by selinux causing Chrome
to hang.
avc: denied { search } for pid=813 comm="d.chrome_zygote"
name="/" dev="sda42" ino=2 scontext=u:r:app_zygote:s0:c214,c256,c512,c768
tcontext=u:object_r:oemfs:s0 tclass=dir permissive=0 ppid=798
pcomm="d.chrome_zygote" pgid=798 pgcomm="d.chrome_zygote"
Bug: b/146481702
Bug: b/146532583
Test: run vts -m CtsAppTestCases && CtsExternalServiceTestCases
Change-Id: Idcce1a5ad1a8be3d7bd057c12ec477baa9669235
Merged-In: Idcce1a5ad1a8be3d7bd057c12ec477baa9669235
(cherry picked from commit 8c94186ca599ddea6d4177626ea5232ac5cbf036)
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
VTS and CTS-on-GSI report the device's ro.odm.build.version.incremental
or ro.vendor.build.version.incremental. The properties need to be
readable without root privilege.
Test: adb shell getprop ro.odm.build.version.incremental
Bug: 145255132
Change-Id: Ibb71185888cce022cb3a9be3e6fb2199d5f438d9
Merged-In: Ibb71185888cce022cb3a9be3e6fb2199d5f438d9
(cherry picked from commit 26f34a497bc627d670346efcf8da027cf353340e)
|
| |
| |
| |
| |
| |
| |
| | |
BUG: 138399045
Test: Boot cuttlefish. properties set
Change-Id: I3138048e9d13f8c0aee1ad3eb4e761809bafcf1d
(cherry picked from commit 626114424f3fda033834fb241d11c45a73972172)
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The commit 7baf725ea6 broke OMX on O/O-MR1(/P?) vendors.
Previous to this commit, all OMX codecs had to use "mediacodec" type,
after this commit, omx codecs just had to get hal_omx_server attribute.
This commit left to the vendor the charge of adding "hal_omx_server"
attribute to mediacodec.
However this can't work on non-Q vendors.
On P vendor, versioned_plat_pub contains the appdomain <=> mediacodec
allows, so OMX isn't technically broken on those devices.
But to ensure it won't break in the future, mark 28's mediacodec as
hal_omx_server as well
This fixes broken OMX decoding on O/O-MR1 vendors, failing with the
following denial:
avc: denied { call } for comm=4E444B204D65646961436F6465635F scontext=u:r:platform_app:s0:c512,c768 tcontext=u:r:mediacodec:s0 tclass=binder permissive=0
Bug: 141186440
Change-Id: I018f8d9aabc77e7ea86ca14734b1ab2edfdf8ed1
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
ro.crypto.fde_algorithm
ro.crypto.fde_sector_size
ro.crypto.volume.contents_mode
These properties were not added to sepolicy export2vold. vold can't access
crypto algorithm type when flashing a GSI image and when the properties are in
/vendor/build.prop. This prevents FDE from working.
Bug: 141518844
Change-Id: I234bda439f6be7a2211a194856baf75800396232
Signed-off-by: yuguoxu <yuguoxu@allwinnertech.corp-partner.google.com>
(cherry picked from a894a1aa66405eebd151ae61fff0fa219d720aec)
|
|\|
| |
| |
| |
| |
| | |
qt-qpr1-release
Change-Id: I86bb9be9c129846714919f3c4a4568a4e4f9b4f4
|
| |
| |
| |
| |
| |
| |
| |
| | |
Bug: 140882488
Test: create files and dirs in /data/per_boot, check they're removed.
Cherry-Picked-From: 2367ba358f0ec0c0c591e3e2feadabf891f38eef
Merged-In: Idf0ba09cbe51cbff6a7b2a464c4651a1f7fcf343
Change-Id: Idf0ba09cbe51cbff6a7b2a464c4651a1f7fcf343
|
|\|
| |
| |
| |
| |
| | |
qt-qpr1-release
Change-Id: Ic80c46084072e15fdd0f7dbd3bf5de60577a381a
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
SELinux has a separate file mmap permission in 4.14+ kernels. Add this
to dexoptanalyzer(d) in cases where it could already access files (in
particular, secondary dex files).
Addresses denials of the form:
avc: denied { map } for […] path="/data/data/[…]" […]
scontext=u:r:dexoptanalyzer:s0 tcontext=u:object_r:app_data_file:s0
(cherry picked from commit c72b7d17310499f6bd6545e0e509fd603045d329)
Test: Reproduce steps in bug 138683603 on a device with a 4.14+ kernel
and check the absence of SELinux denials
Bug: 138683603
Change-Id: Ieba53eb431c0ba3914dcb5e5abdae667bd063555
|
|\|
| |
| |
| |
| |
| | |
qt-qpr1-release
Change-Id: I335936148da2273575dff19062339cff4f80c7df
|
| |\
| | |
| | |
| | |
| | |
| | | |
am: 3248182855
Change-Id: I35a78cd9208439c9fc89c20ea546081fb5d4b4f2
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Tag gpu_service as app_api_service. This is the corresponding api 29.0
change to the public service.te from commit aosp/1105058
(I30a951cd712b0ae4aacd2c4d6d42e74fac5c0707).
Bug: 139685237
Test: m selinux_policy
Change-Id: Ia23cdd5f59b40a3e99cae424d9cf41d5e7442631
|
| |\|
| | |
| | |
| | |
| | |
| | | |
am: 32f279c096
Change-Id: I03466cdb7fe4c3c5c52a8e57d0cd5cd394ee0dfe
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
gpu_service is already accessible to untrusted 3p apps aosp/898376.
Otherwise, vendor apps can't access gpu_service.
Bug: 139685237
Test: m selinux_policy
Change-Id: I30a951cd712b0ae4aacd2c4d6d42e74fac5c0707
|
|\| |
| | |
| | |
| | |
| | |
| | | |
qt-qpr1-release
Change-Id: I94df70b3f929a8af5915b45152d7b4b6340a2a21
|
| |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This should be available in user and userdebug builds.
Bug: 137289935
Test: Alongside atrace changes, recorded a trace using Traceur and
verified that the tracepoints were included in the recorded trace in
both user and userdebug builds.
Change-Id: I6131557bdd0a298be9e75b39759599b189b9b988
Merged-In: I6131557bdd0a298be9e75b39759599b189b9b988
|
|\|
| |
| |
| |
| |
| | |
qt-qpr1-release
Change-Id: I04f76fabac9931d4423fd02d44868edff7d34999
|
| |\
| | |
| | |
| | | |
qt-r1-dev
|
| | |
| | |
| | |
| | |
| | |
| | | |
Bug: 135550670
Test: Boot with SELinux enforcing
Change-Id: I61c30abc39909a263a2c402a5c0eb1de570748bb
|
|\| |
| | |
| | |
| | |
| | |
| | | |
qt-qpr1-release
Change-Id: I5a85c5f98d41739613df19b0960541c82a81afd0
|
| |\ \
| | |/
| |/|
| | |
| | |
| | | |
am: a85c5360ab
Change-Id: I9cf4bf773a5c7d36922bb590f74e283c565673c8
|
| | |\ |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Required to check if migration is necessary and migrate obb contents
Bug: 136199978
Test: make
Change-Id: I23890e4eeea1da7791e25ce5c9584b1abe94f440
|
|\| | |
| | | |
| | | |
| | | |
| | | |
| | | | |
qt-qpr1-release
Change-Id: Id2ebcde52ad378194a25fd6808c1b0fcd1aa52b5
|
| |\ \ \
| | | | |
| | | | |
| | | | | |
surfaces" into qt-r1-dev
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
To reduce the DPU loading in color conversion, we enable device-specific
dataspace for color space agnostic surfaces. Since the type of surfaces
usually provide gray-level surfaces to users, it can be acceptable to
ignore the color conversion on them.
Bug: 134783740
Bug: 135140940
Test: Check ScreenDecorOverlays in expected dataspace
Test: Play HDR video on C2 and check dataspace
Change-Id: Ief32f0ff3867b2e154fecd6c9ebd6610b0e6ed11
|
|\| | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
qt-qpr1-release
Change-Id: I786416297808c47dc1a8c1b54164c8e8bb60841b
|
| |\ \ \ \
| | | |/ /
| | |/| |
| | | | |
| | | | |
| | | | | |
am: 9bfaa1c4dd
Change-Id: Ie0ec9a00dab4c2d8aea365fb95b708aee8ef09d0
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This will allow Perfetto to capture GPU frequency changes
on the target, which is useful to graphics developers
using Perfetto to profile graphics HW usage.
This change also updates the private prebuilt at version
29.0 to match the update.
Bug: 136062452
Merged-In: Idb7870b2f674f1359ef3b4487dbeff190b394248
Change-Id: Ib98ba10d96caa199d7030be3a17148045576a80c
|
|\| | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
qt-qpr1-release
Change-Id: I95e9cee47faa690ea4aec2d1792ff969e66d82b5
|
| |\| | |
| | |/ /
| |/| |
| | | |
| | | |
| | | | |
am: 9067699d9d
Change-Id: Id3541133ffa48e7685f8e8195f5c585ea8fe9630
|
| | |/
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
In order to show licensing information, we need to read it from
an asset stored in the .apex file.
Bug: 135183006
Test: Manual; settings can access apex files stored on /data
Change-Id: I71fbde6e295d9c890c9b9b0449e5150834a6680e
Merged-In: I71fbde6e295d9c890c9b9b0449e5150834a6680e
|
|\| |
| | |
| | |
| | |
| | |
| | | |
qt-qpr1-release
Change-Id: I39b68a117f4e81f96a895a7c9d5096b7d7a385bb
|
| |\|
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
/data/misc/trace" into qt-dev
am: 72a75ffe19
Change-Id: I86d660a7402876aa9bfad72ef6c6e75771f376cd
|
| | |\
| | | |
| | | |
| | | | |
/data/misc/trace" into qt-dev
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Bug: http://b/135139675
Coverage files are written to /data/misc/trace (governed by the
method_trace_data_file selinux type). Allow all domains to access
(create directories, access files) this directory when native coverage
is enabled (by setting NATIVE_COVERAGE to true) in an userdebug or eng
build.
Also relax neverallow constraints to allow access to
method_trace_data_file for native coverage builds.
Test: Build 32-bit cuttlefish with coverage:
m NATIVE_COVERAGE=true COVERAGE_PATHS="*"
and verify that there are no selinux denials in kernel log and
logcat.
Change-Id: I3fe7c77612854b9de7de7a0ddd5cbf44a2f5c21e
(cherry picked from commit ce9c0c5a5fbd3fda8e1fd102d2bf1ca6afebbdf9)
|
| |\| |
| | | |
| | | |
| | | |
| | | |
| | | | |
am: 6d976f4d5d
Change-Id: I7077ceb75ff9e5c4d13acebbffe03089b9952a99
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Test: manual
Bug: 126802513
Change-Id: If037483f305e161a158e30f6322d5e25b7770952
|
|\| | |
| | | |
| | | |
| | | |
| | | |
| | | | |
qt-qpr1-release
Change-Id: I1b90dda0749c93c50632f43f110b4254e5ffbb32
|
| |\ \ \ |
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Bug: 135111122
Test: Ran "adb shell am hang" and verified that power.stats HAL
information is in /data/anr/<anr_file>
Change-Id: I60a6191626a20c737124033e8ad453fa91425e39
|
| |\ \ \ \
| | |/ / /
| |/| / /
| | |/ /
| | | |
| | | | |
am: 890dba4999
Change-Id: I7071270ce19cc650663f196de839e82e793ee206
|
| | |\ \ |
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This property will be set by system_server (to indicate the currently
selected theme for device), and can be accessed by vendor init.rc.
avc: denied { read } for property=persist.sys.theme pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:theme_prop:s0 tclass=file
Bug: 113028175
Test: Set a vendor init trigger that waits on `persist.sys.theme`. Check
that the trigger fires without denial.
Change-Id: Ibb4e392d5059b76059f36f7d11ba82cd65cbe970
|
|\| | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
qt-qpr1-release
Change-Id: I40a38173c0ece44f5aa1dfeb2633a4cdd777b886
|