Skip to content
Snippets Groups Projects
  1. Dec 05, 2018
  2. Dec 04, 2018
  3. Dec 03, 2018
    • Primiano Tucci's avatar
      Merge "Allow traced_probes to access battery coulomb counters" am: 647d9163 am: 5fe46b46 · c30f69e8
      Primiano Tucci authored
      am: d67776ca
      
      Change-Id: I1055e4cc748d21a5366404a3715a58ff4ee7e191
      c30f69e8
    • felkachang's avatar
      Track isolated_app app_data_file SELinux denial. · 22f86690
      felkachang authored
      The isolated service that do nothing except for both AIDL's basic
      skeleton and service binding. It still got the SELinux denied.
      This should fix presubmit test.
      
      01-01 00:00:29.196  6121  6121 I auditd  : type=1400 audit(0.0:6):
      avc: denied { getattr } for comm="convert.service"
      path="/data/data/com.android.externalstorage" dev="sda35" ino=655437
      scontext=u:r:isolated_app:s0:c0,c256,c512,c768
      tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0
      
      Test: ag/5681059 ag/5660144
      Bug: 120394782
      Change-Id: I7838def96da30b88d510dab860ed9779a0d4d5ed
      22f86690
    • Primiano Tucci's avatar
      Merge "Allow traced_probes to access battery coulomb counters" am: 647d9163 · d67776ca
      Primiano Tucci authored
      am: 5fe46b46
      
      Change-Id: I1c3f23c038d296ea4438a6dd91aa1e2871c5e411
      d67776ca
    • Daniel Mentz's avatar
      Allow hal_usb to call getsockopt on uevent socket am: bbdb25f6 am: a30de38e · d1ec82d9
      Daniel Mentz authored
      am: 34e3a810
      
      Change-Id: I322b948c48bb8697d361ba5eba3c740b22cb072f
      d1ec82d9
    • Primiano Tucci's avatar
      Merge "Allow traced_probes to access battery coulomb counters" · 5fe46b46
      Primiano Tucci authored
      am: 647d9163
      
      Change-Id: Iaeb9e31d52ff4189d2b76441705f2040f5cf0d18
      5fe46b46
    • Daniel Mentz's avatar
      Allow hal_usb to call getsockopt on uevent socket am: bbdb25f6 · 34e3a810
      Daniel Mentz authored
      am: a30de38e
      
      Change-Id: I090b00450b23beb24b5e3b3d8d562dc57f794c7d
      34e3a810
    • Daniel Mentz's avatar
      Allow hal_usb to call getsockopt on uevent socket · a30de38e
      Daniel Mentz authored
      am: bbdb25f6
      
      Change-Id: Iaa08e7df1f328be666794ee12f0a138712c669fd
      a30de38e
    • Primiano Tucci's avatar
    • Daniel Mentz's avatar
      Allow hal_usb to call getsockopt on uevent socket · bbdb25f6
      Daniel Mentz authored
      We are making a change to uevent_open_socket() in libcutils related to
      setting the receive buffer size of netlink uevent sockets.
      
      After setting SO_RCVBUF, we immediately read it back using getsockopt()
      to verify that the setsockopt() call was effective. Only if it was not
      effective, we call setsockopt() with SO_RCVBUFFORCE.
      
      getsockopt() previously caused SELinux denials like the following:
      
       avc: denied { getopt } for comm="usb@1.1-service" scontext=u:r:hal_usb_default:s0 tcontext=u:r:hal_usb_default:s0 tclass=netlink_kobject_uevent_socket permissive=0
      
      Bug: 119933843
      Change-Id: I7bbb1eb1fa7ade2c94afc52ab1e28762f86a7d1f
      bbdb25f6
    • Neil Fuller's avatar
      Track add of RuntimeService in system server · f58b555d
      Neil Fuller authored
      Adds the necessary incantations for the new service.
      
      Bug: 118242715
      Bug: 119026403
      Test: build / boot / adb shell dumpsys
      Change-Id: Ibb1a356067863316d70586a61ede9f5973c1ae15
      f58b555d
    • Primiano Tucci's avatar
      Allow traced_probes to access battery coulomb counters · 353b93a9
      Primiano Tucci authored
      Allows battery counters to be logged in the trace. This
      is to allow high fidelity attribution of battery power.
      
      Matching feature CL: aosp/838951
      
      SELinux denials that lead to this:
      avc: denied { read } for comm="traced_probes" name="u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=0
      avc: denied { read } for comm="traced_probes" name="u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=0 duplicate messages suppressed
      avc: denied { read } for comm="traced_probes" name="u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { read } for comm="traced_probes" name="u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { open } for comm="traced_probes" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { open } for comm="traced_probes" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { getattr } for comm="traced_probes" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { getattr } for comm="traced_probes" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=17794 scontext=u:r:traced_probes:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1
      avc: denied { call } for comm="traced_probes" scontext=u:r:traced_probes:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      avc: denied { call } for comm="traced_probes" scontext=u:r:traced_probes:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
      avc: denied { search } for comm="hwservicemanage" name="26854" dev="proc" ino=4959346 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=dir permissive=1
      avc: denied { search } for comm="hwservicemanage" name="26854" dev="proc" ino=4959346 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=dir permissive=1
      avc: denied { read } for comm="hwservicemanage" name="current" dev="proc" ino=4959383 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=file permissive=1
      avc: denied { read } for comm="hwservicemanage" name="current" dev="proc" ino=4959383 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=file permissive=1
      avc: denied { open } for comm="hwservicemanage" path="/proc/26854/attr/current" dev="proc" ino=4959383 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=file permissive=1
      avc: denied { open } for comm="hwservicemanage" path="/proc/26854/attr/current" dev="proc" ino=4959383 scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=file permissive=1
      avc: denied { getattr } for comm="hwservicemanage" scontext=u:r:hwservicemanager:s0 tcontext=u:r:traced_probes:s0 tclass=process permissive=1
      
      
      Bug: 113076327
      Change-Id: I4aabd0d70025105320c4a8d34470098807d56899
      353b93a9
    • Jiyong Park's avatar
      Allow apexd to label apk_tmp_file to apex_data_file · ce15e5e5
      Jiyong Park authored
      Currently, when an APEX is staged, apexd moves the file from
      /data/app/vmdl*.tmp directory to /data/apex. However, the original file
      is labeled with apk_tmp_file and is not readable from apexd.
      
      We plan to resolve this issue by moving the file content via file
      descriptor in between the package manager and apexd.
      
      However, until the plan is implemented, temporarily allow apexd to
      relabel the file to apex_data_file that is readable to it. This unblocks
      the end-to-end test for APEX.
      
      Bug: 112669193
      Test: adb install --apex system/apex/apexd/apexd_testdata/test.apex
      adb reboot; adb root; adb shell; cmd apexservice getActivePackages
      The test APEX is activated
      
      Change-Id: Ib9d4f5c699261f1fa1e6d557731767ee4d7168f9
      ce15e5e5
  4. Dec 01, 2018
  5. Nov 30, 2018
Loading