Skip to content
Snippets Groups Projects
  1. Nov 17, 2018
    • Hongyi Zhang's avatar
      sepolicies for sys prop enabling flag health check · da492f4f
      Hongyi Zhang authored
      device_config_flags_health_check_prop is used for enabling/disabling
      program flags_health_check which is executed during device booting.
      "1" means enabling health check actions in flags_health_check, other
      values mean flags_health_check will not perform any action.
      
      Test: build succeeded & manual test
      Change-Id: I93739dc5d155e057d72d08fd13097eb63c1193b5
      da492f4f
  2. Nov 16, 2018
  3. Nov 15, 2018
    • Mårten Kongstad's avatar
      Add idmap2 and idmap2d · f62362da
      Mårten Kongstad authored
      Bug: 78815803
      Test: builds, boots
      Test: manual: adb shell idmap2 create ...
      Test: manual: adb shell ps | grep -e idmap2d
      Change-Id: I60852e15d99329896ff9de6559d1e7cd1c67e33d
      f62362da
  4. Nov 12, 2018
  5. Nov 09, 2018
  6. Nov 07, 2018
  7. Nov 06, 2018
    • Fan Xu's avatar
      Remove buffer_hub_service compat mapping · 2d74a45f
      Fan Xu authored
      As b/116344577 is fixed, we no longer need the compatbility mapping any
      more.
      
      Test: build passed. Boot succeeded.
      Change-Id: I0d7f02c59853d34bdabaad6841d87e9ca1ee25d7
      2d74a45f
  8. Nov 05, 2018
  9. Nov 02, 2018
    • Jiyong Park's avatar
      apexd exports its status via sysprop · b3b94614
      Jiyong Park authored
      A sysprop apexd.status is set by apexd, to that other components (i.e.
      init) can determine whether APEXs are all successfully mounted or no
      (i.e., being mounted).
      
      The sysprop is only writable by apexd.
      
      Bug: 117403679
      Test: adb shell getprop apexd.status returns 'ready'.
      Change-Id: I81bcb96e6c5cb9d899f29ffa84f91eab3820be25
      b3b94614
  10. Nov 01, 2018
  11. Oct 25, 2018
  12. Oct 15, 2018
    • Florian Mayer's avatar
      Add heapprofd selinux config. · 4fde9ec7
      Florian Mayer authored
      This does not actually grant any permissions but just adds the
      necessary boilerplate for a new service.
      
      Bug: 117762471
      Bug: 117761873
      
      Change-Id: I7cdd2ae368616cfd54fc685c15f775604bfc80d4
      4fde9ec7
  13. Oct 12, 2018
    • Siarhei Vishniakou's avatar
      Allow system_server to read vendor_file · 3639f579
      Siarhei Vishniakou authored
      Input device configuration files .idc, .kl that are placed in /vendor
      are currently not accessible.
      Allow the read access here.
      
      Bug: 112880217
      Test: move .idc and .kl files from /system to /vendor, then observe
      logcat. With this patch, avc denials disappear.
      
      Change-Id: I72ad62b9adf415f787565adced73fd8aaff38832
      3639f579
  14. Oct 11, 2018
    • Chong Zhang's avatar
      add mediaswcodec service · bdbfff1b
      Chong Zhang authored
      Set up a new service for sw media codec services.
      
      Bug: 111407413
      
      Test: cts-tradefed run cts-dev --module CtsMediaTestCases --compatibility:module-arg CtsMediaTestCases:include-annotation:android.platform.test.annotations.RequiresDevice
      Change-Id: Ia1c6a9ef3f0c1d84b2be8756eb1853ffa0597f8e
      bdbfff1b
  15. Oct 08, 2018
  16. Oct 04, 2018
    • Martijn Coenen's avatar
      Add policy for apexd. · ac097ac4
      Martijn Coenen authored
      apexd is a new daemon for managing APEX packages installed
      on the device. It hosts a single binder service, "apexservice".
      
      Bug: 112455435
      Test: builds, binder service can be registered,
            apexes can be accessed, verified and mounted
      Change-Id: I634ad100f10b2edcd9a9c0df0d33896fa5d4ed97
      ac097ac4
  17. Oct 02, 2018
    • Tri Vo's avatar
      Only maintain maps between current and previous selinux versions. · 438684b3
      Tri Vo authored
      New maintenance scheme for mapping files:
      Say, V is the current SELinux platform version, then at any point in time we
      only maintain (V->V-1) mapping. (V->V-n) map is constructed from top (V->V-n+1)
      and bottom (V-n+1->V-n) without changes to previously maintained mapping files.
      
      Caveats:
      - 26.0.cil doesn't technically represent 27.0->26.0 map, but rather
      current->26.0. We'll fully migrate to the scheme with future releases.
      
      Bug: 67510052
      Test: adding new public type only requires changing the latest compat map
      Change-Id: Iab5564e887ef2c8004cb493505dd56c6220c61f8
      438684b3
  18. Sep 28, 2018
    • Howard Ro's avatar
      Update sepolicies for stats hal · 578a1891
      Howard Ro authored
      Bug: 116732452
      Test: No sepolicy violations observed with this change
      (cherry picked from commit I1958182dd8ecc496625da2a2a834f71f5d43e7bb)
      
      Change-Id: Ib386767d8acfacf9fedafd9a79dd555ce233f41c
      578a1891
  19. Sep 27, 2018
  20. Sep 24, 2018
    • Fan Xu's avatar
      Update SELinux Policy for bufferhubd · 26fa914c
      Fan Xu authored
      Create a new service type buffer_hub_binder_service for
      BufferHubBinderService and allow bufferhubd to publish the service.
      
      Add the service to 26.0, 27.0 and 28.0 compat ignore files since the
      service is not available in past versions.
      
      Fixes: 116022258
      Test: build passed
      
      Change-Id: I5a21f00329ed474433d96c8d1ce32377f20cada3
      26fa914c
  21. Sep 21, 2018
  22. Sep 20, 2018
    • Yifan Hong's avatar
      health.filesystem HAL renamed to health.storage · 1cef6a94
      Yifan Hong authored
      ...to reflect that the HAL operates on storage devices,
      not filesystem.
      
      Bug: 111655771
      Test: compiles
      Change-Id: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
      Merged-In: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
      1cef6a94
  23. Sep 06, 2018
  24. Sep 05, 2018
    • Makoto Onuki's avatar
      Add app_binding system service · 6af11813
      Makoto Onuki authored
      Bug: 109809543
      Test: Build and boot with the new service in the internal branch.
      
      Change-Id: Iaee365771c3e8e5b8f5f3b6112bbf902c6bb02bd
      6af11813
  25. Sep 04, 2018
    • Mark Salyzyn's avatar
      llkd: Add stack symbol checking · 275ea12d
      Mark Salyzyn authored
      llkd needs the ptrace capabilities and dac override to monitor for
      live lock conditions on the stack dumps.
      
      Test: compile
      Bug: 33808187
      Change-Id: Ibc1e4cc10395fa9685c4ef0ca214daf212a5e126
      275ea12d
  26. Aug 30, 2018
  27. Aug 22, 2018
  28. Aug 20, 2018
    • Hridya Valsaraju's avatar
      Define 'super_block_device' type · 4ae8fe9b
      Hridya Valsaraju authored
      Bug: 78793464
      Test: fastboot getvar partition-size:super
      
      'super_block_device' corresponds to the super partition
      required for flashing dynamic partitions.
      
      Change-Id: I323634b6797ead7c5face117a7028bf9ab947aea
      4ae8fe9b
  29. Aug 15, 2018
    • Jerry Zhang's avatar
      Add sepolicy for fastbootd · 1d85efa9
      Jerry Zhang authored
      Also allow adb and fastboot to talk to recovery
      through recovery_socket. This enables changing
      between modes with usb commands.
      
      Test: No selinux denials
      Bug: 78793464
      Change-Id: I80c54d4eaf3b94a1fe26d2280af4e57cb1593790
      1d85efa9
    • Florian Mayer's avatar
      Revert "Add sepolicy for fastbootd" · c2ab15b7
      Florian Mayer authored
      This reverts commit 0fd3ed3b.
      
      Reason for revert: Broke user builds.
      
      Change-Id: If95f1a25d22425a5a2b68a02d1561352fb5a52f0
      c2ab15b7
  30. Aug 14, 2018
    • Jerry Zhang's avatar
      Add sepolicy for fastbootd · 0fd3ed3b
      Jerry Zhang authored
      Also allow adb and fastboot to talk to recovery
      through recovery_socket. This enables changing
      between modes with usb commands.
      
      Test: No selinux denials
      Bug: 78793464
      Change-Id: I1f97659736429fe961319c642f458c80f199ffb4
      0fd3ed3b
    • Tri Vo's avatar
      Sepolicy for system suspend HAL. · dac2a4a3
      Tri Vo authored
      Bug: 78888165
      Test: device can boot with HAL running.
      Change-Id: I3bf7c8203e038b892176c97ec006152a2904c7be
      dac2a4a3
  31. Aug 10, 2018
  32. Aug 08, 2018
    • Mark Salyzyn's avatar
      fs_mgr: add overlayfs handling for squashfs system filesystems · 9b398f3f
      Mark Salyzyn authored
      /cache/overlay directory in support of overlayfs mounts on userdebug
      and eng devices.  Overlayfs in turn can be capable of supporting
      adb remount for read-only or restricted-storage filesystems like
      squashfs or right-sized (zero free space) system partitions
      respectively.
      
      Test: compile
      Bug: 109821005
      Bug: 110985612
      Change-Id: I3ece03886db7cc97f864497cf93ec6c6c39bccd1
      9b398f3f
  33. Aug 03, 2018
  34. Jul 23, 2018
  35. Jul 19, 2018
    • Jae Shin's avatar
      Add mapping files for 28.0.[ignore.]cil · 1fa96348
      Jae Shin authored
      Steps taken to produce the mapping files:
      
      1. Add prebuilts/api/28.0/[plat_pub_versioned.cil|vendor_sepolicy.cil]
      from the /vendor/etc/selinux/[plat_pub_versioned.cil|vendor_sepolicy.cil]
      files built on pi-dev with lunch target aosp_arm64-eng
      
      2. Add new file private/compat/28.0/28.0.cil by doing the following:
      - copy /system/etc/selinux/mapping/28.0.cil from pi-dev aosp_arm64-eng
      device to private/compat/28.0/28.0.cil
      - remove all attribute declaration statement (typeattribute ...) and
      sort lines alphabetically
      - some selinux types were added/renamed/deleted w.r.t 28 sepolicy.
      Find all such types using treble_sepolicy_tests_28.0 test.
      - for all these types figure out where to map them by looking at
      27.0.[ignore.]cil files and add approprite entries to 28.0.[ignore.]cil.
      
      This change also enables treble_sepolicy_tests_28.0 and install 28.0.cil
      mapping onto the device.
      
      Bug: 72458734
      Test: m selinux_policy
      Change-Id: I90e17c0b43af436da4b62c16179c198b5c74002c
      1fa96348
  36. Sep 19, 2017
    • Daniel Cashman's avatar
      Bug revert AOSP cherry-picks to enable big diff. · 46f41134
      Daniel Cashman authored
      The following commits were cherry-picked from internal master to AOSP,
      but to avoid merge-conflicts we'll do a large diff instead of individual
      cherry-picks:
      521742e9
      9aefc916
      3686efca
      de51e7de
      fff3fe2f
      
      Bug: 37916906
      Test: angler builds and boots.
      Merged-In: Ie010cc12ae866dbb97c387471f433158d3b699f3
      Change-Id: I5126ebe88b9c76a74690ecf95851d389cfc22d1f
      46f41134
    • Dan Cashman's avatar
      Bulk-revert changes caused by AOSP cherry-picks. · c3f9ebda
      Dan Cashman authored
      In order to bring AOSP development back in-line with master development,
      some CLs were cherry-picked individually from internal master to AOSP,
      which were then merged back into internal master (MERGED-IN was missing).
      Due to merge-conflict pain, these are being reverted in favor of one
      big diff.  This CL reverts the changes that were auto-merged in as a result,
      and can be used as the target of MERGED-IN when reverting the individual
      cherry-picks in AOSP.
      
      This reverts commit a08fe91e, reversing
      changes made to 11481d1d.
      
      This reverts commit 7ec5ecfb, reversing
      changes made to 6fecbbb2.
      
      Bug: 37916906
      Test: Builds 'n' boots.
      c3f9ebda
Loading