Skip to content
Snippets Groups Projects
  1. Jan 11, 2019
    • Felipe Leme's avatar
      DO NOT MERGE - Renamed "intelligence" to "content_capture" · 26f04ff7
      Felipe Leme authored
      This cherry-pick exists to update stage-aosp-master sepolicy
      files to look like the ones in master and aosp. It looks like
      it was an overlook this patch was merged with DO NOT MERGE
      instead of only Merged-In.
      
      Bug: 111276913
      Test: manual verification
      
      Merged-In: If76dc7bfdad87789a58fc94e0fd280deae1a41ab
      Change-Id: If76dc7bfdad87789a58fc94e0fd280deae1a41ab
      (cherry picked from commit 73e7fa88)
      26f04ff7
    • Siarhei Vishniakou's avatar
      Permissions for InputClassifier HAL · 41a871ba
      Siarhei Vishniakou authored
      Add the required permissions for the InputClassifier HAL.
      
      Bug: 62940136
      Test: no selinux denials in logcat when HAL is used inside input flinger.
      Change-Id: Ibc9b115a83719421d56ecb4bca2fd196ec71fd76
      41a871ba
  2. Jan 10, 2019
  3. Jan 09, 2019
    • Yabin Cui's avatar
      Add permissions in runas_app domain to debug/profile debuggable apps. · 770a4f65
      Yabin Cui authored
      runas_app domain is used by lldb/ndk-gdb/simpleperf to debug/profile
      debuggable apps. But it misses permissions to ptrace app processes and
      read /proc/<app_pid> directory.
      
      Bug: none
      Test: build and boot marlin.
      Test: run lldb and simpleperf on apps with target sdk version 24-29.
      Change-Id: I9e6f940ec81a8285eae8db3b77fb1251a25dedd0
      770a4f65
  4. Jan 07, 2019
    • Dario Freni's avatar
      SEPolicy for Staged Installs. · 274c1ded
      Dario Freni authored
      Test: basic workflow between apexd and PackageManager tested with
      changes being developed.
      Bug: 118865310
      Change-Id: I1ae866f33e9b22493585e108c4fd45400493c7ac
      274c1ded
  5. Dec 28, 2018
    • Zachary Iqbal's avatar
      Added placeholder SELinux policy for the biometric face HAL. · 893272d8
      Zachary Iqbal authored
      Notes:
      - Added face hal domain, context and file types for the default
        SELinux policy.
      - Please see aosp/q/topic:"Face+Authentication"
      
      Bug: 80155388
      Test: Built successfully.
      Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
      893272d8
    • Dario Freni's avatar
      Revert "Add StagingManager service." · ca861694
      Dario Freni authored
      This reverts commit 9eb3b8ff.
      
      Reason for revert: We are deciding for now not to make StagingManager a fully-fledged binder service, as it will only be accessed by PackageInstaller. We might re-evaluate this decision later if needed.
      
      Bug: 122072686
      Change-Id: Ic2a53fc92ddd7d7eeccc6a4a0117f28724346ec7
      ca861694
  6. Dec 27, 2018
    • Dario Freni's avatar
      Add StagingManager service. · 9eb3b8ff
      Dario Freni authored
      Adding a new high-level service which will handle staged installs, i.e.
      installs that require a reboot.
      
      Bug: 118865310
      Test: An initial implementation of StagingManager can be reached
      successfully by PackageManagerService and PackageInstallerService.
      Change-Id: I8859b463575f8ee85caae43570958347b82f967e
      9eb3b8ff
    • Michael Groover's avatar
      Merge "Add selinux policy for new SensorPrivacyService" · 09c86730
      Michael Groover authored
      Test: manually verified SensorPrivacyService is accessible
      Bug: 110842805
      Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
      (cherry picked from commit 0ac3dea7)
      09c86730
  7. Dec 21, 2018
    • Emilian Peev's avatar
      sepolicy: Add "rs" and "rs_exec" to public policy · a34cfe7b
      Emilian Peev authored
      Add "rs" and "rs_exec" types to public policy. Access
      to these types might be needed for device specific
      customization.
      
      Bug: 121306110
      Test: Manual using application
      Change-Id: Ief35d3353625adfbf468447de74aa80651dd9451
      a34cfe7b
    • Remi NGUYEN VAN's avatar
      Add selinux policies for network stack service · 47c2dee5
      Remi NGUYEN VAN authored
      The policies allow the system server to register a network_stack_service
      used to communicate with the network stack process.
      
      Test: atest FrameworksNetTests
      Bug: b/112869080
      Change-Id: Ib9b7d9150fe4afcce03c8b3dbb36b81c67e39366
      47c2dee5
  8. Dec 20, 2018
    • Remi NGUYEN VAN's avatar
      sepolicy changes for network stack app · 5f3ba92c
      Remi NGUYEN VAN authored
      The networking stack app hosts services that used to be in the system
      server (IpClient, NetworkMonitor for now), but in a different process to
      be packaged as a mainline module.
      
      Test: booted, verified networking stack working when in app
      Change-Id: I300a556f51b35c17378af961cea1ec937444e597
      5f3ba92c
  9. Dec 18, 2018
  10. Dec 17, 2018
    • Todd Kennedy's avatar
      Create new permissionmgr_service · 784c2b8d
      Todd Kennedy authored
      We're creating a new PermissionManagerService that will handle
      all of the permission related APIs. These are currently being
      routed through PackageManagerService.
      
      Test: Device boots
      Change-Id: I7d08561dd33b692209c30d413cdca0ff567358f1
      784c2b8d
  11. Dec 15, 2018
    • Rafal Slawik's avatar
      SELinux policy for rss_hwm_reset · 4e1c5764
      Rafal Slawik authored
      rss_hwm_reset is binary that reset RSS high-water mark counters for all
      currently running processes. It runs in a separate process because it
      needs dac_override capability.
      
      Bug: 119603799
      Test: no errors in logcat
      Change-Id: I6221a5eca3427bf532830575d8fba98eb3e65c29
      4e1c5764
  12. Dec 14, 2018
  13. Dec 12, 2018
    • Florian Mayer's avatar
      Add persist.heapprofd.enable property. · c32ca901
      Florian Mayer authored
      This is analoguous to what Perfetto does with persist.traced.enable.
      
      Test: m
      Test: flash walleye
      Test: setprop persist.heapprofd.enable 1
            setprop persist.heapprofd.enable 0
      
      Change-Id: I997272ef8c6fe078aca2388ed0cf2ecc3de612a5
      c32ca901
    • Sunny Goyal's avatar
      New system service: app_prediction_service · 2a2d638e
      Sunny Goyal authored
      - Update policy for new system service, used for SystemUI/Apps to
        present predicted apps in their UI.
      
      Bug: 111701043
      Test: manual verification
      Change-Id: Ia3b5db987097d2d71bf774ca550041e03214471d
      2a2d638e
  14. Dec 11, 2018
    • Benjamin Schwartz's avatar
      Add power.stats HAL 1.0 sepolicy · e7040ead
      Benjamin Schwartz authored
      Also giving statsd permission to access it. This change copies the internal sepolicy to AOSP.
      
      Bug: 111185513
      Bug: 120551881
      Test: make
      Change-Id: I7e0386777e05580299caf9b97cb7804459f1a9d0
      e7040ead
  15. Dec 07, 2018
    • Matt Pape's avatar
      SEPolicy updates for DeviceConfig Service. · 6aa44527
      Matt Pape authored
      Add a DeviceConfig service in system_server to edit configuration flags.
      This is intended to be a command line tool for local overrides and/or
      tool for tests that adopt shell permissions.
      
      Test: None
      Bug:109919982
      Bug:113101834
      Change-Id: Ib7bed752849b1ed102747e3202dd7aed48d2c6d5
      6aa44527
  16. Dec 03, 2018
  17. Nov 30, 2018
  18. Nov 19, 2018
    • Nick Kralevich's avatar
      Revert "Add placeholder iris and face policy for vold data directory" · 83f25e26
      Nick Kralevich authored
      This reverts commit 92bde4b9.
      
      Reason for revert: Rebooting after OTA fails due to the
      filesystem still seeing the old label on the device.
      
      Bug: 116528212
      Bug: 119747564
      Change-Id: Ib5f920f85c7e305e89c377369dca038d2c6c738c
      Test: rollback change
      83f25e26
    • Florian Mayer's avatar
      Property to enable heap profile from process startup. · 0f3decf2
      Florian Mayer authored
      This is world-readable so it can be checked in libc's process init.
      
      Test: m
      Test: flash sailfish
      
      Bug: 117821125
      
      Change-Id: Iac7317ceb75b5ad9cfb9adabdf16929263fa8a9d
      0f3decf2
    • Haibo Huang's avatar
      Add new cpu variant related rules to SELinux · 544a0d54
      Haibo Huang authored
      I added ro.bionic.(2nd_)?_(arch|cpu_variant) to vendor system
      properties. And have init to write them to files under dev/.
      
      This change set SELinux rules for these properties and files.
      
      For the system properties: vendor/default.prop will set them. init will
      read them.
      For the files /dev/cpu_variant:.*: init will write them. bionic libc
      will read them. (Basically world readable).
      
      This is to allow libc select the right optimized routine at runtime.
      Like memcpy / strcmp etc.
      
      Test: getprop to make sure the properties are set.
      Test: ls -laZ to make sure /dev/cpu_variant:.* are correctly labeled.
      
      Change-Id: I41662493dce30eae6d41bf0985709045c44247d3
      544a0d54
  19. Nov 17, 2018
    • Hongyi Zhang's avatar
      sepolicies for sys prop enabling flag health check · da492f4f
      Hongyi Zhang authored
      device_config_flags_health_check_prop is used for enabling/disabling
      program flags_health_check which is executed during device booting.
      "1" means enabling health check actions in flags_health_check, other
      values mean flags_health_check will not perform any action.
      
      Test: build succeeded & manual test
      Change-Id: I93739dc5d155e057d72d08fd13097eb63c1193b5
      da492f4f
  20. Nov 16, 2018
  21. Nov 15, 2018
    • Mårten Kongstad's avatar
      Add idmap2 and idmap2d · f62362da
      Mårten Kongstad authored
      Bug: 78815803
      Test: builds, boots
      Test: manual: adb shell idmap2 create ...
      Test: manual: adb shell ps | grep -e idmap2d
      Change-Id: I60852e15d99329896ff9de6559d1e7cd1c67e33d
      f62362da
  22. Nov 12, 2018
  23. Nov 09, 2018
  24. Nov 07, 2018
  25. Nov 06, 2018
    • Fan Xu's avatar
      Remove buffer_hub_service compat mapping · 2d74a45f
      Fan Xu authored
      As b/116344577 is fixed, we no longer need the compatbility mapping any
      more.
      
      Test: build passed. Boot succeeded.
      Change-Id: I0d7f02c59853d34bdabaad6841d87e9ca1ee25d7
      2d74a45f
  26. Nov 05, 2018
  27. Nov 02, 2018
    • Jiyong Park's avatar
      apexd exports its status via sysprop · b3b94614
      Jiyong Park authored
      A sysprop apexd.status is set by apexd, to that other components (i.e.
      init) can determine whether APEXs are all successfully mounted or no
      (i.e., being mounted).
      
      The sysprop is only writable by apexd.
      
      Bug: 117403679
      Test: adb shell getprop apexd.status returns 'ready'.
      Change-Id: I81bcb96e6c5cb9d899f29ffa84f91eab3820be25
      b3b94614
  28. Nov 01, 2018
  29. Oct 25, 2018
  30. Oct 15, 2018
    • Florian Mayer's avatar
      Add heapprofd selinux config. · 4fde9ec7
      Florian Mayer authored
      This does not actually grant any permissions but just adds the
      necessary boilerplate for a new service.
      
      Bug: 117762471
      Bug: 117761873
      
      Change-Id: I7cdd2ae368616cfd54fc685c15f775604bfc80d4
      4fde9ec7
  31. Oct 12, 2018
    • Siarhei Vishniakou's avatar
      Allow system_server to read vendor_file · 3639f579
      Siarhei Vishniakou authored
      Input device configuration files .idc, .kl that are placed in /vendor
      are currently not accessible.
      Allow the read access here.
      
      Bug: 112880217
      Test: move .idc and .kl files from /system to /vendor, then observe
      logcat. With this patch, avc denials disappear.
      
      Change-Id: I72ad62b9adf415f787565adced73fd8aaff38832
      3639f579
  32. Oct 11, 2018
    • Chong Zhang's avatar
      add mediaswcodec service · bdbfff1b
      Chong Zhang authored
      Set up a new service for sw media codec services.
      
      Bug: 111407413
      
      Test: cts-tradefed run cts-dev --module CtsMediaTestCases --compatibility:module-arg CtsMediaTestCases:include-annotation:android.platform.test.annotations.RequiresDevice
      Change-Id: Ia1c6a9ef3f0c1d84b2be8756eb1853ffa0597f8e
      bdbfff1b
  33. Oct 08, 2018
Loading