Roger Wang
38369c41c2
Allow wifi_sniffer to enable sniffer mode.
...
In this commit, we add necessary sepolicy rule for
wifi_sniffer. Including setup sniffer mode and up
wlan0 interface.
Bug: 141439795
Test: function works
Change-Id: I5c54805a7e7ab62ae89c06ba6ef335228d440af2
2019-10-21 13:22:16 +08:00
TreeHugger Robot
051b8e2347
Merge "vibrator: Upgrade vbirator hal to 1-3"
2019-10-09 01:26:13 +00:00
Harpreet \"Eli\" Sangha
5649236c43
vibrator: Upgrade vbirator hal to 1-3
...
Bug: 141281008
Test: Manual
Change-Id: I6b901e792a11c0a8176426214e2ba2b22f59f3a2
Signed-off-by: Harpreet \"Eli\" Sangha <eliptus@google.com >
2019-10-08 14:00:38 +09:00
Josh Hou
5f08124b04
Merge "Add OMADM logs to the bugreport"
2019-10-08 00:39:51 +00:00
Joel Galenson
dae413f22c
Add jiyong@ and smoreland@ to OWNERS file. am: 3344b0768d am: d4e58b4320 am: eed653d6cc
...
am: d7fb7ddad3
Change-Id: I646dfcd7b2488b5b654bf9c46c13ea62c0bdbcb1
2019-10-01 10:33:45 -07:00
Joel Galenson
d4e58b4320
Add jiyong@ and smoreland@ to OWNERS file.
...
am: 3344b0768d
Change-Id: I4042382655c2b6ae56675b077535af21cdb53cee
2019-10-01 10:15:55 -07:00
Joel Galenson
3344b0768d
Add jiyong@ and smoreland@ to OWNERS file.
...
Test: None
Change-Id: Ib2df9f53963076db02dedf27f1cd2a345dde1e72
2019-09-27 07:51:34 -07:00
Ashwini Oruganti
b89593c388
Update bug_map to explicitly have the b/ prefix am: d11bc88e29 am: efd8f2d93a am: 0dc95a2f9b
...
am: 1ad8da0684
Change-Id: I28893cf9a98c57206869e10570dea3be78e0aa5d
2019-09-24 15:52:12 -07:00
Ashwini Oruganti
efd8f2d93a
Update bug_map to explicitly have the b/ prefix
...
am: d11bc88e29
Change-Id: Ic835332d27fc98d9621f4391c9cc154e201b8657
2019-09-24 15:24:15 -07:00
Ashwini Oruganti
d11bc88e29
Update bug_map to explicitly have the b/ prefix
...
This is part of a series of updates to bug_map across all of android
tree.
Bug: 141014771
Test: Generated a denial, verified that the bug id in the dmesg logs
remains unchanged.
Change-Id: Ida526ee3c583f575bcf3e4a05d078800140c8243
2019-09-23 14:16:43 -07:00
Josh Hou
d8e64d139e
Add OMADM logs to the bugreport
...
Allow OMADM to access data/vendor/radio
Fix below avc denied errors
08-23 14:45:16.080 624 624 E SELinux : avc: denied { find } for service=isub pid=4274 uid=10156 scontext=u:r:omadm_app:s0:c156,c256,c512,c768 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=0
08-23 14:58:13.443 6623 6623 I auditd : type=1400 audit(0.0:26): avc: denied { create } for comm="ConnectivityThr" scontext=u:r:omadm_app:s0:c131,c256,c512,c768 tcontext=u:r:omadm_app:s0:c131,c256,c512,c768 tclass=udp_socket permissive=0 app=com.android.omadm.service
08-23 14:58:34.770 6623 6623 I auditd : type=1400 audit(0.0:28): avc: denied { write } for comm="IntentService[D" name="dnsproxyd" dev="tmpfs" ino=25468 scontext=u:r:omadm_app:s0:c131,c256,c512,c768 tcontext=u:object_r:dnsproxyd_socket:s0 tclass=sock_file permissive=0 app=com.android.omadm.service
08-23 16:15:43.770 6742 6742 I auditd : type=1400 audit(0.0:27): avc: denied { write } for comm="ConnectivityThr" name="fwmarkd" dev="tmpfs" ino=26777 scontext=u:r:omadm_app:s0:c123,c256,c512,c768 tcontext=u:object_r:fwmarkd_socket:s0 tclass=sock_file permissive=0 app=com.android.omadm.service
08-23 16:16:06.506 6742 6742 I auditd : type=1400 audit(0.0:35): avc: denied { connectto } for comm="IntentService[D" path="/dev/socket/dnsproxyd" scontext=u:r:omadm_app:s0:c123,c256,c512,c768 tcontext=u:r:netd:s0 tclass=unix_stream_socket permissive=0 app=com.android.omadm.service
Bug: 119871368
Test: Verify OMADM log can be added to the bugreport and avc denied
issues were fixed
Change-Id: Ie043bd4b90da865a39624956324abd7b7c11cb5a
2019-09-18 21:09:49 +08:00
TreeHugger Robot
38cf5bf32f
Merge "Merge qt-r1-dev-plus-aosp-without-vendor (5817612) into stage-aosp-master" into stage-aosp-master
2019-09-11 20:31:36 +00:00
Paul Crowley
2ef3a0ed75
Merge "allow tee system_data_root_file:dir r_dir_perms;" am: 78923f9b1e am: 3abc1c460f am: 0496fcf152
...
am: aa45c7690d
Change-Id: I5c97525dbb6104cdc2e4e8d745d76d60811dc691
2019-09-09 21:52:13 -07:00
Paul Crowley
0496fcf152
Merge "allow tee system_data_root_file:dir r_dir_perms;" am: 78923f9b1e
...
am: 3abc1c460f
Change-Id: I46fab35facf5e36285b7e36ae06c5c9ca8987b09
2019-09-09 21:40:10 -07:00
Treehugger Robot
78923f9b1e
Merge "allow tee system_data_root_file:dir r_dir_perms;"
2019-09-10 04:14:17 +00:00
Paul Crowley
d85b44697a
allow tee system_data_root_file:dir r_dir_perms;
...
aosp/1106014 introduces a new class system_data_root_file and
tee needs access to that as well as system_data_file.
09-09 20:26:53.639 645 645 I auditd : type=1400 audit(0.0:9): avc: denied { read } for comm="qseecomd" name="/" dev="dm-2" ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1
09-09 20:26:53.639 645 645 I qseecomd: type=1400 audit(0.0:9): avc: denied { read } for name="/" dev="dm-2" ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1
09-09 20:26:53.639 645 645 I auditd : type=1400 audit(0.0:10): avc: denied { open } for comm="qseecomd" path="/data" dev="dm-2" ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1
09-09 20:26:53.639 645 645 I qseecomd: type=1400 audit(0.0:10): avc: denied { open } for path="/data" dev="dm-2" ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1
Bug: 140402208
Test: Flash Taimen device, enroll fingerprint, check log for denials
Change-Id: Ie976d7bbe4aeba875b96b6b82a94734b71ba1cb9
2019-09-09 14:39:34 -07:00
Xin Li
3d27a19629
Merge qt-r1-dev-plus-aosp-without-vendor (5817612) into stage-aosp-master
...
Bug: 135460123
Change-Id: Ibbd220731fc8e63de90401fcd1eca0ebac2ea6b7
Merged-In: I5a9a6dd645a962020d9e0064fbe38652a28770c4
2019-09-08 13:10:40 -07:00
Steven Moreland
92c0f4db85
Merge "mediacodec_service: this service DNE" am: cfe911b5fa am: 2cab3fed16 am: 3b64e0d070 am: c68958f6c0
...
am: a90088f2ce
Change-Id: Ie8ff294a74847d6e9a2401f2cdf2bf7bac7db85a
2019-08-21 11:27:43 -07:00
Steven Moreland
b5bdab2263
Merge "Don't audit hwservice add -> find." am: 2a9f6d14af am: 73b9711e82 am: 2d483f3969 am: 5c78ef5aa7
...
am: 5b686e0e32
Change-Id: I4ed140fcd3d715557cccdd52f34188af1dd648ee
2019-08-21 11:17:37 -07:00
Steven Moreland
c68958f6c0
Merge "mediacodec_service: this service DNE" am: cfe911b5fa am: 2cab3fed16
...
am: 3b64e0d070
Change-Id: Idbbace6ab332145dfa4c923d884bd3db94f88419
2019-08-21 11:09:35 -07:00
Steven Moreland
2cab3fed16
Merge "mediacodec_service: this service DNE"
...
am: cfe911b5fa
Change-Id: I90efa832bf38d80541e14792e08310f57d515a0b
2019-08-21 10:55:52 -07:00
Steven Moreland
5c78ef5aa7
Merge "Don't audit hwservice add -> find." am: 2a9f6d14af am: 73b9711e82
...
am: 2d483f3969
Change-Id: I9c5975801805493acb10b87d07def6f8b24139dc
2019-08-21 10:54:31 -07:00
Steven Moreland
cfe911b5fa
Merge "mediacodec_service: this service DNE"
2019-08-21 17:47:59 +00:00
Steven Moreland
73b9711e82
Merge "Don't audit hwservice add -> find."
...
am: 2a9f6d14af
Change-Id: I14ab86b475540888ecd6db669814d22ce82c284f
2019-08-21 10:40:42 -07:00
Steven Moreland
3781ca3a3c
mediacodec_service: this service DNE
...
Bug: 80317992
Test: automated only
Change-Id: I031b87a17a9b03b0a32d0fac10717bf57ef95d24
2019-08-21 17:35:08 +00:00
Treehugger Robot
2a9f6d14af
Merge "Don't audit hwservice add -> find."
2019-08-21 17:28:58 +00:00
Steven Moreland
56078dad44
Don't audit hwservice add -> find.
...
Since an additional check related to getting the transport of a service
before registering it is more visible (this is moving a VTS test failure
to boot time for more visibility).
When adding a 'find' check on the 'add' path, this triggered some logs
here. 'find' has always been given with 'add' for other services, but
for a dontaudit, find has to be manually added.
Bug: 139274536
Test: TH
Change-Id: Ica4266dfaf17acc8c7bc8bd83054aa02811a4a37
2019-08-20 12:47:03 -07:00
Steven Moreland
2bbf8c5cf1
Remove 'uce' service to move into core policy.
...
am: da27e1e3d7
Change-Id: I6b4695028db4fb5a07d2c3ddd25986d5f056ae90
2019-08-19 13:26:02 -07:00
Steven Moreland
b012b9e1c8
Remove 'uce' service to move into core policy.
...
Because it is used by the AOSP framework.
Bug: 136023468
Test: TH
Change-Id: I62a4e92b0dac4098d640cca515d0dd8680442779
Merged-In: I62a4e92b0dac4098d640cca515d0dd8680442779
(cherry picked from commit d19df6d3bc )
2019-08-19 12:38:57 -07:00
Steven Moreland
c71438f85b
Remove 'uce' service to move into core policy.
...
Because it is used by the AOSP framework.
Bug: 136023468
Test: TH
Change-Id: I62a4e92b0dac4098d640cca515d0dd8680442779
Merged-In: I62a4e92b0dac4098d640cca515d0dd8680442779
(cherry picked from commit d19df6d3bc )
2019-08-19 12:29:37 -07:00
Steven Moreland
da27e1e3d7
Remove 'uce' service to move into core policy.
...
Because it is used by the AOSP framework.
Bug: 136023468
Test: TH
Change-Id: I62a4e92b0dac4098d640cca515d0dd8680442779
Merged-In: I62a4e92b0dac4098d640cca515d0dd8680442779
(cherry picked from commit d19df6d3bc )
2019-08-16 17:55:08 +00:00
Steven Moreland
5d6ddd9d0f
Merge "Remove 'uce' service to move into core policy."
2019-08-16 17:14:49 +00:00
Inseob Kim
22ab080a88
Add vendor prefix to slpi property am: b8e404540d am: 3b2a217052
...
am: 048b8a519a
Change-Id: Ic992911eb752e5622f01a376f1ce85c1a02a1be8
2019-08-02 17:45:38 -07:00
Inseob Kim
048b8a519a
Add vendor prefix to slpi property am: b8e404540d
...
am: 3b2a217052
Change-Id: I3ba3d491123081d8a835324640ce948e8f3a2f12
2019-08-02 17:33:27 -07:00
Inseob Kim
a2c3aa7c1a
Add vendor prefix to slpi property
...
am: b8e404540d
Change-Id: Ib6dc2c514cae00fd7d5d1ba075d3328b133897e5
2019-08-02 17:12:12 -07:00
Steven Moreland
d19df6d3bc
Remove 'uce' service to move into core policy.
...
Because it is used by the AOSP framework.
Bug: 136023468
Test: TH
Change-Id: I62a4e92b0dac4098d640cca515d0dd8680442779
2019-08-01 14:25:22 -07:00
Inseob Kim
b8e404540d
Add vendor prefix to slpi property
...
For devices launching with Android Q or later, properties defined by
vendor should have the prefix "vendor."
Bug: 138278883
Test: m
Change-Id: I728b4d8ab2f46936e7954bece94e53e6628992fb
2019-07-29 15:22:02 +09:00
Xin Li
7079bb5d75
DO NOT MERGE - Merge qt-dev-plus-aosp-without-vendor (5699924) into stage-aosp-master
...
Bug: 134405016
Change-Id: Iabc35a41afa0d200bb126abc10a809f36bd4a46a
2019-07-01 20:59:11 +00:00
klinesjiang
a228ac6c74
Add sepolicy for RamdumpService to access property sys.boot.reason on Pixel 2 am: 96c2b2d303
...
am: ec2781bb15
Change-Id: I71e3cda76940abad949155690fd873b608e4a9d4
2019-07-01 05:52:06 -07:00
TreeHugger Robot
9cca8f5fb9
Merge "vibrator: Add New Dependencies"
2019-06-28 03:25:16 +00:00
Benjamin Schwartz
e118d422ad
Merge "LowPowerMonitor: Enable Interactive bugreports" into qt-r1-dev am: 13cbc8b3a9
...
am: 568f80e69e
Change-Id: Icfb83beb002dacaa93a21a3c8195fbd628e63195
2019-06-26 12:58:51 -07:00
Benjamin Schwartz
568f80e69e
Merge "LowPowerMonitor: Enable Interactive bugreports" into qt-r1-dev
...
am: 13cbc8b3a9
Change-Id: I00f34cad26e7b2caa73d93c674b6e692c097a8aa
2019-06-26 12:35:43 -07:00
klinesjiang
96c2b2d303
Add sepolicy for RamdumpService to access property sys.boot.reason on Pixel 2
...
Denied pattern is:
avc: denied { read } for name="u:object_r:system_boot_reason_prop:s0" dev="tmpfs" ino=21223 scontext=u:r:ramdump_app:s0:c206,c256,c512,c768 tcontext=u:object_r:system_boot_reason_prop:s0 tclass=file permissive=0
Bug: 132220248
Merged-In: Id391450303a19b14a77ae564a0b79606f9c984fc
Change-Id: Id391450303a19b14a77ae564a0b79606f9c984fc
2019-06-26 03:25:48 +00:00
Benjamin Schwartz
a7e7c11e77
LowPowerMonitor: Enable Interactive bugreports
...
Bug: 118192245
Test: Configured LPM to trigger a bug report and verified that it is a
full bug report.
Change-Id: I5f820b1e140cfd690bc5eaac75bb74dc4476d70e
2019-06-24 17:41:27 -07:00
Jie Song
d3724c8bef
Merge "Update MDS key"
2019-06-24 07:41:39 +00:00
Rick Yiu
99c12fab45
Merge "Fix avc denied to dump some useful hals for user build." into qt-r1-dev am: 1e1153ec19
...
am: 2b3f1d428e
Change-Id: I8bfd9c00a768f6221fc66f1f4203a6124d48ba25
2019-06-21 08:06:34 -07:00
Harpreet "Eli" Sangha
116e13747b
vibrator: Add New Dependencies
...
Adds new dependencies required by the updated vibrator HAL:
- Properties that replace previously hard-coded configs.
- Access to additional sysfs nodes.
Test: Manual, PTS, VTS
Change-Id: If41a7023904c22caf60105850b980a879a49d002
Signed-off-by: Harpreet "Eli" Sangha <eliptus@google.com >
2019-06-20 16:23:51 +09:00
Rick Yiu
2b3f1d428e
Merge "Fix avc denied to dump some useful hals for user build." into qt-r1-dev
...
am: 1e1153ec19
Change-Id: I6736cc587045cdc7f04b7354db36c103352a91a4
2019-06-19 23:26:59 -07:00
TreeHugger Robot
1e1153ec19
Merge "Fix avc denied to dump some useful hals for user build." into qt-r1-dev
2019-06-20 04:42:03 +00:00
Eva Huang
790d7d7c4e
Add ramdump search access to metadata. am: 7c82a29668 am: f52225f443
...
am: 2d6166766e
Change-Id: I46f7d2e7f6f09e6d4e4ff70039c4a37f6e1c1488
2019-06-17 21:25:36 -07:00