Commit graph

25958 commits

Author SHA1 Message Date
Treehugger Robot
0a38cd30f8 Merge "Add vendor_property_type to vendor_default_prop" 2020-10-05 11:27:21 +00:00
Neil Fuller
5d1e781b66 Merge "Expand timezonedetector_service API access" 2020-10-05 10:24:21 +00:00
Alan Stokes
cc1abebbdf Merge "Allow vold to set MLS level on per-user directories." 2020-10-05 08:23:07 +00:00
Inseob Kim
d68d0ca0fc Add vendor_property_type to vendor_default_prop
Bug: 159097992
Test: m selinux_policy
Change-Id: Ic5fca5ff263584fe3e8b334003d671d706070cb8
2020-10-05 15:02:20 +09:00
Nikita Ioffe
0d7f2a8c01 Allow apexd to read ro.cold_boot_done prop
Test: presubmit
Bug: 169092045
Change-Id: Iae8d7ae80cba3bdda1ff113b623862a03d05f515
2020-10-02 18:06:37 +01:00
Alan Stokes
fc0cab8d28 Allow vold to set MLS level on per-user directories.
We want to extend vold_prepare_subdirs to set the MLS level to the
correct per-user value for selected user-specific directories.

Grant vold_prepare_subdirs the access it needs to do this, and allow
vold to access the temporary property controlling this.

Bug: 141677108
Test: Manual, with and without property set.
Change-Id: I572462cfd9b8869381f2af5faa29165bb8373d4b
2020-10-02 13:39:59 +01:00
Treehugger Robot
1e6e2b135f Merge "Remove policy for deprecated ART apex update scripts" 2020-10-02 09:19:31 +00:00
Janis Danisevskis
7736979337 Merge "Move list permission from keystore2_key to keystore class." 2020-10-01 16:49:33 +00:00
Mohammad Samiul Islam
99509f57d0 Allow system_server to rename file from /data/app-staging folder
Bug: 163037460
Test: atest StagedInstallTest
Change-Id: Id06232af8a358a588834eb35deeb2f3f4cab481d
2020-10-01 09:45:01 +01:00
Janis Danisevskis
ed96f5c518 Move list permission from keystore2_key to keystore class.
The list permission protects the ability to list arbitrary namespaces.
This is not a namespace specific permission but a Keystore specific
permission. Listing the entries of a given namsepace is covered by the
get_info permission already.

Test: N/A
Merged-In: If6e79fd863a79acf8d8ab10c6362a4eeaa88a5b8
Change-Id: If6e79fd863a79acf8d8ab10c6362a4eeaa88a5b8
2020-09-30 12:18:26 -07:00
Orion Hodson
76ce7f5eaa Remove policy for deprecated ART apex update scripts
Earlier changes removed the scripts for ART APEX pre- and post-install
hooks (I39de908ebe52f06f19781dc024ede619802a3196) and the associated
boot integrity checks (I61b8f4b09a8f6695975ea1267e5f5c88f64a371f), but
did not cleanup the SELinux policy.

Bug: 7456955
Test: Successful build and boot
Test: adb install com.android.art.debug && adb reboot
Change-Id: I1580dbc1c083438bc251a09994c28107570c48c5
2020-09-30 16:14:41 +01:00
Neil Fuller
804329881f Expand timezonedetector_service API access
TimeZoneDetectorService will be accessed as part of a new @SystemApi,
TimeManager.

For CTS testing, the TimeZoneDetectorService needs to be accessible by
the CTS test app, this means the sepolicy for the service needs to be
expanded to less trusted clients. During tests we can expand the Android
permissions to those of the Shell process, but it looks like selinux
still needs this change even though "real" clients will be privileged
apps.

It's probable that the time / time detector services will be used in
public SDK TimeManager APIs in the future.

Bug: 159891384
Test: build only (and CTS tests not yet submitted in AOSP)
Change-Id: Ieb4b40505aa990e572435c098a66c489746d4c45
2020-09-30 13:44:41 +01:00
Ilya Matyukhin
d2acfb0f9c Merge "Add sepolicy for IFace" 2020-09-29 20:20:00 +00:00
Treehugger Robot
1ae3b13e39 Merge "Add android.hardware.audio@7.0-service.example service" 2020-09-28 22:58:29 +00:00
Ilya Matyukhin
9bd164241e Add sepolicy for IFace
Bug: 168730443
Test: run on cuttlefish
Change-Id: Ie3cf791e7aac090788c7213d23487ae9f50b0690
2020-09-28 15:57:59 -07:00
Mariia Sandrikova
44c7a7029e Add attribute for all vendor hwservice.
Bug: 159707777
Test: make
Change-Id: Ie3ab6d362b970ae8a9f0a8f1c0109bf03d521ce0
2020-09-25 22:15:33 +01:00
Treehugger Robot
0dab4a6be8 Merge "Restrict the policy for IFingerprint to example only" 2020-09-25 19:59:18 +00:00
Ilya Matyukhin
b27180660c Restrict the policy for IFingerprint to example only
Bug: 152416783
Test: run on cuttlefish
Change-Id: I3df58ca37c4d7f183690ab4f6917515f9a3eb5be
2020-09-25 11:00:15 -07:00
Mikhail Naganov
fc56fe6fd0 Add android.hardware.audio@7.0-service.example service
This service will demonstrate a minimal audio HAL V7.0

Bug: 142480271
Test: atest VtsHalAudioV7_0TargetTest
      (HAL and test are not available in AOSP yet)
Change-Id: I2e7f166a47f21eb6c8621d0ddb33cfea84aa20da
2020-09-24 23:35:34 +00:00
Collin Fijalkovich
71af2b4cdd Merge "Make traceur seapp_context reflect privapp status" 2020-09-24 21:08:09 +00:00
Treehugger Robot
e1cff8b763 Merge "Add GNSS AIDL interfaces (system/sepolicy)" 2020-09-24 20:49:07 +00:00
Yu-Han Yang
bbd0ecedbb Add GNSS AIDL interfaces (system/sepolicy)
Bug: 159467682
Test: built and run on cuttlefish
Change-Id: I071e8427ea0251139661aa8123376c56e0839390
2020-09-24 12:03:30 -07:00
Jack Yu
dd64813204 Add sepolicy to allow read/write nfc snoop log data
Bug: 153704838
Test: nfc snoop log could be accessed
Change-Id: I694426ddb776114e5028b9e33455dd98fb502f0a
2020-09-24 17:36:07 +08:00
Yifan Hong
0299faf7cd Merge "Add gki.prevent_downgrade_*" 2020-09-23 23:25:35 +00:00
David Anderson
7c837afe7d Merge "Add sepolicy for the new Virtual A/B feature flag." 2020-09-23 18:12:07 +00:00
Chris Gross
f4c7b182b6 Merge "Only require compat mapping files if they exist." 2020-09-23 17:53:38 +00:00
Jooyung Han
0606ce79c9 Use file_contexts files for flattened APEXes
Previously, soong emitted APEX_FILE_CONTEXTS_INFOS make var which lists
"all" APEXes and file_contexts.bin used all of them regardless whether
an APEX is installed or not.

This doesn't work when there's a vendor specific APEX which uses vendor
specific labels. Other lunch target may fail to build due to "unknown
label" which is introduced by the vendor APEX which is fact not supposed
to be installed.

Now build/make/core/Makefile creates file_contexts.modules.tmp which is
a collection of file_contexts for flattend apexes which are to be
intalled.

Bug: 166518492
Test: m file_contexts.bin
      check contents of file_contexts.concat.tmp
Change-Id: I00c6b87bdc75fc1e04e6f8ecddae6f18762d888a
2020-09-23 15:44:11 +00:00
Nick Moukhine
75568c5540 Merge "Add sepolicy for music recognition service." 2020-09-23 13:26:52 +00:00
Nick Moukhine
affe2399b5 Add sepolicy for music recognition service.
Denial when not listed in priv_app.te:
E SELinux : avc:  denied  { find } for pid=3213 uid=10170 name=music_recognition scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:music_recognition_service:s0 tclass=service_manager permissive=0


Bug: 158194857
Test: patched and tested on internal master
Change-Id: I30e9ea79a57d9c353b732b629bd5a829c89bbcb0
2020-09-23 10:57:19 +00:00
Alan Stokes
51d334b338 Merge "Remove app_data_file:dir access from dexoptanalyzer." 2020-09-23 08:32:46 +00:00
Yu-Han Yang
9f1836ce1a Merge "Revert "Add GNSS AIDL interfaces (system/sepolicy)"" 2020-09-22 23:31:14 +00:00
Yifan Hong
cb23ab4618 Add gki.prevent_downgrade_*
Add ro.build.ab_update.gki.prevent_downgrade_{version,spl} for
update_engine to determine whether downgrade in kernel version or SPL is
considered an error or not.

Bug: 162623577
Test: update_engine_unittest
Test: apply OTA

Change-Id: If602924d50a2d5cfb3c256b82491c413a9d39f9d
2020-09-22 14:09:49 -07:00
David Anderson
55967665b4 Add sepolicy for the new Virtual A/B feature flag.
ro.virtual_ab.compression.enabled is the flag gating Virtual A/B
compression-related features.

Bug: 168257347
Test: adb shell getprop
Change-Id: Ied0bda0f3ea963e9d4010adf36ed0dfaf0b97d1c
2020-09-22 13:02:00 -07:00
Chris Gross
12c0b247ad Only require compat mapping files if they exist.
Call build_policy when determing which compat mapping files should be
included for a given partition.

Bug: 168637766
Test: Built aosp_bonito-userdebug and saw that the compat mapping files
in product/etc/sepolicy/mapping were no longer present.
Test: Added a test 30.0.cil file to bonito's product private compat
directory and saw that it was present at product/etc/sepolicy/mapping.

Change-Id: I83cc28a159b24c0a2c0717dae461983250ab6c25
2020-09-22 11:55:40 -07:00
Aleks Rozman
a1ba5a9f5a Revert "Add GNSS AIDL interfaces (system/sepolicy)"
This reverts commit d5f59b1b77.

Reason for revert: b/169150373

Change-Id: I3d5e20400ea8ee0e9ae439497245c09a13aaa716
2020-09-22 18:25:48 +00:00
Collin Fijalkovich
cf792edcbd Merge "Cleanup mechanism for enabling perfetto daemon." 2020-09-22 17:41:16 +00:00
Alan Stokes
f41d4d72de Remove app_data_file:dir access from dexoptanalyzer.
It only accesses already-open file handles since b/67111829, so has no
need for any access to the directories, not even search access.

Fixes: 161960094
Bug: 141677108
Test: boot, install app
Test: cmd package force-dex-opt <package>
Test: cmd package bg-dexopt-job
Test: No denials seen.
Change-Id: I23dca1f038351be759dd16dff18d16d158604c3c
2020-09-22 15:54:02 +01:00
John Stultz
83ae7e71f9 sepolicy: mediaserver.te: Add read permission to dmabuf_system_heap_device
Following Hridya's patches, I found one more place where
dmabuf system heap access is needed in order to play back video
without ION

Audit error:
09-22 05:34:36.545   478   478 W NPDecoder-CL: type=1400 audit(0.0:65): avc: denied { read } for name="system" dev="tmpfs" ino=631 scontext=u:r:mediaserver:
s0 tcontext=u:object_r:dmabuf_system_heap_device:s0 tclass=chr_file permissive=0

Signed-off-by: John Stultz <john.stultz@linaro.org>
Change-Id: I016a260b936a343a29f0e3bbb565b52bbcb0133a
2020-09-22 05:35:37 +00:00
Treehugger Robot
9ce62543d8 Merge "Add ro.cdma.home.operator. properties" 2020-09-22 02:24:42 +00:00
Kelvin Zhang
995b11d3be Merge "Grant gmscore permission to read virtual ab properties" 2020-09-22 01:56:29 +00:00
Steven Moreland
ab6d3eb06c Merge "Clarify comments on 3rd party app attributes." 2020-09-21 22:28:50 +00:00
Yu-Han Yang
7c7b41715e Merge "Add GNSS AIDL interfaces (system/sepolicy)" 2020-09-21 20:24:37 +00:00
Treehugger Robot
714e134b25 Merge changes If936c556,Ief48165c
* changes:
  Add permissions required for new DMA-BUF heap allocator
  Define a new selinux label for DMABUF system heap
2020-09-21 17:59:16 +00:00
Kelvin Zhang
84105de0ef Grant gmscore permission to read virtual ab properties
Bug: 168059475
Test: Serve an update over gmscore
Change-Id: Iefd88f4189b50ee68ee09bcb5a20556ba4ea3e1a
2020-09-21 10:27:20 -04:00
Inseob Kim
18cbb77b5c Add ro.cdma.home.operator. properties
vendor_init writes ro.cdma.home.operator. properties, and framework
codes reads the properties. This adds them to telephony_config_prop to
explicitly allow it.

Bug: 157958356
Test: boot
Change-Id: I3bd515bd7adcc01ec268e4d2b5a6a2f1fbca7deb
2020-09-21 12:59:11 +09:00
Jooyung Han
68c1986c21 Allow ueventd to read apex mount directories.
ueventd now scans /apex/*/firmware/ directories to find firmwares.

Bug: 167942098
Test: loading firmware from vibrator apex (sunfish)
Change-Id: I76e32e3c290fa07307377bc6fbea41c1783e40a6
2020-09-18 15:21:37 +09:00
Yu-Han Yang
d5f59b1b77 Add GNSS AIDL interfaces (system/sepolicy)
Bug: 159467682
Test: on cuttlefish
Change-Id: Iae7ceefe985096bcf9140e2a3592aade7ad70407
2020-09-17 13:31:29 -07:00
Steven Moreland
826b92fe34 Clarify comments on 3rd party app attributes.
Certain classes of 3rd party apps aren't untrusted_app_domain, but
some comments surrounding this are either outdated or wrong.

Bug: 168753404
Test: N/A
Change-Id: I019c16e26a3778536132f22c37fbea5ae7781af4
2020-09-17 17:15:26 +00:00
Marco Ballesio
7be9e9e372 Merge "sepolicy: allow system server for BINDER_GET_FROZEN_INFO" 2020-09-17 15:54:46 +00:00
Treehugger Robot
e0e91016e9 Merge "Add media.resource_observer to service contexts" 2020-09-17 12:41:04 +00:00