Commit graph

5280 commits

Author SHA1 Message Date
Nicolas Geoffray
074d072ce8 Merge "Revert "Sepolicy: Allow system_server_startup to load dalvikcache artifacts"" into rvc-dev 2020-03-17 08:30:05 +00:00
Nicolas Geoffray
4c671592be Revert "Sepolicy: Allow system_server_startup to load dalvikcache artifacts"
Bug: 128688902
Bug: 150032912
Test: boots

This reverts commit e074312077.

(cherry-picked from commit 86111c9cd5)

Merged-In: Ib3871142a200ac64268eb02db98d3260758a4677
Change-Id: Ia625dbef3dd18cd06d827149d2b18c55fd076eaf
2020-03-16 16:44:55 +00:00
Nikita Ioffe
3bd53a9cee Add userspace_reboot_test_prop
This property type represents properties used in CTS tests of userspace
reboot. For example, test.userspace_reboot.requested property which is
used to check that userspace reboot was successful and didn't result in
full reboot, e.g.:
* before test setprop test.userspace_reboot.requested 1
* adb reboot userspace
* wait for boot to complete
* verify that value of test.userspace_reboot.requested is still 1

Test: adb shell setprop test.userspace_reboot.requested 1
Bug: 150901232
Change-Id: I45d187f386149cec08318ea8545ab864b5810ca8
2020-03-16 11:17:12 +00:00
Adam Shih
4684ef7565 Merge "gmscore_app: suppress denials on /mnt" into rvc-dev 2020-03-13 01:33:54 +00:00
Hongyi Zhang
7f400c6841 Whitelist prop persist.device_config.configuration.
For system prop flags from DeviceConfig namespace "Configuration".

Test: Build and run on local device
Bug: 149420506

Change-Id: If4196b4bf231e7c52f98b92cc0031a08dad06120
Merged-In: If4196b4bf231e7c52f98b92cc0031a08dad06120
2020-03-12 01:17:36 +00:00
Adam Shih
0058302270 gmscore_app: suppress denials on /mnt
Bug: 149543390
Bug: 149062700
Bug: 151195371
Test: boot with no gmscore_app avc error
Change-Id: I70f20b88ce5b9e017e644cdbb5dc81f798c61640
2020-03-11 16:20:07 +08:00
Steven Moreland
6968e374c1 Merge "Allow vndservicemanager to self-register." into rvc-dev 2020-03-09 18:34:19 +00:00
Songchun Fan
3daa20f14f Merge "[sepolicy] remove vendor_incremental_module from global sepolicy rules" into rvc-dev 2020-03-09 01:40:27 +00:00
Steven Moreland
bfceeabe3c Allow vndservicemanager to self-register.
This is useful for tools like dumpsys, so that they work on all services
equally as well. Also, so that there is no difference with the regular
service manager.

Bug: 150579832
Test: 'adb shell /vendor/bin/dumpsys -l' shows 'manager'
Test: denial is no longer present:
03-05 12:23:47.346   221   221 E SELinux : avc:  denied  { add } for pid=221 uid=1000 name=manager scontext=u:r:vndservicemanager:s0 tcontext=u:object_r:service_manager_vndservice:s0 tclass=service_manager permissive=0

Change-Id: Id6126e8277462a2c4d5f6022ab67a4bacaa3241e
(cherry picked from commit 52a96cc7dd)
2020-03-06 16:35:52 -08:00
KRIS CHEN
6ffa674965 Merge "Add rules to dump fingerprint hal traces" into rvc-dev 2020-03-06 03:16:53 +00:00
PO HUNG CHEN
8834ca0f22 Merge "Allow gsid to callback system server for oneway method" into rvc-dev 2020-03-06 02:25:21 +00:00
Songchun Fan
5d7887850b [sepolicy] remove vendor_incremental_module from global sepolicy rules
Moving to pixel-sepolicy

BUG: 150882666
Test: atest PackageManagerShellCommandIncrementalTest
Change-Id: I55f5d53ee32d0557e06c070961526631e1bb1fc5
2020-03-05 15:36:23 -08:00
TreeHugger Robot
1cef3d2fa6 Merge "app: allow PROT_EXEC on ashmem objects" into rvc-dev 2020-03-05 06:09:36 +00:00
Changyeon Jo
82862fc46d Merge "Update automotive display service rules" into rvc-dev 2020-03-05 00:43:16 +00:00
TreeHugger Robot
09b1bff0aa Merge "Merge "allow priv_apps to read from incremental_control_file" am: bb4a0467f8 am: e45d2de45f am: 1e69a4a655 am: 98e8848e22 am: ef728f532b" into rvc-dev 2020-03-04 20:06:56 +00:00
TreeHugger Robot
fd948c2afd Merge "Adding sepolicy of tuner resource manager service" into rvc-dev 2020-03-04 17:21:59 +00:00
Howard Chen
4930db74ea Allow gsid to callback system server for oneway method
Bug: 149790245
Bug: 149716497
Test: adb shell am start-activity \
    -n com.android.dynsystem/com.android.dynsystem.VerificationActivity \
    -a android.os.image.action.START_INSTALL \
    -d file:///storage/emulated/0/Download/system.raw.gz \
    --el KEY_SYSTEM_SIZE $(du -b system.raw|cut -f1) \
    --el KEY_USERDATA_SIZE 8589934592

Change-Id: I41c7b1278cfc103c90282b6a6781eab66fc9dcdb
Merged-In: I41c7b1278cfc103c90282b6a6781eab66fc9dcdb
(cherry picked from commit 389bc7baec)
2020-03-04 18:23:08 +08:00
Kris Chen
8a04a13978 Add rules to dump fingerprint hal traces
Bug: 150008549
Test: adb shell am hang
Test: adb bugreport
Change-Id: I0440bb8fd3cc1205a43eca6c7ef5f8d0afc92396
Merged-In: I0440bb8fd3cc1205a43eca6c7ef5f8d0afc92396
2020-03-03 17:39:02 +08:00
Changyeon Jo
3198f09709 Update automotive display service rules
This change updates sepolicies for automotive display service to make it
available to the vendor processes.

Bug: 149017572
Test: m -j selinux_policy
Change-Id: I48708fe25e260f9302e02749c3777c0ca0d84e4b
Signed-off-by: Changyeon Jo <changyeon@google.com>
(cherry picked from commit 17b38d526d)
2020-02-29 11:01:26 -08:00
Automerger Merge Worker
4400876ec0 Merge "allow priv_apps to read from incremental_control_file" am: bb4a0467f8 am: e45d2de45f am: 1e69a4a655 am: 98e8848e22 am: ef728f532b
BUG: 150475334
Change-Id: I013cf8a90c48bfb758606d91ced84b345aa9d1ac
(cherry picked from commit 78902f27be)
2020-02-28 20:39:09 +00:00
Ryan Savitski
cfd767180d traced_perf sepolicy tweaks
* allow shell to enable/disable the daemon via a sysprop
* don't audit signals, as some denials are expected
* exclude zygote from the profileable set of targets on debug builds.
  I've not caught any crashes in practice, but believe there's a
  possibility that the zygote forks while holding a non-whitelisted fd
  due to the signal handler.

Bug: 144281346
Merged-In: Ib237d4edfb40b200a3bd52e6341f13c4777de3f1
Change-Id: Ib237d4edfb40b200a3bd52e6341f13c4777de3f1
(cherry picked from commit 008465e5ec)
2020-02-28 15:04:43 +00:00
Jeff Vander Stoep
7160105c14 app: allow PROT_EXEC on ashmem objects
This fixes a bug introduced in aosp/1143430 where the permission
should have been included for the newly introduced
ashmem_libcutils_device type.

Test: Build
Fixes: 150193534
Change-Id: I5b1ed8d9548f9dab4ad9373f98e21614c07c3d38
(cherry picked from commit 789ebf03ba)
2020-02-26 18:40:09 +00:00
Amy
7f4526612d Adding sepolicy of tuner resource manager service
This is to allow adding the Tuner Resource Manager as a system service

Test: cuttlefish
Bug: 147380513
Change-Id: I3f61f2542c7fd934bb69dde08079f830196e2344
(cherry picked from commit 3791549dc4)
2020-02-24 13:59:46 -08:00
Roshan Pius
16ad48d0d8 Merge "sepolicy(wifi): Allow wifi service access to wifi apex directories" into rvc-dev 2020-02-24 19:06:10 +00:00
Roshan Pius
7f3120d5e1 sepolicy(wifi): Allow wifi service access to wifi apex directories
Bug: 148660313
Test: Compiles
Change-Id: I4a973c4516fda5f96f17f82cd3a424b0ca89004b
Merged-In: I4a973c4516fda5f96f17f82cd3a424b0ca89004b
2020-02-22 09:33:07 -08:00
Automerger Merge Worker
07625d5b4c cut down bpf related privileges
This is driven by 3 things:
  - netd no longer needs setattr, since this is now done by bpfloader
  - nothing should ever unpin maps or programs
  - generic cleanups and additional neverallows

Test: build, atest
Bug: 150040815
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I881cc8bf9fe062aaff709727406c5a51fc363c8e
Merged-In: I881cc8bf9fe062aaff709727406c5a51fc363c8e
2020-02-22 11:28:36 +00:00
Automerger Merge Worker
d8d49bc1f0 sepolicy: policies for iorap.inode2filename am: e39f8d23ed am: ba56249da9 am: 36e0549683
Change-Id: I22ba3e8a1136ba63958532c0c1dc07caac13dd36
2020-02-21 17:01:59 +00:00
Automerger Merge Worker
4ab5332b95 Merge "Add adbd_prop, system_adbd_prop property types." am: b8c108e15f am: 76cd6f8ff8 am: dc07a9d2c0
Change-Id: Iaaf6ab98e748a20f79907e1515a203eba84526c0
2020-02-21 01:11:25 +00:00
Igor Murashkin
e39f8d23ed sepolicy: policies for iorap.inode2filename
binary transitions are as follows:

iorapd (fork/exec) -> iorap.cmd.compiler (fork/exec) -> iorap.inode2filename

Bug: 117840092
Test: adb shell cmd jobscheduler run -f android 28367305
Change-Id: I4249fcd37d2c8cbdd0ae1a0505983cce9c7fa7c6
2020-02-20 16:38:17 -08:00
Joshua Duong
b8c108e15f Merge "Add adbd_prop, system_adbd_prop property types." 2020-02-21 00:28:48 +00:00
Joshua Duong
18988fcce3 Add adbd_prop, system_adbd_prop property types.
service.adb.tls.port contains the adbd tcp port running the TLS server.
persist.sys.adb.wifi tells adbd when to enable the TLS server.

Bug: 149348431
Bug: 111434128

Test: Enable wireless debugging, check if TLS port information is
displayed in the Developer options > Wireless debuggging.
Change-Id: I5b5c5a3d064bc003f41386ede9051609fefec53e
2020-02-20 07:52:34 -08:00
Automerger Merge Worker
4d7f45f968 Merge "Define sepolicy for redirect-socket-calls feature" am: 622e4f761b am: 4f799574bd am: 9c7e277700
Change-Id: I364408ff8119300cf87cf85fa07b8b179697396c
2020-02-20 05:59:04 +00:00
Ken Chen
622e4f761b Merge "Define sepolicy for redirect-socket-calls feature" 2020-02-20 05:18:55 +00:00
Automerger Merge Worker
008c17f0ee Merge "Allow system_app to interact with Dumpstate HAL" am: e2fb8aa108 am: 2dde8349a4 am: 50b59db55f
Change-Id: I6415408cabb43254cc8b08c6a7b5d26c9d36c0ba
2020-02-20 04:50:35 +00:00
Rambo Wang
e2fb8aa108 Merge "Allow system_app to interact with Dumpstate HAL" 2020-02-20 04:07:09 +00:00
Automerger Merge Worker
7934472245 Merge "Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL." am: 1948c11d13 am: 19516eb39f am: 5d5da562ba
Change-Id: Id5d55d29f52b7ed56c16de946c4c0e5fdf054f35
2020-02-19 23:18:16 +00:00
Automerger Merge Worker
1b6acb28d6 Merge "Fix selinux denials for incidentd" am: 510c53df03 am: b7aa618034 am: 3e8a884be8
Change-Id: I31ca10369495ac22d64c05b2d1cd61b2ca9ba890
2020-02-19 23:17:58 +00:00
Automerger Merge Worker
ca1311dd4a Merge "Allow zygote to go into media directory to bind mount obb dir" am: fa60d7fc60 am: 3f92eb4b66 am: db9b2bce55
Change-Id: I25ca2d37213cd73689b687b1a25d60081b9ae800
2020-02-19 23:16:50 +00:00
Automerger Merge Worker
9da260d750 Merge "Allow mediaprovider_app access to /proc/filesystems." am: 78f63707ac am: d925b6c670 am: 1d601e11f9
Change-Id: I74e864de9d1d50ccb6b27c82545176ea3973135e
2020-02-19 23:16:11 +00:00
Automerger Merge Worker
4862a3e303 Rename ro.device_owner system property am: 0b30311feb am: 4cbbee6ec6 am: b0bb694f93
Change-Id: Ic78eb84a26d75d33e7bed57ba76ecc24fb8e197a
2020-02-19 23:14:24 +00:00
David Zeuthen
1948c11d13 Merge "Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL." 2020-02-19 21:14:40 +00:00
Mike Ma
510c53df03 Merge "Fix selinux denials for incidentd" 2020-02-19 21:07:14 +00:00
David Zeuthen
02bf814aa2 Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL.
The credstore service is a system service which backs the
android.security.identity.* Framework APIs. It essentially calls into
the Identity Credential HAL while providing persistent storage for
credentials.

Bug: 111446262
Test: atest android.security.identity.cts
Test: VtsHalIdentityTargetTest
Test: android.hardware.identity-support-lib-test
Change-Id: I5cd9a6ae810e764326355c0842e88c490f214c60
2020-02-19 13:46:45 -05:00
Treehugger Robot
fa60d7fc60 Merge "Allow zygote to go into media directory to bind mount obb dir" 2020-02-19 18:30:27 +00:00
Treehugger Robot
78f63707ac Merge "Allow mediaprovider_app access to /proc/filesystems." 2020-02-19 18:12:06 +00:00
Martijn Coenen
fd54803f0b Allow mediaprovider_app access to /proc/filesystems.
It needs to be able to see supported filesystems to handle external
storage correctly.

Bug: 146419093
Test: no denials
Change-Id: Ie1e0313c73c02a73558d07ccb70de02bfe8c231e
2020-02-19 17:24:24 +01:00
Ricky Wai
ad538514a7 Allow zygote to go into media directory to bind mount obb dir
Bug: 148049767
Change-Id: I2134de4df0db3268340fcfec6ad1cb8a94e3e8f9
2020-02-19 14:24:27 +00:00
Rubin Xu
0b30311feb Rename ro.device_owner system property
This is renamed to ro.organization_owned to cover the extended
usage now that there is a new management mode for fully-managed
organization owned devices: organization-owned managed profile.
A device is considered fully-managed if there is a device owner
or an organization-owned managed profile.

Bug: 148437300
Test: atest FrameworksServicesTests:DevicePolicyManagerTest
Test: atest FrameworksServicesTests:SecurityEventTest
Test: atest FrameworksCoreTests:EventLogTest
Test: atest com.android.cts.devicepolicy.DeviceOwnerTest#testSecurityLoggingWithSingleUser
Test: atest com.android.cts.devicepolicy.DeviceOwnerTest#testSecurityLoggingWithTwoUsers
Test: atest com.android.cts.devicepolicy.DeviceOwnerTest#testSecurityLoggingEnabledLogged
Change-Id: Ic3288fe343d3b51c59f08678e114fe9a81cb39a4
2020-02-19 10:34:05 +00:00
Rambo Wang
8950e7a25b Allow system_app to interact with Dumpstate HAL
To let end user enable/disable the verbose vender logging,
a developer option is added into Settings app which need
directly interact with Dumpstate HAL. In the future, the
same function may be added into SystemUI, eg. as a
QuickSettings tile.

To allow both Settings app and system.ui, system_app is
the best candidate for the sepolicy change.

Bug: 148822215
Test: make && make RunSettingsRoboTests
Change-Id: Ic6ef497505719e07cc37518b78c9dc146cda2d2c
2020-02-19 06:03:32 +00:00
Automerger Merge Worker
a73fb7ff44 Merge "Allow gmscore to read tcp sockets passed by priv-apps" am: 7848af185a am: 64b7d07109 am: 10e9260a16
Change-Id: Ibbb1662ad4da58e5e373e53e8b1d02baee4378c7
2020-02-19 05:57:00 +00:00