Commit graph

24047 commits

Author SHA1 Message Date
Hangyu Kuang
9c3c870b3c Merge "Transcoding: Enable Transcoding service binder call to app." 2020-05-12 04:48:19 +00:00
Inseob Kim
4aff17cc63 Merge "Rename contexts of ffs props" am: 8880f7700a
Change-Id: I5d74b88ccb0b5d8b850955cfc701b6ff36934559
2020-05-12 04:07:42 +00:00
Inseob Kim
8880f7700a Merge "Rename contexts of ffs props" 2020-05-12 03:52:18 +00:00
Inseob Kim
36aeb16b86 Rename context names of zram properties
Moving from old bad name "exported*_prop".

Bug: 154885206
Bug: 155844385
Test: m selinux_policy
Change-Id: I21af42980e5e6e2c3cabea6c36825fa2836a55bc
2020-05-12 10:02:31 +09:00
Treehugger Robot
4fb29dfd9e Merge "Move camera config props to camera_config_prop" am: 98316f23ab
Change-Id: Id5361ce2d2192eafcfb967cfc07facdcdfd590b7
2020-05-12 00:32:25 +00:00
Treehugger Robot
98316f23ab Merge "Move camera config props to camera_config_prop" 2020-05-12 00:16:48 +00:00
Inseob Kim
bdcbcf0742 Move aac_drc props to aac_drc_prop
Bug: 155844385
Test: sepolicy_tests
Change-Id: I1755672b5cef876955f93020c519aaaabf814bbf
2020-05-12 08:21:42 +09:00
Treehugger Robot
5dded4aecc Merge "Move libc.debug. props to libc_debug_prop" am: 339df6263d
Change-Id: I4bbb1d08e393e619f2392bb7d7320b0134928cdd
2020-05-11 22:55:11 +00:00
Treehugger Robot
339df6263d Merge "Move libc.debug. props to libc_debug_prop" 2020-05-11 22:40:47 +00:00
hkuang
4e622b28ed Transcoding: Enable Transcoding service binder call to app.
This is needed for the transcoding service to callback to the
client through ITranscodingClientCallback interface.

Bug: 145628554
Test: atest MediaTranscodeManagerTest
Change-Id: I239259ed702fa01c235f57e0a96e887472365834
2020-05-11 13:50:41 -07:00
Evan Severson
bed77b43a1 Merge "Allow permission controller to use radio service" am: cfbc6114f9
Change-Id: I8fbc4a81efad627f09a280de946a43b00ccede83
2020-05-11 16:22:12 +00:00
Evan Severson
cfbc6114f9 Merge "Allow permission controller to use radio service" 2020-05-11 16:10:24 +00:00
Inseob Kim
a28428e7bf Move camera config props to camera_config_prop
Bug: 155844385
Test: sepolicy_tests
Change-Id: Iebe81d9af48e68e6499272bd5815e959f5945567
2020-05-11 21:55:26 +09:00
Inseob Kim
9add20f31e Move libc.debug. props to libc_debug_prop
Bug: 155844385
Test: sepolicy_tests
Change-Id: I15421ada0c58c3c8d07d824e83cf44f6c4590ca8
2020-05-11 21:29:26 +09:00
Inseob Kim
bfb3708234 Rename contexts of ffs props
Bug: 71814576
Bug: 154885206
Test: m sepolicy_test
Change-Id: Idacc3635851b14b833bccca177d784f4bb92c763
2020-05-11 21:23:37 +09:00
Inseob Kim
119a73a113 Add 30.0 mapping files am: ace36abec5
Change-Id: Ie7cbffc33e506de9530f6906acdcf4400b05930d
2020-05-11 10:11:37 +00:00
Inseob Kim
190212c7a2 DO NOT MERGE Add fake 30.0 prebuilts am: 5131ff6544
Change-Id: Iee1d122830060eb2439650ccb28f40aa2c67870d
2020-05-11 10:11:34 +00:00
Inseob Kim
ace36abec5 Add 30.0 mapping files
Steps taken to produce the mapping files:

1. Add prebuilts/api/30.0/plat_pub_versioned.cil from the
/vendor/etc/selinux/plat_pub_versioned.cil file built on rvc-dev with
lunch target aosp_arm64-eng. Add prebuilts/api/30.0/vendor_sepolicy.cil
as an empty file.

2. Add new file private/compat/30.0/30.0.cil by doing the following:
- copy /system/etc/selinux/mapping/30.0.cil from rvc-dev aosp_arm64-eng
device to private/compat/30.0/30.0.cil
- remove all attribute declaration statement (typeattribute ...) and
sort lines alphabetically
- some selinux types were added/renamed/deleted w.r.t 30 sepolicy.
Find all such types using treble_sepolicy_tests_30.0 test.
- for all these types figure out where to map them by looking at
29.0.[ignore.]cil files and add approprite entries to 30.0.[ignore.]cil.

This change also enables treble_sepolicy_tests_30.0 and installs
30.0.cil mapping file onto the device.

Bug: 153661471
Test: m treble_sepolicy_tests_30.0
Test: m 30.0_compat_test
Test: m selinux_policy
Change-Id: I6dfae41fbd5f245119ede540d2c321688d6e7929
2020-05-11 04:32:00 +00:00
Inseob Kim
5131ff6544 DO NOT MERGE Add fake 30.0 prebuilts
This prebuilt is based on the AOSP policy, but slightly manipulated so
that the set of types and attributes are identical with R policy.

Following types are removed.

boot_status_prop
dalvik_config_prop
gnss_device
surfaceflinger_color_prop
surfaceflinger_prop
systemsound_config_prop
vold_config_prop
vold_status_prop

Following type is renamed.

wificond_service -> wifinl80211_service

Bug: 153661471
Test: N/A
Change-Id: I018d5e43f53c2bf721db1d13f5f4be42b9782b29
2020-05-11 13:18:52 +09:00
Inseob Kim
f1404536e3 Merge "Move audio config props to audio_config_prop" am: 520176a884
Change-Id: I20a1baca972f5edfe4ea38b30fcfaee533608693
2020-05-11 02:55:38 +00:00
Inseob Kim
520176a884 Merge "Move audio config props to audio_config_prop" 2020-05-11 02:42:16 +00:00
Evan Severson
1d69ca740e Allow permission controller to use radio service
Test: Observe denial go away
Bug: 153997991
Change-Id: I9a11e226867a5d68f2490f5143963cc66bd09538
2020-05-08 23:49:06 +00:00
Steven Moreland
b0fb5b44f8 servicemanager: add dump fd permissions
Getting hit when bugreport tries to dump this.

Bug: 155835324
Test: adb bugreport, check denials
Change-Id: I189aeba2d3a5dfafccb8f8a4db224db71820faca
2020-05-08 16:05:10 -07:00
Inseob Kim
c396803b67 Merge "Move ro.lmk. properties to lmkd_config_prop" am: c4b731d712
Change-Id: I704fffdf59324afc3be34b0ac91903aa7b352226
2020-05-08 11:00:23 +00:00
Inseob Kim
c4b731d712 Merge "Move ro.lmk. properties to lmkd_config_prop" 2020-05-08 10:44:18 +00:00
Roshan Pius
fe18734587 sepolicy: Remove offload HAL sepolicy rules am: d42c7571aa
Change-Id: I04db8b407981681a79f9db59f3dff13a7cd2e9a7
2020-05-08 05:59:32 +00:00
Inseob Kim
cc4d888f52 Move ro.lmk. properties to lmkd_config_prop
Bug: 155844385
Test: sepolicy_tests
Change-Id: I6a4412b3e7d3c46eae699bd8e7d2941f56b31773
2020-05-08 12:19:54 +09:00
Roshan Pius
d42c7571aa sepolicy: Remove offload HAL sepolicy rules
This is unused currently & there are no concrete plans to use it
in the future.

Bug: 130080335
Test: Device boots up & connects to networks.
Test: Will send for regression tests
Change-Id: I785389bc2c934c8792c8f631362d6aa0298007af
Merged-In: I785389bc2c934c8792c8f631362d6aa0298007af
(cherry picked from commit 56dfc06397)
2020-05-08 11:17:12 +09:00
Xiangyu/Malcolm Chen
dbeccda71c Merge "Expose max.active.modem to be vendor inittable." am: 8de9f51435
Change-Id: Ieeaad0c62be5fc9716472c91369fb619d0f95473
2020-05-08 01:14:07 +00:00
Xiangyu/Malcolm Chen
8de9f51435 Merge "Expose max.active.modem to be vendor inittable." 2020-05-08 00:48:48 +00:00
Suren Baghdasaryan
ee3c16fbb3 Add lmkd. property policies am: b221e66301
Change-Id: I886e440b4b2c74d47359f3dc98d76c78c8b535dd
2020-05-07 16:00:46 +00:00
Suren Baghdasaryan
654e3abdab sepolicy: Allow lmkd to communicate with its other instance for reinit am: d66fc4909f
Change-Id: Ie0d67290d9148b213683f3bb63d7819e254f3d0f
2020-05-07 16:00:43 +00:00
Suren Baghdasaryan
b221e66301 Add lmkd. property policies
lmkd.reinit property allows vendors to trigger lmkd reinitialization. Add
lmkd_prop to support lmkd.* properties inlcuding lmkd.reinit.

Bug: 155149944
Test: setprop lmkd.reinit 1
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I6ba598bad7ebb40fd6f23de473f25f32e53c996d
2020-05-07 15:42:36 +00:00
Suren Baghdasaryan
d66fc4909f sepolicy: Allow lmkd to communicate with its other instance for reinit
Lmkd should implement reinit functionality and to do so it needs to
communicate with its running instance using socket.

Bug: 155149944
Test: lmkd --reinit
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I81455fe187830081d88f001b4588f7607b1bd1d0
2020-05-07 15:42:24 +00:00
Jeffrey Vander Stoep
aa9d1a4ce7 Merge "priv_app: use per-app selinux contexts" am: 7047f515c6
Change-Id: I7ad9d546b05226b675551e0b2836d44a679c84ec
2020-05-07 08:05:17 +00:00
Jeffrey Vander Stoep
7047f515c6 Merge "priv_app: use per-app selinux contexts" 2020-05-07 07:26:38 +00:00
Malcolm Chen
ec22291ff7 Expose max.active.modem to be vendor inittable.
And rename it properly.

Bug: 154072245
Test: manual
Change-Id: I85b060ef90a747b43e1ab386337ffc5b49d29e57
2020-05-06 23:00:56 -07:00
Tom Cherry
8809b0e431 asan_extract: add system_file_type to asan_extract_exec am: b5ac55a444
Change-Id: I5d7bcdfeade9672c069208118022a91491a4dcd4
2020-05-06 23:59:55 +00:00
Tom Cherry
b5ac55a444 asan_extract: add system_file_type to asan_extract_exec
This is on the system partition and thus must be system_file_type:

neverallow check failed at out/target/product/vsoc_x86/obj_asan/ETC/userdebug_plat_sepolicy.cil_intermediates/userdebug_plat_sepolicy.cil.tmp:7703 from system/sepolicy/public/domain.te:950
  (neverallow coredomain base_typeattr_272 (file (entrypoint)))
      <root>
          allow at out/target/product/vsoc_x86/obj_asan/ETC/userdebug_plat_sepolicy.cil_intermediates/userdebug_plat_sepolicy.cil.tmp:16250
	        (allow asan_extract asan_extract_exec (file (read getattr map execute open entrypoint)))

Bug: 155905226
Test: build without above neverallow error
Change-Id: I6987582fcc013c95efe7e6758d96ec089168ea9d
2020-05-06 13:25:28 -07:00
Inseob Kim
4ce4e87de1 Move audio config props to audio_config_prop
Bug: 155844385
Test: sepolicy_tests
Change-Id: Ic199925b5e3e1c80f1e692c8c5fc2cbb73eda0f5
2020-05-06 22:58:29 +09:00
Jeff Vander Stoep
4e7769e040 priv_app: use per-app selinux contexts
Enforce for priv-apps with targetSdkVersion>=31.

This is the same restriction enforced on third party apps with
targetSdkVersion>=28 in Android 9.0. See:
https://developer.android.com/about/versions/pie/android-9.0-changes-28#per-app-selinux

This change allows selinux to better enforce the application sandbox
providing better defense-in-depth for priv-apps.
In particular it prevents apps running in the priv_app domain
from sharing their private data directory by granting
world-accessible unix permissions.

Bug: 142672293
Test: Build, boot, check for denials.
Change-Id: If2953eb990fdc24aaccf29be3394a9ee1f02185c
2020-05-06 13:17:28 +02:00
Inseob Kim
8e1fb0d99c Merge "Remove redundant comments" am: c83029bee7
Change-Id: I1692fa7f007ef346c8ba1471b533741f7f143910
2020-05-06 10:26:50 +00:00
Inseob Kim
c83029bee7 Merge "Remove redundant comments" 2020-05-06 09:56:38 +00:00
vichang
d5c3cdbdee Merge ""Add shared library into i18n APEX and add the required sepolicy" Attempt 2" am: df7775d173
Change-Id: Id4ab4f17de63035b1f35fccab9f9946a16599f69
2020-05-06 09:14:44 +00:00
vichang
df7775d173 Merge ""Add shared library into i18n APEX and add the required sepolicy" Attempt 2" 2020-05-06 09:03:28 +00:00
Jeffrey Vander Stoep
16ad123433 Merge "mediaprovider: fixed sharedUserId bug" am: 8bb366731f
Change-Id: I6566fde28a391d5d9c5fc8158a0969c96bed8e0a
2020-05-06 08:08:55 +00:00
Jeffrey Vander Stoep
8bb366731f Merge "mediaprovider: fixed sharedUserId bug" 2020-05-06 07:54:32 +00:00
Howard Chen
6bb3a8b290 Merge "Allow update_engine to get gsid property" am: a6a7f103e4
Change-Id: Ia9191f0101e583c2fffce3ff5ddf69e959a22b5e
2020-05-06 06:57:54 +00:00
Howard Chen
a6a7f103e4 Merge "Allow update_engine to get gsid property" 2020-05-06 06:44:09 +00:00
Steve Muckle
c9c8d130b9 Merge "allow modprobe to read /proc/cmdline" am: 73c62d3516
Change-Id: I9007ab6dcbab6671a51afd1e3949e678570be194
2020-05-06 00:46:00 +00:00