Winson Chiu
019037a810
Merge "DO NOT MERGE: Allow idmap1 to read vmdl*.tmp APK install files" into qt-dev
2019-04-25 15:56:18 +00:00
Winson Chiu
4b33d68d35
DO NOT MERGE: Allow idmap1 to read vmdl*.tmp APK install files
...
When upgrading a package, PackageParser acts on the temporary
APK file copied from the install location. This is passed to
idmap, which doesn't have read access because it's missing an
SELinux rule.
This is needed to fix a bug with manifest overlaying on updating
an app, a feature kept alive for Q.
Relevant logs when updating a target:
[ 550.068083] type=1400 audit(1556124408.583:3812): avc: denied { read } for comm="idmap" name="base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.090115] type=1400 audit(1556124408.583:3812): avc: denied { read } for comm="idmap" name="base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.092064] type=1400 audit(1556124408.603:3813): avc: denied { open } for comm="idmap" path="/data/app/vmdl1238645679.tmp/base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.096202] type=1400 audit(1556124408.603:3813): avc: denied { open } for comm="idmap" path="/data/app/vmdl1238645679.tmp/base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.098459] type=1400 audit(1556124408.613:3814): avc: denied { map } for comm="idmap" path="/data/app/vmdl1238645679.tmp/base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.101640] type=1400 audit(1556124408.613:3814): avc: denied { map } for comm="idmap" path="/data/app/vmdl1238645679.tmp/base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.104239] type=1400 audit(1556124408.613:3815): avc: denied { getattr } for comm="idmap" path="/data/app/vmdl1238645679.tmp/base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
Bug: 130559507
Test: manual adb push /system/product/app/TestApp.apk with
/system/product/overlay/TestOverlay.apk enabling disabled launcher
Activity in TestApp; adb install -r TestApp.apk keeps enabled state
with changes
Change-Id: Ieeb7fb4f79ae091d0febf42ca358e7ffdfa6c3ff
(cherry picked from commit 7e7291a763
)
2019-04-25 11:05:07 +00:00
Ady Abraham
53c096d1aa
Merge "Add new surfaceflinger ro props" into qt-dev
...
am: 58a9b10bb2
Change-Id: I0ba71694212a74f0c9304e8c8270b1cbeae4907f
2019-04-25 02:45:35 -07:00
Inseob Kim
c096bd0506
Merge "Build contexts files with Soong" am: b60155aeac
...
am: 478b4440e5
Change-Id: I3c5824d2436efbc9b681ae5aca0f5543546997da
2019-04-25 00:56:26 -07:00
Inseob Kim
478b4440e5
Merge "Build contexts files with Soong"
...
am: b60155aeac
Change-Id: Ibd2952538a3f587738a951ac135678d4d1d46882
2019-04-25 00:51:26 -07:00
Treehugger Robot
b60155aeac
Merge "Build contexts files with Soong"
2019-04-25 07:46:19 +00:00
Miao Wang
3f0eb7134f
Allow NNAPI HAL services access model files provided by privapp. am: 8c2f4babee
...
am: 381b055fe4
Change-Id: I6cdde48c8448166154d102305628f0bae108cfb1
2019-04-25 00:36:19 -07:00
Miao Wang
381b055fe4
Allow NNAPI HAL services access model files provided by privapp.
...
am: 8c2f4babee
Change-Id: I0ca4f11ddef992bfcac55c5a8fdc1b4b1d83c915
2019-04-25 00:31:12 -07:00
Miao Wang
8c2f4babee
Allow NNAPI HAL services access model files provided by privapp.
...
Bug: 131169221
Test: mm
Change-Id: I1004821bd30e2a0586b14178e352e885cabfc002
(cherry picked from commit aa568e1c79
)
2019-04-24 21:15:45 -07:00
Miao Wang
aa568e1c79
Allow NNAPI HAL services access model files provided by privapp.
...
Bug: 131169221
Test: mm
Change-Id: I1004821bd30e2a0586b14178e352e885cabfc002
2019-04-24 21:14:32 -07:00
Luke Huang
91491ed107
Merge "Sepolicy for netutils_wrapper to use binder call" am: 75b25384bb
...
am: a35b8cc42b
Change-Id: Ic567cf288fc4f8362d6580204bc8fb69573a6bf4
2019-04-24 20:27:21 -07:00
Luke Huang
a35b8cc42b
Merge "Sepolicy for netutils_wrapper to use binder call"
...
am: 75b25384bb
Change-Id: Ib1dcfba93b5ba2fad7eec4ac9665e0486f6562be
2019-04-24 20:21:25 -07:00
Luke Huang
75b25384bb
Merge "Sepolicy for netutils_wrapper to use binder call"
2019-04-25 03:09:30 +00:00
Inseob Kim
b554e594ca
Build contexts files with Soong
...
This is to migrate sepolicy Makefiles into Soong. For the first part,
file_contexts, hwservice_contexts, property_contexts, and
service_contexts are migrated. Build-time tests for contexts files are
still in Makefile; they will also be done with Soong after porting the
module sepolicy.
The motivation of migrating is based on generating property_contexts
dynamically: if we were to amend contexts files at build time in the
future, it would be nicer to manage them in Soong. To do that, building
contexts files with Soong can be very helpful.
Bug: 127949646
Bug: 129377144
Test: 1) Build blueline-userdebug, flash, and boot.
Test: 2) Build blueline-userdebug with TARGET_FLATTEN_APEX=true, flash,
and boot.
Test: 3) Build aosp_arm-userdebug.
Change-Id: I576f6f20686f6f2121204f76657274696d652121
2019-04-25 09:59:28 +09:00
Jooyung Han
dd57671b44
Merge "Adding vendor_apex_file for /vendor/apex" am: 91c35aeab6
...
am: 37985b73c4
Change-Id: I9df7fa96c38686fb59d244de243fdf6fd01a7494
2019-04-24 16:57:07 -07:00
Jooyung Han
37985b73c4
Merge "Adding vendor_apex_file for /vendor/apex"
...
am: 91c35aeab6
Change-Id: I64f45f0861ce213a464a8900699e906cdde888cb
2019-04-24 16:52:04 -07:00
Treehugger Robot
91c35aeab6
Merge "Adding vendor_apex_file for /vendor/apex"
2019-04-24 23:32:56 +00:00
TreeHugger Robot
5f30c238ec
Merge "Allow signals to power/thermal HAL from dumpstate" into qt-dev
2019-04-24 20:18:26 +00:00
Winson Chiu
8ef4d78fbb
Merge "Allow idmap1 to read vmdl*.tmp APK install files" am: e4af840db6
...
am: 8d18a3bd51
Change-Id: I968d485072128b4f3263e26f068b8ffa889279b1
2019-04-24 13:16:21 -07:00
Winson Chiu
8d18a3bd51
Merge "Allow idmap1 to read vmdl*.tmp APK install files"
...
am: e4af840db6
Change-Id: I568001cc07d9aa8079ceb665d3d1695d0fcb3302
2019-04-24 13:06:16 -07:00
Treehugger Robot
e4af840db6
Merge "Allow idmap1 to read vmdl*.tmp APK install files"
2019-04-24 19:56:48 +00:00
TreeHugger Robot
58a9b10bb2
Merge "Add new surfaceflinger ro props" into qt-dev
2019-04-24 19:55:07 +00:00
Jooyung Han
ea61d198f2
Adding vendor_apex_file for /vendor/apex
...
apexd needs to read /vendor/apex dir and files in it.
Bug: 131190070
Bug: 123378252
Test: 1. Add apex to /vendor/apex
-> see if boot succeeds with new policy
2. Add flattened apex to /vendor/apex
-> see if only root files are labelled as vendor_apex_file
Change-Id: I37795ab6d659ac82639ba5e34d628fe1b5cdb350
2019-04-25 02:54:14 +09:00
Winson Chiu
7e7291a763
Allow idmap1 to read vmdl*.tmp APK install files
...
When upgrading a package, PackageParser acts on the temporary
APK file copied from the install location. This is passed to
idmap, which doesn't have read access because it's missing an
SELinux rule.
This is needed to fix a bug with manifest overlaying on updating
an app, a feature kept alive for Q.
Relevant logs when updating a target:
[ 550.068083] type=1400 audit(1556124408.583:3812): avc: denied { read } for comm="idmap" name="base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.090115] type=1400 audit(1556124408.583:3812): avc: denied { read } for comm="idmap" name="base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.092064] type=1400 audit(1556124408.603:3813): avc: denied { open } for comm="idmap" path="/data/app/vmdl1238645679.tmp/base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.096202] type=1400 audit(1556124408.603:3813): avc: denied { open } for comm="idmap" path="/data/app/vmdl1238645679.tmp/base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.098459] type=1400 audit(1556124408.613:3814): avc: denied { map } for comm="idmap" path="/data/app/vmdl1238645679.tmp/base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.101640] type=1400 audit(1556124408.613:3814): avc: denied { map } for comm="idmap" path="/data/app/vmdl1238645679.tmp/base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
[ 550.104239] type=1400 audit(1556124408.613:3815): avc: denied { getattr } for comm="idmap" path="/data/app/vmdl1238645679.tmp/base.apk" dev="vdc" ino=8770 scontext=u:r:idmap:s0 tcontext=u:object_r:apk_tmp_file:s0 tclass=file permissive=1
Bug: 130559507
Test: manual adb push /system/product/app/TestApp.apk with
/system/product/overlay/TestOverlay.apk enabling disabled launcher
Activity in TestApp; adb install -r TestApp.apk keeps enabled state
with changes
Change-Id: Ieeb7fb4f79ae091d0febf42ca358e7ffdfa6c3ff
2019-04-24 16:48:06 +00:00
Ryan Mitchell
d46c32894d
Merge "Allow zygote to scan static overlays on /oem" into qt-dev
...
am: 5e967d8780
Change-Id: I440e80b6499d12e062c1b7283eb7243475be86a2
2019-04-24 05:08:18 -07:00
TreeHugger Robot
5e967d8780
Merge "Allow zygote to scan static overlays on /oem" into qt-dev
2019-04-24 08:33:39 +00:00
Wei Wang
309aeabccb
Merge "Allow signals to power/thermal HAL from dumpstate" am: e556d33294
...
am: ffd8b90b6e
Change-Id: I3fe3ffe5f9f8ccd14443d38fec902f2ba9e879d4
2019-04-23 23:57:23 -07:00
Wei Wang
ffd8b90b6e
Merge "Allow signals to power/thermal HAL from dumpstate"
...
am: e556d33294
Change-Id: I99ed39a334f5ac4c4949c6df9b72b1678c110045
2019-04-23 23:52:20 -07:00
Sudheer Shanka
29b537127e
Merge "Remove obsolete denials tracking." am: a3c532295b
...
am: efc03d8ef8
Change-Id: I48a4260b0226caa7b3d3181f37f53194a009a51a
2019-04-23 23:47:22 -07:00
Treehugger Robot
e556d33294
Merge "Allow signals to power/thermal HAL from dumpstate"
2019-04-24 06:39:24 +00:00
Sudheer Shanka
efc03d8ef8
Merge "Remove obsolete denials tracking."
...
am: a3c532295b
Change-Id: I927c40141487aa1a651fb910bcdecbeed2d616a9
2019-04-23 23:37:14 -07:00
Treehugger Robot
a3c532295b
Merge "Remove obsolete denials tracking."
2019-04-24 06:30:23 +00:00
Bowgo Tsai
fc98d153c9
[automerger skipped] Merge "Fix denial of /debug_ramdisk/adb_debug.prop" into qt-dev
...
am: e28daa6172
-s ours
am skip reason: change_id I6dd356de989d597828a6e04846b793d611c477fa with SHA1 5a234338c1
is in history
Change-Id: Iee5b73ca1b9b60d28f45b5a2bf1e5d229050dd8b
2019-04-23 19:58:18 -07:00
TreeHugger Robot
e28daa6172
Merge "Fix denial of /debug_ramdisk/adb_debug.prop" into qt-dev
2019-04-24 02:47:19 +00:00
Jack Yu
58329f6536
Add sepolicy for nfc hal v1.2
...
Bug: 130509605
Test: No avc denial log and NFC works with hal v1.2
Change-Id: If54884f76a32705d11f2085f66fe83b9e0354f79
Merged-In: If54884f76a32705d11f2085f66fe83b9e0354f79
(cherry picked from commit a5dde796b5
)
2019-04-24 09:58:44 +08:00
Bowgo Tsai
62fb037476
Fix denial of /debug_ramdisk/adb_debug.prop
...
This CL fix the following SELinux denial, by allowing init to getatter
for tmpfs:file.
audit: type=1400 audit(15464939.926:4): avc: denied { getattr } for
pid=1 comm="init" path="/debug_ramdisk/adb_debug.prop" dev="tmpfs"
ino=25480 scontext=u:r:init:s0 tcontext=u:object_r:tmpfs:s0 tclass=file
permissive=0
Note: the current sepolicy (before this change) has the following rules
for tmpfs:file:
$ sesearch --allow -t tmpfs -c file $OUT/vendor/etc/selinux/precompiled_sepolicy
allow dex2oat tmpfs:file { read map getattr };
allow init tmpfs:file { read unlink open setattr };
allow postinstall_dexopt tmpfs:file read;
allow profman tmpfs:file { read map };
allow vendor_init tmpfs:file { read map open setattr };
Bug: 126493225
Test: boot a device with debug ramdisk, checks related files are loaded
Change-Id: I6dd356de989d597828a6e04846b793d611c477fa
Merged-In: I6dd356de989d597828a6e04846b793d611c477fa
(cherry picked from commit 5a234338c1
)
2019-04-23 23:13:43 +00:00
Tao Bao
60d7c03c0a
Merge "Move ro.build.ab_update to vendor property." am: 2952a20565
...
am: 8ee8407cf6
Change-Id: I516073d28bfd8dc84efe833376fe646b4b818d7d
2019-04-23 15:34:52 -07:00
Tao Bao
8ee8407cf6
Merge "Move ro.build.ab_update to vendor property."
...
am: 2952a20565
Change-Id: Id5a07f238de66b561e83d8f0e4cd1f68053b8a89
2019-04-23 15:29:51 -07:00
Tri Vo
030c8b6127
[automerger skipped] Merge "Treble-ize sepolicy for fwk HIDL services." into qt-dev
...
am: 0b0f1cf708
-s ours
am skip reason: change_id I6e87b236bdbdd939fca51fb7255e97635118ed2d with SHA1 1d34b8cc31
is in history
Change-Id: I85e4c7924316c1a2d8c9e79fb06a4e3f9e5d5911
2019-04-23 15:23:23 -07:00
Chenbo Feng
f8ad3ca9fe
[automerger skipped] Merge "Move pf_key socket creation permission to netd" into qt-dev
...
am: 847149180c
-s ours
am skip reason: change_id Id5ca86aa4610e37a2752709ed9cfd4536ea3bfaf with SHA1 3bf0e82198
is in history
Change-Id: I9945e70593282a76c4239692604098b777e3204b
2019-04-23 15:20:46 -07:00
Tao Bao
2952a20565
Merge "Move ro.build.ab_update to vendor property."
2019-04-23 22:16:48 +00:00
Chenbo Feng
112be37442
[automerger skipped] Move pf_key socket creation permission to netd
...
am: 3bf0e82198
-s ours
am skip reason: change_id Id5ca86aa4610e37a2752709ed9cfd4536ea3bfaf with SHA1 8a5539b5f0
is in history
Change-Id: I2382eeb0fed05eee0d55370b467fab6d302f26fa
2019-04-23 15:15:16 -07:00
Tri Vo
0b0f1cf708
Merge "Treble-ize sepolicy for fwk HIDL services." into qt-dev
2019-04-23 22:10:50 +00:00
TreeHugger Robot
847149180c
Merge "Move pf_key socket creation permission to netd" into qt-dev
2019-04-23 21:57:09 +00:00
Wei Wang
addfe4679d
Allow signals to power/thermal HAL from dumpstate
...
Bug: 129711808
Test: Take BR
Change-Id: Ibcb03698a6e2966f4913ddb6e674502bce4df235
2019-04-23 14:22:41 -07:00
Wei Wang
76d93f0ce8
Allow signals to power/thermal HAL from dumpstate
...
Bug: 129711808
Test: Take BR
Change-Id: Ibcb03698a6e2966f4913ddb6e674502bce4df235
2019-04-23 14:21:03 -07:00
Ady Abraham
ff9d4bdd63
Add new surfaceflinger ro props
...
add the new ro properties added to surfaceflinger:
ro.surface_flinger.set_idle_timer_ms
ro.surface_flinger.use_smart_90_for_video
Bug: 131054357
Test: Boot with SELinux enforcing
Change-Id: I887b318a95db200280344a11fcf7deaadafdeca9
2019-04-23 14:17:32 -07:00
Mikhail Naganov
374c044e58
Merge "Allow mediaserver to find "audio" service" am: 1c3b84b00d
...
am: 7660bb4514
Change-Id: Ia80581d495d38908450d029843ab871ff8071675
2019-04-23 10:47:22 -07:00
Bowgo Tsai
9c81edf05f
[automerger skipped] Adding userdebug_plat_sepolicy.cil
...
am: f89ea09308
-s ours
am skip reason: change_id I9df514054a86d63449b3ebfd1afdee2aee649418 with SHA1 e763667ee1
is in history
Change-Id: I7ceb14d9f3f487fe758e725baa541e5dd8d7101d
2019-04-23 10:34:30 -07:00
Bowgo Tsai
d7959076b9
Merge "Fix denial of /debug_ramdisk/adb_debug.prop" am: 98fcefb276
...
am: 65c01163ba
Change-Id: Ie7b5536f2cfa997e8fb34ccb407393da56f959d3
2019-04-23 10:13:58 -07:00