Commit graph

11750 commits

Author SHA1 Message Date
Josh Gao
2a00056a95 crash_dump_fallback: allow dumpstate:fd use.
Bug: http://b/62297059
Test: mma
Merged-In: Ibcd93e5554a9c2dd75fbfb42294fbc9b96ebc8cc
Change-Id: Ibcd93e5554a9c2dd75fbfb42294fbc9b96ebc8cc
(cherry picked from commit 17885f148d)
2017-06-02 15:04:29 -07:00
Josh Gao
17885f148d crash_dump_fallback: allow dumpstate:fd use.
Bug: http://b/62297059
Test: mma
Change-Id: Ibcd93e5554a9c2dd75fbfb42294fbc9b96ebc8cc
2017-06-02 14:43:27 -07:00
Andrew Scull
f387ecf3ee Merge "Add missing sepolicies for OemLock HAL." into oc-dev am: 60e4fd9dfa
am: 39a81fd517

Change-Id: I0e7a02ff77ef0e6490a481229e042145c9dfb89a
2017-06-01 22:28:59 +00:00
Andrew Scull
69367b3742 Merge "Add missing sepolicies for the Weaver HAL." into oc-dev am: cd26745098
am: e8d4bec783

Change-Id: I14ea238856a8401427b02747ebb2c5750cc5e85f
2017-06-01 22:28:44 +00:00
Andrew Scull
39a81fd517 Merge "Add missing sepolicies for OemLock HAL." into oc-dev
am: 60e4fd9dfa

Change-Id: I1628907aeb743c3cb0938e7993237206523fdeb5
2017-06-01 22:22:03 +00:00
Andrew Scull
e8d4bec783 Merge "Add missing sepolicies for the Weaver HAL." into oc-dev
am: cd26745098

Change-Id: I20479829d542df345275c0c2b4512788a30fba4c
2017-06-01 22:21:48 +00:00
TreeHugger Robot
60e4fd9dfa Merge "Add missing sepolicies for OemLock HAL." into oc-dev 2017-06-01 22:05:18 +00:00
TreeHugger Robot
cd26745098 Merge "Add missing sepolicies for the Weaver HAL." into oc-dev 2017-06-01 22:05:15 +00:00
Neil Fuller
8cb67753d9 resolve merge conflicts of e664e80a to oc-dev-plus-aosp
am: 911e236ae4  -s ours

Change-Id: I0a1cf351e40f81c1ee26bc5b722f99ae4e242b7e
2017-06-01 20:36:09 +00:00
Neil Fuller
911e236ae4 resolve merge conflicts of e664e80a to oc-dev-plus-aosp
Test: I solemnly swear I tested this conflict resolution.
Change-Id: Icadf7c72ad173c134d3e95bb5b93c2b54b1b703e
2017-06-01 20:46:48 +01:00
Steve Muckle
f64e4df3ec Merge "allow modprobe to load signed kernel modules" into oc-dev am: fc1d8d991e
am: 06a4b61b7a

Change-Id: I50d8c90eaba6161e839ceb9fc87a41540e15eead
2017-06-01 19:29:01 +00:00
Steve Muckle
06a4b61b7a Merge "allow modprobe to load signed kernel modules" into oc-dev
am: fc1d8d991e

Change-Id: Id41f7097fd0a48739293d4f8f06f296d0f189684
2017-06-01 19:24:47 +00:00
TreeHugger Robot
fc1d8d991e Merge "allow modprobe to load signed kernel modules" into oc-dev 2017-06-01 19:16:34 +00:00
Andrew Scull
b17b763711 Allow bootctl HAL to access misc block device. am: b0d59450ae
am: 7c4f46b5c1

Change-Id: I88aa64b8847456f66310d632ee86929a76dfaf7b
2017-06-01 18:59:29 +00:00
Andrew Scull
7c4f46b5c1 Allow bootctl HAL to access misc block device.
am: b0d59450ae

Change-Id: If85613b84aecf43b0519bb933d925eb1829e3d5e
2017-06-01 18:39:31 +00:00
Neil Fuller
e664e80a5f Merge "Enable the TimeZoneManagerService" am: 34b4b73729
am: 2ff7562819

Change-Id: I66cf4111e4d17e698cea7c8dc44d3294ce20a4ac
2017-06-01 17:16:45 +00:00
Neil Fuller
2ff7562819 Merge "Enable the TimeZoneManagerService"
am: 34b4b73729

Change-Id: If25147ce3439abd0ab4a3abc1e330b373e43d9cb
2017-06-01 17:11:50 +00:00
Steve Muckle
53add31a25 allow modprobe to load signed kernel modules
Modprobe requires this permission or the following denial will
prevent loading of signed kernel modules:

audit: type=1400 audit(27331649.656:4): avc:  denied  { search } for
pid=448 comm="modprobe" scontext=u:r:modprobe:s0 tcontext=u:r:kernel:s0
tclass=key permissive=0

Bug: 62256697
Test: Verified signed module loading on sailfish.
Change-Id: Idde41d1ab58e760398190d6686665a252f1823bb
2017-06-01 10:06:21 -07:00
Treehugger Robot
34b4b73729 Merge "Enable the TimeZoneManagerService" 2017-06-01 17:02:37 +00:00
Neil Fuller
ca595e1163 Enable the TimeZoneManagerService
Add policy changes to enable a new service. The service
is currently switched off in config, but this change is
needed before it could be enabled.

Bug: 31008728
Test: make droid
Merged-In: I29c4509304978afb2187fe2e7f401144c6c3b4c6
Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
2017-06-01 15:56:43 +00:00
TreeHugger Robot
0a0b6a6033 Merge "Enable the TimeZoneManagerService" 2017-06-01 13:34:01 +00:00
TreeHugger Robot
f137fab58f Merge "Verify correct application of labels and attributes" 2017-05-31 18:57:38 +00:00
Jeff Vander Stoep
0366afdf14 Verify correct application of labels and attributes
With project Treble, we're relying heavily on attributes for
permission inheritance and enforcement of separation between
platform and vendor components.

We neead tests that verify those attributes are correctly applied.
This change adds the framework for those tests including a wrapper
around libsepol for loading and querying policy, and a python module
for running tests on policy and file_contexts.

Included with the testing framework is a test asserting that the
coredomain attribute is only applied to core processes. This
verification is done using the following rules:
1. Domain's entrypoint is on /system - coredomain
2. Domain's entrypoint is on /vendor - not coredomain
3. Domain belongs to a whitelist of known coredomains - coredomain

In a subsequent commit these tests will be applied at build time.
However, I first need to fix existing Treble violations exposed by
this test. These tests will also be applied during CTS.

Test: LD_PRELOAD=$ANDROID_HOST_OUT/lib64/libsepolwrap.so python \
    treble.py -p $OUT/vendor/etc/selinux/precompiled_sepolicy \
    -f $OUT/vendor/etc/selinux/nonplat_file_contexts \
    -f $OUT/system/etc/selinux/plat_file_contexts
Bug: 37008075
Change-Id: I7825f5c2909a5801deaccf2bef2bfd227adb0ae9
2017-05-31 09:14:14 -07:00
Neil Fuller
50889ce0eb Enable the TimeZoneManagerService
Add policy changes to enable a new service. The service
is currently switched off in config, but this change is
needed before it could be enabled.

Bug: 31008728
Test: make droid
Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
2017-05-31 16:18:43 +01:00
Andrew Scull
b0d59450ae Allow bootctl HAL to access misc block device.
This is sometimes used for communication with the bootloader.

Bug: 62052545
Test: Build
Change-Id: I3ae37793407719e55ab0830129aa569c9018f7da
2017-05-31 16:00:28 +01:00
Andrew Scull
475954dad5 Add missing sepolicies for OemLock HAL.
Bug: 38232801
Test: Build

Change-Id: Iccc16430e7502bb317f95bb2a5e2f021d8239a00
2017-05-31 15:22:05 +01:00
Andrew Scull
a939c4324c Add missing sepolicies for the Weaver HAL.
Bug: 38233550
Test: Build
Change-Id: I7c2105d5f215a60a611110640afff25fc3403559
2017-05-31 15:17:11 +01:00
Narayan Kamath
ab41aec85c SEPolicy: Allow app / system_server to write to dumpstate pipes. am: a34781ae15 am: 32c7000e6e am: b25e882338
am: bf7a5bd68b

Change-Id: I13dfde61b2d69ba690fbb6a1bf5aab76f990dbf9
2017-05-31 13:45:22 +00:00
Narayan Kamath
bf7a5bd68b SEPolicy: Allow app / system_server to write to dumpstate pipes. am: a34781ae15 am: 32c7000e6e
am: b25e882338

Change-Id: I778011a48800ace4d865813b148efcdd88d166bb
2017-05-31 13:37:59 +00:00
Narayan Kamath
b25e882338 SEPolicy: Allow app / system_server to write to dumpstate pipes. am: a34781ae15
am: 32c7000e6e

Change-Id: I57d3af7a930f77be74feba88d9875c9b5b90ab7c
2017-05-31 13:33:28 +00:00
Narayan Kamath
32c7000e6e SEPolicy: Allow app / system_server to write to dumpstate pipes.
am: a34781ae15

Change-Id: Ic4103ff418e69f000198bb588f0cfccc578ba324
2017-05-31 13:28:57 +00:00
Narayan Kamath
669117354d Merge "SEPolicy: Changes for new stack dumping scheme." into oc-dev-plus-aosp
am: 6d9f42f073

Change-Id: I1894493c01399348bf0d83679bc119d00acc149e
2017-05-31 11:56:22 +00:00
TreeHugger Robot
6d9f42f073 Merge "SEPolicy: Changes for new stack dumping scheme." into oc-dev-plus-aosp 2017-05-31 11:52:59 +00:00
Narayan Kamath
a34781ae15 SEPolicy: Allow app / system_server to write to dumpstate pipes.
tombstoned allows dumpstate to install "intercepts" to java trace
requests for a given process. When an "intercept" is installed, all
trace output is redirected to a pipe provided by dumpstate instead
of the default location (usually in /data/anr or /data/tombstone).

Note that these processes are already granted "write" and "getattr"
on dumpstate:fifo_file in order to communicate with dumpstate; this
change adds "append" to the existing set of permissions.

Bug: 32064548
Test: manual
Change-Id: Iccbd78c59071252fef318589f3e55ece51a3c64c
2017-05-31 11:45:39 +00:00
Narayan Kamath
f112055f47 SEPolicy: Changes for new stack dumping scheme. am: e628cb5b2d am: 5e8fe8348b am: 51a01817aa -s ours
am: a7d87b94d1  -s ours

Change-Id: I8c2250afc39882dc3ee0b9888e3fb2e1d872cb8a
2017-05-31 10:07:50 +00:00
Narayan Kamath
a7d87b94d1 SEPolicy: Changes for new stack dumping scheme. am: e628cb5b2d am: 5e8fe8348b
am: 51a01817aa  -s ours

Change-Id: I4ecaa2194614148b4b50245e6250bdde02206160
2017-05-31 10:03:18 +00:00
Narayan Kamath
f194aad208 SEPolicy: Changes for new stack dumping scheme.
Applications connect to tombstoned via a unix domain socket and request
an open FD to which they can write their traces. This socket has a new
label (tombstoned_java_trace_socket) and appdomain and system_server are
given permissions to connect and write to it.

Apps no longer need permissions to open files under /data/anr/ and
these permissions will be withdrawn in a future change.

Bug: 32064548
Test: Manual

(cherry picked from commit a8832dabc7f3b7b2381760d2b95f81abf78db709)

(cherry picked from commit 11bfcc1e96)

Change-Id: Icc60d227331c8eee70a9389ff1e7e78772f37e6f
2017-05-31 10:01:48 +00:00
Narayan Kamath
51a01817aa SEPolicy: Changes for new stack dumping scheme. am: e628cb5b2d
am: 5e8fe8348b

Change-Id: Ibfe717b42fc26da2ec7876143b8cf0445a20eaec
2017-05-31 09:39:46 +00:00
Narayan Kamath
5e8fe8348b SEPolicy: Changes for new stack dumping scheme.
am: e628cb5b2d

Change-Id: If2ce6fbf2b897d58da78430a7bae0fd6fb6e5a49
2017-05-31 09:34:15 +00:00
Narayan Kamath
e628cb5b2d SEPolicy: Changes for new stack dumping scheme.
Applications connect to tombstoned via a unix domain socket and request
an open FD to which they can write their traces. This socket has a new
label (tombstoned_java_trace_socket) and appdomain and system_server are
given permissions to connect and write to it.

Apps no longer need permissions to open files under /data/anr/ and
these permissions will be withdrawn in a future change.

Bug: 32064548
Test: Manual

Merged-In: I70a3e6e230268d12b454e849fa88418082269c4f
Change-Id: Ib4b73fc130f4993c44d96c8d68f61b6d9bb2c7d5
2017-05-31 08:54:37 +01:00
Narayan Kamath
3bacfe92fb Merge "SEPolicy: Changes for new stack dumping scheme." 2017-05-31 07:53:52 +00:00
Chad Brubaker
1e3c61c37e Allow ephemeral apps to find media.drm am: d2b3a4543a
am: 19e71b7bea

Change-Id: Ife8931f2543dc6339e16faabef66879c1e184390
2017-05-30 19:38:45 +00:00
Chad Brubaker
19e71b7bea Allow ephemeral apps to find media.drm
am: d2b3a4543a

Change-Id: I1ba8e73e1a004b654bc32dd6520b1e41ec3bc9cf
2017-05-30 19:34:43 +00:00
Chad Brubaker
d2b3a4543a Allow ephemeral apps to find media.drm
Bug: 62102558
Test: see b/62102558
Change-Id: If80d1270bcf6835e6d1a78e2176c3e139cebd174
2017-05-30 10:17:34 -07:00
Narayan Kamath
11bfcc1e96 SEPolicy: Changes for new stack dumping scheme.
Applications connect to tombstoned via a unix domain socket and request
an open FD to which they can write their traces. This socket has a new
label (tombstoned_java_trace_socket) and appdomain and system_server are
given permissions to connect and write to it.

Apps no longer need permissions to open files under /data/anr/ and
these permissions will be withdrawn in a future change.

Bug: 32064548
Test: Manual

(cherry picked from commit a8832dabc7f3b7b2381760d2b95f81abf78db709)

Change-Id: I70a3e6e230268d12b454e849fa88418082269c4f
2017-05-30 18:16:38 +01:00
Ruchi Kandoi
4aa02d1729 Merge "Allows nfc to access vr_manager_service" am: c3f4afefdb am: f23230c88e am: e95974b024
am: cd59148309

Change-Id: If3b128bcc0dbeb043f9476c28334d83912ed53e4
2017-05-27 00:32:52 +00:00
Ruchi Kandoi
cd59148309 Merge "Allows nfc to access vr_manager_service" am: c3f4afefdb am: f23230c88e
am: e95974b024

Change-Id: I29eeb3ec90a67fe4377fe10f0884608a5fa52ea9
2017-05-27 00:19:10 +00:00
Ruchi Kandoi
e95974b024 Merge "Allows nfc to access vr_manager_service" am: c3f4afefdb
am: f23230c88e

Change-Id: I2214556e60abce3bf0801bc01d86e8c481e44c38
2017-05-27 00:17:11 +00:00
Ruchi Kandoi
f23230c88e Merge "Allows nfc to access vr_manager_service"
am: c3f4afefdb

Change-Id: I8810383b62d3c678c289867a0e17732242ee6679
2017-05-27 00:15:11 +00:00
Treehugger Robot
c3f4afefdb Merge "Allows nfc to access vr_manager_service" 2017-05-27 00:10:13 +00:00