Commit graph

28234 commits

Author SHA1 Message Date
Jackal Guo
32fbfbc016 Revert "Make default_prop only readable from coredomain"
This reverts commit 082ced1951.

Reason for revert: b/176784961

Change-Id: Ia85667216d63084e9e23aefe1d3bfd7942d51a2a
2021-01-05 08:47:57 +00:00
Inseob Kim
082ced1951 Make default_prop only readable from coredomain
default_prop has been readable from coredomain and appdomain. It's too
broad, because default_prop is a context for properties which don't have
matching property_contexts entries.

From now on, only coredomain can read default_prop. It's still broad,
but at least random apps can't read default_prop anymore.

Bug: 170590987
Test: SELinux denial boot test for internal devices
Change-Id: Ieed7e60d7e4448705c70e4f1725b2290e4fbcb4a
2020-12-14 16:58:23 +09:00
Treehugger Robot
ba862cdeb6 Merge "Add com.android.virt" 2020-12-13 23:42:59 +00:00
Shawn Willden
b41f4985a9 Revert^2 "Move keymint to android.hardware.security."
16d61d0383


Bug: 175345910
Bug: 171429297
Exempt-From-Owner-Approval: re-landing topic with no changes in this CL.
Change-Id: I1352c6b46b007dba3448b3c9cbdf454d7862a176
2020-12-11 20:36:53 +00:00
Mohammad Islam
7a3be4d80e Merge "Allow priv_app read access to /data/app-staging directory" 2020-12-11 20:01:02 +00:00
Treehugger Robot
b4e7838a0b Merge "Untrusted_app: audit NETLINK_ROUTE bind and RTM_GETLINK" 2020-12-11 19:20:09 +00:00
Jeff Vander Stoep
2eaa33d95e Untrusted_app: audit NETLINK_ROUTE bind and RTM_GETLINK
Test: build
Bug: 170188668
Bug: 170214442
Change-Id: I79384318ad4031b4bf14ae243e41f01469288e55
2020-12-11 14:10:19 +01:00
Orion Hodson
c06806771d Merge "Revert "Move keymint to android.hardware.security."" 2020-12-11 12:29:46 +00:00
Gavin Corkery
700b58be6c Merge "Add file contexts for com.android.scheduling" 2020-12-11 11:04:18 +00:00
Orion Hodson
16d61d0383 Revert "Move keymint to android.hardware.security."
Revert submission 1522123-move_keymint

Reason for revert: Build breakage
Bug: 175345910
Bug: 171429297
Reverted Changes:
Ief0e9884a:Keystore 2.0: Move keymint spec to security namesp...
Idb54e8846:Keystore 2.0: Move keymint spec to security namesp...
I9f70db0e4:Remove references to keymint1
I2b4ce3349:Keystore 2.0 SPI: Move keymint spec to security na...
I2498073aa:Move keymint to android.hardware.security.
I098711e7d:Move keymint to android.hardware.security.
I3ec8d70fe:Configure CF to start KeyMint service by default.
Icbb373c50:Move keymint to android.hardware.security.
I86bccf40e:Move keymint to android.hardware.security.

Change-Id: Ib5591c2379bbd2fd6dde0558ba0e68f39d27fbaf
2020-12-11 10:45:43 +00:00
Jiyong Park
c99eb585c9 Add com.android.virt
com.android.virt is an APEX for virtual machine monitors like crosvm.
The APEX currently empty and isn't updatable.

Bug: 174633082
Test: m com.android.virt

Change-Id: I8acc8e147aadb1701dc65f6950b61701131f89d2
2020-12-11 16:22:25 +09:00
Mohammad Samiul Islam
a45cddae5e Allow priv_app read access to /data/app-staging directory
During staged installation, we no longer create duplicate sessions for
verification purpose. Instead, we send the original files in
/data/app-staging folder to package verifiers for verification. That
means, Phonesky needs access to /data/app-staging folder to be able to
verify the apks inside it.

Bug: 175163376
Test: atest StagedInstallTest#testPlayStoreCanReadAppStagingDir
Test: atest StagedInstallTest#testAppStagingFolderCannotBeReadByNonPrivApps
Change-Id: I5cbb4c8b7dceb63954c747180b39b4a21d2463af
2020-12-10 23:46:15 +00:00
Shawn Willden
feaa06f90e Merge "Move keymint to android.hardware.security." 2020-12-10 22:49:14 +00:00
Selene Huang
2c3bdb28de Move keymint to android.hardware.security.
Test: VtsAidlKeyMintTargetTest
Change-Id: I098711e7ddbcac0fc761801a1bf582a71a8f9baa
2020-12-10 19:12:29 +00:00
Songchun Fan
a3c0b3f447 system_app: remove unnecessary changes to neverallow
Follow-up for aosp/1520729. These are no longer needed.

Test: build
BUG: 175121264
Change-Id: I7f01d4d4cee18751f4321ef8efa68f9faae06d4f
2020-12-10 19:03:25 +00:00
Gavin Corkery
a1bd4fc620 Add file contexts for com.android.scheduling
Test: Build and flash
Bug: 161353402
Change-Id: I0e897dae34650022dc36cd95bc8519339d615bf8
2020-12-10 14:55:22 +00:00
Treehugger Robot
c0d1040d58 Merge "Export ro.vendor.product.cpu.abilist*" 2020-12-10 09:01:40 +00:00
Xin Li
0777adef5e DO NOT MERGE - Merge Android R QPR1
Bug: 172690556
Merged-In: Ibc15a90266d1f30174d6590a157571507e8ee31a
Change-Id: I279c3cc3cfcf8e6c28b3cddf98fee6e47f4b46a5
2020-12-09 17:44:05 -08:00
Chong Zhang
2cbfd01949 add mediatranscoding to apex file context am: 9aed64920f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1522099

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ibc15a90266d1f30174d6590a157571507e8ee31a
2020-12-10 01:01:17 +00:00
Chong Zhang
9aed64920f add mediatranscoding to apex file context
bug: 159172726
Change-Id: I8fbedab2605167af637108d5f564abf6c78c32bd
2020-12-09 14:26:14 -08:00
Treehugger Robot
66ed360b5e Merge "Update 30.0 prebuilts to latest rvc-dev policy" am: 34d974838e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1521437

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I49504f4d757ff4449cf7940f743687d2b2a86e84
2020-12-09 16:45:03 +00:00
Treehugger Robot
34d974838e Merge "Update 30.0 prebuilts to latest rvc-dev policy" 2020-12-09 16:09:12 +00:00
Treehugger Robot
60e32df155 Merge "Allow PermissonController to find app_api_service and system_api_service." am: a56c9eb016
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1519814

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I45dad0c44cdcf3d0cdd7e41bf5414d98db651610
2020-12-09 15:55:28 +00:00
Treehugger Robot
a56c9eb016 Merge "Allow PermissonController to find app_api_service and system_api_service." 2020-12-09 15:25:42 +00:00
Treehugger Robot
a801411fef Merge "drmserver: audit permissions for /data/app" am: 951fc0b044
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1520730

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I86000c02ee3aad36710db934e046a022e1dd2e52
2020-12-09 13:12:16 +00:00
Treehugger Robot
951fc0b044 Merge "drmserver: audit permissions for /data/app" 2020-12-09 12:38:06 +00:00
Inseob Kim
3b8b4251b7 Update 30.0 prebuilts to latest rvc-dev policy
For whatever reason, system/sepolicy/prebuilts/api/30.0 and rvc-dev's
system/sepolicy differ a little. This makes 30.0 prebuilts up-to-date
and also updates plat_pub_versioned.cil, built from aosp_arm64-eng
target on rvc-dev branch.

Bug: 168159977
Test: m selinux_policy
Change-Id: I03e8a40bf021966c32f0926972cc2a483458ce5b
2020-12-09 20:44:38 +09:00
Treehugger Robot
56d552af6d Merge "system_app: remove adb data loader permissions" am: db87cdf6a8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1520729

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I24c9712f07b70e9ecadfc0e4ff46a92157a86938
2020-12-09 11:25:06 +00:00
Hai Zhang
86e10ef55d Allow PermissonController to find app_api_service and system_api_service.
PermissionController is updatable, so we may need to call new APIs in newer versions.

Change-Id: I0a6657ad1f27e1e2fdc320184268966009d3a4fc
2020-12-09 11:10:06 +00:00
Treehugger Robot
db87cdf6a8 Merge "system_app: remove adb data loader permissions" 2020-12-09 10:36:14 +00:00
Jeff Vander Stoep
5e6d60a2a5 drmserver: audit permissions for /data/app
We would like to assert that only PackageManager can make
modifications to /data/app. However, I first need to remove
some existing permissions that seem like they are no longer
used (as per jtinker@). Add audit statements to confirm.

Test: build
Change-Id: Ie5ec5199f7e2f862c4d16d8c86b9b0db6fbe481c
2020-12-09 09:16:51 +01:00
Jeff Vander Stoep
07aee66679 system_app: remove adb data loader permissions
Per schfan@ these are no longer needed.

Test: build
Change-Id: Idda1d9775fdd38cbd53c3652b567ddfc5beca0a6
2020-12-09 08:58:23 +01:00
Christian Wailes
06e163b290 Merge "Added permissions for new dexopt flags." am: 93e6997181
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1480337

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I882363b3cf293f5bac811e5d6b2c914935b6031a
2020-12-09 01:22:52 +00:00
Christian Wailes
93e6997181 Merge "Added permissions for new dexopt flags." 2020-12-09 00:00:26 +00:00
Maciej Żenczykowski
afd4d49733 Allow network_stack to synchronize the kernel rcu am: 5a7e49e525
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516277

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I19840b4bafacb69561cec658b5a076988e4c4dc7
2020-12-08 22:47:33 +00:00
Maciej Żenczykowski
5a7e49e525 Allow network_stack to synchronize the kernel rcu
via opening/closing a PF_KEY socket (this mirrors netd's privs)

Bug: 173167302
Test: m
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ia2c2cb52c4ec9149db29dc86a7927e3432bd2b9b
2020-12-08 14:49:20 +00:00
Adam Shih
9c9386d68d never allow untrusted apps accessing debugfs_tracing am: 2543715187
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1513758

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I28a14b4f551938725684dcd1153c48fc67d3da53
2020-12-08 02:26:32 +00:00
Chris Wailes
4540efcf73 Added permissions for new dexopt flags.
Bug: 173137187
Test: build
Merged-In: Iad1d23277915e1dbf655b0f2820320f15462ab33
Change-Id: Iad1d23277915e1dbf655b0f2820320f15462ab33
2020-12-07 16:15:24 -08:00
Adam Shih
2543715187 never allow untrusted apps accessing debugfs_tracing
debugfs_tracing can only be accessed by tracing tools provided by the
platform.

Bug: 172028429
Test: boot with no relevant log showing up
Change-Id: I412dd51a1b268061c5a972488b8bc4a0ee456601
2020-12-07 16:33:59 +08:00
Hai Zhang
6ac5499355 Add SELinux policy for legacy permission service. am: 04db97a72d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1518957

Change-Id: I049bf9c591c539f698ba4cf7a172a2b7a0439ea4
2020-12-06 01:12:29 +00:00
Hai Zhang
04db97a72d Add SELinux policy for legacy permission service.
The updatable and non-updatable permission manager cannot share one
AIDL, so we need to create a new system service for the non-updatable
legacy one, and add the SELinux policy for it.

Bug: 158736025
Test: presubmit
Change-Id: Ief8da6335e5bfb17d915d707cf48f4a43332f6ae
2020-12-04 14:43:33 -08:00
Dmitri Plotnikov
682fa8c22b Merge "Add sched_process_free to debugfs_tracing label" am: 5d23015a3d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1517343

Change-Id: I13e85a4ccc056e0d1aca0c7d9f2afbeff03b1ea5
2020-12-04 19:20:05 +00:00
Dmitri Plotnikov
5d23015a3d Merge "Add sched_process_free to debugfs_tracing label" 2020-12-04 18:05:11 +00:00
Jonglin Lee
8ef765aa93 Merge "Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"" am: 7ce5e714e5
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516549

Change-Id: Id114a507f1c9ad1059c39ce4121d7330e72fe14c
2020-12-04 05:09:02 +00:00
Jonglin Lee
7ce5e714e5 Merge "Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"" 2020-12-04 04:47:39 +00:00
Jonglin Lee
51c04ac27b Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"
Revert submission 1511692-cgroup v2 uid/pid hierarchy

Reason for revert: Causing intermittent cgroup kernel panics
Reverted Changes:
I80c2a069b:sepolicy: rules for uid/pid cgroups v2 hierarchy
I73f3e767d:libprocessgroup: uid/pid hierarchy for cgroup v2

Bug: 174776875
Change-Id: I63a03bb43d87c9aa564b1436a45fd5ec023aac87
Test: Locally reverted and booted 100 times without kernel panic
2020-12-04 03:12:59 +00:00
Kevin Chyn
83418f088b Merge "Add SEPolicy for fingerprint2.2 example HAL" am: 9e8896ee4b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516278

Change-Id: I8f23e1a57418999cc3156a5f37057febebf3f203
2020-12-04 01:24:03 +00:00
Kevin Chyn
9e8896ee4b Merge "Add SEPolicy for fingerprint2.2 example HAL" 2020-12-04 01:17:07 +00:00
Kiyoung Kim
39afa48eab Merge "Support linkerconfig in Runtime APEX" am: 34395349f8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1512755

Change-Id: Icfe8b0ddf01d345b23b51004a3bb4911b5b3f3fa
2020-12-04 01:12:26 +00:00
Kiyoung Kim
34395349f8 Merge "Support linkerconfig in Runtime APEX" 2020-12-04 01:00:06 +00:00