Commit graph

22566 commits

Author SHA1 Message Date
Anton Hansson
e822545909 Add sepolicy for sdkext module prop
Add a domain for derive_sdk which is allowed to set
persist.com.android.sdkext.sdk_info, readable by all
apps (but should only be read by the BCP).

Bug: 137191822
Test: run derive_sdk, getprop persist.com.android.sdkext.sdk_info
Change-Id: I389116f45faad11fa5baa8d617dda30fb9acec7a
2019-12-05 14:11:50 +00:00
Song Pan
8be46bf2e0 Add sepolicy for AppIntegrityService.
CL that adds the service: http://ag/9554748

BUG:145674997
Test: Manually flash the device. Without this change, the devices goes into a
bootloop (http://gpaste/5033431010377728) if I uncommit the guard in
http://ag/c/platform/frameworks/base/+/9652133/21/services/core/java/com/android/server/integrity/AppIntegrityManagerService.java

Change-Id: Ib2daf9191900d94abeae207e18a77a5914d14783
2019-12-05 12:22:51 +00:00
Luke Huang
13ed58b6eb Add file_contexts for apex com.android.cronet
Bug: 139397529
Bug: 143926783
Test: build
Change-Id: Ic39f88b4f4d22ea3953cb27a72f5f20a74672bd3
2019-12-05 16:58:36 +08:00
Jooyung Han
870c448ace Merge "Allow system_server to read/open apex_mnt_dir" 2019-12-05 08:55:31 +00:00
Kiyoung Kim
00cf2fbe50 Move linker config under /linkerconfig
Currently linker config locates under /dev, but this makes some problem
in case of using two system partitions using chroot. To match system
image and configuration, linker config better stays under /linkerconfig

Bug: 144966380
Test: m -j passed && tested from cuttlefish
Change-Id: Iea67663442888c410f29f8dd0c44fe49e3fcef94
2019-12-05 12:42:29 +09:00
Jooyung Han
41870be726 Allow system_server to read/open apex_mnt_dir
PackageManager tries to scan /apex (apex_mnt_dir) for flattened apexes.

Previously, because /apex was blindly bind-mounted to /system/apex for
"flattened" apexes, the label for /apex is the same as /system/apex,
which is oaky for system_server to handle it.

But to support flattened apexes from other partitions such as /vendor or
/system_ext, every apex should be mounted under /apex individually,
which leaves the se-label of /apex unchanged (apex_mnt_dir).

Bug: 144732372
Test: boot with flattened apexes
      see if there are errors "denied system_server with apex_mnt_dir"
Change-Id: I81bd6ab152770c3c569b22274a6caa026615303e
2019-12-05 08:26:26 +09:00
chrisweir
cd40aa0ab7 Modify SEPolicy to support SLCAN
SLCAN setup requires certain ioctls and read/write operations to
certain tty's. This change allows the HAL to set up SLCAN devices while
complying with SEPolicy.

In addition to adding support for SLCAN, I've also included permissions
for using setsockopt. In order for the CAN HAL receive error frames from
the CAN bus controller, we need to first set the error mask and filter
via setsockopt.

Test: manual
Bug: 144458917
Bug: 144513919
Change-Id: I63a48ad6677a22f05d50d665a81868011c027898
2019-12-04 14:06:09 -08:00
Mathieu Chartier
60d75c2b04 Merge "Allow iorapd to access the runtime native boot feature flag properties" 2019-12-04 22:01:29 +00:00
Mathieu Chartier
7bc626ae42 Allow iorapd to access the runtime native boot feature flag properties
Test: adb shell device_config put runtime_native_boot iorap_perfetto_enable true
Test: inspect lodcat to validate

Bug: 141377208
Change-Id: Iaef1197decff37512f107774ea0f0f09a4dcd72d
2019-12-04 20:56:54 +00:00
Jaegeuk Kim
a47abdbe16 block: allow init.rc to tune max discard size
Init.rc requires to limit max discard to avoid long latencies.

Change-Id: Idf3b295ac15efd5edf979ca896fdf826b9fc3c99
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
2019-12-04 12:26:19 -08:00
Yan Yan
fe55f30397 Merge "Make ipsec file_contexts as "android:path" property" 2019-12-04 02:07:34 +00:00
Treehugger Robot
54072d9a73 Merge "Fix vendor defining macros and neverallows" 2019-12-04 01:12:15 +00:00
Hangyu Kuang
4c1e76adcb Merge "MediaTranscodingService: Add sepolicy for MediaTranscodingService." 2019-12-03 23:55:20 +00:00
Treehugger Robot
53e3983923 Merge "Audit binder_call rule for priv_app in update_engine.te" 2019-12-03 23:46:56 +00:00
Treehugger Robot
92e540c978 Merge "Merge Android10 QPR1 into AOSP master" 2019-12-03 23:15:00 +00:00
Ashwini Oruganti
c116142d2e Audit binder_call rule for priv_app in update_engine.te
We've moved GMS core to its own domain, and this permission should no
longer be applied to the broader priv_app domain.

Before we delete the rule, we are auditing it to see if any other
privapps need it.

Bug: 142672293
Test: TH
Change-Id: I29c29739f4c3caf5d24361b69adc584047da0ef0
2019-12-03 14:02:57 -08:00
Jeff Sharkey
8d287db808 Structure MediaProvider as an APEX.
Based on guidance from the Mainline team, we're placing the
MediaProvider APK inside a new APEX, as this will allow us to
move MediaStore.java inside the module boundary in a future CL.

Bug: 144247087
Test: manual
Change-Id: I88f6f2e598d9611e8b92143504e4328d93671cab
2019-12-03 13:35:46 -07:00
Treehugger Robot
f651f6efc6 Merge "Allow update_engine to call gmscore_app" 2019-12-03 20:27:51 +00:00
Ashwini Oruganti
ae7297b7da Allow update_engine to call gmscore_app
We need this permission now that GMS core runs in its own domain and not
in the priv_app domain.

Bug: 145379440
Bug: 142672293
Test: TH
Change-Id: Idc4bf6863ba767d287c218c07d0eb5aebbe50f91
2019-12-03 11:13:51 -08:00
Victor Hsieh
8b65b0b12d sepolicy: allow rules for apk verify system property
ro.apk_verity.mode was introduced in P on crosshatch. This change
changes the label from default_prop to a new property, apk_verity_prop.

ro.apk_verity.mode is set by vendor_init per build.prop, in order to
honor Treble split.  It is also read by system_server and installd
currently.

Test: verify functioning without denials in dmesg
Bug: 142494008
Bug: 144164497
Change-Id: I1f24513d79237091cf30025bb7ca63282e23c739
2019-12-03 10:09:35 -08:00
Inseob Kim
b4baf73477 Fix vendor defining macros and neverallows
init and dumpstate should be able to access all properties, but they are
in coredomain, so neverallow rules for vendor properties should be
changed in order to avoid conflicts.

Bug: 145339613
Test: add vendor_internal_prop manually and build.
Change-Id: If582870f855e4444f8ac0d091696c0c7fd833791
2019-12-03 18:42:12 +09:00
Xin Li
914bd86d0e Merge Android10 QPR1 into AOSP master
Bug: 145570283
Change-Id: Ie78ec6d7b9300593c9ac370d7dd801ba3f7e0e97
2019-12-02 21:25:28 -08:00
Hangyu Kuang
ee3a8ea798 MediaTranscodingService: Add sepolicy for MediaTranscodingService.
Bug:145233472
Test: Build and flash the phone.
"adb shell dumpsys -l | grep media" shows media.transcoding service.

Change-Id: I48a42e7b595754989c92a8469eb91360ab6db7c6
2019-12-02 13:57:28 -08:00
Stan Rokita
193dfaeca0 Merge "Add sensors multihal support in file_contexts regex"
am: d494872641

Change-Id: I8a297a051ad05023aa985e005ce0b67cd8ffcaf2
2019-12-02 13:39:35 -08:00
Stan Rokita
d494872641 Merge "Add sensors multihal support in file_contexts regex" 2019-12-02 20:54:57 +00:00
Ashwini Oruganti
807fe543e5 Don't run vzwomatrigger_app in permissive mode
am: b7c81c04c0

Change-Id: I7cf647863753a4dcf7ffea1d5e8af3edf618d5d6
2019-12-02 11:35:26 -08:00
Ashwini Oruganti
b7c81c04c0 Don't run vzwomatrigger_app in permissive mode
This change enforces all the defined rules for the vzwomatrigger_app
domain and unsets permissive mode. There have not been any new denials
in the past weeks for this domain (source: go/sedenials), and hence this
domain appears to not need any new permissions.

Bug: 142672293
Test: Green builds
Change-Id: I588b4e3038a3e8188d97183a592f9023a95dd3a8
2019-12-02 09:41:54 -08:00
Anton Hansson
03683c2295 Merge "Add sepolicy for com.android.sdkext module"
am: 243797950e

Change-Id: I4b2e2bcf04a7e42e27b6a9e6cceae205dddf2ddb
2019-12-02 09:19:22 -08:00
Anton Hansson
243797950e Merge "Add sepolicy for com.android.sdkext module" 2019-12-02 17:09:16 +00:00
Anton Hansson
fd25d49569 Add sepolicy for com.android.sdkext module
Bug: 137191822
Test: m com.android.sdkext
Change-Id: Ia5fb99af7fad43ce4321b1c6611ab54340a87589
2019-12-02 14:13:41 +00:00
Jeff Vander Stoep
ae2bb0dd40 gmscore_app: add bug map
am: a213e0c3c5

Change-Id: I973b2a61960faf96fc12da7ecf197386866f4aa6
2019-12-02 06:04:24 -08:00
Jeff Vander Stoep
a213e0c3c5 gmscore_app: add bug map
De-flake tests.

Test: build
Bug: 145267097
Change-Id: I7c21229d8577ffb9283a94290b3cfe575868d348
2019-12-02 13:42:11 +01:00
Mark Chien
9dfaa7dcc6 [Tether15] Allow system app to find TetheringManager
Bug: 144320246
Test: -build, flash, boot
      -OFF/ON hotspot

Change-Id: I8ce7ac5eb8198f0df4a2da426e3c56e8915e746a
2019-12-02 18:01:33 +08:00
Mark Chien
946f1bf87b Merge "[Tether18] Add file_contexts for com.android.tethering.apex"
am: 9bf53d557d

Change-Id: I677f6bd93bd5fa099eba2c1fc705364ce94ccb9f
2019-12-01 20:20:30 -08:00
Mark Chien
9bf53d557d Merge "[Tether18] Add file_contexts for com.android.tethering.apex" 2019-12-02 04:11:35 +00:00
Hsin-Yi Chen
26f34a497b Set odm and vendor build.version.incremental to be publicly readable
VTS and CTS-on-GSI report the device's ro.odm.build.version.incremental
or ro.vendor.build.version.incremental. The properties need to be
readable without root privilege.

Test: adb shell getprop ro.odm.build.version.incremental
Bug: 145255132
Change-Id: Ibb71185888cce022cb3a9be3e6fb2199d5f438d9
2019-11-28 08:41:37 +00:00
Mark Chien
646864216f [Tether18] Add file_contexts for com.android.tethering.apex
Bug: 144320626
Test: build

Change-Id: I6b5c079a917524bf4f1ad3f89b1f44708f0d6ed7
2019-11-28 14:53:58 +08:00
Shuo Qian
dea5117ac3 Merge "Setting up SELinux policy for Emergency number database"
am: 584234e8b1

Change-Id: I87aa18467be2a9c38d804629eea38f3c5ebb844c
2019-11-27 12:06:51 -08:00
Shuo Qian
584234e8b1 Merge "Setting up SELinux policy for Emergency number database" 2019-11-27 19:14:50 +00:00
Jeff Vander Stoep
ae3667d6ae Whitelist app->storage denials
am: 99d5970dcf

Change-Id: I93dae16d115d35d2eebb35d8cc98cbf941b11873
2019-11-27 10:49:17 -08:00
evitayan
780185f503 Make ipsec file_contexts as "android:path" property
It follows examples of other APEX to make file_contexts of ipsec
module as "android:path" property

Bug: 143192273
Test: atest ipsec_e2e_tests
Change-Id: Idbba1f964aad7e54077ac77250f9cfd6a6b5049e
2019-11-27 07:00:14 -08:00
Jeff Vander Stoep
99d5970dcf Whitelist app->storage denials
Make presubmit less flaky.

Bug: 145267097
Test: build
Change-Id: Id3e8c636f9ebda0dd07a0dcf5211f4a73bd3e3c2
2019-11-27 15:01:05 +01:00
Harpreet \"Eli\" Sangha
ae8ad79141 Merge "Fix File Context Entry for Bluetooth Services."
am: d6a91453d8

Change-Id: I437f849121d5aa8fdc6f312c92880558af157a74
2019-11-26 20:04:55 -08:00
Treehugger Robot
d6a91453d8 Merge "Fix File Context Entry for Bluetooth Services." 2019-11-27 03:56:40 +00:00
Terry Wang
038b7b664f Merge "Add apex structure to appsearch module."
am: 4a51f6d55d

Change-Id: I4fd1bb01d20d9c684a2437378737b74af0f51fa2
2019-11-26 18:09:34 -08:00
Treehugger Robot
4a51f6d55d Merge "Add apex structure to appsearch module." 2019-11-27 02:04:39 +00:00
Harpreet \"Eli\" Sangha
078689ae03 Fix File Context Entry for Bluetooth Services.
Test: Boot on HiKey960 and check dmesg errors.
Change-Id: I9ac0968753c7cd9a23c63eac98b20a7778277716
Signed-off-by: Harpreet \"Eli\" Sangha <eliptus@google.com>
2019-11-27 10:11:12 +09:00
Roshan Pius
34c69ae8eb Merge changes Ifa33dae9,I69ccc6af,Ibb4db9d9
am: d16a3968f3

Change-Id: Ib57570877f9195b2d54337552e4ee868f7dbc29f
2019-11-26 16:48:07 -08:00
Treehugger Robot
d16a3968f3 Merge changes Ifa33dae9,I69ccc6af,Ibb4db9d9
* changes:
  Revert "sepolicy: Permission changes for new wifi mainline module"
  Revert "wifi_stack: Move to network_stack process"
  Revert "sepolicy(wifi): Allow audio service access from wifi"
2019-11-27 00:41:35 +00:00
Ashwini Oruganti
3d23d9ab9e Merge "Audit GMS core related allow rules in priv_app.te"
am: 63fb238052

Change-Id: I6f3c1e455ade4deb13cde882bcf864ca6ea4f7c5
2019-11-26 15:04:38 -08:00