Commit graph

29082 commits

Author SHA1 Message Date
Aaron Huang
68e7eaf35d Merge "Add selinux policies for pac_proxy_service" 2021-03-15 11:49:45 +00:00
Alex Hong
01cce002bf Merge "Support the dump of nfc service in incident reports." 2021-03-15 03:32:21 +00:00
Robert Shih
76730064a4 Merge "Allow communication between mediametrics & statsd" 2021-03-12 18:21:34 +00:00
Tim Van Patten
d78fd554a2 Merge "Add ephemeral_app_api_service to game_service SEpolicy" 2021-03-12 17:29:11 +00:00
Robert Shih
d37ba7316c Allow communication between mediametrics & statsd
Bug: 141714243
Test: statsd_testdrive
Change-Id: I75fed754c04e3e031d5600d0487e83099402f814
2021-03-12 04:06:23 -08:00
Lajos Molnar
c0119885d6 Merge "Add media performance class property to sepolicy" 2021-03-12 01:31:08 +00:00
Treehugger Robot
dc94f8343c Merge "fastbootd: allow to fetch vendor_boot partition." 2021-03-11 23:06:30 +00:00
Yifan Hong
cda79266ab fastbootd: allow to fetch vendor_boot partition.
vendor_boot is labeled as boot_block_device. With
fastboot fetch command, fastbootd needs to read
the vendor_boot device and return it to the host.

Test: pass
Bug: 173654501
Change-Id: I197e39c9e7572dc9a714f36637c02ee9ead2e5f3
2021-03-11 12:47:04 -08:00
Tim Van Patten
2155031b53 Add ephemeral_app_api_service to game_service SEpolicy
Add instant app support to game_service.

Bug: b/182342775
Test: atest CtsGameManagerTestCases --instant
Change-Id: I400f740a1aa0d8afa2d8f65499eb98e7589790d2
2021-03-11 12:04:18 -07:00
Alistair Delva
7e3a17fe31 Merge "Add kernel permission for bootconfig proc file" 2021-03-11 15:52:02 +00:00
Treehugger Robot
20a1a984ad Merge "Keystore 2.0: Rename KeystoreUserManager to KeystoreMaintenance" 2021-03-11 11:20:11 +00:00
Treehugger Robot
b9b067ce5e Merge "Fix broken neverallow rules" 2021-03-11 07:33:30 +00:00
Yabin Cui
786676791f Merge "Make profcollectd mlstrustedsubject." 2021-03-11 07:03:12 +00:00
Treehugger Robot
8c885f0b36 Merge "Allow LOOP_CONFIGURE ioctl in otapreopt_chroot" 2021-03-11 06:22:04 +00:00
Lajos Molnar
b92fdbb393 Add media performance class property to sepolicy
Bug: 175813535
Change-Id: Ic47e6b2871e8085808462070d8bd28b16c07839d
2021-03-10 19:41:56 -08:00
Lorenzo Colitti
a46921b4db Merge changes from topic "clatd-vendor"
* changes:
  Properly set the property_context for net.tcp_init_rwnd.
  Add selinux policy for the new net.464xlat.cellular.enabled prop.
2021-03-10 16:53:41 +00:00
Martijn Coenen
b07ef326d4 Merge "Allow mediaprovider to retrieve drm_service_config_prop" 2021-03-10 15:24:56 +00:00
Paul Lawrence
7fe99bf7ee Merge "Fix problem whereby incfs can't remove files from .incomplete" 2021-03-10 14:52:42 +00:00
Lorenzo Colitti
26d3d4a5a2 Properly set the property_context for net.tcp_init_rwnd.
This property is many years old and it does not have a property
context associated with it. It is set by the system server (in
particular, ConnectivityService code, in the Tethering module)
and read by init, which does:

on property:net.tcp_def_init_rwnd=*
    write /proc/sys/net/ipv4/tcp_default_init_rwnd ${net.tcp_def_init_rwnd}

There is no need to add read access to init because init can read
and write any property.

Test: m
Fix: 170917042
Change-Id: I594b09656a094cd2ef3e4fd9703e46bf7b2edd4c
2021-03-10 20:28:26 +09:00
Lorenzo Colitti
082ebd2107 Add selinux policy for the new net.464xlat.cellular.enabled prop.
This property is written by an .rc file - see aosp/1553819 - and
read by the connectivity mainline code in the system server.

Test: m
Bug: 182333299
Change-Id: Ibac622f6a31c075b64387aadb201ad6cdd618ebd
2021-03-10 15:58:48 +09:00
Yabin Cui
aa25b5e39f Make profcollectd mlstrustedsubject.
Without being mlstrustedsubject, profcollectd can't read
/proc/<pid>/maps for app processes:

avc: denied " {" read" } for " scontext=u:r:profcollectd:s0
tcontext=u:r:platform_app:s0:c512,c768 tclass=file permissive=0

Bug: 166559473
Test: build and run profcollectd.

Change-Id: I2a20428694edbd87b1304c5f2221ddf699b8193a
2021-03-09 18:51:23 -08:00
Max Bires
23c2021d89 Merge "Granting remote_prov_app find for tethering" 2021-03-10 02:42:46 +00:00
Inseob Kim
85acf6ef70 Fix broken neverallow rules
neverallow rules with allowlist should look like:

    neverallow { domain -allow1 -allow2 } ...

Bug: 181744894
Test: m selinux_policy
Test: pcregrep -M -r "neverallow\s+{(\s*#.*\s*)*\s+-" .
Change-Id: Ibab72ccc1fbacb99b62fe127b4122e1ac22b938a
2021-03-10 10:44:22 +09:00
Janis Danisevskis
f3fe4cfc06 Keystore 2.0: Rename KeystoreUserManager to KeystoreMaintenance
Test: N/A
Change-Id: I40c07e40cb0a852814058fe89d57c44ea85f1994
2021-03-09 14:35:16 -08:00
Amy Zhang
fd5a1bee57 Merge "Allow tuner default implementation to access /dev/dma_heap/system" 2021-03-09 20:41:32 +00:00
Alistair Delva
ab8b3dfec5 Add kernel permission for bootconfig proc file
Just before selinux is set up, the kernel context must be allowed to
access the /proc/bootconfig file to read the state of the
androidboot.selinux= property. Such permission was already granted for
accessing the /proc/cmdline file for the same reason.

Bug: 173815685
Test: launch_cvd -extra_kernel_cmdline androidboot.selinux=permissive
Test: launch_cvd -guest_enforce_security=false [bootconfig method]
[..]
init: Permissive SELinux boot, forcing sys.init.perf_lsm_hooks to 1.
[..]
Change-Id: I999c0c9d736bed18e5daea81bb0f8cc78350eba7
2021-03-09 19:37:22 +00:00
Collin Fijalkovich
4f7a435b71 Merge "Remove sepolicy surrounding notify_traceur" 2021-03-09 19:13:26 +00:00
Paul Lawrence
c04f037629 Fix problem whereby incfs can't remove files from .incomplete
Test: adb install --incremental, check .incomplete folder is empty
Bug: 180643994
Change-Id: I7dfd18dd9e73cd683e93db1a588aab3b08f5fafa
2021-03-09 09:17:11 -08:00
Treehugger Robot
4fb7098514 Merge "Fix otapreopt_chroot" 2021-03-09 16:16:20 +00:00
Alex Hong
8b230727e7 Support the dump of nfc service in incident reports.
Bug: 177389412
Bug: 177624172
Bug: 177780408
Bug: 178757209
Bug: 178757537
Bug: 178757649
Test: $ make selinux_policy
      Push SELinux modules

      Run the following commands and ensure incidentd denials are gone.
      $ adb shell incident 3052
      $ incident_report 3052
      $ adb bugreport bugreport.zip

Change-Id: Ida1bcee3ad075cc875b6a7e430dc392259942828
2021-03-09 19:43:54 +08:00
Martijn Coenen
4555c92e20 Allow mediaprovider to retrieve drm_service_config_prop
Bug: 181940747
Test: N/A
Change-Id: I4741f0af2960d346bc75b1715e7570fea7be08bb
2021-03-09 11:10:20 +01:00
Max Bires
b0d5dd358e Granting remote_prov_app find for tethering
The connectivity service manager gets a reference to the tethering
service in its constructor. This causes SELinux denials when the
RemoteProvisioner app attempts to use the connectivity service manager
to figure out when a network is available in order to provision keys.

Test: No SELinux denials!
Change-Id: Icbd776a9b81ee9bb22a2ac6041198fe0a6d3a0d0
2021-03-09 01:58:35 -08:00
Yiwei Zhang
86ca9c9131 Merge "sepolicy: allow hal_power_stats_client to access IPowerStats AIDL" 2021-03-09 07:09:50 +00:00
Hridya Valsaraju
69b91ffb1e Merge "Add missing permission for accessing the DMA-BUF system heap" 2021-03-09 06:11:17 +00:00
Max Bires
6132cc03a4 Merge "Granting remote_prov_app access to build prop" 2021-03-09 03:49:56 +00:00
Yiwei Zhang
1f990facdb sepolicy: allow hal_power_stats_client to access IPowerStats AIDL
Bug: 178219601
Change-Id: I25f19939c69c225771e534cbd446eec8c7769f13
2021-03-08 22:19:47 +00:00
Devin Moore
1dc04d0e7b Merge "Give ueventd permissions to read /proc/bootconfig" 2021-03-08 18:27:50 +00:00
Martijn Coenen
b01e0a22a5 Merge "Add external_storage.cross_user.enabled property" 2021-03-08 12:46:23 +00:00
Treehugger Robot
a60ac31fcb Merge "Dontaudit zygote to read and open media_rw_data_file dir" 2021-03-08 11:26:35 +00:00
Jeffrey Vander Stoep
f6f2a79a2a Merge "Give resume_on_reboot key as separate context" 2021-03-08 08:33:16 +00:00
Chun-Wei Wang
75e3fa6ead Merge "Add persist.rollback.is_test (6/n)" 2021-03-06 14:33:38 +00:00
Jeff Vander Stoep
4c0259d5c7 Fix otapreopt_chroot
A number of things have changed, such as how the linkerconfig is
managed. Update permissions to reflect the changes.

Bug: 181182967
Test: Manual OTA of cuttlefish
Change-Id: I32207eb7c5653969e5cef4830e18f8c8fb330026
2021-03-05 14:50:29 -08:00
Devin Moore
74ed0f622f Give ueventd permissions to read /proc/bootconfig
It needs to read parameters that have been moved from /proc/cmdline
to /proc/bootconfig

Test: boot Cuttlefish with 5.10 and 4.19 kernels
Bug: 173815685
Change-Id: I437b76634b7c8e779e32b68cd3043d02f4228be5
2021-03-05 09:21:19 -08:00
Alexander Potapenko
3d52817da4 Selinux policy for bootreceiver tracing instance
Create contexts for /sys/kernel/tracing/instances/bootreceiver
Allow read access to files in this dir for system_server.

Bug: 172316664
Bug: 181778620
Test: manual runs with KFENCE enabled
Signed-off-by: Alexander Potapenko <glider@google.com>
Change-Id: I7021a9f32b1392b9afb77294a1fd0a1be232b1f2
2021-03-05 08:53:39 +01:00
Pavel Grafov
ae69347dbe Merge "Allow wpa_supplicant to access KeyStore2" 2021-03-05 07:03:57 +00:00
Jiyong Park
05a80a5e72 Merge "Fix a build error reguarding build_sepolicy" 2021-03-05 02:32:15 +00:00
Jiyong Park
1e2a1b6e04 Merge "Reland "Build sepolicy files for microdroid_vendor"" 2021-03-05 02:27:40 +00:00
Pavel Grafov
b99c1924af Allow wpa_supplicant to access KeyStore2
Bug: 171305388
Test: manual
Change-Id: I98134c41a4923bccf06c14858603fe888ec84633
2021-03-05 00:27:23 +00:00
Tianjie
21ab75279a Give resume_on_reboot key as separate context
As part of the keystore2 requirement, we give the keys used for
resume on reboot a separate context in keystore. And grant system
server the permission to generate, use and delete it.

Bug: 172780686
Test: resume on reboot works after using keystore2
Change-Id: I6b47625a0864a4aa87b815c6d2009cc19ad151a0
2021-03-04 12:20:19 -08:00
Ricky Wai
d240d2be77 Dontaudit zygote to read and open media_rw_data_file dir
Zygote will trigger sdcardfs to read and open media_rw_data_file:dir.
We can safely ignore this message.

Bug: 177248242
Test: Able to boot without selinux warning.
Change-Id: Ie9723ac79547bf857f55fc0e60b461210a4e4557
2021-03-04 11:08:33 +00:00