Commit graph

29082 commits

Author SHA1 Message Date
Galia Peycheva
201414cff6 Add blur sysprop to sepolicy
Bug: 170378891
Test: m
Change-Id: I6876e3bfe9dfdf066bfa54334555fdab5b3598d5
2021-02-11 17:32:30 +00:00
Weilun Du
180a277d67 Add qemu.hw.mainkeys to system property_contexts
Bug: 178143857

Signed-off-by: Weilun Du <wdu@google.com>
Change-Id: Idfc2bffa52016d1e880974bb193025400e90a538
2021-02-11 04:18:54 +00:00
Vova Sharaienko
28497aaed1 Merge "Stats: new sepolicy for the AIDL service" am: e8d2732651
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1570880

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I46f47561663e9a3fb200cc061859c4e23ab8217c
2021-02-11 03:48:46 +00:00
Vova Sharaienko
e8d2732651 Merge "Stats: new sepolicy for the AIDL service" 2021-02-11 03:07:56 +00:00
Vova Sharaienko
c64a5b42aa Stats: new sepolicy for the AIDL service
Allows the AIDL IStats service to be exposed via ServiceManager
Defines IStats service client domain to be used by pixelstats_vendor

Bug: 178859845
Test: Build, flash, and aidl_stats_client
Change-Id: If41e50d0182993d0b7f8501e9147e0becf526689
2021-02-10 23:48:35 +00:00
Treehugger Robot
f749766036 Merge "Fix ANR permission denial for AIDL HALs." am: 654f8b82a8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1582316

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ie1bd6c28ef20741f9d1f1d6a780af6728ef362b0
2021-02-10 21:53:29 +00:00
Treehugger Robot
654f8b82a8 Merge "Fix ANR permission denial for AIDL HALs." 2021-02-10 21:16:35 +00:00
Elliott Hughes
d0f06f5489 Merge "Allow priv_app system_linker_exec:file execute_no_trans" am: e92be7b6a6
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1582850

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I20bc071b1d686e9174186ea25a47fdaca49bbe77
2021-02-10 21:04:21 +00:00
Elliott Hughes
e92be7b6a6 Merge "Allow priv_app system_linker_exec:file execute_no_trans" 2021-02-10 20:45:23 +00:00
Chirag Pathak
814e89a1b2 The SE Policies to incorporate ISecureClock and ISharedSecret services along with IKeyMintDevice service into default keymint HAL Server.
Test: Rebuild, execute and run atest VtsAidlSharedSecretTargetTest and atest VtsAidlSecureClockTargetTest.
Bug: b/171844725, b/168673523.

Change-Id: I8b81ec12c45566d31edcd117e41fd559df32c37d
2021-02-10 18:45:07 +00:00
Elliott Hughes
25cb9046ef Allow priv_app system_linker_exec:file execute_no_trans
Chrome Crashpad uses the the dynamic linker to load native executables
from an APK (b/112050209, crbug.com/928422)

We made the equivalent change to untrusted_app_all in
9ea8c0701d but webview also runs in
priv_app contexts.

Bug: http://b/112050209
Test: treehugger
Change-Id: I19bbadc7f9c9e668e2c6d932c7da24f18e7731bd
2021-02-10 10:32:44 -08:00
Steven Moreland
afb345c94b Fix ANR permission denial for AIDL HALs.
Recently, WatchDog gained the ability to query AIDL HAL PIDs in order to
amend ANR reports. However, since this was tested on cuttlefish (and
b/65201432 means that system_server is permissive), the denial was not
enforced, and broke ANRs in the dogfood population.

Fixes: 179753319
Test: simulate hanging w/ 'adb shell am hang', and the following denial
   no longer occurs:
02-10 00:50:05.719   200   200 E SELinux : avc:  denied  { list } for
pid=575 uid=1000 name=service_manager scontext=u:r:system_server:s0
tcontext=u:r:servicemanager:s0 tclass=service_manager permissive=1

Change-Id: I210527ad7492b155d7cf08c7d67894ef602d37a6
2021-02-10 17:06:00 +00:00
Florian Mayer
076e0e56b1 Merge changes from topics "norootintegrationtest", "profileshelltestdatafile" am: 7b3ae03026
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1575363

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I526f7b7f9f0c8954d929184592b57928685f3b39
2021-02-10 11:43:01 +00:00
Florian Mayer
7b3ae03026 Merge changes from topics "norootintegrationtest", "profileshelltestdatafile"
* changes:
  Allow shell to create shell_[test_]_data_file sockets.
  Allow heapprofd to read shell_test_data_file.
2021-02-10 11:16:10 +00:00
Treehugger Robot
1018f58e44 Merge "SEPolicy for RemoteProvisioning App" am: e6654e8bfd
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1536783

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I958e7dcfda6bde2b5e37d9f32df9f530590e097f
2021-02-10 04:53:04 +00:00
Treehugger Robot
e6654e8bfd Merge "SEPolicy for RemoteProvisioning App" 2021-02-10 04:20:52 +00:00
Treehugger Robot
258ee7802e Merge "[selinux] allow priv_app to get incremental progress" am: f14e49be1c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1581966

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: If428dfe89afd31a5f491553c3dc6e7a99a3eb9e1
2021-02-10 01:25:12 +00:00
Treehugger Robot
f14e49be1c Merge "[selinux] allow priv_app to get incremental progress" 2021-02-10 00:32:39 +00:00
Pavel Grafov
7ea497a17e Keystore 2.0: Allow system_server to manage wifi keys am: 20bc79bb3f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1581903

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I74b8b25388c00eddafc238ae4ed1a52a53230f36
2021-02-10 00:05:26 +00:00
Songchun Fan
b4c9491aed [selinux] allow priv_app to get incremental progress
This allows phonesky to get incremental install progress.

Addresses denial message like below:

W/BlockingExecuto: type=1400 audit(0.0:5582): avc: denied { ioctl } for path="/data/incremental/MT_data_app_vmdl133/mount/.index/04abf89d12c3fe8f6fe9b381a670255c" dev="incremental-fs" ino=52957 ioctlcmd=0x6722 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0 app=com.android.vending

Test: builds
BUG: 172965880
Change-Id: Ibecd4e07746e7bb3ca6bdf762382744b38f677cb
2021-02-09 22:46:27 +00:00
Pavel Grafov
20bc79bb3f Keystore 2.0: Allow system_server to manage wifi keys
This is needed because Wifi module needs to import and
generate keys and it runs in system_server.

Also, remove "grant" from system_app and system_server
since there is no need to grant any keys.

Test: Create an enterprise wifi config with EAP-TLS
Bug: 171305388
Change-Id: I50c25f2fe52e968c8cdf1ea20d110f9f052699db
2021-02-09 20:36:51 +00:00
Janis Danisevskis
17c9463c6e Merge "Keystore 2.0: Add wifi namespace to sepolicy." am: 6691c9c411
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1570000

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Id996eb24c7e76234de89fd0461f801b85752be97
2021-02-09 18:45:12 +00:00
Janis Danisevskis
6691c9c411 Merge "Keystore 2.0: Add wifi namespace to sepolicy." 2021-02-09 18:27:16 +00:00
Janis Danisevskis
df31f20dfe Keystore 2.0: Add wifi namespace to sepolicy.
Add the wifi namespace to sepolicy and allow system_app (Settings) and
wifi_supplicant to manage/use the keys in that namespace

Test: N/A
Bug: 171305388
Change-Id: Ib6af8656b18288a1116c241c2e76d9aea421a889
2021-02-09 08:28:45 -08:00
Treehugger Robot
672b014e90 Merge "Allow dumpsys to read total DMA-BUF heap pool size" am: efef83f745
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1566386

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Id42bddda4968b88f89c8538c5bdc85e156db892b
2021-02-09 14:38:53 +00:00
Treehugger Robot
efef83f745 Merge "Allow dumpsys to read total DMA-BUF heap pool size" 2021-02-09 14:16:42 +00:00
Florian Mayer
ea00b68ee5 Allow shell to create shell_[test_]_data_file sockets.
This makes it easier to write some tests without requiring root for
creating a temporary socket.

Test: m
Test: atest perfetto_integrationtests with https://r.android.com/1575345
      passed with this CL
      failed without with
        avc: denied { create } for name="traced_consumer"
        scontext=u:r:shell:s0 tcontext=u:object_r:shell_data_file:s0
        tclass=sock_file permissive=0

Change-Id: I281778259a55973cda9d6e7af6dea5637591502c
2021-02-09 13:29:05 +00:00
Florian Mayer
5cefb23c4f Allow heapprofd to read shell_test_data_file.
This is so we can run integrationtests on user.

Change-Id: Ie6afad9758968e6cdeb030fbf4d3b75a61813269
2021-02-09 13:28:49 +00:00
Josh Gao
ce1c4a54ae Let apps read tombstones given to them.
Bug: http://b/159164105
Test: atest CtsNativeTombstoneTestCases
Change-Id: I278c7ab815bb044b939afeb1f8a5ae37ec2f4c91
2021-02-08 17:19:43 -08:00
Treehugger Robot
1a6bdc50bb Merge "Update OWNERS." am: c86c173de7
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1580968

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I1c6bcaccdff4f5cc9275708cc97e26c0a38db3a7
2021-02-08 23:29:55 +00:00
Treehugger Robot
c86c173de7 Merge "Update OWNERS." 2021-02-08 22:35:12 +00:00
Treehugger Robot
3d390db9bb Merge "Allow snapuserd interaction in recovery and fastbootd." am: 585b826c7e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1576378

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: If6cd217c6b76abba13fd577944e76ade2f186429
2021-02-08 22:13:54 +00:00
Treehugger Robot
585b826c7e Merge "Allow snapuserd interaction in recovery and fastbootd." 2021-02-08 21:30:11 +00:00
Treehugger Robot
3c57bd75aa Merge "Keystore 2.0: Rename Keystore 2.0 enable property." am: 0137685e55
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1577884

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I9dddd74c573ca99808f3fd3266b3f981a7326db3
2021-02-08 20:52:01 +00:00
Elliott Hughes
616eaa9d08 Update OWNERS.
nnk's gone :-(

Test: N/A
Change-Id: I24daddb775e4adea1516c063a0d43a89235c0749
2021-02-08 12:24:25 -08:00
Treehugger Robot
0137685e55 Merge "Keystore 2.0: Rename Keystore 2.0 enable property." 2021-02-08 20:04:38 +00:00
Yifan Hong
2005aaa721 Merge "Allow CTS DeviceInfo to read VAB prop." am: ef663f6cf5
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1576751

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I68db59c9738b2f7b275391ef148e97aebc698773
2021-02-08 18:35:12 +00:00
Yifan Hong
ef663f6cf5 Merge "Allow CTS DeviceInfo to read VAB prop." 2021-02-08 18:20:00 +00:00
Collin Fijalkovich
0ac7fa9374 Merge "Configure sepolicy for TracingServiceProxy" am: 1f318c8cab
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1528451

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ibd10fe6793a1b851f8b29eabff421d3dfbb0f1e7
2021-02-08 17:49:45 +00:00
Collin Fijalkovich
1f318c8cab Merge "Configure sepolicy for TracingServiceProxy" 2021-02-08 17:24:06 +00:00
Treehugger Robot
cdccadbb6c Merge "Fix service name for VPN_MANAGEMENT_SERVICE." am: 47d078e1d4
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1579864

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I5e540a4b6cca8d76ec25982bd40eb32661f6666f
2021-02-08 10:05:11 +00:00
Treehugger Robot
47d078e1d4 Merge "Fix service name for VPN_MANAGEMENT_SERVICE." 2021-02-08 09:42:34 +00:00
Max Bires
23f0f3b28a SEPolicy for RemoteProvisioning App
This change adds the SEPolicy changes required to support the remote
provisioning flow. The notable additions are specifically labeling the
remote provisioning app and giving it access to find the remote
provisioning service which is added in keystore. It also requires
network access in order to communicate to the provisioning servers.

This functionality is extremely narrow to the point that it seems worth
it to define a separate domain for this app, rather than add this in to
the priv_app or platform_app permission files. Since this app also
communicates with the network, it also seems advantageous to limit its
permissions only to what is absolutely necessary to perform its
function.

Test: No denials!
Change-Id: I602c12365a575d914afc91f55e6a9b6aa2e14189
2021-02-08 01:33:12 -08:00
Martijn Coenen
39d56f944e Merge "Allow on-device signing daemon to talk to keystore." am: d8f68bf8d8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1573147

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ic44fc5f22715f955dccc76ab0b954b4f8ac76a45
2021-02-08 09:19:33 +00:00
Martijn Coenen
d8f68bf8d8 Merge "Allow on-device signing daemon to talk to keystore." 2021-02-08 08:37:17 +00:00
Xiao Ma
c33060a868 Merge "Allow connectivity namespace to enable native level access flags." am: bbd48ff311
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1570024

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I1b8dc471546c502b172cf95a2e83664826604622
2021-02-08 02:57:41 +00:00
Xiao Ma
bbd48ff311 Merge "Allow connectivity namespace to enable native level access flags." 2021-02-08 01:40:51 +00:00
Lorenzo Colitti
d7c9de4e31 Fix service name for VPN_MANAGEMENT_SERVICE.
aosp/1574082 added sepolicy for a "vpnmanager" system service
which is being introduced to move code from ConnectivityService
to a new VpnManagerService.

Unfortunately that CL missed the fact that "vpn_management" is
already a service name and present in the public API since R.
Instead of adding another service name, use the existing service
name to lessen confusion. It is difficult to avoid confusion
entirely because there was already a public class called
VpnService when the VpnManager class was added to the public API
surface.

Bug: 173331190
Test: builds, boots, "dumpsys vpn_management" throws no errors
Change-Id: I4ab188ef62592aac167ba1f7b586accc882815e8
2021-02-07 17:51:53 +09:00
Josh Gao
734f5a3120 Merge "Let system_server truncate tombstones." am: ae73b479fc
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1568746

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I43c72bb552d95a7dd531b1965d2f530207a6b84d
2021-02-05 21:12:13 +00:00
Josh Gao
ae73b479fc Merge "Let system_server truncate tombstones." 2021-02-05 20:35:19 +00:00