Ashwini Oruganti
7493bb52c1
Allow GMS core to call dumpsys storaged
...
Now that GMS core is running in gmscore_app and not priv_app, we need
this rule for the new domain. This also adds an auditallow to the same
rule for priv_app, so we can delete it once no logs show up in
go/sedenials for this rule triggerring.
Bug: 142672293
Test: TH
Change-Id: I308d40835156e0c19dd5074f69584ebf1c72ad58
2019-12-11 12:49:04 -08:00
Yan Yan
fe55f30397
Merge "Make ipsec file_contexts as "android:path" property"
2019-12-04 02:07:34 +00:00
Treehugger Robot
54072d9a73
Merge "Fix vendor defining macros and neverallows"
2019-12-04 01:12:15 +00:00
Hangyu Kuang
4c1e76adcb
Merge "MediaTranscodingService: Add sepolicy for MediaTranscodingService."
2019-12-03 23:55:20 +00:00
Treehugger Robot
53e3983923
Merge "Audit binder_call rule for priv_app in update_engine.te"
2019-12-03 23:46:56 +00:00
Treehugger Robot
92e540c978
Merge "Merge Android10 QPR1 into AOSP master"
2019-12-03 23:15:00 +00:00
Ashwini Oruganti
c116142d2e
Audit binder_call rule for priv_app in update_engine.te
...
We've moved GMS core to its own domain, and this permission should no
longer be applied to the broader priv_app domain.
Before we delete the rule, we are auditing it to see if any other
privapps need it.
Bug: 142672293
Test: TH
Change-Id: I29c29739f4c3caf5d24361b69adc584047da0ef0
2019-12-03 14:02:57 -08:00
Jeff Sharkey
8d287db808
Structure MediaProvider as an APEX.
...
Based on guidance from the Mainline team, we're placing the
MediaProvider APK inside a new APEX, as this will allow us to
move MediaStore.java inside the module boundary in a future CL.
Bug: 144247087
Test: manual
Change-Id: I88f6f2e598d9611e8b92143504e4328d93671cab
2019-12-03 13:35:46 -07:00
Treehugger Robot
f651f6efc6
Merge "Allow update_engine to call gmscore_app"
2019-12-03 20:27:51 +00:00
Ashwini Oruganti
ae7297b7da
Allow update_engine to call gmscore_app
...
We need this permission now that GMS core runs in its own domain and not
in the priv_app domain.
Bug: 145379440
Bug: 142672293
Test: TH
Change-Id: Idc4bf6863ba767d287c218c07d0eb5aebbe50f91
2019-12-03 11:13:51 -08:00
Inseob Kim
b4baf73477
Fix vendor defining macros and neverallows
...
init and dumpstate should be able to access all properties, but they are
in coredomain, so neverallow rules for vendor properties should be
changed in order to avoid conflicts.
Bug: 145339613
Test: add vendor_internal_prop manually and build.
Change-Id: If582870f855e4444f8ac0d091696c0c7fd833791
2019-12-03 18:42:12 +09:00
Xin Li
914bd86d0e
Merge Android10 QPR1 into AOSP master
...
Bug: 145570283
Change-Id: Ie78ec6d7b9300593c9ac370d7dd801ba3f7e0e97
2019-12-02 21:25:28 -08:00
Hangyu Kuang
ee3a8ea798
MediaTranscodingService: Add sepolicy for MediaTranscodingService.
...
Bug:145233472
Test: Build and flash the phone.
"adb shell dumpsys -l | grep media" shows media.transcoding service.
Change-Id: I48a42e7b595754989c92a8469eb91360ab6db7c6
2019-12-02 13:57:28 -08:00
Stan Rokita
193dfaeca0
Merge "Add sensors multihal support in file_contexts regex"
...
am: d494872641
Change-Id: I8a297a051ad05023aa985e005ce0b67cd8ffcaf2
2019-12-02 13:39:35 -08:00
Stan Rokita
d494872641
Merge "Add sensors multihal support in file_contexts regex"
2019-12-02 20:54:57 +00:00
Ashwini Oruganti
807fe543e5
Don't run vzwomatrigger_app in permissive mode
...
am: b7c81c04c0
Change-Id: I7cf647863753a4dcf7ffea1d5e8af3edf618d5d6
2019-12-02 11:35:26 -08:00
Ashwini Oruganti
b7c81c04c0
Don't run vzwomatrigger_app in permissive mode
...
This change enforces all the defined rules for the vzwomatrigger_app
domain and unsets permissive mode. There have not been any new denials
in the past weeks for this domain (source: go/sedenials), and hence this
domain appears to not need any new permissions.
Bug: 142672293
Test: Green builds
Change-Id: I588b4e3038a3e8188d97183a592f9023a95dd3a8
2019-12-02 09:41:54 -08:00
Anton Hansson
03683c2295
Merge "Add sepolicy for com.android.sdkext module"
...
am: 243797950e
Change-Id: I4b2e2bcf04a7e42e27b6a9e6cceae205dddf2ddb
2019-12-02 09:19:22 -08:00
Anton Hansson
243797950e
Merge "Add sepolicy for com.android.sdkext module"
2019-12-02 17:09:16 +00:00
Anton Hansson
fd25d49569
Add sepolicy for com.android.sdkext module
...
Bug: 137191822
Test: m com.android.sdkext
Change-Id: Ia5fb99af7fad43ce4321b1c6611ab54340a87589
2019-12-02 14:13:41 +00:00
Jeff Vander Stoep
ae2bb0dd40
gmscore_app: add bug map
...
am: a213e0c3c5
Change-Id: I973b2a61960faf96fc12da7ecf197386866f4aa6
2019-12-02 06:04:24 -08:00
Jeff Vander Stoep
a213e0c3c5
gmscore_app: add bug map
...
De-flake tests.
Test: build
Bug: 145267097
Change-Id: I7c21229d8577ffb9283a94290b3cfe575868d348
2019-12-02 13:42:11 +01:00
Mark Chien
946f1bf87b
Merge "[Tether18] Add file_contexts for com.android.tethering.apex"
...
am: 9bf53d557d
Change-Id: I677f6bd93bd5fa099eba2c1fc705364ce94ccb9f
2019-12-01 20:20:30 -08:00
Mark Chien
9bf53d557d
Merge "[Tether18] Add file_contexts for com.android.tethering.apex"
2019-12-02 04:11:35 +00:00
Mark Chien
646864216f
[Tether18] Add file_contexts for com.android.tethering.apex
...
Bug: 144320626
Test: build
Change-Id: I6b5c079a917524bf4f1ad3f89b1f44708f0d6ed7
2019-11-28 14:53:58 +08:00
Shuo Qian
dea5117ac3
Merge "Setting up SELinux policy for Emergency number database"
...
am: 584234e8b1
Change-Id: I87aa18467be2a9c38d804629eea38f3c5ebb844c
2019-11-27 12:06:51 -08:00
Shuo Qian
584234e8b1
Merge "Setting up SELinux policy for Emergency number database"
2019-11-27 19:14:50 +00:00
Jeff Vander Stoep
ae3667d6ae
Whitelist app->storage denials
...
am: 99d5970dcf
Change-Id: I93dae16d115d35d2eebb35d8cc98cbf941b11873
2019-11-27 10:49:17 -08:00
evitayan
780185f503
Make ipsec file_contexts as "android:path" property
...
It follows examples of other APEX to make file_contexts of ipsec
module as "android:path" property
Bug: 143192273
Test: atest ipsec_e2e_tests
Change-Id: Idbba1f964aad7e54077ac77250f9cfd6a6b5049e
2019-11-27 07:00:14 -08:00
Jeff Vander Stoep
99d5970dcf
Whitelist app->storage denials
...
Make presubmit less flaky.
Bug: 145267097
Test: build
Change-Id: Id3e8c636f9ebda0dd07a0dcf5211f4a73bd3e3c2
2019-11-27 15:01:05 +01:00
Harpreet \"Eli\" Sangha
ae8ad79141
Merge "Fix File Context Entry for Bluetooth Services."
...
am: d6a91453d8
Change-Id: I437f849121d5aa8fdc6f312c92880558af157a74
2019-11-26 20:04:55 -08:00
Treehugger Robot
d6a91453d8
Merge "Fix File Context Entry for Bluetooth Services."
2019-11-27 03:56:40 +00:00
Terry Wang
038b7b664f
Merge "Add apex structure to appsearch module."
...
am: 4a51f6d55d
Change-Id: I4fd1bb01d20d9c684a2437378737b74af0f51fa2
2019-11-26 18:09:34 -08:00
Treehugger Robot
4a51f6d55d
Merge "Add apex structure to appsearch module."
2019-11-27 02:04:39 +00:00
Harpreet \"Eli\" Sangha
078689ae03
Fix File Context Entry for Bluetooth Services.
...
Test: Boot on HiKey960 and check dmesg errors.
Change-Id: I9ac0968753c7cd9a23c63eac98b20a7778277716
Signed-off-by: Harpreet \"Eli\" Sangha <eliptus@google.com>
2019-11-27 10:11:12 +09:00
Roshan Pius
34c69ae8eb
Merge changes Ifa33dae9,I69ccc6af,Ibb4db9d9
...
am: d16a3968f3
Change-Id: Ib57570877f9195b2d54337552e4ee868f7dbc29f
2019-11-26 16:48:07 -08:00
Treehugger Robot
d16a3968f3
Merge changes Ifa33dae9,I69ccc6af,Ibb4db9d9
...
* changes:
Revert "sepolicy: Permission changes for new wifi mainline module"
Revert "wifi_stack: Move to network_stack process"
Revert "sepolicy(wifi): Allow audio service access from wifi"
2019-11-27 00:41:35 +00:00
Ashwini Oruganti
3d23d9ab9e
Merge "Audit GMS core related allow rules in priv_app.te"
...
am: 63fb238052
Change-Id: I6f3c1e455ade4deb13cde882bcf864ca6ea4f7c5
2019-11-26 15:04:38 -08:00
Treehugger Robot
63fb238052
Merge "Audit GMS core related allow rules in priv_app.te"
2019-11-26 23:00:25 +00:00
David Sehr
b08791945a
Merge "Revert^2 "SELinux policy for system server JVMTI""
...
am: 453ed17a61
Change-Id: Ia488cd027e46fa6f20ebbce91ea6ada63ab5e6da
2019-11-26 14:26:00 -08:00
David Sehr
453ed17a61
Merge "Revert^2 "SELinux policy for system server JVMTI""
2019-11-26 22:19:11 +00:00
Ashwini Oruganti
e6ed127dcb
Audit GMS core related allow rules in priv_app.te
...
We've moved GMS core to its own domain, and these permissions should be
removed from the priv_app domain. This change adds auditallow to these
permissions so we know if it's safe to check if any other privapps are
relying on these.
Bug: 142672293
Test: Green builds
Change-Id: I35402f1166a0edf8e001d894413f470c090c7b57
2019-11-26 13:16:21 -08:00
Shuo Qian
9322cb088a
Setting up SELinux policy for Emergency number database
...
Test: Manual; https://paste.googleplex.com/6222197494382592
Bug: 136027884
Change-Id: I29214de6b5b5a62bff246c1256567844f4ce55c7
2019-11-26 12:51:02 -08:00
Colin Cross
bb82c57996
Merge "bug_map: track bluetooth storage_stub_file denial"
...
am: e84bef4647
Change-Id: I2151dbd566bd46a20a375a9519c6d6e8817dc567
2019-11-26 12:07:41 -08:00
Colin Cross
e84bef4647
Merge "bug_map: track bluetooth storage_stub_file denial"
2019-11-26 18:33:37 +00:00
Colin Cross
b24b629ed3
bug_map: track bluetooth storage_stub_file denial
...
Bug: 145212474
Test: none
Change-Id: I64e7e73907637e100d59b735c57cc40996044607
2019-11-26 10:31:46 -08:00
markchien
b4eb08da19
Merge "[Tether12] Give network stack permission for tetheroffload"
...
am: e91bdc73d8
Change-Id: I703bffef2c8cf333fcd01532311cecdbebd8c800
2019-11-26 05:41:52 -08:00
Treehugger Robot
e91bdc73d8
Merge "[Tether12] Give network stack permission for tetheroffload"
2019-11-26 13:34:38 +00:00
Robert Shih
caefd4cdc3
Merge "allow mediaserver to access drm hidl"
...
am: 487411abab
Change-Id: Ie12aa1b3fe9fa2e38e1c56399b78a7723325fb5a
2019-11-25 17:46:02 -08:00
Robert Shih
487411abab
Merge "allow mediaserver to access drm hidl"
2019-11-26 01:36:00 +00:00