Commit graph

19947 commits

Author SHA1 Message Date
Joel Galenson
072332b20f Merge "Fix CTS neverallow violation." am: 412cc87475
am: a1a7a91cb5

Change-Id: I5406a62fb9e695017d29326dbc352d7f7a1c8572
2019-02-28 14:49:00 -08:00
Andreas Gampe
c4389e3468 Sepolicy: Add base runtime APEX postinstall policies am: 4c2d06c458
am: b3fafa2f62

Change-Id: I416bacb3f064cbdefd33b9eb40254634fcdfce05
2019-02-28 14:48:22 -08:00
Andreas Gampe
047f827be6 Sepolicy: Add runtime APEX preinstall fsverity permissions am: 57346a0566
am: 7710cf6e09

Change-Id: Ic0cb99ee626d82490fbc7ceec979449504ab2b13
2019-02-28 14:48:02 -08:00
Andreas Gampe
e5ab7a049e Sepolicy: Add base runtime APEX preinstall policies am: ae127d8340
am: 105dea9f8f

Change-Id: I8bc0ac9941b624898c31473715c6600ec9879f58
2019-02-28 14:47:36 -08:00
David Anderson
da4057e3a4 Merge "Allow system_server and shell to start gsid on-demand."
am: 753225ce9c

Change-Id: I7f818ce217666ae4edf28cc0a7609fafd1317a28
2019-02-28 14:32:38 -08:00
Tri Vo
16f4d00cd6 Merge "ashmem: expand app access"
am: e8cb09db42

Change-Id: I15f1084ad94e8ec0a495b136ec93f8dad39e98db
2019-02-28 14:32:12 -08:00
Joel Galenson
a1a7a91cb5 Merge "Fix CTS neverallow violation."
am: 412cc87475

Change-Id: I91e2626070087fcfdd8c1a5863c7aaa7b30436fd
2019-02-28 14:31:47 -08:00
Andreas Gampe
b3fafa2f62 Sepolicy: Add base runtime APEX postinstall policies
am: 4c2d06c458

Change-Id: Id7fa13a77b131d8471ba974ee97b9ce008422061
2019-02-28 14:30:46 -08:00
Andreas Gampe
7710cf6e09 Sepolicy: Add runtime APEX preinstall fsverity permissions
am: 57346a0566

Change-Id: Ie93e847135cc4b03f3b3b832dd2b64bac30cc5d4
2019-02-28 14:30:33 -08:00
Andreas Gampe
105dea9f8f Sepolicy: Add base runtime APEX preinstall policies
am: ae127d8340

Change-Id: I10adffa505da330ad3fdfccbb6f9c12bc7282629
2019-02-28 14:30:19 -08:00
Sudheer Shanka
a32080bcc2 Remove priv_app SELinux denial tracking.
The underlying issue has been fixed, so this
SELinux denial shouldn't occur anymore.

Bug: 118185801
Test: manual
Change-Id: I5656e341bcb7b554bcd29e00315648eb75ec0a3d
2019-02-28 14:15:47 -08:00
David Anderson
753225ce9c Merge "Allow system_server and shell to start gsid on-demand." 2019-02-28 22:08:10 +00:00
Tri Vo
e8cb09db42 Merge "ashmem: expand app access" 2019-02-28 22:00:50 +00:00
Treehugger Robot
412cc87475 Merge "Fix CTS neverallow violation." 2019-02-28 21:52:44 +00:00
Tri Vo
9fbc87c89f ashmem: expand app access
We are only interested in removing "open" access from apps, so leave
apps with (rw_file_perms - open) permissions to /dev/ashmem

Bug: 126627315
Test: emulator boots without denials to /dev/ashmem
Change-Id: I7f03fad5e4e82aebd1b6272e4956b16f86043637
2019-02-28 10:47:35 -08:00
Andreas Gampe
4c2d06c458 Sepolicy: Add base runtime APEX postinstall policies
Add art_apex_postinstall domain that is allowed to move
precreated AoT artifacts from /data/ota.

Bug: 125474642
Test: m
Change-Id: Id674e202737155a4ee31187f096d1dd655001fdd
2019-02-28 09:24:17 -08:00
David Anderson
64bbf05150 Allow system_server and shell to start gsid on-demand.
gsid is started lazily to reduce memory pressure. It can be started
either via gsi_tool (invoked by adb shell), or by DynamicAndroidService
via system_server.

Bug: 126622385
Test: no denials running "gsi_tool status"
Change-Id: I90a5f3f28fe4f294fb60e7c87a62e76716fbd5c0
2019-02-28 07:54:25 -08:00
Andreas Gampe
57346a0566 Sepolicy: Add runtime APEX preinstall fsverity permissions
Add rights to create and install fsverity data.

Bug: 125474642
Test: m
Change-Id: I752c40c7b396b2da082cb17641702a2c5c11b9c3
2019-02-28 05:12:56 -08:00
Andreas Gampe
ae127d8340 Sepolicy: Add base runtime APEX preinstall policies
Add art_apex_preinstall domain that is allowed to create AoT
artifacts in /data/ota.

Bug: 125474642
Test: m
Change-Id: Ia091d8df34c4be4f84c2052d3c333a0e36bcb036
2019-02-28 05:12:56 -08:00
Kevin Rocard
02e7e8a282 Allow audioserver to access the package manager am: 83f65ebbb2 am: 3cd55154c5
am: eed8985d7f

Change-Id: I3ba2e99985e288b3c9482e9284281ec615ca3563
2019-02-28 00:10:22 -08:00
Kevin Rocard
eed8985d7f Allow audioserver to access the package manager am: 83f65ebbb2
am: 3cd55154c5

Change-Id: Ifb9b64f49787ceb0758a7ca6800718d3ab03de09
2019-02-28 00:06:13 -08:00
Kevin Rocard
3cd55154c5 Allow audioserver to access the package manager
am: 83f65ebbb2

Change-Id: I64a1de43a3cc72afb21423c735b55746d4a5c34a
2019-02-27 23:58:56 -08:00
Kevin Rocard
f9246b399f Merge "Allow audioserver to access the package manager" 2019-02-28 05:19:58 +00:00
Joel Galenson
a92753538f Fix CTS neverallow violation.
Fixes: 126604492
Test: Build userdebug and user.
Test: Test
android.cts.security.SELinuxNeverallowRulesTest#testNeverallowRules129
on userdebug.

Change-Id: I0716e566570114878842644339401331513bae22
2019-02-27 19:33:11 -08:00
Kevin Rocard
83f65ebbb2 Allow audioserver to access the package manager
This can not be done from the system server as there are native API that
do not go through it (aaudio, opensles).

Test: adb shell dumpsys media.audio_policy | grep -i 'Package manager'
Bug: 111453086
Signed-off-by: Kevin Rocard <krocard@google.com>
Change-Id: I0a4021f76b5937c6191859892fefaaf47b77967f
2019-02-28 01:50:22 +00:00
Kevin Rocard
25f60574ee Allow audioserver to access the package manager
The audioserver needs to know if an app allows its audio to be recorded.
This can not be done from the system server as there are native API that
do not go through it (aaudio, opensles).

Test: adb shell audiorecorder --target /data/file.raw
      play sound
      adb shell dumpsys media.audio_policy | sed -n '/Mix:/,/^$/p'
      adb shell dumpsys media.audio_policy | grep -i 'Package manager'
Bug: 111453086
Signed-off-by: Kevin Rocard <krocard@google.com>
Change-Id: I0a4021f76b5937c6191859892fefaaf47b77967f
2019-02-27 17:38:27 -08:00
Tri Vo
c9b3c15a90 Merge "Neverallow app open access to /dev/ashmem" am: 7eb9143e46 am: 897933a3ae
am: 131b3dabe2

Change-Id: I92dfad7c36f5d00fbac9347d75a9e3d1210d441f
2019-02-27 16:42:10 -08:00
Tri Vo
131b3dabe2 Merge "Neverallow app open access to /dev/ashmem" am: 7eb9143e46
am: 897933a3ae

Change-Id: I16d9e87d0978747db568c751591072c375e924bf
2019-02-27 16:18:43 -08:00
Tri Vo
897933a3ae Merge "Neverallow app open access to /dev/ashmem"
am: 7eb9143e46

Change-Id: I23b2cc49048f79365a7360f916a23ad51507d062
2019-02-27 16:14:44 -08:00
Tri Vo
7eb9143e46 Merge "Neverallow app open access to /dev/ashmem" 2019-02-28 00:02:14 +00:00
Tri Vo
858ae7c145 Merge "Decouple system_suspend from hal attributes." am: c67a1ff8d9 am: e9aa4fc320
am: 4ac6a82aba

Change-Id: I98fe101822b62754dc2562d056cb3e92013c2be5
2019-02-27 13:38:07 -08:00
Tri Vo
4ac6a82aba Merge "Decouple system_suspend from hal attributes." am: c67a1ff8d9
am: e9aa4fc320

Change-Id: I04dc2d59e215c47bc5b5c2524143540e99d55a82
2019-02-27 13:33:59 -08:00
Alan Stokes
3f7cd0685b Merge "Audit execution of app_data_file by untrusted_app." am: 1c8b376f81 am: 4ced2163d7
am: 257490643a

Change-Id: I425abb1250a162c2d36f4bfcd0bad9fca2a52438
2019-02-27 13:30:21 -08:00
Tri Vo
e9aa4fc320 Merge "Decouple system_suspend from hal attributes."
am: c67a1ff8d9

Change-Id: I87ec7345cd1a5970cba7d7808c479c34cc7c202f
2019-02-27 13:29:52 -08:00
Tri Vo
c67a1ff8d9 Merge "Decouple system_suspend from hal attributes." 2019-02-27 21:25:27 +00:00
Alan Stokes
257490643a Merge "Audit execution of app_data_file by untrusted_app." am: 1c8b376f81
am: 4ced2163d7

Change-Id: I3e777b8525a25cefdbbdd0cdc093875464a52740
2019-02-27 13:21:53 -08:00
Tri Vo
8b12ff5f21 Neverallow app open access to /dev/ashmem
Apps are no longer allowed open access to /dev/ashmem, unless they
target API level < Q.

Bug: 113362644
Test: device boots, Chrome, instant apps work
Change-Id: I1cff08f26159fbf48a42afa7cfa08eafa1936f42
2019-02-27 21:17:25 +00:00
Alan Stokes
4ced2163d7 Merge "Audit execution of app_data_file by untrusted_app."
am: 1c8b376f81

Change-Id: I218480b0419c4b75b5d522fa6766e5bc86f1cf9a
2019-02-27 13:16:48 -08:00
Alan Stokes
1c8b376f81 Merge "Audit execution of app_data_file by untrusted_app." 2019-02-27 21:07:19 +00:00
Nicolas Geoffray
b6591f6652 Allow installd to scan JARs in /vendor/framework.
So it can dexopt these JARs.

Bug: 119800099
Test: DeviceBootTest.DeviceBootTest#SELinuxUncheckedDenialBootTest
Change-Id: I40b25319381654c607e17d6fc61e1a1c6fb0c1f1
2019-02-27 20:23:24 +00:00
Alan Stokes
931623e5b9 Audit execution of app_data_file by untrusted_app.
Test: Builds
Bug: 126536482
Change-Id: I9fe7623353cbb980db3853a8979f03ba033c7f45
2019-02-27 18:07:09 +00:00
Andreas Gampe
25065a2f64 Merge changes I6a76eba4,Iff1ecabc am: 025cab88ab am: cccc373fd2
am: 6b47e652fd

Change-Id: I585055f93e50de58efb660c399447506a70480b5
2019-02-27 09:20:50 -08:00
Andreas Gampe
6b47e652fd Merge changes I6a76eba4,Iff1ecabc am: 025cab88ab
am: cccc373fd2

Change-Id: I4264d21df01611f9901b06fb20f0dfdb5512216f
2019-02-27 09:08:40 -08:00
Andreas Gampe
cccc373fd2 Merge changes I6a76eba4,Iff1ecabc
am: 025cab88ab

Change-Id: I8de3d21fdca3a2444decf274250c7514131539bd
2019-02-27 09:04:53 -08:00
Andreas Gampe
025cab88ab Merge changes I6a76eba4,Iff1ecabc
* changes:
  Sepolicy: Move dex2oat and postinstall_dexopt to private
  Sepolicy: Move dac_override checks to private
2019-02-27 16:56:52 +00:00
Nikita Ioffe
b6cff4dc20 Merge "Allow apexd to reboot device" am: 53c0743d79 am: c96e3b1fc7
am: 91cce1fc3f

Change-Id: I7dbb697ce931277a36aee30189ea221fab5fbaf1
2019-02-27 05:09:19 -08:00
Nikita Ioffe
91cce1fc3f Merge "Allow apexd to reboot device" am: 53c0743d79
am: c96e3b1fc7

Change-Id: Icb36bfce890663742e08183fbfed4cbc784f2f21
2019-02-27 04:55:31 -08:00
Nikita Ioffe
c96e3b1fc7 Merge "Allow apexd to reboot device"
am: 53c0743d79

Change-Id: If70b976bceffc59f8b901286a24ce1fbf1ee6259
2019-02-27 04:38:02 -08:00
Nikita Ioffe
53c0743d79 Merge "Allow apexd to reboot device" 2019-02-27 08:49:32 +00:00
Nick Kralevich
f7f82f8f82 allow shell rs_exec:file rx_file_perms am: 68e27caeb6 am: b464e1944e
am: 81159c7e52

Change-Id: Idb5bd461ade773bd352156c71170c43154921085
2019-02-26 18:14:05 -08:00