Commit graph

30085 commits

Author SHA1 Message Date
Orion Hodson
829f582107 Merge "Allow app_zygote to read zygote_tmpfs." 2021-07-05 09:10:23 +00:00
Treehugger Robot
6ab599ec46 Merge "allow init to access watermark_boost_factor" 2021-07-04 08:16:08 +00:00
Treehugger Robot
8ea29cd4de Merge "Allow the kernel to read shell_data_file" 2021-07-02 19:13:46 +00:00
Yabin Cui
e43222e19b Merge changes Ia2defe72,Icef1ebdd
* changes:
  allow simpleperf to profile more app types.
  simpleperf_app_runner: move rules to private.
2021-07-02 16:37:38 +00:00
Treehugger Robot
59c063b866 Merge "Allow AudioServer find for mediaprovider_app" 2021-07-02 15:04:11 +00:00
Orion Hodson
57907a87dc Allow app_zygote to read zygote_tmpfs.
app_zygote inherits tmpfs files from zygote, and needs to be able to
stat them after fork.

Bug: 192634726
Bug: 192572973
Bug: 119800099
Test: manually configure JIT zygote and run
 atest \
   CtsExternalServiceTestCases:\
   android.externalservice.cts.ExternalServiceTest\
   #testBindExternalServiceWithZygote
Change-Id: I401808c984edd4e3e4ef335f6a75cecc5cf69eca
2021-07-02 14:36:00 +00:00
Nikita Ioffe
1f1db28719 Merge "Allow otapreopt_chroot to call otadexopt binder service" 2021-07-02 14:20:12 +00:00
Orion Hodson
0b8ab878b4 Merge "Allow zygotes and installd to read odsign properties" 2021-07-02 10:19:45 +00:00
Andrew Walbran
3e85e8e5a5 Merge "Allow more permissions for removing VirtualizationService data directory." 2021-07-02 09:34:42 +00:00
Sahana Rao
21d69b1222 Allow AudioServer find for mediaprovider_app
As part of PhotoPicker, we will be playing the video. To allow video
playback, allow AudioServer `find` access for mediaprovider_app.

Bug: 169737802
Test: Verified that video playback works in PhotoPicker
Change-Id: Ie5acb77b2f446ee8af6cf384fd5a66bf64a15752
2021-07-02 10:23:04 +01:00
Orion Hodson
f135ce393c Allow zygotes and installd to read odsign properties
Bug: 192049377
Test: manual
Change-Id: I88cfd0b7fa63f195a1ec8f498c106cbf95f649ec
2021-07-01 14:18:51 +01:00
Hasini Gunasinghe
3e20b2895f Merge "Add keystore permission for metrics re-routing." 2021-07-01 12:30:08 +00:00
Treehugger Robot
0aab569bd3 Merge "seapp_contexts: Remove unused selectors" 2021-07-01 10:44:49 +00:00
Andrew Walbran
dc5f1a90db Allow more permissions for removing VirtualizationService data directory.
Bug: 192506182
Bug: 184131523
Test: mm
Change-Id: I40c94f124d55508d038346d7dd3234cad428819a
2021-07-01 10:12:03 +00:00
Jeff Vander Stoep
35779f082f seapp_contexts: Remove unused selectors
These have never been used in AOSP. Looking at ~10,000 Android
build images confirms that these are not used elsewhere within
the Android ecosystem.

Bug: 192532348
Test: build (failures here would be at build-time)
Change-Id: I787b14b531df31fbb9995156eb2e84719b7c90da
2021-07-01 10:51:12 +02:00
Martin Liu
4db56b0b52 allow init to access watermark_boost_factor
Bug: 189938926
Test: boot
Signed-off-by: Martin Liu <liumartin@google.com>
Change-Id: I07c8490c94c837952921e95f12efa6213edbf056
2021-07-01 12:24:52 +08:00
Rachel Lee
cf8f6ef363 Merge "Add sepolicy SF native boot namespace." 2021-07-01 01:05:22 +00:00
Yabin Cui
26de4c4ecc allow simpleperf to profile more app types.
So simpleperf can profile these apps when they are marked to be
profileable/debuggable.

Bug: 192404394
Test: build and run simpleperf to profile com.android.systemui.
Change-Id: Ia2defe725a8fafbcb6c2d20e771b343d8822ccbc
2021-06-30 17:24:05 -07:00
Yabin Cui
41a18f5bf3 simpleperf_app_runner: move rules to private.
Bug: 192404394
Test: build
Change-Id: Icef1ebdd59668b31a07ac0a5aea30a87eac1da45
2021-06-30 17:24:05 -07:00
Hasini Gunasinghe
4334d35f01 Add keystore permission for metrics re-routing.
Keystore2 atoms need to be rounted to statsd via a proxy.
The proxy needs to have this permission in order to pull metrics from
keystore.

Ignore-AOSP-First: No mergepath to AOSP.
Bug: 188590587
Test: Statsd Testdrive script
Change-Id: Ic94f4bb19a08b6300cfd2d3ed09b31d5b7081bfd
Merged-In: Ic94f4bb19a08b6300cfd2d3ed09b31d5b7081bfd
(cherry picked from commit 61d07e7ce0)
2021-06-30 17:02:14 -07:00
rnlee
b6142ecc22 Add sepolicy SF native boot namespace.
Following go/android-native-flag-api-manual.

Bug: 190769260
Test: make.
Change-Id: I84fe7e9d046fbbe737f09043589b19e71981f521
2021-06-30 14:07:44 -07:00
Janis Danisevskis
4678660d83 Rename vpnprofilestore to legacykeystore.
Bug: 191373871
Test: N/A
Merged-In: I3f11827909bd37a2127069de82670776a8e192b3
Change-Id: I3f11827909bd37a2127069de82670776a8e192b3
2021-06-30 12:40:39 -07:00
Treehugger Robot
81a677b948 Merge "Add vehicle_binding_util SELinux context" 2021-06-30 18:44:00 +00:00
Jooyung Han
4b8ece3683 Allow the kernel to read shell_data_file
In ApexTestCases, a temp file in /data/local/tmp is used via a loop
device, which requires the kernel to read it.

This is only allowed in userdebug/eng.

Bug: 192259606
Test: ApexTestCases
Change-Id: Ic7d3e67a8a3e818b43b7caead9053d82cbcbccf7
2021-07-01 00:04:41 +09:00
Nikita Ioffe
ed3407eaac Allow otapreopt_chroot to call otadexopt binder service
Before otapreopt_script was indirectly interacting with otadexopt binder
service via `shell cmd otadexopt` interface, but now the interaction is
moved to otapreopt_chroot binary to reduce amount of times we need to
run this binary.

For more context see: aosp/1750143.

Test: m
Bug: 190223331
Change-Id: Ib32cbbbf8f3bd9b5c1b696e39f776631ae60d712
2021-06-30 15:37:05 +01:00
Paul Hobbs
f6fc9377ad Revert "untrusted_app_30: add new targetSdk domain"
Revert "Ignore SELinux denials for all untrusted_app domains"

Revert "Update tests to check RTM_GETNEIGH{TBL} restrictions"

Revert submission 1748045-getneigh-enable-restrictions

Reason for revert: Breaks android.net.netlink.NetlinkSocketTest#testBasicWorkingGetNeighborsQuery with permissions error.

Bug: 192406650

Reverted Changes:
Iea29a1b36:Ignore SELinux denials for all untrusted_app domai...
I14b755020:Update tests to check RTM_GETNEIGH{TBL} restrictio...
I32ebb407b:untrusted_app_30: add new targetSdk domain
I8598662b7:libsepol: trigger new RTM_GETNEIGH{TBL} behavior

Change-Id: I525544191520607fdd238b5ac55aa5132f679253
2021-06-30 07:41:39 +00:00
Bram Bonné
55badc22c1 untrusted_app_30: add new targetSdk domain
Enforce new requirements on app with targetSdkVersion=32 including:
- No RTM_GETNEIGH on netlink route sockets.
- No RTM_GETNEIGHTBL on netlink route sockets.

Bug: 171572148
Test: atest NetworkInterfaceTest
Test: atest bionic-unit-tests-static
Test: atest CtsSelinuxTargetSdkCurrentTestCases

Change-Id: I32ebb407b8dde1c872f53a1bc3c1ec20b9a5cb49
2021-06-29 17:50:22 +02:00
Nicolas Geoffray
f78486241f Merge "Fix braino in dexoptanalyzer policy and add dex2oat postinstall rule." 2021-06-29 13:13:42 +00:00
Nicolas Geoffray
f82451e0a4 Fix braino in dexoptanalyzer policy and add dex2oat postinstall rule.
Test: m
Bug: 190817237
Change-Id: I4f73d7a137f2e2ee9497ca5e4c8ef28b3f86c35c
2021-06-29 12:57:14 +01:00
Treehugger Robot
ec30c418f9 Merge "Extend hal_uwb_server neverallow" 2021-06-29 05:22:39 +00:00
Treehugger Robot
5e591f7aeb Merge "Allow gettattr on VirtualizationService data directory too." 2021-06-29 04:27:34 +00:00
Keith Mok
a216b0d1b9 Add vehicle_binding_util SELinux context
Adds required context for 'vehicle_binding_util' to 'vold' interactions.
The vehicle_binding_util actually fork/execvp vdc.
And vdc will call vold to set the binding seed value.

Test: manual 'make'
Bug: 157501579
Change-Id: I5194c9cd0f5a910b1309b547aabf66bb9c397738
2021-06-28 22:17:50 +00:00
Thiébaud Weksteen
53ef2e85e2 Merge "Add fusefs_type for FUSE filesystems" 2021-06-28 12:39:58 +00:00
Thiébaud Weksteen
9ec532752d Add fusefs_type for FUSE filesystems
Any FUSE filesystem will receive the 'fuse' type when mounted. It is
possible to change this behaviour by specifying the "context=" or
"fscontext=" option in mount().

Because 'fuse' has historically been used only for the emulated storage,
it also received the 'sdcard_type' attribute. Replace the 'sdcard_type'
attribute from 'fuse' with the new 'fusefs_type'. This attribute can be
attached on derived types (such as app_fusefs).

This change:
- Remove the neverallow restriction on this new type. This means any
  custom FUSE implementation can be mounted/unmounted (if the correct
  allow rule is added). See domain.te.
- Change the attribute of 'fuse' from 'sdcard_type' to 'fusefs_type'.
  See file.te.
- Modify all references to 'sdcard_type' to explicitly include 'fuse'
  for compatibility reason.

Bug: 177481425
Bug: 190804537
Test: Build and boot aosp_cf_x86_64_phone-userdebug
Change-Id: Id4e410a049f72647accd4c3cf43eaa55e94c318f
2021-06-28 13:18:46 +02:00
Michael Ayoubi
07aa892503 Extend hal_uwb_server neverallow
Bug: 187386527
Test: Boot and confirm HAL is up

Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: I2abf108f2504997b06c0269f905608d8063cb3b4
Merged-In: I2abf108f2504997b06c0269f905608d8063cb3b4
2021-06-28 03:10:49 +00:00
Orion Hodson
9e65acaba3 Merge "Allow system_server_startup to load system server odex files" 2021-06-25 09:09:01 +00:00
Treehugger Robot
230a6c5e96 Merge "Ensure that only desired processes can access TracingServiceProxy" 2021-06-24 20:45:29 +00:00
Treehugger Robot
757bfdfa04 Merge "Allow keymint to access tee-device" 2021-06-24 18:38:40 +00:00
Andrew Walbran
0b70b863cf Allow gettattr on VirtualizationService data directory too.
Bug: 191834767
Bug: 184131523
Test: mm
Change-Id: I9318a67a31b4ddb5a421211775bf0b2958880f2f
2021-06-24 14:26:07 +00:00
Dario Freni
01fcc28368 Allow apexd to create links in otapreopt_chroot.
Bug: 191919967
Test: triggered bug on cf by running
m dist && python3 system/update_engine/scripts/update_device.py out/dist/cf_x86_64_phone-ota-eng.dariofreni.zip

Change-Id: I7a3abfdecd2d2276a291ab6c1ffe9a7d3f5fd60a
2021-06-24 14:09:09 +00:00
Carmen Jackson
a60d7f28f2 Ensure that only desired processes can access TracingServiceProxy
This change adds a neverallow rule in traced.te to limit the processes
that can find tracingproxy_service, the context for TracingServiceProxy.

I wanted to avoid moving the tracingproxy_service definition to public,
so there were a few services that are exempted from this neverallow
rule.

Bug: 191391382
Test: Manually verified that with this change, along with the other
change in this topic, I see no errors when taking a bugreport while a
Traceur trace is running.

Change-Id: I8658df0db92ae9cf4fefe2eebb4d6d9a5349ea89
2021-06-24 08:24:20 +00:00
Orion Hodson
7778e8cdb3 Allow system_server_startup to load system server odex files
Bug: 180949581
Test: atest odsign_e2e_tests

Change-Id: I897e909fb2037c17f33f02155f87565d5e0f4fa1
2021-06-24 09:02:56 +01:00
Treehugger Robot
042fc93ecd Merge "Fix recovery denials when reading /proc/bootconfig" 2021-06-24 07:58:59 +00:00
Treehugger Robot
097a8b4e29 Merge "sepolicy: allow recovery to operate devpts and kmsg" 2021-06-24 01:33:52 +00:00
Devin Moore
da280b014f Fix recovery denials when reading /proc/bootconfig
These denials were found in the logs of a test failure that entered
recovery mode.
Recovery uses libfs_mgr which reads /proc/bootconfig.

Test: Boot device into recovery and check for "avd: denied" logs
Bug: 191904998
Bug: 191737840
Change-Id: I96ae514cfd68856717e143d295f2838a7d0eff14
2021-06-23 14:11:48 -07:00
Christian Wailes
842164e290 Merge "Add SELinux policy to allow testing of artd" 2021-06-22 22:44:57 +00:00
Treehugger Robot
2dd76a76f3 Merge "Update automotive_display_service selinux policy" 2021-06-22 11:20:06 +00:00
Nicolas Geoffray
635853a710 Merge "Allow dexoptanalyzer to read /apex/apex-info-list.xml" 2021-06-21 14:59:56 +00:00
Treehugger Robot
79f1fc195c Merge "sepolicy: Allow to receive FDs from app_zygote" 2021-06-21 10:58:13 +00:00
Nicolas Geoffray
5441f77848 Allow dexoptanalyzer to read /apex/apex-info-list.xml
This is needed to know the state of a .oat file.

Test: m
Bug: 190817237
Change-Id: I76f4212bf4d4273d72bdd0485c2203499ae3c6bb
2021-06-21 10:24:38 +01:00