Commit graph

28434 commits

Author SHA1 Message Date
Treehugger Robot
b4e7838a0b Merge "Untrusted_app: audit NETLINK_ROUTE bind and RTM_GETLINK" 2020-12-11 19:20:09 +00:00
Alan Stokes
7aa40413ae Split user_profile_data_file label.
user_profile_data_file is mlstrustedobject. And it needs to be,
because we want untrusted apps to be able to write to their profile
files, but they do not have levels.

But now we want to apply levels in the parent directories that have
the same label, and we want them to work so they need to not be
MLS-exempt. To resolve that we introduce a new label,
user_profile_root_file, which is applied to those directories (but no
files). We grant mostly the same access to the new label as
directories with the existing label.

Apart from appdomain, almost every domain which accesses
user_profile_data_file, and now user_profile_root_file, is already
mlstrustedsubject and so can't be affected by this change. The
exception is postinstall_dexopt which we now make mlstrustedobject.

Bug: 141677108
Bug: 175311045
Test: Manual: flash with wipe
Test: Manual: flash on top of older version
Test: Manual: install & uninstall apps
Test: Manual: create & remove user
Test: Presubmits.
Change-Id: I4e0def3d513b129d6c292f7edb076db341b4a2b3
2020-12-11 17:35:06 +00:00
Jeff Vander Stoep
2eaa33d95e Untrusted_app: audit NETLINK_ROUTE bind and RTM_GETLINK
Test: build
Bug: 170188668
Bug: 170214442
Change-Id: I79384318ad4031b4bf14ae243e41f01469288e55
2020-12-11 14:10:19 +01:00
Orion Hodson
c06806771d Merge "Revert "Move keymint to android.hardware.security."" 2020-12-11 12:29:46 +00:00
Gavin Corkery
700b58be6c Merge "Add file contexts for com.android.scheduling" 2020-12-11 11:04:18 +00:00
Orion Hodson
16d61d0383 Revert "Move keymint to android.hardware.security."
Revert submission 1522123-move_keymint

Reason for revert: Build breakage
Bug: 175345910
Bug: 171429297
Reverted Changes:
Ief0e9884a:Keystore 2.0: Move keymint spec to security namesp...
Idb54e8846:Keystore 2.0: Move keymint spec to security namesp...
I9f70db0e4:Remove references to keymint1
I2b4ce3349:Keystore 2.0 SPI: Move keymint spec to security na...
I2498073aa:Move keymint to android.hardware.security.
I098711e7d:Move keymint to android.hardware.security.
I3ec8d70fe:Configure CF to start KeyMint service by default.
Icbb373c50:Move keymint to android.hardware.security.
I86bccf40e:Move keymint to android.hardware.security.

Change-Id: Ib5591c2379bbd2fd6dde0558ba0e68f39d27fbaf
2020-12-11 10:45:43 +00:00
Jiyong Park
c99eb585c9 Add com.android.virt
com.android.virt is an APEX for virtual machine monitors like crosvm.
The APEX currently empty and isn't updatable.

Bug: 174633082
Test: m com.android.virt

Change-Id: I8acc8e147aadb1701dc65f6950b61701131f89d2
2020-12-11 16:22:25 +09:00
John Stultz
f30cc10961 sepolicy: Add the dmabuf system-uncached heap
This should match policy for the system heap as they both map to
the ION system heap with the ION_FLAG_CACHED flag on or off.

Change-Id: Ib2929b84a2f8092adcf2f874ad6ccdfe068fe6dc
Signed-off-by: John Stultz <john.stultz@linaro.org>
2020-12-11 07:07:51 +00:00
Mohammad Samiul Islam
a45cddae5e Allow priv_app read access to /data/app-staging directory
During staged installation, we no longer create duplicate sessions for
verification purpose. Instead, we send the original files in
/data/app-staging folder to package verifiers for verification. That
means, Phonesky needs access to /data/app-staging folder to be able to
verify the apks inside it.

Bug: 175163376
Test: atest StagedInstallTest#testPlayStoreCanReadAppStagingDir
Test: atest StagedInstallTest#testAppStagingFolderCannotBeReadByNonPrivApps
Change-Id: I5cbb4c8b7dceb63954c747180b39b4a21d2463af
2020-12-10 23:46:15 +00:00
Shawn Willden
feaa06f90e Merge "Move keymint to android.hardware.security." 2020-12-10 22:49:14 +00:00
Selene Huang
2c3bdb28de Move keymint to android.hardware.security.
Test: VtsAidlKeyMintTargetTest
Change-Id: I098711e7ddbcac0fc761801a1bf582a71a8f9baa
2020-12-10 19:12:29 +00:00
Songchun Fan
a3c0b3f447 system_app: remove unnecessary changes to neverallow
Follow-up for aosp/1520729. These are no longer needed.

Test: build
BUG: 175121264
Change-Id: I7f01d4d4cee18751f4321ef8efa68f9faae06d4f
2020-12-10 19:03:25 +00:00
Janis Danisevskis
d5ad76b0c4 Add policy for the android protected confirmation service.
This is the service offered by Keystore 2.0 to provide APC service to
application. It was formerly part of the IKeystoreService interface.
Not it is an interface in ints own right.

Test: Keystore 2.0 can register the apc service interface.
      Apps can lookup and call this interface.
Bug: 159341464
Change-Id: I058adf0021d9b89f4eac7534e366c29071f0f98b
2020-12-10 10:58:11 -08:00
Gavin Corkery
a1bd4fc620 Add file contexts for com.android.scheduling
Test: Build and flash
Bug: 161353402
Change-Id: I0e897dae34650022dc36cd95bc8519339d615bf8
2020-12-10 14:55:22 +00:00
Treehugger Robot
c0d1040d58 Merge "Export ro.vendor.product.cpu.abilist*" 2020-12-10 09:01:40 +00:00
Xin Li
0777adef5e DO NOT MERGE - Merge Android R QPR1
Bug: 172690556
Merged-In: Ibc15a90266d1f30174d6590a157571507e8ee31a
Change-Id: I279c3cc3cfcf8e6c28b3cddf98fee6e47f4b46a5
2020-12-09 17:44:05 -08:00
Chong Zhang
2cbfd01949 add mediatranscoding to apex file context am: 9aed64920f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1522099

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ibc15a90266d1f30174d6590a157571507e8ee31a
2020-12-10 01:01:17 +00:00
Chong Zhang
9aed64920f add mediatranscoding to apex file context
bug: 159172726
Change-Id: I8fbedab2605167af637108d5f564abf6c78c32bd
2020-12-09 14:26:14 -08:00
Treehugger Robot
66ed360b5e Merge "Update 30.0 prebuilts to latest rvc-dev policy" am: 34d974838e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1521437

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I49504f4d757ff4449cf7940f743687d2b2a86e84
2020-12-09 16:45:03 +00:00
Treehugger Robot
34d974838e Merge "Update 30.0 prebuilts to latest rvc-dev policy" 2020-12-09 16:09:12 +00:00
Treehugger Robot
60e32df155 Merge "Allow PermissonController to find app_api_service and system_api_service." am: a56c9eb016
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1519814

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I45dad0c44cdcf3d0cdd7e41bf5414d98db651610
2020-12-09 15:55:28 +00:00
Treehugger Robot
a56c9eb016 Merge "Allow PermissonController to find app_api_service and system_api_service." 2020-12-09 15:25:42 +00:00
Treehugger Robot
a801411fef Merge "drmserver: audit permissions for /data/app" am: 951fc0b044
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1520730

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I86000c02ee3aad36710db934e046a022e1dd2e52
2020-12-09 13:12:16 +00:00
Treehugger Robot
951fc0b044 Merge "drmserver: audit permissions for /data/app" 2020-12-09 12:38:06 +00:00
Inseob Kim
3b8b4251b7 Update 30.0 prebuilts to latest rvc-dev policy
For whatever reason, system/sepolicy/prebuilts/api/30.0 and rvc-dev's
system/sepolicy differ a little. This makes 30.0 prebuilts up-to-date
and also updates plat_pub_versioned.cil, built from aosp_arm64-eng
target on rvc-dev branch.

Bug: 168159977
Test: m selinux_policy
Change-Id: I03e8a40bf021966c32f0926972cc2a483458ce5b
2020-12-09 20:44:38 +09:00
Treehugger Robot
56d552af6d Merge "system_app: remove adb data loader permissions" am: db87cdf6a8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1520729

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I24c9712f07b70e9ecadfc0e4ff46a92157a86938
2020-12-09 11:25:06 +00:00
Hai Zhang
86e10ef55d Allow PermissonController to find app_api_service and system_api_service.
PermissionController is updatable, so we may need to call new APIs in newer versions.

Change-Id: I0a6657ad1f27e1e2fdc320184268966009d3a4fc
2020-12-09 11:10:06 +00:00
Treehugger Robot
db87cdf6a8 Merge "system_app: remove adb data loader permissions" 2020-12-09 10:36:14 +00:00
Jeff Vander Stoep
5e6d60a2a5 drmserver: audit permissions for /data/app
We would like to assert that only PackageManager can make
modifications to /data/app. However, I first need to remove
some existing permissions that seem like they are no longer
used (as per jtinker@). Add audit statements to confirm.

Test: build
Change-Id: Ie5ec5199f7e2f862c4d16d8c86b9b0db6fbe481c
2020-12-09 09:16:51 +01:00
Jeff Vander Stoep
07aee66679 system_app: remove adb data loader permissions
Per schfan@ these are no longer needed.

Test: build
Change-Id: Idda1d9775fdd38cbd53c3652b567ddfc5beca0a6
2020-12-09 08:58:23 +01:00
Christian Wailes
06e163b290 Merge "Added permissions for new dexopt flags." am: 93e6997181
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1480337

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I882363b3cf293f5bac811e5d6b2c914935b6031a
2020-12-09 01:22:52 +00:00
Christian Wailes
93e6997181 Merge "Added permissions for new dexopt flags." 2020-12-09 00:00:26 +00:00
Hyunyoung Song
9b5f691ed1 New system service: search_ui_service
- Update policy for new system service, used for Launcher/Apps to
fetch and render search results in their UI.

Bug: 162234997
Test: manual verification ($ adb shell service list)


Reference CL: aosp/831251

Change-Id: If3ae22aa2ad1d13aeac3dfefc5244db4b1734d96
2020-12-08 15:55:01 -08:00
Maciej Żenczykowski
afd4d49733 Allow network_stack to synchronize the kernel rcu am: 5a7e49e525
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516277

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I19840b4bafacb69561cec658b5a076988e4c4dc7
2020-12-08 22:47:33 +00:00
Kalesh Singh
545c5bfe47 Memtrack HAL stable aidl sepolicy
Bug: 175021432
Test: Check logcat for denials
Change-Id: I5e1d0e006d86a65552acb78c23b421155881555b
2020-12-08 14:09:09 -05:00
Maciej Żenczykowski
5a7e49e525 Allow network_stack to synchronize the kernel rcu
via opening/closing a PF_KEY socket (this mirrors netd's privs)

Bug: 173167302
Test: m
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ia2c2cb52c4ec9149db29dc86a7927e3432bd2b9b
2020-12-08 14:49:20 +00:00
Adam Shih
9c9386d68d never allow untrusted apps accessing debugfs_tracing am: 2543715187
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1513758

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I28a14b4f551938725684dcd1153c48fc67d3da53
2020-12-08 02:26:32 +00:00
Chris Wailes
4540efcf73 Added permissions for new dexopt flags.
Bug: 173137187
Test: build
Merged-In: Iad1d23277915e1dbf655b0f2820320f15462ab33
Change-Id: Iad1d23277915e1dbf655b0f2820320f15462ab33
2020-12-07 16:15:24 -08:00
Adam Shih
2543715187 never allow untrusted apps accessing debugfs_tracing
debugfs_tracing can only be accessed by tracing tools provided by the
platform.

Bug: 172028429
Test: boot with no relevant log showing up
Change-Id: I412dd51a1b268061c5a972488b8bc4a0ee456601
2020-12-07 16:33:59 +08:00
Hai Zhang
6ac5499355 Add SELinux policy for legacy permission service. am: 04db97a72d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1518957

Change-Id: I049bf9c591c539f698ba4cf7a172a2b7a0439ea4
2020-12-06 01:12:29 +00:00
Hai Zhang
04db97a72d Add SELinux policy for legacy permission service.
The updatable and non-updatable permission manager cannot share one
AIDL, so we need to create a new system service for the non-updatable
legacy one, and add the SELinux policy for it.

Bug: 158736025
Test: presubmit
Change-Id: Ief8da6335e5bfb17d915d707cf48f4a43332f6ae
2020-12-04 14:43:33 -08:00
Dmitri Plotnikov
682fa8c22b Merge "Add sched_process_free to debugfs_tracing label" am: 5d23015a3d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1517343

Change-Id: I13e85a4ccc056e0d1aca0c7d9f2afbeff03b1ea5
2020-12-04 19:20:05 +00:00
Dmitri Plotnikov
5d23015a3d Merge "Add sched_process_free to debugfs_tracing label" 2020-12-04 18:05:11 +00:00
Jonglin Lee
8ef765aa93 Merge "Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"" am: 7ce5e714e5
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516549

Change-Id: Id114a507f1c9ad1059c39ce4121d7330e72fe14c
2020-12-04 05:09:02 +00:00
Jonglin Lee
7ce5e714e5 Merge "Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"" 2020-12-04 04:47:39 +00:00
Jonglin Lee
51c04ac27b Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"
Revert submission 1511692-cgroup v2 uid/pid hierarchy

Reason for revert: Causing intermittent cgroup kernel panics
Reverted Changes:
I80c2a069b:sepolicy: rules for uid/pid cgroups v2 hierarchy
I73f3e767d:libprocessgroup: uid/pid hierarchy for cgroup v2

Bug: 174776875
Change-Id: I63a03bb43d87c9aa564b1436a45fd5ec023aac87
Test: Locally reverted and booted 100 times without kernel panic
2020-12-04 03:12:59 +00:00
Kevin Chyn
83418f088b Merge "Add SEPolicy for fingerprint2.2 example HAL" am: 9e8896ee4b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516278

Change-Id: I8f23e1a57418999cc3156a5f37057febebf3f203
2020-12-04 01:24:03 +00:00
Kevin Chyn
9e8896ee4b Merge "Add SEPolicy for fingerprint2.2 example HAL" 2020-12-04 01:17:07 +00:00
Kiyoung Kim
39afa48eab Merge "Support linkerconfig in Runtime APEX" am: 34395349f8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1512755

Change-Id: Icfe8b0ddf01d345b23b51004a3bb4911b5b3f3fa
2020-12-04 01:12:26 +00:00
Kiyoung Kim
34395349f8 Merge "Support linkerconfig in Runtime APEX" 2020-12-04 01:00:06 +00:00