Commit graph

21084 commits

Author SHA1 Message Date
Roland Levillain
3639c5dce7 Merge "Fix lock logspam for dexoptanalyzer."
am: d1936ac945

Change-Id: I6aae107f5234b1647c3822b581e1fd446c77bd99
2019-08-07 04:20:48 -07:00
Roland Levillain
d1936ac945 Merge "Fix lock logspam for dexoptanalyzer." 2019-08-07 10:35:39 +00:00
Remi NGUYEN VAN
bd3ab0278b Add MAINLINE_SEPOLICY_DEV_CERTIFICATES to keys.conf
DEFAULT_SYSTEM_DEV_CERTIFICATE is not appropriate as some OEMs may need
to change only the certificates used to generate
plat_mac_permissions.xml for mainline modules.

Test: m, checked output plat_mac_permissions.xml
Bug: 138097611
Bug: 134995443
Change-Id: Ie19130a243db043f432039c54c379f06e60ab6c6
2019-08-07 18:23:47 +09:00
Yifan Hong
92a0aa60b6 Merge "Allow update_engine to read virtual ab feature flag."
am: bfac74272a

Change-Id: I23968213768ee6fb5f2bab8e6238bee741011c11
2019-08-06 18:22:30 -07:00
Yifan Hong
bfac74272a Merge "Allow update_engine to read virtual ab feature flag." 2019-08-07 01:01:14 +00:00
Jon Spivack
74881bda63 Merge "Allow servicemanager to start processes"
am: 5fa2d8071b

Change-Id: I233ec0b00a442ca435944eac6a50bd22393722b4
2019-08-06 15:04:38 -07:00
Jon Spivack
5fa2d8071b Merge "Allow servicemanager to start processes" 2019-08-06 21:12:07 +00:00
Roland Levillain
47c7f84a20 Fix lock logspam for dexoptanalyzer.
Allow dexoptanalyzer(d) to lock `system_file` files, so that it can
lock `/system/framework/$ISA/*.art` files (which is harmless as these
files live in a read-only partition, but admittedly simplifies the
corresponding logic in ART).

Addresses denials of the form:

  avc: denied { lock } for path="/system/framework/arm/boot.art"
  dev="dm-0" ino=1330 scontext=u:r:dexoptanalyzer:s0
  tcontext=u:object_r:system_file:s0 tclass=file permissive=0 […]

Test: Reproduce steps in bug 138683603 and check the absence of SELinux denials
Bug: 138683603
Change-Id: I8a08822b4908b3b37bd0e450dd1356ed92332327
2019-08-06 14:51:01 +01:00
Yifan Hong
20010d199b Allow update_engine to read virtual ab feature flag.
Test: adb shell getprop -Z [the two flags]
Bug: 135752105

Change-Id: I3e0372e969ea0161787c32560a8c40fed2953619
2019-08-05 14:32:15 -07:00
Daniel Norman
ee5547dca8 Merge "Adds new policy for init_svc_debug_prop."
am: 95c9b61d3c

Change-Id: I866f58e08fd58226d209f15e8ea341cbd5c53261
2019-08-02 15:21:59 -07:00
Daniel Norman
95c9b61d3c Merge "Adds new policy for init_svc_debug_prop." 2019-08-02 21:51:17 +00:00
Tri Vo
a2da94ca2b Merge "system_suspend: remove /sys/power/wake_lock permissions"
am: 1e5524eb30

Change-Id: I243275e535d93887263ca4d93dd2e0e01d9c669c
2019-08-02 11:26:39 -07:00
Tri Vo
1e5524eb30 Merge "system_suspend: remove /sys/power/wake_lock permissions" 2019-08-02 17:44:04 +00:00
Daniel Norman
4eca819483 Adds new policy for init_svc_debug_prop.
Used to restrict properties init.svc_debug_pid.*

Bug: 138114550
Test: getprop | grep init.svc_debug_pid  only shows results on root
Change-Id: I0c10699deec4c548a2463a934e96b897ddee1678
2019-08-02 10:27:15 -07:00
Tri Vo
f517b7a5fd Merge "Label /product/lib(64)/* as system_lib_file"
am: 2765c29bef

Change-Id: I82ba26300d444ab3a31b4fd7f0ac5907d8da7060
2019-08-02 00:28:10 -07:00
Treehugger Robot
2765c29bef Merge "Label /product/lib(64)/* as system_lib_file" 2019-08-02 07:01:39 +00:00
Tomasz Wasilczyk
0540154021 SEPolicy rules for CAN bus HAL
am: 602b30302a

Change-Id: I5ae916b8f4c3d6038c48a522df1efc2ce8fc3d39
2019-08-01 19:34:47 -07:00
Jon Spivack
839e3db7c7 Allow servicemanager to start processes
Used to lazily start AIDL services.

Bug: 138756857
Test: Manual (using mediaextractor as a test service)
Change-Id: Ia1f2c10072e42d8917985c38500be0955f98b8eb
2019-08-02 00:23:16 +00:00
Tomasz Wasilczyk
602b30302a SEPolicy rules for CAN bus HAL
Bug: 135918744
Test: VTS (separate new change)
Change-Id: Idd3ca882e3bd36b95a5412bdfbf6fe9d6e911ba9
2019-08-01 10:24:00 -07:00
Changyeon Jo
c90bc366e6 Update sepolicy for EVS v1.x
am: 5ee628f0ce

Change-Id: I3aa2c140f2ab37a604ab70221926d15c25822bef
2019-07-30 19:57:29 -07:00
Changyeon Jo
5ee628f0ce Update sepolicy for EVS v1.x
Modify vendor file context and hal_evs_server policy to enable EVS v1.1
service.

Change-Id: I1e717b3209200300005c3fa7f91423589505a41c
Signed-off-by: Changyeon Jo <changyeon@google.com>
2019-07-30 13:22:03 -07:00
Tri Vo
3d58603623 Label /product/lib(64)/* as system_lib_file
Bug: 138545724
Test: n/a
Change-Id: Ic707229a04c2484503154110c45f4acb5ff61bd5
2019-07-29 12:39:10 -07:00
Tri Vo
5a5266e74c system_suspend: remove /sys/power/wake_lock permissions
Now that our tools are routed to system_suspend, there is no reason for
system_suspend to write to /sys/power/wake_[un]lock.

Bug: 128923994
Bug: 115946999
Test: boot blueline, no denials from system_suspend
Change-Id: I1097d30c050ce7d88677e07f4aaef07ce78dc958
2019-07-26 11:13:05 -07:00
Victor Chang
422d86ae03 Add sepolicy for com.android.i18n module
Bug: 137009149
Test: device boots
Change-Id: Ib6afa4437f1a844ade9a35e5d23e816e02edba35
2019-07-26 17:34:02 +01:00
Greg Hartman
a550160b92 Allow vendor to configure lmkd properties
am: 626114424f

Change-Id: I90510b01562d9c5cb291a0e75ae0b82db839e954
2019-07-26 07:10:35 -07:00
Greg Hartman
626114424f Allow vendor to configure lmkd properties
BUG: 138399045
Test: Boot cuttlefish. properties set
Change-Id: I3138048e9d13f8c0aee1ad3eb4e761809bafcf1d
2019-07-25 23:06:44 +00:00
Yifan Hong
7ae259e287 Merge "Allow charger to read ro.charger.*"
am: aff273f672

Change-Id: I3ad472cc32c14332d54222d7d3638c2b0f9315ae
2019-07-25 11:35:50 -07:00
Yifan Hong
aff273f672 Merge "Allow charger to read ro.charger.*" 2019-07-25 18:20:22 +00:00
Przemyslaw Szczepaniak
b8662b4e91 Merge "Add file contexts for com.android.neuralnetworks APEX package."
am: 3f233287d5

Change-Id: Ie6a809be0a43733a6e693f89ccda06edde8356ba
2019-07-24 02:25:57 -07:00
Przemyslaw Szczepaniak
3f233287d5 Merge "Add file contexts for com.android.neuralnetworks APEX package." 2019-07-24 09:12:18 +00:00
Elliott Hughes
509135ac69 Merge "Remove perfprofd references."
am: c807b3fd8a

Change-Id: I90501f397c29847e2e497f10515571fa10f9d992
2019-07-23 17:10:33 -07:00
Elliott Hughes
c807b3fd8a Merge "Remove perfprofd references." 2019-07-23 23:23:15 +00:00
Andrei-Valentin Onea
6863758a7b Merge "Add rule for platform_compat service"
am: 72211e36ad

Change-Id: I6eca69732654e27a9192b4bdca27908539ff0b1e
2019-07-23 08:01:19 -07:00
Andrei-Valentin Onea
72211e36ad Merge "Add rule for platform_compat service" 2019-07-23 14:40:36 +00:00
Kiyoung Kim
de9e5f8723 Merge "Enable Kernel log from linkerconfig"
am: 4fd03ba7b3

Change-Id: Id0090fc516bbbd865e3772af0f26f92d7d9daea5
2019-07-23 03:45:15 -07:00
Treehugger Robot
4fd03ba7b3 Merge "Enable Kernel log from linkerconfig" 2019-07-23 10:27:35 +00:00
Kiyoung Kim
2d5f2e242d Enable Kernel log from linkerconfig
LinkerConfig generator runs from early init, so if there is any warning
/ error then logs can be only found from kernel log. To enable kernel
logging from linkerconfig, specific policy should be added.

Test: m -j && Tested from Cuttlefish
Change-Id: I6c49d7693e0334ae8550891b72bcb04e37c16d89
2019-07-23 13:42:55 +09:00
Yifan Hong
1145be1fc3 Allow charger to read ro.charger.*
Allow charger to read system properties with this prefix
so that charger's behavior is controlled by runtime.

Test: run offline charging on walleye
Bug: 124118169
Change-Id: I4266b2d043a5323b4adbd1636ada46b7e08ca667
2019-07-22 14:32:03 -07:00
chunhui.li
7ce480885f Merge "fix data/asan/product/lib(64) can't access by platform_app issue"
am: 386701db0a

Change-Id: Id60bc60e69e62d7a83a843816a6121b9055a4f44
2019-07-19 16:32:23 -07:00
Treehugger Robot
386701db0a Merge "fix data/asan/product/lib(64) can't access by platform_app issue" 2019-07-19 23:02:40 +00:00
Wei Wang
c0d613c53f Merge "Fix: dumpstate HAL service property context"
am: 0962dd9e91

Change-Id: I857f9fdb226cac386495635aaa8b5aaa416dd2a9
2019-07-19 12:54:22 -07:00
Wei Wang
0962dd9e91 Merge "Fix: dumpstate HAL service property context" 2019-07-19 19:46:55 +00:00
David Anderson
ec5bf1a250 Merge "Allow gsid to create and access loop devices."
am: 23ba03fc8d

Change-Id: Ifef169b3a5b256daec51ffe3ed4b7bf452e00d39
2019-07-19 12:45:52 -07:00
David Anderson
23ba03fc8d Merge "Allow gsid to create and access loop devices." 2019-07-19 19:35:26 +00:00
Tom Cherry
af9b6fc10b Merge "Allow domain access r_file_perms for passwd and group files"
am: aa4af2c082

Change-Id: I352be482e68c35e03e1757904fa6b56906c93f3b
2019-07-19 11:33:45 -07:00
Elliott Hughes
132b081ee3 Remove perfprofd references.
perfprofd was never finished, and has been removed.

Test: treehugger
Change-Id: I4fc8aa9b737360a66d89c5be39651284ee2d6ffd
2019-07-19 11:15:12 -07:00
Tom Cherry
aa4af2c082 Merge "Allow domain access r_file_perms for passwd and group files" 2019-07-19 18:00:41 +00:00
Andrei Onea
2bbcc9db89 Add rule for platform_compat service
Bug: 137769727
Test: m
Change-Id: Ib6160a82597198f4a120592293f90ffe1ffb123b
2019-07-19 18:57:11 +01:00
Tom Cherry
da05f1d6b8 Allow domain access r_file_perms for passwd and group files
In b/73062966, we add new AID ranges for each partition that doesn't
yet have them (system, system_ext, odm, product).  We also add group
and passwd files to these partitions to be able to map these AIDs into
human readable user and group names, and vice versa.

All processes should be able to read all users and groups.  We divide
the ranges into non-overlapping regions for each partition and we
namespace the names with the partition name as a prefix.

Allow domain r_file_perms to
/(system|product|system_ext)/etc/(group|passwd).

Vendor and odm passwd and group files already have this access, since
/(vendor|odm)/etc/* is already domain readable.

Example contents:
blueline:/ $ cat /system/etc/passwd
system_tom::6050:6050::/:/bin/sh
blueline:/ $ cat /product/etc/passwd
product_tom::7013:7013::/:/bin/sh

Bug: 73062966
Test: tree-hugger selinux denial during boot test
Change-Id: Ib4dc31778e95e952174e1365497feaf93dca7156
2019-07-19 09:19:23 -07:00
Wei Wang
046c510402 Fix: dumpstate HAL service property context
http://aosp/678384 changed property format

Fixes: 137695210
Test: inject timeout and take BR see dumpstate restarted
Change-Id: Ie24e2d42e92410a935ca4c9364b476d72aa459f3
2019-07-19 15:04:44 +08:00