Commit graph

17452 commits

Author SHA1 Message Date
David Anderson
8c9f1e4119 Allow gatekeeperd to read ro.gsid.image_running.
Bug: 123716647
Test: PIN authentication works after booting into a GSI
Change-Id: Id1af1e207988eedbcce5e530c167994bf34cf7e2
2019-02-19 21:08:22 +00:00
David Anderson
8fe3c74654 Add sepolicy for gsid properties, and allow system_server to read them.
Bug: 123777418
Test: manual test
Change-Id: I9f8c721dfd074e638573d85cf1d8045a69c3854e
2019-02-19 21:08:09 +00:00
Gavin Corkery
52c1d81aa4 Merge "Rename data/staging to data/pkg_staging." 2019-02-19 19:44:13 +00:00
Gavin Corkery
2db5015b4c Rename data/staging to data/pkg_staging.
Test: Build and flash, atest apex_e2e_tests
Fixes: 122999313
Change-Id: I2cfa49d8467d67edc470b1cade3746426fa86e37
Merged-In: I2cfa49d8467d67edc470b1cade3746426fa86e37
2019-02-19 15:51:14 +00:00
Jeff Vander Stoep
b3b7543de6 Whitelist flaky presubmit failures
These denials already have tracking bugs.

Addresses
avc: denied { write } for comm=".gms.persistent" name="0" dev="tmpfs"
scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:mnt_user_file:s0
tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for path="/data/system_ce/0/accounts_ce.db"
scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=0

Bug: 124108085
Bug: 118185801
Test: build tests
Change-Id: I97192e5c85d8d3a9efe950a0bbb33ea88aac76bd
2019-02-18 21:24:46 +00:00
Jeff Vander Stoep
504a654983 crash_dump: dontaudit gpu_device access
And add neverallow so that it's removed from partner policy if
it was added there due to denials.

Fixes: 124476401
Test: build
Change-Id: I16903ba43f34011a0753b5267c35425dc7145f05
2019-02-18 21:06:42 +00:00
Remi NGUYEN VAN
ec651944a0 Merge "sepolicy change for NetworkStack signature" 2019-02-16 01:48:49 +00:00
Sudheer Shanka
161601cbf6 Merge "Track untrusted_app_27 SELinux denial" 2019-02-15 22:26:09 +00:00
Mark Salyzyn
bd80e63e03 fs_mgr: overlayfs support legacy devices (marlin) Part Deux
On legacy devices system_<other> partition is blocked from
becoming the backing store under certain circumstances.

Test: system/core/fs_mgr/tests/adb-remount-test.sh
Bug: 120448575
Bug: 123079041
Change-Id: I1803f072ca21bc116554eee1d01a1dbd2c9ed0c9
2019-02-15 15:56:16 +00:00
Sudheer Shanka
9c96649b27 Track untrusted_app_27 SELinux denial
vrcore is trying to access external storage before
it is available.

Bug: 118185801
Test: n/a
Change-Id: Ieb38a1bfb977d9f6f642fecdd1000a195b2c8259
2019-02-15 00:42:47 -08:00
Treehugger Robot
6c773be030 Merge "Update a comment to match the latest rules." 2019-02-15 06:38:25 +00:00
Treehugger Robot
2379bb7603 Merge "Fix typo in file name." 2019-02-15 04:16:44 +00:00
Jeffrey Vander Stoep
567a8063a9 Merge "Track SELinux denial." 2019-02-15 03:59:41 +00:00
Jeff Vander Stoep
f05de2ee39 Track SELinux denial.
This should help fix presubmit tests.

Bug: 124468495
Bug: 124476401
Test: Build.
Change-Id: I7d8befaef2a90d6dc824f99e3088a922c8d1fdc4
2019-02-14 19:52:03 -08:00
Tianjie Xu
4dd5976170 Merge "Allow update engine to write to statsd socket" 2019-02-14 22:07:11 +00:00
Sudheer Shanka
a3423bb74b Update a comment to match the latest rules.
Test: n/a
Change-Id: Ib45a25b3c9b987f56c350b91d72caca8a16fb52e
2019-02-14 11:48:49 -08:00
Sudheer Shanka
be3748da12 Merge "Allow zygote to create files under sdcardfs." 2019-02-14 18:51:07 +00:00
Sudheer Shanka
868c075e0e Allow zygote to create files under sdcardfs.
sdcardfs will automatically try to create .nomedia file
under Android/{data,obb} and this is being attributed
to whoever is trying to create Android/{data,obb} dirs.
Earlier this is used to done from app context but now
zygote handles the creation of these dirs.

Bug: 124345887
Test: manual
Change-Id: I96feada2f5edff2ece2586a532b069a58a36dd3b
2019-02-14 18:49:57 +00:00
Alan Stokes
9b8b422938 Fix typo in file name.
Test: Builds
Change-Id: I411f0c0f323565d951d4ba8031404171e3c9b364
2019-02-14 16:09:44 +00:00
Treehugger Robot
8292117703 Merge "add hal_bootctl to white-list of sys_rawio" 2019-02-14 07:21:00 +00:00
Remi NGUYEN VAN
3b006d9bd4 sepolicy change for NetworkStack signature
Update the seinfo to the new network_stack seinfo, as the network stack
is now using its own certificate.
Remove the hard-coded package name, which may differ depending on
devices, and specify (uid, signature, priv-app) instead.

Bug: 124033493
Test: m
Change-Id: If3bbc21cf83f5d17406e9615833ee43011c9c9bc
2019-02-14 07:58:13 +09:00
Treehugger Robot
a0f56f1d63 Merge "train info persist to disk sepolicy" 2019-02-13 22:45:18 +00:00
Pierre Lee
30c77c1695 add hal_bootctl to white-list of sys_rawio
VtsHalBootV1_0Target test cases fail on a platform when executing boot control operation.
The cases fail because of hal_bootctl has no sys_rawio permission to do storage IOCTL to
switch boot slot.

Bug: 118011561
Test: VtsHalBootV1_0Target can pass
Change-Id: Idbbb9ea8b76fe62b2d4b71356cef7a07ad4de890
2019-02-13 12:38:22 +00:00
Treehugger Robot
d41721bc41 Merge "Radio: allow to read kernel command line." 2019-02-13 08:15:33 +00:00
Treehugger Robot
07365ec1b4 Merge "Allow restorecon to work on vold_data_files" 2019-02-13 02:13:31 +00:00
Chenjie Yu
9e625b0745 train info persist to disk sepolicy
Test: will add gts
Bug: 122807604
Change-Id: I60d2b207d8cf652ff90111cc5bef996f14d93376
2019-02-12 15:40:02 -08:00
Jeff Vander Stoep
8540c12bd9 Radio: allow to read kernel command line.
Used in:
frameworks/base/telephony/java/android/telephony/TelephonyManager.java file

Fixes: 124210464
Test: sepolicy tests
Change-Id: I239cfa2eabbb14653175b4eb655a78caeea553e3
2019-02-12 23:36:51 +00:00
Paul Lawrence
84e87b8753 Allow restorecon to work on vold_data_files
Bug: 119769411
Test: Compiles with rule needed to fix Wahoo
Change-Id: Ifad4c285815682a107013479850f2a63c894c855
2019-02-12 14:43:08 -08:00
Peiyong Lin
e72b2328ae Merge "Add persistent property for SurfaceFlinger color mode." 2019-02-12 17:58:45 +00:00
Peiyong Lin
4dfc59e5f4 Add persistent property for SurfaceFlinger color mode.
To enable devices to stay in a color mode all the time, add a persistent
property as part of per device configuration.

BUG: 124129486
Test: Build, flash and boot. Verify with internal patch
Change-Id: I45ce25e4f1317911e70a4276df6adc39e7455fed
2019-02-11 17:19:03 -08:00
joshmccloskey
6f5a7b85b2 Allowing sysui to access statsd.
Test: Manual.
Change-Id: Iae63806bd5a8435e759694c0f84a3da8d463549d
2019-02-11 14:09:42 -08:00
Treehugger Robot
64c8df4a54 Merge "Game Driver: sepolicy update for plumbing GpuStats into GpuService" 2019-02-11 18:03:50 +00:00
Tri Vo
5358ac5eee Merge "Restore ephemeral app access to /dev/ashmem" 2019-02-09 20:28:16 +00:00
Treehugger Robot
c4bf8f26a0 Merge "Sepolicy: Give apexd permission for mounton" 2019-02-09 09:41:34 +00:00
Treehugger Robot
cb2a226ada Merge "allow runas_app untrusted_app_all:unix_stream_socket connectto" 2019-02-09 02:26:39 +00:00
Yiwei Zhang
544d6b34ec Game Driver: sepolicy update for plumbing GpuStats into GpuService
Allow all the app process with GUI to send GPU health metrics stats to
GpuService during the GraphicsEnvironment setup stage for the process.

Bug: 123529932
Test: Build, flash and boot. No selinux denials.
Change-Id: Ic7687dac3c8a3ea43fa744a6ae8a45716951c4df
2019-02-08 18:15:17 -08:00
Tri Vo
1ded205bd2 Restore ephemeral app access to /dev/ashmem
Bug: 124061057
Test: m selinux_policy
Test: vimeo aia launches
Change-Id: I8b49675c35a227737418c1b85c410bfac0e7e584
2019-02-08 17:20:40 -08:00
David Anderson
d703c8f3b9 Merge "Allow e2fs more ioctls to device-mapper devices." 2019-02-09 00:49:42 +00:00
Sudheer Shanka
53713d5d9a Merge "Allow zygote to create dirs under /mnt/user/*." 2019-02-08 23:49:58 +00:00
Henry Fang
1f1e36069d Change sepolicy to allow cas@1.1 service
Modify sepolicy configure file, so that cas@1.1 service can run
Test: Manual
bug: 124016538

Change-Id: I0b160bc1c575aa18ffead7ff136509fc9dcfb472
Merged-In: I142a6cd66a81ad9e0c8b4d87da672fb8f5c181d6
2019-02-08 22:05:25 +00:00
Andreas Gampe
742ac5561c Sepolicy: Give apexd permission for mounton
To not propagate any changes by APEX hooks, apexd remounts /
private.

Bug: 119260955
Bug: 119261380
Test: atest apexservice_test
Change-Id: I19aebc9c1562d8c4e4fedf36eb79826291b6ee61
2019-02-08 13:12:18 -08:00
Sudheer Shanka
176c91cc19 Allow zygote to create dirs under /mnt/user/*.
Bug: 124058579
Test: manual
Change-Id: I5b6736544cc8ffc9fd823834fe0edb7a388c6cf0
2019-02-08 12:01:50 -08:00
Nick Kralevich
bafea958fb allow runas_app untrusted_app_all:unix_stream_socket connectto
system/sepolicy commit ffa2b61330
introduced the runas_app SELinux domain, which changed how we perform
debugging and profiling of Android applications. This broke Android
Studio's profiling tool.

Android Studio's profiling tool has the run-as spawned application
connect to an app created unix domain sockets in the
abstract namespace.

Note: this differs from system/sepolicy commit
3e5668f173, which allows connections in
the reverse direction (from app to runas_app). That change (b/123297648)
was made for a different part of Android Studio, Android Studio Instant
Run.

Addresses the following denial:

2019-02-08 00:59:14.563 15560-15560/? W/connector: type=1400 audit(0.0:645): avc: denied { connectto } for path=00436C69656E74 scontext=u:r:runas_app:s0:c188,c256,c512,c768 tcontext=u:r:untrusted_app_27:s0:c188,c256,c512,c768 tclass=unix_stream_socket permissive=0 app=com.example.hellojni

(hex decode of 00436C69656E74 is "Client")

2019-01-31 17:25:16.060 19975-19975/? W/transport: type=1400 audit(0.0:8146): avc: denied { connectto } for path=00416E64726F696453747564696F5472616E73706F72744167656E743139383839 scontext=u:r:runas_app:s0:c512,c768 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=unix_stream_socket permissive=0 app=com.example.android.displayingbitmaps

(hex decode of
00416E64726F696453747564696F5472616E73706F72744167656E743139383839
is "AndroidStudioTransportAgent19889")

Bug: 120445954
Test: manual
Change-Id: I9ca1c338dcbc75cb3fbd7bf93a348f9276363dc1
2019-02-08 11:35:50 -08:00
David Anderson
db90b91ea0 Full sepolicy for gsid.
Bug: 122556707
Test: manual test
Change-Id: I2536deefb3aa75deee4aeae7df074349b705b0f0
2019-02-08 05:56:58 +00:00
Daniel Rosenberg
650981d2a8 Allow update_verifier to call checkpointing
This lets update_verifier call supportsCheckpoint to defer marking the
boot as successful when we may end up failing before we would commit
the checkpoint. In this case, we will mark the boot as successful just
before committing the checkpoint.

Test: Check that marking the boot as succesful was deferred in
      update_verifier, and done later on.
Change-Id: I9b4f3dd607ff5301860e78f4604b600b4ee416b7
2019-02-08 00:19:28 +00:00
Tri Vo
c74699105c Merge "Build product hashes together." 2019-02-07 22:39:02 +00:00
Treehugger Robot
30fabbf50e Merge "crash_dump: suppress denials on properties" 2019-02-07 20:19:19 +00:00
Tri Vo
24a5587594 Build product hashes together.
Simplifies our reasoning about product hashes. They are either
present on both sides of the Treble boundary or not.

Might be worth installing all four hashes unconditionally in the future.

Fixes: 123996710
Test: boot taimen, precompiled policy loaded
Change-Id: I749e4b0cc4c85870407a10b7d41a2e2001a75ffb
2019-02-07 10:55:23 -08:00
Sudheer Shanka
310b7fd9b3 Merge "Allow zygote to mounton /mnt/user/*." 2019-02-07 18:45:05 +00:00
Mark Salyzyn
969af6966b Merge "fs_mgr: overlayfs support legacy devices (marlin)" 2019-02-07 18:03:55 +00:00