Commit graph

18475 commits

Author SHA1 Message Date
Andreas Gampe
950d25ccf9 Merge "Sepolicy: ART APEX boot integrity"
am: 01147a70f4

Change-Id: If3d381bc3d2f2479b9c01307f13a9ad2db22e53e
2019-03-13 11:29:14 -07:00
Andreas Gampe
01147a70f4 Merge "Sepolicy: ART APEX boot integrity" 2019-03-13 18:19:03 +00:00
Victor Hsieh
ac0a689cb4 Merge "Allow mini-keyctl to setattr for restricting keyring"
am: e5667b30d5

Change-Id: I78c9cb1c38b2303f12f69e1b2b72d2f3fb540bc1
2019-03-13 10:39:57 -07:00
Treehugger Robot
e5667b30d5 Merge "Allow mini-keyctl to setattr for restricting keyring" 2019-03-13 17:30:22 +00:00
Andreas Gampe
b329558180 Merge "Sepolicy: Give sys_admin for relabel"
am: 20fe557ec5

Change-Id: I15c2a6fde323c4e4092428b0db9436089c545ad9
2019-03-13 08:20:45 -07:00
Treehugger Robot
20fe557ec5 Merge "Sepolicy: Give sys_admin for relabel" 2019-03-13 15:06:54 +00:00
Tim Murray
17787a50e0 Merge "system_server: allow writes to /proc/pid/*"
am: 62e8da9713

Change-Id: I59aa0c346dbaa89ccfd54fc115efd90630a6ee78
2019-03-12 22:47:48 -07:00
Inseob Kim
3767d8e9d0 Merge "Fix surface flinger property types"
am: 7a70210a47

Change-Id: Id3c06a5fccb13f86317dbdfdb08657db57f0426e
2019-03-12 22:27:09 -07:00
Andreas Gampe
1845b406fc Sepolicy: ART APEX boot integrity
Add ART boot integrity check domain. Give it rights to run
fsverity and delete boot classpath artifacts.

Bug 125474642
Test: m
Test: boot
Change-Id: I933add9b1895ed85c43ec712ced6ffe8f820c7ec
2019-03-12 22:26:17 -07:00
Treehugger Robot
62e8da9713 Merge "system_server: allow writes to /proc/pid/*" 2019-03-13 05:09:18 +00:00
Treehugger Robot
7a70210a47 Merge "Fix surface flinger property types" 2019-03-12 23:58:52 +00:00
Tim Murray
a8d538f66d system_server: allow writes to /proc/pid/*
Test: system_server can write to /proc/<pid>/*
bug 119988524

Change-Id: I312b8022cd143907bcbfc8152691e2053e1e816d
2019-03-12 16:20:11 -07:00
Inseob Kim
8669f52f79 Fix surface flinger property types
Third parameter of a property_context entry should be "exact" if the
entry is for a single property, not a prefix.

And the type of each entry should be the fourth parameter.

Bug: 112386364
Test: m -j
Change-Id: I2ed31c9fd7c7424e3a6a51d44b4e85413ae316b7
2019-03-12 22:38:36 +00:00
Martijn Coenen
bd415ea496 Merge "Add policy for /metadata/apex."
am: 460efa2a01

Change-Id: I687236094aa48b5f241cbe68b60bebb441e076b1
2019-03-12 14:09:56 -07:00
Treehugger Robot
460efa2a01 Merge "Add policy for /metadata/apex." 2019-03-12 20:48:49 +00:00
Victor Hsieh
f7bf277313 Allow mini-keyctl to setattr for restricting keyring
This fix the current denial during boot.

Test: no more avd denial in dmesg
Bug: 112038861
Change-Id: Ie3c3788ff011bcee189b83cfccba6137580f804d
2019-03-12 13:46:53 -07:00
Andreas Gampe
7263cb4603 Sepolicy: Give sys_admin for relabel
This requirement slipped through.

Bug: 125474642
Test: m
Test: manual
Change-Id: I8b31bda519632a549574d3057bc49a158e796e2e
2019-03-12 10:49:16 -07:00
Martijn Coenen
5fbbf2613c Add policy for /metadata/apex.
This is an area that apexd can use to store session metadata, which
won't be rolled back with filesystem checkpointing.

Bug: 126740531
Test: builds
Change-Id: I5abbc500dc1b92aa46830829be76e7a4381eef91
2019-03-12 18:31:07 +01:00
Steven Moreland
54dd0cce06 Merge "Clarify comment on tombstoned exception."
am: 475f6d143f

Change-Id: I29bdb6e76e8799ef12019bdac229af443d764c42
2019-03-08 12:31:23 -08:00
Steven Moreland
475f6d143f Merge "Clarify comment on tombstoned exception." 2019-03-08 20:19:43 +00:00
Jack Yu
f32b1100bc Fixed the inaccessable system properties
am: bd534ed52b

Change-Id: I6c22fcd30d636453cadd2ad6c36a48a9775e30b3
2019-03-08 09:59:30 -08:00
Steven Moreland
981f6c2d5e Clarify comment on tombstoned exception.
The OMX comment here seems unrelated. The linker (system) uses it to
talk to tombstoned.

Fixes: 112606643
Test: N/A
Change-Id: Ib3da832f120d3cc244aa22de5d4d655b874db38b
2019-03-07 15:24:07 -08:00
Jack Yu
bd534ed52b Fixed the inaccessable system properties
Moved the system properties from exported3_default
to exported_radio so that the service from vendor
partition can access that.

Test: Manual
Bug: 126218288
Change-Id: I055c1c26d1e25f5d12f2593b96eecf57be62d871
2019-03-07 21:36:47 +00:00
Tri Vo
da58f7e571 Restrict access to suspend control
am: 131fa73add

Change-Id: Ie17145c19a9fd0188582890f14ff38d62660ba90
2019-03-07 12:15:51 -08:00
David Anderson
2fc6b0457d Add sepolicy for /metadata/password_slots.
am: d99b7fd3f9

Change-Id: Id8b017e1a404d4d64ba345fdf3071e5f5aa34f01
2019-03-07 12:07:48 -08:00
Tri Vo
131fa73add Restrict access to suspend control
Test: m selinux_policy
Change-Id: Ieccfd2aa059da065ace4f2db1b9634c52dd2cb24
2019-03-07 18:31:58 +00:00
David Anderson
d99b7fd3f9 Add sepolicy for /metadata/password_slots.
The device OS and an installed GSI will both attempt to write
authentication data to the same weaver slots. To prevent this, we can
use the /metadata partition (required for GSI support) to communicate
which slots are in use between OS images.

To do this we define a new /metadata/password_slots directory and define
sepolicy to allow system_server (see PasswordSlotManager) to access it.

Bug: 123716647
Test: no denials on crosshatch
Change-Id: I8e3679d332503b5fb8a8eb6455de068c22eba30b
2019-03-07 16:19:15 +00:00
Luke Huang
551bfafd34 Merge "Add sepolicy for resolver service"
am: a116e1afe5

Change-Id: I44d1ebff1959229fbd118295bc462a904f0d99c0
2019-03-06 21:44:39 -08:00
Luke Huang
a116e1afe5 Merge "Add sepolicy for resolver service" 2019-03-07 05:35:12 +00:00
Andreas Gampe
51f922c281 Merge "Sepolicy: Allow crash_dump to ptrace apexd in userdebug"
am: c67985a067

Change-Id: I814e050f3fd32beeea7dc824ebea280ba463f6f9
2019-03-06 14:42:38 -08:00
Treehugger Robot
c67985a067 Merge "Sepolicy: Allow crash_dump to ptrace apexd in userdebug" 2019-03-06 22:12:11 +00:00
Yifan Hong
9cb837bb95 Merge "health: allow wake_alarm capability."
am: a5f5fc5afd

Change-Id: Ibf2608e8efa0982ba2d02f1fbda732026fa6f4ea
2019-03-06 14:10:49 -08:00
Treehugger Robot
a5f5fc5afd Merge "health: allow wake_alarm capability." 2019-03-06 21:41:25 +00:00
Tri Vo
e92e130caa Merge "load selinux mapping ignore file in BOARD_PLAT_PRIVATE_SEPOLICY_DIR"
am: 304bafd410

Change-Id: Iac0a77b874fb757ba4d6abc08d35b886b68ea90a
2019-03-06 12:33:19 -08:00
Tri Vo
304bafd410 Merge "load selinux mapping ignore file in BOARD_PLAT_PRIVATE_SEPOLICY_DIR" 2019-03-06 20:26:07 +00:00
Yifan Hong
2d0979268f health: allow wake_alarm capability.
CAP_WAKE_ALARM was required for timerfd_create since 4.10 kernel upstream.
Add capability to platform policy for healthd and health HAL.

Fixes: 124210362
Test: boots (sanity)
Change-Id: I8ebb383608eedd59beddec3f476b071e81b80871
2019-03-06 19:10:09 +00:00
Jiyong Park
15c0da7f90 Merge "Add a new system-to-vendor sysprop ro.apex.updatable"
am: 452d6a5faa

Change-Id: I1f972157191abf22b996173b34c2ffa8f58fb448
2019-03-06 09:52:01 -08:00
Treehugger Robot
452d6a5faa Merge "Add a new system-to-vendor sysprop ro.apex.updatable" 2019-03-06 17:38:46 +00:00
David Anderson
15ae14f060 Merge "Allow gatekeeperd to read ro.gsid.image_running."
am: 731e104acc

Change-Id: Ie96e41350d57a93d5b8f6db78ef59f43c0c72ac7
2019-03-05 19:22:30 -08:00
David Anderson
731e104acc Merge "Allow gatekeeperd to read ro.gsid.image_running." 2019-03-06 02:40:03 +00:00
Chong Zhang
9d5845f592 Merge "Move mediaswcodec service to APEX"
am: 8740465034

Change-Id: I38cb357453b167dffff5029e6e142762b04a3408
2019-03-05 18:26:05 -08:00
Treehugger Robot
8740465034 Merge "Move mediaswcodec service to APEX" 2019-03-06 02:06:19 +00:00
Chong Zhang
21b40e380e Move mediaswcodec service to APEX
bug: 127499775
test:
- adb shell lshal debug android.hardware.media.c2@1.0::IComponentStore/software
check all software c2 codecs are still listed
- clean-built image shouldn't have mediaswcodec in /system/bin
- atest CtsMediaTestCases -- --module-arg CtsMediaTestCases:size:small
Change-Id: Ie528fe3b1053d5bfd9dc3b858c996b8e1c708cbc
2019-03-05 14:54:14 -08:00
Andreas Gampe
efece54e06 Sepolicy: Allow crash_dump to ptrace apexd in userdebug
In userdebug, for better diagnostics, allow crash_dump to "connect
to" apexd.

Considering apexd is quite powerful, user devices remain restricted.

Bug: 118771487
Test: m
Change-Id: Id42bd2ad7505cd5578138bfccd8840acba9a334d
2019-03-05 09:59:50 -08:00
Joel Galenson
b8bd45a560 Merge "Fix denials during bugreport."
am: 51f6075f73

Change-Id: I94f131c5af5ada095c49adc4479950c753ce5312
2019-03-05 09:35:47 -08:00
Treehugger Robot
51f6075f73 Merge "Fix denials during bugreport." 2019-03-05 17:27:58 +00:00
Luke Huang
524f25ebb0 Add sepolicy for resolver service
Bug: 126141549
Test: built, flashed, booted
Change-Id: I34260e1e5cc238fbe92574f928252680c1e6b417
2019-03-05 15:49:33 +00:00
Changyeon Jo
a60b26786c Merge "Updates hal_evs sepolicy"
am: 9c65dc76b8

Change-Id: I90429619bf2f97a8a923161048c14833263dbb67
2019-03-05 06:30:25 -08:00
Changyeon Jo
9c65dc76b8 Merge "Updates hal_evs sepolicy" 2019-03-05 14:22:57 +00:00
Jinguang Dong
e012569944 load selinux mapping ignore file in BOARD_PLAT_PRIVATE_SEPOLICY_DIR
Now it can only load selinux mapping ignore file in system/sepolicy/private,
But for google's partners, we want to add selinux mapping ignore file in BOARD_PLAT_PRIVATE_SEPOLICY_DIR.

Test: it can load load selinux mapping ignore file in BOARD_PLAT_PRIVATE_SEPOLICY_DIR
Change-Id: I983422c21fe027fcb17c175357a26845eb977669
2019-03-05 17:23:24 +08:00