Andreas Gampe
950d25ccf9
Merge "Sepolicy: ART APEX boot integrity"
...
am: 01147a70f4
Change-Id: If3d381bc3d2f2479b9c01307f13a9ad2db22e53e
2019-03-13 11:29:14 -07:00
Andreas Gampe
01147a70f4
Merge "Sepolicy: ART APEX boot integrity"
2019-03-13 18:19:03 +00:00
Victor Hsieh
ac0a689cb4
Merge "Allow mini-keyctl to setattr for restricting keyring"
...
am: e5667b30d5
Change-Id: I78c9cb1c38b2303f12f69e1b2b72d2f3fb540bc1
2019-03-13 10:39:57 -07:00
Treehugger Robot
e5667b30d5
Merge "Allow mini-keyctl to setattr for restricting keyring"
2019-03-13 17:30:22 +00:00
Andreas Gampe
b329558180
Merge "Sepolicy: Give sys_admin for relabel"
...
am: 20fe557ec5
Change-Id: I15c2a6fde323c4e4092428b0db9436089c545ad9
2019-03-13 08:20:45 -07:00
Treehugger Robot
20fe557ec5
Merge "Sepolicy: Give sys_admin for relabel"
2019-03-13 15:06:54 +00:00
Tim Murray
17787a50e0
Merge "system_server: allow writes to /proc/pid/*"
...
am: 62e8da9713
Change-Id: I59aa0c346dbaa89ccfd54fc115efd90630a6ee78
2019-03-12 22:47:48 -07:00
Inseob Kim
3767d8e9d0
Merge "Fix surface flinger property types"
...
am: 7a70210a47
Change-Id: Id3c06a5fccb13f86317dbdfdb08657db57f0426e
2019-03-12 22:27:09 -07:00
Andreas Gampe
1845b406fc
Sepolicy: ART APEX boot integrity
...
Add ART boot integrity check domain. Give it rights to run
fsverity and delete boot classpath artifacts.
Bug 125474642
Test: m
Test: boot
Change-Id: I933add9b1895ed85c43ec712ced6ffe8f820c7ec
2019-03-12 22:26:17 -07:00
Treehugger Robot
62e8da9713
Merge "system_server: allow writes to /proc/pid/*"
2019-03-13 05:09:18 +00:00
Treehugger Robot
7a70210a47
Merge "Fix surface flinger property types"
2019-03-12 23:58:52 +00:00
Tim Murray
a8d538f66d
system_server: allow writes to /proc/pid/*
...
Test: system_server can write to /proc/<pid>/*
bug 119988524
Change-Id: I312b8022cd143907bcbfc8152691e2053e1e816d
2019-03-12 16:20:11 -07:00
Inseob Kim
8669f52f79
Fix surface flinger property types
...
Third parameter of a property_context entry should be "exact" if the
entry is for a single property, not a prefix.
And the type of each entry should be the fourth parameter.
Bug: 112386364
Test: m -j
Change-Id: I2ed31c9fd7c7424e3a6a51d44b4e85413ae316b7
2019-03-12 22:38:36 +00:00
Martijn Coenen
bd415ea496
Merge "Add policy for /metadata/apex."
...
am: 460efa2a01
Change-Id: I687236094aa48b5f241cbe68b60bebb441e076b1
2019-03-12 14:09:56 -07:00
Treehugger Robot
460efa2a01
Merge "Add policy for /metadata/apex."
2019-03-12 20:48:49 +00:00
Victor Hsieh
f7bf277313
Allow mini-keyctl to setattr for restricting keyring
...
This fix the current denial during boot.
Test: no more avd denial in dmesg
Bug: 112038861
Change-Id: Ie3c3788ff011bcee189b83cfccba6137580f804d
2019-03-12 13:46:53 -07:00
Andreas Gampe
7263cb4603
Sepolicy: Give sys_admin for relabel
...
This requirement slipped through.
Bug: 125474642
Test: m
Test: manual
Change-Id: I8b31bda519632a549574d3057bc49a158e796e2e
2019-03-12 10:49:16 -07:00
Martijn Coenen
5fbbf2613c
Add policy for /metadata/apex.
...
This is an area that apexd can use to store session metadata, which
won't be rolled back with filesystem checkpointing.
Bug: 126740531
Test: builds
Change-Id: I5abbc500dc1b92aa46830829be76e7a4381eef91
2019-03-12 18:31:07 +01:00
Steven Moreland
54dd0cce06
Merge "Clarify comment on tombstoned exception."
...
am: 475f6d143f
Change-Id: I29bdb6e76e8799ef12019bdac229af443d764c42
2019-03-08 12:31:23 -08:00
Steven Moreland
475f6d143f
Merge "Clarify comment on tombstoned exception."
2019-03-08 20:19:43 +00:00
Jack Yu
f32b1100bc
Fixed the inaccessable system properties
...
am: bd534ed52b
Change-Id: I6c22fcd30d636453cadd2ad6c36a48a9775e30b3
2019-03-08 09:59:30 -08:00
Steven Moreland
981f6c2d5e
Clarify comment on tombstoned exception.
...
The OMX comment here seems unrelated. The linker (system) uses it to
talk to tombstoned.
Fixes: 112606643
Test: N/A
Change-Id: Ib3da832f120d3cc244aa22de5d4d655b874db38b
2019-03-07 15:24:07 -08:00
Jack Yu
bd534ed52b
Fixed the inaccessable system properties
...
Moved the system properties from exported3_default
to exported_radio so that the service from vendor
partition can access that.
Test: Manual
Bug: 126218288
Change-Id: I055c1c26d1e25f5d12f2593b96eecf57be62d871
2019-03-07 21:36:47 +00:00
Tri Vo
da58f7e571
Restrict access to suspend control
...
am: 131fa73add
Change-Id: Ie17145c19a9fd0188582890f14ff38d62660ba90
2019-03-07 12:15:51 -08:00
David Anderson
2fc6b0457d
Add sepolicy for /metadata/password_slots.
...
am: d99b7fd3f9
Change-Id: Id8b017e1a404d4d64ba345fdf3071e5f5aa34f01
2019-03-07 12:07:48 -08:00
Tri Vo
131fa73add
Restrict access to suspend control
...
Test: m selinux_policy
Change-Id: Ieccfd2aa059da065ace4f2db1b9634c52dd2cb24
2019-03-07 18:31:58 +00:00
David Anderson
d99b7fd3f9
Add sepolicy for /metadata/password_slots.
...
The device OS and an installed GSI will both attempt to write
authentication data to the same weaver slots. To prevent this, we can
use the /metadata partition (required for GSI support) to communicate
which slots are in use between OS images.
To do this we define a new /metadata/password_slots directory and define
sepolicy to allow system_server (see PasswordSlotManager) to access it.
Bug: 123716647
Test: no denials on crosshatch
Change-Id: I8e3679d332503b5fb8a8eb6455de068c22eba30b
2019-03-07 16:19:15 +00:00
Luke Huang
551bfafd34
Merge "Add sepolicy for resolver service"
...
am: a116e1afe5
Change-Id: I44d1ebff1959229fbd118295bc462a904f0d99c0
2019-03-06 21:44:39 -08:00
Luke Huang
a116e1afe5
Merge "Add sepolicy for resolver service"
2019-03-07 05:35:12 +00:00
Andreas Gampe
51f922c281
Merge "Sepolicy: Allow crash_dump to ptrace apexd in userdebug"
...
am: c67985a067
Change-Id: I814e050f3fd32beeea7dc824ebea280ba463f6f9
2019-03-06 14:42:38 -08:00
Treehugger Robot
c67985a067
Merge "Sepolicy: Allow crash_dump to ptrace apexd in userdebug"
2019-03-06 22:12:11 +00:00
Yifan Hong
9cb837bb95
Merge "health: allow wake_alarm capability."
...
am: a5f5fc5afd
Change-Id: Ibf2608e8efa0982ba2d02f1fbda732026fa6f4ea
2019-03-06 14:10:49 -08:00
Treehugger Robot
a5f5fc5afd
Merge "health: allow wake_alarm capability."
2019-03-06 21:41:25 +00:00
Tri Vo
e92e130caa
Merge "load selinux mapping ignore file in BOARD_PLAT_PRIVATE_SEPOLICY_DIR"
...
am: 304bafd410
Change-Id: Iac0a77b874fb757ba4d6abc08d35b886b68ea90a
2019-03-06 12:33:19 -08:00
Tri Vo
304bafd410
Merge "load selinux mapping ignore file in BOARD_PLAT_PRIVATE_SEPOLICY_DIR"
2019-03-06 20:26:07 +00:00
Yifan Hong
2d0979268f
health: allow wake_alarm capability.
...
CAP_WAKE_ALARM was required for timerfd_create since 4.10 kernel upstream.
Add capability to platform policy for healthd and health HAL.
Fixes: 124210362
Test: boots (sanity)
Change-Id: I8ebb383608eedd59beddec3f476b071e81b80871
2019-03-06 19:10:09 +00:00
Jiyong Park
15c0da7f90
Merge "Add a new system-to-vendor sysprop ro.apex.updatable"
...
am: 452d6a5faa
Change-Id: I1f972157191abf22b996173b34c2ffa8f58fb448
2019-03-06 09:52:01 -08:00
Treehugger Robot
452d6a5faa
Merge "Add a new system-to-vendor sysprop ro.apex.updatable"
2019-03-06 17:38:46 +00:00
David Anderson
15ae14f060
Merge "Allow gatekeeperd to read ro.gsid.image_running."
...
am: 731e104acc
Change-Id: Ie96e41350d57a93d5b8f6db78ef59f43c0c72ac7
2019-03-05 19:22:30 -08:00
David Anderson
731e104acc
Merge "Allow gatekeeperd to read ro.gsid.image_running."
2019-03-06 02:40:03 +00:00
Chong Zhang
9d5845f592
Merge "Move mediaswcodec service to APEX"
...
am: 8740465034
Change-Id: I38cb357453b167dffff5029e6e142762b04a3408
2019-03-05 18:26:05 -08:00
Treehugger Robot
8740465034
Merge "Move mediaswcodec service to APEX"
2019-03-06 02:06:19 +00:00
Chong Zhang
21b40e380e
Move mediaswcodec service to APEX
...
bug: 127499775
test:
- adb shell lshal debug android.hardware.media.c2@1.0::IComponentStore/software
check all software c2 codecs are still listed
- clean-built image shouldn't have mediaswcodec in /system/bin
- atest CtsMediaTestCases -- --module-arg CtsMediaTestCases:size:small
Change-Id: Ie528fe3b1053d5bfd9dc3b858c996b8e1c708cbc
2019-03-05 14:54:14 -08:00
Andreas Gampe
efece54e06
Sepolicy: Allow crash_dump to ptrace apexd in userdebug
...
In userdebug, for better diagnostics, allow crash_dump to "connect
to" apexd.
Considering apexd is quite powerful, user devices remain restricted.
Bug: 118771487
Test: m
Change-Id: Id42bd2ad7505cd5578138bfccd8840acba9a334d
2019-03-05 09:59:50 -08:00
Joel Galenson
b8bd45a560
Merge "Fix denials during bugreport."
...
am: 51f6075f73
Change-Id: I94f131c5af5ada095c49adc4479950c753ce5312
2019-03-05 09:35:47 -08:00
Treehugger Robot
51f6075f73
Merge "Fix denials during bugreport."
2019-03-05 17:27:58 +00:00
Luke Huang
524f25ebb0
Add sepolicy for resolver service
...
Bug: 126141549
Test: built, flashed, booted
Change-Id: I34260e1e5cc238fbe92574f928252680c1e6b417
2019-03-05 15:49:33 +00:00
Changyeon Jo
a60b26786c
Merge "Updates hal_evs sepolicy"
...
am: 9c65dc76b8
Change-Id: I90429619bf2f97a8a923161048c14833263dbb67
2019-03-05 06:30:25 -08:00
Changyeon Jo
9c65dc76b8
Merge "Updates hal_evs sepolicy"
2019-03-05 14:22:57 +00:00
Jinguang Dong
e012569944
load selinux mapping ignore file in BOARD_PLAT_PRIVATE_SEPOLICY_DIR
...
Now it can only load selinux mapping ignore file in system/sepolicy/private,
But for google's partners, we want to add selinux mapping ignore file in BOARD_PLAT_PRIVATE_SEPOLICY_DIR.
Test: it can load load selinux mapping ignore file in BOARD_PLAT_PRIVATE_SEPOLICY_DIR
Change-Id: I983422c21fe027fcb17c175357a26845eb977669
2019-03-05 17:23:24 +08:00