Commit graph

18475 commits

Author SHA1 Message Date
Sudheer Shanka
a3423bb74b Update a comment to match the latest rules.
Test: n/a
Change-Id: Ib45a25b3c9b987f56c350b91d72caca8a16fb52e
2019-02-14 11:48:49 -08:00
Sudheer Shanka
4cb485a603 Merge "Allow zygote to create files under sdcardfs."
am: be3748da12

Change-Id: I8e06267015a06b1b51a1940451950d63d2e11b6f
2019-02-14 11:06:44 -08:00
Sudheer Shanka
be3748da12 Merge "Allow zygote to create files under sdcardfs." 2019-02-14 18:51:07 +00:00
Sudheer Shanka
868c075e0e Allow zygote to create files under sdcardfs.
sdcardfs will automatically try to create .nomedia file
under Android/{data,obb} and this is being attributed
to whoever is trying to create Android/{data,obb} dirs.
Earlier this is used to done from app context but now
zygote handles the creation of these dirs.

Bug: 124345887
Test: manual
Change-Id: I96feada2f5edff2ece2586a532b069a58a36dd3b
2019-02-14 18:49:57 +00:00
Alan Stokes
9b8b422938 Fix typo in file name.
Test: Builds
Change-Id: I411f0c0f323565d951d4ba8031404171e3c9b364
2019-02-14 16:09:44 +00:00
Pierre Lee
58d87035dc Merge "add hal_bootctl to white-list of sys_rawio"
am: 8292117703

Change-Id: Iea654aedc4f858f025511fa4f6374e5726e6605d
2019-02-13 23:30:47 -08:00
Treehugger Robot
8292117703 Merge "add hal_bootctl to white-list of sys_rawio" 2019-02-14 07:21:00 +00:00
Chenjie Yu
d098364298 Merge "train info persist to disk sepolicy"
am: a0f56f1d63

Change-Id: I2aeef7e584bba6311e955ee63b952976adaa0456
2019-02-13 15:56:50 -08:00
Remi NGUYEN VAN
3b006d9bd4 sepolicy change for NetworkStack signature
Update the seinfo to the new network_stack seinfo, as the network stack
is now using its own certificate.
Remove the hard-coded package name, which may differ depending on
devices, and specify (uid, signature, priv-app) instead.

Bug: 124033493
Test: m
Change-Id: If3bbc21cf83f5d17406e9615833ee43011c9c9bc
2019-02-14 07:58:13 +09:00
Treehugger Robot
a0f56f1d63 Merge "train info persist to disk sepolicy" 2019-02-13 22:45:18 +00:00
Pierre Lee
30c77c1695 add hal_bootctl to white-list of sys_rawio
VtsHalBootV1_0Target test cases fail on a platform when executing boot control operation.
The cases fail because of hal_bootctl has no sys_rawio permission to do storage IOCTL to
switch boot slot.

Bug: 118011561
Test: VtsHalBootV1_0Target can pass
Change-Id: Idbbb9ea8b76fe62b2d4b71356cef7a07ad4de890
2019-02-13 12:38:22 +00:00
Jeff Vander Stoep
65108cec40 Merge "Radio: allow to read kernel command line."
am: d41721bc41

Change-Id: I3ae9ed53acacffa9db3433dee1b8cfb4e1d85435
2019-02-13 00:22:03 -08:00
Treehugger Robot
d41721bc41 Merge "Radio: allow to read kernel command line." 2019-02-13 08:15:33 +00:00
Paul Lawrence
2d682cf0c7 Merge "Allow restorecon to work on vold_data_files"
am: 07365ec1b4

Change-Id: Ibd769a20eb10241a5ceab05d1887b176f3312e8e
2019-02-12 19:29:18 -08:00
Treehugger Robot
07365ec1b4 Merge "Allow restorecon to work on vold_data_files" 2019-02-13 02:13:31 +00:00
Chenjie Yu
9e625b0745 train info persist to disk sepolicy
Test: will add gts
Bug: 122807604
Change-Id: I60d2b207d8cf652ff90111cc5bef996f14d93376
2019-02-12 15:40:02 -08:00
Jeff Vander Stoep
8540c12bd9 Radio: allow to read kernel command line.
Used in:
frameworks/base/telephony/java/android/telephony/TelephonyManager.java file

Fixes: 124210464
Test: sepolicy tests
Change-Id: I239cfa2eabbb14653175b4eb655a78caeea553e3
2019-02-12 23:36:51 +00:00
Paul Lawrence
84e87b8753 Allow restorecon to work on vold_data_files
Bug: 119769411
Test: Compiles with rule needed to fix Wahoo
Change-Id: Ifad4c285815682a107013479850f2a63c894c855
2019-02-12 14:43:08 -08:00
Peiyong Lin
6cac784253 Merge "Add persistent property for SurfaceFlinger color mode."
am: e72b2328ae

Change-Id: Ib5ce919c95b47bc172fc730b7ab5a3cd67a8e4c0
2019-02-12 10:16:44 -08:00
Peiyong Lin
e72b2328ae Merge "Add persistent property for SurfaceFlinger color mode." 2019-02-12 17:58:45 +00:00
Xin Li
27205a2847 DO NOT MERGE - Merge pi-platform-release (PPRL.190205.001) into stage-aosp-master
Bug: 124234733
Change-Id: Ic9a486e029115f3c42c1c0f139890bc744eb14bf
2019-02-12 09:53:58 -08:00
joshmccloskey
ec74c35e2e Allowing sysui to access statsd.
am: 6f5a7b85b2

Change-Id: I3c6b59cc7e7a3024efee3750521064232d80b229
2019-02-11 21:21:53 -08:00
Peiyong Lin
4dfc59e5f4 Add persistent property for SurfaceFlinger color mode.
To enable devices to stay in a color mode all the time, add a persistent
property as part of per device configuration.

BUG: 124129486
Test: Build, flash and boot. Verify with internal patch
Change-Id: I45ce25e4f1317911e70a4276df6adc39e7455fed
2019-02-11 17:19:03 -08:00
joshmccloskey
6f5a7b85b2 Allowing sysui to access statsd.
Test: Manual.
Change-Id: Iae63806bd5a8435e759694c0f84a3da8d463549d
2019-02-11 14:09:42 -08:00
Yiwei Zhang
30287cfbf1 Merge "Game Driver: sepolicy update for plumbing GpuStats into GpuService"
am: 64c8df4a54

Change-Id: I131d279b503c948d9d894ffcd99eedb0349d9f44
2019-02-11 10:10:09 -08:00
Treehugger Robot
64c8df4a54 Merge "Game Driver: sepolicy update for plumbing GpuStats into GpuService" 2019-02-11 18:03:50 +00:00
Tri Vo
fa2c6ed718 Merge "Restore ephemeral app access to /dev/ashmem"
am: 5358ac5eee

Change-Id: I1c22fedaee54bcc80a948aade564597a1526ded4
2019-02-09 12:39:00 -08:00
Tri Vo
5358ac5eee Merge "Restore ephemeral app access to /dev/ashmem" 2019-02-09 20:28:16 +00:00
Andreas Gampe
9020d74f24 Merge "Sepolicy: Give apexd permission for mounton"
am: c4bf8f26a0

Change-Id: I318484c452e9aa51e61114f4e59301e4eafe0708
2019-02-09 01:52:02 -08:00
Treehugger Robot
c4bf8f26a0 Merge "Sepolicy: Give apexd permission for mounton" 2019-02-09 09:41:34 +00:00
Nick Kralevich
e049aec29c Merge "allow runas_app untrusted_app_all:unix_stream_socket connectto"
am: cb2a226ada

Change-Id: I7553a5d4a6409afbfa15924b7779a92bd4cc4452
2019-02-08 18:41:50 -08:00
android-build-team Robot
362a69242b Snap for 5180536 from 6308216c6c to pi-platform-release
Change-Id: I33e5f51b0f017c963eed8cb78bd493d58021d27e
2019-02-09 02:36:06 +00:00
Treehugger Robot
cb2a226ada Merge "allow runas_app untrusted_app_all:unix_stream_socket connectto" 2019-02-09 02:26:39 +00:00
Yiwei Zhang
544d6b34ec Game Driver: sepolicy update for plumbing GpuStats into GpuService
Allow all the app process with GUI to send GPU health metrics stats to
GpuService during the GraphicsEnvironment setup stage for the process.

Bug: 123529932
Test: Build, flash and boot. No selinux denials.
Change-Id: Ic7687dac3c8a3ea43fa744a6ae8a45716951c4df
2019-02-08 18:15:17 -08:00
Tri Vo
1ded205bd2 Restore ephemeral app access to /dev/ashmem
Bug: 124061057
Test: m selinux_policy
Test: vimeo aia launches
Change-Id: I8b49675c35a227737418c1b85c410bfac0e7e584
2019-02-08 17:20:40 -08:00
David Anderson
5d425d11c0 Merge "Allow e2fs more ioctls to device-mapper devices."
am: d703c8f3b9

Change-Id: If623c1c689f653f36abbc396abe2e39e8e07a324
2019-02-08 16:58:08 -08:00
David Anderson
d703c8f3b9 Merge "Allow e2fs more ioctls to device-mapper devices." 2019-02-09 00:49:42 +00:00
Sudheer Shanka
8c93e1cfa2 Merge "Allow zygote to create dirs under /mnt/user/*."
am: 53713d5d9a

Change-Id: Ie67bc67b2e3d8e916d7ce83b4ff502021a625c32
2019-02-08 16:47:05 -08:00
Sudheer Shanka
53713d5d9a Merge "Allow zygote to create dirs under /mnt/user/*." 2019-02-08 23:49:58 +00:00
Henry Fang
a372b98b44 Change sepolicy to allow cas@1.1 service
am: 1f1e36069d

Change-Id: I58fb6aab09b43f00d663793d52dd8ce5622eb4bd
2019-02-08 15:27:11 -08:00
Henry Fang
1f1e36069d Change sepolicy to allow cas@1.1 service
Modify sepolicy configure file, so that cas@1.1 service can run
Test: Manual
bug: 124016538

Change-Id: I0b160bc1c575aa18ffead7ff136509fc9dcfb472
Merged-In: I142a6cd66a81ad9e0c8b4d87da672fb8f5c181d6
2019-02-08 22:05:25 +00:00
Andreas Gampe
742ac5561c Sepolicy: Give apexd permission for mounton
To not propagate any changes by APEX hooks, apexd remounts /
private.

Bug: 119260955
Bug: 119261380
Test: atest apexservice_test
Change-Id: I19aebc9c1562d8c4e4fedf36eb79826291b6ee61
2019-02-08 13:12:18 -08:00
Sudheer Shanka
176c91cc19 Allow zygote to create dirs under /mnt/user/*.
Bug: 124058579
Test: manual
Change-Id: I5b6736544cc8ffc9fd823834fe0edb7a388c6cf0
2019-02-08 12:01:50 -08:00
Nick Kralevich
bafea958fb allow runas_app untrusted_app_all:unix_stream_socket connectto
system/sepolicy commit ffa2b61330
introduced the runas_app SELinux domain, which changed how we perform
debugging and profiling of Android applications. This broke Android
Studio's profiling tool.

Android Studio's profiling tool has the run-as spawned application
connect to an app created unix domain sockets in the
abstract namespace.

Note: this differs from system/sepolicy commit
3e5668f173, which allows connections in
the reverse direction (from app to runas_app). That change (b/123297648)
was made for a different part of Android Studio, Android Studio Instant
Run.

Addresses the following denial:

2019-02-08 00:59:14.563 15560-15560/? W/connector: type=1400 audit(0.0:645): avc: denied { connectto } for path=00436C69656E74 scontext=u:r:runas_app:s0:c188,c256,c512,c768 tcontext=u:r:untrusted_app_27:s0:c188,c256,c512,c768 tclass=unix_stream_socket permissive=0 app=com.example.hellojni

(hex decode of 00436C69656E74 is "Client")

2019-01-31 17:25:16.060 19975-19975/? W/transport: type=1400 audit(0.0:8146): avc: denied { connectto } for path=00416E64726F696453747564696F5472616E73706F72744167656E743139383839 scontext=u:r:runas_app:s0:c512,c768 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=unix_stream_socket permissive=0 app=com.example.android.displayingbitmaps

(hex decode of
00416E64726F696453747564696F5472616E73706F72744167656E743139383839
is "AndroidStudioTransportAgent19889")

Bug: 120445954
Test: manual
Change-Id: I9ca1c338dcbc75cb3fbd7bf93a348f9276363dc1
2019-02-08 11:35:50 -08:00
David Anderson
300d0ef2c5 Full sepolicy for gsid.
am: db90b91ea0

Change-Id: I0e827f6b63f042a7a06b0dadeaf6a801a3cef30b
2019-02-07 22:10:29 -08:00
David Anderson
db90b91ea0 Full sepolicy for gsid.
Bug: 122556707
Test: manual test
Change-Id: I2536deefb3aa75deee4aeae7df074349b705b0f0
2019-02-08 05:56:58 +00:00
Daniel Rosenberg
3e40a3c938 Allow update_verifier to call checkpointing
am: 650981d2a8

Change-Id: I9f4e86f8c0a78be8899395df2afa5e05d927762d
2019-02-07 17:49:34 -08:00
Daniel Rosenberg
650981d2a8 Allow update_verifier to call checkpointing
This lets update_verifier call supportsCheckpoint to defer marking the
boot as successful when we may end up failing before we would commit
the checkpoint. In this case, we will mark the boot as successful just
before committing the checkpoint.

Test: Check that marking the boot as succesful was deferred in
      update_verifier, and done later on.
Change-Id: I9b4f3dd607ff5301860e78f4604b600b4ee416b7
2019-02-08 00:19:28 +00:00
Tri Vo
54ce1f9e94 Merge "Build product hashes together."
am: c74699105c

Change-Id: If283c0093751e29022c68603083ae23a74c39a01
2019-02-07 14:46:46 -08:00
Tri Vo
c74699105c Merge "Build product hashes together." 2019-02-07 22:39:02 +00:00