Commit graph

26894 commits

Author SHA1 Message Date
Julia Reynolds
859e5a3093 Allow people service to publish apis
Test:IPeopleManager.Stub.asInterface(ServiceManager.getService(Context.PEOPLE_SERVICE) is
not null when called from another process
Bug: 169783793

Change-Id: I280568955c50f9deef0a35ad1b9864ffc0a82db4
2020-10-16 19:22:33 +00:00
Jeff Vander Stoep
03fb6ee903 Enforce RTM_GETLINK restrictions on all 3p apps
This restriction was previously targetSdk gated for apps
with targetSdkVersion>=30.

This change is being posted for app-compat analysis and testing.

Bug: 170188668
Test: build
Change-Id: I08c709b2bb9a67157d0daf921e8ac7717a3bdf6f
2020-10-16 11:04:42 +02:00
Jack Yu
cbf7d275c5 Merge "Add sepolicy to allow read/write nfc snoop log data" am: dd5c5d7960
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1399148

Change-Id: I3184e8d9a7219eb4cf06f4a6de1735a3e822131b
2020-10-16 08:09:48 +00:00
Jack Yu
dd5c5d7960 Merge "Add sepolicy to allow read/write nfc snoop log data" 2020-10-16 07:56:10 +00:00
Michael Sun
9cb662bdba Allow SystemSuspend to read from sysfs_wakeup_reasons
This allows the SystemSuspend to read wakeup reasons from
sysfs_wakeup_reasons.

Test: Local test verified SystemSuspend can access sysfs_wakeup_reasons
Bug: 171021049
Change-Id: Ic5d723a989edbcbd55ff497a55ce8384ba1f226c
2020-10-16 07:22:44 +00:00
Chong Zhang
40d331ea5e allow mediatranscoding service to be stack dumped am: 81f5b9fd25
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1462687

Change-Id: I34d4eddb4985ae4ed3519692c5098b3fc83aa903
2020-10-16 01:41:47 +00:00
Chong Zhang
81f5b9fd25 allow mediatranscoding service to be stack dumped
bug: 170975812
Change-Id: Id73aaf5343efa3c67470e51f63a663a1684e7bf6
2020-10-15 12:54:43 -07:00
Alan Stokes
0a364c35e5 Revert "Prevent isolated_app from searching system_data_file."
This reverts commit 8dea731805.

Reason for revert: b/162048565: broke access to /data/misc/shared_relro

Change-Id: Ia0f7b6bd575f1d1c95f11a356a5463b72dde9b10
2020-10-15 16:44:52 +00:00
Woody Lin
8b3a1f1288 Merge "Add framework_watchdog_config_prop" am: 1b2d790bc4
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1317535

Change-Id: Icedb2f284b37087e212e8edaf1c299665ace50e3
2020-10-15 07:28:53 +00:00
Inseob Kim
6413c2c53a Merge "Reland "Add vendor_property_type to vendor_default_prop"" am: 0dc8a3a0f5
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1460323

Change-Id: Iaa9e96404630e30ea979785f55e8c78d94e18beb
2020-10-15 07:25:15 +00:00
Woody Lin
1b2d790bc4 Merge "Add framework_watchdog_config_prop" 2020-10-15 06:44:52 +00:00
Inseob Kim
0dc8a3a0f5 Merge "Reland "Add vendor_property_type to vendor_default_prop"" 2020-10-15 06:17:53 +00:00
Yiming Jing
c3aaa34721 Merge "Expand the scope of sepolicy_freeze_test" am: 8fea06a779
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1455040

Change-Id: Ie3b97d746ea4c9c45af8b8144b4a04b29ebefd17
2020-10-14 19:50:55 +00:00
Michael Sun
666992ecbb Allow SystemSuspend to call Bluetooth via binder
This allows the SystemSuspend to serve Bluetooth registered callbacks
for BTAA purpose.

Test: Local test verified registered callbacks been serviced
Bug: 170315554
Change-Id: I358b6732fdb663dcffd2647b6d6fa9727be5564e
2020-10-14 19:49:20 +00:00
Yiming Jing
8fea06a779 Merge "Expand the scope of sepolicy_freeze_test" 2020-10-14 19:33:43 +00:00
Michael Sun
56d65a11bf Merge "Allow Bluetooth to access SystemSuspend control service" am: 18925c87c0
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1459703

Change-Id: Iee7edf76f55d19bac974f8ccc7ff4cb9b27fb488
2020-10-14 16:28:28 +00:00
Michael Sun
18925c87c0 Merge "Allow Bluetooth to access SystemSuspend control service" 2020-10-14 16:08:27 +00:00
Alan Stokes
54c6188d34 Merge "Make shared_relro levelFrom=all." am: b62df60806
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1455021

Change-Id: Id618a7f37ceae3e30d2008808d4fda67d1560365
2020-10-14 12:18:50 +00:00
Alan Stokes
b62df60806 Merge "Make shared_relro levelFrom=all." 2020-10-14 12:03:53 +00:00
Inseob Kim
574666cb4f Reland "Add vendor_property_type to vendor_default_prop"
This reverts commit 80d6227114.

Reason for revert: fixed build error

Bug: 131162102
Test: m selinux_policy sepolicy.recovery
Change-Id: Ic974f54acd3471bf7bf8c09d8392f2dd7a248f41
2020-10-14 20:54:05 +09:00
Primiano Tucci
376e224361 Merge "Create directory for shell<>perfetto interaction" am: dd1e83aa4f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1458460

Change-Id: I14ae6ec75975b6e07fc542fbf9c7d2b3826eb314
2020-10-14 08:50:51 +00:00
Primiano Tucci
4e2c3c1fde Merge "Keep AOSP sepolicy up to date with internal master" am: ce31e4ba0e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1455339

Change-Id: Idd1d25f06dbb2f9299e3f7b4326c57c1f2f5fd1d
2020-10-14 08:49:58 +00:00
Primiano Tucci
dd1e83aa4f Merge "Create directory for shell<>perfetto interaction" 2020-10-14 08:35:53 +00:00
Primiano Tucci
ce31e4ba0e Merge "Keep AOSP sepolicy up to date with internal master" 2020-10-14 08:33:09 +00:00
Michael Sun
df54a52135 Allow Bluetooth to access SystemSuspend control service
This allows the Bluetooth to communicate with the SystemSuspend to
obtain system wakeup and wakelock information for Bluetooth activity
attribution (BTAA) processing.

BTAA is a process unit within the Bluetooth stack to aggregate
Bluetooth traffics, wakeup, and wakelocks into per-app, per-device, and
activity based statistical information.

Test: Local test verified Bluetooth can acquire suspend_control
Bug: 170315554
Change-Id: I7417132793c1000a8e3136c300cf8c1ba9cc3a14
2020-10-14 00:31:01 +00:00
Yiming Jing
d4103eed2b Expand the scope of sepolicy_freeze_test
The existing freeze test only covers the policy files in system/sepolicy
alone. There's demand from product teams that would like to implement a
freeze test for their sepolicy. Instead of letting them fork the freeze
test, we believe expanding the scope of the exising one is in the best
interest.

$FREEZE_TEST_EXTRA_DIRS and $FREEZE_TEST_EXTRA_PREBUILT_DIRS are added.
These build variables could be appended like $PRODUCT_PUBLIC_POLICY. The
product team are expected to maintain their policy prebuilts.

Bug: 166455099
Test: manual
Change-Id: I6f350e1e3db2807be4dbfd0ceb34f0d89f94d629
2020-10-13 22:51:56 +00:00
Primiano Tucci
512bdb9c1b Create directory for shell<>perfetto interaction
Users are unable to pass config files directly to
perfetto via `perfetto -c /path/to/config` and have to
resort to awkward quirks like `cat config | perfetto -c -'.
This is because /system/bin/perfetto runs in its own SELinux
domain for reasons explained in the bug.
This causes problem to test infrastructures authors. Instead
of allowing the use of /data/local/tmp which is too ill-scoped
we create a dedicated folder and allow only shell and perfetto
to operate on it.

Bug: 170404111
Test: manual, see aosp/1459023
Change-Id: I6fefe066f93f1f389c6f45bd18214f8e8b07079e
2020-10-13 21:27:27 +00:00
Darryl Johnson
15da15c280 Merge "Add device_state_service to SEPolicy." am: c80aa39c93
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1455044

Change-Id: I9c48c24dd75769135cf0653d95d6b6f262d10e5f
2020-10-13 20:59:46 +00:00
Darryl Johnson
c80aa39c93 Merge "Add device_state_service to SEPolicy." 2020-10-13 20:46:46 +00:00
Primiano Tucci
5d026b3152 Keep AOSP sepolicy up to date with internal master
This re-alignes aosp and internal master to avoid
conflicts when uploading CLs upstream.

Bug: 170126760
Change-Id: I9c087e70998cd529b71dec7428641c4bfef10d31
2020-10-13 18:52:25 +00:00
Darryl L Johnson
d6cc359691 Add device_state_service to SEPolicy.
This is to support the addition of the device state manager service and
its associated binder service.

Test: Manual - Modify policy and verify binder service can be published.
Fixes: 170034199
Change-Id: Id63cb1db3ee80ec699e98443457c113d6be809fe
2020-10-13 07:48:56 -07:00
Yo Chiang
7d15ce223b Add secdiscard policies for vold_metadata_file
Add allow rules for destroyDsuMetadataKey() to securely discard key
files labeled as vold_metadata_file.

Bug: 168571434
Test: Wipe a DSU installation and verify that there's no avc denial.
Change-Id: I01acb6d732f345a5d937a2781befda80c64844b9
2020-10-13 11:02:29 +00:00
Marin Shalamanov
ee5272cf7a Rename the sysprop for updating device product info am: bf908d3be5
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1455031

Change-Id: I646ea2ddfc0724c0db42dd37d0817927b4013c03
2020-10-13 02:11:52 +00:00
Benedict Wong
93069c0373 Add SEpolicy for VcnManagementService
This patch adds the requisite permissions for the VcnManagementService.

Bug: 163431877
Test: Compiles, boots, FrameworksNetTests passes
Change-Id: I6e03ee798027b28f67d60c6e4280fb3410ec94c4
2020-10-12 18:50:18 -07:00
Marin Shalamanov
bf908d3be5 Rename the sysprop for updating device product info
Test: read the prop from SurfaceFlinger; test on device
Change-Id: Id80954d6ea426b90b6cea5f74aae4d6cc905fcc5
2020-10-12 22:01:54 +02:00
Woody Lin
e005432482 Add framework_watchdog_config_prop
The framework_watchdog_config_prop properties control framework watchdog
configurations to handle watchdog timeout loop. The properties are
written only by vendor_init.

More details and background: go/break-sys-watchdog-loop

Bug: 141948707
Change-Id: I6c0da5fdafba8165e79d0f04e0a82874f605a06d
2020-10-12 16:44:13 +00:00
Alan Stokes
c7229c760f Make shared_relro levelFrom=all.
Also make shared_relro_file mlstrustedobject to ensure these files can
still be read by any app in any user.

Bug: 170622707
Test: Manual: delete the files, check they are re-created and accessible.
Test: Manual: no denials seen
Test: Presubmits
Change-Id: Icce4ee858219e3fd0e307f3edfb3c66005872a45
2020-10-12 14:43:01 +01:00
Florian Mayer
b2c7f92a08 Merge "Allow heapprofd to read shell_data_file." am: 7f663a15e1
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1450815

Change-Id: I03662f5fc181b20e8499567749f39532f566f120
2020-10-12 09:45:54 +00:00
Florian Mayer
7f663a15e1 Merge "Allow heapprofd to read shell_data_file." 2020-10-12 09:29:34 +00:00
Treehugger Robot
9640e3c44d Merge "Android.mk: Support SYSTEM_EXT* sepolicy" am: 5b238f9799
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1277793

Change-Id: I245db072c495f1b6a10ee7522836549fc912eb1b
2020-10-12 04:20:32 +00:00
Treehugger Robot
08dea35ec5 Merge "build: Rename Plat->SystemExt*SepolicyDirs" am: 9a0cff4756
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1274773

Change-Id: I9dc23057e1c512f0604bccc0ef6b1b98a8b51ff0
2020-10-12 04:20:10 +00:00
Treehugger Robot
5b238f9799 Merge "Android.mk: Support SYSTEM_EXT* sepolicy" 2020-10-12 03:49:24 +00:00
Treehugger Robot
9a0cff4756 Merge "build: Rename Plat->SystemExt*SepolicyDirs" 2020-10-12 03:49:24 +00:00
Xin Li
6355987626 Skip ab/6749736 in stage.
Merged-In: Ie19dbe9d24525ea2612b7c7616efb852613b8ff3
Change-Id: If40e43eea59eb97e0b294d38d730d206955b7bee
2020-10-08 17:24:04 -07:00
Yifan Hong
fab3665eac Merge "Revert "Add /boot files as ramdisk_boot_file."" am: 271ba1c3ff
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1454917

Change-Id: I2f63826ee6da31b8925f9df72cabcd61c3cc5126
2020-10-08 22:36:33 +00:00
Yifan Hong
271ba1c3ff Merge "Revert "Add /boot files as ramdisk_boot_file."" 2020-10-08 22:28:43 +00:00
Yifan Hong
f5f4c1207a Revert "Add /boot files as ramdisk_boot_file."
This reverts commit 2576a2fc30.

Reason for revert: conflict with device-specific sepolicy

Bug: 170411692
Change-Id: Ie5fde9dd91b603f155cee7a9d7ef432a05dc6827
Test: pass
2020-10-08 22:13:44 +00:00
Steven Moreland
96bfdd55c7 Merge changes from topic "b163478173-I" am: eacff783ee
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1454056

Change-Id: Ic084c4bca152d9334fe3ccb180116b0304d8f7b0
2020-10-08 22:10:45 +00:00
linpeter
dfe96e800d sepolicy: remove hal_light_severice exception am: d62ddfef9c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1454055

Change-Id: I6d9692fde0cb3df98bab89275ee1dba37843c55e
2020-10-08 22:10:24 +00:00
Steven Moreland
eacff783ee Merge changes from topic "b163478173-I"
* changes:
  Rem /vendor app neverallow to get vendor services
  sepolicy: remove hal_light_severice exception
2020-10-08 21:52:21 +00:00