Commit graph

804 commits

Author SHA1 Message Date
Hung-ying Tyan
e4350c1a64 Sepolicy for dynamic_android_service
Dynamic_android service is a proxy running in SystemServer to the
gsi_service daemon. It provides a set of SystemApi's to manage
installation of a new system image to the device while keeping the
original system image intact.

Bug: 122929007
Test: manual; see dynamic_android service start in logcat
Change-Id: Idb9b0475677dad13b7864ca0cf6041dcab04b4e3
2019-01-31 01:30:36 +00:00
Jeff Vander Stoep
c4bc7d04db Initial selinux policy support for memfd am: 9f5d0d90a3 am: 5314cb2a93
am: beb8e5d159

Change-Id: Ia03563336f924ea99af2763b2edc71c2be52b6d3
2019-01-30 11:51:10 -08:00
Jeff Vander Stoep
9f5d0d90a3 Initial selinux policy support for memfd
Move all app tmpfs types to appdomain_tmpfs. These are still protected
by mls categories and DAC. TODO clean up other app tmpfs types in a
separate change.

Treble-ize tmpfs passing between graphics composer HAL and
surfaceflinger.

Bug: 122854450
Test: boot Blueline with memfd enabled.
Change-Id: Ib98aaba062f10972af6ae80fb85b7a0f60a32eee
2019-01-30 19:11:49 +00:00
Shuzhen Wang
043d6165cc Revert "Cameraserver: Allow cameraserver to access /data/misc/cameraserver" am: 6b4caaa3e8 am: e588655bb9
am: e828b68c69

Change-Id: I2f7bea04a595a7c18d915d354a833581a08ec556
2019-01-29 21:58:14 -08:00
Shuzhen Wang
6b4caaa3e8 Revert "Cameraserver: Allow cameraserver to access /data/misc/cameraserver"
This reverts commit 4e1497c7c0.

Reason for revert: Write temporary file to in-memory tmpfs instead

Test: testHeic CTS test
Bug: 123526741
Change-Id: Ifa7f5a0b50c46ee3e1a5695595233b17adc99222
2019-01-29 23:29:05 +00:00
Mathieu Chartier
b4eeac082b Merge "Rename runtime -> runtime_native property namespace" am: 91b0ef13d8 am: a35beeb6f3
am: e888dfe164

Change-Id: I2be9aa92f6bf7e9384f6e762937847003088c284
2019-01-29 15:26:34 -08:00
Roland Levillain
1cab1b17c0 Introduce a postinstall_apex_mnt_dir label for /postinstall/apex. am: a42ebf4128 am: 9ae5d888eb
am: 2f42ac1194

Change-Id: Iad72d60f0da9773c63b0814360e33a56b54d45f8
2019-01-29 10:35:21 -08:00
Mathieu Chartier
669cef88a3 Rename runtime -> runtime_native property namespace
The convention for native properties is to use _native suffix.

Bug: 123524494
Bug: 120794191
Test: set a property and ensure it can be read in AndroidRuntime.cpp

Change-Id: I69feab9be78f24d812b8f953d3ec06a5d8d18f15
2019-01-29 10:20:36 -08:00
Roland Levillain
a42ebf4128 Introduce a postinstall_apex_mnt_dir label for /postinstall/apex.
Directory `/postinstall/apex` is used as a mount point for a tmpfs
filesystem during A/B OTA updates. APEX packages from the new system
partition are mounted ("activated") in subdirectories of
`/postinstall/apex`, so that they are available when `otapreopt` is
running.

Directory `/postinstall/apex` used to be of type `tmpfs` for SELinux
purposes. The new `postinstall_apex_mnt_dir` label is more
restrictive, and tightens permissions granted to `otapreopt_chroot`,
`otapreopt` (running as `postinstall_dexopt`), and `dex2oat`,
regarding the apexd logic recently added to `otapreopt_chroot`.

Test: A/B OTA update test (asit/dexoptota/self_full).
Bug: 113373927
Bug: 120796514
Change-Id: I03f0b0433d9c066a0c607f864d60ca62fc68c990
2019-01-29 10:09:50 +00:00
Mathieu Chartier
32aede6d43 Merge "Add runtime property permissions for experiments" am: 2c92514304 am: 01a1ca2d55
am: cc338e14da

Change-Id: I4093910bc1e8f3c4a5022fd1db834117cbf328f2
2019-01-29 00:48:55 -08:00
Mathieu Chartier
05ad04dd91 Add runtime property permissions for experiments
Bug: 120794191
Bug: 123524494
Test: set a property and ensure it can be read in AndroidRuntime.cpp

Change-Id: Ib37102f35e9987d3d9baff83c45571a5d632ad50
2019-01-28 12:39:23 -08:00
Shuzhen Wang
bdcc2e6c5f Cameraserver: Allow cameraserver to access /data/misc/cameraserver am: 4e1497c7c0 am: 33898587ef
am: 588ea7beb8

Change-Id: I4cee94a2540767c54eecedb9d40943f35186be21
2019-01-28 09:13:15 -08:00
Shuzhen Wang
4e1497c7c0 Cameraserver: Allow cameraserver to access /data/misc/cameraserver
Test: Cameraserver writes/reads/overwrites files in the folder
Bug: 79465976
Change-Id: I76460844a8e02e4c6ce704b85c72e57f861f5b18
2019-01-28 07:32:00 -08:00
Jeff Vander Stoep
41a2abfc0d Properly Treble-ize tmpfs access
This is being done in preparation for the migration from ashmem to
memfd. In order for tmpfs objects to be usable across the Treble
boundary, they need to be declared in public policy whereas, they're
currently all declared in private policy as part of the
tmpfs_domain() macro. Remove the type declaration from the
macro, and remove tmpfs_domain() from the init_daemon_domain() macro
to avoid having to declare the *_tmpfs types for all init launched
domains. tmpfs is mostly used by apps and the media frameworks.

Bug: 122854450
Test: Boot Taimen and blueline. Watch videos, make phone calls, browse
internet, send text, install angry birds...play angry birds, keep
playing angry birds...

Change-Id: I20a47d2bb22e61b16187015c7bc7ca10accf6358
Merged-In: I20a47d2bb22e61b16187015c7bc7ca10accf6358
(cherry picked from commit e16fb9109c)
2019-01-26 17:30:41 +00:00
Jeffrey Vander Stoep
dd57e7b69f Merge "Properly Treble-ize tmpfs access" 2019-01-26 17:27:47 +00:00
Jeff Vander Stoep
e16fb9109c Properly Treble-ize tmpfs access
This is being done in preparation for the migration from ashmem to
memfd. In order for tmpfs objects to be usable across the Treble
boundary, they need to be declared in public policy whereas, they're
currently all declared in private policy as part of the
tmpfs_domain() macro. Remove the type declaration from the
macro, and remove tmpfs_domain() from the init_daemon_domain() macro
to avoid having to declare the *_tmpfs types for all init launched
domains. tmpfs is mostly used by apps and the media frameworks.

Bug: 122854450
Test: Boot Taimen and blueline. Watch videos, make phone calls, browse
internet, send text, install angry birds...play angry birds, keep
playing angry birds...

Change-Id: I20a47d2bb22e61b16187015c7bc7ca10accf6358
2019-01-25 08:56:45 -08:00
Michael Wright
345d030880 Add new external vibrator service to system_server am: e9f1668c17 am: 24f1d94dfa
am: a55d651f46

Change-Id: I956c3652a6e0d84ed14f5c3ab52459d7214679ca
2019-01-25 08:54:32 -08:00
Michael Wright
e9f1668c17 Add new external vibrator service to system_server
Bug: 111457573
Test: N/A
Change-Id: I457fd9d13cc481f2687ab39d22240c6ea7231183
2019-01-25 14:26:07 +00:00
Ng Zhi An
52eb5982f5 Merge "Update sepolicy with new native boot flag for activity_manager" am: 055286fc94 am: d5315561bc
am: ad2235d039

Change-Id: I2d59357604c642d7943d075cb0bd923876263372
2019-01-24 14:27:23 -08:00
Yabin Cui
0c7428049c Merge "Add sepolicy for simpleperf_app_runner." am: 31bd80439f am: fc44e546bd
am: c2bf098d77

Change-Id: I4541dc21f078cbbee1e9196b199e880edbe087e5
2019-01-24 12:26:08 -08:00
Ng Zhi An
c5bf4a3994 Update sepolicy with new native boot flag for activity_manager
Whitelist the persistent system properties that will be used as
flags in activity manager experiments.

Bug: 120794810
Test: m, flash, test getting flag value in ActivityManagerService.java
Change-Id: I90a10bc87d6db3a64347b62fd02e6f0b12ac9fa8
2019-01-24 11:07:17 -08:00
Siarhei Vishniakou
522688e39c Merge "Permissions for input_native_boot flags" am: b1f34ddaf7 am: aee5061689
am: 6ef1644a97

Change-Id: I21f93af8044a142ce91db3882c5c74a2f514dca9
2019-01-23 15:31:23 -08:00
Yabin Cui
e5fc21c787 Add sepolicy for simpleperf_app_runner.
Bug: 118835348
Test: build and boot pixel 3.
Test: run simpleperf_app_runner manually.

Change-Id: Ifb6c2ab78e075684bc197d06f761becced8281d1
2019-01-23 23:23:09 +00:00
Siarhei Vishniakou
c0c9155589 Permissions for input_native_boot flags
For input experiments that are enabled at boot time, allow system_server
to read and write the device config flags.

Bug: 120794829
Test: presubmit
Change-Id: I0f075a7579c593d4e07c3e31be529e34554068a6
2019-01-22 16:18:47 -08:00
Hongyi Zhang
926f3dba20 Merge "Clean up server_configurable_flags test prop" am: d71144a922 am: 365d9f3c8c
am: 7a4610d779

Change-Id: I8ff8876aa9bd5fbb052e0b79fb0c78881d431890
2019-01-22 12:13:13 -08:00
Hongyi Zhang
f3db0085f0 Clean up server_configurable_flags test prop
Test: m -j & manually on device
Change-Id: I3f5ddeb26ddf1bf280ef5e7b3e62b4b892b83a3c
2019-01-22 01:42:36 +00:00
Martijn Coenen
e6da5cb024 Initial sepolicy for app_zygote. am: 1bbda7e662 am: fd4b0b29f9
am: e50dea816b

Change-Id: I6d16b8948f9c1b923f5b5395a52bc0d75ba89bc8
2019-01-21 00:37:52 -08:00
Martijn Coenen
1bbda7e662 Initial sepolicy for app_zygote.
The application zygote is a new sort of zygote process that is a
child of the regular zygote. Each application zygote is tied to the
application for which it's launched. Once it's started, it will
pre-load some of the code for that specific application, much like
the regular zygote does for framework code.

Once the application zygote is up and running, it can spawn
isolated service processes that run in the isolated_app domain. These
services can then benefit from already having the relevant
application code and data pre-loaded.

The policy is largely the same as the webview_zygote domain,
however there are a few crucial points where the policy is different.

1) The app_zygote runs under the UID of the application that spawned
   it.
2) During app_zygote launch, it will call a callback that is
   controlled by the application, that allows the application to
   pre-load code and data that it thinks is relevant.

Especially point 2 is imporant: it means that untrusted code can run
in the app_zygote context. This context is severely limited, and the
main concern is around the setgid/setuid capabilities. Those conerns
are mitigated by installing a seccomp filter that only allows
setgid/setuid to be called in a safe range.

Bug: 111434506
Test: app_zygote can start and fork children without denials.
Change-Id: I1cc49ee0042d41e5ac6eb81d8f8a10ba448d4832
2019-01-21 08:24:41 +00:00
William Hester
2367e8790b Merge "Add the testharness service to sepolicy rules" am: 1fefa6c0e8 am: a587f0d4d3
am: d10adc6f50

Change-Id: I9af82b1f2583945eb8c0ba5563cf2d548e552619
2019-01-17 17:52:59 -08:00
William Hester
5f486c74bf Add the testharness service to sepolicy rules
The testharness service will manage Test Harness Mode and provide a
command-line interface for users to enable Test Harness Mode; however it
does not directly provide a public API.

Bug: 80137798
Test: make
Test: flash crosshatch
Change-Id: Ie396e40fcea8914b4dd2247f2314e029b66ad84e
2019-01-17 13:10:37 -08:00
Nandana Dutt
2d4b0694d4 Merge "Add sepolicy for BugreportManagerService" am: 5a974a0eae am: b3b807b758
am: 28bcda8e78

Change-Id: I81244c1a7c851fee1b21ef3f4c59e5c47bc61911
2019-01-17 13:09:07 -08:00
Nandana Dutt
5cdd2f5ef8 Add sepolicy for BugreportManagerService
BUG:111441001
Test: boots
Change-Id: I71a54e8335c5ce7f9d97af3dbbd62e663bb66d33
2019-01-17 12:23:31 +00:00
David Anderson
f3fd8fff2a sepolicy for gsid am: 6d53efcf46 am: 34d1f38571
am: fe2533bc60

Change-Id: I9ca3f620dafc3d2bdc143f6a50a710745b89531c
2019-01-15 22:55:23 -08:00
David Anderson
6d53efcf46 sepolicy for gsid
Bug: 122556707
Test: gsid starts
Change-Id: Ib05ddb79051436f51cd236de04027a3b12ee87a9
Signed-off-by: Sandeep Patil <sspatil@google.com>
2019-01-15 20:43:33 -08:00
chenbruce
4e5057af68 SEPolicy updates for adding native flag namespace(netd). am: e3d625b72e am: fa0e90a368
am: 51ae024208

Change-Id: Iffb914913a3062836fe0fc857dc992d53d8cd336
2019-01-14 19:53:05 -08:00
chenbruce
e3d625b72e SEPolicy updates for adding native flag namespace(netd).
For experiment flag testing, we add a flag netd and have
SEPolicy updates.

Test:  add sepolicy, m -j, check GetServerConfigurableFlag function in netd
Bug:122050512
Change-Id: I21c844c277afc358085d80447f16e4c0d4eba5b3
2019-01-15 02:47:57 +00:00
Jeff Vander Stoep
5f53a116c4 resolve merge conflicts of 9678d0d6da to master
Test: build
Change-Id: Iecb7fae299d5714c98bdcb9da245b44819cf04be
2019-01-14 16:10:40 -08:00
Joel Fernandes
b76a639956 Add permissions for bpf.progs_loaded property
Change-Id: If4e550e4186415c5a1088bb53b0755b69f92560a
Signed-off-by: Joel Fernandes <joelaf@google.com>
2019-01-14 10:59:10 -05:00
Steven Moreland
d8994c81fb system/etc/event-log-tags available to all am: b7246ac0b6 am: 78bcb0e237
am: 7805582beb

Change-Id: Ie8dcfd66d647842bf84826249c9127e3cc5ddcfc
2019-01-11 11:55:38 -08:00
Siarhei Vishniakou
434dd2d6c7 Merge "Permissions for InputClassifier HAL" am: 1531e72e76 am: f01aeef78c
am: 26670ab73f

Change-Id: I45ee39fb63dab2ec91a5a909e59c990bacc7c48a
2019-01-11 11:54:26 -08:00
Steven Moreland
78bcb0e237 system/etc/event-log-tags available to all
am: b7246ac0b6

Change-Id: I724850c1ecb440d15baca4e9cdda9d19f4a65fa8
2019-01-11 11:02:21 -08:00
Siarhei Vishniakou
f01aeef78c Merge "Permissions for InputClassifier HAL"
am: 1531e72e76

Change-Id: Ic1f5e2815740222e35011738a6f391b5d2222019
2019-01-11 10:54:31 -08:00
Steven Moreland
b7246ac0b6 system/etc/event-log-tags available to all
This was a regression in Q, and the file is an implementation of
liblog.

Bug: 113083310
Test: use tags from vendor and see no denials

Change-Id: I726cc1fcfad39afc197b21e431a687a3e4c8ee4a
2019-01-11 18:42:02 +00:00
Chalard Jean
4f2b179cc3 Add sepolicy for IpMemoryStoreService am: fb15c9f12f am: bb05d23d63
am: 2f3ccbbe8b

Change-Id: I0dced9f1d9f741689e6243f8288f18b8067521e7
2019-01-11 01:26:10 -08:00
Chalard Jean
bb05d23d63 Add sepolicy for IpMemoryStoreService
am: fb15c9f12f

Change-Id: I43acccc8658c9fade28fe3513f48627d765450d3
2019-01-11 01:13:59 -08:00
Felipe Leme
26f04ff7f2 DO NOT MERGE - Renamed "intelligence" to "content_capture"
This cherry-pick exists to update stage-aosp-master sepolicy
files to look like the ones in master and aosp. It looks like
it was an overlook this patch was merged with DO NOT MERGE
instead of only Merged-In.

Bug: 111276913
Test: manual verification

Merged-In: If76dc7bfdad87789a58fc94e0fd280deae1a41ab
Change-Id: If76dc7bfdad87789a58fc94e0fd280deae1a41ab
(cherry picked from commit 73e7fa884b)
2019-01-11 17:45:42 +09:00
Siarhei Vishniakou
41a871ba84 Permissions for InputClassifier HAL
Add the required permissions for the InputClassifier HAL.

Bug: 62940136
Test: no selinux denials in logcat when HAL is used inside input flinger.
Change-Id: Ibc9b115a83719421d56ecb4bca2fd196ec71fd76
2019-01-11 02:08:19 +00:00
Chalard Jean
fb15c9f12f Add sepolicy for IpMemoryStoreService
Bug: 116512211
Test: Builds, boots, including upcoming changes needing this
Change-Id: I6f119368c5a4f7ac6c0325915dff60124c5a6399
2019-01-10 18:06:56 +09:00
Yabin Cui
819fb2fe1e Merge "Add permissions in runas_app domain to debug/profile debuggable apps." am: cd1c24f323 am: 0dd15e788a
am: b60f982707

Change-Id: I102ae116e38ee87d291c15a814976c750c180c6e
2019-01-09 12:17:01 -08:00
Yabin Cui
0dd15e788a Merge "Add permissions in runas_app domain to debug/profile debuggable apps."
am: cd1c24f323

Change-Id: I11c6f1d25977837b5388de34a3796b7cadcf5ea8
2019-01-09 12:06:09 -08:00
Yabin Cui
770a4f6539 Add permissions in runas_app domain to debug/profile debuggable apps.
runas_app domain is used by lldb/ndk-gdb/simpleperf to debug/profile
debuggable apps. But it misses permissions to ptrace app processes and
read /proc/<app_pid> directory.

Bug: none
Test: build and boot marlin.
Test: run lldb and simpleperf on apps with target sdk version 24-29.
Change-Id: I9e6f940ec81a8285eae8db3b77fb1251a25dedd0
2019-01-09 17:24:31 +00:00
Dario Freni
9a8cac3238 Merge "SEPolicy for Staged Installs." am: 4d399f606f am: 757484f199
am: 783eee99dd

Change-Id: Id6b404c391e130cf0f74db6613ee7ca6426498c0
2019-01-08 02:19:28 -08:00
Dario Freni
757484f199 Merge "SEPolicy for Staged Installs."
am: 4d399f606f

Change-Id: Idbec6c32736accd630831d7de420d4bdc66b9d14
2019-01-08 02:03:00 -08:00
Dario Freni
274c1ded4d SEPolicy for Staged Installs.
Test: basic workflow between apexd and PackageManager tested with
changes being developed.
Bug: 118865310
Change-Id: I1ae866f33e9b22493585e108c4fd45400493c7ac
2019-01-07 22:36:28 +00:00
Richard Uhler
f40636dc09 Merge "Add sepolicy for RollbackManagerService." 2019-01-04 17:52:25 +00:00
Zachary Iqbal
4c7469ad38 Added placeholder SELinux policy for the biometric face HAL. am: 893272d883 am: f8be9cf1c0
am: ab1e43cdad

Change-Id: If9c63acee76a9574c2e2fdbd7a2796bf89d194cc
2018-12-28 13:00:42 -08:00
Zachary Iqbal
f8be9cf1c0 Added placeholder SELinux policy for the biometric face HAL.
am: 893272d883

Change-Id: I6888b5d3527c396e59b3798d18595e47a3002fde
2018-12-28 12:32:26 -08:00
Zachary Iqbal
893272d883 Added placeholder SELinux policy for the biometric face HAL.
Notes:
- Added face hal domain, context and file types for the default
  SELinux policy.
- Please see aosp/q/topic:"Face+Authentication"

Bug: 80155388
Test: Built successfully.
Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
2018-12-28 12:23:56 -08:00
Dario Freni
5ed3e5e6c9 Revert "Add StagingManager service." am: ca86169422 am: 86acf690de
am: d4b1901c83

Change-Id: I506af3ac76f51d63e6ef5c967a610e648f6aa467
2018-12-28 10:55:22 -08:00
Dario Freni
86acf690de Revert "Add StagingManager service."
am: ca86169422

Change-Id: I114102451c0463d0ccb1db688e60f0baea9ebfb7
2018-12-28 10:25:44 -08:00
Dario Freni
ca86169422 Revert "Add StagingManager service."
This reverts commit 9eb3b8ffdf.

Reason for revert: We are deciding for now not to make StagingManager a fully-fledged binder service, as it will only be accessed by PackageInstaller. We might re-evaluate this decision later if needed.

Bug: 122072686
Change-Id: Ic2a53fc92ddd7d7eeccc6a4a0117f28724346ec7
2018-12-28 12:50:49 +00:00
Dario Freni
010299eb55 Add StagingManager service. am: 9eb3b8ffdf am: 35e5027124
am: 193713107c

Change-Id: I3518d2cd17be96270ad75ba9fa66208887871045
2018-12-27 10:12:11 -08:00
Dario Freni
35e5027124 Add StagingManager service.
am: 9eb3b8ffdf

Change-Id: I26f5722d645dab805634fcaefa9a0c3ad94a2c93
2018-12-27 10:03:57 -08:00
Richard Uhler
25529f6217 Add sepolicy for RollbackManagerService.
Bug: 112431924
Test: atest RollbackTest
Change-Id: I30453a8d5352a31e3e6af6c37a20b5473904d356
2018-12-27 17:21:37 +00:00
Dario Freni
9eb3b8ffdf Add StagingManager service.
Adding a new high-level service which will handle staged installs, i.e.
installs that require a reboot.

Bug: 118865310
Test: An initial implementation of StagingManager can be reached
successfully by PackageManagerService and PackageInstallerService.
Change-Id: I8859b463575f8ee85caae43570958347b82f967e
2018-12-27 16:13:24 +00:00
Michael Groover
390270e0fb Merge "Add selinux policy for new SensorPrivacyService"
am: 09c86730b5

Change-Id: I274d9e0bbbc006fdbb5a544ea649eceb3172840f
2018-12-27 08:06:12 -08:00
Michael Groover
09c86730b5 Merge "Add selinux policy for new SensorPrivacyService"
Test: manually verified SensorPrivacyService is accessible
Bug: 110842805
Merged-In: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
(cherry picked from commit 0ac3dea71b)
2018-12-27 08:53:15 +00:00
Emilian Peev
992f6099ab Merge "sepolicy: Add "rs" and "rs_exec" to public policy" am: 9c9eb2dfca am: 67fbfdf793
am: 8f1e4e52f3

Change-Id: I72500b06122cb5b5f527d196deff9bc50a5442cb
2018-12-21 17:05:49 -08:00
Emilian Peev
67fbfdf793 Merge "sepolicy: Add "rs" and "rs_exec" to public policy"
am: 9c9eb2dfca

Change-Id: I4cc8e1179f65f2f3a881f1bd79d457daf3c299c7
2018-12-21 16:46:22 -08:00
Emilian Peev
a34cfe7b56 sepolicy: Add "rs" and "rs_exec" to public policy
Add "rs" and "rs_exec" types to public policy. Access
to these types might be needed for device specific
customization.

Bug: 121306110
Test: Manual using application
Change-Id: Ief35d3353625adfbf468447de74aa80651dd9451
2018-12-21 17:47:54 +00:00
Remi NGUYEN VAN
0c1d5701d7 Add selinux policies for network stack service am: 47c2dee5c2 am: 4d75750f98
am: 515455f473

Change-Id: I891eac74bd61982b2192ab0e80340b7273834176
2018-12-20 17:44:29 -08:00
Remi NGUYEN VAN
5c8f87e1c9 Merge "sepolicy changes for network stack app" am: 41b6263007 am: 5b586461ca
am: ec91e1f31d

Change-Id: Ie496a81612cfdd0ff7af26533209d40fce564a35
2018-12-20 17:36:10 -08:00
Remi NGUYEN VAN
4d75750f98 Add selinux policies for network stack service
am: 47c2dee5c2

Change-Id: I01235f3e048c7149ff741bbb7563da999e98e415
2018-12-20 16:46:47 -08:00
Remi NGUYEN VAN
5b586461ca Merge "sepolicy changes for network stack app"
am: 41b6263007

Change-Id: I1fb6a0729528895a500af70b83144c966b1037ee
2018-12-20 16:41:37 -08:00
Remi NGUYEN VAN
47c2dee5c2 Add selinux policies for network stack service
The policies allow the system server to register a network_stack_service
used to communicate with the network stack process.

Test: atest FrameworksNetTests
Bug: b/112869080
Change-Id: Ib9b7d9150fe4afcce03c8b3dbb36b81c67e39366
2018-12-21 00:09:50 +00:00
Remi NGUYEN VAN
41b6263007 Merge "sepolicy changes for network stack app" 2018-12-21 00:06:39 +00:00
Martijn Coenen
80dec04363 Merge "Allow apexd to write to sysfs loop device parameters." am: 36f93d0339 am: 11ac1ed2dd
am: 537a20706d

Change-Id: I0887f37b30e62f06784d89a4fe768c488a6ee2fd
2018-12-20 00:26:41 -08:00
Martijn Coenen
11ac1ed2dd Merge "Allow apexd to write to sysfs loop device parameters."
am: 36f93d0339

Change-Id: I2301afff86aa59e600641a5e7f2af863f1e0730d
2018-12-20 00:07:16 -08:00
Remi NGUYEN VAN
5f3ba92c61 sepolicy changes for network stack app
The networking stack app hosts services that used to be in the system
server (IpClient, NetworkMonitor for now), but in a different process to
be packaged as a mainline module.

Test: booted, verified networking stack working when in app
Change-Id: I300a556f51b35c17378af961cea1ec937444e597
2018-12-20 12:05:31 +09:00
Martijn Coenen
d7bf9218a0 Allow apexd to write to sysfs loop device parameters.
To configure read-ahead on loop devices, eg.
/sys/devices/virtual/block/loop0/queue/read_ahead_kb

Bug: 120776455
Test: configuring read-ahead on loop devices works from apexd
Change-Id: Ib25372358e8ca62fa634daf286e4b64e635fac58
2018-12-20 03:05:50 +01:00
Winson Chung
f933d4545c Adding policy for content suggestions.
Cherry-picked from aosp/852612 (commit Ic0b3f85fad24ccedc0a8e9935c198bc8503bb415),
and is a manual merge for ag/5836696 (commit I360ce12f33e333766f6f30614c87811d05e663a4)

Bug: 120865921
Test: Manual verification
Change-Id: Ic0b3f85fad24ccedc0a8e9935c198bc8503bb415
2018-12-18 17:57:41 +00:00
Winson Chung
2a7cd0d1ea resolve merge conflicts of ac1a0a7bf5 to stage-aosp-master
Bug: None
Test: I solemnly swear I tested this conflict resolution.

Change-Id: I360ce12f33e333766f6f30614c87811d05e663a4
Merged-In: Ic0b3f85fad24ccedc0a8e9935c198bc8503bb415
2018-12-18 17:47:03 +00:00
Winson Chung
ac1a0a7bf5 Adding policy for content suggestions.
Bug: 120865921
Test: Manual verification
Change-Id: Ic0b3f85fad24ccedc0a8e9935c198bc8503bb415
2018-12-18 00:30:34 +00:00
Todd Kennedy
bdcbd3b7e2 Create new permissionmgr_service am: 784c2b8d32 am: aa79e34850
am: b9e8dd8a60

Change-Id: I1a4cab532d9f6cccdc07776fdbbcb32c2a616b65
2018-12-17 13:19:04 -08:00
Todd Kennedy
aa79e34850 Create new permissionmgr_service
am: 784c2b8d32

Change-Id: I840e2291d05ec8643ae3d08b494e4f4396f00511
2018-12-17 12:54:46 -08:00
Todd Kennedy
784c2b8d32 Create new permissionmgr_service
We're creating a new PermissionManagerService that will handle
all of the permission related APIs. These are currently being
routed through PackageManagerService.

Test: Device boots
Change-Id: I7d08561dd33b692209c30d413cdca0ff567358f1
2018-12-17 14:49:01 +00:00
Rafal Slawik
3e45997d95 Merge "SELinux policy for rss_hwm_reset" am: 98c6b33088 am: 6ad9f07660
am: 0f05f12beb

Change-Id: I90e3dbd79aba47f50b7a938b1759ed68a44a4b2b
2018-12-17 04:52:18 -08:00
Rafal Slawik
6ad9f07660 Merge "SELinux policy for rss_hwm_reset"
am: 98c6b33088

Change-Id: I4ceb35dd14a08a21cb6a1b13f743f89599871377
2018-12-17 04:43:20 -08:00
Rafal Slawik
4e1c5764b5 SELinux policy for rss_hwm_reset
rss_hwm_reset is binary that reset RSS high-water mark counters for all
currently running processes. It runs in a separate process because it
needs dac_override capability.

Bug: 119603799
Test: no errors in logcat
Change-Id: I6221a5eca3427bf532830575d8fba98eb3e65c29
2018-12-15 10:13:03 +00:00
Felipe Leme
0f45683fb3 DO NOT MERGE - Renamed "intelligence" to "content_capture"
Bug: 111276913
Test: manual verification

Merged-In: If76dc7bfdad87789a58fc94e0fd280deae1a41ab
Change-Id: If76dc7bfdad87789a58fc94e0fd280deae1a41ab
(cherry picked from commit 73e7fa884b)
2018-12-14 08:34:32 -08:00
Michael Groover
0ac3dea71b Add selinux policy for new SensorPrivacyService
Test: manually verified SensorPrivacyService is accessible
Bug: 110842805
Change-Id: Idd215f338f2da0dab4898ea06fa08d9b4a1bcb5f
2018-12-14 03:19:22 -08:00
Florian Mayer
5c6dcb727c Add persist.heapprofd.enable property. am: c32ca90181 am: 4935f90876
am: 0f094e304a

Change-Id: Ibb7cf3bae4e92e618d16d292c848dd257d6f68a2
2018-12-12 08:08:49 -08:00
Florian Mayer
c32ca90181 Add persist.heapprofd.enable property.
This is analoguous to what Perfetto does with persist.traced.enable.

Test: m
Test: flash walleye
Test: setprop persist.heapprofd.enable 1
      setprop persist.heapprofd.enable 0

Change-Id: I997272ef8c6fe078aca2388ed0cf2ecc3de612a5
2018-12-12 10:26:33 +00:00
Sunny Goyal
32b4f50c7f New system service: app_prediction_service am: 2a2d638ef6 am: e5ff5023d3
am: e1b0d95689

Change-Id: Idec4f089242127af878c27ab100b99653270192a
2018-12-11 20:07:35 -08:00
Sunny Goyal
2a2d638ef6 New system service: app_prediction_service
- Update policy for new system service, used for SystemUI/Apps to
  present predicted apps in their UI.

Bug: 111701043
Test: manual verification
Change-Id: Ia3b5db987097d2d71bf774ca550041e03214471d
2018-12-12 03:33:56 +00:00
Benjamin Schwartz
e7040eada0 Add power.stats HAL 1.0 sepolicy
Also giving statsd permission to access it. This change copies the internal sepolicy to AOSP.

Bug: 111185513
Bug: 120551881
Test: make
Change-Id: I7e0386777e05580299caf9b97cb7804459f1a9d0
2018-12-11 00:11:08 +00:00
Matt Pape
0dd5cf439b Merge "SEPolicy updates for DeviceConfig Service." am: b1553b72a8 am: 4da093fe61
am: 5f12b6426b

Change-Id: Ic0a2419e140465a06c3911b6eed1f153d6df66c0
2018-12-07 12:46:31 -08:00
Matt Pape
b1553b72a8 Merge "SEPolicy updates for DeviceConfig Service." 2018-12-07 20:23:59 +00:00
Matt Pape
6aa44527b8 SEPolicy updates for DeviceConfig Service.
Add a DeviceConfig service in system_server to edit configuration flags.
This is intended to be a command line tool for local overrides and/or
tool for tests that adopt shell permissions.

Test: None
Bug:109919982
Bug:113101834
Change-Id: Ib7bed752849b1ed102747e3202dd7aed48d2c6d5
2018-12-07 08:27:29 -08:00
Felipe Leme
d2536c280b Merge "Renamed "intelligence" to "content_capture"" 2018-12-07 04:18:44 +00:00
Tri Vo
02c4c3fa7b Remove sepolicy for /dev/alarm.
After b/28357356 /dev/alarm is no longer used by android platform.
Also, Pixel devices don't have /dev/alarm.

Bug: 110962171
Test: boot aosp_walleye
Change-Id: Id9723996104a2548ddf366489890c098d1ea87be
2018-12-06 04:23:22 +00:00
Tri Vo
4feb259989 Remove sepolicy for /dev/alarm.
After b/28357356 /dev/alarm is no longer used by android platform.
Also, Pixel devices don't have /dev/alarm.

Bug: 110962171
Test: boot aosp_walleye
Change-Id: Id9723996104a2548ddf366489890c098d1ea87be
2018-12-05 17:12:25 -08:00
Felipe Leme
73e7fa884b Renamed "intelligence" to "content_capture"
Bug: 111276913
Test: manual verification

Change-Id: If76dc7bfdad87789a58fc94e0fd280deae1a41ab
2018-12-04 17:21:42 -08:00
Neil Fuller
a7110131ba Merge "Track add of RuntimeService in system server" am: 3350a79438 am: f660386952
am: 5ff6235136

Change-Id: I816f9253ed32d34650368b531fded7379bd24931
2018-12-04 00:57:44 -08:00
Neil Fuller
f58b555de3 Track add of RuntimeService in system server
Adds the necessary incantations for the new service.

Bug: 118242715
Bug: 119026403
Test: build / boot / adb shell dumpsys
Change-Id: Ibb1a356067863316d70586a61ede9f5973c1ae15
2018-12-03 15:45:46 +00:00
Kevin Chyn
fdf770d1dd Merge "Add placeholder iris and face policy for vold data directory" am: 5ea85b5f75 am: 7a89b6a1a5
am: 9404d49e02

Change-Id: If718a5dece1bf61b540bda46043b6310dd7f3aed
2018-11-30 17:20:23 -08:00
Kevin Chyn
91c2580bce Add placeholder iris and face policy for vold data directory
This is PS1 of aosp/828283 which was reverted. Using PS1 shouldn't cause
the same issue.

Test: vold is able to create directories, ag/5534962

Bug: 116528212
Change-Id: I84aca49a8dae0a087498120780dea0962aca04b3
2018-11-30 11:37:19 -08:00
Nick Kralevich
83f25e26f9 Revert "Add placeholder iris and face policy for vold data directory"
This reverts commit 92bde4b941.

Reason for revert: Rebooting after OTA fails due to the
filesystem still seeing the old label on the device.

Bug: 116528212
Bug: 119747564
Change-Id: Ib5f920f85c7e305e89c377369dca038d2c6c738c
Test: rollback change
2018-11-19 15:00:19 -08:00
Nick Kralevich
f823902620 Revert "Add placeholder iris and face policy for vold data directory"
This reverts commit 92bde4b941.

Reason for revert: Rebooting after OTA fails due to the
filesystem still seeing the old label on the device.

Bug: 116528212
Bug: 119747564
Change-Id: Ib5f920f85c7e305e89c377369dca038d2c6c738c
Test: rollback change
2018-11-19 14:57:58 -08:00
Florian Mayer
1f52505326 Property to enable heap profile from process startup. am: 0f3decf2f5 am: 479a46c233
am: 8f8345f854

Change-Id: I2c7d0144981728d492474bdca2ed9f8b0c13f3de
2018-11-19 14:24:31 -08:00
Haibo Huang
fdbcd20e00 Merge "Add new cpu variant related rules to SELinux" am: e80631ff53 am: ea04f8de6a
am: 3b82373489

Change-Id: Ife9d4001ddb99bb62eee719df994b85c78c43fa7
2018-11-19 14:04:03 -08:00
Florian Mayer
0f3decf2f5 Property to enable heap profile from process startup.
This is world-readable so it can be checked in libc's process init.

Test: m
Test: flash sailfish

Bug: 117821125

Change-Id: Iac7317ceb75b5ad9cfb9adabdf16929263fa8a9d
2018-11-19 21:52:43 +00:00
Haibo Huang
544a0d5480 Add new cpu variant related rules to SELinux
I added ro.bionic.(2nd_)?_(arch|cpu_variant) to vendor system
properties. And have init to write them to files under dev/.

This change set SELinux rules for these properties and files.

For the system properties: vendor/default.prop will set them. init will
read them.
For the files /dev/cpu_variant:.*: init will write them. bionic libc
will read them. (Basically world readable).

This is to allow libc select the right optimized routine at runtime.
Like memcpy / strcmp etc.

Test: getprop to make sure the properties are set.
Test: ls -laZ to make sure /dev/cpu_variant:.* are correctly labeled.

Change-Id: I41662493dce30eae6d41bf0985709045c44247d3
2018-11-19 18:29:36 +00:00
Hongyi Zhang
7add7d1ee9 Merge "sepolicies for sys prop enabling flag health check" am: 745d3839e4 am: cc75f78ca9
am: 616d8443d6

Change-Id: I862193ef6db690209209d0165297c718e88946a4
2018-11-19 10:12:28 -08:00
Hongyi Zhang
745d3839e4 Merge "sepolicies for sys prop enabling flag health check" 2018-11-19 17:48:55 +00:00
Tri Vo
c583b361d5 Remove redundant cgroup type/labelings. am: d918c8df78 am: 5b235aed58
am: 50e684668a

Change-Id: I38df86a670d76affb7311956e7995d559176d360
2018-11-16 17:58:27 -08:00
Tri Vo
d918c8df78 Remove redundant cgroup type/labelings.
cgroup is labeled from genfs_contexts. Also, cgroup filesystems can't be
context mounted, i.e. it's not possible to mount them with a label other
than "cgroup".

Bug: 110962171
Test: m selinux_policy
Test: boot aosp_walleye
Change-Id: I8319b10136c42a42d1edaee47b77ad1698e87f2c
2018-11-17 01:24:49 +00:00
Hongyi Zhang
da492f4fca sepolicies for sys prop enabling flag health check
device_config_flags_health_check_prop is used for enabling/disabling
program flags_health_check which is executed during device booting.
"1" means enabling health check actions in flags_health_check, other
values mean flags_health_check will not perform any action.

Test: build succeeded & manual test
Change-Id: I93739dc5d155e057d72d08fd13097eb63c1193b5
2018-11-17 00:09:36 +00:00
Kevin Chyn
d20aa7ebe1 Merge "Add placeholder iris and face policy for vold data directory" am: 118a106c63 am: 66cffb9633
am: 2d2c9a3461

Change-Id: I199cd433ff974e919e6e0b08beeca8dfa21bf8b4
2018-11-15 20:47:59 -08:00
Kevin Chyn
92bde4b941 Add placeholder iris and face policy for vold data directory
Test: vold is able to create directories, ag/5534962

Bug: 116528212

Change-Id: I61dd8802c13b1c42d334a80b678ca6a877848fc2
2018-11-15 17:32:03 -08:00
Tri Vo
6a871d3199 Remove kmem_device selinux type. am: c7f56cdc83 am: a63d9d5c9d
am: c035606d87

Change-Id: I2f4212136a9c12efd2a69228a6ea78eec896449f
2018-11-15 13:58:16 -08:00
Tri Vo
c7f56cdc83 Remove kmem_device selinux type.
kmem_device was used to label /dev/mem and /dev/kmem. We already have
multiple layers of protection against those /dev nodes being present on
devices.

CTS checks that /dev/mem and /dev/kmem don't exist:
https://android.googlesource.com/platform/cts/+/master/tests/tests/permission/src/android/permission/cts/FileSystemPermissionTest.java#233

VTS enforces our base kernel configs, which have CONFIG_DEVKMEM and
CONFIG_DEVMEM disabled:
https://android.googlesource.com/kernel/configs/+/master/android-4.9/android-base.config#2

Bug: 110962171
Test: m selinux_policy
Change-Id: I246740684218dee0cddf81dabf84d4763a753cde
2018-11-15 21:31:56 +00:00
Mrten Kongstad
efa6e132c4 Add idmap2 and idmap2d am: f62362da52 am: 5df802442e
am: 24097dacdb

Change-Id: I761d848ba6d31bbc2a502f1f8ab3c9a318184872
2018-11-15 08:28:12 -08:00
Mårten Kongstad
f62362da52 Add idmap2 and idmap2d
Bug: 78815803
Test: builds, boots
Test: manual: adb shell idmap2 create ...
Test: manual: adb shell ps | grep -e idmap2d
Change-Id: I60852e15d99329896ff9de6559d1e7cd1c67e33d
2018-11-15 14:42:10 +00:00
Jayant Chowdhary
a7289fe436 Merge "Add selinux rules for HIDL ICameraServer." 2018-11-13 18:31:36 +00:00
Tri Vo
dea30662e8 Remove mtd_device type. am: ced1751e45 am: 567e2d8661
am: 930158f3e5

Change-Id: I4f3ef8cf5c4c141ddbe184d3d21749f7dddfa6bd
2018-11-12 21:10:28 -08:00
Tri Vo
ced1751e45 Remove mtd_device type.
mtd_device does not label any /dev node present on walleye, and the only
permission to that type is:
allow hal_telephony_server mtd_device:dir search;
I suspect there is no need to keep mtd_device around.

Bug: 110962171
Test: boot aosp_walleye
Change-Id: If74b1258b21edeca38c8b7dc07a3a10b751a7e85
2018-11-12 23:11:03 +00:00
Tri Vo
4f22a98411 Merge "Remove dead *_device types from system sepolicy." am: ca5b01b0a6 am: 0140ae3b3d
am: 08494c2c58

Change-Id: Iec1458abdde327e444cbee2801a73a46d68c88b5
2018-11-12 14:56:45 -08:00
Treehugger Robot
ca5b01b0a6 Merge "Remove dead *_device types from system sepolicy." 2018-11-12 22:29:32 +00:00
Eugene Susla
d6768f140e Add SELinux service for RoleManagerService am: c496db327e am: 5d52675972
am: 9938def987

Change-Id: I5fe901dc6ba38272753f8cbb022b2fd63ecf8062
2018-11-12 11:20:51 -08:00
Jayant Chowdhary
039d4151da Add selinux rules for HIDL ICameraServer.
Bug: 110364143

Test: lshal->android.frameworks.cameraservice.service@2.0::ICameraService/default
      is registered.

Change-Id: I689ca5a570c169581b2bfb9d117fcdafced0a7e0
Signed-off-by: Jayant Chowdhary <jchowdhary@google.com>
2018-11-12 10:42:29 -08:00
TreeHugger Robot
d46a81a397 Merge "28.0.cil: restore alphabetical order in list" 2018-11-12 17:50:52 +00:00
Eugene Susla
c496db327e Add SELinux service for RoleManagerService
Test: ensure no build failures;
add RoleManagerService as a boot phase
ensure no SecurityException in logcat on boot
Change-Id: Ia0803c0fb084fe2b12f5c20f5e46354d0dd1aedf
2018-11-12 17:10:59 +00:00
Tri Vo
0d93cff248 28.0.cil: restore alphabetical order in list
This helps with merge conflicts from AOSP.

Test: m selinux_policy
Change-Id: Ifd464d841cdc710a1d893eec1d3bc9fb6ca69aa0
2018-11-10 14:58:50 -08:00
Suren Baghdasaryan
b12d5da665 sepolicy: Allow lmkd access to psi procfs nodes
Lmkd needs read access to /proc/pressure/memory, proc/pressure/cpu
and proc/pressure/io nodes to read current psi levels.
Lmkd needs write access to /proc/pressure/memory to set psi monitor
triggers.

Bug: 111308141
Test: modified lmkd to use PSI and tested using lmkd_unit_test

Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I9efd60c7fbb89cc08938fa5119b13d794813b52b
2018-11-10 00:22:49 +00:00
Tri Vo
b805adaa16 Remove dead *_device types from system sepolicy.
No coredomain domain has access to these types and corresponding /dev
nodes don't exist on the device:

audio_seq_device
audio_timer_device
full_device
i2c_device
vcs_device

Bug: 110962171
Test: m selinux_policy
Test: boot walleye
Change-Id: I89ad4755e6760aa166cb22e2655567e5905dc672
2018-11-09 15:45:59 -08:00
Hongyi Zhang
171cebaadc Sepolicies for server configural flags reset am: b965e3c5f9 am: 71a7aa8921
am: e37af7de5f

Change-Id: Ia9a0d072c3970a8073dc3a6392f079497717b437
2018-11-09 11:33:12 -08:00
Hongyi Zhang
b965e3c5f9 Sepolicies for server configural flags reset
Test: m -j succeeded and manual tested on device

Change-Id: I3415c58335361a9da4ef2368e61bc4e0250a91bb
2018-11-09 18:55:55 +00:00
TreeHugger Robot
be22cad21b Merge "Move thermal service into system_server" 2018-11-08 01:43:14 +00:00
Kevin Chyn
c4d7d27ec9 Add placeholder sepolicy for iris and face am: 52261e78c0 am: 72b902d0d1
am: 57c1fdb18e

Change-Id: Ia4fe5b7608bb56e70c43f4a34b038f5d2bccf5a4
2018-11-07 17:35:29 -08:00
Kevin Chyn
52261e78c0 Add placeholder sepolicy for iris and face
See aosp/660242 and aosp/608396

Fixes: 116530289

Test: builds
Change-Id: I220ece0d6751839fe764ff91fd7bd20c50104f8f
2018-11-07 14:11:56 -08:00
Fan Xu
9c10970c46 Merge "Remove buffer_hub_service compat mapping" am: 05668e4071 am: eb3269aa78
am: 94f5da598d

Change-Id: I5fe0ee3b73293591877a978f92ce015a5a962fa2
2018-11-07 11:24:32 -08:00
Fan Xu
2d74a45f76 Remove buffer_hub_service compat mapping
As b/116344577 is fixed, we no longer need the compatbility mapping any
more.

Test: build passed. Boot succeeded.
Change-Id: I0d7f02c59853d34bdabaad6841d87e9ca1ee25d7
2018-11-06 10:11:47 -08:00
Felipe Leme
47c9964059 Merge "New service: intelligence_service" am: 2b76694814 am: 52b57324dd
am: 994bfa88c1

Change-Id: I7873618776739e594c2a3092d37a1f4deecb5f9a
2018-11-06 09:45:37 -08:00
Felipe Leme
5bf0c6369b New service: intelligence_service
Bug: 111276913
Test: manual verification

Change-Id: Icb309bb07e4e4b39cdc912b1d3dc1ece9cb55f5f
2018-11-05 09:18:03 -08:00
Jiyong Park
908a44de86 apexd exports its status via sysprop am: b3b94614f7 am: 301dd93910
am: 35714ba6a8

Change-Id: I1f68e505ffe0cd28b8d066a5e65641c42a83f7e6
2018-11-02 03:59:02 -07:00
Wei Wang
75cc6bf2d5 Move thermal service into system_server
Bug: 118510237
Test: Boot and test callback on ThermalHAL 1.1 and ThermalHAL 2.0
Change-Id: I87e5563b9af605e6ea333dd5182131af6341fc86
2018-11-01 20:43:25 -07:00
Jiyong Park
b3b94614f7 apexd exports its status via sysprop
A sysprop apexd.status is set by apexd, to that other components (i.e.
init) can determine whether APEXs are all successfully mounted or no
(i.e., being mounted).

The sysprop is only writable by apexd.

Bug: 117403679
Test: adb shell getprop apexd.status returns 'ready'.
Change-Id: I81bcb96e6c5cb9d899f29ffa84f91eab3820be25
2018-11-02 12:23:42 +09:00
Hongyi Zhang
61deceb5f4 Merge "sepolicy for server configurable flags" am: 691ee93921 am: a6fae5b682
am: 44062c18d0

Change-Id: Icda0aacfb490af5208ad146a785bc8f99256b385
2018-11-01 12:10:08 -07:00
Hongyi Zhang
a6f989241b sepolicy for server configurable flags
Test: manual on device
Change-Id: Ibafe1b345489c88a49a7ed3e2e61e5cc5e1880a1
2018-11-01 03:28:56 +00:00
Jiwen 'Steve' Cai
f7e5c97853 Sepolicy for bufferhub hwservice am: d5c5ef900c am: eb5c4ed442
am: 034d4ed8b5

Change-Id: Ib7d67dbf594efa8c6d8a21ba27a0ee3e540d428c
2018-10-25 22:21:54 -07:00
Jiwen 'Steve' Cai
d5c5ef900c Sepolicy for bufferhub hwservice
Bug: 118124442
Test: device can boot with android.frameworks.bufferhub@1.0-service
      running
Change-Id: I1d186d5350671b0d2dd4e831429b8fba828316e0
2018-10-25 10:08:05 -07:00
Vinay Kalia
a4babcf2be Add power.stats HAL 1.0 sepolicy
BUG: 117424656
BUG: 111185513
Test: run vts -m VtsHalPowerStatsV1_0Target

Change-Id: Icb0790219df4189c0dabbe41221e69e56d000755
2018-10-23 18:12:10 +00:00
Florian Mayer
3690cb581d Merge "Add heapprofd selinux config." am: d5c62bfb41 am: 40144ea2af
am: 2e14b40c51

Change-Id: I024b49496db0cc0c2c5f95b0fe71c4a8054c3eb5
2018-10-15 15:00:46 -07:00
Florian Mayer
40144ea2af Merge "Add heapprofd selinux config."
am: d5c62bfb41

Change-Id: Ie33eefd304941d2d4553eb35a91e174b2c3c859d
2018-10-15 14:21:32 -07:00
Florian Mayer
4fde9ec7b3 Add heapprofd selinux config.
This does not actually grant any permissions but just adds the
necessary boilerplate for a new service.

Bug: 117762471
Bug: 117761873

Change-Id: I7cdd2ae368616cfd54fc685c15f775604bfc80d4
2018-10-15 18:31:26 +01:00
Tri Vo
0cb08291e6 Merge "Add type for /system/bin/tcpdump." am: af9251539a am: 7151273060
am: c6893fb48c

Change-Id: I12eff9aa2d4b43faeb8c6579cd211ff0940fb39d
2018-10-12 22:53:29 -07:00
Tri Vo
7151273060 Merge "Add type for /system/bin/tcpdump."
am: af9251539a

Change-Id: Ie51d95317f6613e086b2b80a5ca967779ab9eb32
2018-10-12 22:43:20 -07:00
Tri Vo
e8b33c3139 Add type for /system/bin/tcpdump.
We add this type with the intent to expose /system/bin/tcpdump to
vendor on userdebug devices only.

Bug: 111243627
Test: device boots /system/bin/tcpdump correctly labeled as
tcpdump_exec, can browse internet, turn wifi on/off
Change-Id: Icb35e84c87120d198fbb2b44edfa5edf6021d0f0
2018-10-12 21:51:46 +00:00
Siarhei Vishniakou
c592868420 Merge "Allow system_server to read vendor_file" am: 25b4eb217c am: c38d803278
am: 5a9c3ee783

Change-Id: Ie1acbc850956c2c523c37358fc4e345761f485c1
2018-10-12 13:26:17 -07:00
Siarhei Vishniakou
c38d803278 Merge "Allow system_server to read vendor_file"
am: 25b4eb217c

Change-Id: I78ecee68fdc8dadf62b0c3977f01a0571a1bdc1f
2018-10-12 13:14:55 -07:00
Siarhei Vishniakou
3639f57960 Allow system_server to read vendor_file
Input device configuration files .idc, .kl that are placed in /vendor
are currently not accessible.
Allow the read access here.

Bug: 112880217
Test: move .idc and .kl files from /system to /vendor, then observe
logcat. With this patch, avc denials disappear.

Change-Id: I72ad62b9adf415f787565adced73fd8aaff38832
2018-10-12 02:42:09 +00:00
Chong Zhang
f6721de82e Merge "add mediaswcodec service" am: 9977e25411 am: 817027b055
am: b1b6bf9bb3

Change-Id: I9f0252a0661c5ce533ba5f307035456b5c55a3ed
2018-10-11 19:19:35 -07:00
Chong Zhang
817027b055 Merge "add mediaswcodec service"
am: 9977e25411

Change-Id: Id64de9050f14d4f782dbdf6a9b695a52201e042e
2018-10-11 19:03:25 -07:00
Chong Zhang
bdbfff1b00 add mediaswcodec service
Set up a new service for sw media codec services.

Bug: 111407413

Test: cts-tradefed run cts-dev --module CtsMediaTestCases --compatibility:module-arg CtsMediaTestCases:include-annotation:android.platform.test.annotations.RequiresDevice
Change-Id: Ia1c6a9ef3f0c1d84b2be8756eb1853ffa0597f8e
2018-10-11 15:10:17 -07:00
Igor Murashkin
9472347f3e Merge "iorapd: Add new binder service iorapd." am: 77e40fbd06 am: 9a88ef46a9
am: f09c8adc90

Change-Id: I35684d0ec8ebfa3db7cb43d6d6091f32d1e5191c
2018-10-09 17:27:04 -07:00
Igor Murashkin
9a88ef46a9 Merge "iorapd: Add new binder service iorapd."
am: 77e40fbd06

Change-Id: Ibf6517366094b6d47cc0e1551b2ed709c3b10937
2018-10-09 16:29:10 -07:00
Igor Murashkin
72a88b194c iorapd: Add new binder service iorapd.
This daemon is very locked down. Only system_server can access it.

Bug: 72170747
Change-Id: I7b72b9191cb192be96001d84d067c28292c9688f
2018-10-08 15:00:34 -07:00
Tri Vo
df46b30f8f asan: global read access to /system/asan.options am: 93318192a0 am: 393ada790e
am: 44213585da

Change-Id: Iccb94ad806ca8be46e16df653d2ed7a3f3ce6096
2018-10-08 11:56:03 -07:00
Tri Vo
393ada790e asan: global read access to /system/asan.options
am: 93318192a0

Change-Id: I08b56ad2714f121b3f88bc545148e2b893d91325
2018-10-08 11:38:15 -07:00
Tri Vo
93318192a0 asan: global read access to /system/asan.options
Bug: 117178352
Test: no denials to /system/asan.options on asan walleye
Change-Id: I6042693afb926a22a3e2be79bd2a7ba062806143
2018-10-08 17:27:06 +00:00
Martijn Coenen
82e58e15d6 Add policy for apexd. am: ac097ac4c7 am: 563e5b36e6
am: 293d640f46

Change-Id: I0dc1a82b747f995334a8e76acb0071676d2e2d85
2018-10-04 00:29:18 -07:00
Martijn Coenen
563e5b36e6 Add policy for apexd.
am: ac097ac4c7

Change-Id: Ic6958aa709f9b8253d15cef475864f845fc25715
2018-10-04 00:16:20 -07:00
Martijn Coenen
ac097ac4c7 Add policy for apexd.
apexd is a new daemon for managing APEX packages installed
on the device. It hosts a single binder service, "apexservice".

Bug: 112455435
Test: builds, binder service can be registered,
      apexes can be accessed, verified and mounted
Change-Id: I634ad100f10b2edcd9a9c0df0d33896fa5d4ed97
2018-10-04 07:06:45 +00:00
Tri Vo
d0ee30e347 Merge "Only maintain maps between current and previous selinux versions." am: d115b8ed24 am: bd8529a096
am: dd042e75f4

Change-Id: I0d0d10bda4aecd4c7a241fd5e0ce4640bd23e4d1
2018-10-03 18:43:27 -07:00
Tri Vo
bd8529a096 Merge "Only maintain maps between current and previous selinux versions."
am: d115b8ed24

Change-Id: Ia6a8419d469e7f4d04cf712f24c44b2d4fc756cd
2018-10-03 18:18:54 -07:00
Tri Vo
438684b39f Only maintain maps between current and previous selinux versions.
New maintenance scheme for mapping files:
Say, V is the current SELinux platform version, then at any point in time we
only maintain (V->V-1) mapping. (V->V-n) map is constructed from top (V->V-n+1)
and bottom (V-n+1->V-n) without changes to previously maintained mapping files.

Caveats:
- 26.0.cil doesn't technically represent 27.0->26.0 map, but rather
current->26.0. We'll fully migrate to the scheme with future releases.

Bug: 67510052
Test: adding new public type only requires changing the latest compat map
Change-Id: Iab5564e887ef2c8004cb493505dd56c6220c61f8
2018-10-02 15:10:13 -07:00
Howard Ro
b41dd1b54f Merge "Update sepolicies for stats hal"
am: aabee5fe5f

Change-Id: Ib271b23881eeff75f62613054714a11e8d67dc44
2018-10-02 14:06:31 -07:00
Howard Ro
aabee5fe5f Merge "Update sepolicies for stats hal" 2018-10-02 20:17:18 +00:00
Tri Vo
d023ee69da Merge "Address TODOs in 28.0.cil mapping." am: 0dd4167e2d am: f5976f5490
am: 615599fbe8

Change-Id: Ic2228867e82fcb1743baebcaac2d2aa18a813d92
2018-10-01 17:39:43 -07:00
Tri Vo
b331294d23 Fix incorrect 27.0 mappings. am: f509e02ddb am: e4ab2cd286
am: 01205ff3fe

Change-Id: Ia092e3935ec045953474f54209324690c33902cf
2018-10-01 17:16:27 -07:00
Tri Vo
f5976f5490 Merge "Address TODOs in 28.0.cil mapping."
am: 0dd4167e2d

Change-Id: Id7b5dcbc37f69b4349f2aff96fb936feaef83798
2018-10-01 17:06:20 -07:00
Treehugger Robot
0dd4167e2d Merge "Address TODOs in 28.0.cil mapping." 2018-10-01 23:46:45 +00:00
Tri Vo
e4ab2cd286 Fix incorrect 27.0 mappings.
am: f509e02ddb

Change-Id: I6c9dc4a97b4f3c93b458452af7d1dcbd4ae84f6e
2018-10-01 16:13:27 -07:00
Tri Vo
4438339417 Address TODOs in 28.0.cil mapping.
Test: m selinux_policy
Change-Id: I6a8ff2200c82b6ecdc1404bc7cf186f439950a30
2018-10-01 14:32:05 -07:00
Tri Vo
f509e02ddb Fix incorrect 27.0 mappings.
Map proc_qtaguid_ctrl to qtaguid_proc, not qtaguid_device.
Map proc_slabinfo to proc in the correct place.

Test: m selinux_policy
Change-Id: I37c9dfe40bd20924215856b5d4ff7d9b3cbd0417
2018-10-01 13:46:50 -07:00
Jeff Vander Stoep
b084e95fe3 Remove access to /proc/net/{tcp,udp} am: 424517721c am: 356900c73f
am: 0a0716deb5

Change-Id: Ic1e57dd1bae0b0eef69b2a396a34b0539fa05429
2018-10-01 07:04:30 -07:00
Jeff Vander Stoep
356900c73f Remove access to /proc/net/{tcp,udp}
am: 424517721c

Change-Id: Ie0278a2d0777f312a622e0243625c47ed4a38cf6
2018-10-01 06:53:09 -07:00
Jeff Vander Stoep
424517721c Remove access to /proc/net/{tcp,udp}
Remove these files from proc_net_type. Domains that need access must
have permission explicitly granted. Neverallow app access except the
shell domain.

Bug: 114475727
Test: atest CtsLibcoreOjTestCases
Test: netstat, lsof
Test: adb bugreport
Change-Id: I2304e3e98c0d637af78a361569466aa2fbe79fa0
2018-09-30 21:33:47 -07:00
Howard Ro
578a189178 Update sepolicies for stats hal
Bug: 116732452
Test: No sepolicy violations observed with this change
(cherry picked from commit I1958182dd8ecc496625da2a2a834f71f5d43e7bb)

Change-Id: Ib386767d8acfacf9fedafd9a79dd555ce233f41c
2018-09-28 13:34:37 -07:00
Howard Ro
40b360d616 Merge "Update sepolicies for stats hal" 2018-09-28 19:52:14 +00:00
Wei Wang
a15a0804bc Add atrace HAL 1.0 sepolicy
am: bc71a6109e

Change-Id: Iad34b6a0a8e4a9b885244804e07c93bc79f8731b
2018-09-27 16:27:11 -07:00
Wei Wang
bc71a6109e Add atrace HAL 1.0 sepolicy
Bug: 111098596
Test: atrace/systrace

(cherry picked from commit 9ed5cf6e43)

Change-Id: I97772ff21754d03a0aea0d53b39e8da5312a17c0
2018-09-27 23:18:29 +00:00
Howard Ro
9f9af0dbd2 Update sepolicies for stats hal
Bug: 116732452
Test: no sepolicy violations observed with this change
Change-Id: I1958182dd8ecc496625da2a2a834f71f5d43e7bb
2018-09-27 15:54:49 -07:00
Nick Kralevich
1723b3d531 Label /system/usr/share/zoneinfo differently am: ff1c765ff2 am: 2a63803348
am: 5e40f6748b

Change-Id: I01960bfac3842a4f4ea2d924ccc3c1eaa0213429
2018-09-27 15:45:04 -07:00
Nick Kralevich
2a63803348 Label /system/usr/share/zoneinfo differently
am: ff1c765ff2

Change-Id: I8765a406f9d075c76235220b68fd7dc79a15d12a
2018-09-27 15:28:03 -07:00
Nick Kralevich
ff1c765ff2 Label /system/usr/share/zoneinfo differently
/system/usr/share/zoneinfo is currently labeled zoneinfo_data_file,
a label shared with /data/misc/zoneinfo. However, each of these
directory locations has different security characteristics. In
particular, the files in /system/usr/share/zoneinfo must never be
writable, whereas /data/misc/zoneinfo may be written to by system_server.
Reusing the same label hides these different security characteristics.

Create a separate label for /system/usr/share/zoneinfo.

Test: Device boots and no obvious problems.
Change-Id: I8cf16ff038b06b38f77388e546d9b7a6865f7879
2018-09-27 10:18:40 -07:00
Wei Wang
9ed5cf6e43 Add atrace HAL 1.0 sepolicy
Bug: 111098596
Test: atrace/systrace
Change-Id: I06ca76750d640c98849c475c8a237d62c8e582b9
2018-09-25 21:02:10 -07:00
Fan Xu
a4eff2bffb Update SELinux Policy for bufferhubd am: 26fa914cb2 am: cf728896d0
am: d46159e3b8

Change-Id: Iccfa94cfc550c63b26fb5bf0720fde5cea822f9c
2018-09-24 15:18:45 -07:00
Fan Xu
cf728896d0 Update SELinux Policy for bufferhubd
am: 26fa914cb2

Change-Id: I52b6787ca2ad04f003ec446ce8ac96e375f67c7b
2018-09-24 15:05:57 -07:00
Fan Xu
26fa914cb2 Update SELinux Policy for bufferhubd
Create a new service type buffer_hub_binder_service for
BufferHubBinderService and allow bufferhubd to publish the service.

Add the service to 26.0, 27.0 and 28.0 compat ignore files since the
service is not available in past versions.

Fixes: 116022258
Test: build passed

Change-Id: I5a21f00329ed474433d96c8d1ce32377f20cada3
2018-09-24 12:29:43 -07:00
Kevin Chyn
e230d6ddc2 Merge "Rename biometric_prompt_service to biometric_service"
am: 7087bf1256

Change-Id: Ideab840443e5086464cb7d93325eaee4af111236
2018-09-21 20:54:16 -07:00
Kevin Chyn
7087bf1256 Merge "Rename biometric_prompt_service to biometric_service" 2018-09-22 03:47:00 +00:00
Kevin Chyn
447802f8c7 Merge "Rename biometric_prompt_service to biometric_service" 2018-09-22 02:08:40 +00:00
Tri Vo
f16aad1cce Merge "More granular vendor access to /system files." am: 6816044271 am: 70f1c88fa6
am: 2ce65bef69

Change-Id: Ia6bda63626f088f7c6211706f6b6a42f9e8c1a42
2018-09-21 18:46:06 -07:00
Tri Vo
70f1c88fa6 Merge "More granular vendor access to /system files."
am: 6816044271

Change-Id: I74d379a088d49e2bb24cd04732dfba8921d3230f
2018-09-21 18:36:55 -07:00
Tri Vo
6816044271 Merge "More granular vendor access to /system files." 2018-09-22 01:30:25 +00:00
Kevin Chyn
75ded482df Rename biometric_prompt_service to biometric_service
Bug: 111461540
Bug: 112570477

Test: builds
Change-Id: Icc68720ebe931c2d917703b2d34aa0f4eec3f549
Merged-In: Icc68720ebe931c2d917703b2d34aa0f4eec3f549
2018-09-20 23:09:54 -07:00
Kevin Chyn
5685c9f7d2 Rename biometric_prompt_service to biometric_service
Bug: 111461540
Bug: 112570477

Test: builds
Change-Id: Icc68720ebe931c2d917703b2d34aa0f4eec3f549
2018-09-20 23:07:52 -07:00
Yifan Hong
fc433b5553 health.filesystem HAL renamed to health.storage
am: 1cef6a94eb

Change-Id: Ia7c2b0c347eb945777eac435c45df2683c556b80
2018-09-20 22:36:15 -07:00
Yifan Hong
1cef6a94eb health.filesystem HAL renamed to health.storage
...to reflect that the HAL operates on storage devices,
not filesystem.

Bug: 111655771
Test: compiles
Change-Id: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
Merged-In: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
2018-09-20 04:12:45 +00:00
Tri Vo
5c1fe61eaa More granular vendor access to /system files.
This change limits global access to /system files down to:
/system/bin/linker*
/system/lib[64]/*
/system/etc/ld.config*
/system/etc/seccomp_policy/*
/system/etc/security/cacerts/*
/system/usr/share/zoneinfo/*

Bug: 111243627
Test: boot device, browse internet without denials to system_* types.
Test: VtsHalDrmV1_{1, 0}TargetTest without denials
Change-Id: I69894b29733979c2bc944ac80229e84de5d519f4
2018-09-20 03:07:50 +00:00
Yifan Hong
145940f6cf health.filesystem HAL renamed to health.storage
...to reflect that the HAL operates on storage devices,
not filesystem.

Bug: 111655771
Test: compiles
Change-Id: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
2018-09-19 12:01:10 -07:00
Marcin Oczeretko
e837062262 Merge "Add looper_stats_service to SE policy." am: fb947d0c36 am: a98b64d44e
am: 1e7f28f2a8

Change-Id: I2933e96e53859a4544ed19d233acfd4bdecd45b3
2018-09-07 03:52:31 -07:00
Marcin Oczeretko
a98b64d44e Merge "Add looper_stats_service to SE policy."
am: fb947d0c36

Change-Id: Idde84efff4c01752fa8ca131630481d73c7ed3a3
2018-09-07 03:08:58 -07:00
Marcin Oczeretko
56ab6be0d4 Add looper_stats_service to SE policy.
Test: Built and flashed an image.
Bug: 113651685
Change-Id: Ide239432ea8a5701d91c00edd06ad3e52560a3f7
2018-09-06 21:07:13 +00:00
Makoto Onuki
b92ce307ea Merge "Add app_binding system service" am: ac4b6478c1 am: 6d31c536bd
am: 19167eea45

Change-Id: I2db0c6bf71df8a798a02999644a0c77a3d145b67
2018-09-06 10:42:59 -07:00
Makoto Onuki
6d31c536bd Merge "Add app_binding system service"
am: ac4b6478c1

Change-Id: Idca8c49f6aac8b75a6d2222a62997809c9ff064c
2018-09-06 10:31:56 -07:00
Makoto Onuki
6af1181320 Add app_binding system service
Bug: 109809543
Test: Build and boot with the new service in the internal branch.

Change-Id: Iaee365771c3e8e5b8f5f3b6112bbf902c6bb02bd
2018-09-05 14:33:20 -07:00
Mark Salyzyn
200aac4302 llkd: Add stack symbol checking am: 275ea12d84 am: 74ac780247
am: 94e57b4361

Change-Id: Idf50125ed68d4f8a70b58f49c2ec22135ba170f4
2018-09-04 12:51:33 -07:00
Mark Salyzyn
74ac780247 llkd: Add stack symbol checking
am: 275ea12d84

Change-Id: Ib4a96cdb97871ba77dfa95db76675f0830ef404a
2018-09-04 12:34:26 -07:00
Mark Salyzyn
275ea12d84 llkd: Add stack symbol checking
llkd needs the ptrace capabilities and dac override to monitor for
live lock conditions on the stack dumps.

Test: compile
Bug: 33808187
Change-Id: Ibc1e4cc10395fa9685c4ef0ca214daf212a5e126
2018-09-04 17:02:30 +00:00
Kevin Chyn
ee7a01b680 Add BiometricPromptService to sepolicy am: 57887307df am: 99979e0ce0
am: 491445d57b

Change-Id: Ia94d2a5141ddfe688b756bc378ec5d4e02c86ef9
2018-08-30 15:58:35 -07:00
Kevin Chyn
99979e0ce0 Add BiometricPromptService to sepolicy
am: 57887307df

Change-Id: Ibae53ecc88fc79b5cea3c0e4c7b45c7c33685cb4
2018-08-30 15:05:37 -07:00
Kevin Chyn
57887307df Add BiometricPromptService to sepolicy
Bug: 72825012

Test: manual
Change-Id: I850c869cdc0ad8735800130bb4a8d67822197ff9
2018-08-30 11:43:20 -07:00
Christine Franks
a470c03a3f Add color_service selinux policy am: a11cdd2f93 am: e35a63ee12
am: 71a3c90d40

Change-Id: I67962fd146c96db82f4b83e3d0b6dfca3d1fa824
2018-08-22 12:05:06 -07:00
Christine Franks
e35a63ee12 Add color_service selinux policy
am: a11cdd2f93

Change-Id: Ie54d3279ab43a9199e7bcaa52f4c9eb4a94e8698
2018-08-22 11:56:37 -07:00
Christine Franks
a11cdd2f93 Add color_service selinux policy
Bug: 111215474
Test: boots
Change-Id: I98955bcd02f643400c3eb97232467c09a2c5c1e5
2018-08-21 17:53:00 -07:00
Hridya Valsaraju
01ddd0c909 Merge "Define 'super_block_device' type" am: 6fc083693a am: 3e700650a4
am: 0e70b2a271

Change-Id: I8582b570cd7d580afbf09390b944a3aecb4f09fa
2018-08-20 14:30:10 -07:00
Hridya Valsaraju
3e700650a4 Merge "Define 'super_block_device' type"
am: 6fc083693a

Change-Id: I1da0186072ed935f822054f4db70e2476fca767a
2018-08-20 14:18:58 -07:00
Hridya Valsaraju
4ae8fe9b84 Define 'super_block_device' type
Bug: 78793464
Test: fastboot getvar partition-size:super

'super_block_device' corresponds to the super partition
required for flashing dynamic partitions.

Change-Id: I323634b6797ead7c5face117a7028bf9ab947aea
2018-08-20 10:55:03 -07:00
Jerry Zhang
fc7e347aa8 Merge "Add sepolicy for fastbootd" am: 50ca0a0d18 am: 5c9d0ce1b6
am: 587095d083

Change-Id: I64338d9608601d6716c90982101e6739eaca08aa
2018-08-15 15:06:49 -07:00
Jerry Zhang
5c9d0ce1b6 Merge "Add sepolicy for fastbootd"
am: 50ca0a0d18

Change-Id: I6bfb32d3603733b998ee890e2f6d006e1ddcdaf6
2018-08-15 14:57:25 -07:00
Florian Mayer
5e4493bf22 Revert "Add sepolicy for fastbootd" am: c2ab15b798 am: 67eeee0535
am: 567e5f6191

Change-Id: Iede7192acb737935f3fd3fd829e8cc737e242e4f
2018-08-15 09:17:11 -07:00
Jerry Zhang
1d85efa9f4 Add sepolicy for fastbootd
Also allow adb and fastboot to talk to recovery
through recovery_socket. This enables changing
between modes with usb commands.

Test: No selinux denials
Bug: 78793464
Change-Id: I80c54d4eaf3b94a1fe26d2280af4e57cb1593790
2018-08-15 08:45:22 -07:00
Florian Mayer
67eeee0535 Revert "Add sepolicy for fastbootd"
am: c2ab15b798

Change-Id: Idb7dc194781bbf098e705b6fa59a886ca5d8f274
2018-08-15 06:41:22 -07:00
Florian Mayer
c2ab15b798 Revert "Add sepolicy for fastbootd"
This reverts commit 0fd3ed3b8b.

Reason for revert: Broke user builds.

Change-Id: If95f1a25d22425a5a2b68a02d1561352fb5a52f0
2018-08-15 09:38:40 +00:00
Jerry Zhang
834b5314b6 Add sepolicy for fastbootd am: 0fd3ed3b8b am: b3fe201ea7
am: a743806685

Change-Id: I8e6a5f6d43cb037bd5dcf85d27bcd56beb11a597
2018-08-14 17:30:01 -07:00
Jerry Zhang
b3fe201ea7 Add sepolicy for fastbootd
am: 0fd3ed3b8b

Change-Id: I538723368f223ee0e190523c0b35f54ebe0d98f8
2018-08-14 15:55:43 -07:00
Jerry Zhang
0fd3ed3b8b Add sepolicy for fastbootd
Also allow adb and fastboot to talk to recovery
through recovery_socket. This enables changing
between modes with usb commands.

Test: No selinux denials
Bug: 78793464
Change-Id: I1f97659736429fe961319c642f458c80f199ffb4
2018-08-14 20:21:36 +00:00
Tri Vo
f6b89dae2d Sepolicy for system suspend HAL. am: dac2a4a3a4 am: e5374e6784
am: 16c0c2c4e9

Change-Id: I03e0ef445246de4f2342bc0de39c18784b3fb067
2018-08-13 19:28:17 -07:00
Tri Vo
e5374e6784 Sepolicy for system suspend HAL.
am: dac2a4a3a4

Change-Id: Ia03441639efe7f2147db104c7b1533b941c60f9e
2018-08-13 18:52:30 -07:00
Tri Vo
dac2a4a3a4 Sepolicy for system suspend HAL.
Bug: 78888165
Test: device can boot with HAL running.
Change-Id: I3bf7c8203e038b892176c97ec006152a2904c7be
2018-08-13 17:26:34 -07:00
Suren Baghdasaryan
031b6baf5f Selinux: Allow lmkd write access to sys.lmk. properties am: c8ed855ede am: 4fd3aab93b am: c85ed76582
am: 9ae3aae285

Change-Id: I67a501ae5721209a0c39ad0fff670620b9e78c42
2018-08-10 18:15:54 -07:00
Yifan Hong
68eb18664d Merge "Add sepolicy for health filesystem HAL" am: 3dd465a097 am: 33eee9c584 am: 562a0d2f97
am: 0df9f9514e

Change-Id: I2ae09712c83dc48881aa40cb3acebe04dcd9f4f7
2018-08-10 18:09:57 -07:00
Suren Baghdasaryan
c85ed76582 Selinux: Allow lmkd write access to sys.lmk. properties am: c8ed855ede
am: 4fd3aab93b

Change-Id: I1116837c319c4f9dbc2ac1a093a97f15a4fc07cd
2018-08-10 16:10:38 -07:00
Yifan Hong
562a0d2f97 Merge "Add sepolicy for health filesystem HAL" am: 3dd465a097
am: 33eee9c584

Change-Id: I84d7cc56ec9280957218357ed97c1ca606b24795
2018-08-10 16:10:17 -07:00
Suren Baghdasaryan
c8ed855ede Selinux: Allow lmkd write access to sys.lmk. properties
Allow lmkd write access to sys.lmk. properties to be able to set
sys.lmk.minfree_levels.

Bug: 111521182
Test: getprop sys.lmk.minfree_levels returns value set by lmkd
Change-Id: I86ff11d75917966857d3a76876a56799bb92a5ad
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
2018-08-10 20:05:46 +00:00
Yifan Hong
0814795c79 Add sepolicy for health filesystem HAL
Test: builds
Test: vts
Bug: 111655771
Change-Id: Iabad3d124bf476cb624addf7d7898e0c2894d550
2018-08-10 11:02:21 -07:00
Mark Salyzyn
ab8c50434b Merge "fs_mgr: add overlayfs handling for squashfs system filesystems" am: ccfffe6e0d am: ae3410152b am: 151642560d
am: fc88d29d47

Change-Id: Iffa50ec5b40cf43968a77366a5d20ff894ea07a3
2018-08-08 22:59:16 -07:00