Commit graph

28219 commits

Author SHA1 Message Date
Gavin Corkery
b0aae28b41 Add sepolicy for /metadata/watchdog
See go/rescue-party-reboot for more context.

One integer will be stored in a file in this
directory, which will be read and then deleted at the
next boot. No userdata is stored.

Test: Write and read from file from PackageWatchdog
Bug: 171951174

Change-Id: I18f59bd9ad324a0513b1184b2f4fe78c592640db
2021-01-07 19:42:56 +00:00
Treehugger Robot
c0d1040d58 Merge "Export ro.vendor.product.cpu.abilist*" 2020-12-10 09:01:40 +00:00
Xin Li
0777adef5e DO NOT MERGE - Merge Android R QPR1
Bug: 172690556
Merged-In: Ibc15a90266d1f30174d6590a157571507e8ee31a
Change-Id: I279c3cc3cfcf8e6c28b3cddf98fee6e47f4b46a5
2020-12-09 17:44:05 -08:00
Chong Zhang
2cbfd01949 add mediatranscoding to apex file context am: 9aed64920f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1522099

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ibc15a90266d1f30174d6590a157571507e8ee31a
2020-12-10 01:01:17 +00:00
Chong Zhang
9aed64920f add mediatranscoding to apex file context
bug: 159172726
Change-Id: I8fbedab2605167af637108d5f564abf6c78c32bd
2020-12-09 14:26:14 -08:00
Treehugger Robot
66ed360b5e Merge "Update 30.0 prebuilts to latest rvc-dev policy" am: 34d974838e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1521437

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I49504f4d757ff4449cf7940f743687d2b2a86e84
2020-12-09 16:45:03 +00:00
Treehugger Robot
34d974838e Merge "Update 30.0 prebuilts to latest rvc-dev policy" 2020-12-09 16:09:12 +00:00
Treehugger Robot
60e32df155 Merge "Allow PermissonController to find app_api_service and system_api_service." am: a56c9eb016
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1519814

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I45dad0c44cdcf3d0cdd7e41bf5414d98db651610
2020-12-09 15:55:28 +00:00
Treehugger Robot
a56c9eb016 Merge "Allow PermissonController to find app_api_service and system_api_service." 2020-12-09 15:25:42 +00:00
Treehugger Robot
a801411fef Merge "drmserver: audit permissions for /data/app" am: 951fc0b044
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1520730

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I86000c02ee3aad36710db934e046a022e1dd2e52
2020-12-09 13:12:16 +00:00
Treehugger Robot
951fc0b044 Merge "drmserver: audit permissions for /data/app" 2020-12-09 12:38:06 +00:00
Inseob Kim
3b8b4251b7 Update 30.0 prebuilts to latest rvc-dev policy
For whatever reason, system/sepolicy/prebuilts/api/30.0 and rvc-dev's
system/sepolicy differ a little. This makes 30.0 prebuilts up-to-date
and also updates plat_pub_versioned.cil, built from aosp_arm64-eng
target on rvc-dev branch.

Bug: 168159977
Test: m selinux_policy
Change-Id: I03e8a40bf021966c32f0926972cc2a483458ce5b
2020-12-09 20:44:38 +09:00
Treehugger Robot
56d552af6d Merge "system_app: remove adb data loader permissions" am: db87cdf6a8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1520729

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I24c9712f07b70e9ecadfc0e4ff46a92157a86938
2020-12-09 11:25:06 +00:00
Hai Zhang
86e10ef55d Allow PermissonController to find app_api_service and system_api_service.
PermissionController is updatable, so we may need to call new APIs in newer versions.

Change-Id: I0a6657ad1f27e1e2fdc320184268966009d3a4fc
2020-12-09 11:10:06 +00:00
Treehugger Robot
db87cdf6a8 Merge "system_app: remove adb data loader permissions" 2020-12-09 10:36:14 +00:00
Jeff Vander Stoep
5e6d60a2a5 drmserver: audit permissions for /data/app
We would like to assert that only PackageManager can make
modifications to /data/app. However, I first need to remove
some existing permissions that seem like they are no longer
used (as per jtinker@). Add audit statements to confirm.

Test: build
Change-Id: Ie5ec5199f7e2f862c4d16d8c86b9b0db6fbe481c
2020-12-09 09:16:51 +01:00
Jeff Vander Stoep
07aee66679 system_app: remove adb data loader permissions
Per schfan@ these are no longer needed.

Test: build
Change-Id: Idda1d9775fdd38cbd53c3652b567ddfc5beca0a6
2020-12-09 08:58:23 +01:00
Christian Wailes
06e163b290 Merge "Added permissions for new dexopt flags." am: 93e6997181
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1480337

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I882363b3cf293f5bac811e5d6b2c914935b6031a
2020-12-09 01:22:52 +00:00
Christian Wailes
93e6997181 Merge "Added permissions for new dexopt flags." 2020-12-09 00:00:26 +00:00
Maciej Żenczykowski
afd4d49733 Allow network_stack to synchronize the kernel rcu am: 5a7e49e525
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516277

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I19840b4bafacb69561cec658b5a076988e4c4dc7
2020-12-08 22:47:33 +00:00
Maciej Żenczykowski
5a7e49e525 Allow network_stack to synchronize the kernel rcu
via opening/closing a PF_KEY socket (this mirrors netd's privs)

Bug: 173167302
Test: m
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ia2c2cb52c4ec9149db29dc86a7927e3432bd2b9b
2020-12-08 14:49:20 +00:00
Adam Shih
9c9386d68d never allow untrusted apps accessing debugfs_tracing am: 2543715187
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1513758

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I28a14b4f551938725684dcd1153c48fc67d3da53
2020-12-08 02:26:32 +00:00
Chris Wailes
4540efcf73 Added permissions for new dexopt flags.
Bug: 173137187
Test: build
Merged-In: Iad1d23277915e1dbf655b0f2820320f15462ab33
Change-Id: Iad1d23277915e1dbf655b0f2820320f15462ab33
2020-12-07 16:15:24 -08:00
Adam Shih
2543715187 never allow untrusted apps accessing debugfs_tracing
debugfs_tracing can only be accessed by tracing tools provided by the
platform.

Bug: 172028429
Test: boot with no relevant log showing up
Change-Id: I412dd51a1b268061c5a972488b8bc4a0ee456601
2020-12-07 16:33:59 +08:00
Hai Zhang
6ac5499355 Add SELinux policy for legacy permission service. am: 04db97a72d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1518957

Change-Id: I049bf9c591c539f698ba4cf7a172a2b7a0439ea4
2020-12-06 01:12:29 +00:00
Hai Zhang
04db97a72d Add SELinux policy for legacy permission service.
The updatable and non-updatable permission manager cannot share one
AIDL, so we need to create a new system service for the non-updatable
legacy one, and add the SELinux policy for it.

Bug: 158736025
Test: presubmit
Change-Id: Ief8da6335e5bfb17d915d707cf48f4a43332f6ae
2020-12-04 14:43:33 -08:00
Dmitri Plotnikov
682fa8c22b Merge "Add sched_process_free to debugfs_tracing label" am: 5d23015a3d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1517343

Change-Id: I13e85a4ccc056e0d1aca0c7d9f2afbeff03b1ea5
2020-12-04 19:20:05 +00:00
Dmitri Plotnikov
5d23015a3d Merge "Add sched_process_free to debugfs_tracing label" 2020-12-04 18:05:11 +00:00
Jonglin Lee
8ef765aa93 Merge "Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"" am: 7ce5e714e5
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516549

Change-Id: Id114a507f1c9ad1059c39ce4121d7330e72fe14c
2020-12-04 05:09:02 +00:00
Jonglin Lee
7ce5e714e5 Merge "Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"" 2020-12-04 04:47:39 +00:00
Jonglin Lee
51c04ac27b Revert "sepolicy: rules for uid/pid cgroups v2 hierarchy"
Revert submission 1511692-cgroup v2 uid/pid hierarchy

Reason for revert: Causing intermittent cgroup kernel panics
Reverted Changes:
I80c2a069b:sepolicy: rules for uid/pid cgroups v2 hierarchy
I73f3e767d:libprocessgroup: uid/pid hierarchy for cgroup v2

Bug: 174776875
Change-Id: I63a03bb43d87c9aa564b1436a45fd5ec023aac87
Test: Locally reverted and booted 100 times without kernel panic
2020-12-04 03:12:59 +00:00
Kevin Chyn
83418f088b Merge "Add SEPolicy for fingerprint2.2 example HAL" am: 9e8896ee4b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516278

Change-Id: I8f23e1a57418999cc3156a5f37057febebf3f203
2020-12-04 01:24:03 +00:00
Kevin Chyn
9e8896ee4b Merge "Add SEPolicy for fingerprint2.2 example HAL" 2020-12-04 01:17:07 +00:00
Kiyoung Kim
39afa48eab Merge "Support linkerconfig in Runtime APEX" am: 34395349f8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1512755

Change-Id: Icfe8b0ddf01d345b23b51004a3bb4911b5b3f3fa
2020-12-04 01:12:26 +00:00
Kiyoung Kim
34395349f8 Merge "Support linkerconfig in Runtime APEX" 2020-12-04 01:00:06 +00:00
Treehugger Robot
2bfabf0b3f Merge "Use intermediates for sepolicy contexts tests" am: 88eb862ab4
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516485

Change-Id: I1d2671baa08a503eeb897df518b58dae4cb3cc09
2020-12-04 00:50:57 +00:00
Dmitri Plotnikov
c2d6e7e978 Add sched_process_free to debugfs_tracing label
Bug: 169279846
Test: atest bpf-time-in-state-tests
Test: verified that the time-in-state BPF prog still loads into
      the kernel with no errors and gets attached without errors
Change-Id: If74632ae6f72e0371fea844d4ba7bef9260d1bdb
2020-12-03 16:47:30 -08:00
Treehugger Robot
88eb862ab4 Merge "Use intermediates for sepolicy contexts tests" 2020-12-04 00:17:49 +00:00
Colin Cross
b67df1f259 Use intermediates for sepolicy contexts tests
Using the installed locations for the sepolicy contexts tests
causes checkbuilds to incorrectly install the files, and races
with the packaging rules to cause them to be non-deterministically
included in the final NOTICE files or images.  Use the intermediates
location instead.

Fixes: 174692639
Test: mmma system/sepolicy
Change-Id: Iea6869583b634f6018915934a1576fc283c106b2
2020-12-03 14:06:19 -08:00
Colin Cross
54c6e65216 Merge "Follow argument changes to RuleBuilder" am: 5fcbc0c472
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1501252

Change-Id: I7003545a68e432813f19d6bf9d1aebc7b4724496
2020-12-03 20:16:10 +00:00
Colin Cross
5fcbc0c472 Merge "Follow argument changes to RuleBuilder" 2020-12-03 20:07:30 +00:00
Nick Moukhine
56e271a5bc Amend sepolicy for music recognition service am: 63edb71f15
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1516159

Change-Id: I5f579d9cc38ddfc5905c75d2c21947863267bea7
2020-12-03 14:34:28 +00:00
Nick Moukhine
63edb71f15 Amend sepolicy for music recognition service
Denial in cts tests prior to this change:
E/SELinux: avc:  denied  { find } for pid=20252 uid=10295 name=music_recognition scontext=u:r:untrusted_app:s0:c39,c257,c512,c768 tcontext=u:object_r:music_recognition_service:s0 tclass=service_manager permissive=0

Bug: 158194857
Test: patched and verified on internal master
Change-Id: Ia3ad66b12f8410b9be30941f2681f1bf4e50337e
2020-12-03 12:12:05 +01:00
Alistair Delva
3359155b2f Fix pid_max denials from dumpstate, incidentd am: 2bbf1cea1e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1513499

Change-Id: I27dd8ce6151810e481e04f1b829f55c18e3c2c62
2020-12-03 10:12:47 +00:00
Kevin Chyn
a492bf048d Add SEPolicy for fingerprint2.2 example HAL
Bug: 172957689
Test: atest CtsBiometricsTestCases
Change-Id: I0de92a880e4ca04765da3e3184e5ad0382dc958a
2020-12-03 01:11:30 -08:00
Xin Li
77ec098a0a Merge "Merge rvc-qpr-dev-plus-aosp-without-vendor@6881855" into stage-aosp-master 2020-12-03 03:19:15 +00:00
Alistair Delva
2bbf1cea1e Fix pid_max denials from dumpstate, incidentd
The dumpstate and incidentd contexts may call on to toybox tools like
"ps" and "top" which are now reading /proc/sys/kernel/pid_max.

Fixes denials like:

avc: denied { read } for comm="top" name="pid_max" dev="proc" ino=125433
scontext=u:r:incidentd:s0 tcontext=u:object_r:proc_pid_max:s0
tclass=file permissive=0

avc: denied { read } for comm="ps" name="pid_max" dev="proc" ino=125433
scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc_pid_max:s0
tclass=file permissive=0

avc: denied { read } for comm="ps" name="pid_max" dev="proc" ino=125433
scontext=u:r:incidentd:s0 tcontext=u:object_r:proc_pid_max:s0
tclass=file permissive=0

Bug: 171070708
Bug: 172703374
Bug: 174618269
Change-Id: Ief5662c6d484e966bd1ba7134eddfabb3f7ad0e4
2020-12-02 16:05:01 -08:00
Treehugger Robot
621ca4b0bb Merge "sepolicy: rules for uid/pid cgroups v2 hierarchy" am: b18b39486f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1511581

Change-Id: Id9b2de18a4ad4109b09dc538c0f234280ff6daf9
2020-12-02 20:38:41 +00:00
Treehugger Robot
b18b39486f Merge "sepolicy: rules for uid/pid cgroups v2 hierarchy" 2020-12-02 19:50:11 +00:00
Treehugger Robot
430ef349d5 Merge "Allow network_stack to update eBPF map" am: 77dd325871
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1510914

Change-Id: I1086e5a7439fc9e58c0697b2710a1343ba7670d5
2020-12-02 08:57:34 +00:00