Commit graph

7753 commits

Author SHA1 Message Date
Mitchell Wills
d89bc60064 Merge "Add selinux policy for legacy Wifi HAL" am: 10960aec9d
am: 3acba6df5d

Change-Id: I47d52553a72930b13890dfbc32b192af4ca3fde3
2016-09-23 16:35:04 +00:00
Mitchell Wills
3acba6df5d Merge "Add selinux policy for legacy Wifi HAL"
am: 10960aec9d

Change-Id: I5facb64901c9621245f457cabc9d1f5bc8f572b6
2016-09-23 16:33:03 +00:00
Treehugger Robot
10960aec9d Merge "Add selinux policy for legacy Wifi HAL" 2016-09-23 16:27:41 +00:00
bowgotsai
a6c215bcaf Clean up LOCAL_C_INCLUDES
It should be specified by LOCAL_EXPORT_C_INCLUDE_DIRS from the imported
libraries.

Change-Id: I5b01ac24763a75984227d77671def6561325b7cc
2016-09-23 09:21:25 +08:00
Felipe Leme
02656ef7f7 Merge "Let system_server writes to dumpstate.options property." am: 60c436cb76 am: 7ba85b1cde
am: 1bca411711

Change-Id: Ifc83a9abdfae96aa074d9c42f8b839a1a918241b
2016-09-22 23:17:44 +00:00
Felipe Leme
1bca411711 Merge "Let system_server writes to dumpstate.options property." am: 60c436cb76
am: 7ba85b1cde

Change-Id: Ib12b7613dad360bc3dae5e3642e8073139dc2680
2016-09-22 11:55:58 +00:00
Felipe Leme
7ba85b1cde Merge "Let system_server writes to dumpstate.options property."
am: 60c436cb76

Change-Id: I30bb2d1e5230b2306847e142ff1502fd4f33fec8
2016-09-22 08:22:51 +00:00
Treehugger Robot
60c436cb76 Merge "Let system_server writes to dumpstate.options property." 2016-09-22 04:54:33 +00:00
Felipe Leme
a5a8072f3c Let system_server writes to dumpstate.options property.
Currently, we define 4 hardcoded init services to launch dumpstate with
different command-line options (since dumpstate must be launched by
root):

- bugreport
- bugreportplus
- bugreportwear
- bugreportremote

This approach does not scale well; a better option is to have just one
service, and let the framework pass the extra arguments through a system
property.

BUG: 31649719
Test: manual

Change-Id: I7ebbb7ce6a0fd3588baca6fd76653f87367ed0e5
2016-09-21 14:19:29 -07:00
Michal Karpinski
fe92ded530 Change name in the rules after renaming dns_listener -> netd_listener am: 59afa2414d am: 0285a2435a
am: c0f38c1cec

Change-Id: Ia3ba2774a0e296b11be575f8a92dde6bd7514a4e
2016-09-21 09:58:12 +00:00
Michal Karpinski
c0f38c1cec Change name in the rules after renaming dns_listener -> netd_listener am: 59afa2414d
am: 0285a2435a

Change-Id: Ibcfd24bcb84750b4ea8442d08668e96392694402
2016-09-21 08:48:11 +00:00
Michal Karpinski
0285a2435a Change name in the rules after renaming dns_listener -> netd_listener
am: 59afa2414d

Change-Id: I7cd94efdd825e6e69c8f12bcd556d88953a962c8
2016-09-21 08:39:45 +00:00
Michal Karpinski
59afa2414d Change name in the rules after renaming dns_listener -> netd_listener
Change-Id: I4737a087f2d00e1028d1cb43d9eda814a008dbe8
2016-09-21 12:47:49 +09:00
Svet Ganov
e1bb14d0f2 Move device serial behing a permission - selinux am: 3286fca7db am: 0b910049bd
am: 56b1c9c54c

Change-Id: Id2dcc911f4135b9b2dfd62b846cd2c6cc8fc1cc8
2016-09-20 23:14:44 +00:00
Svet Ganov
56b1c9c54c Move device serial behing a permission - selinux am: 3286fca7db
am: 0b910049bd

Change-Id: Id8b4a6c6461eed0cfc7e506daa619759f16924f0
2016-09-20 23:10:13 +00:00
Svet Ganov
0b910049bd Move device serial behing a permission - selinux
am: 3286fca7db

Change-Id: I33086026f3ac103350c866c47a14bdb6d7efac95
2016-09-20 23:06:42 +00:00
Hugo Benichi
4cc9180b17 Add app_api_service to connmetrics_service am: d0561efef3
am: 76436c61bd

Change-Id: I815a9386c62a42eee6e86c22a9234f124ddfd084
2016-09-20 08:39:56 +00:00
Hugo Benichi
76436c61bd Add app_api_service to connmetrics_service
am: d0561efef3

Change-Id: Id1537bf36a218f3727caef36659a40087c19feb9
2016-09-20 07:11:21 +00:00
Svet Ganov
3286fca7db Move device serial behing a permission - selinux
Build serial is non-user resettable freely available device
identifier. It can be used by ad-netowrks to track the user
across apps which violates the user's privacy.

This change deprecates Build.SERIAL and adds a new Build.getSerial()
API which requires holding the read_phone_state permission.
The Build.SERIAL value is set to "undefined" for apps targeting
high enough SDK and for legacy app the value is still available.

bug:31402365

Change-Id: I6309aa58c8993b3db4fea7b55aae05592408b6e4
2016-09-19 15:59:58 -07:00
Mitchell Wills
a18b41e752 Add selinux policy for legacy Wifi HAL
avc: denied { call } for scontext=u:r:wificond:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
avc: denied { call } for scontext=u:r:wificond:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=binder permissive=1

avc: denied { bind } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
avc: denied { call } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=1
avc: denied { getattr } for path="/proc/4355/net/psched" dev="proc" ino=4026535370 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
avc: denied { getattr } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
avc: denied { ioctl } for path="socket:[28193]" dev="sockfs" ino=28193 ioctlcmd=8933 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=1
avc: denied { ioctl } for path="socket:[34821]" dev="sockfs" ino=34821 ioctlcmd=8933 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=1
avc: denied { net_admin } for capability=12 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=capability permissive=1
avc: denied { net_raw } for capability=13 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=capability permissive=1
avc: denied { open } for path="/proc/2754/net/psched" dev="proc" ino=4026535377 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
avc: denied { open } for path="/sys/class/net" dev="sysfs" ino=10488 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
avc: denied { read } for name="net" dev="sysfs" ino=10488 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
avc: denied { read } for name="psched" dev="proc" ino=4026535370 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:proc_net:s0 tclass=file permissive=1
avc: denied { read } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
avc: denied { setopt } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
avc: denied { transfer } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:hwservicemanager:s0 tclass=binder permissive=1
avc: denied { write } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=1
avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=netlink_socket permissive=0
avc: denied { net_admin } for capability=12 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=capability permissive=0
avc: denied { read } for name="net" dev="sysfs" ino=9862 scontext=u:r:wifi_hal_legacy:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
avc: denied { create } for scontext=u:r:wifi_hal_legacy:s0 tcontext=u:r:wifi_hal_legacy:s0 tclass=udp_socket permissive=0

Bug: 31352200
Test: can boot angler & bullhead and start/stop HAL repeatedly
Change-Id: Ide93730d362fb93602742fc10b22fff6e7d56f6b
2016-09-19 14:45:36 -07:00
Ajay Panicker
843d2345b2 Allow bluetooth service to access bluetooth directory and add /logs (6/6) am: a45672614d am: ebcc814eb5
am: 82f9989062

Change-Id: I6ab020bf093d9eeed662815c93029c1d27e9134d
2016-09-19 20:26:25 +00:00
Ajay Panicker
82f9989062 Allow bluetooth service to access bluetooth directory and add /logs (6/6) am: a45672614d
am: ebcc814eb5

Change-Id: Iabada4aedcd7752909f985ca0cb09d0d7613c44d
2016-09-19 20:18:58 +00:00
Ajay Panicker
ebcc814eb5 Allow bluetooth service to access bluetooth directory and add /logs (6/6)
am: a45672614d

Change-Id: I295c9a5fb67688538d2cbc4470b9bf463e2cd3e3
2016-09-19 20:11:01 +00:00
Ajay Panicker
a45672614d Allow bluetooth service to access bluetooth directory and add /logs (6/6)
Bug: 31466840
Change-Id: I3984754034349e6c41de6ae9cccbaab95ca5a918
2016-09-16 20:20:31 +00:00
Hugo Benichi
d0561efef3 Add app_api_service to connmetrics_service
This allows the ConnectivityMetrics app to dump connmetrics service
metrics.

Bug: 31254800
Change-Id: I4c3da8cc80a5820dbed9843badc1464f3ae40581
2016-09-16 11:47:41 +09:00
Fyodor Kupolov
a8e79d2a03 Merge "Allow system_server to delete directories in preloads" am: f23299c547 am: 66c10511ee
am: eb7ecd7199

Change-Id: I6f699b73fb6c9a6d9ba1f5873f4745ca76161bee
2016-09-15 19:44:34 +00:00
Fyodor Kupolov
eb7ecd7199 Merge "Allow system_server to delete directories in preloads" am: f23299c547
am: 66c10511ee

Change-Id: I17cc645175060c6465b6571d25f31fb6f21c9a91
2016-09-15 19:42:01 +00:00
Fyodor Kupolov
66c10511ee Merge "Allow system_server to delete directories in preloads"
am: f23299c547

Change-Id: I5a9bc357635f8567ecd37a1041c1330decb43f0f
2016-09-15 19:40:02 +00:00
Treehugger Robot
f23299c547 Merge "Allow system_server to delete directories in preloads" 2016-09-15 18:18:24 +00:00
Janis Danisevskis
7f15e76463 Allow debuggerd execmem on debuggable domains am: 071b935d0b am: 241f358f73
am: 254e36b3ab

Change-Id: I565ea7d7d4ff14d072b5f07f123437b4d9324570
2016-09-15 16:36:31 +00:00
Janis Danisevskis
254e36b3ab Allow debuggerd execmem on debuggable domains am: 071b935d0b
am: 241f358f73

Change-Id: Icf5fcaf9725bfb5dd01fcba0d8e88229e359e27e
2016-09-15 16:33:31 +00:00
Fyodor Kupolov
3189945192 Allow system_server to delete directories in preloads
(cherry picked from commit 028ed753b5)

avc: denied { rmdir } for name="apps" scontext=u:r:system_server:s0 tcontext=u:object_r:preloads_data_file:s0 tclass=dir permissive=0
avc: denied { rmdir } for name="demo" scontext=u:r:system_server:s0 tcontext=u:object_r:preloads_data_file:s0 tclass=dir permissive=0

Bug: 28855287
Change-Id: Ia470f94d1d960cc4ebe68cb364b8425418acdbd4
2016-09-15 09:31:05 -07:00
Janis Danisevskis
241f358f73 Allow debuggerd execmem on debuggable domains
am: 071b935d0b

Change-Id: I77d1b7c6797d1401abc5e49617090f2e55cee2f6
2016-09-15 16:31:00 +00:00
Janis Danisevskis
071b935d0b Allow debuggerd execmem on debuggable domains
In anticipation of fixing a loophole in the Linux kernel that allows
circumventing the execmem permission by using the ptrace interface,
this patch grants execmem permission on debuggable domains to
debuggerd. This will be required for setting software break points
once the kernel has been fixed.

Bug: 31000401
Change-Id: I9b8d5853b643d24b94d36e2adbcb135dbaef8b1e
2016-09-15 15:11:31 +01:00
Janis Danisevskis
8963e93709 Merge "Allow keystore to access KeyAttestationApplicationIDProviderService" am: 1a640f327d am: 8e74f2f817
am: 5c3b1cdd67

Change-Id: Ie2e274a54e545f60f1989b0518bcfa0b8b8f5d86
2016-09-14 21:36:03 +00:00
Janis Danisevskis
5c3b1cdd67 Merge "Allow keystore to access KeyAttestationApplicationIDProviderService" am: 1a640f327d
am: 8e74f2f817

Change-Id: I4927882190874226b2d1ca6a5f824552988a02e0
2016-09-14 21:33:04 +00:00
Janis Danisevskis
8e74f2f817 Merge "Allow keystore to access KeyAttestationApplicationIDProviderService"
am: 1a640f327d

Change-Id: Ic6cd61685cd27b4a9213697eb24870aea91b0542
2016-09-14 21:29:32 +00:00
Treehugger Robot
1a640f327d Merge "Allow keystore to access KeyAttestationApplicationIDProviderService" 2016-09-14 21:11:00 +00:00
Jeff Vander Stoep
3bece26358 Merge "nfc: allow access to drmserver_service" am: 52c8adb34a am: 2c24ec8bb3
am: 6ce7513653

Change-Id: I887115494152054ef34b59277586f0b9acf1f244
2016-09-14 20:09:51 +00:00
Jeff Vander Stoep
6ce7513653 Merge "nfc: allow access to drmserver_service" am: 52c8adb34a
am: 2c24ec8bb3

Change-Id: I13929222fe188267325cd253658955ddcb9986f6
2016-09-14 20:06:51 +00:00
Jeff Vander Stoep
2c24ec8bb3 Merge "nfc: allow access to drmserver_service"
am: 52c8adb34a

Change-Id: Icc1dacfe3e9009c777a697e9c16884d8be7d2b50
2016-09-14 20:03:54 +00:00
Takahiro Aizawa
37ef3e7393 Merge "selinux: Update policies for mediadrmserver" am: 0dc5d020ac am: 75bbefc03a
am: 61043ff5cc

Change-Id: If57b451077f26912d74319aa896624863fd91063
2016-09-14 20:03:36 +00:00
Tianjie Xu
bca360b38a Add sepolicy for update_verifier am: 59379d8b48 am: 8a521266d2
am: 88fae39798

Change-Id: I19c7703f134836dc4f91c77590441588fa9386cd
2016-09-14 20:03:36 +00:00
Tao Bao
1d2cbf4baf update_verifier: Allow searching /dev/block. am: 1e17dafc6d am: 58a3175c80
am: a3e136f897  -s ours

Change-Id: Ic476faeadb47bdb8d8a1f9f6e93721f71ac843f3
2016-09-14 20:03:25 +00:00
Treehugger Robot
52c8adb34a Merge "nfc: allow access to drmserver_service" 2016-09-14 19:59:19 +00:00
Takahiro Aizawa
61043ff5cc Merge "selinux: Update policies for mediadrmserver" am: 0dc5d020ac
am: 75bbefc03a

Change-Id: I2b3f2c7f1315d25a3d3ae66768fed3fcd4c4e079
2016-09-14 19:48:58 +00:00
Tianjie Xu
88fae39798 Add sepolicy for update_verifier am: 59379d8b48
am: 8a521266d2

Change-Id: I3c504611c5a17ff2311ab961f5c1e92e13955582
2016-09-14 19:48:58 +00:00
Tao Bao
a3e136f897 update_verifier: Allow searching /dev/block. am: 1e17dafc6d
am: 58a3175c80

Change-Id: I1a421302231862c24ec7750d72e4a37b46ac5675
2016-09-14 19:48:55 +00:00
Takahiro Aizawa
75bbefc03a Merge "selinux: Update policies for mediadrmserver"
am: 0dc5d020ac

Change-Id: Ie03dd802e556b881c17ffe1701312e025ad75491
2016-09-14 19:42:57 +00:00
Tianjie Xu
8a521266d2 Add sepolicy for update_verifier
am: 59379d8b48

Change-Id: Ifb74c4dc2b611edd3549a0882faaa85d14654b32
2016-09-14 19:42:57 +00:00