Commit graph

15846 commits

Author SHA1 Message Date
android-build-prod (mdb)
4a42ad5ca7 Merge "Adding ability for hal keymaster to read vendor SPL" am: 81bb3c6e18
am: 8a5e2d7788

Change-Id: I37e4a86ec60fb10f057727e2a3a05a8b5ade0bd4
2018-05-08 11:52:24 -07:00
android-build-prod (mdb)
8a5e2d7788 Merge "Adding ability for hal keymaster to read vendor SPL"
am: 81bb3c6e18

Change-Id: If22c18bc5b9216e4c502a78b16d216f358b9d468
2018-05-08 11:49:52 -07:00
android-build-prod (mdb)
81bb3c6e18 Merge "Adding ability for hal keymaster to read vendor SPL" 2018-05-08 18:36:58 +00:00
Tri Vo
a5cfd3e537 Soong module selinux compat maps
And migrate 26.0.cil and 27.0.cil build targets from Android.mk to
Android.bp

Bug: 33691272
Test: 26.0.cil and 27.0.cil mapping files on the device are unchanged.
Change-Id: Id0ea45c149e096996bc0657615ea98915df3c9e1
2018-05-08 11:28:47 -07:00
Tri Vo
84e247abeb Soong module for selinux files including board-specific directories.
se_filegroup is used to export selinux files from board-specific
directories (e.g. device/google/wahoo/sepolicy).

Use se_filegroup module to export partner extension of compatibility
mapping to build logic in system/sepolicy.

Bug: 33691272
Bug: 74669108
Test: .cil mapping files can be correctly added from vendor directory.
Change-Id: Iaa2a95d0e326cb03a478fc12c1a14ba40e57e117
2018-05-08 11:28:47 -07:00
Joel Galenson
43a4210e40 Track cppreopts SELinux denial. am: 06e09abd25
am: f9fa0d6dba

Change-Id: I1ddd845aeb7c9d80dd1322c6c13c75b4149a68c1
2018-05-08 10:42:01 -07:00
Joel Galenson
f9fa0d6dba Track cppreopts SELinux denial.
am: 06e09abd25

Change-Id: I8fb1ce5ac944ba94d316c39bbf1b1871d05239a3
2018-05-08 10:37:29 -07:00
Joel Galenson
06e09abd25 Track cppreopts SELinux denial.
This should help fix presubmit tests.

Bug: 79414024
Test: Built policy.
Change-Id: Ic840150767ff6c2799ac3b5ef22ba139108c94dd
2018-05-08 08:43:07 -07:00
android-build-prod (mdb)
495df54698 [automerger skipped] Merge "give audioserver access to media.metrics" am: a99a069868
am: c265e926d5  -s ours

Change-Id: I9854ba1eac79dbc5a215dbd9d39d24548eccef62
2018-05-07 16:30:50 -07:00
android-build-prod (mdb)
c265e926d5 Merge "give audioserver access to media.metrics"
am: a99a069868

Change-Id: I2c13930208e6fe7af108527153dc2b588f6627c6
2018-05-07 16:25:50 -07:00
android-build-prod (mdb)
a99a069868 Merge "give audioserver access to media.metrics" 2018-05-07 23:06:37 +00:00
Tri Vo
f7831bc3d3 Build sepolicy tools with Android.bp. am: 594488f8b0
am: 98e7cdf408

Change-Id: I7138922e28326d4bb05901101fb636360c2717c8
2018-05-07 15:56:48 -07:00
android-build-team Robot
b58e715b44 Merge "Whitelist reading property ro.aac_drc_effect_type" into pi-dev
am: adf00fa82e

Change-Id: I212016bcd828b363c4af041e02a365e636d902a8
2018-05-07 15:15:37 -07:00
android-build-team Robot
adf00fa82e Merge "Whitelist reading property ro.aac_drc_effect_type" into pi-dev 2018-05-07 21:55:21 +00:00
Tri Vo
98e7cdf408 Build sepolicy tools with Android.bp.
am: 594488f8b0

Change-Id: Ifb78919e6add04bbdcf673231a3c208980c25183
2018-05-07 14:33:15 -07:00
Ray Essick
b85e382f50 give audioserver access to media.metrics
Let the audioserver record metrics with media.metrics service.
This is for 'audiopolicy' metrics.

Bug: 78595399
Test: record from different apps, see records in 'dumpsys media.metrics'
Change-Id: Ie5c403d0e5ac8c6d614db5e7b700611ddd6d07e9
Merged-In: I63f9d4ad2d2b08eb98a49b8de5f86b6797ba2995
2018-05-07 13:30:53 -07:00
Max Bires
7332216811 Adding ability for hal keymaster to read vendor SPL
Keymaster hal needs to be able to read the vendor SPL for purposes of
rollback protection.

Test: Keymaster can access the hal_keymaster_default property
Change-Id: Ifa53adb23f6ab79346e9dd9616b34d8b24395a0a
2018-05-07 13:25:44 -07:00
Tri Vo
594488f8b0 Build sepolicy tools with Android.bp.
Bug: 33691272
Test: make clean && mmma system/sepolicy
Change-Id: I6bbd6271c375338e7d24cd6089c6f826080c98b6
2018-05-07 12:51:54 -07:00
Jean-Michel Trivi
41795cdf6d Whitelist reading property ro.aac_drc_effect_type
Bug: 71430241
Test: build/flash, grep for "avc: denied { read }" for mediacodec, should be empty on walleye
Change-Id: I12e1b11a969d3f979ca0cfbe4ca7db2bc5e46165
2018-05-07 12:28:17 -07:00
Ray Essick
7856fcd529 give audioserver access to media.metrics
am: 2306cc040a

Change-Id: I3fdf2b2b67b22a0db92e0356e39c373ceccbae50
2018-05-07 11:14:29 -07:00
Ray Essick
2306cc040a give audioserver access to media.metrics
Let the audioserver record metrics with media.metrics service.
This is for 'audiopolicy' metrics.

Bug: 78595399
Test: record from different apps, see records in 'dumpsys media.metrics'
Change-Id: I63f9d4ad2d2b08eb98a49b8de5f86b6797ba2995
2018-05-07 16:31:44 +00:00
Mark Salyzyn
5e6b6bc421 init: support /dev/input
Test: compile
Bug: 64114943
Change-Id: I2bbf84a6e472d720f02282e10d56795b75ac62d1
2018-05-07 14:28:24 +00:00
Pavel Maltsev
2350da2bca [automerger skipped] Move automotive HALs sepolicy to system/ am: 43e172af66
am: f9828355cc  -s ours

Change-Id: I7e546844484831d685c93624a677d6980abb9386
2018-05-04 20:00:12 -07:00
Pawin Vongmasa
3a091fb8da Put in sepolicies for Codec2.0 services am: 19a74ec88a
am: 8144a92bad

Change-Id: Ibfec61e843b9e4fc6f6c80c8da72583db3987c70
2018-05-04 19:59:52 -07:00
Jeff Vander Stoep
1279a7ae85 resolve merge conflicts of bc34fa26ac to pi-dev-plus-aosp
Bug: None
Test: None
Change-Id: Ie9d2f35efd5bf39d0282ccc41fdd3f974d7c01bf
2018-05-04 19:03:03 -07:00
Roshan Pius
04e84104a4 [automerger skipped] sepolicy(hostapd): Add a HIDL interface for hostapd am: d7b34a48ff
am: 528c3a4ba9  -s ours

Change-Id: Ic4c72259a67dc88fc2ccebbeed2a7efcdc53273a
2018-05-04 17:06:02 -07:00
Pavel Maltsev
f9828355cc Move automotive HALs sepolicy to system/
am: 43e172af66

Change-Id: I42f9c0dbf53975d00a8c032094508a74e9265a4e
2018-05-04 16:58:34 -07:00
Pawin Vongmasa
8144a92bad Put in sepolicies for Codec2.0 services
am: 19a74ec88a

Change-Id: I056c32b9a3b4916d0f8d35e5a7f069d16783090f
2018-05-04 16:58:06 -07:00
Jeff Vander Stoep
bc34fa26ac Start the process of locking down proc/net
am: 7a4af30b38

Change-Id: I8ed1329d7501e2f0f299228858b2570b939c2767
2018-05-04 16:57:43 -07:00
Roshan Pius
528c3a4ba9 sepolicy(hostapd): Add a HIDL interface for hostapd
am: d7b34a48ff

Change-Id: I92010c185741d7a834545995bdaf86b10d78a2b0
2018-05-04 16:57:22 -07:00
android-build-team Robot
21a64f9b59 Merge "Allow system server to record its own profile" into pi-dev
am: 7ea7f12d14

Change-Id: Ib34585d03d7c3a2389ab6cd0e533e31df068edad
2018-05-04 15:54:50 -07:00
android-build-team Robot
7ea7f12d14 Merge "Allow system server to record its own profile" into pi-dev 2018-05-04 22:43:22 +00:00
Josh Gao
3e8027388a Merge changes from topic "tombstoned_empty" into pi-dev
am: d018b5ce2c

Change-Id: I045698e8086f23e40b7df500848ae62bb546eb27
2018-05-04 15:19:59 -07:00
Josh Gao
5c9e2b7c5b tombstoned: allow linking tombstones.
am: 5159b1c9d6

Change-Id: I1bde1b784ce63b475f4ee97834c970d84a3f7def
2018-05-04 15:19:46 -07:00
Josh Gao
d018b5ce2c Merge changes from topic "tombstoned_empty" into pi-dev
* changes:
  Update sepolicy prebuilts for tombstoned.
  tombstoned: allow linking tombstones.
2018-05-04 21:37:22 +00:00
Pavel Maltsev
43e172af66 Move automotive HALs sepolicy to system/
Bug: 70637118
Test: build, flash and boot automotive builds

Change-Id: I6db23258de30174d6db09d241e91b08aa5afedef
Merged-In: I6db23258de30174d6db09d241e91b08aa5afedef
(cherry picked from commit 394dbe34a0)
2018-05-04 21:36:48 +00:00
Pawin Vongmasa
19a74ec88a Put in sepolicies for Codec2.0 services
Test: Builds

Bug: 64121714
Bug: 31973802
Change-Id: Id37be8726a8bb297e35bca494964fdbcc48c6a73
(cherry picked from commit 4be2889477)
2018-05-04 21:36:41 +00:00
Jeff Vander Stoep
7a4af30b38 Start the process of locking down proc/net
Files in /proc/net leak information. This change is the first step in
determining which files apps may use, whitelisting benign access, and
otherwise removing access while providing safe alternative APIs.

To that end, this change:
* Introduces the proc_net_type attribute which will assigned to any
new SELinux types in /proc/net to avoid removing access to privileged
processes. These processes may be evaluated later, but are lower
priority than apps.
* Labels /proc/net/{tcp,tcp6,udp,udp6} as proc_net_vpn due to existing
use by VPN apps. This may be replaced by an alternative API.
* Audits all other proc/net access for apps.
* Audits proc/net access for other processes which are currently
granted broad read access to /proc/net but should not be including
storaged, zygote, clatd, logd, preopt2cachename and vold.

Bug: 9496886
Bug: 68016944
Test: Boot Taimen-userdebug. On both wifi and cellular: stream youtube
    navigate maps, send text message, make voice call, make video call.
    Verify no avc "granted" messages in the logs.
Test: A few VPN apps including "VPN Monster", "Turbo VPN", and
"Freighter". Verify no logspam with the current setup.
Test: atest CtsNativeNetTestCases
Test: atest netd_integration_test
Test: atest QtaguidPermissionTest
Test: atest FileSystemPermissionTest

Change-Id: I7e49f796a25cf68bc698c6c9206e24af3ae11457
Merged-In: I7e49f796a25cf68bc698c6c9206e24af3ae11457
(cherry picked from commit 087318957f)
2018-05-04 21:36:33 +00:00
Roshan Pius
d7b34a48ff sepolicy(hostapd): Add a HIDL interface for hostapd
* Note on cherry-pick: Some of the dependent changes are not in AOSP.
In order to keep hostapd running correctly in AOSP, I've modified this
change to only include policy additions.

Change sepolicy permissions to now classify hostapd as a HAL exposing
HIDL interface.

Sepolicy denial for accessing /data/vendor/misc/wifi/hostapd:
12-27 23:40:55.913  4952  4952 W hostapd : type=1400 audit(0.0:19): avc:
denied { write } for name="hostapd" dev="sda13" ino=4587601
scontext=u:r:hal_wifi_hostapd_default:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0

01-02 19:07:16.938  5791  5791 W hostapd : type=1400 audit(0.0:31): avc:
denied { search } for name="net" dev="sysfs" ino=30521
scontext=u:r:hal_wifi_hostapd_default:s0
tcontext=u:object_r:sysfs_net:s0 tclass=dir permissive=0

Bug: 36646171
Test: Device boots up and able to turn on SoftAp.
Change-Id: Ibacfcc938deab40096b54b8d0e608d53ca91b947
Merged-In: Ibacfcc938deab40096b54b8d0e608d53ca91b947
(cherry picked from commit 5bca3e860d)
2018-05-04 21:36:24 +00:00
android-build-prod (mdb)
64d56f81f8 Merge "FrameworksServicesTests: allow access to test.sys.boot.reason property" am: 8c139df845
am: 8f0e92bbfa

Change-Id: I5fc7d670c79d5415e5fdce3e17c033ea8a437bbd
2018-05-04 14:30:39 -07:00
android-build-prod (mdb)
8f0e92bbfa Merge "FrameworksServicesTests: allow access to test.sys.boot.reason property"
am: 8c139df845

Change-Id: Ia74cdf60da47c2fa41577bc25dd29f102c2e2f72
2018-05-04 14:25:33 -07:00
android-build-prod (mdb)
8c139df845 Merge "FrameworksServicesTests: allow access to test.sys.boot.reason property" 2018-05-04 21:19:46 +00:00
Calin Juravle
035fcc46cc Allow system server to record its own profile
On userdebug builds we can now profile system server without disabling
selinux. This is the final piece, and allows the system server to save its
own profile.

Test: manual, on a device with system server profiling enabled
Bug: 73313191

(cherry picked from commit 71d8467b75)

Change-Id: I93e7e01bfbd3146a8cfd26a1f6e88b640e9c4e0f
2018-05-04 13:38:49 -07:00
android-build-prod (mdb)
0f1138e475 Merge "Allow lmkd to log to statsd" am: 5d34bbcb5e
am: 11fa8d2cc4

Change-Id: Ibb9a594bd228aea0d4f7f7f29af13e668c42409c
2018-05-04 13:23:40 -07:00
Android Build Merger (Role)
f973b511a7 Merge "[automerger skipped] Merge "Never expand proc_type attribute" am: 54f61fe53c am: b4e233f9b6 -s ours" into pi-dev-plus-aosp 2018-05-04 20:23:27 +00:00
Jeffrey Vander Stoep
17d4ae96ae [automerger skipped] Merge "Never expand proc_type attribute" am: 54f61fe53c
am: b4e233f9b6  -s ours

Change-Id: I4d19395b4af474086cdaee39a04d7ddaebe54d18
2018-05-04 13:23:22 -07:00
Yao Chen
1d01bc94e7 Allow lmkd to log to statsd
am: 78e3ed447a

Change-Id: I0dd4ed7f448fc08b73608ddfecface1b6474d1bc
2018-05-04 13:23:15 -07:00
android-build-prod (mdb)
11fa8d2cc4 Merge "Allow lmkd to log to statsd"
am: 5d34bbcb5e

Change-Id: I2df89b301eb5a822e1bf27785f79b4fcdb349d6a
2018-05-04 13:20:04 -07:00
Jeffrey Vander Stoep
b4e233f9b6 Merge "Never expand proc_type attribute"
am: 54f61fe53c

Change-Id: I2b38c09ed1d733b68cc8b999bf775654d85f6c09
2018-05-04 13:19:50 -07:00
android-build-prod (mdb)
5d34bbcb5e Merge "Allow lmkd to log to statsd" 2018-05-04 20:11:27 +00:00