Commit graph

22476 commits

Author SHA1 Message Date
Ashwini Oruganti
64e36cf38d Merge "Don't run permissioncontroller_app in permissive mode" 2019-11-14 23:09:41 +00:00
Nikita Ioffe
6e51b4e61d Allow apexd to be fork_execvp'ed from init during userspace reboot
am: 8a4805265b

Change-Id: I6ac7d927c4b5232e432e32675f779641ea142175
2019-11-14 14:05:00 -08:00
Nikita Ioffe
8a4805265b Allow apexd to be fork_execvp'ed from init during userspace reboot
Test: builds
Test: adb reboot userspace
Bug: 135984674
Change-Id: I089078232c40d533b712736b83a5ed757dde689e
2019-11-14 15:31:47 +00:00
David Anderson
b45bbe2e55 Allow recovery and fastbootd to interact with libfiemap.
In normal Android, libsnapshot interacts with libfiemap over binder (via
IGsid). There is no binder in recovery, so instead, we directly link to
the library and therefore need appropriate sepolicy changes.

Bug: 139154945
Test: no denials in recovery or fastbootd
Change-Id: I356d7b5b906ac198e6f32c4d0cdd206c97faeb84
2019-11-13 18:46:57 -08:00
Ashwini Oruganti
9076b9c541 Don't run permissioncontroller_app in permissive mode
Looking at go/sedenials, we're fairly confident that this domain has all
the necessary permissions. This change enforces all the defined rules
for the permissioncontroller_app domain and unsets the permissive mode.
Bug: 142672293
Test: Build successfully, flashed a phone and basic usage of Permission Manager seemed to work well.

Change-Id: I3fb9cfaa216ddbd865b56e72124374eb1c75dea8
2019-11-13 16:37:49 -08:00
Tri Vo
5ec1a7b9b5 Merge "system_suspend: sysfs path resolution"
am: c03def15ed

Change-Id: Id1991bfbe6fdc6baf973f7d4049253d116da0fea
2019-11-12 16:28:45 -08:00
Tri Vo
c03def15ed Merge "system_suspend: sysfs path resolution" 2019-11-13 00:25:26 +00:00
Jing Ji
4d680609ff Merge "Allow system_server to read system_lmk_prop"
am: fd043c7065

Change-Id: I41d63a8fe5b4bb7e7d2c4e0ffbab73d1e61ab2a4
2019-11-12 16:03:54 -08:00
Jing Ji
fd043c7065 Merge "Allow system_server to read system_lmk_prop" 2019-11-12 23:49:08 +00:00
Tri Vo
e3e77ed264 system_suspend: sysfs path resolution
/sys/class/wakeup/wakeupN can point to an arbitrary path in sysfs. Add
"search" permission for path resolution.

Bug: 144095608
Test: m selinux_policy
Change-Id: I033d15b4ca56656f144189f5c2b1b885f30155a3
2019-11-12 13:47:26 -08:00
Chen Xu
ef52e33464 Merge "Create a cellbroadcast apex"
am: ec2f903d9b

Change-Id: Ida39748d9517db20bc689783e75cfaebddf641d0
2019-11-10 06:05:05 -08:00
Treehugger Robot
ec2f903d9b Merge "Create a cellbroadcast apex" 2019-11-10 13:55:54 +00:00
Chen Xu
debf4b622f Create a cellbroadcast apex
create a single com.android.cellbroadcast apex to pack two apks
together: com.android.cellbroadcastreceiver and
com.android.cellbroadcastservice.

Bug: 135956699
Test: m com.android.cellbroadcast && adb install
com.android.cellbroadcast

Change-Id: Ib3f4447e1215f3dbff2ed019d4e15f3cea062920
2019-11-09 23:35:37 -08:00
Wenjie Zhou
37c87d6f51 Merge "Enable incidentd access to ro.serialno"
am: b438d4527a

Change-Id: If16353c11cea5ad92315cb1bf23c0e5b7d148202
2019-11-08 17:10:16 -08:00
Wenjie Zhou
b438d4527a Merge "Enable incidentd access to ro.serialno" 2019-11-09 01:05:18 +00:00
Yifan Hong
8733ce5c43 Merge "snapshotctl: talk to bootcontrol HAL"
am: eefca2bfd8

Change-Id: I408093bdab945cfd392dcb35306700ca442caafa
2019-11-08 15:53:50 -08:00
Treehugger Robot
eefca2bfd8 Merge "snapshotctl: talk to bootcontrol HAL" 2019-11-08 23:36:21 +00:00
Tri Vo
6ca1772af9 Merge "system_suspend access to suspend, wakeup stats"
am: af9214d16a

Change-Id: Iff129f78ab6d7e0d68d9be13d73781f0700023c9
2019-11-08 14:30:48 -08:00
zhouwenjie
c8ae8fa616 Enable incidentd access to ro.serialno
incident report contains similar data as in a bugreport, but in proto
format. Currently ro.serialno is not captured due to selinux settings.

Test: adb shell incident -p LOCAL 1000
Bug: 143372261
Change-Id: I6a89308c1347fba2ce4f7b469f9a02b119d4aeb7
2019-11-08 14:09:52 -08:00
evitayan
ddcaa5810f Add file_contexts for com.android.ipsec
com.android.ipsec will be shipped as a mainline module in APEX
format. A file_contexts is required for building an APEX.

Bug: 143905344
Test: Built and installed apex on device
Change-Id: I9f9a6190886181e9e4254ea2a984d338fda533da
2019-11-08 22:03:33 +00:00
Tri Vo
af9214d16a Merge "system_suspend access to suspend, wakeup stats" 2019-11-08 21:58:33 +00:00
Suren Baghdasaryan
b7203825f2 Merge "allow init to communicate with lmkd and lmkd to kill native processes"
am: 812f7da4dc

Change-Id: Ib9d97975e6f51f2a8a31c40547b54bcc5b0bbfaa
2019-11-08 09:41:15 -08:00
Suren Baghdasaryan
812f7da4dc Merge "allow init to communicate with lmkd and lmkd to kill native processes" 2019-11-08 17:25:10 +00:00
Yifan Hong
667b71010a snapshotctl: talk to bootcontrol HAL
Test: OTA then merge
Change-Id: Ifdb23070de4e7d8ae4a7ef7d5a6435f101c8b410
2019-11-07 14:49:25 -08:00
Tri Vo
5f1ac02157 system_suspend access to suspend, wakeup stats
Android is moving away from debugfs. Information from /d/wakeup_sources
and /d/suspend_stats is now also exposed in sysfs under
/sys/class/wakeup/* and /sys/power/suspend_stats/* respectively:

  https://lkml.org/lkml/2019/7/31/1349
  https://lkml.org/lkml/2019/8/6/1275

Allow SystemSuspend to read those sysfs nodes.

One caveat is that /sys/class/wakeup/wakeupN can be a symlink to a
device-specific location. In this case, device sepolicy should label
that the files appropriately. This is similar to how device policy
applies "sysfs_net" and "sysfs_batteryinfo" labels.

Bug: 144095608
Bug: 129087298
Test: boot cuttlefish; system_suspend is able to read
/sys/power/suspend_stats/* and /sys/class/wakeup/*
Change-Id: I350c88a271c0f422d0557aeb5e05e1537dc97bc9
2019-11-07 13:50:32 -08:00
Eric Laurent
13f4f2ddee Merge "audioserver: allow audioserver to generate audio HAL tombstones"
am: 8751aa64d7

Change-Id: Ib5c4a182dc6c56766ab6e633e5f6ee7fdb0e16f8
2019-11-07 10:40:26 -08:00
Sudheer Shanka
55f9229ec4 Merge "Add a new system service "blob_store"."
am: 426f2e77c0

Change-Id: I1613cdda7213b2c842cb9e7e43cbfdf4d69c2f39
2019-11-07 10:25:17 -08:00
Eric Laurent
8751aa64d7 Merge "audioserver: allow audioserver to generate audio HAL tombstones" 2019-11-07 18:20:19 +00:00
Suren Baghdasaryan
ee57f177d8 allow init to communicate with lmkd and lmkd to kill native processes
init should register native services with lmkd so that they can be killed
when necessary. Allow init to communicate with lmkd over dedicated socket
the same way AMS does. Allow lmkd to kill and manipulate native processes
that were registered with lmkd.

Bug: 129011369
Test: boot and verify native service registration
Test: verify lmkd can kill registered native processes using lmkd_unit_test
Change-Id: Idfc814bd08115c548e97f11a6bdb006790cbb4ed
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
2019-11-07 18:19:44 +00:00
Sudheer Shanka
426f2e77c0 Merge "Add a new system service "blob_store"." 2019-11-07 18:04:24 +00:00
James Lin
5f4ff281ba Merge "[RCS] Add service context of sepolicy of Context.TELEPHONY_IMS_SERVICE"
am: bd0628f347

Change-Id: I436942e946e5385bf108507c6d808fd90ba397b3
2019-11-06 19:33:27 -08:00
James Lin
bd0628f347 Merge "[RCS] Add service context of sepolicy of Context.TELEPHONY_IMS_SERVICE" 2019-11-07 03:26:08 +00:00
Ashwini Oruganti
955ae05149 Merge "Don't require seinfo for priv-apps"
am: 0febe659aa

Change-Id: I6d4c4656f8b31e6aaa2420940acff6486bc11d96
2019-11-06 17:27:45 -08:00
Ashwini Oruganti
0febe659aa Merge "Don't require seinfo for priv-apps" 2019-11-07 01:05:09 +00:00
Ram Muthiah
1e26f6b72b Update kernel permissions to pass libdm snapshot unit test
am: b46ef107f9

Change-Id: Icf5c7248f1006b5004e6defc03d0408d2063fe31
2019-11-06 15:39:14 -08:00
Ashwini Oruganti
04f771dee4 Don't require seinfo for priv-apps
Relax the requirement to have both seinfo and name specified for
privapps. The original reason for requiring both was because, normally,
a package can only be uniquely specified by both name and signature,
otherwise package squatting could occur. However, privapps are
pre-installed, so the concerns about the potential for package squatting
are eliminated. This change will drastically simplify sepolicy
configuration for priv-apps.

Bug: 142672293
Test: Flashed a device with this build and verified
com.google.android.permissioncontroller still  runs in the
permissioncontroller_app domain.
Change-Id: I5bb2bf84b9db616c4492bd1402550821c70fdd07
2019-11-06 08:37:03 -08:00
James.cf Lin
b5a0c1c0a2 [RCS] Add service context of sepolicy of Context.TELEPHONY_IMS_SERVICE
Bug: 139260938
Test: Manual
Change-Id: I335a955ee7cc2b8e82acd2987c93076fc50dc20a
2019-11-06 21:17:23 +08:00
Ram Muthiah
b46ef107f9 Update kernel permissions to pass libdm snapshot unit test
Bug: 143654050
Test: libdm_test
Change-Id: I671937b3f3144066bf3529e11ad19a73b0eb685e
2019-11-05 23:54:29 +00:00
Josh Gao
9d8be27256 Merge "Move adbd to an apex."
am: b5d60d7789

Change-Id: I2465c3ea586b7e5c26baf0991519970b8eb9bc3f
2019-11-05 15:50:48 -08:00
Josh Gao
b5d60d7789 Merge "Move adbd to an apex." 2019-11-05 23:36:39 +00:00
Ashwini Oruganti
60bae2693a Merge "Update permissioncontroller_app domain rules"
am: 20daed135d

Change-Id: Ic117c0b1c894940062844495bd7fe514bed15cb0
2019-11-04 18:07:25 -08:00
Eric Laurent
685eab6ca2 audioserver: allow audioserver to generate audio HAL tombstones
Allow audioserver to signal audio HAL processes and
generate tombstones in case of watchdog restart.

Bug: 141528385
Test: Force watchdog and verify tombstone creation
Change-Id: I39bb4a63aa93efab68baad3890b8f49fc5f79ead
2019-11-04 18:05:28 -08:00
Treehugger Robot
20daed135d Merge "Update permissioncontroller_app domain rules" 2019-11-05 01:56:39 +00:00
Yifan Hong
6a271f6b7f Merge "Allow snapshotctl to create ota_metadata_file."
am: 73554435ed

Change-Id: Ib67b97bf71f129ce5e58e7c007d04ad1dea96eb6
2019-11-04 16:23:27 -08:00
Ashwini Oruganti
c557ca61dd Update permissioncontroller_app domain rules
Add some rules based on the SELinux denials observed.

Bug: 143905061
Bug: 142672293
Test: Green builds, no more denials for the 7 services added.
Change-Id: I27e4634cb1df03166e734f6c12c8cb9147568d72
2019-11-04 16:03:54 -08:00
Yifan Hong
73554435ed Merge "Allow snapshotctl to create ota_metadata_file." 2019-11-04 22:10:06 +00:00
Hector Dearman
a73d9b851a Merge "Allow Perfetto to log to statsd"
am: 5b43f023dc

Change-Id: Icbdcb5e61aedb7a58150a1b707ec5d7afb354fa8
2019-11-04 08:31:10 -08:00
Hector Dearman
5b43f023dc Merge "Allow Perfetto to log to statsd" 2019-11-04 13:04:11 +00:00
Hector Dearman
776a6169a0 Allow Perfetto to log to statsd
Denial:
10-31 21:17:11.150  8148  8148 W perfetto: type=1400 audit(0.0:135): avc: denied { write } for name="statsdw" dev="tmpfs" ino=33205 scontext=u:r:perfetto:s0 tcontext=u:object_r:statsdw_socket:s0 tclass=sock_file permissive=0

Bug: b/139351286
Test: adb shell perfetto -c :test --dropbox perfetto, watch logcat
  for denials
Change-Id: I401f1625212f85831ce54116271752578db29578
2019-11-04 12:23:27 +00:00
Jing Ji
861c3475f9 Allow system_server to read system_lmk_prop
System_server will read this property to determine if it should
expect the lmkd sends notification to it on low memory kills.

Bug: 136036078
Test: atest CtsAppExitTestCases:ActivityManagerAppExitInfoTest
Change-Id: Iff90f7d28dc7417994f5906333d58fb18cb4a04c
2019-11-01 17:45:45 -07:00