Commit graph

22409 commits

Author SHA1 Message Date
Treehugger Robot
82eca37afa Merge "Revert "Don't run permissioncontroller_app in permissive mode"" 2019-11-21 04:18:39 +00:00
Ashwini Oruganti
6f795f3dc6 Revert "Don't run permissioncontroller_app in permissive mode"
This reverts commit 9076b9c541.

This is breaking incidentcompanion_service and preventing taking bug
reports from work profile.

Bug: 144677148
Bug: 142672293
Test: Green builds.
Change-Id: I7a82522a5bb21c05fbabd3f3f1c05d4a8c6ca8f4
2019-11-20 22:47:22 +00:00
Shawn Willden
10f0b53ef7 Add Keymaster 4.1
Bug: 140193672
Bug: 140192237
Bug: 140824829
Test: Manual boot test
Change-Id: Iccc8cc5e8fc7c9301478faa50d0e18fa917283fb
2019-11-20 12:14:36 -07:00
Nikita Ioffe
dd0c37574b Merge "Add selinux rules for userspace reboot related properties"
am: a0bba66aac

Change-Id: If7af502cb8bbb86aeb2f35183bef07e808e5fe7c
2019-11-20 05:16:20 -08:00
Nikita Ioffe
a0bba66aac Merge "Add selinux rules for userspace reboot related properties" 2019-11-20 13:04:16 +00:00
Jooyung Han
a9324749cc Make file_contexts as "android:path" property
Till now, file_contexts has been treated differently that other input
src files. Now it is tagged as `android:"path"` because it is.

Bug: 144732805
Test: m
Change-Id: I6b22a8d22417b75c5cb8cd3b2e534d67e958b074
2019-11-20 17:54:34 +09:00
Terry Wang
be06865242 Merge "Add a new system service for app search management."
am: a7795f5e77

Change-Id: Icf40e73bcd9d4b12bb057ba4a2b9a6d7afe3b139
2019-11-19 15:47:29 -08:00
Mike Yu
faef8db408 Merge "Allow system server to dump netd stack traces"
am: f9f5b3c5eb

Change-Id: Icfdc3abcfdd36910ad233d4fff807bca7a82888c
2019-11-19 15:24:30 -08:00
Orion Hodson
54578ef845 Merge "Add property contexts for dex2oat cpu-set properties"
am: abb7024a1e

Change-Id: Ica987401cb4081815f40e653db878a3074f1a0e2
2019-11-19 15:19:45 -08:00
Terry Wang
a7795f5e77 Merge "Add a new system service for app search management." 2019-11-19 22:06:20 +00:00
Nikita Ioffe
7065e46b5d Add selinux rules for userspace reboot related properties
By default sys.init.userspace_reboot.* properties are internal to
/system partition. Only exception is
sys.init.userspace_reboot.in_progress which signals to all native
services (including vendor ones) that userspace reboot is happening,
hence it should be a system_public_prop.

Only init should be allowed to set userspace reboot related properties.

Bug: 135984674
Test: builds
Test: adb reboot userspace
Change-Id: Ibb04965be2d5bf6e81b34569aaaa1014ff61e0d3
2019-11-19 17:41:28 +00:00
Mike Yu
f9f5b3c5eb Merge "Allow system server to dump netd stack traces" 2019-11-19 10:51:04 +00:00
Orion Hodson
abb7024a1e Merge "Add property contexts for dex2oat cpu-set properties" 2019-11-19 07:34:13 +00:00
Mike Yu
c205104505 Allow system server to dump netd stack traces
Bug: 144415436
Test: built, flashed, booted
      verified watchdog dumped netd stack traces during ANR

Change-Id: Ib013dd3b7e5a0fa1731559b9e056c74f30acd3cd
2019-11-19 14:55:00 +08:00
Terry Wang
9a2296252f Add a new system service for app search management.
This change app-search-service to sepolicy system service.

Bug: 142567528
Test: Manual
Change-Id: Ife7b09365d667da0ad370e586af828f8f4423660
2019-11-18 16:06:58 -08:00
Tianjie Xu
07234a1ced Merge "Add a new context for property ota.warm_reset"
am: a54c82a1fc

Change-Id: I0fab7a0747019ac61a94d7a9afefa1da9c0f73e3
2019-11-18 15:39:44 -08:00
Tianjie Xu
a54c82a1fc Merge "Add a new context for property ota.warm_reset" 2019-11-18 23:15:43 +00:00
Ilya Matyukhin
d854f82473 Merge "Add AuthService to sepolicy"
am: 517fee8781

Change-Id: Iedb3689e1cd9eb82cf5c5a2c2fe58cd39400bd23
2019-11-18 13:51:01 -08:00
Ilya Matyukhin
517fee8781 Merge "Add AuthService to sepolicy" 2019-11-18 20:45:38 +00:00
Ilya Matyukhin
d2309dafcb Add AuthService to sepolicy
AuthService is introduced in ag/9700446.

Bug: 141025588
Test: can successfully publish AuthService with publishBinderService(...)
Change-Id: I0f9fceac0c555d05a29467e4ab1380f389b60af4
2019-11-16 02:24:30 +00:00
Mathieu Chartier
7e5e99fcf8 Revert "Remove ability to set profilebootimage and profilesystemserver"
The ability to set these properties is required by the
profilebootclasspath Android products.

Also fixed renamed property.

Bug: 139883463
Test: manually verified

This reverts commit 3079462443.

Change-Id: I7e8fceb974f34ea584799dd3e458279adee53e11
2019-11-15 13:20:25 -08:00
Neil Fuller
d1a14b0f19 Merge "Add new time zone detection service"
am: e2aabe5012

Change-Id: Ie1a756c00688c7bb0712d68b01eafb78bf1bbace
2019-11-15 12:11:49 -08:00
Treehugger Robot
e2aabe5012 Merge "Add new time zone detection service" 2019-11-15 19:55:49 +00:00
Neil Fuller
dcda8d0bb7 Add new time zone detection service
Add entries necessary for the new time zone detection service.

Bug:140712361
Test: See related frameworks/base change
Change-Id: Ide4244104e2add843c1d699d528328dd71a6b525
2019-11-15 13:33:23 +00:00
Orion Hodson
7b2ee48cd2 Add property contexts for dex2oat cpu-set properties
New properties are:

 dalvik.vm.dex2oat-cpu-set [default compiler thread affinity]
 dalvik.vm.boot-dex2oat-cpu-set [compiler thread affinity for boot]
 dalvik.vm.image-dex2oat-cpu-set [thread affinity recompiling the boot image]

Bug: 141446571
Test: Run installd tests with new properties defined in target mk file.
Change-Id: Idcbb1332aa9c18f6082b827eae0334d063644a41
2019-11-15 13:18:18 +00:00
David Anderson
5bf15403b3 Merge "Allow recovery and fastbootd to interact with libfiemap."
am: 899d721779

Change-Id: Ib74dca71e221bd26034805cf8e2eae70617bb423
2019-11-14 20:38:32 -08:00
David Anderson
899d721779 Merge "Allow recovery and fastbootd to interact with libfiemap." 2019-11-15 04:27:59 +00:00
Peter Collingbourne
b3b9adcb7f Merge "sepolicy: Allow system_server to use execmem in emulator builds with software rendering."
am: a1f3cae304

Change-Id: I55b7f80eadadf9872b3bceeebccaab99d30e612b
2019-11-14 18:54:48 -08:00
Treehugger Robot
a1f3cae304 Merge "sepolicy: Allow system_server to use execmem in emulator builds with software rendering." 2019-11-15 02:48:43 +00:00
Ashwini Oruganti
596b4b9048 Create a separate domain for VzwOmaTrigger
am: c77ff3727c

Change-Id: I357e5b1337a2b889525ae6f8b5022eb7288619ef
2019-11-14 18:19:33 -08:00
Ashwini Oruganti
c77ff3727c Create a separate domain for VzwOmaTrigger
This creates a new vzwomatrigger_app domain. The domain is
currently in permissive mode (for userdebug and eng builds), while we
observe the SELinux denials generated and update permissions.
Bug: 142672293
Test: Build, flash, boot successfully

Change-Id: I552df772b66e8e7edb1ccee754d1ea8dd1acece0
2019-11-14 16:13:00 -08:00
Tianjie Xu
f5ddc0444b Add a new context for property ota.warm_reset
The property is set to inform kernel to do a warm_reset on the next
reboot. This is useful to persist the logs to debug device boot
failures. More details in http://go/rvc-ota-persist-logs.

The property is set to 1 by update_engine after an OTA. And it's set to
0 by update_verifier or vold after we mark the current slot boot
successful.
The property is read by vendor_init. And according to its value,
vendor_init writes a particular sysfs file to schedule a warm reset
on the following reboot.

Without the new context, the denial message says:
[   13.423163] audit: type=1107 audit(1746393.166:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc:  denied  { read } for property=ota.warm_reset pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0'
[   23.096497] init: Unable to set property 'OTA.warm_reset' from uid:0 gid:2001 pid:841: SELinux permission check failed
[   23.096574] type=1107 audit(1573768000.668:42): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=OTA.warm_reset pid=841 uid=0 gid=2001 scontext=u:r:update_verifier:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=0'
[   23.108430] update_verifier: Failed to reset the warm reset flag

Bug: 143489994
Test: check the property can be set by update_engine, and read by vendor_init
Change-Id: I87c12a53a138b72ecfed3ab6a4d846c20f5a8484
2019-11-14 15:24:25 -08:00
Ashwini Oruganti
73c7533d36 Merge "Don't run permissioncontroller_app in permissive mode"
am: 64e36cf38d

Change-Id: Ie949a4a2843d7dd3b1443bce49b66cce251ac815
2019-11-14 15:16:18 -08:00
Ashwini Oruganti
64e36cf38d Merge "Don't run permissioncontroller_app in permissive mode" 2019-11-14 23:09:41 +00:00
Nikita Ioffe
6e51b4e61d Allow apexd to be fork_execvp'ed from init during userspace reboot
am: 8a4805265b

Change-Id: I6ac7d927c4b5232e432e32675f779641ea142175
2019-11-14 14:05:00 -08:00
Nikita Ioffe
8a4805265b Allow apexd to be fork_execvp'ed from init during userspace reboot
Test: builds
Test: adb reboot userspace
Bug: 135984674
Change-Id: I089078232c40d533b712736b83a5ed757dde689e
2019-11-14 15:31:47 +00:00
David Anderson
b45bbe2e55 Allow recovery and fastbootd to interact with libfiemap.
In normal Android, libsnapshot interacts with libfiemap over binder (via
IGsid). There is no binder in recovery, so instead, we directly link to
the library and therefore need appropriate sepolicy changes.

Bug: 139154945
Test: no denials in recovery or fastbootd
Change-Id: I356d7b5b906ac198e6f32c4d0cdd206c97faeb84
2019-11-13 18:46:57 -08:00
Ashwini Oruganti
9076b9c541 Don't run permissioncontroller_app in permissive mode
Looking at go/sedenials, we're fairly confident that this domain has all
the necessary permissions. This change enforces all the defined rules
for the permissioncontroller_app domain and unsets the permissive mode.
Bug: 142672293
Test: Build successfully, flashed a phone and basic usage of Permission Manager seemed to work well.

Change-Id: I3fb9cfaa216ddbd865b56e72124374eb1c75dea8
2019-11-13 16:37:49 -08:00
Tri Vo
5ec1a7b9b5 Merge "system_suspend: sysfs path resolution"
am: c03def15ed

Change-Id: Id1991bfbe6fdc6baf973f7d4049253d116da0fea
2019-11-12 16:28:45 -08:00
Tri Vo
c03def15ed Merge "system_suspend: sysfs path resolution" 2019-11-13 00:25:26 +00:00
Jing Ji
4d680609ff Merge "Allow system_server to read system_lmk_prop"
am: fd043c7065

Change-Id: I41d63a8fe5b4bb7e7d2c4e0ffbab73d1e61ab2a4
2019-11-12 16:03:54 -08:00
Jing Ji
fd043c7065 Merge "Allow system_server to read system_lmk_prop" 2019-11-12 23:49:08 +00:00
Tri Vo
e3e77ed264 system_suspend: sysfs path resolution
/sys/class/wakeup/wakeupN can point to an arbitrary path in sysfs. Add
"search" permission for path resolution.

Bug: 144095608
Test: m selinux_policy
Change-Id: I033d15b4ca56656f144189f5c2b1b885f30155a3
2019-11-12 13:47:26 -08:00
Chen Xu
ef52e33464 Merge "Create a cellbroadcast apex"
am: ec2f903d9b

Change-Id: Ida39748d9517db20bc689783e75cfaebddf641d0
2019-11-10 06:05:05 -08:00
Treehugger Robot
ec2f903d9b Merge "Create a cellbroadcast apex" 2019-11-10 13:55:54 +00:00
Chen Xu
debf4b622f Create a cellbroadcast apex
create a single com.android.cellbroadcast apex to pack two apks
together: com.android.cellbroadcastreceiver and
com.android.cellbroadcastservice.

Bug: 135956699
Test: m com.android.cellbroadcast && adb install
com.android.cellbroadcast

Change-Id: Ib3f4447e1215f3dbff2ed019d4e15f3cea062920
2019-11-09 23:35:37 -08:00
Wenjie Zhou
37c87d6f51 Merge "Enable incidentd access to ro.serialno"
am: b438d4527a

Change-Id: If16353c11cea5ad92315cb1bf23c0e5b7d148202
2019-11-08 17:10:16 -08:00
Wenjie Zhou
b438d4527a Merge "Enable incidentd access to ro.serialno" 2019-11-09 01:05:18 +00:00
Yifan Hong
8733ce5c43 Merge "snapshotctl: talk to bootcontrol HAL"
am: eefca2bfd8

Change-Id: I408093bdab945cfd392dcb35306700ca442caafa
2019-11-08 15:53:50 -08:00
Treehugger Robot
eefca2bfd8 Merge "snapshotctl: talk to bootcontrol HAL" 2019-11-08 23:36:21 +00:00