Commit graph

8564 commits

Author SHA1 Message Date
Treehugger Robot
ffa2957283 Merge "DO NOT MERGE: Camera: Add initial Treble camera HAL sepolicy" 2017-01-18 22:29:42 +00:00
Jin Qian
2a9edabbe4 Merge "Define policy for /proc/uid_io/stats" am: becc13e86e
am: 6bc49b178b

Change-Id: Ifc67f819005b84203554da09c9be7751f33d57dd
2017-01-18 20:35:18 +00:00
Jin Qian
6bc49b178b Merge "Define policy for /proc/uid_io/stats"
am: becc13e86e

Change-Id: I15f1b9607de33fc65af82a8e128bc0194337441c
2017-01-18 20:30:46 +00:00
Treehugger Robot
becc13e86e Merge "Define policy for /proc/uid_io/stats" 2017-01-18 20:25:13 +00:00
Colin Cross
5c47e39186 Fix incremental builds am: 596fa95fee
am: 4eae1d0fee

Change-Id: I226bf6132c3d9ebf012b12efe3d744ac1e470b2b
2017-01-18 20:11:03 +00:00
Colin Cross
4eae1d0fee Fix incremental builds
am: 596fa95fee

Change-Id: Ib22dc21b4fdbfd73f9ff3ac848dfe89bfa1396d4
2017-01-18 20:08:33 +00:00
Eino-Ville Talvala
9c43a3ff10 DO NOT MERGE: Camera: Add initial Treble camera HAL sepolicy
- Allow cameraservice to talk to hwbinder, hwservicemanager
- Allow hal_camera to talk to the same interfaces as cameraservice

Test: Compiles, confirmed that cameraservice can call hwservicemanager
Bug: 32991422
Change-Id: Ied0a3f5f7149e29c468a13887510c78d555dcb2a
2017-01-18 12:02:36 -08:00
Jin Qian
d345906b14 Define policy for /proc/uid_io/stats
New procfs file read by storaged to dump fg/bg IO usage.

Remove kmsg rule since it's no longer used by storaged.

Allow storaged to find permission_service to translate UID
to package name.

Test: adb shell storaged -u
Bug: 34198239
Change-Id: I74654662c75571cbe166cf2b8cbab84828218cbd
2017-01-18 11:00:57 -08:00
Colin Cross
596fa95fee Fix incremental builds
Some recent CLs changed the list of files that are installed in the
root directory.  Incremental builds have no way to uninstall files
that were previously installed, which results in old stray files lying
around.  If the root directory is contained in system.img, this causes
an error while building system.img:
error: build_directory_structure: cannot lookup security context for /service_contexts

Update CleanSpec.mk to remove files obsoleted by:
Ide67d37d85273c60b9e387e72fbeb87be6da306a
I7881af8922834dc69b37dae3b06d921e05206564
Ide67d37d85273c60b9e387e72fbeb87be6da306a

This is not seen on the incremental build servers because they run
make installclean between builds.

Test: incremental build passes
Change-Id: I22ecd1d3698404df352263fa99b56cb65247a23b
2017-01-18 10:33:55 -08:00
Steven Moreland
a25192262b haldomain: add hwbinder_use
All hals need to use hwbinder.

Test: no additional denials
Bug: 34180936
Change-Id: Ie92cdbd79fc75062c4afa4cda53cb57ccde7e370
2017-01-18 09:47:50 -08:00
Jorim Jaggi
c2bd29bd17 Merge "Revert "property_context: split into platform and non-platform components."" am: 615b60bd54
am: d28e04333d

Change-Id: I5d50d97450530693f32451818f6a1b9a88f11c83
2017-01-18 16:51:23 +00:00
Jorim Jaggi
9ce3ffe1f8 Revert "property_context: split into platform and non-platform components." am: aa03ef2621
am: 620d078e69

Change-Id: Icc1f32a553e250d81da1a32de48430f266cb65d5
2017-01-18 16:48:12 +00:00
Jorim Jaggi
d28e04333d Merge "Revert "property_context: split into platform and non-platform components.""
am: 615b60bd54

Change-Id: I9c40920a46636128418fac32d8c1872c772b8028
2017-01-18 16:45:31 +00:00
Jorim Jaggi
620d078e69 Revert "property_context: split into platform and non-platform components."
am: aa03ef2621

Change-Id: I8a80d25fd5cfb47c4d93e33f0c9ab80024543e2c
2017-01-18 16:41:59 +00:00
Jorim Jaggi
615b60bd54 Merge "Revert "property_context: split into platform and non-platform components."" 2017-01-18 16:33:31 +00:00
Jorim Jaggi
aa03ef2621 Revert "property_context: split into platform and non-platform components."
This reverts commit 262edc382a.

Fixes: 34370523
Change-Id: I077d064d4031d40bc48cb39eba310e6c16b9627d
2017-01-18 15:47:11 +00:00
Sandeep Patil
5c68562b63 Merge "property_context: split into platform and non-platform components." am: ccbf463a9a
am: 88b4a53264

Change-Id: I1b77dda37eb5f5598fb676992624a10d50124461
2017-01-18 06:17:28 +00:00
Sandeep Patil
a9aeef0392 property_context: split into platform and non-platform components. am: 262edc382a
am: af8c60fec1

Change-Id: I542204a3c6dc4395918b3cf379c4076dbaffbdcb
2017-01-18 06:17:23 +00:00
Sandeep Patil
88b4a53264 Merge "property_context: split into platform and non-platform components."
am: ccbf463a9a

Change-Id: I018d3fc1f782b6d689c4231e5a2a350ea97a11cd
2017-01-18 06:12:45 +00:00
Sandeep Patil
af8c60fec1 property_context: split into platform and non-platform components.
am: 262edc382a

Change-Id: If843833a2fb22b92949b47a33bbd88777f4a54e5
2017-01-18 06:12:14 +00:00
Treehugger Robot
ccbf463a9a Merge "property_context: split into platform and non-platform components." 2017-01-18 06:09:02 +00:00
Daichi Hirono
4b7c1d5230 Don't open appfuse files in apps. am: 7ae1d23745
am: f702933a5b

Change-Id: I873f07ec888a8b225ac3252208820dc0b5c8eac8
2017-01-18 06:06:37 +00:00
Daichi Hirono
f702933a5b Don't open appfuse files in apps.
am: 7ae1d23745

Change-Id: Ic4a3c4df6966182cd133e4ba3f3dd89b8da84bfe
2017-01-18 06:04:06 +00:00
Daichi Hirono
7ae1d23745 Don't open appfuse files in apps.
Previously we published appfuse mount points to apps and apps open
appfuse file by themselves. We changed the design and we don't allow
apps to access appfuse mount point. Instead system server opens a file
on appfuse mount points and passes FD to apps.

The change updates apps and system server policies to adopt new design.

Bug: 29970149
Test: None
Change-Id: I0b35fee9816f61565705eecb88a472754ccffdca
2017-01-18 13:25:04 +09:00
Jeff Sharkey
955aa7aa43 Define policy for /proc/uid_procstat/set. am: 828433c892
am: 7b88514c26

Change-Id: I2826bd3129b43a11137c1cd8cb9bbdd0141cc3fe
2017-01-18 04:19:29 +00:00
Jeff Sharkey
7b88514c26 Define policy for /proc/uid_procstat/set.
am: 828433c892

Change-Id: I60de6b63d1029afa3546f1f45dc5fedf45e188e4
2017-01-18 04:17:29 +00:00
Jeff Sharkey
828433c892 Define policy for /proc/uid_procstat/set.
New procfs file written by the system_server to communicate fg/bg
state of UIDs to switch the statistics counter sets used.

avc: denied { write } for name="set" dev="proc" ino=4026531862 scontext=u:r:system_server:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1

Test: builds, boots, counter sets updated
Bug: 34360629
Change-Id: I2efbfbba9e73f50ce50a80a3dffd3b14fa55c048
2017-01-17 18:34:17 -07:00
Alex Klyubin
45630ee965 Merge "1-arg variant of hal_impl_domain" am: fa12010697
am: 379ce55b4e

Change-Id: Ibbe9f31d2df586b12f5cda7d49ba655ede42f822
2017-01-18 00:48:42 +00:00
Sandeep Patil
0b0d7168b1 service_context: split into platform and non-platform components. am: a058b569e4
am: 88fe61cdc1

Change-Id: Ic18f5e03886e8e3049e9b8f2148e8dd040dd6b26
2017-01-18 00:46:50 +00:00
Alex Klyubin
379ce55b4e Merge "1-arg variant of hal_impl_domain"
am: fa12010697

Change-Id: Ie16d45133ca244b408098b11f23fa64d8d6a3fd2
2017-01-18 00:43:30 +00:00
Sandeep Patil
262edc382a property_context: split into platform and non-platform components.
Bug: 33746484
Test: Successfully boot with original service and property contexts.
      Successfully boot with split serivce and property contexts.

Change-Id: I7881af8922834dc69b37dae3b06d921e05206564
Signed-off-by: Sandeep Patil <sspatil@google.com>
2017-01-18 00:41:47 +00:00
Sandeep Patil
88fe61cdc1 service_context: split into platform and non-platform components.
am: a058b569e4

Change-Id: If71062f721f57462d6238248e77b6189669847ab
2017-01-18 00:41:37 +00:00
Alex Klyubin
fa12010697 Merge "1-arg variant of hal_impl_domain" 2017-01-18 00:37:48 +00:00
Alex Klyubin
b68cee2576 1-arg variant of hal_impl_domain
This improves readability and consistency for HAL implementation
domains which have only one implementation.

Test: No change to policy according to sesearch
Test: No change to which types are associated with haldomain according to "sepolicy-analyze <sepolicy file> attribute haldomain"
Bug: 34180936
Change-Id: Ice599ea4971cdfbd8b835b1fd02ad1e14c7a0386
2017-01-17 16:34:02 -08:00
Sandeep Patil
a058b569e4 service_context: split into platform and non-platform components.
Bug: 33746484
Test: Successfully boot with original service and property contexts.
      Successfully boot with split serivce and property contexts.

Change-Id: Ide67d37d85273c60b9e387e72fbeb87be6da306a
Signed-off-by: Sandeep Patil <sspatil@google.com>
2017-01-18 00:33:09 +00:00
Myles Watson
1e588b02bc Allow the Bluetooth HAL to log firmware versions
Give the default implementation access to /data/misc/blue* for
backward compatibility.

Future Bluetooth HAL implementations should use the system log.

Test: VTS tests pass, Bluetooth starts/stops
Change-Id: Ia67896b46e3e9ce3421bbb0c8a8542f290b39083
2017-01-17 15:15:07 -08:00
Alex Klyubin
bda2e5c7a2 Group all HAL impls using haldomain attribute am: f41d89eb24
am: 06d1780590

Change-Id: I29d2820e5be5f212b16c71df97a0ad58a03eb448
2017-01-17 21:03:00 +00:00
Alex Klyubin
06d1780590 Group all HAL impls using haldomain attribute
am: f41d89eb24

Change-Id: I8f32e2e80fc7bfc08ce9fe3655968a8d7dfc94e8
2017-01-17 21:01:00 +00:00
Alex Klyubin
f41d89eb24 Group all HAL impls using haldomain attribute
This marks all HAL domain implementations with the haldomain attribute
so that rules can be written which apply to all HAL implementations.

This follows the pattern used for appdomain, netdomain and
bluetoothdomain.

Test: No change to policy according to sesearch.
Bug: 34180936
Change-Id: I0cfe599b0d49feed36538503c226dfce41eb65f6
2017-01-17 11:20:49 -08:00
Mikhail Naganov
49f86ce83b hal_audio: In binderized mode hal_audio needs access to IAllocator am: ddb52d823f
am: af57c85e43

Change-Id: I171f0ef3e6f1f8d70de8ba5aeb8d82e7ca300636
2017-01-17 19:07:22 +00:00
Mikhail Naganov
af57c85e43 hal_audio: In binderized mode hal_audio needs access to IAllocator
am: ddb52d823f

Change-Id: I724ff53a9709d53c02091838166092b5264eb23e
2017-01-17 19:05:20 +00:00
Mikhail Naganov
ddb52d823f hal_audio: In binderized mode hal_audio needs access to IAllocator
This is to ensure that hal_audio can access memory shared by
audioserver.

Bug: 34261005
Change-Id: I84103b0d4692fd10afc56846fb116fec6a7b3dc7
2017-01-17 09:24:56 -08:00
Jim Miller
d535e9c848 Merge "New SeLinux policy for fingerprint HIDL" am: 597a8a4913
am: 55c46c7cc3

Change-Id: Ic6b3209dac49e9f149bf34f18d10a9081c6a0d7c
2017-01-14 03:54:55 +00:00
Jim Miller
55c46c7cc3 Merge "New SeLinux policy for fingerprint HIDL"
am: 597a8a4913

Change-Id: I1a055e9dea9317b719ba6bb467679f2e51818755
2017-01-14 03:52:26 +00:00
Treehugger Robot
597a8a4913 Merge "New SeLinux policy for fingerprint HIDL" 2017-01-14 03:50:05 +00:00
Sandeep Patil
8a1112dea1 Merge "hal_health: move system_file permissions to public/hal_health" am: 14658c93e7
am: a76de20142

Change-Id: Ia051957fe6a115e96161270f304c915b8d7b6b67
2017-01-14 00:32:29 +00:00
Sandeep Patil
a76de20142 Merge "hal_health: move system_file permissions to public/hal_health"
am: 14658c93e7

Change-Id: I8a5ac00a41c1b66c8339b9a79d48c87af00800eb
2017-01-14 00:30:02 +00:00
Treehugger Robot
14658c93e7 Merge "hal_health: move system_file permissions to public/hal_health" 2017-01-14 00:24:55 +00:00
Jim Miller
54e0e5af8f New SeLinux policy for fingerprint HIDL
Move from fingerprintd to new fingerprint_hal and update SeLinux policy.

Test: Boot with no errors related to fingerprint sepolicy
Bug: 33199080
Change-Id: Idfde0cb0530e75e705033042f64f3040f6df22d6
2017-01-13 13:28:31 -08:00
Hridya Valsaraju
e64bb0e8be add selinux policy for GNSS hal am: 953c439643
am: 67c5cdfdbf

Change-Id: Ie9f8de8bac96b5b8088f58ac54c3e76dd90c40ee
2017-01-13 21:02:01 +00:00