Commit graph

24410 commits

Author SHA1 Message Date
Inseob Kim
acd02fc5e4 Rename exported3_radio_prop to radio_control_prop
The context name exported3_radio_prop is ambiguous and does not reflect
the usage and role of the properties. This changes its name to
radio_control_prop.

Some downstream branches are still using exported3_radio_prop, so
get_prop(domain, radio_control_prop) is added to avoid regression. It's
just a workaround and to be removed soon, after all exported3_radio_prop
are cleaned up.

Bug: 162214733
Test: boot a device with a sim and see basic functions work
Change-Id: If5fe3be7c64b36435c4ad0dc9a8089077295d502
Merged-In: If5fe3be7c64b36435c4ad0dc9a8089077295d502
2020-08-03 09:23:02 +00:00
Inseob Kim
c87c63bd3c Rename exported3_radio_prop to radio_control_prop
The context name exported3_radio_prop is ambiguous and does not reflect
the usage and role of the properties. This changes its name to
radio_control_prop.

Some downstream branches are still using exported3_radio_prop, so
get_prop(domain, radio_control_prop) is added to avoid regression. It's
just a workaround and to be removed soon, after all exported3_radio_prop
are cleaned up.

Exempt-From-Owner-Approval: cherry pick

Bug: 162214733
Test: boot a device with a sim and see basic functions work
Change-Id: If5fe3be7c64b36435c4ad0dc9a8089077295d502
Merged-In: If5fe3be7c64b36435c4ad0dc9a8089077295d502
2020-08-03 09:21:12 +00:00
Yifan Hong
42351f9aab Add update_engine_stable_service
This is the stable AIDL binder interface that update_engine exposes in
addition to update_engine_service.

Test: run update_engine
Bug: 160996544

Change-Id: I28ba11810844373d48c8c203f79e98150f932942
2020-07-31 15:49:10 -07:00
Treehugger Robot
761abc1bd1 Merge "Allow dumpstate to getattr apex_info_file:file" am: 2da4fe7673
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1384258

Change-Id: I3e396777c86883d5dd3f1cb6eeffb79bb8973c5b
2020-07-31 22:07:09 +00:00
Treehugger Robot
cbf78919bc Merge "Allow dumpstate to dump hal_light" am: 9892a59ca6
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1384257

Change-Id: I0ebfac08c2e8a64c7c8578b1c8893c402dbadbc0
2020-07-31 22:06:55 +00:00
Treehugger Robot
2da4fe7673 Merge "Allow dumpstate to getattr apex_info_file:file" 2020-07-31 21:46:01 +00:00
Treehugger Robot
9892a59ca6 Merge "Allow dumpstate to dump hal_light" 2020-07-31 21:44:39 +00:00
Danning Chen
134ac19776 Add sepolicy for people service
This is to allow people service to publish a binder service that expose
system private APIs to retrive and manage the recent cached
conversations.

Test: build and run on a test device
Bug: 162593584
Change-Id: I31b5d8bc851ea7225e215b3f86ed6d47b32b1ba4
2020-07-31 14:37:47 -07:00
Jeff Sharkey
bf4ffe38ca Update language to comply with Android's inclusive language guidance am: a0e7a6da28
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1382607

Change-Id: I334e3430d48521b0124f76e87c781e752fc84fac
2020-07-31 20:47:44 +00:00
Roman Kiryanov
b76d0b3060 Allow dumpstate to getattr apex_info_file:file
required by the CTS test.

Bug: 162594434
Test: atest android.security.cts.SELinuxHostTest#testNoBugreportDenials
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: Ic9962415d740e300ceb418b3265c24433a9e4f4c
2020-07-31 13:39:11 -07:00
Roman Kiryanov
83b88d5d61 Allow dumpstate to dump hal_light
Bug: 162594434
Test: atest android.security.cts.SELinuxHostTest#testNoBugreportDenials
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: I440b5627abe0127324679fcb54bc52a68c44bea4
2020-07-31 13:37:59 -07:00
Jeff Sharkey
a0e7a6da28 Update language to comply with Android's inclusive language guidance
See https://source.android.com/setup/contribute/respectful-code for reference

Bug: 161896447
Change-Id: I0caf39b349c48e44123775d98c52a773b0b504ff
2020-07-31 12:28:11 -06:00
Yiming Jing
2fd322f630 Allow dumpstate to dump auto hal servers
audiocontrol_hal, vehicle_hal and evs_hal were added to dump_util.cpp in
b/148098383. But the coresponding dumpstate.te is not updated to relfect
the changes, causing denials when dumpstate attempts to dump auto hal servers.

This CL updates dumpstate.te to allow dumpstate to access auto hal servers.

Bug: 162537916
Test: sesearch -A -s dumpstate -t hal_audiocontrol_server -p signal sepolicy
Test: sesearch -A -s dumpstate -t hal_vehicle_server -p signal sepolicy
Test: sesearch -A -s dumpstate -t hal_evs_server -p signal sepolicy
Change-Id: If6d6e4d9c547da17817f2668dc4f2a093bddd632
2020-07-31 10:19:22 -07:00
Wei Wang
ce416b091f label cpuhp trace points am: bbc3cc33fc
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1382161

Change-Id: I6dd59553a3ed5e4a086ba1bd72241fdebb9d47c1
2020-07-31 17:10:33 +00:00
Wei Wang
bbc3cc33fc label cpuhp trace points
Bug: 162568440
Test: Build
Change-Id: Id8ed398b3fffd678fff253289674f8e2b9e906c1
2020-07-31 01:20:57 -07:00
Treehugger Robot
8baad7c258 Merge "Allow vendor_init to set service.adb.tcp.port" am: a9e195943c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1373470

Change-Id: I4e31a8294638827593e72d8ae8e7e7b24aa28146
2020-07-31 05:12:09 +00:00
Treehugger Robot
a9e195943c Merge "Allow vendor_init to set service.adb.tcp.port" 2020-07-31 04:54:38 +00:00
Jooyung Han
86f2284fcd Allow linkerconfig to read apex-info-file.xml
Linkerconfig reads apex-info-list.xml to distinguish vendor apexes.

Bug: 159576928
Test: build & device boots
Change-Id: I1b791f9c03bbdfa5258eea5e7cb0896168beb114
2020-07-30 01:11:15 +09:00
Tom Cherry
4ef25fb05c Merge "Allow logd to set logd_prop" am: c0dd641a80
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1374937

Change-Id: Ifbddd4e6ed0cc640558a5c3a08fb7f2513ffb1d1
2020-07-29 14:55:24 +00:00
Tom Cherry
c0dd641a80 Merge "Allow logd to set logd_prop" 2020-07-29 14:38:57 +00:00
Nathalie Le Clair
6b18f04516 Merge "Add ro.hdmi.cec.source.send_standby_on_sleep" am: 5a1b882e56
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1372285

Change-Id: I2baf12f18e2165b85da847d5fab18fb140261107
2020-07-29 08:27:42 +00:00
Nathalie Le Clair
5a1b882e56 Merge "Add ro.hdmi.cec.source.send_standby_on_sleep" 2020-07-29 08:10:04 +00:00
Tianjie
2a3c6ba01c Add secontext for ro.product.ab_ota_partitions
Bug: 162148770
Test: build
Change-Id: Iff509cb573462718b876db02f88a3d4a21667267
2020-07-28 22:54:20 -07:00
Tom Cherry
9949bba70a Allow logd to set logd_prop
Test: logd sets ro.logd.kernel successfully
Change-Id: Ia0afd81627f344f525ac1e26028181f41084485d
2020-07-28 11:26:01 -07:00
Joel Galenson
1174c34e1b Update sepolicy to use inclusive language am: b0d74a1f5b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1372674

Change-Id: Id079490a6623dcd85ef4ee6787e0e6093ea96ec2
2020-07-28 14:10:12 +00:00
Nathalie Le Clair
8f443b82c8 Add ro.hdmi.cec.source.send_standby_on_sleep
Bug: 161205654
Test: manually tested that system property takes effect.

Change-Id: I0e6eb8048f05de91d96680ff1a64ce142a2f5c94
2020-07-28 09:17:36 +02:00
Hongguang Chen
67c3688497 Allow vendor_init to set service.adb.tcp.port
adbd and apps (SystemUI and CTS test apps) need to read it.

BUG: 162205386
Test: Connect to device which sets service.adb.tcp.port in vendor
      partition through TCP adb.

Change-Id: Ia37dd0dd3239381feb2a4484179a0c7847166b29
2020-07-28 02:13:03 +00:00
Joel Galenson
b0d74a1f5b Update sepolicy to use inclusive language
See https://source.android.com/setup/contribute/respectful-code for reference

#inclusivefixit

Bug: 161896447
Test: Build
Change-Id: If612f2270c8ba1d7fc2cbda3b2e8ca3818c0a1be
2020-07-27 16:52:04 +00:00
Inseob Kim
7c36875dc6 Merge "Remove exported2_default_prop" am: c66c822416
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1371982

Change-Id: I387a782e0d6c9a4ad0fe382458d2ecec3033a2b9
2020-07-27 06:23:07 +00:00
Inseob Kim
c66c822416 Merge "Remove exported2_default_prop" 2020-07-27 06:02:50 +00:00
Wei Wang
8b373e41bf Allow init.svc.bugreportd to be vendor readable am: 998bc373d5
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1372670

Change-Id: Iddc4928e2a43b3c89197283d189f1a23e642bee6
2020-07-27 05:37:41 +00:00
Wei Wang
998bc373d5 Allow init.svc.bugreportd to be vendor readable
Export the new bugreport entry which was added in b/111441001, similarly
to previously exported properties.

Bug: 161999587
Test: m selinux_policy
Change-Id: I139567ba028e90d3e07df94f57ccf7d5d5225209
2020-07-26 22:20:12 -07:00
chrisweir
7063650dbb Enable CAN HAL Configuration Service
Enable the CAN HAL configuration service to start on boot.

Bug: 142653776
Test: Manual
Change-Id: If4180ab729cf92be05ab817ae1fb27d3151d32f9
2020-07-24 14:43:31 -07:00
Inseob Kim
40c67b20f6 Remove exported2_default_prop
This cleans up remaining exported2_default_prop. Three properties are
changed.

- ro.arch
It becomes build_prop.

- hal.instrumentation.enable
It becomes hal_instrumentation_prop.

- ro.property_service.version
It becomes property_service_version_prop.

Bug: 155844385
Test: selinux denial test on Pixel devices
Change-Id: I7ee0bd8c522cc09ee82ef89e6a13bbbf65291291
2020-07-25 01:06:13 +09:00
Inseob Kim
48923aae2c Merge "Move ro.boot related properties to bootloader_prop" am: bd13f1fefc
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1371979

Change-Id: Ic44b4b3351a23713dcc27d221948b70ad7422896
2020-07-24 15:15:01 +00:00
Inseob Kim
bd13f1fefc Merge "Move ro.boot related properties to bootloader_prop" 2020-07-24 14:54:18 +00:00
Inseob Kim
68d6146fc5 Move ro.boot related properties to bootloader_prop
These 5 properties are all set by property_service, and their values are
same as ro.boot.X.

Bug: 155844385
Test: m selinux_policy
Change-Id: I98fdee73684dc670f61ecef83d6a749b4f24ff54
Merged-In: I98fdee73684dc670f61ecef83d6a749b4f24ff54
2020-07-24 12:58:52 +00:00
Treehugger Robot
b363a5b9be Merge "Add dependencies on M4" am: 3f2236042a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1372179

Change-Id: Ia802a30ff7f7740052dc8068430c7eac71109665
2020-07-24 09:39:28 +00:00
Treehugger Robot
3f2236042a Merge "Add dependencies on M4" 2020-07-24 09:19:38 +00:00
Inseob Kim
bc083a97e0 Add bootloader_prop for ro.boot. properties am: 8c34247c7f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1371777

Change-Id: I409bd459f5126a35fa2b081441449a13d4c2e784
2020-07-24 02:11:37 +00:00
Dan Willemsen
081b164ad2 Add dependencies on M4
Most of the users already added dependencies when it was used, but a
couple didn't. These broken when I converted $(M4) into a built
artifact, as the artifact wasn't created before use.

Test: treehugger
Change-Id: Ic5c18131de84747e8b96413f61993fa777cb9d2c
2020-07-23 18:00:47 -07:00
Inseob Kim
8c34247c7f Add bootloader_prop for ro.boot. properties
ro.boot. properties assigned as "exported2_default_prop" are now
"bootloader_prop", to remove bad context name "exported2_default_prop".

Two things to clarify:

1) We have both the prefix entry and the exact entries. Although the
exact entries may be redundant, we may want to keep them. Vendors are
still allowed to have properties starting with "ro.boot." on
vendor_property_contexts file. The exact entries can prevent vendors
from modifying them to random contexts.

2) ro.boot. is special as it is originally for kernel command line
"androidboot.". But some ro.boot. properties are being used as if they
were normal. To avoid regression, ro.boot. properties having contexts
other than "exported2_default_prop" are not changed here. They will be
tracked later.

Bug: 155844385
Test: m selinux_policy
Change-Id: Ic0f4117ae68a828787304187457b5e1e105a52c7
Merged-In: Ic0f4117ae68a828787304187457b5e1e105a52c7
2020-07-24 00:15:23 +00:00
Alan Stokes
76ce93334a Merge "Make cross-user apps mlstrustedsubject." am: bd397a14b4
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1232917

Change-Id: Ifd9cc8bb945e2d95c5273a8b73078fa7510cfb88
2020-07-23 08:53:40 +00:00
Alan Stokes
bd397a14b4 Merge "Make cross-user apps mlstrustedsubject." 2020-07-23 08:35:43 +00:00
Inseob Kim
050327979a Allow init.svc.statsd to be world readable am: 79bd33a8d5
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1371776

Change-Id: I9512063fb52efacd69edd2c3c562afc124e7aaa6
2020-07-23 05:08:19 +00:00
Inseob Kim
79bd33a8d5 Allow init.svc.statsd to be world readable
Instead of having hacky entry "init.svc." in vendor's sepolicy, this
adds init.svc.statsd explicitly which should be readable by CTS.

Bug: 161922998
Test: m selinux_policy
Change-Id: I3fd3bab40d2ccf2581bd7ab55894a693cdf446b2
Merged-In: I3fd3bab40d2ccf2581bd7ab55894a693cdf446b2
(cherry picked from commit 116190b004)
2020-07-23 12:37:33 +09:00
Inseob Kim
2d891f8135 Fix init.svc. property contexts entry am: 387fb44648
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1369980

Change-Id: I17e2d1c98701b40a26cb448e29ae294e53279593
2020-07-22 17:16:45 +00:00
Alan Stokes
81e4e877f3 Make cross-user apps mlstrustedsubject.
We have various apps which inherently work across all users,
configured in seapp_contexts with levelFrom=None (usually implicitly).

This change marks those apps, where they have private data files, as
mlstrustedsubject, to allow us to increase restrictions on cross-user
access without breaking them.

Currently these apps are granted full access to [priv_]app__data_file
via TE rules, but are blocked from calling open (etc) by mls rules
(they don't have a matching level).

This CL changes things round so they are granted access by mls, but
blocked from calling open by TE rules; the overall effect is thus the
same - they do not have access.

A neverallow rule is added to ensure this remains true.

Note that there are various vendor apps which are appdomain,
levelFrom=None; they will also need modified policy.

Test: builds, boots, no new denials.
Bug: 141677108

Change-Id: Ic14f24ec6e8cbfda7a775adf0c350b406d3a197e
2020-07-22 14:41:31 +01:00
Inseob Kim
387fb44648 Fix init.svc. property contexts entry
It should be prefix, not exact

Bug: N/A
Test: see selinux contexts of init.svc. properties
Change-Id: I3fd71c80f752773b784ddb1d7bfa9ab1854d281f
2020-07-22 19:14:56 +09:00
Inseob Kim
bc4b9cbd9a Remove exported3_default_prop am: 162b259fed
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1368156

Change-Id: Ib37615cfb03e91a4c78cd90b1081e632fd1e1abd
2020-07-21 07:38:59 +00:00