Commit graph

4056 commits

Author SHA1 Message Date
Jim Blackler
e2d75a50f0 lmkd: grant access to /proc/lowmemorykiller am: 3cfad10c04
am: f560f0b63f

Change-Id: I3fe640306bfd57bdd57618ae260997115bfffb8d
2019-04-30 03:28:29 -07:00
Paul Crowley
744a2c5ce8 Add /data/vendor_ce/0/facedata alongside its vendor_de relation
am: 1739bceaab

Change-Id: Id64f3dbe6272ad89e317895b0ee3fb6899002093
2019-04-29 22:28:44 -07:00
Jim Blackler
3cfad10c04 lmkd: grant access to /proc/lowmemorykiller
lmkd needs to read /proc/lowmemorykiller to send statslog events in response to
applications being killed.

Bug: 130017100
Change-Id: I929d5a372e1b2f63b7b5ed421f1898ebddaec01c
2019-04-29 10:49:58 +00:00
Paul Crowley
1739bceaab Add /data/vendor_ce/0/facedata alongside its vendor_de relation
Bug: 131084614
Test: Modify vold_prepare_subdirs to match and test on Crosshatch.
Change-Id: Id5402e6b5da3f1e5549f49f8273dd9f052c348d7
2019-04-25 19:26:32 +00:00
Luke Huang
91491ed107 Merge "Sepolicy for netutils_wrapper to use binder call" am: 75b25384bb
am: a35b8cc42b

Change-Id: Ic567cf288fc4f8362d6580204bc8fb69573a6bf4
2019-04-24 20:27:21 -07:00
Luke Huang
75b25384bb Merge "Sepolicy for netutils_wrapper to use binder call" 2019-04-25 03:09:30 +00:00
Jooyung Han
dd57671b44 Merge "Adding vendor_apex_file for /vendor/apex" am: 91c35aeab6
am: 37985b73c4

Change-Id: I9df7fa96c38686fb59d244de243fdf6fd01a7494
2019-04-24 16:57:07 -07:00
Jooyung Han
ea61d198f2 Adding vendor_apex_file for /vendor/apex
apexd needs to read /vendor/apex dir and files in it.

Bug: 131190070
Bug: 123378252
Test: 1. Add apex to /vendor/apex
      -> see if boot succeeds with new policy
      2. Add flattened apex to /vendor/apex
      -> see if only root files are labelled as vendor_apex_file

Change-Id: I37795ab6d659ac82639ba5e34d628fe1b5cdb350
2019-04-25 02:54:14 +09:00
TreeHugger Robot
5e967d8780 Merge "Allow zygote to scan static overlays on /oem" into qt-dev 2019-04-24 08:33:39 +00:00
Treehugger Robot
a3c532295b Merge "Remove obsolete denials tracking." 2019-04-24 06:30:23 +00:00
Tri Vo
0b0f1cf708 Merge "Treble-ize sepolicy for fwk HIDL services." into qt-dev 2019-04-23 22:10:50 +00:00
TreeHugger Robot
847149180c Merge "Move pf_key socket creation permission to netd" into qt-dev 2019-04-23 21:57:09 +00:00
Tri Vo
1079e6c4a5 Merge "Treble-ize sepolicy for fwk HIDL services." am: 6cf01b3ef2
am: 48c8f21b37

Change-Id: Iee8b7b999a4ca887361e2923136ac9cc9e8a06ca
2019-04-22 17:28:57 -07:00
Tri Vo
1bbbf810c9 Treble-ize sepolicy for fwk HIDL services.
Bug: 130734497
Test: m selinux_policy; system_server and statds still have permission
to export HIDL services.
Change-Id: I6e87b236bdbdd939fca51fb7255e97635118ed2d
Merged-In: I6e87b236bdbdd939fca51fb7255e97635118ed2d
(cherry picked from commit 1d34b8cc31)
2019-04-22 17:07:06 -07:00
Tri Vo
6cf01b3ef2 Merge "Treble-ize sepolicy for fwk HIDL services." 2019-04-23 00:05:06 +00:00
TreeHugger Robot
f33351bc98 Merge "Adding /debug_ramdisk mount point" into qt-dev 2019-04-22 19:53:20 +00:00
Tri Vo
1d34b8cc31 Treble-ize sepolicy for fwk HIDL services.
Bug: 130734497
Test: m selinux_policy; system_server and statds still have permission
to export HIDL services.
Change-Id: I6e87b236bdbdd939fca51fb7255e97635118ed2d
2019-04-22 12:47:53 -07:00
TreeHugger Robot
2c25a31b7a Merge "add mediaswcodec to watchdog and dumpstate" into qt-dev 2019-04-22 19:24:44 +00:00
Chong Zhang
45f5738b91 Merge "add mediaswcodec to watchdog and dumpstate" am: 40a71c6f7b
am: 851681366e

Change-Id: I6236774d935a59648ecb0c039df8c15e6991e9ed
2019-04-19 18:14:17 -07:00
Bowgo Tsai
3d2d1de35d Merge "Adding /debug_ramdisk mount point" am: 63f8d4feb7
am: f5d5e2a848

Change-Id: I797d7158dc509cf303bae13f1676b3053e26cd8e
2019-04-19 17:45:32 -07:00
Treehugger Robot
40a71c6f7b Merge "add mediaswcodec to watchdog and dumpstate" 2019-04-20 00:14:07 +00:00
Bowgo Tsai
1c48f44992 Adding /debug_ramdisk mount point
This change allows first-stage init to mount a tmpfs under
/debug_ramdisk to preserve files from the debug ramdisk, for
second-stage init to load sepolicy and property files.

This is to allow adb root on a USER build if the device is unlocked.

Bug: 126493225
Test: boot a device with debug ramdisk, checks related files are loaded
Change-Id: Iad3b84d9bdf5d8e789219126c88701bf969253ef
Merged-In: Iad3b84d9bdf5d8e789219126c88701bf969253ef
(cherry picked from commit 2e86fa0e81)
2019-04-20 08:00:18 +08:00
Treehugger Robot
63f8d4feb7 Merge "Adding /debug_ramdisk mount point" 2019-04-19 23:54:53 +00:00
Chong Zhang
785521e211 add mediaswcodec to watchdog and dumpstate
bug: 130887807
test: adb bugreport and check mediaswcodec stack is there
Change-Id: I4a37e4e06c4905f435e96d8b1497e3617e688478
(cherry-picked from https://android-review.googlesource.com/c/platform/system/sepolicy/+/947830)
2019-04-19 12:16:40 -07:00
Chong Zhang
ad3621a7b7 add mediaswcodec to watchdog and dumpstate
bug: 130887807
test: adb bugreport and check mediaswcodec stack is there
Change-Id: I4a37e4e06c4905f435e96d8b1497e3617e688478
2019-04-19 12:13:33 -07:00
Sudheer Shanka
bd9411d012 Remove obsolete denials tracking.
am: 5bce022dce

Change-Id: If1bd6e8a94eddd341eb864a2b43071a4abbb529e
2019-04-19 09:17:34 -07:00
Sudheer Shanka
5bce022dce Remove obsolete denials tracking.
Bug: 118185801
Test: manual
Change-Id: Ibc4590d6e7b825124035e8f51574afbe5ae4b750
2019-04-18 17:22:19 -07:00
Sudheer Shanka
5e0b83c4c6 Remove obsolete denials tracking.
Bug: 118185801
Test: manual
Change-Id: Ibc4590d6e7b825124035e8f51574afbe5ae4b750
2019-04-18 17:14:50 -07:00
Bowgo Tsai
2e86fa0e81 Adding /debug_ramdisk mount point
This change allows first-stage init to mount a tmpfs under
/debug_ramdisk to preserve files from the debug ramdisk, for
second-stage init to load sepolicy and property files.

This is to allow adb root on a USER build if the device is unlocked.

Bug: 126493225
Test: boot a device with debug ramdisk, checks related files are loaded
Change-Id: Iad3b84d9bdf5d8e789219126c88701bf969253ef
2019-04-18 23:59:54 +08:00
TreeHugger Robot
625ed86bc9 Merge "Allow system_server to schedule mediaswcodec" into qt-dev 2019-04-18 03:24:14 +00:00
Chong Zhang
e024c222f5 Merge "Allow system_server to schedule mediaswcodec" am: 6e4d217991
am: 24a7570815

Change-Id: Ia103b93ae69656c76eb7da7b309c842641ed7ed6
2019-04-17 14:47:25 -07:00
Ryan Mitchell
c354f10e51 Merge "Allow zygote to scan static overlays on /oem" am: 1054b44b81
am: 5338085676

Change-Id: Ief3ee638819d69d6badf759d005433f73689abc6
2019-04-17 14:44:48 -07:00
Chong Zhang
6fd8d82f31 Allow system_server to schedule mediaswcodec
bug: 130669553
Change-Id: I49d4ef473181d2270d90a9350c5e05b8b7db76bb
(cherry-picked from https://android-review.googlesource.com/c/platform/system/sepolicy/+/946836)
2019-04-17 20:51:51 +00:00
Treehugger Robot
6e4d217991 Merge "Allow system_server to schedule mediaswcodec" 2019-04-17 20:09:36 +00:00
Ryan Mitchell
d6d6225d98 Allow zygote to scan static overlays on /oem
During preloading resources, zygote scans the overlay directories of
supported partitions looking for android RROs to apply statically. Zygote
currently is allowed to read overlays in /oem/overlay, but zygote does
not have the search permission to be able to scan /oem.

Without this patch, this denial is logged:
04-04 14:57:40.136   876   876 I auditd  : type=1400 audit(0.0:9):
avc: denied { search } for comm="main" name="oem" dev="dm-3" ino=46
scontext=u:r:zygote:s0 tcontext=u:object_r:oemfs:s0 tclass=dir
permissive=0

Bug: 121033532
Test: booting without denials and stat oem succeeds
Change-Id: I661f3e0aff7ec3513870d08ddc122fc359b8f995
2019-04-17 19:29:08 +00:00
Treehugger Robot
1054b44b81 Merge "Allow zygote to scan static overlays on /oem" 2019-04-17 19:12:26 +00:00
Chong Zhang
042f844e54 Allow system_server to schedule mediaswcodec
bug: 130669553
Change-Id: I49d4ef473181d2270d90a9350c5e05b8b7db76bb
2019-04-17 09:51:51 -07:00
Ryan Mitchell
ef1a64e231 Allow zygote to scan static overlays on /oem
During preloading resources, zygote scans the overlay directories of
supported partitions looking for android RROs to apply statically. Zygote
currently is allowed to read overlays in /oem/overlay, but zygote does
not have the search permission to be able to scan /oem.

Without this patch, this denial is logged:
04-04 14:57:40.136   876   876 I auditd  : type=1400 audit(0.0:9):
avc: denied { search } for comm="main" name="oem" dev="dm-3" ino=46
scontext=u:r:zygote:s0 tcontext=u:object_r:oemfs:s0 tclass=dir
permissive=0

Bug: 121033532
Test: booting without denials and stat oem succeeds
Change-Id: I661f3e0aff7ec3513870d08ddc122fc359b8f995
2019-04-17 16:06:34 +00:00
Nick Kralevich
6b34e64ecb Remove isV2App
This selector is no longer used.

Bug: 123605817
Bug: 111314398
Test: compiles and boots

(cherry picked from commit 795add585c)

Change-Id: I673ce4b6898d58602e553e7cf194bb5eac8361e0
2019-04-17 00:10:26 -07:00
Nick Kralevich
819d644855 Remove isV2App am: 795add585c
am: 7c4351486a

Change-Id: Ib066e7229ac942dfd3466e411a23e55d8ac7b6e7
2019-04-16 23:24:40 -07:00
Nick Kralevich
795add585c Remove isV2App
This selector is no longer used.

Bug: 123605817
Bug: 111314398
Test: compiles and boots
Change-Id: I61bb6b9f17ba4534569bd4a1c0489023cdaf698d
2019-04-16 16:01:08 -07:00
TreeHugger Robot
f9085929fb Merge "Allow bootstrap bionic only to init, ueventd, and apexd" into qt-dev 2019-04-15 16:39:14 +00:00
Chenbo Feng
3bf0e82198 Move pf_key socket creation permission to netd
Allow netd to trigger the kernel synchronize rcu with open and close
pf_key socket. This action was previously done by system_server but now
it need to be done by netd instead because there might be race issue
when netd is operating on a map that is cleaned up by system server.

Bug: 126620214
Test: android.app.usage.cts.NetworkUsageStatsTest
      android.net.cts.TrafficStatsTest

Change-Id: Id5ca86aa4610e37a2752709ed9cfd4536ea3bfaf
Merged-In: Id5ca86aa4610e37a2752709ed9cfd4536ea3bfaf
(Cherry picked from commit 8a5539b5f0)
2019-04-12 23:41:35 +00:00
Chenbo Feng
d7c74f9f7f Merge "Move pf_key socket creation permission to netd" am: 3cba24a81a
am: e2954cb101

Change-Id: I17fbef0cb1d7688c2d27c7d9096239ff6d61bb32
2019-04-12 16:39:56 -07:00
Treehugger Robot
3cba24a81a Merge "Move pf_key socket creation permission to netd" 2019-04-12 22:35:52 +00:00
Tri Vo
c0b2e059f2 Merge "Deprecate /mnt/sdcard -> /storage/self/primary symlink." am: bf7ae04865
am: de8d7a0da4

Change-Id: I86207a187cea992a18e971b239861ee21c97ffb9
2019-04-12 09:45:14 -07:00
Treehugger Robot
bf7ae04865 Merge "Deprecate /mnt/sdcard -> /storage/self/primary symlink." 2019-04-12 16:18:57 +00:00
Torne (Richard Coles)
180b243c2e Allow webview_zygote to read the /data/user/0 symlink.
ART follows the /data/user/0 symlink while loading cache files, leading
to:

avc: denied { getattr } for comm="webview_zygote" path="/data/user/0"
dev="sda35" ino=1310726 scontext=u:r:webview_zygote:s0
tcontext=u:object_r:system_data_file:s0 tclass=lnk_file permissive=0

Allow this access, the same as app and app_zygote do.

Bug: 123246126
Test: DeviceBootTest.SELinuxUncheckedDenialBootTest
Change-Id: I90faa524e15a17b116a6087a779214f2c2142cc2
(cherry picked from commit d40f7fd9d5)
2019-04-12 11:35:43 -04:00
Torne (Richard Coles)
0de8d0086e Merge "Allow webview_zygote to read the /data/user/0 symlink." am: addc1c234c
am: b685b3e854

Change-Id: I069f5040f5f59454653850297cbea3181b8522b7
2019-04-12 06:19:29 -07:00
Jeff Vander Stoep
afd4f37b48 Merge "Revert "audit use of net.dns. property"" am: 0d86ec526d
am: 867d6732aa

Change-Id: Ifb777166dabb4269daa204ae448f03c7b2cd1bf8
2019-04-12 05:21:38 -07:00