Commit graph

13203 commits

Author SHA1 Message Date
Tom Cherry
e5e5e0416b Merge "Use property_info_checker instead of checkfc and fc_sort for properties"
am: 060586362b

Change-Id: I0b9c704a863a9378937c1f06d844dec12ee31cba
2018-01-06 18:02:01 +00:00
Tom Cherry
060586362b Merge "Use property_info_checker instead of checkfc and fc_sort for properties" 2018-01-05 20:32:23 +00:00
Etan Cohen
10d3c77f05 [RTT] Update Wi-Fi RTT service name
am: a8d9191fb7

Change-Id: I134a0d70c1075dee70991daa915a516bc21dab24
2018-01-05 17:50:34 +00:00
Etan Cohen
a8d9191fb7 [RTT] Update Wi-Fi RTT service name
Finalize Wi-Fi RTT service name per API review.

Note: CL 1 of 2 - adding new entry here, will remove
old entry in next CL.

Bug: 65108607
Test: integration tests
Change-Id: I065ce9d570510180fa8c8f09e1025ac795706405
2018-01-05 15:56:58 +00:00
Chen Xu
38fb5d4802 Merge "Setting up SELinux policy for carrier id"
am: fd9f7de71e

Change-Id: I1450316521d217109a84027cf4f760c90cf4812d
2018-01-04 22:06:52 +00:00
Chen Xu
fd9f7de71e Merge "Setting up SELinux policy for carrier id" 2018-01-04 21:56:13 +00:00
Joel Galenson
f810a0269e Merge "Revert "Update neverallow exception.""
am: 70c21a6205

Change-Id: I4acdfc65e2fdbefd0bdd2d9442ea087fc7d173b8
2018-01-04 21:18:29 +00:00
Joel Galenson
70c21a6205 Merge "Revert "Update neverallow exception."" 2018-01-04 21:11:00 +00:00
Joel Galenson
9db566f0c5 Revert "Update neverallow exception."
This reverts commit b40eb255a7.

Change-Id: I04d9e76152ed11ada4cabcc79bb4eec827f8abef
2018-01-04 21:03:05 +00:00
Joel Galenson
9519f1b9d3 Merge "Update neverallow exception."
am: 2de29263c4

Change-Id: Iae8918d997d10f9a3a1b61fcffb9ed4e8a217368
2018-01-04 20:08:33 +00:00
Treehugger Robot
2de29263c4 Merge "Update neverallow exception." 2018-01-04 20:03:09 +00:00
fionaxu
2cb8729614 Setting up SELinux policy for carrier id
Bug: 64131637
Test: Manual
Change-Id: I0170c5eb465aa663582e3974348380a8f0c9b27f
2018-01-04 19:15:45 +00:00
Tom Cherry
f68b4c67d7 Use property_info_checker instead of checkfc and fc_sort for properties
1) fc_sort is not needed as there is no reason to sort system
   properties, so this is removed and replaced with a simply copy
2) Use the new property_info_checker instead of checkfc for
   validating property information.  This supports exact match
   properties and will be extended to verify property schemas in the
   future.

Bug: 36001741
Test: verify bullhead's property contexts correct
Test: verify faulty property contexts result in failures
Change-Id: Id9bbf401f385206e6907449a510e3111424ce59e
2018-01-04 09:49:39 -08:00
Joel Galenson
b40eb255a7 Update neverallow exception.
After offline discussions, we decided that this was the proper
exception to the neverallow rule.

Test: Built policy.

Change-Id: Ic1603bfdd803151ccfb79f90195b83b616acc873
2018-01-04 09:36:58 -08:00
Jeff Tinker
f5468cd454 Merge "Allow default drm hal to access allocator hal"
am: 0eb0a7bb5b

Change-Id: I90b10b2ccaff3872675ef4dc24482a759fe4280c
2018-01-04 04:18:47 +00:00
Treehugger Robot
0eb0a7bb5b Merge "Allow default drm hal to access allocator hal" 2018-01-04 04:12:19 +00:00
Jeff Tinker
e1a7190f51 Allow default drm hal to access allocator hal
This fixes failing vts drm tests

bug:67675811

Test:vts-tradefed run commandAndExit vts -m VtsHalDrmV1_0Target
Change-Id: I2f7e1c97e8c70fc312ca3c2c901f0a9607b05e83
2018-01-03 23:44:05 +00:00
Shawn Willden
2ea1f6fda5 Merge "Add file context for keymaster 4.0 service."
am: 4dd97a0bb8

Change-Id: Ic44a73a977a05b5cbb886abc5576b045020655df
2018-01-03 21:18:20 +00:00
Treehugger Robot
4dd97a0bb8 Merge "Add file context for keymaster 4.0 service." 2018-01-03 21:08:58 +00:00
Jeff Vander Stoep
7fb132ff88 Merge "Fix permission typo"
am: 41b8271f22

Change-Id: I14694f97a0af2e642db1b69c3ea8776dc7b3d7c9
2018-01-03 19:59:58 +00:00
Treehugger Robot
41b8271f22 Merge "Fix permission typo" 2018-01-03 19:43:32 +00:00
Shawn Willden
219c66c1f0 Add file context for keymaster 4.0 service.
Test: Boot the device
Change-Id: Ia468941e78803edebe311c73f424a41ac1faeaee
2018-01-03 10:56:06 -07:00
Jeff Vander Stoep
42d82b42ff Fix permission typo
zygote->webview_zygote.

Forgot to ammend local change.

Test: webview_zygote denials are gone.
Change-Id: I02869812feafd127b39e567c28e7278133770e97
2018-01-03 08:46:05 -08:00
Jeff Vander Stoep
6df91b7217 Merge "init: allow read of /sys/devices/virtual/block/zram"
am: 05916fca32

Change-Id: I84abff9bd2e80f452eaeb4a65f81ac25b6e7df21
2018-01-03 02:38:11 +00:00
Treehugger Robot
05916fca32 Merge "init: allow read of /sys/devices/virtual/block/zram" 2018-01-03 02:34:30 +00:00
Jeff Vander Stoep
8fdecd8d30 Merge "webview_zygote: allow listing dirs in /system"
am: db68967551

Change-Id: I0a21e2381ecc46d67fac8b7f3f20d8598fbcc6bb
2018-01-03 00:39:59 +00:00
Treehugger Robot
db68967551 Merge "webview_zygote: allow listing dirs in /system" 2018-01-03 00:33:37 +00:00
Jeff Vander Stoep
99c65df3ed init: allow read of /sys/devices/virtual/block/zram
Commit erroneously 55039509 removed init's read access to
/sys/devices/virtual/block/zram*. Restore access.

Test: cat /proc/meminfo
    ...
    SwapTotal:        524284 kB
    SwapFree:         524284 kB
    ...
Bug: 71510938

Change-Id: I20268168caa541a7dafa1e32339641095e1e524b
2018-01-03 00:26:57 +00:00
Chenbo Feng
b243094e85 sepolicy: Allow system server to r/w the bpf maps
am: 756dd574d5

Change-Id: I747966d12d4f92b010a835f16c7309761ea4f16b
2018-01-02 22:01:44 +00:00
Chenbo Feng
7daa05f138 sepolicy: New sepolicy classes and rules about bpf object
am: 08f92f9c01

Change-Id: Ibf75df4bfde087c80b9135819edf319673103eb5
2018-01-02 22:01:37 +00:00
Chenbo Feng
956e099ec6 sepolicy: Allow mount cgroupv2 and bpf fs
am: 254ad0da3a

Change-Id: I2cb5fe79f04ca72896ff313db44bd6778368053f
2018-01-02 22:01:31 +00:00
Jeff Vander Stoep
3588ddd06d webview_zygote: allow listing dirs in /system
For consistency with zygote, allow webview_zygote to list directories
in /system.

Test: Boot Taimen. Verify webiew_zygote denials during boot.
Bug: 70857705
Change-Id: I27eb18c377a5240d7430abf301c1c3af61704d59
2018-01-02 13:15:16 -08:00
Chenbo Feng
756dd574d5 sepolicy: Allow system server to r/w the bpf maps
The system server is responsible for providing the network traffic
stats to Apps and services. Allow it to directly reading the eBPF maps
that stored these information can make the process of getting traffic
stats simplier.

Test: No selinux rule violation of system server reading netd bpf object
Bug: 30950746
Change-Id: I6d9438d1ed7c9bab45a708f5d2a85eb22f5e8170
2018-01-02 11:52:33 -08:00
Chenbo Feng
08f92f9c01 sepolicy: New sepolicy classes and rules about bpf object
Add the new classes for eBPF map and program to limit the access to eBPF
object. Add corresponding rules to allow netd module initialize bpf
programs and maps, use the program and read/wirte to eBPF maps.

Test: no bpf sepolicy violations when device boot
Change-Id: I63c35cd60f1972d4fb36ef2408da8d5f2246f7fd
2018-01-02 11:52:33 -08:00
Chenbo Feng
254ad0da3a sepolicy: Allow mount cgroupv2 and bpf fs
Some necessary sepolicy rule changes for init process to create directory,
mount cgroupv2 module and mount bpf filesystem. Also allow netd to create
and pin bpf object as files and read it back from file under the
directory where bpf filesystem is mounted.

Test: bpf maps show up under /sys/fs/bpf/
Change-Id: I579d04f60d7e20bd800d970cd28cd39fda9d20a0
2018-01-02 11:52:33 -08:00
Ricky Wai
56a9edb19e Add Network Watchlist data file selinux policy(Used in ConfigUpdater)
am: ff3b957e63

Change-Id: I7889127ebe538d2aaf0db9b887c991e3976e842a
2018-01-02 18:22:13 +00:00
Ricky Wai
ff3b957e63 Add Network Watchlist data file selinux policy(Used in ConfigUpdater)
Bug: 63908748
Test: Able to boot
Change-Id: I14d8856d7aac7be9d1f26ecf5bfff69ea5ee9607
2018-01-02 18:16:46 +00:00
Andreas Gampe
d695693d86 Merge "Sepolicy: Introduce perfprofd binder service"
am: 2f39276e3f

Change-Id: If8e02a3397a2f345940960d6c408d75f9cd14d89
2018-01-02 15:59:27 +00:00
Treehugger Robot
2f39276e3f Merge "Sepolicy: Introduce perfprofd binder service" 2018-01-02 15:55:29 +00:00
Tri Vo
b6f04b57bf Merge "system_server: search permission to all of sysfs."
am: 8d07a8d595

Change-Id: Ic3ff38e6a2c29ff1ee829bf759d9b3bc406bb64a
2017-12-30 04:59:09 +00:00
Treehugger Robot
8d07a8d595 Merge "system_server: search permission to all of sysfs." 2017-12-30 04:56:53 +00:00
Andreas Gampe
aa9711f82b Sepolicy: Introduce perfprofd binder service
Add policy for the perfprofd binder service.

For now, only allow su to talk to it.

Test: m
Change-Id: I690f75460bf513cb326314cce633fa25453515d6
2017-12-28 17:31:21 -08:00
Steven Moreland
f3bf89c682 Merge "Remove sys/class/leds permissions from dumpstate."
am: 0b6856f59b

Change-Id: I7a46caf78de021df995c974e607629d69536b025
2017-12-22 21:52:13 +00:00
Treehugger Robot
0b6856f59b Merge "Remove sys/class/leds permissions from dumpstate." 2017-12-22 21:47:01 +00:00
Steven Moreland
a00b74196e Remove sys/class/leds permissions from dumpstate.
These are device specific.

Bug: 70846424
Test: bugreport
Change-Id: Ic22c972f1b09988a8eccf0823dd0d87fc0c0a1f7
2017-12-22 21:46:34 +00:00
Tri Vo
ce8bc8b00e system_server: search permission to all of sysfs.
This will allow system_server to perfom path resolution on paths like:
/sys/devices/soc/800f000.qcom,spmi/spmi-0/spmi0-00/800f000.qcom,spmi:qcom,pm8998@0:qcom,pm8998_rtc/rtc

Fixes this denial:
avc: denied { search } for pid=947 comm=system_server
name=800f000.qcom,spmi dev=sysfs ino=19891
scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
tclass=dir permissive=0 b/68003344

Bug: 68003344
Test: walleye boots without the denial above.
Change-Id: Ib282395124c7f2f554681fcc713b9afe189f441c
2017-12-21 22:35:27 +00:00
Joel Galenson
ea3942f0a7 Merge "Disallow most coredomains from accessing vendor_files on Treble."
am: 6168a12ea9

Change-Id: Ie83d270b7fb1659d890e5dd9356ee69a0b6f6ea5
2017-12-21 19:03:24 +00:00
Treehugger Robot
6168a12ea9 Merge "Disallow most coredomains from accessing vendor_files on Treble." 2017-12-21 17:07:20 +00:00
Tri Vo
ef3865076b system_server: remove access to /sys/class/leds.
am: 89a7b21541

Change-Id: Icdd87b3f76ebcbd5d05ad17f00368ef50fa1603d
2017-12-20 21:22:10 +00:00
Tri Vo
89a7b21541 system_server: remove access to /sys/class/leds.
Removing legacy rules. system_server now depends on Lights HAL (which
has its own domain) instead of /sys/class/leds.

Bug: 70846424
Test: sailfish boots; screen, flashlight work fine.

Change-Id: I6f116a599cab26ae71e45f462b33328bc8d43db5
2017-12-20 18:51:26 +00:00