Commit graph

11329 commits

Author SHA1 Message Date
Josh Gao
17885f148d crash_dump_fallback: allow dumpstate:fd use.
Bug: http://b/62297059
Test: mma
Change-Id: Ibcd93e5554a9c2dd75fbfb42294fbc9b96ebc8cc
2017-06-02 14:43:27 -07:00
Andrew Scull
39a81fd517 Merge "Add missing sepolicies for OemLock HAL." into oc-dev
am: 60e4fd9dfa

Change-Id: I1628907aeb743c3cb0938e7993237206523fdeb5
2017-06-01 22:22:03 +00:00
Andrew Scull
e8d4bec783 Merge "Add missing sepolicies for the Weaver HAL." into oc-dev
am: cd26745098

Change-Id: I20479829d542df345275c0c2b4512788a30fba4c
2017-06-01 22:21:48 +00:00
TreeHugger Robot
60e4fd9dfa Merge "Add missing sepolicies for OemLock HAL." into oc-dev 2017-06-01 22:05:18 +00:00
TreeHugger Robot
cd26745098 Merge "Add missing sepolicies for the Weaver HAL." into oc-dev 2017-06-01 22:05:15 +00:00
Neil Fuller
911e236ae4 resolve merge conflicts of e664e80a to oc-dev-plus-aosp
Test: I solemnly swear I tested this conflict resolution.
Change-Id: Icadf7c72ad173c134d3e95bb5b93c2b54b1b703e
2017-06-01 20:46:48 +01:00
Steve Muckle
06a4b61b7a Merge "allow modprobe to load signed kernel modules" into oc-dev
am: fc1d8d991e

Change-Id: Id41f7097fd0a48739293d4f8f06f296d0f189684
2017-06-01 19:24:47 +00:00
TreeHugger Robot
fc1d8d991e Merge "allow modprobe to load signed kernel modules" into oc-dev 2017-06-01 19:16:34 +00:00
Andrew Scull
7c4f46b5c1 Allow bootctl HAL to access misc block device.
am: b0d59450ae

Change-Id: If85613b84aecf43b0519bb933d925eb1829e3d5e
2017-06-01 18:39:31 +00:00
Neil Fuller
e664e80a5f Merge "Enable the TimeZoneManagerService" am: 34b4b73729
am: 2ff7562819

Change-Id: I66cf4111e4d17e698cea7c8dc44d3294ce20a4ac
2017-06-01 17:16:45 +00:00
Neil Fuller
2ff7562819 Merge "Enable the TimeZoneManagerService"
am: 34b4b73729

Change-Id: If25147ce3439abd0ab4a3abc1e330b373e43d9cb
2017-06-01 17:11:50 +00:00
Steve Muckle
53add31a25 allow modprobe to load signed kernel modules
Modprobe requires this permission or the following denial will
prevent loading of signed kernel modules:

audit: type=1400 audit(27331649.656:4): avc:  denied  { search } for
pid=448 comm="modprobe" scontext=u:r:modprobe:s0 tcontext=u:r:kernel:s0
tclass=key permissive=0

Bug: 62256697
Test: Verified signed module loading on sailfish.
Change-Id: Idde41d1ab58e760398190d6686665a252f1823bb
2017-06-01 10:06:21 -07:00
Treehugger Robot
34b4b73729 Merge "Enable the TimeZoneManagerService" 2017-06-01 17:02:37 +00:00
Neil Fuller
ca595e1163 Enable the TimeZoneManagerService
Add policy changes to enable a new service. The service
is currently switched off in config, but this change is
needed before it could be enabled.

Bug: 31008728
Test: make droid
Merged-In: I29c4509304978afb2187fe2e7f401144c6c3b4c6
Change-Id: I29c4509304978afb2187fe2e7f401144c6c3b4c6
2017-06-01 15:56:43 +00:00
Andrew Scull
b0d59450ae Allow bootctl HAL to access misc block device.
This is sometimes used for communication with the bootloader.

Bug: 62052545
Test: Build
Change-Id: I3ae37793407719e55ab0830129aa569c9018f7da
2017-05-31 16:00:28 +01:00
Andrew Scull
475954dad5 Add missing sepolicies for OemLock HAL.
Bug: 38232801
Test: Build

Change-Id: Iccc16430e7502bb317f95bb2a5e2f021d8239a00
2017-05-31 15:22:05 +01:00
Andrew Scull
a939c4324c Add missing sepolicies for the Weaver HAL.
Bug: 38233550
Test: Build
Change-Id: I7c2105d5f215a60a611110640afff25fc3403559
2017-05-31 15:17:11 +01:00
Narayan Kamath
bf7a5bd68b SEPolicy: Allow app / system_server to write to dumpstate pipes. am: a34781ae15 am: 32c7000e6e
am: b25e882338

Change-Id: I778011a48800ace4d865813b148efcdd88d166bb
2017-05-31 13:37:59 +00:00
Narayan Kamath
b25e882338 SEPolicy: Allow app / system_server to write to dumpstate pipes. am: a34781ae15
am: 32c7000e6e

Change-Id: I57d3af7a930f77be74feba88d9875c9b5b90ab7c
2017-05-31 13:33:28 +00:00
Narayan Kamath
32c7000e6e SEPolicy: Allow app / system_server to write to dumpstate pipes.
am: a34781ae15

Change-Id: Ic4103ff418e69f000198bb588f0cfccc578ba324
2017-05-31 13:28:57 +00:00
TreeHugger Robot
6d9f42f073 Merge "SEPolicy: Changes for new stack dumping scheme." into oc-dev-plus-aosp 2017-05-31 11:52:59 +00:00
Narayan Kamath
a34781ae15 SEPolicy: Allow app / system_server to write to dumpstate pipes.
tombstoned allows dumpstate to install "intercepts" to java trace
requests for a given process. When an "intercept" is installed, all
trace output is redirected to a pipe provided by dumpstate instead
of the default location (usually in /data/anr or /data/tombstone).

Note that these processes are already granted "write" and "getattr"
on dumpstate:fifo_file in order to communicate with dumpstate; this
change adds "append" to the existing set of permissions.

Bug: 32064548
Test: manual
Change-Id: Iccbd78c59071252fef318589f3e55ece51a3c64c
2017-05-31 11:45:39 +00:00
Narayan Kamath
a7d87b94d1 SEPolicy: Changes for new stack dumping scheme. am: e628cb5b2d am: 5e8fe8348b
am: 51a01817aa  -s ours

Change-Id: I4ecaa2194614148b4b50245e6250bdde02206160
2017-05-31 10:03:18 +00:00
Narayan Kamath
f194aad208 SEPolicy: Changes for new stack dumping scheme.
Applications connect to tombstoned via a unix domain socket and request
an open FD to which they can write their traces. This socket has a new
label (tombstoned_java_trace_socket) and appdomain and system_server are
given permissions to connect and write to it.

Apps no longer need permissions to open files under /data/anr/ and
these permissions will be withdrawn in a future change.

Bug: 32064548
Test: Manual

(cherry picked from commit a8832dabc7f3b7b2381760d2b95f81abf78db709)

(cherry picked from commit 11bfcc1e96)

Change-Id: Icc60d227331c8eee70a9389ff1e7e78772f37e6f
2017-05-31 10:01:48 +00:00
Narayan Kamath
51a01817aa SEPolicy: Changes for new stack dumping scheme. am: e628cb5b2d
am: 5e8fe8348b

Change-Id: Ibfe717b42fc26da2ec7876143b8cf0445a20eaec
2017-05-31 09:39:46 +00:00
Narayan Kamath
5e8fe8348b SEPolicy: Changes for new stack dumping scheme.
am: e628cb5b2d

Change-Id: If2ce6fbf2b897d58da78430a7bae0fd6fb6e5a49
2017-05-31 09:34:15 +00:00
Narayan Kamath
e628cb5b2d SEPolicy: Changes for new stack dumping scheme.
Applications connect to tombstoned via a unix domain socket and request
an open FD to which they can write their traces. This socket has a new
label (tombstoned_java_trace_socket) and appdomain and system_server are
given permissions to connect and write to it.

Apps no longer need permissions to open files under /data/anr/ and
these permissions will be withdrawn in a future change.

Bug: 32064548
Test: Manual

Merged-In: I70a3e6e230268d12b454e849fa88418082269c4f
Change-Id: Ib4b73fc130f4993c44d96c8d68f61b6d9bb2c7d5
2017-05-31 08:54:37 +01:00
Chad Brubaker
19e71b7bea Allow ephemeral apps to find media.drm
am: d2b3a4543a

Change-Id: I1ba8e73e1a004b654bc32dd6520b1e41ec3bc9cf
2017-05-30 19:34:43 +00:00
Chad Brubaker
d2b3a4543a Allow ephemeral apps to find media.drm
Bug: 62102558
Test: see b/62102558
Change-Id: If80d1270bcf6835e6d1a78e2176c3e139cebd174
2017-05-30 10:17:34 -07:00
Ruchi Kandoi
cd59148309 Merge "Allows nfc to access vr_manager_service" am: c3f4afefdb am: f23230c88e
am: e95974b024

Change-Id: I29eeb3ec90a67fe4377fe10f0884608a5fa52ea9
2017-05-27 00:19:10 +00:00
Ruchi Kandoi
e95974b024 Merge "Allows nfc to access vr_manager_service" am: c3f4afefdb
am: f23230c88e

Change-Id: I2214556e60abce3bf0801bc01d86e8c481e44c38
2017-05-27 00:17:11 +00:00
Ruchi Kandoi
f23230c88e Merge "Allows nfc to access vr_manager_service"
am: c3f4afefdb

Change-Id: I8810383b62d3c678c289867a0e17732242ee6679
2017-05-27 00:15:11 +00:00
Treehugger Robot
c3f4afefdb Merge "Allows nfc to access vr_manager_service" 2017-05-27 00:10:13 +00:00
Josh Gao
e589330ebd Revert "Add /dev/kmsg_debug." am: 9ac5d01faa am: 032c6d61a3
am: 75b9963252

Change-Id: I272e173f63c6f30bfe5994e15fc4b0bf558535da
2017-05-26 15:26:49 +00:00
Josh Gao
75b9963252 Revert "Add /dev/kmsg_debug." am: 9ac5d01faa
am: 032c6d61a3

Change-Id: Ibc245f943ad12afbc71f0d13be915120d2388529
2017-05-26 15:13:33 +00:00
Josh Gao
032c6d61a3 Revert "Add /dev/kmsg_debug."
am: 9ac5d01faa

Change-Id: I31b6b74e498efd2a6f6795f91d6a39a000886061
2017-05-26 15:11:02 +00:00
Dan Cashman
11b239f0b0 Merge changes I397ca4e7,I38efe224 into oc-dev
am: 33d7e90b51

Change-Id: I72b51db1d65df6a82b396187e982df1e4336c6be
2017-05-26 02:46:50 +00:00
TreeHugger Robot
33d7e90b51 Merge changes I397ca4e7,I38efe224 into oc-dev
* changes:
  Restrict BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIRS to one dir.
  Add BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIRS
2017-05-26 02:43:04 +00:00
Josh Gao
9ac5d01faa Revert "Add /dev/kmsg_debug."
This reverts commit a015186fab.

Bug: http://b/62101480
Change-Id: I8e889e3d50cf1749168acc526f8a8901717feb46
2017-05-26 00:32:07 +00:00
Ruchi Kandoi
f5a2353ae7 Allows nfc to access vr_manager_service
SELinux : avc:  denied  { find } for service=vrmanager pid=2364 uid=1027
scontext=u:r:nfc:s0 tcontext=u:object_r:vr_manager_service:s0
tclass=service_manager permissive=0

Test: manual
Bug: 35889571
Change-Id: If95bb5c286def99a0439b36a31b52fa9dfd4a2f4
Signed-off-by: Ruchi Kandoi <kandoiruchi@google.com>
2017-05-25 15:59:52 -07:00
Andy Hung
a9a3df3100 Merge "MediaExtractor: Allow reading of app data files." into oc-dev
am: 62022c718e

Change-Id: I3f7438d9883bf25c41674965b963c788df2c69ef
2017-05-25 21:57:13 +00:00
Andy Hung
62022c718e Merge "MediaExtractor: Allow reading of app data files." into oc-dev 2017-05-25 21:37:07 +00:00
Sandeep Patil
3abc81cec5 Merge "Allow init to run vendor toybox for modprobe" into oc-dev
am: d5a2f3e222

Change-Id: Ie35b0b80c929066186c35d31b8f8d803f374d969
2017-05-25 20:26:17 +00:00
TreeHugger Robot
d5a2f3e222 Merge "Allow init to run vendor toybox for modprobe" into oc-dev 2017-05-25 20:15:02 +00:00
Dan Cashman
51455fe977 Restrict BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIRS to one dir.
These directories were added to allow for partner extensions to the
android framework without needing to add changes to the AOSP global
sepolicy.  There should only ever be one owner of the framework and
corresponding updates, so enforce this restriction to prevent
accidental accrual of policy in the system image.

Bug: 36467375
Test: Add public and private files to policy and verify that they are
added to the appropriate policy files.  Also test that specifying
multiple directories for public or private results in an error.

Change-Id: I397ca4e7d6c8233d1aefb2a23e7b44315052678f
Merged-In: I397ca4e7d6c8233d1aefb2a23e7b44315052678f
(cherry picked from commit 1633da06af)
2017-05-25 22:10:45 +08:00
Dan Cashman
1b0a71f308 Add BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIRS
Add new build variables for partner customization (additions) to platform sepolicy.
This allows partners to add their own policy without having to touch the AOSP sepolicy
directories and potentially disrupting compatibility with an AOSP system image.

Bug: 36467375
Test: Add public and private files to sailfish policy and verify that they are
added to the appropriate policy files, but that the policy is otherwise identical.
Also add private/mapping/*.cil files in both locations and change the BOARD_SEPOLICY_VERS
to trigger use of prebuilt mapping files and verify that they are appropriately
combined and built in policy.

Change-Id: I38efe2248520804a123603bb050bba75563fe45c
Merged-In: I38efe2248520804a123603bb050bba75563fe45c
(cherry picked from commit f893700c73)
2017-05-25 22:10:36 +08:00
Josh Gao
99accb4a15 Merge "Let fallback crash dumping write to dumpstate pipes." into oc-dev
am: 56719282cb

Change-Id: I96129052f94f0748a6a5a964959270c5a8a118e3
2017-05-25 00:25:56 +00:00
Josh Gao
56719282cb Merge "Let fallback crash dumping write to dumpstate pipes." into oc-dev 2017-05-25 00:22:33 +00:00
Sandeep Patil
d46b5d3519 Allow init to run vendor toybox for modprobe
vendor implementations need to be able to run modprobe as part of
init.rc scripts.  They cannot do so because of the strict neverallow
currently in place that disallows all coredomains (including init)
to execute vendor toybox.

Fix this by adding init to the exception list for the neverallow so
vendors can then run modprobe from .rc scripts and also add the rule to
allow init to transition to modprobe domain using vendor_toolbox.

Bug: b/38212864
Test: Boot sailfish

Change-Id: Ib839246954e9002859f3ba986094f206bfead137
Signed-off-by: Sandeep Patil <sspatil@google.com>
2017-05-24 15:01:20 -07:00
Michael Schwartz
aa15c0afbc Merge "Sepolicy changes for system_server to use libvintf" into oc-dev
am: 1c8e8e0e88

Change-Id: I45c6a937eea4a110c0137d1e1573fe50fd71f4cd
2017-05-24 21:50:53 +00:00