Commit graph

28640 commits

Author SHA1 Message Date
Ram Muthiah
fa10ab3955 Merge "Revert "Add qemu.hw.mainkeys to system property_contexts"" am: 523a649401
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1590671

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ibc3afb978c5f79942d6a10b5790172bceb920288
2021-02-16 19:35:42 +00:00
Ram Muthiah
523a649401 Merge "Revert "Add qemu.hw.mainkeys to system property_contexts"" 2021-02-16 19:05:10 +00:00
Ram Muthiah
509b35e5d9 Revert "Add qemu.hw.mainkeys to system property_contexts"
Revert submission 1582845-qemu-prop

Reason for revert: aosp_hawk-userdebug is broken on an RVC branch
Reverted Changes:
Idfc2bffa5:Add qemu.hw.mainkeys to system property_contexts
If013ff33f:Remove qemu.hw.mainkeys from vendor_qemu_prop
Bug: 180412668
Change-Id: I335afb931eaeb019f66e3feedea80b0c8888f7a3
2021-02-16 18:58:10 +00:00
Weilun Du
baf97e40f9 Merge "Add qemu.hw.mainkeys to system property_contexts" am: 23bb01756e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1582845

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I7eb61f01903b343c1cf2a210ffe6f7bae3034922
2021-02-16 17:22:58 +00:00
Weilun Du
23bb01756e Merge "Add qemu.hw.mainkeys to system property_contexts" 2021-02-16 16:44:00 +00:00
Maciej Żenczykowski
fd596bf799 Merge "apply 'fs_bpf_tethering' label to /sys/fs/bpf/tethering" am: c281113ea8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1566557

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Iec1e9556373de5508097bf9a9264455238728353
2021-02-15 12:52:33 +00:00
Galia Peycheva
efff2e4789 Merge "Add blur sysprop to sepolicy" am: 7959b6eb1b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1585067

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I5a046f94f8233ffdaf5cb6fef3a1952393448ad3
2021-02-15 12:51:58 +00:00
Maciej Żenczykowski
c281113ea8 Merge "apply 'fs_bpf_tethering' label to /sys/fs/bpf/tethering" 2021-02-15 12:21:54 +00:00
Galia Peycheva
7959b6eb1b Merge "Add blur sysprop to sepolicy" 2021-02-15 12:20:29 +00:00
Treehugger Robot
cec7de1859 Merge changes from topic "uid_pid with recovery mode" am: cbf08f8cc7
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1587544

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ibffd60cdad4211d0d95f5068b1457161ff0a34d6
2021-02-13 21:52:06 +00:00
Marco Ballesio
9afaef844b sepolicy: rules for uid/pid cgroups v2 hierarchy am: aa4ce95c6f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1585406

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Icd7136331223fa9f4a215ce07330da173ba61db0
2021-02-13 21:51:47 +00:00
Treehugger Robot
cbf08f8cc7 Merge changes from topic "uid_pid with recovery mode"
* changes:
  sepolicy: grant system_server process group creation rights
  sepolicy: rules for uid/pid cgroups v2 hierarchy
2021-02-13 21:32:31 +00:00
Marco Ballesio
98a5e60592 sepolicy: grant system_server process group creation rights
system_server must be allowed to create process groups in behalf of
processes spawned by the app zygote

Bug: 62435375
Bug: 168907513
Test: verified that webview processes are migrated in their own process
group

Change-Id: Icd9cd53b759a79fe4dc46f7ffabc0cf248e6e4b8
2021-02-12 15:16:18 -08:00
Mohammad Islam
3663ec7d1e Merge "Allow apexd to relabel files in /data/apex/decompressed" am: 1a2a3bd369
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1561696

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: If4af5950e9a44a123331a2e94c3695d7a072c411
2021-02-12 10:50:06 +00:00
Mohammad Islam
1a2a3bd369 Merge "Allow apexd to relabel files in /data/apex/decompressed" 2021-02-12 10:16:55 +00:00
Treehugger Robot
cf5f18538e Merge "The SE Policies to incorporate ISecureClock and ISharedSecret services along with IKeyMintDevice service into default keymint HAL Server. Test: Rebuild, execute and run atest VtsAidlSharedSecretTargetTest and atest VtsAidlSecureClockTargetTest. Bug: b/171844725, b/168673523." am: 98e48ac6b4
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1562770

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I0589e6bcbdde95f1d465ee5ec4d591ed96287f47
2021-02-12 04:47:46 +00:00
Shubang Lu
fd40534a40 Merge "Add SE policy for media_metrics" am: a19f9d2455
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1580990

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I7f1fbabf3dd22beebd91654d046e9b3fff4b67c3
2021-02-12 04:46:21 +00:00
Treehugger Robot
98e48ac6b4 Merge "The SE Policies to incorporate ISecureClock and ISharedSecret services along with IKeyMintDevice service into default keymint HAL Server. Test: Rebuild, execute and run atest VtsAidlSharedSecretTargetTest and atest VtsAidlSecureClockTargetTest. Bug: b/171844725, b/168673523." 2021-02-12 02:42:35 +00:00
Shubang Lu
a19f9d2455 Merge "Add SE policy for media_metrics" 2021-02-12 02:00:32 +00:00
Maciej Żenczykowski
d68cb48e90 apply 'fs_bpf_tethering' label to /sys/fs/bpf/tethering
We want to label /sys/fs/bpf/tethering/... with a new label distinct
from /sys/fs/bpf, as this will allow locking down the programs/maps
tighter then is currently possible with the existing system.

These programs and maps are provided via the tethering mainline module,
and as such their number, names, key/value types, etc. are all prone to
be changed by a tethering mainline module update.

Test: atest, TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ifc4108d76a1106a936b941a3dda1abc5a65c05b0
2021-02-11 17:45:06 -08:00
Treehugger Robot
099e2f1a09 Merge "Allow dumpsys meminfo to print out DMA-BUF statistics" am: 83d6f96fdc
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1582856

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Id76c925e6f3a36fca52962d75c8a4f5b8907ac76
2021-02-12 00:28:10 +00:00
Treehugger Robot
83d6f96fdc Merge "Allow dumpsys meminfo to print out DMA-BUF statistics" 2021-02-11 23:48:04 +00:00
Marco Ballesio
aa4ce95c6f sepolicy: rules for uid/pid cgroups v2 hierarchy
Bug: 168907513
Test: verified the correct working of the v2 uid/pid hierarchy in normal
and recovery modes

This reverts commit aa8bb3a29b.

Change-Id: Ib344d500ea49b86e862e223ab58a16601eebef47
2021-02-11 23:40:38 +00:00
shubang
2210767054 Add SE policy for media_metrics
Test: CTS;
Change-Id: Ib9382f2513d8fd0e6812d0157c710d0ad5817231
2021-02-11 18:38:07 +00:00
Hridya Valsaraju
0001dee765 Allow dumpsys meminfo to print out DMA-BUF statistics
These permissions fix the following denials:

avc: denied { read } for name="buffers" dev="sysfs" ino=3267
scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_dmabuf_stats:s0
tclass=dir permissive=1
avc: denied { open } for path="/sys/kernel/dmabuf/buffers" dev="sysfs"
ino=3267 scontext=u:r:system_server:s0
tcontext=u:object_r:sysfs_dmabuf_stats:s0 tclass=dir permissive=1
avc: denied { read } for name="size" dev="sysfs"
ino=30556 scontext=u:r:system_server:s0
tcontext=u:object_r:sysfs_dmabuf_stats:s0 tclass=file permissive=1
avc: denied { open } for path="/sys/kernel/dmabuf/buffers/41673/size" dev="sysfs"
ino=30556 scontext=u:r:system_server:s0
tcontext=u:object_r:sysfs_dmabuf_stats:s0 tclass=file permissive=1
avc: denied { getattr } for path="/sys/kernel/dmabuf/buffers/41673/size" dev="sysfs"
ino=30556 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_dmabuf_stats:s0
tclass=file permissive=1
avc: denied { read } for name="dma_heap" dev="tmpfs" ino=344
scontext=u:r:system_server:s0 tcontext=u:object_r:dmabuf_heap_device:s0
tclass=dir permissive=1
avc: denied { open } for path="/dev/dma_heap" dev="tmpfs" ino=344
scontext=u:r:system_server:s0 tcontext=u:object_r:dmabuf_heap_device:s0
tclass=dir permissive=1

Test: adb shell dumpsys meminfo
Bug: 167709539
Change-Id: Ifa43fd16369d5da1db16e45ff0e189da0c975b75
2021-02-11 10:04:26 -08:00
Galia Peycheva
201414cff6 Add blur sysprop to sepolicy
Bug: 170378891
Test: m
Change-Id: I6876e3bfe9dfdf066bfa54334555fdab5b3598d5
2021-02-11 17:32:30 +00:00
Weilun Du
180a277d67 Add qemu.hw.mainkeys to system property_contexts
Bug: 178143857

Signed-off-by: Weilun Du <wdu@google.com>
Change-Id: Idfc2bffa52016d1e880974bb193025400e90a538
2021-02-11 04:18:54 +00:00
Vova Sharaienko
28497aaed1 Merge "Stats: new sepolicy for the AIDL service" am: e8d2732651
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1570880

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I46f47561663e9a3fb200cc061859c4e23ab8217c
2021-02-11 03:48:46 +00:00
Vova Sharaienko
e8d2732651 Merge "Stats: new sepolicy for the AIDL service" 2021-02-11 03:07:56 +00:00
Vova Sharaienko
c64a5b42aa Stats: new sepolicy for the AIDL service
Allows the AIDL IStats service to be exposed via ServiceManager
Defines IStats service client domain to be used by pixelstats_vendor

Bug: 178859845
Test: Build, flash, and aidl_stats_client
Change-Id: If41e50d0182993d0b7f8501e9147e0becf526689
2021-02-10 23:48:35 +00:00
Treehugger Robot
f749766036 Merge "Fix ANR permission denial for AIDL HALs." am: 654f8b82a8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1582316

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ie1bd6c28ef20741f9d1f1d6a780af6728ef362b0
2021-02-10 21:53:29 +00:00
Treehugger Robot
654f8b82a8 Merge "Fix ANR permission denial for AIDL HALs." 2021-02-10 21:16:35 +00:00
Elliott Hughes
d0f06f5489 Merge "Allow priv_app system_linker_exec:file execute_no_trans" am: e92be7b6a6
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1582850

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I20bc071b1d686e9174186ea25a47fdaca49bbe77
2021-02-10 21:04:21 +00:00
Elliott Hughes
e92be7b6a6 Merge "Allow priv_app system_linker_exec:file execute_no_trans" 2021-02-10 20:45:23 +00:00
Chirag Pathak
814e89a1b2 The SE Policies to incorporate ISecureClock and ISharedSecret services along with IKeyMintDevice service into default keymint HAL Server.
Test: Rebuild, execute and run atest VtsAidlSharedSecretTargetTest and atest VtsAidlSecureClockTargetTest.
Bug: b/171844725, b/168673523.

Change-Id: I8b81ec12c45566d31edcd117e41fd559df32c37d
2021-02-10 18:45:07 +00:00
Elliott Hughes
25cb9046ef Allow priv_app system_linker_exec:file execute_no_trans
Chrome Crashpad uses the the dynamic linker to load native executables
from an APK (b/112050209, crbug.com/928422)

We made the equivalent change to untrusted_app_all in
9ea8c0701d but webview also runs in
priv_app contexts.

Bug: http://b/112050209
Test: treehugger
Change-Id: I19bbadc7f9c9e668e2c6d932c7da24f18e7731bd
2021-02-10 10:32:44 -08:00
Steven Moreland
afb345c94b Fix ANR permission denial for AIDL HALs.
Recently, WatchDog gained the ability to query AIDL HAL PIDs in order to
amend ANR reports. However, since this was tested on cuttlefish (and
b/65201432 means that system_server is permissive), the denial was not
enforced, and broke ANRs in the dogfood population.

Fixes: 179753319
Test: simulate hanging w/ 'adb shell am hang', and the following denial
   no longer occurs:
02-10 00:50:05.719   200   200 E SELinux : avc:  denied  { list } for
pid=575 uid=1000 name=service_manager scontext=u:r:system_server:s0
tcontext=u:r:servicemanager:s0 tclass=service_manager permissive=1

Change-Id: I210527ad7492b155d7cf08c7d67894ef602d37a6
2021-02-10 17:06:00 +00:00
Florian Mayer
076e0e56b1 Merge changes from topics "norootintegrationtest", "profileshelltestdatafile" am: 7b3ae03026
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1575363

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I526f7b7f9f0c8954d929184592b57928685f3b39
2021-02-10 11:43:01 +00:00
Florian Mayer
7b3ae03026 Merge changes from topics "norootintegrationtest", "profileshelltestdatafile"
* changes:
  Allow shell to create shell_[test_]_data_file sockets.
  Allow heapprofd to read shell_test_data_file.
2021-02-10 11:16:10 +00:00
Treehugger Robot
1018f58e44 Merge "SEPolicy for RemoteProvisioning App" am: e6654e8bfd
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1536783

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I958e7dcfda6bde2b5e37d9f32df9f530590e097f
2021-02-10 04:53:04 +00:00
Treehugger Robot
e6654e8bfd Merge "SEPolicy for RemoteProvisioning App" 2021-02-10 04:20:52 +00:00
Treehugger Robot
258ee7802e Merge "[selinux] allow priv_app to get incremental progress" am: f14e49be1c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1581966

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: If428dfe89afd31a5f491553c3dc6e7a99a3eb9e1
2021-02-10 01:25:12 +00:00
Treehugger Robot
f14e49be1c Merge "[selinux] allow priv_app to get incremental progress" 2021-02-10 00:32:39 +00:00
Pavel Grafov
7ea497a17e Keystore 2.0: Allow system_server to manage wifi keys am: 20bc79bb3f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1581903

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I74b8b25388c00eddafc238ae4ed1a52a53230f36
2021-02-10 00:05:26 +00:00
Songchun Fan
b4c9491aed [selinux] allow priv_app to get incremental progress
This allows phonesky to get incremental install progress.

Addresses denial message like below:

W/BlockingExecuto: type=1400 audit(0.0:5582): avc: denied { ioctl } for path="/data/incremental/MT_data_app_vmdl133/mount/.index/04abf89d12c3fe8f6fe9b381a670255c" dev="incremental-fs" ino=52957 ioctlcmd=0x6722 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:apk_data_file:s0 tclass=file permissive=0 app=com.android.vending

Test: builds
BUG: 172965880
Change-Id: Ibecd4e07746e7bb3ca6bdf762382744b38f677cb
2021-02-09 22:46:27 +00:00
Pavel Grafov
20bc79bb3f Keystore 2.0: Allow system_server to manage wifi keys
This is needed because Wifi module needs to import and
generate keys and it runs in system_server.

Also, remove "grant" from system_app and system_server
since there is no need to grant any keys.

Test: Create an enterprise wifi config with EAP-TLS
Bug: 171305388
Change-Id: I50c25f2fe52e968c8cdf1ea20d110f9f052699db
2021-02-09 20:36:51 +00:00
Janis Danisevskis
17c9463c6e Merge "Keystore 2.0: Add wifi namespace to sepolicy." am: 6691c9c411
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1570000

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Id996eb24c7e76234de89fd0461f801b85752be97
2021-02-09 18:45:12 +00:00
Janis Danisevskis
6691c9c411 Merge "Keystore 2.0: Add wifi namespace to sepolicy." 2021-02-09 18:27:16 +00:00
Janis Danisevskis
df31f20dfe Keystore 2.0: Add wifi namespace to sepolicy.
Add the wifi namespace to sepolicy and allow system_app (Settings) and
wifi_supplicant to manage/use the keys in that namespace

Test: N/A
Bug: 171305388
Change-Id: Ib6af8656b18288a1116c241c2e76d9aea421a889
2021-02-09 08:28:45 -08:00
Treehugger Robot
672b014e90 Merge "Allow dumpsys to read total DMA-BUF heap pool size" am: efef83f745
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1566386

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Id42bddda4968b88f89c8538c5bdc85e156db892b
2021-02-09 14:38:53 +00:00