Commit Graph

22424 Commits

Author SHA1 Message Date
Steven Moreland
7ebce7d666 Allow dumping vibrator HAL.
Was missing permission to write to dumpstate's file, so this was failing
to dump.

Fixes: 145776393
Test: bugreport now shows:
-------------------------------------------------------------------------------
DUMP OF SERVICE android.hardware.vibrator.IVibrator/default:
HIDL:
...

Kernel:
...

(note, will fix 'HIDL' reference from AIDL HAL separately).

Change-Id: I5fbd55a4dbbd31a9c08260a247559e3dbd9a4046
2019-12-09 11:17:55 -08:00
Treehugger Robot
09ecf475e9 Merge "Add sepolicy for AppIntegrityService." 2019-12-06 18:37:02 +00:00
Tomasz Wasilczyk
e7f2a17b2e Merge "Allow vendor-init selecting Vehicle HAL instance to use." 2019-12-06 16:55:48 +00:00
Anton Hansson
902f4fe2e6 Merge "Add sepolicy for sdkext module prop" 2019-12-06 11:13:03 +00:00
Amit Mahajan
f32216ae46 Merge "Create telephony apex." 2019-12-06 05:13:29 +00:00
Treehugger Robot
eac0c5a190 Merge "[incremental] checking in apex configs in selinux" 2019-12-06 04:17:51 +00:00
Treehugger Robot
3913d4ba56 Merge "Add file_contexts for apex com.android.cronet" 2019-12-06 03:57:35 +00:00
Treehugger Robot
b1e670c24c Merge "[Tether15] Allow system app to find TetheringManager" 2019-12-06 03:32:50 +00:00
Songchun Fan
e462a23b71 [incremental] checking in apex configs in selinux
Test: builds
Change-Id: Iae7b2f2e6e57418365dabfb271afe03b766d5f29
2019-12-06 01:11:51 +00:00
Amit Mahajan
cccf34dcb0 Create telephony apex.
Test: m com.android.telephony && adb install com.android.telephony.apex
Bug: 145555313
Change-Id: I0aa28cd05af937b2af86a1ed352e8b41b64e2fdc
2019-12-05 14:52:57 -08:00
Chong Zhang
c10a9eadd8 allow mediaserver to use appdomain_tmpfs
mediaserver and mediaextractor both need this.

bug: 145607042
bug: 145355521
test: run modified android.media.cts.HeifWriterTest
to use the new android.Os.memfd_create, the test
should pass; shouldn't fail in verification step
due to MediaMetadataRetriever can't access the memfd.

Change-Id: I47dabb9d98c77b647521884c7b5fadf04eae3b41
2019-12-05 12:14:13 -08:00
Tomasz Wasilczyk
d9999bebc9 Allow vendor-init selecting Vehicle HAL instance to use.
Bug: 143779011
Test: added PRODUCT_PROPERTY_OVERRIDES for ro.vehicle.hal
Change-Id: I01ec302f3aedae0b021aa34952805e764d45f431
2019-12-05 08:49:49 -08:00
Treehugger Robot
4c8a849f25 Merge "sepolicy: allow rules for apk verify system property" 2019-12-05 16:08:37 +00:00
Anton Hansson
e822545909 Add sepolicy for sdkext module prop
Add a domain for derive_sdk which is allowed to set
persist.com.android.sdkext.sdk_info, readable by all
apps (but should only be read by the BCP).

Bug: 137191822
Test: run derive_sdk, getprop persist.com.android.sdkext.sdk_info
Change-Id: I389116f45faad11fa5baa8d617dda30fb9acec7a
2019-12-05 14:11:50 +00:00
Song Pan
8be46bf2e0 Add sepolicy for AppIntegrityService.
CL that adds the service: http://ag/9554748

BUG:145674997
Test: Manually flash the device. Without this change, the devices goes into a
bootloop (http://gpaste/5033431010377728) if I uncommit the guard in
http://ag/c/platform/frameworks/base/+/9652133/21/services/core/java/com/android/server/integrity/AppIntegrityManagerService.java

Change-Id: Ib2daf9191900d94abeae207e18a77a5914d14783
2019-12-05 12:22:51 +00:00
Luke Huang
13ed58b6eb Add file_contexts for apex com.android.cronet
Bug: 139397529
Bug: 143926783
Test: build
Change-Id: Ic39f88b4f4d22ea3953cb27a72f5f20a74672bd3
2019-12-05 16:58:36 +08:00
Jooyung Han
870c448ace Merge "Allow system_server to read/open apex_mnt_dir" 2019-12-05 08:55:31 +00:00
Jooyung Han
41870be726 Allow system_server to read/open apex_mnt_dir
PackageManager tries to scan /apex (apex_mnt_dir) for flattened apexes.

Previously, because /apex was blindly bind-mounted to /system/apex for
"flattened" apexes, the label for /apex is the same as /system/apex,
which is oaky for system_server to handle it.

But to support flattened apexes from other partitions such as /vendor or
/system_ext, every apex should be mounted under /apex individually,
which leaves the se-label of /apex unchanged (apex_mnt_dir).

Bug: 144732372
Test: boot with flattened apexes
      see if there are errors "denied system_server with apex_mnt_dir"
Change-Id: I81bd6ab152770c3c569b22274a6caa026615303e
2019-12-05 08:26:26 +09:00
Mathieu Chartier
60d75c2b04 Merge "Allow iorapd to access the runtime native boot feature flag properties" 2019-12-04 22:01:29 +00:00
Mathieu Chartier
7bc626ae42 Allow iorapd to access the runtime native boot feature flag properties
Test: adb shell device_config put runtime_native_boot iorap_perfetto_enable true
Test: inspect lodcat to validate

Bug: 141377208
Change-Id: Iaef1197decff37512f107774ea0f0f09a4dcd72d
2019-12-04 20:56:54 +00:00
Yan Yan
fe55f30397 Merge "Make ipsec file_contexts as "android:path" property" 2019-12-04 02:07:34 +00:00
Treehugger Robot
54072d9a73 Merge "Fix vendor defining macros and neverallows" 2019-12-04 01:12:15 +00:00
Hangyu Kuang
4c1e76adcb Merge "MediaTranscodingService: Add sepolicy for MediaTranscodingService." 2019-12-03 23:55:20 +00:00
Treehugger Robot
53e3983923 Merge "Audit binder_call rule for priv_app in update_engine.te" 2019-12-03 23:46:56 +00:00
Treehugger Robot
92e540c978 Merge "Merge Android10 QPR1 into AOSP master" 2019-12-03 23:15:00 +00:00
Ashwini Oruganti
c116142d2e Audit binder_call rule for priv_app in update_engine.te
We've moved GMS core to its own domain, and this permission should no
longer be applied to the broader priv_app domain.

Before we delete the rule, we are auditing it to see if any other
privapps need it.

Bug: 142672293
Test: TH
Change-Id: I29c29739f4c3caf5d24361b69adc584047da0ef0
2019-12-03 14:02:57 -08:00
Jeff Sharkey
8d287db808 Structure MediaProvider as an APEX.
Based on guidance from the Mainline team, we're placing the
MediaProvider APK inside a new APEX, as this will allow us to
move MediaStore.java inside the module boundary in a future CL.

Bug: 144247087
Test: manual
Change-Id: I88f6f2e598d9611e8b92143504e4328d93671cab
2019-12-03 13:35:46 -07:00
Treehugger Robot
f651f6efc6 Merge "Allow update_engine to call gmscore_app" 2019-12-03 20:27:51 +00:00
Ashwini Oruganti
ae7297b7da Allow update_engine to call gmscore_app
We need this permission now that GMS core runs in its own domain and not
in the priv_app domain.

Bug: 145379440
Bug: 142672293
Test: TH
Change-Id: Idc4bf6863ba767d287c218c07d0eb5aebbe50f91
2019-12-03 11:13:51 -08:00
Victor Hsieh
8b65b0b12d sepolicy: allow rules for apk verify system property
ro.apk_verity.mode was introduced in P on crosshatch. This change
changes the label from default_prop to a new property, apk_verity_prop.

ro.apk_verity.mode is set by vendor_init per build.prop, in order to
honor Treble split.  It is also read by system_server and installd
currently.

Test: verify functioning without denials in dmesg
Bug: 142494008
Bug: 144164497
Change-Id: I1f24513d79237091cf30025bb7ca63282e23c739
2019-12-03 10:09:35 -08:00
Inseob Kim
b4baf73477 Fix vendor defining macros and neverallows
init and dumpstate should be able to access all properties, but they are
in coredomain, so neverallow rules for vendor properties should be
changed in order to avoid conflicts.

Bug: 145339613
Test: add vendor_internal_prop manually and build.
Change-Id: If582870f855e4444f8ac0d091696c0c7fd833791
2019-12-03 18:42:12 +09:00
Xin Li
914bd86d0e Merge Android10 QPR1 into AOSP master
Bug: 145570283
Change-Id: Ie78ec6d7b9300593c9ac370d7dd801ba3f7e0e97
2019-12-02 21:25:28 -08:00
Hangyu Kuang
ee3a8ea798 MediaTranscodingService: Add sepolicy for MediaTranscodingService.
Bug:145233472
Test: Build and flash the phone.
"adb shell dumpsys -l | grep media" shows media.transcoding service.

Change-Id: I48a42e7b595754989c92a8469eb91360ab6db7c6
2019-12-02 13:57:28 -08:00
Stan Rokita
193dfaeca0 Merge "Add sensors multihal support in file_contexts regex"
am: d494872641

Change-Id: I8a297a051ad05023aa985e005ce0b67cd8ffcaf2
2019-12-02 13:39:35 -08:00
Stan Rokita
d494872641 Merge "Add sensors multihal support in file_contexts regex" 2019-12-02 20:54:57 +00:00
Ashwini Oruganti
807fe543e5 Don't run vzwomatrigger_app in permissive mode
am: b7c81c04c0

Change-Id: I7cf647863753a4dcf7ffea1d5e8af3edf618d5d6
2019-12-02 11:35:26 -08:00
Ashwini Oruganti
b7c81c04c0 Don't run vzwomatrigger_app in permissive mode
This change enforces all the defined rules for the vzwomatrigger_app
domain and unsets permissive mode. There have not been any new denials
in the past weeks for this domain (source: go/sedenials), and hence this
domain appears to not need any new permissions.

Bug: 142672293
Test: Green builds
Change-Id: I588b4e3038a3e8188d97183a592f9023a95dd3a8
2019-12-02 09:41:54 -08:00
Anton Hansson
03683c2295 Merge "Add sepolicy for com.android.sdkext module"
am: 243797950e

Change-Id: I4b2e2bcf04a7e42e27b6a9e6cceae205dddf2ddb
2019-12-02 09:19:22 -08:00
Anton Hansson
243797950e Merge "Add sepolicy for com.android.sdkext module" 2019-12-02 17:09:16 +00:00
Anton Hansson
fd25d49569 Add sepolicy for com.android.sdkext module
Bug: 137191822
Test: m com.android.sdkext
Change-Id: Ia5fb99af7fad43ce4321b1c6611ab54340a87589
2019-12-02 14:13:41 +00:00
Jeff Vander Stoep
ae2bb0dd40 gmscore_app: add bug map
am: a213e0c3c5

Change-Id: I973b2a61960faf96fc12da7ecf197386866f4aa6
2019-12-02 06:04:24 -08:00
Jeff Vander Stoep
a213e0c3c5 gmscore_app: add bug map
De-flake tests.

Test: build
Bug: 145267097
Change-Id: I7c21229d8577ffb9283a94290b3cfe575868d348
2019-12-02 13:42:11 +01:00
Mark Chien
9dfaa7dcc6 [Tether15] Allow system app to find TetheringManager
Bug: 144320246
Test: -build, flash, boot
      -OFF/ON hotspot

Change-Id: I8ce7ac5eb8198f0df4a2da426e3c56e8915e746a
2019-12-02 18:01:33 +08:00
Mark Chien
946f1bf87b Merge "[Tether18] Add file_contexts for com.android.tethering.apex"
am: 9bf53d557d

Change-Id: I677f6bd93bd5fa099eba2c1fc705364ce94ccb9f
2019-12-01 20:20:30 -08:00
Mark Chien
9bf53d557d Merge "[Tether18] Add file_contexts for com.android.tethering.apex" 2019-12-02 04:11:35 +00:00
Mark Chien
646864216f [Tether18] Add file_contexts for com.android.tethering.apex
Bug: 144320626
Test: build

Change-Id: I6b5c079a917524bf4f1ad3f89b1f44708f0d6ed7
2019-11-28 14:53:58 +08:00
Shuo Qian
dea5117ac3 Merge "Setting up SELinux policy for Emergency number database"
am: 584234e8b1

Change-Id: I87aa18467be2a9c38d804629eea38f3c5ebb844c
2019-11-27 12:06:51 -08:00
Shuo Qian
584234e8b1 Merge "Setting up SELinux policy for Emergency number database" 2019-11-27 19:14:50 +00:00
Jeff Vander Stoep
ae3667d6ae Whitelist app->storage denials
am: 99d5970dcf

Change-Id: I93dae16d115d35d2eebb35d8cc98cbf941b11873
2019-11-27 10:49:17 -08:00
evitayan
780185f503 Make ipsec file_contexts as "android:path" property
It follows examples of other APEX to make file_contexts of ipsec
module as "android:path" property

Bug: 143192273
Test: atest ipsec_e2e_tests
Change-Id: Idbba1f964aad7e54077ac77250f9cfd6a6b5049e
2019-11-27 07:00:14 -08:00