Yifan Hong
150f84e06c
Merge "super_block_device -> super_block_device_type" am: 93b81f30ae
...
am: f0e9c939cc
Change-Id: I3ac061c2bd24a0ab7af067bfcdcb8ca38bb0daca
2019-03-28 13:51:29 -07:00
Yifan Hong
f0e9c939cc
Merge "super_block_device -> super_block_device_type"
...
am: 93b81f30ae
Change-Id: I274da84cce7985f97db2b3918c60f53304d999d8
2019-03-28 13:38:11 -07:00
Yifan Hong
93b81f30ae
Merge "super_block_device -> super_block_device_type"
2019-03-28 19:55:44 +00:00
Florian Mayer
512ff44523
Merge "Allow heapprofd to read test files." am: eda65027c7
...
am: b3f934c382
Change-Id: I96f2c358aae4eeeb15ffead648228586499ee075
2019-03-28 11:46:08 -07:00
Florian Mayer
b3f934c382
Merge "Allow heapprofd to read test files."
...
am: eda65027c7
Change-Id: Ia98a1657e11d7fe93710b7ad2f7b4d9e73b955cd
2019-03-28 11:37:46 -07:00
Florian Mayer
eda65027c7
Merge "Allow heapprofd to read test files."
2019-03-28 18:21:10 +00:00
Yifan Hong
ab85caaa56
super_block_device -> super_block_device_type
...
Domains that access super_block_device should instead
access super_block_device_type, which includes appropriate
block devices for retrofit DAP devices.
Test: boots (sanity)
Test: manual OTA
Bug: 128991918
Change-Id: Ie025b1e3c17e82330042aaa4a3e2e4a02ec1265b
2019-03-28 18:08:19 +00:00
Florian Mayer
ba385e3116
Merge "Relabel /data/system/packages.list to new type." am: 7145b25226
...
am: 1d0b6aed97
Change-Id: I6c9b389f5e5120080a80afbdb77759bc3842714b
2019-03-28 10:52:00 -07:00
Florian Mayer
1d0b6aed97
Merge "Relabel /data/system/packages.list to new type."
...
am: 7145b25226
Change-Id: Iaaaf871eddfdbee0f9d7adeb222965e17d1d17d2
2019-03-28 10:47:56 -07:00
Florian Mayer
7145b25226
Merge "Relabel /data/system/packages.list to new type."
2019-03-28 17:36:36 +00:00
YH_Lin
8dd0afad0d
Merge "sepolicy: add sepolicy rules for vold to write sysfs gc_urgent" am: a2186d08ca
...
am: d155e2c768
Change-Id: I73538ae26a6543b88f3ae2c92375d8eb949ad02c
2019-03-28 07:32:19 -07:00
YH_Lin
d155e2c768
Merge "sepolicy: add sepolicy rules for vold to write sysfs gc_urgent"
...
am: a2186d08ca
Change-Id: I9073b91afeed049b683cdeb7a6d71a9d554052cd
2019-03-28 07:27:55 -07:00
Treehugger Robot
a2186d08ca
Merge "sepolicy: add sepolicy rules for vold to write sysfs gc_urgent"
2019-03-28 14:19:20 +00:00
Hector Dearman
9bb344c5f3
Merge "Fix typos in genfs_contexts" am: 2d4894323c
...
am: 2344a6732c
Change-Id: I54ecd8076d523edbadaa24f5ba3bc25436b4926b
2019-03-28 04:05:34 -07:00
Hector Dearman
2344a6732c
Merge "Fix typos in genfs_contexts"
...
am: 2d4894323c
Change-Id: I5eecc86b004df23f527257accd3c8e78c325677b
2019-03-28 04:01:29 -07:00
Hector Dearman
2d4894323c
Merge "Fix typos in genfs_contexts"
2019-03-28 10:51:03 +00:00
Florian Mayer
4ab64c940f
Relabel /data/system/packages.list to new type.
...
Conservatively grant access to packages_list_file to everything that had
access to system_data_file:file even if the comment in the SELinux
policy suggests it was for another use.
Ran a diff on the resulting SEPolicy, the only difference of domains
being granted is those that had system_data_file:dir permissiosn which
is clearly not applicable for packages.list
diff -u0 <(sesearch --allow -t system_data_file ~/sepolicy | sed 's/system_data_file/packages_list_file/') <(sesearch --allow -t packages_list_file ~/sepolicy_new)
--- /proc/self/fd/16 2019-03-19 20:01:44.378409146 +0000
+++ /proc/self/fd/18 2019-03-19 20:01:44.378409146 +0000
@@ -3 +2,0 @@
-allow appdomain packages_list_file:dir getattr;
@@ -6 +4,0 @@
-allow coredomain packages_list_file:dir getattr;
@@ -8 +5,0 @@
-allow domain packages_list_file:dir search;
@@ -35 +31,0 @@
-allow system_server packages_list_file:dir { rename search setattr read lock create reparent getattr write relabelfrom ioctl rmdir remove_name open add_name };
@@ -40 +35,0 @@
-allow tee packages_list_file:dir { search read lock getattr ioctl open };
@@ -43,3 +37,0 @@
-allow traced_probes packages_list_file:dir { read getattr open search };
-allow vendor_init packages_list_file:dir { search setattr read create getattr write relabelfrom ioctl rmdir remove_name open add_name };
-allow vold packages_list_file:dir { search setattr read lock create getattr mounton write ioctl rmdir remove_name open add_name };
@@ -48 +39,0 @@
-allow vold_prepare_subdirs packages_list_file:dir { read write relabelfrom rmdir remove_name open add_name };
@@ -50 +40,0 @@
-allow zygote packages_list_file:dir { search read lock getattr ioctl open };
Bug: 123186697
Change-Id: Ieabf313653deb5314872b63cd47dadd535af7b07
2019-03-28 10:27:43 +00:00
David Anderson
d25ee0ab07
Add sepolicy for installing GSIs to external storage. am: 6557d87b0f
...
am: 9ca965a943
Change-Id: I493057b61079511383a4da11c6b95c3223ca77a5
2019-03-28 03:08:53 -07:00
David Anderson
9ca965a943
Add sepolicy for installing GSIs to external storage.
...
am: 6557d87b0f
Change-Id: I3b8f5bf53841c94222c90f0cc2c4aebb9b9b4fb2
2019-03-28 03:00:02 -07:00
David Anderson
6557d87b0f
Add sepolicy for installing GSIs to external storage.
...
To install GSIs on external storage (such as sdcards), gsid needs some
additional privileges:
- proc_cmdline and device-tree access to call ReadDefaultFstab().
This is ultimately used to check whether system's dm-verity has
check_at_most_once enabled, which is disallowed with sdcards.
- vfat read/write access to write files to the sdcard. Note that
adopted sdcards are not supported here.
- read access to the sdcard block device. To enable this without
providing access to vold_block_device, a new sdcard_block_device
label was added. Devices must apply this label appropriately to
enable gsid access.
- FIBMAP access for VFAT filesystems, as they do not support FIEMAP.
This only appears to work by granting SYS_RAWIO.
Bug: 126230649
Test: adb shell su root gsi_tool install --install_dir=/mnt/media_rw/...
works without setenforce 0
Change-Id: I88d8d83e5f61d4c0490f912f226fe1fe38cd60ab
2019-03-27 17:12:51 -07:00
Steven Moreland
83849d94b6
Merge "private: allow zygote mnt_expand_file:dir getattr;" am: 180ffccc8f
...
am: b2267841db
Change-Id: If01d4a27c0baf5303df789f4c00d4bb0c4505860
2019-03-27 16:32:35 -07:00
Steven Moreland
b2267841db
Merge "private: allow zygote mnt_expand_file:dir getattr;"
...
am: 180ffccc8f
Change-Id: Id82efff8a08d6bc48c78544879e35ac736f0fe62
2019-03-27 16:18:40 -07:00
Steven Moreland
180ffccc8f
Merge "private: allow zygote mnt_expand_file:dir getattr;"
2019-03-27 22:59:49 +00:00
Victor Hsieh
0f94ee2784
Merge "Move fs-verity key loading into fsverity_init domain" am: 3337a33609
...
am: db2334d3aa
Change-Id: Id0a00d3931fa4690c4d0c5b91e9d906cd060d409
2019-03-27 13:47:20 -07:00
Victor Hsieh
db2334d3aa
Merge "Move fs-verity key loading into fsverity_init domain"
...
am: 3337a33609
Change-Id: I7e4847dbfcce72ec80089a4150fce67782b049aa
2019-03-27 13:40:45 -07:00
Treehugger Robot
3337a33609
Merge "Move fs-verity key loading into fsverity_init domain"
2019-03-27 20:31:19 +00:00
Nick Kralevich
2b8292302c
Merge "Revert "Temporarily hide denial to fix tests."" am: 76a1a76b35
...
am: fb9e32b288
Change-Id: Ibac930e2366334083825a46e8dc64669a5fc6b8e
2019-03-27 10:17:23 -07:00
Nick Kralevich
fb9e32b288
Merge "Revert "Temporarily hide denial to fix tests.""
...
am: 76a1a76b35
Change-Id: Id243cfaf04cafdfaf17837645f73d8640bd49cc4
2019-03-27 10:12:07 -07:00
Hector Dearman
714b917411
Fix typos in genfs_contexts
...
Each tracing event is listed twice in this file, once in
debugfs and once in tracefs:
genfscon debugfs /tracing/events/sched/sched_switch/
genfscon tracefs /events/sched/sched_switch/
Some of the debugfs entries are missing the required leading
/tracing/ prefix, probably a copy paste error from when they were
added.
Test: make
Change-Id: I6e64eac0c2b95b38c4648b92765c748c631348b7
2019-03-27 17:06:39 +00:00
Treehugger Robot
76a1a76b35
Merge "Revert "Temporarily hide denial to fix tests.""
2019-03-27 16:54:12 +00:00
Victor Hsieh
3d4ee1dba5
Move fs-verity key loading into fsverity_init domain
...
fsverity_init is a new shell script that uses mini-keyctl for the actual
key loading. Given the plan to implement keyctl in toybox, we label
mini-keyctl as u:object_r:toolbox_exec:s0.
This gives us two benefits:
- Better compatibility to keyctl(1), which doesn't have "dadd"
- Pave the way to specify key's security labels, since keyctl(1)
doesn't support, and we want to avoid adding incompatible option.
Test: Boot without SELinux denial
Test: After boot, see the key in /product loaded
Bug: 128607724
Change-Id: Iebd7c9b3c7aa99ad56f74f557700fd85ec58e9d0
2019-03-27 16:31:01 +00:00
Nick Kralevich
9097360049
Revert "Temporarily hide denial to fix tests."
...
This reverts commit 94b5fe4af5
.
Reason for revert: Obsoleted by https://android-review.googlesource.com/933916
Bug: 129298168
Change-Id: I6b34cfdf76b5094db17ee06831d8a662ea360956
Test: Build.
2019-03-27 13:56:20 +00:00
Florian Mayer
12f7e0e658
Allow heapprofd to read test files.
...
This is needed to test the unwinding of test binaries.
03-26 19:55:44.311 939 939 W heapprofd: type=1400 audit(0.0:13): avc: denied { search } for name="nativetest" dev="sda45" ino=6815745 scontext=u:r:heapprofd:s0 tcontext=u:object_r:nativetest_data_file:s0 tclass=dir permissive=0
Change-Id: Icfbc6060a8755934f1c3935aac55ce7792dc7d85
2019-03-27 11:07:05 +00:00
Yifan Hong
75117c19c9
Merge changes from topic "lpdumpd" am: 40f1682ba6
...
am: 7f891f414f
Change-Id: Id3aea81bb90391b88942cf0f0d318ab040705fb9
2019-03-26 15:35:01 -07:00
Yifan Hong
7f891f414f
Merge changes from topic "lpdumpd"
...
am: 40f1682ba6
Change-Id: I33d21f283f01fbeeda7584b4cee1a91597cc5a71
2019-03-26 14:24:19 -07:00
Nick Kralevich
811e373efb
Merge "Temporarily hide denial to fix tests." am: a2b90b5efc
...
am: a95d5e8b03
Change-Id: I23f7accdb14853278c7712978bbad92c49fe8fc4
2019-03-26 13:54:32 -07:00
Nick Kralevich
d644476185
Merge "Don't audit audit_access denials to /dev/binder" am: f3e8dce5d4
...
am: 83484d2346
Change-Id: I93120a6d1fdfdc0f1d4a8675600e005485901e51
2019-03-26 13:53:57 -07:00
Nick Kralevich
a95d5e8b03
Merge "Temporarily hide denial to fix tests."
...
am: a2b90b5efc
Change-Id: If19dd95c24e0612f5a203b5b22ae1a01ce465c6a
2019-03-26 13:38:35 -07:00
Nick Kralevich
83484d2346
Merge "Don't audit audit_access denials to /dev/binder"
...
am: f3e8dce5d4
Change-Id: I61f195fd4c1dfe8a777617fbc1a776205da28d73
2019-03-26 13:37:29 -07:00
Yifan Hong
b1a5384b71
Merge "Add super_block_device_type" am: b9be03d63a
...
am: 9d8a33b32b
Change-Id: I7459a75ea8533c257aab3baeea0b4c37da17269d
2019-03-26 13:36:10 -07:00
Yifan Hong
40f1682ba6
Merge changes from topic "lpdumpd"
...
* changes:
Add rules for lpdump and lpdumpd
Allow to getattr kmsg_device
2019-03-26 20:35:36 +00:00
Yifan Hong
9d8a33b32b
Merge "Add super_block_device_type"
...
am: b9be03d63a
Change-Id: Ia3a7f3c90cf24dacec8b2189ec4db568625a40b2
2019-03-26 13:19:52 -07:00
Nick Kralevich
a2b90b5efc
Merge "Temporarily hide denial to fix tests."
2019-03-26 20:06:49 +00:00
Nick Kralevich
f3e8dce5d4
Merge "Don't audit audit_access denials to /dev/binder"
2019-03-26 19:51:01 +00:00
Yifan Hong
b9be03d63a
Merge "Add super_block_device_type"
2019-03-26 19:30:12 +00:00
Joel Galenson
94b5fe4af5
Temporarily hide denial to fix tests.
...
This shoud be removed once the offending code is fixed.
Bug: 129298168
Test: Build.
Change-Id: Ie94a626be777a094fb587f72b3987994e085a23e
2019-03-25 17:37:51 -07:00
Tri Vo
786b973c96
Don't audit audit_access denials to /dev/binder
...
Without VNDK, libcutils has to probe for /dev/binder access before
reaching to ashmemd via binder. Ignore denials generated when probing
/dev/binder.
Bug: 129073672
Test: boot sailfish without denials to /dev/binder
Change-Id: I07ba2e094586df353d54507458e891a3d14c1ca6
2019-03-25 17:23:36 -07:00
Tri Vo
35cc47b2d6
Merge "Allow system_suspend access to /sys/power/wake_[un]lock." am: a109fa645c
...
am: 262995e560
Change-Id: I43f0d009d634b7c9cb9b281d39bea6d0e145f06c
2019-03-25 16:56:04 -07:00
Tri Vo
262995e560
Merge "Allow system_suspend access to /sys/power/wake_[un]lock."
...
am: a109fa645c
Change-Id: Iecf9f5edf236e7d36d9aeb3d4fe739404b65b8c4
2019-03-25 16:51:07 -07:00
Tri Vo
a109fa645c
Merge "Allow system_suspend access to /sys/power/wake_[un]lock."
2019-03-25 23:38:09 +00:00