Commit graph

16187 commits

Author SHA1 Message Date
Yifan Hong
562a0d2f97 Merge "Add sepolicy for health filesystem HAL" am: 3dd465a097
am: 33eee9c584

Change-Id: I84d7cc56ec9280957218357ed97c1ca606b24795
2018-08-10 16:10:17 -07:00
Yifan Hong
33eee9c584 Merge "Add sepolicy for health filesystem HAL"
am: 3dd465a097

Change-Id: Id6d33270c8dccda7da78a11ec3ad52244adaf74b
2018-08-10 14:35:21 -07:00
Yifan Hong
3dd465a097 Merge "Add sepolicy for health filesystem HAL" 2018-08-10 20:00:56 +00:00
Yifan Hong
0814795c79 Add sepolicy for health filesystem HAL
Test: builds
Test: vts
Bug: 111655771
Change-Id: Iabad3d124bf476cb624addf7d7898e0c2894d550
2018-08-10 11:02:21 -07:00
Chia-I Wu
f1166714d7 Allow signals to hal_graphics_allocator_server am: c3aec707f1
am: 43c6f49f7c

Change-Id: I6ad81a526adb868d534731bc8261f16b98203a13
2018-08-10 09:51:37 -07:00
Chia-I Wu
43c6f49f7c Allow signals to hal_graphics_allocator_server
am: c3aec707f1

Change-Id: I44f2de41cf57dd8f45441f0ad8325ad424485272
2018-08-10 09:47:33 -07:00
Chia-I Wu
c3aec707f1 Allow signals to hal_graphics_allocator_server
This is needed to dump ANR traces for the process.

Bug: 111604912
Test: adb shell am hang
Change-Id: Icadc2de95a12818fe623271d1afb955843ccddbf
2018-08-09 15:56:47 -07:00
Mathieu Chartier
4cf9153f60 Merge "Add missing pm.* properties in property_contexts" am: 291531ef46
am: 8ba7c62df2

Change-Id: Idd3dfa762a64fb12d7ac59bc31d8dbc0f439d7ff
2018-08-08 14:59:19 -07:00
Mathieu Chartier
8ba7c62df2 Merge "Add missing pm.* properties in property_contexts"
am: 291531ef46

Change-Id: I0561b2ee1a8dd4cf8bb0c3496e875202368331e8
2018-08-08 14:51:02 -07:00
Mathieu Chartier
291531ef46 Merge "Add missing pm.* properties in property_contexts" 2018-08-08 20:21:42 +00:00
Tri Vo
42253893a2 Update comment on same_process_hal_file type. am: d98b728e9f
am: 38aded30da

Change-Id: I5bd85cdda50155331df01a4369f564f44d0f7570
2018-08-08 12:29:45 -07:00
Mark Salyzyn
151642560d Merge "fs_mgr: add overlayfs handling for squashfs system filesystems" am: ccfffe6e0d
am: ae3410152b

Change-Id: I3ab42b9188cef685361143815c94109ab64c9b3f
2018-08-08 12:20:08 -07:00
Tri Vo
38aded30da Update comment on same_process_hal_file type.
am: d98b728e9f

Change-Id: I1b44ed6077ca32083feb243c37d79bdc51616792
2018-08-08 12:16:37 -07:00
Steven Moreland
36a1870885 Merge "Fix type of ro.kernel.qemu: int -> bool" am: 75ba5a42f3
am: f4414d31da

Change-Id: I163a4b1655193e9c18e24f9305e70122aa9762ea
2018-08-08 12:11:48 -07:00
Nick Kralevich
6ae170f5ae Remove legacy execmod access from API >= 26. am: f3eb985447
am: e5662c6513

Change-Id: I52a3b1722a7826fd3e4fc89d19fe1f66c6e1ce0f
2018-08-08 12:00:36 -07:00
Tri Vo
f5c784ccd9 Add support for RS vendor executables. am: dd253e9019
am: 671c8a0656

Change-Id: I70d684be9c0d6e8b12deca97f3c065e7d8f70e0a
2018-08-08 11:44:20 -07:00
Mark Salyzyn
ae3410152b Merge "fs_mgr: add overlayfs handling for squashfs system filesystems"
am: ccfffe6e0d

Change-Id: Ia4c9527cd8b025a25de3389f260e42dcc304e073
2018-08-08 11:36:45 -07:00
Nick Kralevich
78c13c31d4 Relax some neverallow rules am: bd3e300a13
am: d79567cad5

Change-Id: Id766bb180d9ebb8c1b385a4ead038b72221a9b38
2018-08-08 11:32:33 -07:00
Steven Moreland
f4414d31da Merge "Fix type of ro.kernel.qemu: int -> bool"
am: 75ba5a42f3

Change-Id: Id8d9d63734bbc812b42a98473802f7ae9cda1933
2018-08-08 11:29:33 -07:00
Nick Kralevich
e5662c6513 Remove legacy execmod access from API >= 26.
am: f3eb985447

Change-Id: If5acde15dcaf05e4d3271b0308a8e346c59f0d30
2018-08-08 11:22:06 -07:00
Tri Vo
671c8a0656 Add support for RS vendor executables.
am: dd253e9019

Change-Id: I136bbdd06b1fbd4b38329431c73139bcd3cf3d7b
2018-08-08 11:13:07 -07:00
Nick Kralevich
efbbb53b37 Revert "Remove legacy execmod access." am: d90d001a78
am: a213d958dd

Change-Id: I1cba2e601b7aa5f723411791784d62af08da3855
2018-08-08 11:06:54 -07:00
Nick Kralevich
d79567cad5 Relax some neverallow rules
am: bd3e300a13

Change-Id: I8e353fd200af7874f93a86134a81e05cd32cd289
2018-08-08 11:00:43 -07:00
Nick Kralevich
a213d958dd Revert "Remove legacy execmod access."
am: d90d001a78

Change-Id: I83bcb993913a764615e6ef2be3fc4a5cf82b767c
2018-08-08 10:43:50 -07:00
Shibin George
d27b8612df Add missing pm.* properties in property_contexts
Certain pm.* properties, which are especially needed for
Go-targets, are not listed in property_contexts.
Init will not be able to set these properties on bootup
without the correct selinux contexts assigned to the
properties.

BUG: 111738816

Test: In selinux-enforcing mode, on bootup, these
      properties are now correctly set by init.

Change-Id: I6ea0fb229c93725e2987b1e021d5804a132d093d
2018-08-08 17:07:56 +00:00
Tri Vo
d98b728e9f Update comment on same_process_hal_file type.
Test: n/a
Change-Id: I929772fa36da6b96494d14cfa48b47dcc76cccd4
2018-08-08 17:03:03 +00:00
Treehugger Robot
ccfffe6e0d Merge "fs_mgr: add overlayfs handling for squashfs system filesystems" 2018-08-08 16:45:18 +00:00
Steven Moreland
75ba5a42f3 Merge "Fix type of ro.kernel.qemu: int -> bool" 2018-08-08 16:24:55 +00:00
Mark Salyzyn
9b398f3fb7 fs_mgr: add overlayfs handling for squashfs system filesystems
/cache/overlay directory in support of overlayfs mounts on userdebug
and eng devices.  Overlayfs in turn can be capable of supporting
adb remount for read-only or restricted-storage filesystems like
squashfs or right-sized (zero free space) system partitions
respectively.

Test: compile
Bug: 109821005
Bug: 110985612
Change-Id: I3ece03886db7cc97f864497cf93ec6c6c39bccd1
2018-08-08 07:33:10 -07:00
Xin Li
d4b7a5e807 Merge Android Pie into master am: c05fa1a5cf
am: 10f871b045

Change-Id: I04228f6ec706a9c0ed8291eea8f8fe4590c6c857
2018-08-07 19:18:08 -07:00
Nick Kralevich
f3eb985447 Remove legacy execmod access from API >= 26.
Text relocation support was removed from the linker for apps targeting
API >= 23. See
https://android.googlesource.com/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23

However, the security policy was not updated to remove the execmod
permission at that time, since we didn't have support for targeting
SELinux policies to API versions.

Remove execmod permissions for apps targeting API 26 or greater. The
linker support was removed, so it's pointless to keep around the SELinux
permissions.

Retain execmod support for apps targeting API 25 or lower. While in
theory we could remove support for API 23-25, that would involve the
introduction of a new SELinux domain (and the associated rule
explosion), which I would prefer to avoid.

This change helps protect application executable code from modification,
enforcing W^X properties on executable code pages loaded from files.
https://en.wikipedia.org/wiki/W%5EX

Test: auditallow rules were added and nothing triggered for apps
      targeting API >= 26. Code compiles and device boots.
Bug: 111544476

Change-Id: Iab9a0bd297411e99699e3651c110e57eb02a3a41
2018-08-08 01:39:09 +00:00
Tri Vo
dd253e9019 Add support for RS vendor executables.
/vendor/bin/bcc being a dependency of renderscript should be labeled as
same_process_hal_file. To facilitate that we relax neverallow rules for
executing same_process_hal_file from coredomain.

See details on /vendor/bin/bcc:
https://source.android.com/devices/architecture/vndk/renderscript

Bug: n/a
Test: build-time change
Change-Id: Ie996fb863090bf08b3d3ef653da827d0b22937d7
2018-08-07 23:05:08 +00:00
Xin Li
10f871b045 Merge Android Pie into master
am: c05fa1a5cf

Change-Id: Ic2bf1a3017cf7d3dbb99fe7dde7c66972ead7cf3
2018-08-07 15:49:00 -07:00
Steven Moreland
c8ba909117 Fix type of ro.kernel.qemu: int -> bool
Bug: N/A
Test: boot
Change-Id: I67e3554383977c3fb5e89f236838a9cb39fb257e
2018-08-07 14:03:56 -07:00
Nick Kralevich
bd3e300a13 Relax some neverallow rules
Kernels above 4.14 have a new mmap permission. However, neverallow rules
exclude the use of mmap, even when file FDs are passable across the
vendor/non-vendor boundary. Since we allow reading / writing of passed
file descriptors, also allow the use of mmap for passed file
descriptors.

Bug: 112171217
Test: policy compiles
Change-Id: I8176f86960bdff0cf5de770809510e9df5d62db9
2018-08-07 13:47:36 -07:00
Gao Xiang
f9fc873e5c Merge "fs_use: Enabled loading security xattrs for erofs" am: 0860253239
am: be23064cb5

Change-Id: Ib7331ac2aa43dac03bccc129747fdc41c4126744
2018-08-07 11:13:52 -07:00
Tom Cherry
9be120a935 Merge "Second stage init is on system" am: 07dfaec076
am: 6c53b7b265

Change-Id: Ia6bb04b962bb1301f70e83f9141ddecda2ce3803
2018-08-07 11:09:03 -07:00
Gao Xiang
be23064cb5 Merge "fs_use: Enabled loading security xattrs for erofs"
am: 0860253239

Change-Id: Ic7547db41d7269a8961423cd61ed27d3a8c6d6ad
2018-08-07 10:54:04 -07:00
Tom Cherry
6c53b7b265 Merge "Second stage init is on system"
am: 07dfaec076

Change-Id: I0fdcb2ea509b8de1133fce686034713f009c68e7
2018-08-07 10:48:16 -07:00
Nick Kralevich
d90d001a78 Revert "Remove legacy execmod access."
This reverts commit 0f11ffccf9.

Reason for revert: libmono crashes

Bug: 112292089
Bug: 111544476
Test: policy compiles, device boots
Change-Id: I064090aa9337cf17b80cd2c9af9342df851a3b27
2018-08-07 17:03:07 +00:00
Xin Li
c05fa1a5cf Merge Android Pie into master
Bug: 112104996
Change-Id: Icf411d8b04e12dd33dd82a26328b4156585cb5ff
2018-08-07 09:46:55 -07:00
Treehugger Robot
0860253239 Merge "fs_use: Enabled loading security xattrs for erofs" 2018-08-07 16:09:53 +00:00
Tom Cherry
07dfaec076 Merge "Second stage init is on system" 2018-08-07 16:08:55 +00:00
Gao Xiang
910cd95354 fs_use: Enabled loading security xattrs for erofs
Bug: 112292714
Change-Id: I0026c13fd4335e0365496bc00c26021d83f3c39d
Signed-off-by: Gao Xiang <gaoxiang25@huawei.com>
2018-08-07 22:13:12 +08:00
Nick Kralevich
25f763e374 auditallow app_data_file execute am: 4738b93db2
am: ca8749a0b3

Change-Id: Icbde5e0e612e6fe08e17f91713518bb7e724f2b3
2018-08-06 19:19:56 -07:00
Nick Kralevich
ca8749a0b3 auditallow app_data_file execute
am: 4738b93db2

Change-Id: I4278bd3d4e7786be716324d1817a81b6c19eec2e
2018-08-06 18:59:55 -07:00
Nick Kralevich
7ebdfb4b0a Delete untrusted_v2_app am: 41b21ee96a
am: fed2c09cfa

Change-Id: Iba40417ab69a16765eb2c9c13f4b1bcab1b151a3
2018-08-06 16:10:24 -07:00
Nick Kralevich
fed2c09cfa Delete untrusted_v2_app
am: 41b21ee96a

Change-Id: I85087c37b7c575e9b50d7090d155281d4f7c4f74
2018-08-06 15:35:16 -07:00
Nick Kralevich
4738b93db2 auditallow app_data_file execute
Executing files from an application home directory violates
W^X (https://en.wikipedia.org/wiki/W%5EX) constraints (loading executable code
from a writable file) and is an unsafe application behavior. Test to see if we
can get rid of it and establish some baseline metrics.

Test: device boots and no obvious problems.
Change-Id: I756c281fcbf750821307327642cc0d06605951b0
2018-08-06 14:49:45 -07:00
Joel Galenson
f60a5ec66d [automerger skipped] Allow ephemeral_app to execute system_file. am: 8b2c858053 -s ours
am: 1588241555  -s ours

Change-Id: If4793e21c04beb0d573af4d964ee78c8e5e60dfa
2018-08-06 13:15:50 -07:00