Commit graph

23652 commits

Author SHA1 Message Date
Automerger Merge Worker
5a24828f3e Merge "Add SELinux policy for Identity Credential HAL" am: a5527b4e46 am: 8924b794a7 am: 700b98a507
Change-Id: If6578fc781106395bd8e47b13aba4994d41ba986
2020-01-15 23:43:10 +00:00
Automerger Merge Worker
700b98a507 Merge "Add SELinux policy for Identity Credential HAL" am: a5527b4e46 am: 8924b794a7
Change-Id: Id058f8ff2777ea03cdd3100211607ab493ee407d
2020-01-15 23:32:39 +00:00
David Zeuthen
8924b794a7 Merge "Add SELinux policy for Identity Credential HAL"
am: a5527b4e46

Change-Id: I902e175a5d6aa8607018878bbc60cededb03144a
2020-01-15 15:22:15 -08:00
Treehugger Robot
a5527b4e46 Merge "Add SELinux policy for Identity Credential HAL" 2020-01-15 23:19:03 +00:00
Automerger Merge Worker
4f8e9f257c Merge "perf_event: rules for system and simpleperf domain" am: f644c547ad am: 4f21e1c26b am: a68dee04ff
Change-Id: I7c4dfad29bd386c8f10f14413ec6e1416a68c56d
2020-01-15 22:33:42 +00:00
Automerger Merge Worker
a68dee04ff Merge "perf_event: rules for system and simpleperf domain" am: f644c547ad am: 4f21e1c26b
Change-Id: If756d51ba6112f1a105bdc8a9792f25a290a4c54
2020-01-15 22:21:44 +00:00
Ryan Savitski
4f21e1c26b Merge "perf_event: rules for system and simpleperf domain"
am: f644c547ad

Change-Id: I7f89a1be41b2682571c9aeca129820405ad3c24c
2020-01-15 14:08:57 -08:00
Treehugger Robot
f644c547ad Merge "perf_event: rules for system and simpleperf domain" 2020-01-15 22:07:24 +00:00
Automerger Merge Worker
1db90863cc Merge "[SfStats] sepolicy for SfStats' global puller" am: 41a1b4af9c am: 317acd98e1 am: 9d274d6486
Change-Id: I198b61f10b4a2cb08778615005f64f8589e2a79b
2020-01-15 18:24:23 +00:00
Automerger Merge Worker
9d274d6486 Merge "[SfStats] sepolicy for SfStats' global puller" am: 41a1b4af9c am: 317acd98e1
Change-Id: I384a16a115814bf286d1d89a51edbb2af849087f
2020-01-15 18:11:11 +00:00
Alec Mouri
317acd98e1 Merge "[SfStats] sepolicy for SfStats' global puller"
am: 41a1b4af9c

Change-Id: I8575d4d1f503ed82b60644ffcff473e058db1b2f
2020-01-15 10:01:35 -08:00
Automerger Merge Worker
1d62c50908 Merge "access_vectors: re-organize common file perms" am: 679b417ccd am: 543e5033d5 am: df8ad145af
Change-Id: I097e5afa61bb6cf021b5efa1a51e8badae0dda84
2020-01-15 17:28:31 +00:00
Treehugger Robot
41a1b4af9c Merge "[SfStats] sepolicy for SfStats' global puller" 2020-01-15 17:25:54 +00:00
Automerger Merge Worker
df8ad145af Merge "access_vectors: re-organize common file perms" am: 679b417ccd am: 543e5033d5
Change-Id: I60aa18b8664c86c54bf423a97244187b8bf3582b
2020-01-15 17:13:50 +00:00
Stephen Smalley
543e5033d5 Merge "access_vectors: re-organize common file perms"
am: 679b417ccd

Change-Id: Ibd0465fa27cab4cee497aa008ddfebe21b22b899
2020-01-15 09:01:21 -08:00
Ryan Savitski
ffa0dd93f3 perf_event: rules for system and simpleperf domain
This patch adds the necessary rules to support the existing usage of
perf_event_open by the system partition, which almost exclusively
concerns the simpleperf profiler. A new domain is introduced for some
(but not all) executions of the system image simpleperf. The following
configurations are supported:
* shell -> shell process (no domain transition)
* shell -> debuggable app (through shell -> runas -> runas_app)
* shell -> profileable app (through shell -> simpleperf_app_runner ->
                            untrusted_app -> simpleperf)
* debuggable/profile app -> self (through untrusted_app -> simpleperf)

simpleperf_app_runner still enters the untrusted_app domain immediately
before exec to properly inherit the categories related to MLS. My
understanding is that a direct transition would require modifying
external/selinux and seapp_contexts as with "fromRunAs", which seems
unnecessarily complex for this case.

runas_app can still run side-loaded binaries and use perf_event_open,
but it checks that the target app is exactly "debuggable"
(profileability is insufficient).

system-wide profiling is effectively constrained to "su" on debug
builds.

See go/perf-event-open-security for a more detailed explanation of the
scenarios covered here.

Tested: "atest CtsSimpleperfTestCases" on crosshatch-user/userdebug
Tested: manual simpleperf invocations on crosshatch-userdebug
Bug: 137092007
Change-Id: I2100929bae6d81f336f72eff4235fd5a78b94066
2020-01-15 16:56:41 +00:00
Treehugger Robot
679b417ccd Merge "access_vectors: re-organize common file perms" 2020-01-15 16:49:04 +00:00
Automerger Merge Worker
1541693208 Merge "Allow apps to read ro.init.userspace_reboot.is_supported" am: edc513c8c1 am: ee35419be7 am: 4fdaef6cda
Change-Id: Id1fcacc3f2f22e720df9d2443f724603e2e0b892
2020-01-15 14:44:20 +00:00
Automerger Merge Worker
03aa611733 Merge "Allow init to configure dm_verity kernel driver." am: 4d33dc28e7 am: 5b2d5642d2 am: a004a7ec1e
Change-Id: I587d8ffa98a38c4dd176b1ef09f824e51e5e5b5d
2020-01-15 14:39:42 +00:00
Automerger Merge Worker
4fdaef6cda Merge "Allow apps to read ro.init.userspace_reboot.is_supported" am: edc513c8c1 am: ee35419be7
Change-Id: I4e880c424f3f212d125bd039fb800cd2b473559f
2020-01-15 14:23:55 +00:00
Automerger Merge Worker
a004a7ec1e Merge "Allow init to configure dm_verity kernel driver." am: 4d33dc28e7 am: 5b2d5642d2
Change-Id: I3c19753861d77b1c6ee0b05c680ec4f061394ced
2020-01-15 14:23:21 +00:00
Nikita Ioffe
ee35419be7 Merge "Allow apps to read ro.init.userspace_reboot.is_supported"
am: edc513c8c1

Change-Id: I726e07374146560fcffa5b4a82d13222c0b4d581
2020-01-15 06:18:05 -08:00
Nikita Ioffe
edc513c8c1 Merge "Allow apps to read ro.init.userspace_reboot.is_supported" 2020-01-15 14:14:08 +00:00
Martijn Coenen
5b2d5642d2 Merge "Allow init to configure dm_verity kernel driver."
am: 4d33dc28e7

Change-Id: I2cbeb857e434efc79e4938cdd4391b0f78d76701
2020-01-15 06:05:54 -08:00
Treehugger Robot
4d33dc28e7 Merge "Allow init to configure dm_verity kernel driver." 2020-01-15 13:13:01 +00:00
Automerger Merge Worker
67a8e67766 Merge "Allow zygote to bind mount /data/misc/profiles/cur" am: f9d45fc447 am: 0e391e2f5d am: 7f45479d29
Change-Id: I065e6da20893d852631e35b06750a6efb975f725
2020-01-15 05:53:32 +00:00
Automerger Merge Worker
7f45479d29 Merge "Allow zygote to bind mount /data/misc/profiles/cur" am: f9d45fc447 am: 0e391e2f5d
Change-Id: I94df07e8f18db65fb1d476bdf6ea82dd2bb967aa
2020-01-15 05:41:59 +00:00
Ricky Wai
0e391e2f5d Merge "Allow zygote to bind mount /data/misc/profiles/cur"
am: f9d45fc447

Change-Id: Ife70cc51bef3a75dc9932b5b87466a764dd775c4
2020-01-14 21:21:49 -08:00
Treehugger Robot
f9d45fc447 Merge "Allow zygote to bind mount /data/misc/profiles/cur" 2020-01-15 05:18:44 +00:00
Automerger Merge Worker
e48bab49ae Merge "Give fastbootd permission to mount and write to /metadata/gsi." am: 3914147f3a am: f6c43dcc2c am: f470024972
Change-Id: I26ee91dc8a512b5b6ec0664ebebf9bab1996210e
2020-01-15 01:49:55 +00:00
Automerger Merge Worker
f470024972 Merge "Give fastbootd permission to mount and write to /metadata/gsi." am: 3914147f3a am: f6c43dcc2c
Change-Id: I55d8db7c1961393932bcd34cfca7a0faffd53b8f
2020-01-15 01:37:29 +00:00
Yifan Hong
f6c43dcc2c Merge "Give fastbootd permission to mount and write to /metadata/gsi."
am: 3914147f3a

Change-Id: I20186cfcbf30643a8cae62b6f7ee1b586270d32b
2020-01-14 17:33:45 -08:00
Yifan Hong
3914147f3a Merge "Give fastbootd permission to mount and write to /metadata/gsi." 2020-01-15 01:31:59 +00:00
David Zeuthen
b8b5da4305 Add SELinux policy for Identity Credential HAL
Bug: 111446262
Test: VtsHalIdentityCredentialTargetTest
Change-Id: Icb5a0d8b24d463a2f1533f8dd3bfa84bf90acc6f
2020-01-14 20:13:39 -05:00
Stephen Smalley
cd62a4a56a access_vectors: re-organize common file perms
The open, audit_access, execmod, and watch* permissions
are all defined in the COMMON_FILE_PERMS in the kernel
classmap and inherited by all the file-related classes;
we can do the same in the policy by putting them into the
common file declaration.

refpolicy recently similarly reorganized its definitions and added the
watch* permissions to common file, see:
e5dbe75276
c656b97a28
3952ecb4dd

Adding new permissions to the end of the existing classes was only
required for kernels that predate the dynamic class/perm mapping
support (< v2.6.33).

Test: policy still builds

Change-Id: I44a2c3a94c21ed23410b6f807af7f1179e2c1747
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2020-01-14 14:59:08 -05:00
Nikita Ioffe
32e7ea0096 Allow apps to read ro.init.userspace_reboot.is_supported
This property essentially implements
PowerManager.isRebootingUserspaceSupported[0] public API, hence apps
should be able to read it.

[0]: 73cab34d9f:core/java/android/os/PowerManager.java;l=1397

Test: m checkbuild
Test: atest CtsUserspaceRebootHostSideTestCases
Test: adb shell getprop ro.init.userspace_reboot.is_supported
Bug: 135984674
Change-Id: I09cab09735760529de81eb6d5306f052ee408a6e
2020-01-14 12:39:23 +00:00
Ricky Wai
ca6e01aa53 Allow zygote to bind mount /data/misc/profiles/cur
Bug: 143937733
Test: No denials at boot
Test: No denials seen when creating moun
Change-Id: Ia6b196dde6ed511ebff53b03891122b1120fec07
2020-01-14 11:34:15 +00:00
Automerger Merge Worker
45382b2057 Merge "perf_event: define security class and access vectors" am: 184fe45549 am: a12c55ee73 am: 365f90f938
Change-Id: I56636ffc56d6ed3868b61b2c7f14be818895a879
2020-01-13 23:37:45 +00:00
Automerger Merge Worker
365f90f938 Merge "perf_event: define security class and access vectors" am: 184fe45549 am: a12c55ee73
Change-Id: I644340ea0a1e4db051eb459f1390cea59d4aacfb
2020-01-13 23:27:29 +00:00
Ryan Savitski
a12c55ee73 Merge "perf_event: define security class and access vectors"
am: 184fe45549

Change-Id: Iefd222b3f29c13ef777759496f8cf4f6a9c9455d
2020-01-13 15:13:06 -08:00
Treehugger Robot
184fe45549 Merge "perf_event: define security class and access vectors" 2020-01-13 23:10:54 +00:00
Automerger Merge Worker
7e632d902a SELinux changes for the hasSystemFeature() binder cache property. am: bafd0c762a am: 97ad022d1d am: dbd487c2e7
Change-Id: Ia80e3a2333b8609aed370602900027fea4d83259
2020-01-13 22:30:37 +00:00
Automerger Merge Worker
dbd487c2e7 SELinux changes for the hasSystemFeature() binder cache property. am: bafd0c762a am: 97ad022d1d
Change-Id: Icbf40e497472249958de62124b0edcbf390f2e7c
2020-01-13 22:19:18 +00:00
Lee Shombert
97ad022d1d SELinux changes for the hasSystemFeature() binder cache property.
am: bafd0c762a

Change-Id: I6970d9544db5fb7ef8b5fd449ae8ea523fe5d75e
2020-01-13 14:04:27 -08:00
Lee Shombert
bafd0c762a SELinux changes for the hasSystemFeature() binder cache property.
The binder_cache_system_server_prop context allows any user to read the
property but only the system_server to write it.  The only property with
this context is currently binder.cache_key.has_system_feature but users
will be added.

Bug: 140788621

Test: this was tested on an image with a binder cache implementation.  No
permission issues were found.  The implementation is not part of the current
commit.

Change-Id: I4c7c3ddf809ed947944408ffbbfc469d761a6043
2020-01-13 10:21:54 -08:00
Ryan Savitski
80640c536c perf_event: define security class and access vectors
This patch allows us to write SELinux policies for the
perf_event_open() syscall LSM hooks added to the kernel in the following
commit:
da97e18458

Bug: 137092007
Change-Id: I0005759eb7a487faebe94a4653e3865343eb441e
2020-01-13 14:56:54 +00:00
Automerger Merge Worker
0bb6f0b83c Merge "priv_app: Remove rules for system_update_service" am: 65d6fd48c8 am: 0b23084b9b am: 2cb6affdaf
Change-Id: I0c3c8970102b937db6c24447fff78dd6830e10c7
2020-01-11 01:34:50 +00:00
Automerger Merge Worker
2cb6affdaf Merge "priv_app: Remove rules for system_update_service" am: 65d6fd48c8 am: 0b23084b9b
Change-Id: I3582eb96f153a07a924efd7a0fe6de8646ee695a
2020-01-11 01:22:45 +00:00
Ashwini Oruganti
0b23084b9b Merge "priv_app: Remove rules for system_update_service"
am: 65d6fd48c8

Change-Id: I5314ae835872231bdd5fd1c140c4d917d503effe
2020-01-10 17:06:47 -08:00
Automerger Merge Worker
02f2820335 Merge "Allow adb forward to traced consumer socket" into qt-qpr1-dev am: 49807a6c26 am: 5872ab6c4b
Change-Id: I4966eeb820612b8c3a2bdb58ae80cc60e00f1c9a
2020-01-11 01:02:36 +00:00