Commit graph

16193 commits

Author SHA1 Message Date
David Ng
5a33163678 Explicitly allow system_server to (m)map data files am: 383471c267
am: 521ab8f556

Change-Id: Icec07febd479d85dd4caf9bafc81a6ab7ab9e444
2018-08-10 16:10:57 -07:00
Suren Baghdasaryan
c85ed76582 Selinux: Allow lmkd write access to sys.lmk. properties am: c8ed855ede
am: 4fd3aab93b

Change-Id: I1116837c319c4f9dbc2ac1a093a97f15a4fc07cd
2018-08-10 16:10:38 -07:00
Yifan Hong
562a0d2f97 Merge "Add sepolicy for health filesystem HAL" am: 3dd465a097
am: 33eee9c584

Change-Id: I84d7cc56ec9280957218357ed97c1ca606b24795
2018-08-10 16:10:17 -07:00
David Ng
521ab8f556 Explicitly allow system_server to (m)map data files
am: 383471c267

Change-Id: I8843a665df56b2eb13fc5ce4b65616f3c4e653d6
2018-08-10 14:35:54 -07:00
Suren Baghdasaryan
4fd3aab93b Selinux: Allow lmkd write access to sys.lmk. properties
am: c8ed855ede

Change-Id: I2e3fb5d56491237fe5e6084ad0f19cf61d6f44a3
2018-08-10 14:35:39 -07:00
Yifan Hong
33eee9c584 Merge "Add sepolicy for health filesystem HAL"
am: 3dd465a097

Change-Id: Id6d33270c8dccda7da78a11ec3ad52244adaf74b
2018-08-10 14:35:21 -07:00
David Ng
383471c267 Explicitly allow system_server to (m)map data files
Linux kernel 4.14+ SELinux starts explicit map
permission check for file mmap operations.  Add this
permission to system_server for data file access,
which is used in scenario such as "adb install" of
APK's.

test: no longer see SELinux map denial on "adb install"
Change-Id: Id6016dd0b3f15dfdb0f02509ea812dee61ac78ed
2018-08-10 20:56:45 +00:00
Suren Baghdasaryan
c8ed855ede Selinux: Allow lmkd write access to sys.lmk. properties
Allow lmkd write access to sys.lmk. properties to be able to set
sys.lmk.minfree_levels.

Bug: 111521182
Test: getprop sys.lmk.minfree_levels returns value set by lmkd
Change-Id: I86ff11d75917966857d3a76876a56799bb92a5ad
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
2018-08-10 20:05:46 +00:00
Yifan Hong
3dd465a097 Merge "Add sepolicy for health filesystem HAL" 2018-08-10 20:00:56 +00:00
Yifan Hong
0814795c79 Add sepolicy for health filesystem HAL
Test: builds
Test: vts
Bug: 111655771
Change-Id: Iabad3d124bf476cb624addf7d7898e0c2894d550
2018-08-10 11:02:21 -07:00
Chia-I Wu
f1166714d7 Allow signals to hal_graphics_allocator_server am: c3aec707f1
am: 43c6f49f7c

Change-Id: I6ad81a526adb868d534731bc8261f16b98203a13
2018-08-10 09:51:37 -07:00
Chia-I Wu
43c6f49f7c Allow signals to hal_graphics_allocator_server
am: c3aec707f1

Change-Id: I44f2de41cf57dd8f45441f0ad8325ad424485272
2018-08-10 09:47:33 -07:00
Chia-I Wu
c3aec707f1 Allow signals to hal_graphics_allocator_server
This is needed to dump ANR traces for the process.

Bug: 111604912
Test: adb shell am hang
Change-Id: Icadc2de95a12818fe623271d1afb955843ccddbf
2018-08-09 15:56:47 -07:00
Mathieu Chartier
4cf9153f60 Merge "Add missing pm.* properties in property_contexts" am: 291531ef46
am: 8ba7c62df2

Change-Id: Idd3dfa762a64fb12d7ac59bc31d8dbc0f439d7ff
2018-08-08 14:59:19 -07:00
Mathieu Chartier
8ba7c62df2 Merge "Add missing pm.* properties in property_contexts"
am: 291531ef46

Change-Id: I0561b2ee1a8dd4cf8bb0c3496e875202368331e8
2018-08-08 14:51:02 -07:00
Mathieu Chartier
291531ef46 Merge "Add missing pm.* properties in property_contexts" 2018-08-08 20:21:42 +00:00
Tri Vo
42253893a2 Update comment on same_process_hal_file type. am: d98b728e9f
am: 38aded30da

Change-Id: I5bd85cdda50155331df01a4369f564f44d0f7570
2018-08-08 12:29:45 -07:00
Mark Salyzyn
151642560d Merge "fs_mgr: add overlayfs handling for squashfs system filesystems" am: ccfffe6e0d
am: ae3410152b

Change-Id: I3ab42b9188cef685361143815c94109ab64c9b3f
2018-08-08 12:20:08 -07:00
Tri Vo
38aded30da Update comment on same_process_hal_file type.
am: d98b728e9f

Change-Id: I1b44ed6077ca32083feb243c37d79bdc51616792
2018-08-08 12:16:37 -07:00
Steven Moreland
36a1870885 Merge "Fix type of ro.kernel.qemu: int -> bool" am: 75ba5a42f3
am: f4414d31da

Change-Id: I163a4b1655193e9c18e24f9305e70122aa9762ea
2018-08-08 12:11:48 -07:00
Nick Kralevich
6ae170f5ae Remove legacy execmod access from API >= 26. am: f3eb985447
am: e5662c6513

Change-Id: I52a3b1722a7826fd3e4fc89d19fe1f66c6e1ce0f
2018-08-08 12:00:36 -07:00
Tri Vo
f5c784ccd9 Add support for RS vendor executables. am: dd253e9019
am: 671c8a0656

Change-Id: I70d684be9c0d6e8b12deca97f3c065e7d8f70e0a
2018-08-08 11:44:20 -07:00
Mark Salyzyn
ae3410152b Merge "fs_mgr: add overlayfs handling for squashfs system filesystems"
am: ccfffe6e0d

Change-Id: Ia4c9527cd8b025a25de3389f260e42dcc304e073
2018-08-08 11:36:45 -07:00
Nick Kralevich
78c13c31d4 Relax some neverallow rules am: bd3e300a13
am: d79567cad5

Change-Id: Id766bb180d9ebb8c1b385a4ead038b72221a9b38
2018-08-08 11:32:33 -07:00
Steven Moreland
f4414d31da Merge "Fix type of ro.kernel.qemu: int -> bool"
am: 75ba5a42f3

Change-Id: Id8d9d63734bbc812b42a98473802f7ae9cda1933
2018-08-08 11:29:33 -07:00
Nick Kralevich
e5662c6513 Remove legacy execmod access from API >= 26.
am: f3eb985447

Change-Id: If5acde15dcaf05e4d3271b0308a8e346c59f0d30
2018-08-08 11:22:06 -07:00
Tri Vo
671c8a0656 Add support for RS vendor executables.
am: dd253e9019

Change-Id: I136bbdd06b1fbd4b38329431c73139bcd3cf3d7b
2018-08-08 11:13:07 -07:00
Nick Kralevich
efbbb53b37 Revert "Remove legacy execmod access." am: d90d001a78
am: a213d958dd

Change-Id: I1cba2e601b7aa5f723411791784d62af08da3855
2018-08-08 11:06:54 -07:00
Nick Kralevich
d79567cad5 Relax some neverallow rules
am: bd3e300a13

Change-Id: I8e353fd200af7874f93a86134a81e05cd32cd289
2018-08-08 11:00:43 -07:00
Nick Kralevich
a213d958dd Revert "Remove legacy execmod access."
am: d90d001a78

Change-Id: I83bcb993913a764615e6ef2be3fc4a5cf82b767c
2018-08-08 10:43:50 -07:00
Shibin George
d27b8612df Add missing pm.* properties in property_contexts
Certain pm.* properties, which are especially needed for
Go-targets, are not listed in property_contexts.
Init will not be able to set these properties on bootup
without the correct selinux contexts assigned to the
properties.

BUG: 111738816

Test: In selinux-enforcing mode, on bootup, these
      properties are now correctly set by init.

Change-Id: I6ea0fb229c93725e2987b1e021d5804a132d093d
2018-08-08 17:07:56 +00:00
Tri Vo
d98b728e9f Update comment on same_process_hal_file type.
Test: n/a
Change-Id: I929772fa36da6b96494d14cfa48b47dcc76cccd4
2018-08-08 17:03:03 +00:00
Treehugger Robot
ccfffe6e0d Merge "fs_mgr: add overlayfs handling for squashfs system filesystems" 2018-08-08 16:45:18 +00:00
Steven Moreland
75ba5a42f3 Merge "Fix type of ro.kernel.qemu: int -> bool" 2018-08-08 16:24:55 +00:00
Mark Salyzyn
9b398f3fb7 fs_mgr: add overlayfs handling for squashfs system filesystems
/cache/overlay directory in support of overlayfs mounts on userdebug
and eng devices.  Overlayfs in turn can be capable of supporting
adb remount for read-only or restricted-storage filesystems like
squashfs or right-sized (zero free space) system partitions
respectively.

Test: compile
Bug: 109821005
Bug: 110985612
Change-Id: I3ece03886db7cc97f864497cf93ec6c6c39bccd1
2018-08-08 07:33:10 -07:00
Xin Li
d4b7a5e807 Merge Android Pie into master am: c05fa1a5cf
am: 10f871b045

Change-Id: I04228f6ec706a9c0ed8291eea8f8fe4590c6c857
2018-08-07 19:18:08 -07:00
Nick Kralevich
f3eb985447 Remove legacy execmod access from API >= 26.
Text relocation support was removed from the linker for apps targeting
API >= 23. See
https://android.googlesource.com/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23

However, the security policy was not updated to remove the execmod
permission at that time, since we didn't have support for targeting
SELinux policies to API versions.

Remove execmod permissions for apps targeting API 26 or greater. The
linker support was removed, so it's pointless to keep around the SELinux
permissions.

Retain execmod support for apps targeting API 25 or lower. While in
theory we could remove support for API 23-25, that would involve the
introduction of a new SELinux domain (and the associated rule
explosion), which I would prefer to avoid.

This change helps protect application executable code from modification,
enforcing W^X properties on executable code pages loaded from files.
https://en.wikipedia.org/wiki/W%5EX

Test: auditallow rules were added and nothing triggered for apps
      targeting API >= 26. Code compiles and device boots.
Bug: 111544476

Change-Id: Iab9a0bd297411e99699e3651c110e57eb02a3a41
2018-08-08 01:39:09 +00:00
Tri Vo
dd253e9019 Add support for RS vendor executables.
/vendor/bin/bcc being a dependency of renderscript should be labeled as
same_process_hal_file. To facilitate that we relax neverallow rules for
executing same_process_hal_file from coredomain.

See details on /vendor/bin/bcc:
https://source.android.com/devices/architecture/vndk/renderscript

Bug: n/a
Test: build-time change
Change-Id: Ie996fb863090bf08b3d3ef653da827d0b22937d7
2018-08-07 23:05:08 +00:00
Xin Li
10f871b045 Merge Android Pie into master
am: c05fa1a5cf

Change-Id: Ic2bf1a3017cf7d3dbb99fe7dde7c66972ead7cf3
2018-08-07 15:49:00 -07:00
Steven Moreland
c8ba909117 Fix type of ro.kernel.qemu: int -> bool
Bug: N/A
Test: boot
Change-Id: I67e3554383977c3fb5e89f236838a9cb39fb257e
2018-08-07 14:03:56 -07:00
Nick Kralevich
bd3e300a13 Relax some neverallow rules
Kernels above 4.14 have a new mmap permission. However, neverallow rules
exclude the use of mmap, even when file FDs are passable across the
vendor/non-vendor boundary. Since we allow reading / writing of passed
file descriptors, also allow the use of mmap for passed file
descriptors.

Bug: 112171217
Test: policy compiles
Change-Id: I8176f86960bdff0cf5de770809510e9df5d62db9
2018-08-07 13:47:36 -07:00
Gao Xiang
f9fc873e5c Merge "fs_use: Enabled loading security xattrs for erofs" am: 0860253239
am: be23064cb5

Change-Id: Ib7331ac2aa43dac03bccc129747fdc41c4126744
2018-08-07 11:13:52 -07:00
Tom Cherry
9be120a935 Merge "Second stage init is on system" am: 07dfaec076
am: 6c53b7b265

Change-Id: Ia6bb04b962bb1301f70e83f9141ddecda2ce3803
2018-08-07 11:09:03 -07:00
Gao Xiang
be23064cb5 Merge "fs_use: Enabled loading security xattrs for erofs"
am: 0860253239

Change-Id: Ic7547db41d7269a8961423cd61ed27d3a8c6d6ad
2018-08-07 10:54:04 -07:00
Tom Cherry
6c53b7b265 Merge "Second stage init is on system"
am: 07dfaec076

Change-Id: I0fdcb2ea509b8de1133fce686034713f009c68e7
2018-08-07 10:48:16 -07:00
Nick Kralevich
d90d001a78 Revert "Remove legacy execmod access."
This reverts commit 0f11ffccf9.

Reason for revert: libmono crashes

Bug: 112292089
Bug: 111544476
Test: policy compiles, device boots
Change-Id: I064090aa9337cf17b80cd2c9af9342df851a3b27
2018-08-07 17:03:07 +00:00
Xin Li
c05fa1a5cf Merge Android Pie into master
Bug: 112104996
Change-Id: Icf411d8b04e12dd33dd82a26328b4156585cb5ff
2018-08-07 09:46:55 -07:00
Treehugger Robot
0860253239 Merge "fs_use: Enabled loading security xattrs for erofs" 2018-08-07 16:09:53 +00:00
Tom Cherry
07dfaec076 Merge "Second stage init is on system" 2018-08-07 16:08:55 +00:00
Gao Xiang
910cd95354 fs_use: Enabled loading security xattrs for erofs
Bug: 112292714
Change-Id: I0026c13fd4335e0365496bc00c26021d83f3c39d
Signed-off-by: Gao Xiang <gaoxiang25@huawei.com>
2018-08-07 22:13:12 +08:00