Commit graph

17905 commits

Author SHA1 Message Date
Yiwei Zhang
30287cfbf1 Merge "Game Driver: sepolicy update for plumbing GpuStats into GpuService"
am: 64c8df4a54

Change-Id: I131d279b503c948d9d894ffcd99eedb0349d9f44
2019-02-11 10:10:09 -08:00
Treehugger Robot
64c8df4a54 Merge "Game Driver: sepolicy update for plumbing GpuStats into GpuService" 2019-02-11 18:03:50 +00:00
Tri Vo
fa2c6ed718 Merge "Restore ephemeral app access to /dev/ashmem"
am: 5358ac5eee

Change-Id: I1c22fedaee54bcc80a948aade564597a1526ded4
2019-02-09 12:39:00 -08:00
Tri Vo
5358ac5eee Merge "Restore ephemeral app access to /dev/ashmem" 2019-02-09 20:28:16 +00:00
Andreas Gampe
9020d74f24 Merge "Sepolicy: Give apexd permission for mounton"
am: c4bf8f26a0

Change-Id: I318484c452e9aa51e61114f4e59301e4eafe0708
2019-02-09 01:52:02 -08:00
Treehugger Robot
c4bf8f26a0 Merge "Sepolicy: Give apexd permission for mounton" 2019-02-09 09:41:34 +00:00
Nick Kralevich
e049aec29c Merge "allow runas_app untrusted_app_all:unix_stream_socket connectto"
am: cb2a226ada

Change-Id: I7553a5d4a6409afbfa15924b7779a92bd4cc4452
2019-02-08 18:41:50 -08:00
android-build-team Robot
362a69242b Snap for 5180536 from 6308216c6c to pi-platform-release
Change-Id: I33e5f51b0f017c963eed8cb78bd493d58021d27e
2019-02-09 02:36:06 +00:00
Treehugger Robot
cb2a226ada Merge "allow runas_app untrusted_app_all:unix_stream_socket connectto" 2019-02-09 02:26:39 +00:00
Yiwei Zhang
544d6b34ec Game Driver: sepolicy update for plumbing GpuStats into GpuService
Allow all the app process with GUI to send GPU health metrics stats to
GpuService during the GraphicsEnvironment setup stage for the process.

Bug: 123529932
Test: Build, flash and boot. No selinux denials.
Change-Id: Ic7687dac3c8a3ea43fa744a6ae8a45716951c4df
2019-02-08 18:15:17 -08:00
Tri Vo
1ded205bd2 Restore ephemeral app access to /dev/ashmem
Bug: 124061057
Test: m selinux_policy
Test: vimeo aia launches
Change-Id: I8b49675c35a227737418c1b85c410bfac0e7e584
2019-02-08 17:20:40 -08:00
David Anderson
5d425d11c0 Merge "Allow e2fs more ioctls to device-mapper devices."
am: d703c8f3b9

Change-Id: If623c1c689f653f36abbc396abe2e39e8e07a324
2019-02-08 16:58:08 -08:00
David Anderson
d703c8f3b9 Merge "Allow e2fs more ioctls to device-mapper devices." 2019-02-09 00:49:42 +00:00
Sudheer Shanka
8c93e1cfa2 Merge "Allow zygote to create dirs under /mnt/user/*."
am: 53713d5d9a

Change-Id: Ie67bc67b2e3d8e916d7ce83b4ff502021a625c32
2019-02-08 16:47:05 -08:00
Sudheer Shanka
53713d5d9a Merge "Allow zygote to create dirs under /mnt/user/*." 2019-02-08 23:49:58 +00:00
Henry Fang
a372b98b44 Change sepolicy to allow cas@1.1 service
am: 1f1e36069d

Change-Id: I58fb6aab09b43f00d663793d52dd8ce5622eb4bd
2019-02-08 15:27:11 -08:00
Henry Fang
1f1e36069d Change sepolicy to allow cas@1.1 service
Modify sepolicy configure file, so that cas@1.1 service can run
Test: Manual
bug: 124016538

Change-Id: I0b160bc1c575aa18ffead7ff136509fc9dcfb472
Merged-In: I142a6cd66a81ad9e0c8b4d87da672fb8f5c181d6
2019-02-08 22:05:25 +00:00
Andreas Gampe
742ac5561c Sepolicy: Give apexd permission for mounton
To not propagate any changes by APEX hooks, apexd remounts /
private.

Bug: 119260955
Bug: 119261380
Test: atest apexservice_test
Change-Id: I19aebc9c1562d8c4e4fedf36eb79826291b6ee61
2019-02-08 13:12:18 -08:00
Sudheer Shanka
176c91cc19 Allow zygote to create dirs under /mnt/user/*.
Bug: 124058579
Test: manual
Change-Id: I5b6736544cc8ffc9fd823834fe0edb7a388c6cf0
2019-02-08 12:01:50 -08:00
Nick Kralevich
bafea958fb allow runas_app untrusted_app_all:unix_stream_socket connectto
system/sepolicy commit ffa2b61330
introduced the runas_app SELinux domain, which changed how we perform
debugging and profiling of Android applications. This broke Android
Studio's profiling tool.

Android Studio's profiling tool has the run-as spawned application
connect to an app created unix domain sockets in the
abstract namespace.

Note: this differs from system/sepolicy commit
3e5668f173, which allows connections in
the reverse direction (from app to runas_app). That change (b/123297648)
was made for a different part of Android Studio, Android Studio Instant
Run.

Addresses the following denial:

2019-02-08 00:59:14.563 15560-15560/? W/connector: type=1400 audit(0.0:645): avc: denied { connectto } for path=00436C69656E74 scontext=u:r:runas_app:s0:c188,c256,c512,c768 tcontext=u:r:untrusted_app_27:s0:c188,c256,c512,c768 tclass=unix_stream_socket permissive=0 app=com.example.hellojni

(hex decode of 00436C69656E74 is "Client")

2019-01-31 17:25:16.060 19975-19975/? W/transport: type=1400 audit(0.0:8146): avc: denied { connectto } for path=00416E64726F696453747564696F5472616E73706F72744167656E743139383839 scontext=u:r:runas_app:s0:c512,c768 tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=unix_stream_socket permissive=0 app=com.example.android.displayingbitmaps

(hex decode of
00416E64726F696453747564696F5472616E73706F72744167656E743139383839
is "AndroidStudioTransportAgent19889")

Bug: 120445954
Test: manual
Change-Id: I9ca1c338dcbc75cb3fbd7bf93a348f9276363dc1
2019-02-08 11:35:50 -08:00
David Anderson
300d0ef2c5 Full sepolicy for gsid.
am: db90b91ea0

Change-Id: I0e827f6b63f042a7a06b0dadeaf6a801a3cef30b
2019-02-07 22:10:29 -08:00
David Anderson
db90b91ea0 Full sepolicy for gsid.
Bug: 122556707
Test: manual test
Change-Id: I2536deefb3aa75deee4aeae7df074349b705b0f0
2019-02-08 05:56:58 +00:00
Daniel Rosenberg
3e40a3c938 Allow update_verifier to call checkpointing
am: 650981d2a8

Change-Id: I9f4e86f8c0a78be8899395df2afa5e05d927762d
2019-02-07 17:49:34 -08:00
Daniel Rosenberg
650981d2a8 Allow update_verifier to call checkpointing
This lets update_verifier call supportsCheckpoint to defer marking the
boot as successful when we may end up failing before we would commit
the checkpoint. In this case, we will mark the boot as successful just
before committing the checkpoint.

Test: Check that marking the boot as succesful was deferred in
      update_verifier, and done later on.
Change-Id: I9b4f3dd607ff5301860e78f4604b600b4ee416b7
2019-02-08 00:19:28 +00:00
Tri Vo
54ce1f9e94 Merge "Build product hashes together."
am: c74699105c

Change-Id: If283c0093751e29022c68603083ae23a74c39a01
2019-02-07 14:46:46 -08:00
Tri Vo
c74699105c Merge "Build product hashes together." 2019-02-07 22:39:02 +00:00
Jeff Vander Stoep
949efb86c5 Merge "crash_dump: suppress denials on properties"
am: 30fabbf50e

Change-Id: I8b4adc7181ce4fd76c8b36aa61432bb3286cd514
2019-02-07 12:33:52 -08:00
Treehugger Robot
30fabbf50e Merge "crash_dump: suppress denials on properties" 2019-02-07 20:19:19 +00:00
Tri Vo
24a5587594 Build product hashes together.
Simplifies our reasoning about product hashes. They are either
present on both sides of the Treble boundary or not.

Might be worth installing all four hashes unconditionally in the future.

Fixes: 123996710
Test: boot taimen, precompiled policy loaded
Change-Id: I749e4b0cc4c85870407a10b7d41a2e2001a75ffb
2019-02-07 10:55:23 -08:00
Sudheer Shanka
40a245c336 Merge "Allow zygote to mounton /mnt/user/*."
am: 310b7fd9b3

Change-Id: I273ba63b03d1ee79f05e76a6ce880aae4e15dda0
2019-02-07 10:49:06 -08:00
Sudheer Shanka
310b7fd9b3 Merge "Allow zygote to mounton /mnt/user/*." 2019-02-07 18:45:05 +00:00
Mark Salyzyn
05d343aad9 Merge "fs_mgr: overlayfs support legacy devices (marlin)"
am: 969af6966b

Change-Id: I6ba081f911be48380eb3cb53dc67a32648845a2d
2019-02-07 10:17:22 -08:00
Mark Salyzyn
969af6966b Merge "fs_mgr: overlayfs support legacy devices (marlin)" 2019-02-07 18:03:55 +00:00
Jeff Vander Stoep
44f06601e8 crash_dump: suppress denials on properties
Addresses:
avc: denied { read } for comm="crash_dump64"
name="u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=17280
scontext=u:r:crash_dump:s0 tcontext=u:object_r:bluetooth_prop:s0
tclass=file

Test: build
Change-Id: I176038ea6add34b5277305073a20f9c1a930e74b
2019-02-07 08:45:15 -08:00
Joel Fernandes
b80724d882 Merge "Add permissions for sys.use_memfd property"
am: f6085fefe6

Change-Id: Ief976058f90c94b80569435610fb3a293da6ac1d
2019-02-07 06:24:10 -08:00
Joel Fernandes
f6085fefe6 Merge "Add permissions for sys.use_memfd property" 2019-02-07 14:17:13 +00:00
Joel Galenson
68fa5e936d Merge "Hide denial seen during boot."
am: 099347178d

Change-Id: I59af13cb473f3f5167dfd70bf7698c10b2374496
2019-02-06 23:07:06 -08:00
Treehugger Robot
099347178d Merge "Hide denial seen during boot." 2019-02-07 06:58:28 +00:00
Joel Galenson
b9eba65808 Merge "Hide denial seen during boot."
am: 513065c195

Change-Id: Ic9e85c4fb31b378ac0545a198a47962a87a43c06
2019-02-06 22:46:38 -08:00
Treehugger Robot
513065c195 Merge "Hide denial seen during boot." 2019-02-07 06:35:22 +00:00
Nick Kralevich
0897a8a372 Merge "allow untrusted_app_all system_linker_exec:file execute_no_trans"
am: 60f11d0861

Change-Id: I31d3d84c9a61c884cc70ee82b49b2361c4b813e0
2019-02-06 17:03:25 -08:00
Treehugger Robot
60f11d0861 Merge "allow untrusted_app_all system_linker_exec:file execute_no_trans" 2019-02-07 00:51:31 +00:00
Carmen Jackson
3908f9d7c3 Allow the init process to execute the notify_traceur.sh script
am: 07cb0ded7b

Change-Id: I723ec870b13f0fd498a2a6e01b45d6576f17bbcc
2019-02-06 16:38:22 -08:00
Carmen Jackson
07cb0ded7b Allow the init process to execute the notify_traceur.sh script
This sets up a selinux domain (notify_traceur) that can be called from
init and has the permissions to run the activitymanager script.

Bug: 116754134
Test: manual
Change-Id: Ia371bafe5d3d354efdf8cd29365cd74ed3e5cdfd
2019-02-07 00:28:40 +00:00
Joel Galenson
fb0ab2e14e Hide denial seen during boot.
Test: Build.
Change-Id: Iae56f10eb4257bb0970906cb77b19d0b00c9d2be
2019-02-06 15:32:58 -08:00
Chenjie Yu
5278613fad Merge "active metric dir for statsd"
am: 0cb6b7be10

Change-Id: Ib43db77ee6a126b65e348f2eead55b635035f6f8
2019-02-06 15:26:56 -08:00
Sudheer Shanka
21095967f8 Allow zygote to mounton /mnt/user/*.
Bug: 124009234
Test: manual
Change-Id: Ia06506f5dbdacbb5e6e3c1b2bee7f58dec0ed0e7
2019-02-06 15:18:51 -08:00
Treehugger Robot
0cb6b7be10 Merge "active metric dir for statsd" 2019-02-06 23:17:07 +00:00
Nick Kralevich
9ea8c0701d allow untrusted_app_all system_linker_exec:file execute_no_trans
Chrome Crashpad uses the the dynamic linker to load native executables
from an APK (b/112050209, crbug.com/928422)

Addresses the following denial:

  avc: denied { execute_no_trans } for comm="Chrome_IOThread" path="/bionic/bin/linker" dev="loop5" ino=24 scontext=u:r:untrusted_app_27:s0:c106,c256,c512,c768 tcontext=u:object_r:system_linker_exec:s0 tclass=file permissive=0 app=com.android.chrome

Test: compiles and builds.
Change-Id: I14f80592a74c36754c28313e94399258b2c42170
2019-02-06 13:19:19 -08:00
Joel Galenson
d3aed93575 Hide denial seen during boot.
Test: Build.
Change-Id: Ic365b3faf107f15bf27987ca6162f478a3bf8ebd
2019-02-06 12:49:26 -08:00