Commit graph

23013 commits

Author SHA1 Message Date
David Zeuthen
91c15d1bc2 Merge "Fix spelling of 'system' for android.hardware.identity@1.0-service.example"
am: 89277a412d

Change-Id: Ifd1270d6fc278aaae44159140ce1165d1c9531d8
2020-01-16 10:47:10 -08:00
Treehugger Robot
89277a412d Merge "Fix spelling of 'system' for android.hardware.identity@1.0-service.example" 2020-01-16 18:43:34 +00:00
TreeHugger Robot
e141b5713a Merge "DO NOT MERGE - Merge qt-qpr1-dev-plus-aosp-without-vendor (6129114) into stage-aosp-master" into stage-aosp-master 2020-01-16 18:29:20 +00:00
Joshua Duong
ab5895c272 Merge "Allow adbd to set/get persist.adb props, system_server to get."
am: bda9c33ab1

Change-Id: I137ad8e14720729fd5ace7f6d5fef58dee324580
2020-01-16 09:56:58 -08:00
Joshua Duong
bda9c33ab1 Merge "Allow adbd to set/get persist.adb props, system_server to get." 2020-01-16 17:43:39 +00:00
Jeff Vander Stoep
557a90196b Merge "system_server: TelephonyManager reads /proc/cmdline"
am: 834c964d66

Change-Id: I136556f053bd3ad8097278c0d7c7cf05b5e7d56d
2020-01-16 08:02:38 -08:00
Treehugger Robot
834c964d66 Merge "system_server: TelephonyManager reads /proc/cmdline" 2020-01-16 15:52:02 +00:00
Mark Salyzyn
caccc38181 Merge "llkd: requires sys_admin permissions"
am: 8943f24f02

Change-Id: Ife2cab2e62b83b75dc008330ddca18f84afc3e4a
2020-01-16 05:07:01 -08:00
Treehugger Robot
8943f24f02 Merge "llkd: requires sys_admin permissions" 2020-01-16 12:57:26 +00:00
Howard Yen
5b62692346 Merge "Add sepolicy for usb gadget hal v1.1"
am: a1f829d3f8

Change-Id: Id3c054560ef4c0146b772b49601ee5feac4a63d5
2020-01-16 03:03:11 -08:00
Treehugger Robot
a1f829d3f8 Merge "Add sepolicy for usb gadget hal v1.1" 2020-01-16 11:01:35 +00:00
Howard Chen
15c1889f1e Merge "Allow gsid to create subdirectories under /metadata/gsi/dsu"
am: 8b5a90a5e4

Change-Id: I995519f2aca3c10c145ff46750cc5f959447ccde
2020-01-15 22:01:48 -08:00
Howard Chen
8b5a90a5e4 Merge "Allow gsid to create subdirectories under /metadata/gsi/dsu" 2020-01-16 05:33:09 +00:00
Kenny Root
4e4bb65056 Merge "Add rebootescrow default HAL rules"
am: 1145b90b69

Change-Id: Id7d5053ead064a972470ef7edf399836aab55dab
2020-01-15 17:09:28 -08:00
Treehugger Robot
1145b90b69 Merge "Add rebootescrow default HAL rules" 2020-01-16 00:24:59 +00:00
David Zeuthen
05ade22c65 Fix spelling of 'system' for android.hardware.identity@1.0-service.example
Bug: 111446262
Test: Manually
Change-Id: I37764f0ed580b4242e02c1958eabed88957adfd1
2020-01-15 19:05:24 -05:00
Xin Li
4761718f0b DO NOT MERGE - Merge qt-qpr1-dev-plus-aosp-without-vendor (6129114) into stage-aosp-master
Bug: 146167222
Change-Id: I69802ecf86d5fa9957745ecfde4ce3e22545039f
2020-01-15 15:57:33 -08:00
David Zeuthen
8924b794a7 Merge "Add SELinux policy for Identity Credential HAL"
am: a5527b4e46

Change-Id: I902e175a5d6aa8607018878bbc60cededb03144a
2020-01-15 15:22:15 -08:00
Treehugger Robot
a5527b4e46 Merge "Add SELinux policy for Identity Credential HAL" 2020-01-15 23:19:03 +00:00
Ryan Savitski
4f21e1c26b Merge "perf_event: rules for system and simpleperf domain"
am: f644c547ad

Change-Id: I7f89a1be41b2682571c9aeca129820405ad3c24c
2020-01-15 14:08:57 -08:00
Treehugger Robot
f644c547ad Merge "perf_event: rules for system and simpleperf domain" 2020-01-15 22:07:24 +00:00
Kenny Root
70c40e05f3 Add rebootescrow default HAL rules
Bug: 63928581
Test: build and check HAL label
Change-Id: I057b26eb20c5a6b022c7f391a6c8535f2953051c
2020-01-15 13:14:35 -08:00
Joshua Duong
4bec0691d8 Allow adbd to set/get persist.adb props, system_server to get.
Bug: b/111434128

Test: getprop persist.adb.wifi.guid
Change-Id: If211c2d00724f62a201dd9c19afc9e894001069f
2020-01-15 10:38:11 -08:00
Alec Mouri
317acd98e1 Merge "[SfStats] sepolicy for SfStats' global puller"
am: 41a1b4af9c

Change-Id: I8575d4d1f503ed82b60644ffcff473e058db1b2f
2020-01-15 10:01:35 -08:00
Treehugger Robot
41a1b4af9c Merge "[SfStats] sepolicy for SfStats' global puller" 2020-01-15 17:25:54 +00:00
Stephen Smalley
543e5033d5 Merge "access_vectors: re-organize common file perms"
am: 679b417ccd

Change-Id: Ibd0465fa27cab4cee497aa008ddfebe21b22b899
2020-01-15 09:01:21 -08:00
Ryan Savitski
ffa0dd93f3 perf_event: rules for system and simpleperf domain
This patch adds the necessary rules to support the existing usage of
perf_event_open by the system partition, which almost exclusively
concerns the simpleperf profiler. A new domain is introduced for some
(but not all) executions of the system image simpleperf. The following
configurations are supported:
* shell -> shell process (no domain transition)
* shell -> debuggable app (through shell -> runas -> runas_app)
* shell -> profileable app (through shell -> simpleperf_app_runner ->
                            untrusted_app -> simpleperf)
* debuggable/profile app -> self (through untrusted_app -> simpleperf)

simpleperf_app_runner still enters the untrusted_app domain immediately
before exec to properly inherit the categories related to MLS. My
understanding is that a direct transition would require modifying
external/selinux and seapp_contexts as with "fromRunAs", which seems
unnecessarily complex for this case.

runas_app can still run side-loaded binaries and use perf_event_open,
but it checks that the target app is exactly "debuggable"
(profileability is insufficient).

system-wide profiling is effectively constrained to "su" on debug
builds.

See go/perf-event-open-security for a more detailed explanation of the
scenarios covered here.

Tested: "atest CtsSimpleperfTestCases" on crosshatch-user/userdebug
Tested: manual simpleperf invocations on crosshatch-userdebug
Bug: 137092007
Change-Id: I2100929bae6d81f336f72eff4235fd5a78b94066
2020-01-15 16:56:41 +00:00
Treehugger Robot
679b417ccd Merge "access_vectors: re-organize common file perms" 2020-01-15 16:49:04 +00:00
Mark Salyzyn
37daf9f48e llkd: requires sys_admin permissions
As a result of commit f8a00cef17206ecd1b30d3d9f99e10d9fa707aa7
("proc: restrict kernel stack dumps to root")
the userdebug feature where llkd can monitor for live lock
signatures in the stack traces broke.

So now userdebug variant of llkd requires sys_admin permissions.

Signed-off-by: Mark Salyzyn <salyzyn@google.com>
Test: llkd_unit_test
Bug: 147486902
Change-Id: I31572afa08daa490a69783855bce55313eaed96c
2020-01-15 08:08:59 -08:00
Nikita Ioffe
ee35419be7 Merge "Allow apps to read ro.init.userspace_reboot.is_supported"
am: edc513c8c1

Change-Id: I726e07374146560fcffa5b4a82d13222c0b4d581
2020-01-15 06:18:05 -08:00
Nikita Ioffe
edc513c8c1 Merge "Allow apps to read ro.init.userspace_reboot.is_supported" 2020-01-15 14:14:08 +00:00
Martijn Coenen
5b2d5642d2 Merge "Allow init to configure dm_verity kernel driver."
am: 4d33dc28e7

Change-Id: I2cbeb857e434efc79e4938cdd4391b0f78d76701
2020-01-15 06:05:54 -08:00
Treehugger Robot
4d33dc28e7 Merge "Allow init to configure dm_verity kernel driver." 2020-01-15 13:13:01 +00:00
Howard Yen
a98cdefad6 Add sepolicy for usb gadget hal v1.1
Bug: 147645728
Test: build pass and service running correctly
Change-Id: I52b6bcae2c05998e3f22c39998597e2ecef55036
2020-01-15 16:44:39 +08:00
Ricky Wai
0e391e2f5d Merge "Allow zygote to bind mount /data/misc/profiles/cur"
am: f9d45fc447

Change-Id: Ife70cc51bef3a75dc9932b5b87466a764dd775c4
2020-01-14 21:21:49 -08:00
Treehugger Robot
f9d45fc447 Merge "Allow zygote to bind mount /data/misc/profiles/cur" 2020-01-15 05:18:44 +00:00
Yifan Hong
f6c43dcc2c Merge "Give fastbootd permission to mount and write to /metadata/gsi."
am: 3914147f3a

Change-Id: I20186cfcbf30643a8cae62b6f7ee1b586270d32b
2020-01-14 17:33:45 -08:00
Yifan Hong
3914147f3a Merge "Give fastbootd permission to mount and write to /metadata/gsi." 2020-01-15 01:31:59 +00:00
David Zeuthen
b8b5da4305 Add SELinux policy for Identity Credential HAL
Bug: 111446262
Test: VtsHalIdentityCredentialTargetTest
Change-Id: Icb5a0d8b24d463a2f1533f8dd3bfa84bf90acc6f
2020-01-14 20:13:39 -05:00
Stephen Smalley
cd62a4a56a access_vectors: re-organize common file perms
The open, audit_access, execmod, and watch* permissions
are all defined in the COMMON_FILE_PERMS in the kernel
classmap and inherited by all the file-related classes;
we can do the same in the policy by putting them into the
common file declaration.

refpolicy recently similarly reorganized its definitions and added the
watch* permissions to common file, see:
e5dbe75276
c656b97a28
3952ecb4dd

Adding new permissions to the end of the existing classes was only
required for kernels that predate the dynamic class/perm mapping
support (< v2.6.33).

Test: policy still builds

Change-Id: I44a2c3a94c21ed23410b6f807af7f1179e2c1747
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2020-01-14 14:59:08 -05:00
Nikita Ioffe
32e7ea0096 Allow apps to read ro.init.userspace_reboot.is_supported
This property essentially implements
PowerManager.isRebootingUserspaceSupported[0] public API, hence apps
should be able to read it.

[0]: 73cab34d9f:core/java/android/os/PowerManager.java;l=1397

Test: m checkbuild
Test: atest CtsUserspaceRebootHostSideTestCases
Test: adb shell getprop ro.init.userspace_reboot.is_supported
Bug: 135984674
Change-Id: I09cab09735760529de81eb6d5306f052ee408a6e
2020-01-14 12:39:23 +00:00
Ricky Wai
ca6e01aa53 Allow zygote to bind mount /data/misc/profiles/cur
Bug: 143937733
Test: No denials at boot
Test: No denials seen when creating moun
Change-Id: Ia6b196dde6ed511ebff53b03891122b1120fec07
2020-01-14 11:34:15 +00:00
Ryan Savitski
a12c55ee73 Merge "perf_event: define security class and access vectors"
am: 184fe45549

Change-Id: Iefd222b3f29c13ef777759496f8cf4f6a9c9455d
2020-01-13 15:13:06 -08:00
Treehugger Robot
184fe45549 Merge "perf_event: define security class and access vectors" 2020-01-13 23:10:54 +00:00
Lee Shombert
97ad022d1d SELinux changes for the hasSystemFeature() binder cache property.
am: bafd0c762a

Change-Id: I6970d9544db5fb7ef8b5fd449ae8ea523fe5d75e
2020-01-13 14:04:27 -08:00
Lee Shombert
bafd0c762a SELinux changes for the hasSystemFeature() binder cache property.
The binder_cache_system_server_prop context allows any user to read the
property but only the system_server to write it.  The only property with
this context is currently binder.cache_key.has_system_feature but users
will be added.

Bug: 140788621

Test: this was tested on an image with a binder cache implementation.  No
permission issues were found.  The implementation is not part of the current
commit.

Change-Id: I4c7c3ddf809ed947944408ffbbfc469d761a6043
2020-01-13 10:21:54 -08:00
Ryan Savitski
80640c536c perf_event: define security class and access vectors
This patch allows us to write SELinux policies for the
perf_event_open() syscall LSM hooks added to the kernel in the following
commit:
da97e18458

Bug: 137092007
Change-Id: I0005759eb7a487faebe94a4653e3865343eb441e
2020-01-13 14:56:54 +00:00
Automerger Merge Worker
2cb6affdaf Merge "priv_app: Remove rules for system_update_service" am: 65d6fd48c8 am: 0b23084b9b
Change-Id: I3582eb96f153a07a924efd7a0fe6de8646ee695a
2020-01-11 01:22:45 +00:00
Ashwini Oruganti
0b23084b9b Merge "priv_app: Remove rules for system_update_service"
am: 65d6fd48c8

Change-Id: I5314ae835872231bdd5fd1c140c4d917d503effe
2020-01-10 17:06:47 -08:00
Ashwini Oruganti
65d6fd48c8 Merge "priv_app: Remove rules for system_update_service" 2020-01-11 00:49:14 +00:00