Commit graph

3227 commits

Author SHA1 Message Date
David Anderson
300d0ef2c5 Full sepolicy for gsid.
am: db90b91ea0

Change-Id: I0e827f6b63f042a7a06b0dadeaf6a801a3cef30b
2019-02-07 22:10:29 -08:00
David Anderson
db90b91ea0 Full sepolicy for gsid.
Bug: 122556707
Test: manual test
Change-Id: I2536deefb3aa75deee4aeae7df074349b705b0f0
2019-02-08 05:56:58 +00:00
Sudheer Shanka
40a245c336 Merge "Allow zygote to mounton /mnt/user/*."
am: 310b7fd9b3

Change-Id: I273ba63b03d1ee79f05e76a6ce880aae4e15dda0
2019-02-07 10:49:06 -08:00
Sudheer Shanka
310b7fd9b3 Merge "Allow zygote to mounton /mnt/user/*." 2019-02-07 18:45:05 +00:00
Joel Fernandes
b80724d882 Merge "Add permissions for sys.use_memfd property"
am: f6085fefe6

Change-Id: Ief976058f90c94b80569435610fb3a293da6ac1d
2019-02-07 06:24:10 -08:00
Joel Fernandes
f6085fefe6 Merge "Add permissions for sys.use_memfd property" 2019-02-07 14:17:13 +00:00
Nick Kralevich
0897a8a372 Merge "allow untrusted_app_all system_linker_exec:file execute_no_trans"
am: 60f11d0861

Change-Id: I31d3d84c9a61c884cc70ee82b49b2361c4b813e0
2019-02-06 17:03:25 -08:00
Treehugger Robot
60f11d0861 Merge "allow untrusted_app_all system_linker_exec:file execute_no_trans" 2019-02-07 00:51:31 +00:00
Carmen Jackson
3908f9d7c3 Allow the init process to execute the notify_traceur.sh script
am: 07cb0ded7b

Change-Id: I723ec870b13f0fd498a2a6e01b45d6576f17bbcc
2019-02-06 16:38:22 -08:00
Carmen Jackson
07cb0ded7b Allow the init process to execute the notify_traceur.sh script
This sets up a selinux domain (notify_traceur) that can be called from
init and has the permissions to run the activitymanager script.

Bug: 116754134
Test: manual
Change-Id: Ia371bafe5d3d354efdf8cd29365cd74ed3e5cdfd
2019-02-07 00:28:40 +00:00
Chenjie Yu
5278613fad Merge "active metric dir for statsd"
am: 0cb6b7be10

Change-Id: Ib43db77ee6a126b65e348f2eead55b635035f6f8
2019-02-06 15:26:56 -08:00
Sudheer Shanka
21095967f8 Allow zygote to mounton /mnt/user/*.
Bug: 124009234
Test: manual
Change-Id: Ia06506f5dbdacbb5e6e3c1b2bee7f58dec0ed0e7
2019-02-06 15:18:51 -08:00
Treehugger Robot
0cb6b7be10 Merge "active metric dir for statsd" 2019-02-06 23:17:07 +00:00
Nick Kralevich
9ea8c0701d allow untrusted_app_all system_linker_exec:file execute_no_trans
Chrome Crashpad uses the the dynamic linker to load native executables
from an APK (b/112050209, crbug.com/928422)

Addresses the following denial:

  avc: denied { execute_no_trans } for comm="Chrome_IOThread" path="/bionic/bin/linker" dev="loop5" ino=24 scontext=u:r:untrusted_app_27:s0:c106,c256,c512,c768 tcontext=u:object_r:system_linker_exec:s0 tclass=file permissive=0 app=com.android.chrome

Test: compiles and builds.
Change-Id: I14f80592a74c36754c28313e94399258b2c42170
2019-02-06 13:19:19 -08:00
Jeff Sharkey
41481caa7e Merge "Allow system watchdog to collect traces from vold."
am: bdabddfe12

Change-Id: I270a20ad22e8d3281fcc53c65ef66b67d7b4c45f
2019-02-06 12:25:07 -08:00
Joel Fernandes
deef7f0afd Add permissions for sys.use_memfd property
Will be used to forcefully turn on memfd if device supports it.
Currently used only for debugging.

Change-Id: I46a1b7169677ea552d4b092e7501da587c42ba1a
Signed-off-by: Joel Fernandes <joelaf@google.com>
2019-02-06 15:16:16 -05:00
Jeff Sharkey
bdabddfe12 Merge "Allow system watchdog to collect traces from vold." 2019-02-06 20:08:39 +00:00
Primiano Tucci
ba8180db1e Merge "Allow traced to notify traceur via property"
am: 9125a0aefd

Change-Id: Iddaa62f6562e0f28af5528cfa8b8c449e7c9d126
2019-02-06 10:23:28 -08:00
Neil Fuller
970f28223c Merge "Revert "sepolicy entries for time zone detector service""
am: 5f145acff0

Change-Id: Ied46d69d3fbb215712cc807e7b812843d0db6ec0
2019-02-06 10:15:23 -08:00
Primiano Tucci
9125a0aefd Merge "Allow traced to notify traceur via property" 2019-02-06 18:12:38 +00:00
Chenjie Yu
4ee5304bb2 active metric dir for statsd
Bug: 123904359
Test: unit test
Change-Id: I92ac4ef97fb4f951270679f829601b1aca893b7c
2019-02-06 18:06:01 +00:00
Neil Fuller
5f145acff0 Merge "Revert "sepolicy entries for time zone detector service"" 2019-02-06 18:02:38 +00:00
Hector Dearman
14e7c236c7 Merge "Allow reading /d/tracing/events/ftrace/print on user"
am: d2bce13296

Change-Id: If7c76a5f688ac6a0adfbc7f81e528666ecd45a21
2019-02-06 09:10:42 -08:00
Hector Dearman
d2bce13296 Merge "Allow reading /d/tracing/events/ftrace/print on user" 2019-02-06 17:02:48 +00:00
Jeff Sharkey
759c4a905a Merge "Allow zygote to stat() sdcardfs file."
am: b398160f72

Change-Id: If3f870314df923fcb52a4dcac78cb09aa8b03e8b
2019-02-06 08:34:30 -08:00
Jeff Sharkey
d101896ec8 Allow system watchdog to collect traces from vold.
We're investigating a bug where vold gets wedged, and we need to
collect ANR stack traces from it to debug further.

avc: denied { signal } for comm="watchdog" scontext=u:r:system_server:s0 tcontext=u:r:vold:s0 tclass=process permissive=0
avc: denied { ptrace } for scontext=u:r:crash_dump:s0 tcontext=u:r:vold:s0 tclass=process permissive=0

Bug: 122090837
Test: manual
Change-Id: I738e63717715189b9ae2317472f671e3563afaa9
2019-02-06 09:25:00 -07:00
Jeff Sharkey
b398160f72 Merge "Allow zygote to stat() sdcardfs file." 2019-02-06 16:23:09 +00:00
Nikita Ioffe
928eddd3b2 Merge "apexd: allow apexd to unlink staging_data_file files"
am: 9dbb71f4cc

Change-Id: I41f72d0295482539a1265ebe3053af8efc519cd6
2019-02-06 07:28:33 -08:00
Nikita Ioffe
9dbb71f4cc Merge "apexd: allow apexd to unlink staging_data_file files" 2019-02-06 15:17:50 +00:00
Alan Stokes
d0eb315106 Merge "Update seapp_contexts documentation comments."
am: 219511048d

Change-Id: I09a8102575a682862984c37986c2e82ec49e3131
2019-02-06 01:42:23 -08:00
Alan Stokes
219511048d Merge "Update seapp_contexts documentation comments." 2019-02-06 09:35:02 +00:00
Hector Dearman
665f19c868 Allow reading /d/tracing/events/ftrace/print on user
Allow traced to read the format file for the print event on user.
This does not allow traced to enable any event it could not already
as the events under /d/tracing/events/ftrace/ are special and are
always enabled. Being able to read the format file means we don't have
to speculate on the id and layout of the print event.

Bug: 122471587
Test: atest CtsPerfettoTestCases:PerfettoTest#TestFtraceFlush
Change-Id: I39379f2fa13ab80bf3d14e244066c2ba1bd4d11b
2019-02-06 09:31:15 +00:00
Primiano Tucci
8da4e4fb7c Allow traced to notify traceur via property
This CL introduces allows traced to set the
sys.traceur.trace_end_signal property at the end
of the tracer. In turn that property notifies the
the Traceur app.
This is to allowing Traceur to be killed during
a long-trace and avoid wasting resources making
it a persistent service.
See aosp/886616 for the matching traceur change.

Test: manual
Bug: 116754732
Change-Id: I89e2f02b3f973813ce8ff3507d397a06502f84c1
2019-02-06 08:47:04 +00:00
Neil Fuller
62386fb9ab Revert "sepolicy entries for time zone detector service"
This reverts commit 1662495aec.

Bug: 78217059
Bug: 112827764
Test: make / booted device
2019-02-06 08:39:12 +00:00
markchien
816e62dace [KA08] Allow system_server call tcp socket ioctl
am: f6b59fe644

Change-Id: I8678c49896236e24ca7578b59b65b5f5a46aa81f
2019-02-06 00:22:06 -08:00
markchien
f6b59fe644 [KA08] Allow system_server call tcp socket ioctl
In order to offload application tcp socket’s keepalive
message, system server must know if application's socket
is idle with no data in send/receive queues. Allow
system_server to use ioctl on all tcp sockets.

Bug: 114151147
Test: -build, flash, boot
Change-Id: I3f5a0e06bc22f8a64ae6180db48df2a31106c511
2019-02-06 13:17:38 +09:00
Nikita Ioffe
6d73cea5b4 apexd: allow apexd to unlink staging_data_file files
In order to support rollback for apex files, apexd will need to unlink
previously active apex files in /data/apex/active folder. Those files
are hardlinked from /data/staging/session_XXXX which means that they
have staging_data_file:file SELinux fields.

I double checked that this change won't allow apexd to unlink files in
/data/staging/session_XXXX folders, because it will lack write access,
logcat contains following entries:
avc: denied { write } for name="session_305119585" dev="sda13" ino=5496838 scontext=u:r:apexd:s0 tcontext=u:object_r:staging_data_file:s0 tclass=dir permissive=0

Bug: 122339211
Test: verified that apexd can't unlink files in /data/staging/session_XXXX
Change-Id: Iddef724c3d73269c97d9fa12a05a276fad189ea9
2019-02-05 22:57:29 +00:00
Sudheer Shanka
5989be67fd Allow zygote to stat() sdcardfs file.
Bug: 123948473
Test: manual
Change-Id: I2d90c4dc90fbc0828e2f498bcab4801d93492321
2019-02-05 14:50:37 -08:00
Tri Vo
610a8ed7cf sepolicy for ashmemd
am: 73d0a67b06

Change-Id: Ia0d3406769f2b153caa28ab5e36a34b3910b94a8
2019-02-05 13:45:59 -08:00
Tri Vo
73d0a67b06 sepolicy for ashmemd
all_untrusted_apps apart from untrusted_app_{25, 27} and mediaprovider
are now expected to go to ashmemd for /dev/ashmem fds.

Give coredomain access to ashmemd, because ashmemd is the default way
for coredomain to get a /dev/ashmem fd.

Bug: 113362644
Test: device boots, ashmemd running
Test: Chrome app works
Test: "lsof /system/lib64/libashmemd_client.so" shows
libashmemd_client.so being loaded into apps.
Change-Id: I279448c3104c5d08a1fefe31730488924ce1b37a
2019-02-05 21:38:14 +00:00
Santos Cordon
bff499ee82 Merge "SEPolicy for Suspend Control interface."
am: 87988fa6a6

Change-Id: I6aa4102dd43daf2bd82eeb09b53e890e3c3dbe7a
2019-02-05 10:43:11 -08:00
Santos Cordon
87988fa6a6 Merge "SEPolicy for Suspend Control interface." 2019-02-05 18:03:55 +00:00
Santos Cordon
b78a1f5e13 SEPolicy for Suspend Control interface.
Bug: 121210355
Test: manual
Change-Id: I9c46c72f0219309140ed2fb008ef57b4bca6ff2b
Merged-In: I9c46c72f0219309140ed2fb008ef57b4bca6ff2b
2019-02-05 18:03:32 +00:00
Jeff Vander Stoep
1f46d6c4e7 Merge "Neverallow executable files and symlink following"
am: 125cbf19de

Change-Id: I7a50f01e1bac24beb9fe516b11f6d7f8c6667b64
2019-02-05 09:39:38 -08:00
Alan Stokes
6b576bd2fa Update seapp_contexts documentation comments.
Add some missing fields, document undocumented fields, update
precedence rules, and attempt to give slightly more context.

Test: Builds
Change-Id: Id106ebe3aa6c18697db82a775cc54ed07b6c1a57
2019-02-05 17:37:29 +00:00
Treehugger Robot
125cbf19de Merge "Neverallow executable files and symlink following" 2019-02-05 17:32:28 +00:00
Sudheer Shanka
39caee7ebc Temporary rule to allow zygote to access vfat.
am: ccec725ff9

Change-Id: Iee7fbc54e4a893b4673fd50520d96b0f739e8b4d
2019-02-05 09:31:29 -08:00
Sudheer Shanka
ccec725ff9 Temporary rule to allow zygote to access vfat.
Extension to change Id633337095c0a3b69d9b8652bcc3327810339cf3
to deal with secondary storage devices.

Bug: 123533205
Test: manual
Change-Id: I24e1550af9589be9b238fba83837bf684aa02e3f
2019-02-04 16:38:41 -08:00
Jeff Vander Stoep
0ac2eece90 Neverallow executable files and symlink following
Test: build
Change-Id: Iec30d8a7642c34f12571c5654914ddbdc3d8355e
2019-02-04 18:38:05 +00:00
Roland Levillain
67947e6fb4 Merge "Allow otapreopt to use bind-mounted Bionic artifacts from the Runtime APEX."
am: 5c8f9398d9

Change-Id: Ibce852637c2f8836c6e6183d072eedd5dac989fe
2019-02-04 05:48:03 -08:00