Commit graph

18611 commits

Author SHA1 Message Date
Andreas Gampe
7cf9a365c4 Sepolicy: Allow everyone to search keyrings
am: 59d5d90da8

Change-Id: I2a1f7f57bc52d3732b3e87ddbb7f829e76851fd0
2019-03-14 13:37:07 -07:00
Andreas Gampe
59d5d90da8 Sepolicy: Allow everyone to search keyrings
Allow everyone to look for keys in the fsverity keyring. This is
required to access fsverity-protected files, at all.

This set of permissions is analogous to allowances for the fscrypt
keyring and keys.

Bug: 125474642
Test: m
Test: manual
Change-Id: I6e8c13272cdd76d9940d950e9dabecdb210691b1
2019-03-14 13:21:07 -07:00
Xiaoyong Zhou
a711d375ab add label for /proc/sys/fs/verity/require_signatures
This CL add new label for files created by fsverity.

Bug: 112038861
Test: ls -Z /proc/sys/fs/verity/require_signatures.
Change-Id: I8e49ad9a43282bc608449eb0db4ea78617c4ee9a
2019-03-14 12:44:31 -07:00
Jeff Vander Stoep
ecd288f41d Android.bp: set sepolicy version for use by init
Init needs to be aware of the policy version defined in sepolicy
for on-device compilation.

Bug: 124499219
Test: build and boot a device. Try both precompiled and on-device
compiled policy.

Change-Id: Iba861aeb4566405aedcbe3c2bad48e1e50126370
2019-03-14 17:49:14 +00:00
Andreas Gampe
fb7edfcecc Merge "Sepolicy: Fix APEX boot integrity"
am: a907d15ba1

Change-Id: I324b49595971e7a2e50e59e8f54a14dd0925c7b8
2019-03-14 10:38:21 -07:00
Treehugger Robot
a907d15ba1 Merge "Sepolicy: Fix APEX boot integrity" 2019-03-14 17:20:18 +00:00
Tao Bao
18e68c790f Move /sbin/charger to /system/bin/charger.
am: ecc7e8cacb

Change-Id: I4baee7b2d3a1d453453adcd0cbcdaee7a4e7b9ac
2019-03-14 10:06:09 -07:00
Tao Bao
ecc7e8cacb Move /sbin/charger to /system/bin/charger.
With the CLs in the same topic, it's being built as a dynamically linked
executable. And this applies to normal boot (including charger mode) and
recovery mode both.

/system/bin/charger under normal boot will be labeled as charger_exec,
which has the attribute of system_file_type.

The file in recovery image will still be labeled as rootfs. So we keep
the domain_trans rule for rootfs file, but allowing for recovery mode
only.

Bug: 73660730
Test: Boot into charger mode on taimen. Check that charger UI works.
Test: Boot into recovery mode. Check that charger process works.
Change-Id: I062d81c346578cdfce1cc2dce18c829387a1fdbc
2019-03-14 09:44:03 -07:00
Gavin Corkery
9058a1d46d Rename data/pkg_staging to data/app-staging
am: 64b812c27e

Change-Id: Iff8229e4a121c345e294efa2d4e87be9e80d2ec4
2019-03-14 07:22:59 -07:00
Gavin Corkery
64b812c27e Rename data/pkg_staging to data/app-staging
Test: n/a
Bug: 126330086

Change-Id: I34d5085d8e6546d77cc854e27ca849462d482396
Merged-In: I34d5085d8e6546d77cc854e27ca849462d482396
2019-03-14 14:00:53 +00:00
Roland Levillain
5b8a175475 Merge "No longer label patchoat binaries in file_contexts."
am: bf2ee36db9

Change-Id: Id67a9857153bba20471aecffa1c34c0de40b49a9
2019-03-14 06:33:09 -07:00
Roland Levillain
bf2ee36db9 Merge "No longer label patchoat binaries in file_contexts." 2019-03-14 13:19:12 +00:00
Martijn Coenen
e9b10d0efa Allow apexd to talk to vold.
am: 1f1c4c3fa5

Change-Id: If0dacd4bf99226d74e1906ad9ea63908d4a1fb90
2019-03-14 00:30:36 -07:00
Martijn Coenen
1f1c4c3fa5 Allow apexd to talk to vold.
To query filesystem checkpointing state.

Bug: 126740531
Test: no denials
Change-Id: I28a68b9899d7cb42d7e557fb904a2bf8fa4ecf66
2019-03-14 07:23:40 +00:00
Jeff Vander Stoep
301e0e366c crash_dump: dontaudit devices passed by exec()
am: 1795d0bcfd

Change-Id: I5e11ac94ad0f61e0c5c6fc2fb3bdf1cb0dc6ba8b
2019-03-13 23:40:51 -07:00
Jeff Vander Stoep
1795d0bcfd crash_dump: dontaudit devices passed by exec()
avc: denied { read } for comm="crash_dump64" name="v4l-touch22"
dev="tmpfs" ino=18821 scontext=u:r:crash_dump:s0
tcontext=u:object_r:input_device:s0 tclass=chr_file

Test: build
Change-Id: Iac66b77ad255c950b21fd267c88fdbc382be2877
2019-03-13 20:50:25 -07:00
Suren Baghdasaryan
226cbec8c4 Merge "sepolicy: Remove unnecessary psi procfs rules"
am: 96cc32b0eb

Change-Id: Ibb9f4a4d69edece3977e8f8f697281cf51f5a5e7
2019-03-13 18:53:30 -07:00
Suren Baghdasaryan
96cc32b0eb Merge "sepolicy: Remove unnecessary psi procfs rules" 2019-03-14 01:42:21 +00:00
Tri Vo
f59537cd15 Allow global read access to /sys/kernel/mm/transparent_hugepage/
am: d6c5ff5f72

Change-Id: Iddd1ea1e7f95d1e30f67300b0ffdf8e0d65761e2
2019-03-13 16:55:26 -07:00
Tri Vo
d6c5ff5f72 Allow global read access to /sys/kernel/mm/transparent_hugepage/
If kernel is built with CONFIG_TRANSPARENT_HUGEPAGE optimization,
libjemalloc5 will attempt to read
/sys/kernel/mm/transparent_hugepage/enabled and hit an SELinux denial.

Various denials similiar to the following are seen on cuttlefish:
avc: denied { open } for comm="surfaceflinger"
path="/sys/kernel/mm/transparent_hugepage/enabled" dev="sysfs" ino=776
scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:sysfs:s0 tclass=file
permissive=1

Bug: 28053261
Test: boot cuttlefish without above denials.
Change-Id: Ic33f12d31aacc42d662a8c5c297fbb5f84d4deea
2019-03-13 23:47:25 +00:00
wenquan.zhang
46d6f85619 Merge "ODM updates the recovery partition through vendor's materials"
am: 058f7f4add

Change-Id: Ia3a52d58644f0165c27f8ce01c9cfe5ab56104b3
2019-03-13 15:06:11 -07:00
Treehugger Robot
058f7f4add Merge "ODM updates the recovery partition through vendor's materials" 2019-03-13 21:36:50 +00:00
Suren Baghdasaryan
19cae23580 Merge "sepolicy: Allow lmkd access to psi procfs nodes"
am: 9902c67cfa

Change-Id: Ia85bbe76ecc57542739ed8720851d6da5cc095a7
2019-03-13 13:56:55 -07:00
Tri Vo
b02eef7231 Merge "vold: write permission to sysfs_devices_block"
am: 3a463e108d

Change-Id: I20b1b7da6ac1a2cc927bf621e85914dbd5e42fe5
2019-03-13 13:54:03 -07:00
Suren Baghdasaryan
f4b7e01c1f sepolicy: Remove unnecessary psi procfs rules
Remove unnecessary rules which will be added from 28.0.cil automatically
by the build process.

Bug: 111308141
Test: builds

Change-Id: I02064785cac1ed6d8b4e462604a1b8db10c1a25a
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
2019-03-13 20:53:55 +00:00
Suren Baghdasaryan
9902c67cfa Merge "sepolicy: Allow lmkd access to psi procfs nodes" 2019-03-13 20:51:31 +00:00
Andreas Gampe
6cd179f992 Sepolicy: Fix APEX boot integrity
Update copy-paste comment header. Fix file access to the right
type.

Follow-up to commit 1845b406fc.

Bug 125474642
Test: m
Test: boot

Change-Id: I33bfef51c78ca581063c0f950e1837546d013050
2019-03-13 13:38:31 -07:00
Tri Vo
3a463e108d Merge "vold: write permission to sysfs_devices_block" 2019-03-13 20:36:30 +00:00
Roland Levillain
6f314bcd95 No longer label patchoat binaries in file_contexts.
The patchoat program has been removed from Android in
https://android-review.googlesource.com/c/platform/art/+/774905.

Test: n/a
Bug: 77856493
Change-Id: Icf6ed2e5671d20f57dff94a55bedfb035cfc0ee7
2019-03-13 20:18:57 +00:00
Ben Murdoch
9ca6038a10 Merge "Allow traced_probes to access power rail data."
am: 98de091a4f

Change-Id: I957ef1ef8106dd600bafd2993cd3f84212f9043f
2019-03-13 12:56:31 -07:00
Treehugger Robot
98de091a4f Merge "Allow traced_probes to access power rail data." 2019-03-13 19:47:54 +00:00
Andreas Gampe
950d25ccf9 Merge "Sepolicy: ART APEX boot integrity"
am: 01147a70f4

Change-Id: If3d381bc3d2f2479b9c01307f13a9ad2db22e53e
2019-03-13 11:29:14 -07:00
Andreas Gampe
01147a70f4 Merge "Sepolicy: ART APEX boot integrity" 2019-03-13 18:19:03 +00:00
Victor Hsieh
ac0a689cb4 Merge "Allow mini-keyctl to setattr for restricting keyring"
am: e5667b30d5

Change-Id: I78c9cb1c38b2303f12f69e1b2b72d2f3fb540bc1
2019-03-13 10:39:57 -07:00
Treehugger Robot
e5667b30d5 Merge "Allow mini-keyctl to setattr for restricting keyring" 2019-03-13 17:30:22 +00:00
Jack Yu
d8514fb33e Changed IWLAN operation mode system properties to enum
Changed the system properties to enum. The valid modes
are "default", "legacy", and "AP-assisted".

Test: Manual
Bug: 126218288

Change-Id: Ib70ed8606e845ca29453013a400b377647e15490
2019-03-13 10:15:39 -07:00
Ben Murdoch
f948ea58c7 Allow traced_probes to access power rail data.
Allows power rail data to be logged in the trace, allowing
high fidelity attribution of battery power use.

Matching feature CL: aosp/891533

SELinux denials that lead to this:
avc: denied { call } for scontext=u:r:traced_probes:s0 tcontext=u:r:hal_power_stats_default:s0 tclass=binder

Test: checked data in a trace
Bug: 122584217

Change-Id: I7e0f4e825be3f54bc78d91da1cb85c2f61465a44
2019-03-13 17:11:31 +00:00
Suren Baghdasaryan
53065d6aa8 sepolicy: Allow lmkd access to psi procfs nodes
Lmkd needs read access to /proc/pressure/memory, proc/pressure/cpu
and proc/pressure/io nodes to read current psi levels.
Lmkd needs write access to /proc/pressure/memory to set psi monitor
triggers.

Bug: 111308141
Test: modified lmkd to use PSI and tested using lmkd_unit_test

Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Merged-In: I9efd60c7fbb89cc08938fa5119b13d794813b52b
Change-Id: I9efd60c7fbb89cc08938fa5119b13d794813b52b
2019-03-13 10:00:37 -07:00
Andreas Gampe
b329558180 Merge "Sepolicy: Give sys_admin for relabel"
am: 20fe557ec5

Change-Id: I15c2a6fde323c4e4092428b0db9436089c545ad9
2019-03-13 08:20:45 -07:00
Treehugger Robot
20fe557ec5 Merge "Sepolicy: Give sys_admin for relabel" 2019-03-13 15:06:54 +00:00
wenquan.zhang
182d50d10b ODM updates the recovery partition through vendor's materials
This is for Non-AB ota update recovery partition on GMS Express 2.0 project.
recovery partition update via /vendor/bin/install-recovery.sh from /vendor/etc/recovery.img

Bug: 124277294
Test: builds and test GOTA.
Change-Id: I97521c03a881bd0427e5d02836220ee2c0db7650
2019-03-13 03:24:55 -07:00
Tim Murray
17787a50e0 Merge "system_server: allow writes to /proc/pid/*"
am: 62e8da9713

Change-Id: I59aa0c346dbaa89ccfd54fc115efd90630a6ee78
2019-03-12 22:47:48 -07:00
Inseob Kim
3767d8e9d0 Merge "Fix surface flinger property types"
am: 7a70210a47

Change-Id: Id3c06a5fccb13f86317dbdfdb08657db57f0426e
2019-03-12 22:27:09 -07:00
Andreas Gampe
1845b406fc Sepolicy: ART APEX boot integrity
Add ART boot integrity check domain. Give it rights to run
fsverity and delete boot classpath artifacts.

Bug 125474642
Test: m
Test: boot
Change-Id: I933add9b1895ed85c43ec712ced6ffe8f820c7ec
2019-03-12 22:26:17 -07:00
Treehugger Robot
62e8da9713 Merge "system_server: allow writes to /proc/pid/*" 2019-03-13 05:09:18 +00:00
Treehugger Robot
7a70210a47 Merge "Fix surface flinger property types" 2019-03-12 23:58:52 +00:00
Tim Murray
a8d538f66d system_server: allow writes to /proc/pid/*
Test: system_server can write to /proc/<pid>/*
bug 119988524

Change-Id: I312b8022cd143907bcbfc8152691e2053e1e816d
2019-03-12 16:20:11 -07:00
Inseob Kim
8669f52f79 Fix surface flinger property types
Third parameter of a property_context entry should be "exact" if the
entry is for a single property, not a prefix.

And the type of each entry should be the fourth parameter.

Bug: 112386364
Test: m -j
Change-Id: I2ed31c9fd7c7424e3a6a51d44b4e85413ae316b7
2019-03-12 22:38:36 +00:00
Martijn Coenen
bd415ea496 Merge "Add policy for /metadata/apex."
am: 460efa2a01

Change-Id: I687236094aa48b5f241cbe68b60bebb441e076b1
2019-03-12 14:09:56 -07:00
Treehugger Robot
460efa2a01 Merge "Add policy for /metadata/apex." 2019-03-12 20:48:49 +00:00