Commit graph

13899 commits

Author SHA1 Message Date
Primiano Tucci
c41533e48f Merge "selinux: allow Perfetto traced_probes to write into kmesg" am: daeea37e21
am: e786cf9966

Change-Id: I01edf449451eb9e8c608fff6f86c529e69a42602
2018-02-16 23:36:53 +00:00
Primiano Tucci
e786cf9966 Merge "selinux: allow Perfetto traced_probes to write into kmesg"
am: daeea37e21

Change-Id: Ife0b32672aa8bccdaa5b6c93e0155a1bde4dbc2f
2018-02-16 23:20:52 +00:00
Primiano Tucci
daeea37e21 Merge "selinux: allow Perfetto traced_probes to write into kmesg" 2018-02-16 21:56:35 +00:00
Robert Sesek
0300a07387 Merge "SELinux changes to accomodate starting the webview_zygote as a child of the zygote." am: 50fa7be796
am: 0089f2849d

Change-Id: I366e68c19a1344c6c4ec0584f2eda42bae3e9e6e
2018-02-16 16:52:15 +00:00
Robert Sesek
0089f2849d Merge "SELinux changes to accomodate starting the webview_zygote as a child of the zygote."
am: 50fa7be796

Change-Id: Iab1959aeeb566eaabbaefeb97c8e8899d07abd8a
2018-02-16 16:44:41 +00:00
Treehugger Robot
50fa7be796 Merge "SELinux changes to accomodate starting the webview_zygote as a child of the zygote." 2018-02-16 16:38:52 +00:00
Primiano Tucci
d807d58825 selinux: allow Perfetto traced_probes to write into kmesg
This is to allow to leave audit trails in dmesg to cross-correlate
kernel panics with perfetto ftrace activity.

Bug: 73340039
Change-Id: I575a537553adc75378783c37c84350581250614d
2018-02-16 16:38:29 +00:00
Joel Galenson
9680dcdebc Dontaudit denials caused by race with labeling. am: f7ec413844
am: 67057bd934

Change-Id: I030ce633ea9561c2697e4357d159fbaeadd7f378
2018-02-16 00:50:33 +00:00
Joel Galenson
67057bd934 Dontaudit denials caused by race with labeling.
am: f7ec413844

Change-Id: Id2726bec03d7d06f48adf2f5d17b1382321b01d0
2018-02-16 00:46:05 +00:00
Joel Galenson
f7ec413844 Dontaudit denials caused by race with labeling.
These denials seem to be caused by a race with the process that labels
the files.  While we work on fixing them, hide the denials.

Bug: 68864350
Bug: 70180742
Test: Built policy.
Change-Id: I58a32e38e6384ca55e865e9575dcfe7c46b2ed3c
2018-02-14 17:07:13 -08:00
Robert Sesek
febdfa4edf SELinux changes to accomodate starting the webview_zygote as a child of the zygote.
In this architecture, the system_server instructs the zygote to fork a
child-zygote to be the webview_zygote. The system_server tells this new
zygote to listen for fork requests on a random abstract unix socket of
its choosing.

A follow-up CL will remove the rules for starting webview_zygote via
init.

Bug: 63749735
Test: m
Test: Launch "Third-party licenses" activity from Settings, and it
      renders correctly via the WebView.
Merged-In: I864743943c11c18de386010ecd4b616721cb9954
Change-Id: I1c352e47b66eca3a3fa641daa6ecc3e7a889b54e
2018-02-14 19:00:48 -05:00
Pavel Grafov
8525e584c4 Merge "Allow wpa_supplicant to read security logging property." am: 946b4b76f0
am: b96ce93b84

Change-Id: Id23bddbfc9e52b2cbfaa7721328cd0da2b71a2b4
2018-02-14 19:12:57 +00:00
Pavel Grafov
b96ce93b84 Merge "Allow wpa_supplicant to read security logging property."
am: 946b4b76f0

Change-Id: I3594f29614dff49aa76e96178398a848203e77b7
2018-02-14 19:07:36 +00:00
Treehugger Robot
946b4b76f0 Merge "Allow wpa_supplicant to read security logging property." 2018-02-14 18:47:26 +00:00
Joel Galenson
30869fe7b8 Merge "Track crash_dump selinux denial." am: 5791086651
am: a378180ff6

Change-Id: I57ba8e00b9ecc47d7bccfe06a4cc82d6589754ce
2018-02-14 18:04:10 +00:00
Joel Galenson
a378180ff6 Merge "Track crash_dump selinux denial."
am: 5791086651

Change-Id: Iae0d899bd5d34aaf7d4ffe681ed7fe34ff1d0d04
2018-02-14 17:58:19 +00:00
Treehugger Robot
5791086651 Merge "Track crash_dump selinux denial." 2018-02-14 17:53:00 +00:00
Pavel Grafov
54c9dafb5e Allow wpa_supplicant to read security logging property.
This is needed to allow it to log audit events, e.g. cert
validation failure.

Bug: 70886042
Test: manual, attempt connecting to EAP-TLS wifi with bad cert.
Merged-In: Ia1b0f3c6e02697fdb5018082d5c851f116013fb1
Change-Id: Ia1b0f3c6e02697fdb5018082d5c851f116013fb1
2018-02-14 17:07:35 +00:00
Jeff Vander Stoep
ffb82f2ff4 Use SELINUX_IGNORE_NEVERALLOWS flag to disable all tests am: 3d4965b2e1
am: 41dc9508ff

Change-Id: I7c27fb20346bb00ce629ace2b7d844f595000b26
2018-02-14 16:59:19 +00:00
Jeff Vander Stoep
41dc9508ff Use SELINUX_IGNORE_NEVERALLOWS flag to disable all tests
am: 3d4965b2e1

Change-Id: I68869a4fac63fb447aadec850ba9d73060c3443c
2018-02-14 16:53:46 +00:00
Jeff Vander Stoep
3d4965b2e1 Use SELINUX_IGNORE_NEVERALLOWS flag to disable all tests
The intent of this flag is to disable tests during early device
bringup so that vendor drops can occur without build breakages.
When SELINUX_IGNORE_NEVERALLOWS=true also disable labeling tests
sepolicy_tests, and treble_sepolicy_tests.

Bug: 73322735
Test: build, verify known tests failures do not cause build breakage.
Change-Id: I3e7165938d4e34c066bfa0a20e68b7e02dae4a24
2018-02-14 05:11:59 +00:00
Christopher Ferris
f5574d1bf7 Merge "Allow read-only of new property for malloc hooks." am: 72527282ef
am: 587349ea59

Change-Id: I78c821f69203937273240cfa3e3ffdd722b89a06
2018-02-14 01:10:33 +00:00
Christopher Ferris
587349ea59 Merge "Allow read-only of new property for malloc hooks."
am: 72527282ef

Change-Id: I82b742a07554cc8795e5797c1811c4c13cfd3e33
2018-02-14 01:03:09 +00:00
Christopher Ferris
72527282ef Merge "Allow read-only of new property for malloc hooks." 2018-02-14 00:49:48 +00:00
Jeff Vander Stoep
d16b2042f0 Merge "OWNERS: add tomcherry and bowgotsai" am: 1f4474852f
am: 40ec83ce3e

Change-Id: I46f17e0dade926056c4ab9f39a9ec4064d12e597
2018-02-14 00:26:13 +00:00
Jeff Vander Stoep
40ec83ce3e Merge "OWNERS: add tomcherry and bowgotsai"
am: 1f4474852f

Change-Id: Ia504ee90ef703fd46f6021e2b893f8f4104a4b65
2018-02-14 00:14:55 +00:00
Treehugger Robot
1f4474852f Merge "OWNERS: add tomcherry and bowgotsai" 2018-02-13 23:36:59 +00:00
Bookatz
56de7f3740 Merge "Statsd allow shell in selinux policy" am: 5670dd1fad
am: 73a2cf20ee

Change-Id: Iae2c40185b51dfb87c7e444483efde7641cf4d59
2018-02-13 22:41:57 +00:00
Bookatz
73a2cf20ee Merge "Statsd allow shell in selinux policy"
am: 5670dd1fad

Change-Id: I13a91e18ba39271693fa7d2cdae641882e533806
2018-02-13 22:33:03 +00:00
Treehugger Robot
5670dd1fad Merge "Statsd allow shell in selinux policy" 2018-02-13 22:07:59 +00:00
Christopher Ferris
6766543a16 Allow read-only of new property for malloc hooks.
Bug: 30561479

Test: Booted on walleye and verified that read denials of the property
Test: do not generate warnings.
Change-Id: I61a4a7d3a360a6d27d8986eb8f3f9662272233b1
(cherry picked from commit 2f35f5ca6c)
2018-02-13 13:36:51 -08:00
Jeff Vander Stoep
31e1ddd611 OWNERS: add tomcherry and bowgotsai
Test: n/a
Change-Id: I7041cc0f17ece86c01db1d9c17f68b58473cf27c
2018-02-13 21:31:49 +00:00
Primiano Tucci
4eb7864ecb Merge "Allow perfetto traced_probes to access tracefs on user" am: 2732f1497b
am: 5a0e658f39

Change-Id: I35b03c9600d9c94a1be98e145a62570e073a52c5
2018-02-13 18:18:44 +00:00
Primiano Tucci
5a0e658f39 Merge "Allow perfetto traced_probes to access tracefs on user"
am: 2732f1497b

Change-Id: Icaf1a00c58252fa8aee8aefd4b25df5dafb94107
2018-02-13 18:07:12 +00:00
Treehugger Robot
2732f1497b Merge "Allow perfetto traced_probes to access tracefs on user" 2018-02-13 18:02:01 +00:00
Bookatz
022ab0e738 Statsd allow shell in selinux policy
CTS tests need to be able to call, from hostside:
adb shell cmd stats dump-report (and others)
On a user build, this will fail because of an selinux policy violation
from shell. This cl fixes this by granting shell permission.

Similarly, Settings needs to communicate with statsd, so
system_app-statsd binder calls are given permission.

Bug: 72961153
Bug: 73255014
Test: run cts-dev -m CtsStatsdHostTestCases -t android.cts.statsd.atom.HostAtomTests
Test: manual confirmation
Change-Id: I6589ab4ef5c91a4a7f78eb97b63d9bb43e3d8f02
2018-02-13 09:34:55 -08:00
Primiano Tucci
b4b31f9d72 Allow perfetto traced_probes to access tracefs on user
Allows the traced_probes daemon to access the core ftrace
functionalities on user builds. Specifically this involves:
- Whitelisting the per_cpu/ subdirectory to access:
  1) trace_pipe_raw file to allow perfetto to read the raw
     ftrace buffer (rather than the text-based /trace endpoint)
  2) cpuX/stats and cpuX/buffer_size_kb that allow to
     tune the buffer size per-cpu pipe and to get basic
     statistics about the ftrace buffer (#events, overruns)
- Whitelistiing the full event directories rather than the
  /enable files. This gives also access to the /format files
  for the events that are already enabled on user builds.
  /format files simply describe the memory layout
  of the binary logs. Example: https://ghostbin.com/paste/f8m4k

This still does NOT allow enabling the events labeled as
"_debug" (mostly events that return activity on inodes).
We'll deal with that separately as soon as we get a POC
of inode resolution and a sensible blacklist/whitelist model.

Bug: 70942310
Change-Id: Ic15cca0a9d7bc0e45aa48097a94eadef44c333f8
2018-02-13 15:54:11 +00:00
Joel Galenson
116f75062f Track crash_dump selinux denial.
This should fix presubmit tests.

Bug: 68319037
Test: Built policy.
Change-Id: I0c3bc08c9b114e7a3737cdb3005fb59b2df47d55
2018-02-12 10:09:43 -08:00
Joel Galenson
3536edcf7e Merge "Track untrusted_app SELinux denial." am: 7a567e3a19
am: 17777d535f

Change-Id: Ib9f522a40252df20ce13cd29f50060db6d2a8c36
2018-02-12 18:08:53 +00:00
Joel Galenson
17777d535f Merge "Track untrusted_app SELinux denial."
am: 7a567e3a19

Change-Id: I729a92e34531f6726372b5639c94dcbd49edbe25
2018-02-12 18:04:19 +00:00
Treehugger Robot
7a567e3a19 Merge "Track untrusted_app SELinux denial." 2018-02-12 17:50:57 +00:00
Tom Cherry
4f0b721c29 Prevent vendor_init from using binder or sockets am: a099830e3d
am: 40e15ab342

Change-Id: I486933e6d02f1905c31c336d12ee4e5bf9802d95
2018-02-12 16:46:26 +00:00
Tom Cherry
40e15ab342 Prevent vendor_init from using binder or sockets
am: a099830e3d

Change-Id: Ia34c9097e45d7d68dfffc2a90cf1306ff2ce0e9c
2018-02-12 16:38:56 +00:00
Joel Galenson
fc804cc179 Track untrusted_app SELinux denial.
This should fix presubmit tests.

Bug: 72550646
Test: Built policy.
Change-Id: Ib17d2a5e1635ff661d39d14169652f88b7a6e4f5
2018-02-09 15:23:30 -08:00
Tom Cherry
a099830e3d Prevent vendor_init from using binder or sockets
Bug: 72809699
Test: build
Change-Id: Ifb66ad13557af7d2dc6d3ef823e326a5fba51b24
2018-02-09 19:32:59 +00:00
Joel Galenson
b695ad4e44 Merge "Track system_server SELinux denial." am: d388f370c6
am: 5f51fc7626

Change-Id: Ie3f9b5172ec6dd17dd4803e5b425b5799e982530
2018-02-09 07:50:02 +00:00
Joel Galenson
5f51fc7626 Merge "Track system_server SELinux denial."
am: d388f370c6

Change-Id: Id3a7f0adc0ee9c20a219174c90a184d8d50acfc8
2018-02-09 07:43:54 +00:00
Treehugger Robot
d388f370c6 Merge "Track system_server SELinux denial." 2018-02-09 07:30:31 +00:00
Jeff Vander Stoep
037f20b9c0 Merge "label /data/vendor{_ce,_de}" am: 3721b0513d
am: 7fd715ea82

Change-Id: I451ac21739b42b5206cb679de09093e97f4d3af0
2018-02-09 06:04:40 +00:00
Jeff Vander Stoep
7fd715ea82 Merge "label /data/vendor{_ce,_de}"
am: 3721b0513d

Change-Id: Ice083b2e11c0fb3daefbe64eba4adb9632ba0774
2018-02-09 06:00:06 +00:00