Commit graph

41901 commits

Author SHA1 Message Date
Treehugger Robot
171a6fbca2 Merge "Allow init to access user mode helpers" into main 2023-08-24 08:06:42 +00:00
Kangping Dong
5e82983ee4 Merge "[Thread] add sepolicy rules for Thread system service" into main 2023-08-24 06:42:08 +00:00
Yu Shan
df5cd6fe19 Allow remoteaccess V2 and VHAL v2/v3.
Test: None
Bug: 297271235
Change-Id: Icc6dbb007c50db6d8adf492726365fdc34a60e78
2023-08-23 17:20:15 -07:00
Eric Biggers
f1de111fe9 Merge "Remove all module_request rules" into main 2023-08-23 17:29:10 +00:00
Alan Stokes
3105e3ef43 Allow init to access user mode helpers
This is in host sepolicy, looked like we pruned it because we didn't
need it - but now we do.

Bug: 297019386
Test: Run VM with encrypted storage, no denials
Change-Id: I6cd5f6bf98e9089ef7c3945c29242daea527592f
2023-08-23 16:25:50 +01:00
Treehugger Robot
ff9b6459f9 Merge "Skip building compat files if REL" into main 2023-08-23 14:19:45 +00:00
Alfred Piccioni
ee7e77ba63 Merge "Revert ntfs file context changes" into main 2023-08-23 12:47:58 +00:00
Alan Stokes
76fb93871d Policy changes for running payloads not as root
Allow Microdroid Manager to setuid/setgid when spawning Microdroid
Launcher.

Allow encryptedstore binary to chmod the root directory.

Also added some neverallow rules, because I was surprised that I
didn't trigger one.

Bug: 296393106
Test: atest MicrodroidTests
Change-Id: I1f224d59548162d0b36c2c9f32710db2c2da5869
2023-08-23 13:44:40 +01:00
Alfred Piccioni
33ebe0ef1b Revert ntfs file context changes
Partial revert of:

commit 3e1dc57bf4

commit 30ae427ed0

The current file contexts could break potential implementations of NTFS
by partners in future. I am not rolling back the adjoining
fuseblkd_exec andfuseblkd_untrusted_exec code, because secure
implementations of fuseblk drivers should still endeavour to use the
more compartmentalised policies.

However, as we don't support NTFS officially, we should give
implementors the choices whether to use it or not, even if it will open
the door to potentially less secure implementations.

NTFS Context: http://b/254407246,
https://docs.google.com/document/d/1b5RjdhN2wFFqmLCK0P_chVyiEhiYqNlTn52TFBMNwxk

Bug: 294925212
Test: Builds and boot.
Change-Id: I6d3858517e797b3f7388f9d3f18dd4a11770d5bc
2023-08-23 11:42:20 +00:00
Kangping Dong
45efca84e5 [Thread] add sepolicy rules for Thread system service
Add SEPolicy for the ThreadNetworkService
Add Fuzzer exception, thread_network service is java only

FR: b/235016403

Test: build and start thread_network service
bug: 262683651
Change-Id: Ifa2e9500dd535b0b4f2ad9af006b8dddaea900db
2023-08-23 17:08:58 +08:00
Inseob Kim
61d6beb39e Skip building compat files if REL
Bug: 296780580
Test: build with next
Change-Id: I588d249f35fc7049d0db3b64692ed818050af0ed
2023-08-23 08:41:44 +00:00
Treehugger Robot
90bf7fe34c Merge changes from topic "revert-2715179-BUILD_BROKEN_VENDOR_SEAPP_USES_COREDOMAIN-HHKXHMATFW" into main
* changes:
  Don't check seapp violations for U or prior
  Revert "Add BUILD_BROKEN_VENDOR_SEAPP_USES_COREDOMAIN"
2023-08-23 06:34:30 +00:00
Inseob Kim
76d9f26019 Don't check seapp violations for U or prior
Bug: 280547417
Test: build
Change-Id: Ie71d7b4884f4e6981bd1d78bb0586111dc4fc72a
2023-08-23 12:54:10 +09:00
Inseob Kim
d7b381caca Revert "Add BUILD_BROKEN_VENDOR_SEAPP_USES_COREDOMAIN"
Revert submission 2715179-BUILD_BROKEN_VENDOR_SEAPP_USES_COREDOMAIN

Reason for revert: not needed

Reverted changes: /q/submissionid:2715179-BUILD_BROKEN_VENDOR_SEAPP_USES_COREDOMAIN

Change-Id: I4595a648691e11b0f3860b0d1414fbc9b9c94791
2023-08-23 02:07:47 +00:00
Eric Biggers
448bd57181 Remove all module_request rules
Starting in Android 11, Android unconditionally disables kernel module
autoloading (https://r.android.com/1254748) in such a way that even the
SELinux permission does not get checked.  Therefore, all the SELinux
rules that allow or dontaudit the module_request permission are no
longer necessary.  Their presence or absence makes no difference.

Bug: 130424539
Test: Booted Cuttlefish, no SELinux denials.
Change-Id: Ib80e3c8af83478ba2c38d3e8a8ae4e1192786b57
2023-08-22 16:56:04 +00:00
Kangping Dong
d7ef12ca36 Merge "[Thread] add missing ioctl permission for ot_rcp" into main 2023-08-22 08:01:26 +00:00
Kangping Dong
fce4ea7adf [Thread] add missing ioctl permission for ot_rcp
Otherwise, it throws permission denied error:
```
avc:  denied  { ioctl } for  path="/dev/pts/0" dev="devpts" ino=3 ioctlcmd=0x5401 scontext=u:r:ot_rcp:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=0
```

Test: locally tested that this can fix the denied issue
Bug: 296969044
Change-Id: Ica28214693794b969138212ddb3d19f0dcc34bcf
2023-08-22 07:46:35 +00:00
Treehugger Robot
54bacb776d Merge "Add BUILD_BROKEN_VENDOR_SEAPP_USES_COREDOMAIN" into main 2023-08-22 02:09:45 +00:00
Eran Messeri
8330358c5d Merge "Add remaining attestation properties to selinux" into main 2023-08-21 14:34:49 +00:00
Kean Mariotti
7cce6f5ea0 Allow traceur_app to access winscope traces
Bug: 295816837
Test: capture winscope traces with Traceur
Change-Id: I22a89578ed8f192764b832789f2a2f5f012d77b1
2023-08-21 07:13:42 +00:00
Inseob Kim
d8de8757ae Add BUILD_BROKEN_VENDOR_SEAPP_USES_COREDOMAIN
Starting from Android V, vendor seapp_contexts files can't assign
coredomain to vendor apps, as it's Treble violation. This build broken
variable is to suppress the enforcement for devices launching with U or
prior.

Bug: 280547417
Test: set BUILD_BROKEN_VENDOR_SEAPP_USES_COREDOMAIN := true and build
Change-Id: I7b91db8183a867aa490e490e56cb872ea830b21f
2023-08-21 15:15:34 +09:00
Jeff Pu
5a70ae0fc8 Merge "Add biometric face virtual hal service" into main 2023-08-18 12:51:11 +00:00
Treehugger Robot
6d6183a709 Merge "Add rules for reading VM DTBO by vfio_handler" into main 2023-08-18 08:56:17 +00:00
Inseob Kim
292f22a33b Start tracking vendor seapp coredomain violations
As part of Treble, enforce that vendor's seapp_contexts can't label apps
using coredomains. Apps installed to system/system_ext/product should be
labeled with platform side sepolicy.

This change adds the violators attribute that will be used to mark
violating domains that need to be fixed.

Bug: 280547417
Test: manual
Change-Id: I64f3bb2880bd19e65450ea3d3692d1b424402d92
2023-08-18 15:24:59 +09:00
Seungjae Yoo
1b2d9de08d Add rules for reading VM DTBO by vfio_handler
Bug: 291191362
Test: m

Merged-In: I0b38feb30382c5e6876e3e7809ddb5cf9034e4fd
Change-Id: I0b38feb30382c5e6876e3e7809ddb5cf9034e4fd
2023-08-18 01:17:23 +00:00
Victor Hsieh
aecd87d3dd Merge "Remove shell from neverallow of frp_block_device access" into main 2023-08-17 15:26:55 +00:00
wufei3
50a326d04a Add remaining attestation properties to selinux
Add "ro.product.device_for_attestation" and
"ro.product.manufacturer_for_attestation" prop to selinux permissions.

Bug:294190893
Test: atest CtsKeystoreTestCases:android.keystore.cts.DeviceOwnerKeyManagementTest#testAllVariationsOfDeviceIdAttestation

Change-Id: I71ee17ab59838680199acc9a7c209deba756f603
Signed-off-by: wufei3 <wufei3@xiaomi.corp-partner.google.com>
2023-08-17 11:41:07 +00:00
Treehugger Robot
37e095bbf1 Merge "Add sepolicy rules for crashrecovery APEX." into main 2023-08-17 01:03:27 +00:00
Jeff Pu
fb5d221b27 Add biometric face virtual hal service
Bug: 228638448
Test: Manually following face virtual hal provisioning procedure
Change-Id: I1f61b687be4abe53c62c21769fb57dc9cf9daf45
2023-08-16 17:00:08 -04:00
Dennis Shen
df3a1680d2 Update name from trunk_stable_flags to aconfig flags
the name "trunk stable" is not recommended to appear in android code
base as it is an internal concept. therefore the name change.

Bug: b/295379636
Change-Id: Ice045ac00e2d4987221cc6516baa0d013e6e0943
2023-08-16 19:10:13 +00:00
Victor Hsieh
1020cada2d Remove shell from neverallow of frp_block_device access
Since shell doesn't have any frp_block_device rule anyway.

Bug: None
Test: m

Change-Id: I5aeb54969359500f9473bc08cb1fd42e3470b428
2023-08-16 11:17:31 -07:00
Dennis Shen
5fe5b43bb5 Merge "Setup a common channel to trunk stable flags in system properties" into main 2023-08-16 12:32:56 +00:00
Harshit Mahajan
cd4f71a8b5 Add sepolicy rules for crashrecovery APEX.
Bug: b/289203818
Test: NA

Change-Id: I6d25d413fb512a48e765088bc8dde59c89aec257
2023-08-16 12:00:48 +00:00
Treehugger Robot
243e100005 Merge "Allow typical app domains to measure fs-verity on data file" into main 2023-08-15 14:23:23 +00:00
Treehugger Robot
7dec1e253e Merge "Allow installd to enable fs-verity on app's file" into main 2023-08-15 14:23:23 +00:00
Dennis Shen
d32299780f Setup a common channel to trunk stable flags in system properties
This is a common root node for native trunk stable flags in system properties. Each flag in a namespace will appear in the sys prop as

persist.device_config.trunk_stable_flags.<namespace>.<flag>

Bug: b/295379636
Change-Id: I42e4a799781a9ced442cbdcbdb6b905446d72d73
2023-08-14 14:23:59 +00:00
Greg Kaiser
8cd6556686 Merge "Revert "Add rules for reading VM DTBO by vfio_handler"" into main 2023-08-14 13:19:31 +00:00
Alfred Piccioni
cbb3ddd15f Revert "Add rules for reading VM DTBO by vfio_handler"
This reverts commit 70d70e6be4.

Reason for revert: See internal bug for clarification: http://b/291191362

Change-Id: If37670f7d71635314c618f7ac88802bfbc6fa007
2023-08-14 13:04:00 +00:00
Treehugger Robot
9ea3a16197 Merge "Make font_fallback.xml unreadable" into main 2023-08-14 07:47:20 +00:00
Seungjae Yoo
70d70e6be4 Add rules for reading VM DTBO by vfio_handler
Bug: 291191362
Test: m

Change-Id: If93ca63324679aa1d65b3bb6bf792f8745184132
2023-08-14 10:46:44 +09:00
Seigo Nonaka
d570a5c30f Make font_fallback.xml unreadable
Bug: 281769620
Test: atest CtsGraphicsTestCases
Test: atest CtsTextTestCases
Change-Id: I05011c9313fa3818ec50d9884227512ef1b0fda9
2023-08-14 07:46:19 +09:00
Jooyung Han
c30e7cdce3 Merge "Revert "Allow vold_prepare_subdirs to use apex_service"" into main 2023-08-11 23:23:18 +00:00
Nolan Scobie
51c6453ed7 Merge "Allow Perfetto's traced daemon to set debug sysprops" into main 2023-08-11 16:07:45 +00:00
Jooyung Han
701a0dab5c Revert "Allow vold_prepare_subdirs to use apex_service"
Revert submission 2685449-apexdata-dirs

Reason for revert: b/295345486 performance regression.

Reverted changes: /q/submissionid:2685449-apexdata-dirs

Change-Id: Iceb277cd8a291fb008b45310cc03b5df2057f08c
2023-08-11 15:34:44 +00:00
Treehugger Robot
3c2597caee Merge "webview: Add cgroup setattr of file permission" into main 2023-08-10 09:19:40 +00:00
Jooyung Han
04462f3010 Merge "Revert^2 "Add /bootstrap-apex"" into main 2023-08-10 02:38:30 +00:00
Jooyung Han
8677587245 Revert^2 "Add /bootstrap-apex"
aca291806e

Change-Id: I99d9ba6e804ded5d2fd983e42f143f562c32ce58
2023-08-09 07:05:31 +00:00
Jooyung Han
1158a1559e Merge "Allow vold_prepare_subdirs to use apex_service" into main 2023-08-09 06:37:02 +00:00
Igor Zaslavsky
805daca25e Merge "Add RemoteAuthService" into main 2023-08-08 16:48:51 +00:00
Martin Stjernholm
5896f3e58a Merge "Allow otapreopt_chroot to use stdin and stdout pipes." into main 2023-08-08 13:06:14 +00:00