Commit graph

10621 commits

Author SHA1 Message Date
52542bfa6a fixup! sepolicy: Allow fsck_untrusted to be sys_admin 2024-09-08 22:47:09 +02:00
Michael Bestas
caa5a8a29e Exempt data_between_core_and_vendor_violators from vold neverallow
Commit 9a5992336e changed the label of
/data/vendor_de. Unfortunately some devices with very old tz applets
store fingerprint configuration directly in /data/vendor_de.

Since we do not have source code access and we cannot modify/hex patch
the tz applet because it is signed, use the existing
data_between_core_and_vendor_violators attribute to make fingerprint
work again on these devices.

Test: m
Change-Id: Ibb78f837ff808fc5e15c4b790105c07f4501a08b
2024-09-08 22:29:04 +02:00
Nolen Johnson
43c750d477 Add property to workaround M_RELEASE rsp len issues
* Needed after Ibbf81e922fe75bf0ef5b8cd7197c812348063db5.

Change-Id: I03bbf44429b095844e0004fcef238213610c7cce
2024-09-08 22:28:57 +02:00
Nolen Johnson
00206e09fd private: Exempt system_app from adbd_config_prop neverallow
* ATV can't use the newer mobile method for ADB over Wi-Fi
  as ethernet is a massive usecase for us, and that implementation
  refuses to play nicely with any interface but Wi-Fi.

* Therefore, to avoid having to carry the crappy intermediate prop
  solutions in device/lineage/atv, relax this, as it's still a
  system namespace and still a limited context that is allowed to
  set the property.

Change-Id: Id87ebae6d0552bb8b9faac3114dca42128eaf5b0
2024-09-08 22:28:43 +02:00
Michael Bestas
6f0a3fe12b Label system properties to config audio codec priority
bluetooth.a2dp.source.sbc_priority.config
bluetooth.a2dp.source.aac_priority.config
bluetooth.a2dp.source.aptx_priority.config
bluetooth.a2dp.source.aptx_hd_priority.config
bluetooth.a2dp.source.ldac_priority.config
bluetooth.a2dp.source.lc3_priority.config

Bug: 270032693
Test: manually test in local build
Change-Id: I328e2d6ef0ba277f4eb2c132db8ae22539c1a91d
2024-09-08 22:25:05 +02:00
me-cafebabe
3135a20175 Add property to disable APCF extended features
* Required for change I4b1764b7551150e78dd8e2dfc99a6472c1293c2b

Change-Id: I895c7c81b55eff7137b6c558e3a66d57f2406a30
2024-09-08 22:24:51 +02:00
HeroBuxx
a2a71a5525 fixup! sepolicy: Allow recovery to alter /
Signed-off-by: HeroBuxx <me@herobuxx.me>
2024-09-08 22:22:19 +02:00
HeroBuxx
cbf3df362f fixup! sepolicy: whitelist recovery from node creation neverallow
Signed-off-by: HeroBuxx <me@herobuxx.me>
2024-09-08 22:22:19 +02:00
HeroBuxx
2d19253baa fixup! sepolicy: Add sdcard_posix_contextmount_type attribute
Signed-off-by: HeroBuxx <me@herobuxx.me>
2024-09-08 22:22:08 +02:00
Jaewan Kim
ea3e08d53d Allow shell to read AVF DT nodes
Hostside test needs to check existence of /proc/device-tree/avf/guest
to check whether AVF debug policy is installed.

Bug: 345118393
Test: Verified manually on tangorpro-user
(cherry picked from https://android-review.googlesource.com/q/commit:168e04da79db850714afd018a6e88da983c89579)
Merged-In: I33d6bd1bd7c5513395f162e2bcbbfd15c1b80bcd
Change-Id: I33d6bd1bd7c5513395f162e2bcbbfd15c1b80bcd
2024-06-19 01:06:25 +00:00
Priyanka Advani
3c1cd9c05b Merge "Revert "Introducing vm_tethering_service as system_server_service"" into main am: 5aa7ff8369
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3134016

Change-Id: I1c79e6da041c4341349835b3296479090b8b0fdb
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-14 17:54:40 +00:00
Priyanka Advani
5aa7ff8369 Merge "Revert "Introducing vm_tethering_service as system_server_service"" into main 2024-06-14 17:48:06 +00:00
Priyanka Advani
3833f2f9d6 Revert "Introducing vm_tethering_service as system_server_service"
This reverts commit 70e6e885ae.

Reason for revert:  <Potential culprit for b/347203579  - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.>

Change-Id: I28064a2f38114d4e91356828576bfb3b9030b977
2024-06-14 17:46:44 +00:00
Ján Sebechlebský
2bb77d1934 Merge "Add missing SELinux rule for accessing GPU" into main am: f41e544cb2
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3125913

Change-Id: I685cd9cba816f85d1f30c1e83721f0dbf333aad0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-14 08:07:02 +00:00
Ján Sebechlebský
f41e544cb2 Merge "Add missing SELinux rule for accessing GPU" into main 2024-06-14 07:58:43 +00:00
Seungjae Yoo
e4890ed894 Merge "Introducing vm_tethering_service as system_server_service" into main am: 9d04376e55
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3121391

Change-Id: I4f3ab70bcd4f8965d00ad84a7cd5fc4afaa29913
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-14 05:46:25 +00:00
Seungjae Yoo
9d04376e55 Merge "Introducing vm_tethering_service as system_server_service" into main 2024-06-14 05:43:49 +00:00
Treehugger Robot
7c9ac69a60 Merge "SELinux: allow gms core write to aconfigd socket" into main am: 3115b03d9e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3132573

Change-Id: I2ee1d7a39e326cec8d51e23f17339deb5eb3b274
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-14 00:27:51 +00:00
Treehugger Robot
3115b03d9e Merge "SELinux: allow gms core write to aconfigd socket" into main 2024-06-14 00:22:03 +00:00
Dennis Shen
182b19b51c SELinux: allow gms core write to aconfigd socket
Bug: b/312459182
Test: m
Change-Id: If59a1c8bdf98274b9dac33a2125780a3c43910db
2024-06-13 18:45:49 +00:00
Jan Sebechlebsky
9999b0a332 Add missing SELinux rule for accessing GPU
Bug: 301023410
Test: atest virtual_camera_tests CtsVirtualDevicesCameraTestCases CtsVirtualDevicesCameraCtsTestCases
Merged-In: Iaaab570fc2cb3b2bfe17f964a52b09a0549e0a8b
Change-Id: Iaaab570fc2cb3b2bfe17f964a52b09a0549e0a8b
2024-06-13 14:23:22 +00:00
Satoshi Niwa
1649ae652c Merge "Add /system/bin/traced_relay to file_contexts" into main am: 3c4364447d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3127574

Change-Id: Id099746839932f72a593173f12429d97057a83d9
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-13 08:58:58 +00:00
Satoshi Niwa
3c4364447d Merge "Add /system/bin/traced_relay to file_contexts" into main 2024-06-13 08:53:29 +00:00
Satoshi Niwa
56a5c1c0db Add /system/bin/traced_relay to file_contexts
traced_relay is a service that takes the place of traced
in a guest VM and relays the producer connections to the
host tracing service. (aosp/2646664)

The service requires the same permissions as traced.

Bug: 333835162
Bug: 340402999
Test: Run traced_relay in a guest VM
Change-Id: Ifc7854e0d3ebaf0f9021cf455a2433037525a0bc
2024-06-13 04:17:37 +00:00
Seungjae Yoo
70e6e885ae Introducing vm_tethering_service as system_server_service
Bug: 340376953
Test: Presubmit
Change-Id: Iab1b348c8c593ea6d9615b6f80cddc8b78bed1fa
2024-06-13 11:07:52 +09:00
Seungjae Yoo
6a28c726c4 Merge "Grant TUNGETIFF ioctl and revoke SIOCGIFFLAGS ioctl to vmnic" into main am: 5a77925214
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3120132

Change-Id: I0e5ff9a9bb667d43027641cad61da692c0fe7415
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-13 01:44:15 +00:00
Seungjae Yoo
5a77925214 Merge "Grant TUNGETIFF ioctl and revoke SIOCGIFFLAGS ioctl to vmnic" into main 2024-06-13 01:38:54 +00:00
Jeffrey Huang
970d43eaab Merge "Allow statsd to read file descriptors from any app" into main am: bfcc43e84e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3107057

Change-Id: I046583d19a6772fbb4f91e27de56a6280dc27e43
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-12 21:33:08 +00:00
Jeffrey Huang
bfcc43e84e Merge "Allow statsd to read file descriptors from any app" into main 2024-06-12 21:14:37 +00:00
Treehugger Robot
a4ffe3b38d Merge "Compatibility for vendor_hidraw_device" into main am: 1327971c7c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3116384

Change-Id: I34fb224ac84cf888527ad166b9ebd6cf13b6c1dc
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-11 10:34:00 +00:00
Treehugger Robot
1327971c7c Merge "Compatibility for vendor_hidraw_device" into main 2024-06-11 10:12:02 +00:00
Seungjae Yoo
a217b1f191 Grant TUNGETIFF ioctl and revoke SIOCGIFFLAGS ioctl to vmnic
To delete TAP interface in vmnic, it should retrieve libc::ifreq struct
object from file descriptor of TAP interface, to execute SIOCSIFFLAGS
and TUNSETIFF ioctls.

On the other hand, we can reuse libc::ifreq struct for executing
SIOCSIFFLAGS ioctl constructed for executing TUNSETIFF and TUNSETPERSIST
ioctls. So we don't need to grant SIOSGIFFLAGS ioctl anymore, to get
libc::ifreq struct.

Bug: 340376951
Test: Presubmit
Change-Id: I448c8ca5366c0e27d5d5fe09bcb366c5f23650ac
2024-06-11 13:27:36 +09:00
Karuna Wadhera
c91f365902 Merge "Untrack keystore SELinux denial on AVF RKP Hal" into main am: e357df7504
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3122031

Change-Id: Ic45ddce19ccc5d3ba42c7c7c4e40e3c883d81351
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-10 19:31:14 +00:00
Karuna Wadhera
e357df7504 Merge "Untrack keystore SELinux denial on AVF RKP Hal" into main 2024-06-10 19:06:35 +00:00
Karuna Wadhera
fb728ac3af Untrack keystore SELinux denial on AVF RKP Hal
With the dontaudit line in keystore.te commented out on an otherwise clean build, I was unable to see the SELinux denial on boot. So, it seems like this denial may not be occurring anymore and it’s safe to remove the dontaudit line.

Bug: 312427637
Test: manual
Change-Id: Ib8887f0593ea984e3c011b76a81b7bf99cff2a44
2024-06-10 14:32:19 +00:00
Alan Stokes
8a6bb3ef84 Compatibility for vendor_hidraw_device
Older vendor policy may apply the label vendor_hidraw_device to the
HID device.

From 202404 we use the new label hidraw_device for this.

Fix the compatibility rules to allow new system policy to work with
older vendor policy by adding specific compat logic.

Note that the original 34.0 system policy didn't mention hidraw_device
at all, so the more normal compatibility mechanisms don't really work.

Bug: 340923653
Test: Builds, boots, no new denials
Change-Id: I358118b217c82b5f8111f3e05d35aa16c464b941
2024-06-10 14:59:04 +01:00
Alice Wang
94148a33fe Merge "Add system property to disable avf remote attestation" into main am: 97091293b7
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3117519

Change-Id: Ia99358fe9e6c4dcacc2814c96268ec47f9884db9
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-10 12:09:00 +00:00
Alice Wang
97091293b7 Merge "Add system property to disable avf remote attestation" into main 2024-06-10 11:31:52 +00:00
Alice Wang
3d9ce1a965 Add system property to disable avf remote attestation
Introduce a new system property
avf.remote_attestation.enabled to allow vendors
to disable the feature in vendor init.

Bug: 341598459
Test: enable/disable the feature and check VmAttestationTestApp
Change-Id: I809e4c62a8590822eef70093e33854ab79757835
2024-06-10 09:16:24 +00:00
Treehugger Robot
e6618432f9 Merge "system_app.te: fix misleading comment" into main am: 104099ef21
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3120251

Change-Id: Ia49f4b47e4d08da7195812dd01b7df456c7e9025
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-10 08:24:21 +00:00
Treehugger Robot
104099ef21 Merge "system_app.te: fix misleading comment" into main 2024-06-10 08:03:10 +00:00
Nick Kralevich
c8ac77735e system_app.te: fix misleading comment
A comment within system_app.te implies that system_apps can read/write
the /data/data directory (and all subdirectories). The comment is
misleading. Fix the comment.

Test: comment only change. No test needed
Change-Id: I51b95f8b55ac89730a866d2a829326b276b11824
2024-06-07 10:20:18 -07:00
Ellen Arteca
949db99e7c Merge "Modify permissions to move encryption policy assignment to vold_prepare_subdirs" into main am: c628579730
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3095418

Change-Id: I0a019e1b6054825929fadd320036991e3979778c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-06 23:36:22 +00:00
Ellen Arteca
c628579730 Merge "Modify permissions to move encryption policy assignment to vold_prepare_subdirs" into main 2024-06-06 23:16:13 +00:00
Steven Moreland
57061954d2 more vm socket isolation am: 378ed74529
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3114226

Change-Id: Ib8605365b1823611b41183bdfc548c6abc913ec8
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-06 18:47:07 +00:00
Jeffrey Huang
288cbd7409 Allow statsd to read file descriptors from any app
Bug: 343243378
Test: m -j
Change-Id: I11d7e0222bec3c02e200b9f675939261738d0390
2024-06-06 11:12:09 -07:00
Ellen Arteca
aa898dc541 Modify permissions to move encryption policy assignment to vold_prepare_subdirs
We have moved the encryption policy assignment from vold to
vold_prepare_subdirs. This CL removes some permissions from vold
over storage areas that are no longer needed due to this change,
and adds some permissions to vold_prepare_subdirs.

Bug: 325129836
Test: atest StorageAreaTest
Change-Id: Ief2a8021ed3524018d001e20eae60f712f485d81
2024-06-06 17:48:43 +00:00
Steven Moreland
378ed74529 more vm socket isolation
Bugs: me
Test: build
Change-Id: Ie34ac041f1234891043098a4decf05ec7a9e6761
2024-06-05 23:45:44 +00:00
Dennis Shen
1f2eea0c7a Merge "selinux: allow everybody to read flags from RO flag storage file" into main am: 0467d14618
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3112421

Change-Id: I948458b771e030fb4b7ef31f5a5c38a854f7db2f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-04 17:22:58 +00:00
Dennis Shen
0467d14618 Merge "selinux: allow everybody to read flags from RO flag storage file" into main 2024-06-04 17:11:18 +00:00