Commit graph

41939 commits

Author SHA1 Message Date
Changyeon Jo
561930c06b Update hal_evs_default policy
- Allow to access writable graphics properties.
- Allow to perform binder IPC.

Bug: 303581276
Test: m -j selinux_policy
Change-Id: I02c8ccd416172e5f6c17eff6573137dd4a8147c7
2023-10-12 20:31:07 +00:00
Changyeon Jo
152a2f1755 Allow dumpstate to make binder IPC to automotive display service
Bug: 280837170
Test: atest android.security.cts.SELinuxHostTest#testNoBugreportDenials
Change-Id: I8239ba23bb60b95e7dd07a4c8a99167f1e08192b
2023-09-26 18:47:45 +00:00
Victor Hsieh
8ee7e50799 Merge "Allow system_server to enable fs-verity on staging APK" into main 2023-09-25 15:35:48 +00:00
Qais Yousef
e11729f825 Merge "Revert "SELinux policy changes for uprobe."" into main 2023-09-25 09:24:47 +00:00
Inseob Kim
2f0bcc1b0a Remove remaining APEX sepolicy types
Bug: 297794885
Test: boot cuttlefish
Change-Id: I2ff465217adcf1bb0267ea6d487a9a46b6584458
2023-09-25 11:19:44 +09:00
Yu-Ting Tseng
e2bd44d48d Revert "SELinux policy changes for uprobe."
This reverts commit c69343fea9.

Reason for revert: b/301700965

Change-Id: Id858e82398cb6dc65be355ce27f3c9d56f889cfa
2023-09-23 04:13:14 +00:00
Yu-Ting Tseng
fcc90e8af2 Merge "SELinux policy changes for uprobe." into main 2023-09-22 20:01:06 +00:00
Victor Hsieh
6b71195fbe Allow system_server to enable fs-verity on staging APK
This allows package manager enables fs-verity to an APK if it is
installed with .idsig in the classic install session (non-incremental).
This is done in ag/24707249 behind a flag. This sepolicy change was
missed by mistake.

Bug: 277344944
Test: atest android.appsecurity.cts.PkgInstallSignatureVerificationTest
Change-Id: If403d84611b69ab076a808addebbd5f0738cdc68
2023-09-22 10:20:22 -07:00
Handa Wang
b6314bd9ca Merge "allow ot_daemon to read/write sockets shared by system_server" into main 2023-09-22 09:05:06 +00:00
Handa Wang
8612e80d18 allow ot_daemon to read/write sockets shared by system_server
system_server creates an ICMPv6 socket and send it to ot_daemon via ParcelFileDescriptor. ot_daemon will use that socket to send/receive ICMPv6 messages.

Here's how the socket is created in System Server:
int sock = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6);

Bug: 294486086

Security consultation bug: 296809188

Test: Verified on a cuttlefish

Change-Id: I9d479c9da01187a0e476591f447f7199ecb3a409
2023-09-22 02:18:46 +00:00
Treehugger Robot
ae071b717b Merge "hal_dumpstate service is now AIDL service" into main 2023-09-22 01:16:28 +00:00
Yu-Ting Tseng
c69343fea9 SELinux policy changes for uprobe.
Test: m selinux_policy
Change-Id: I56565c05b6337ecd5ec20fb11443c13daaef1ad8
2023-09-21 14:50:13 -07:00
Isaac J. Manjarres
1064f51841 Let incidentd read the wakeup_sources debugfs node for userdebug/eng builds
Currently, incidentd is allowed to read the wakeup_sources debugfs
node only if a device does not enforce debugfs restrictions. If a device
enforces debugfs restrictions, debugfs cannot be mounted on user builds,
but can be mounted on userdebug and eng builds.

Processes that need to use debugfs should therefore be able to
access it on userdebug and eng builds. So, allow incidentd to
read the wakeup sources debugfs node for userdebug and eng builds.

Bug: 300477252
Change-Id: I9bb480a0418a6d176b39753d552f409e139be178
Signed-off-by: Isaac J. Manjarres <isaacmanjarres@google.com>
2023-09-20 14:06:21 -07:00
Carlos Galo
a8e1fe01da Merge "system_server: allow access to proc/memhealth/*" into main 2023-09-20 05:04:44 +00:00
Jooyung Han
309065bb5b hal_dumpstate service is now AIDL service
Bug: 301079572
Test: VtsHalDumpstateTargetTest
Change-Id: I86e80cadcfa51557efad58d854880b9d421e9df9
2023-09-20 10:53:03 +09:00
Carlos Galo
004cc8c21c system_server: allow access to proc/memhealth/*
Libmemevents requires read-access to the attribute files exposed by the
memhealth driver.

Test: build
Test: no denials to /proc/memhealth/oom_victim_list from libmemevents
Bug: 244232958
Change-Id: I617c75ab874ad948af37d3e345e5202e46781f3f
Signed-off-by: Carlos Galo <carlosgalo@google.com>
2023-09-20 00:30:13 +00:00
Thiébaud Weksteen
cc85f22c4d Remove com.android.sepolicy policy
Bug: 297794885
Test: presubmit
Change-Id: I91b1584fe2e13322cd3a0add92887097e190246e
2023-09-19 12:41:52 +10:00
Treehugger Robot
531e26d991 Merge "Revert^3 "Start tracking vendor seapp coredomain violations"" into main 2023-09-18 05:06:32 +00:00
Inseob Kim
8bc8b75f95 Revert^3 "Start tracking vendor seapp coredomain violations"
This reverts commit b193c80986.

Reason for revert: Fix is merged

Change-Id: Ia2dcd6584ee763c6da3f3b7fdd9f4710ffde9bfc
2023-09-18 04:08:19 +00:00
Inseob Kim
5d94d75e38 Merge "Revert^2 "Start tracking vendor seapp coredomain violations"" into main 2023-09-15 03:59:23 +00:00
Inseob Kim
b193c80986 Revert^2 "Start tracking vendor seapp coredomain violations"
This reverts commit 6ec4e5f048.

Reason for revert: breaking build

Change-Id: If99f309fd8d5dd5b42a871259451c10530e1769d
2023-09-15 03:58:00 +00:00
Treehugger Robot
430c93557f Merge "Revert "Start tracking vendor seapp coredomain violations"" into main 2023-09-15 03:06:00 +00:00
Inseob Kim
6ec4e5f048 Revert "Start tracking vendor seapp coredomain violations"
This reverts commit 292f22a33b.

Reason for revert: removed all attribute usages; no need

Change-Id: Iab489f1a94733438ba0c552fb9e3eb354423a156
2023-09-14 15:57:04 +00:00
Treehugger Robot
3fceb02a3c Merge "Revert "sepolicy: allow surfaceflinger to read device_config_aconfig_flags_prop"" into main 2023-09-14 01:18:00 +00:00
Alexei Nicoara
37d8c5f8c2 Merge "Making sys.boot.reason.last restricted" into main 2023-09-13 17:35:49 +00:00
Ady Abraham
b1600f9275 Revert "sepolicy: allow surfaceflinger to read device_config_aconfig_flags_prop"
This reverts commit 62d337ec6d.

Reason for revert: aosp/2746856 should be sufficient 

Change-Id: Iec8456cc46970f3a027ea5fd95c010058ad62611
2023-09-13 17:11:11 +00:00
Wonsik Kim
c8eacad5a8 Merge "Add a fuzzer for media.c2 HAL" into main 2023-09-12 16:14:49 +00:00
Dennis Shen
b7052688e3 Merge "Update SELinux to allow vendor process access" into main 2023-09-12 12:19:14 +00:00
Wilson Sung
679b7cb04a Allow shell access to attestation properties
The properties for attestation are congifured in build.prop files and
used by frameworks Build.java.
Allow app to access them from 'adb shell am'

Bug: 296168846
Test: m selinux_policy
Change-Id: Ie749cf5d621c03c21aa538f96a06d21680a61569
2023-09-12 11:33:14 +08:00
Jooyung Han
84b9b076ab Merge "APEX file_context should have valid labels" into main 2023-09-11 22:30:20 +00:00
Treehugger Robot
6ac568d4ab Merge "Add device_config read access to priv_app" into main 2023-09-11 22:22:59 +00:00
Alexei Nicoara
957e8f37a1 Making sys.boot.reason.last restricted
sys.boot.reason.last needs to be readable by SysUI to correctly display the reason why authentication is required to unlock the phone.

Bug: 299327097
Test: presubmit
Change-Id: I9f83ade92858056609bc665ecb6ce9b93eb051e4
2023-09-11 18:29:24 +01:00
Dennis Shen
584852eaa7 Update SELinux to allow vendor process access
Bug: b/298934058, b/295379636
Change-Id: I2521ae27a88d471263ba4bff69947b2ce28b4b4e
2023-09-11 14:30:29 +00:00
Kangping Dong
e32751f748 Merge "[Thread] move ot-daemon to the tethering module" into main 2023-09-11 11:20:52 +00:00
Jooyung Han
92bfb372fc APEX file_context should have valid labels
A new test mode (--all) tests if every file context label used in APEX
is "known". It should fail if unknown label is used in APEX.

Bug: 299391194
Test: atest apex_sepolicy_tests_test
Change-Id: Ie467019a6dc74bba9901ba8d705b31e6de24cd62
2023-09-11 13:39:09 +09:00
Seigo Nonaka
5717c080c8 Add device_config read access to priv_app
Bug: 299830837
Test: manually done
Change-Id: Ie0490496bcb98d7c5894b2ada372fe76fea64d26
2023-09-11 09:53:44 +09:00
Jeff Pu
3778cd4765 Accept binder calls from servicemanger
Bug: 228638448
Test: Manual
Change-Id: Iaa64d252417ffeda7c07365c5ecd1b517b07314b
2023-09-08 16:02:05 -04:00
Seungjae Yoo
2151f06ada Merge "Change sepolicy of virtualizationservice and vfio_handler for VM DTBO" into main 2023-09-08 05:04:03 +00:00
Treehugger Robot
6952d2f612 Merge "Use prebuilts for compat test if prebuilts exist" into main 2023-09-08 04:35:02 +00:00
Inseob Kim
472d7dcada Fix se_freeze_test
The module name is changed but it isn't applied to Android.mk

Bug: 296875906
Test: m selinux_policy and see se_freeze_test run
Change-Id: Ia25845a1aff2c2b5f910f8432a455ee93a157580
2023-09-08 11:54:11 +09:00
Inseob Kim
2aac33597d Use prebuilts for compat test if prebuilts exist
system/sepolicy should support both REL build and ToT build. That means
that system/sepolicy and prebuilts may differ. As the frozen sepolicy is
what vendor sepolicy uses, so we need to use prebuilts to run Treble
compat test.

Bug: 296875906
Test: m selinux_policy on REL
Change-Id: I4b290266ba87e3f011d640bec133fc88359ea52f
2023-09-08 10:44:49 +09:00
Ady Abraham
ab64129dbb Merge "sepolicy: allow surfaceflinger to read device_config_aconfig_flags_prop" into main 2023-09-07 19:16:18 +00:00
Treehugger Robot
8342def00a Merge "C2 AIDL sepolicy update" into main 2023-09-07 17:54:05 +00:00
Treehugger Robot
f476f5c8f1 Merge changes Ia2c07331,I93f0d222 into main
* changes:
  Use only public cil files for Treble compat test
  Build prebuilt policy with Soong
2023-09-07 08:52:45 +00:00
Seungjae Yoo
f0aaa15d28 Change sepolicy of virtualizationservice and vfio_handler for VM DTBO
Bug: 297103622
Test: adb shell /apex/com.android.virt/bin/vm run-microdroid --devices /sys/bus/platform/devices/16d00000.eh --protected
Change-Id: Icebba7f441a94f8ba54b4a9d35036d4202a513ab
2023-09-07 17:07:44 +09:00
Kangping Dong
1348776bed Merge "[Thread] move ot-ctl to vendor" into main 2023-09-07 07:58:17 +00:00
Inseob Kim
0d49b9bc28 Use only public cil files for Treble compat test
Rationale for this change:

1) Vendors use only public files, so we should be able to use only
   public cil files for compatibility test.
2) treble_sepolicy_tests_for_release.mk is too complex, because it
   requires compiled sepolicy. Reducing the complexity will help migrate
   into REL build.
3) This fixes a tiny bug of treble_sepolicy_tests that it can't catch
   public types being moved to private types, and then removed. 29.0.cil
   and 30.0.cil change contains such missing public types.

Bug: 296875906
Test: m selinux_policy (with/without intentional breakage)
Change-Id: Ia2c0733176df898f268b5680195da25b588b09c7
2023-09-07 16:35:08 +09:00
Inseob Kim
5d7423ff3d Build prebuilt policy with Soong
... and remove redundant Makefile codes. This also updates commit hook
as we now only use Soong to build sepolicy.

Bug: 296875906
Test: m selinux_policy
Change-Id: I93f0d222a0c10e31c51c9380780a8927c47d62b1
2023-09-07 16:32:30 +09:00
Ady Abraham
62d337ec6d sepolicy: allow surfaceflinger to read device_config_aconfig_flags_prop
Bug: 297528870
Change-Id: I711bc8fa3aa1c8f90588327a411f46421f14da90
Test: presubmit
2023-09-07 02:47:45 +00:00
Wonsik Kim
53e5ae799d Add a fuzzer for media.c2 HAL
Bug: 251850069
Test: presubmit
Change-Id: I4c58df29641465c019147b86bfd58b0e37961b1f
2023-09-06 14:31:27 -07:00