Commit graph

47502 commits

Author SHA1 Message Date
Treehugger Robot
350ddbb9dc Merge "Make enable_16k_pages_prop readable by vendor" into main 2024-03-28 03:26:30 +00:00
Inseob Kim
09b27c7109 Add "DO NOT ADD statements" comments to public
For visibility

Bug: 232023812
Test: N/A
Change-Id: I0bc6dc568210b81ba1f52acb18afd4bcc454ea1c
2024-03-28 11:27:43 +09:00
Inseob Kim
5769fd90f2 Merge "Minimize public policy" into main 2024-03-28 01:14:45 +00:00
Inseob Kim
75806ef3c5 Minimize public policy
Ideally, public should only contain APIs (types / attributes) for
vendor. The other statements like allow/neverallow/typeattributes are
regarded as implementation detail for platform and should be in private.

Bug: 232023812
Test: m selinux_policy
Test: diff <(git diff --staged | grep "^-" | cut -b2- | sort) \
           <(git diff --staged | grep "^+" | cut -b2- | sort)
Test: remove comments on plat_sepolicy.cil, replace base_typeattr_*
      to base_typeattr and then compare old and new plat_sepolicy.cil
Change-Id: I5e7d2da4465ab0216de6bacdf03077d37f6ffe12
2024-03-28 00:33:46 +00:00
Kelvin Zhang
b9a6b9ac11 Make enable_16k_pages_prop readable by vendor
Vendor_init needs to read this property to process event triggers
depending on ro.product.build.16k_page.enabled .

Test: th
Bug: 319335586
Change-Id: I4f52073fbd2a138d84162710c925f65cc705c356
2024-03-27 14:23:16 -07:00
Kyle Zhang
71a8c6a244 Add drm_hal_server to system_server signal list
Bug: 327704353
Change-Id: I2ce7833508d85dea46902ccabb536005f7bf54fb
2024-03-27 18:39:08 +00:00
Jiakai Zhang
e98c6d2b38 Merge "Update SELinux policy for Pre-reboot Dexopt." into main 2024-03-27 13:16:27 +00:00
Jiakai Zhang
4acd07323e Update SELinux policy for Pre-reboot Dexopt.
- Add pm.dexopt.* properties.
- Add rules for running artd in chroot.

Bug: 311377497
Test: manual - Run Pre-reboot Dexopt and see no denial.
Change-Id: If5ff9b23e99be033f19ab257c90e0f52bf250ccf
2024-03-27 10:53:50 +00:00
Nikolay Elenkov
b68becbeb7 Allow system_server to call ISecretKeeper.deleteAll()
This allows RecoverySystem to destroy all secretkeeper secrets before
rebooting into recovery, thus ensuring that secrets are unrecoverable
even if data wipe in recovery is interrupted or skipped.

Bug: 324321147
Test: Manual - System -> Reset options -> Erase all data.
Test: Hold VolDown key to interrupt reboot and stop at bootloader
screen.
Test: fastboot oem bcd wipe command && fastboot oem bcd wipe recovery
Test: fastboot reboot
est: Device reboots into recovery and prompts to factory reset:
Test: 'Cannot load Android system. Your data may be corrupt. ...

Change-Id: Ia0c9e4ecf839590ecbb478836efcd00bbeea5f47
2024-03-27 05:57:22 +00:00
Nikolay Elenkov
b584704c28 Merge "Allow system_server to call IKeystoreMaintenance.deleteAllKeys()" into main 2024-03-27 05:55:38 +00:00
Treehugger Robot
0e5b64af14 Merge "lmkd: Add ro.lmkd.direct_reclaim_threshold_ms property policies" into main 2024-03-26 20:19:50 +00:00
Ted Bauer
37371c9360 Merge "Make system_aconfig_storage_file domain-readable" into main 2024-03-26 16:27:32 +00:00
Ted Bauer
a2b17ab856 Make system_aconfig_storage_file domain-readable
Read access to this file is needed by any process that reads flags.
For now, exclude access to vendors.

Bug: 328444881
Test: m
Change-Id: I1899d2a0c61a6286fc285a532244730ad1e4a0fc
2024-03-26 13:54:58 +00:00
Thiébaud Weksteen
5e63ad5b32 [automerger skipped] Merge "Add context that system server can access and perfetto can save traces to" into android14-tests-dev am: 9fafa76eff -s ours
am skip reason: Merged-In Id015429b48ffffb73e7a71addddd48a22e4740bf with SHA-1 c5cb5a248d is already in history

Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3002429

Change-Id: I17da2be60dc6d3b43b8d37661b1aa484ab5e1a65
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-26 00:49:31 +00:00
Yisroel Forta
6a6a8a167f [automerger skipped] Add context that system server can access and perfetto can save traces to am: eb217d40bf -s ours
am skip reason: Merged-In Id015429b48ffffb73e7a71addddd48a22e4740bf with SHA-1 c5cb5a248d is already in history

Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3002429

Change-Id: I32d3f39b75c9c681cf762e685aeeed086cc7fc8f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-26 00:49:27 +00:00
Thiébaud Weksteen
9fafa76eff Merge "Add context that system server can access and perfetto can save traces to" into android14-tests-dev 2024-03-26 00:40:20 +00:00
Thiébaud Weksteen
ac43afc2bd [automerger skipped] Merge "Add exception for vendor_aconfig_storage_file" into android14-tests-dev am: 0b8293a2cc -s ours
am skip reason: Merged-In I9750c24ffa26994e4f5deadd9d772e31211a446a with SHA-1 f008c29e47 is already in history

Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3002428

Change-Id: Icad9512a24c7818896dbd9be9bad40686e3016e5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-25 22:57:08 +00:00
Thiébaud Weksteen
63fa2d7a56 [automerger skipped] Add exception for vendor_aconfig_storage_file am: 6720a995bc -s ours
am skip reason: Merged-In I9750c24ffa26994e4f5deadd9d772e31211a446a with SHA-1 f008c29e47 is already in history

Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3002428

Change-Id: I31cdb90f3ffc7165785ad5535968437d029b29e1
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-25 22:57:04 +00:00
Thiébaud Weksteen
0b8293a2cc Merge "Add exception for vendor_aconfig_storage_file" into android14-tests-dev 2024-03-25 22:44:34 +00:00
Nikolay Elenkov
3941b68743 Allow system_server to call IKeystoreMaintenance.deleteAllKeys()
This allows RecoverySystem to destroy all synthetic blob protector keys
and make FBE-encrypted data unrecoverable even if data wipe in recovery
is interrupted or skipped.

Bug: 324321147
Test: Manual - System -> Reset options -> Erase all data.
Test: Hold VolDown key to interrupt reboot and stop at bootloader
screen.
Test: fastboot oem bcd wipe command && fastboot oem bcd wipe recovery
Test: fastboot reboot
Test: Device reboots into recovery and prompts to factory reset:
Test: 'Cannot load Android system. Your data may be corrupt. ...

Change-Id: I5be2f9e8314d36448994f4f14ff585ded7095c8c
2024-03-25 05:10:08 +00:00
Thiébaud Weksteen
6720a995bc Add exception for vendor_aconfig_storage_file
Backporting the original change would require aosp/2960462, aosp/2976451
and aosp/2982791. Simply add the exception and the basic type definition.

Test: m plat_policy_for_vendor.cil
Change-Id: I9750c24ffa26994e4f5deadd9d772e31211a446a
Merged-In: I9750c24ffa26994e4f5deadd9d772e31211a446a
2024-03-25 11:10:17 +11:00
Treehugger Robot
78dbd5ea7b Merge "allow aconfigd to mmap test storage files" into main 2024-03-22 00:43:54 +00:00
Steven Moreland
393a1049b8 [automerger skipped] intro misctrl am: 5792482bff -s ours
am skip reason: Merged-In Ib172d101d68409f2500b507df50b02953c392448 with SHA-1 b4f42d449b is already in history

Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3002427

Change-Id: I0133f83fe1ae742d2ea4725aec22e3cbfc4c5199
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-21 23:14:41 +00:00
Dennis Shen
328f91120f allow aconfigd to mmap test storage files
Bug: b/312459182
Test: atest aconfigd_test
Change-Id: Ia4ee6606e3e8721e4ed22c63ac7046f9511be2b9
2024-03-21 18:59:53 +00:00
Vadim Caen
88e37d37f1 Merge "Allow virtual_camera to use fd from surfaceflinger" into main 2024-03-21 15:46:29 +00:00
Treehugger Robot
b8e34c377a Merge "lmkd: Add sepolicy rules around bpf for lmkd" into main 2024-03-21 06:07:18 +00:00
Treehugger Robot
a6039befcf Merge "allow domain search for /metadata dir" into main 2024-03-21 03:07:16 +00:00
Dennis Shen
9a5b2f5e3b allow domain search for /metadata dir
While testing aconfig storage file read by a demo app. We discovered
the need to do metadata_file:dir search in logcat log.

Bug: b/312459182
Test: demo app start
Change-Id: I0872ff192280228cc2270ae4a04755bc5cfbd9cc
2024-03-21 01:50:06 +00:00
Treehugger Robot
4042062627 Merge "Allow system apps to read and write /data/misc/connectivityblobdb/" into main 2024-03-21 01:33:58 +00:00
Yisroel Forta
eb217d40bf Add context that system server can access and perfetto can save traces to
Give perfetto rw dir and create file permissions for new directory.
Give system server control to read, write, search, unlink files from new directory.

Test: locally ensure traces can be written by perfetto and accessed and deleted by system server
Bug: 293957254
(cherry picked from https://android-review.googlesource.com/q/commit:c5cb5a248d1cda1557f19f98c92ffda96d44d31a)
Merged-In: Id015429b48ffffb73e7a71addddd48a22e4740bf
Change-Id: Id015429b48ffffb73e7a71addddd48a22e4740bf
2024-03-21 11:13:19 +11:00
Steven Moreland
5792482bff intro misctrl
Generic binary for managing the misc partition.

Bug: 317262681
Test: boot, check bugreport
(cherry picked from https://android-review.googlesource.com/q/commit:b4f42d449b803df11b9f62e9968fce25096ecd5b)
Merged-In: Ib172d101d68409f2500b507df50b02953c392448
Change-Id: Ib172d101d68409f2500b507df50b02953c392448
2024-03-21 11:03:33 +11:00
Joseph Murphy
44c2821d2b Merge "Revert "Restrict SDK sandbox unix_stream_socket connections"" into main 2024-03-20 20:47:17 +00:00
Hansen Kurli
78f7da3136 Merge "Sepolicy setup for /data/misc/connectivityblobdb/" into main 2024-03-20 20:27:18 +00:00
Joseph Murphy
29e57309f1 Revert "Restrict SDK sandbox unix_stream_socket connections"
This reverts commit d226ac41e2.

Reason for revert: DroidMonitor identified candidate

Change-Id: Id961f81208fa18e76ae59855de9edc7b91a4201b
2024-03-20 18:23:46 +00:00
Treehugger Robot
b637f1a413 Merge "Cameraserver: Allow camera to switch thread scheduling policy" into main 2024-03-20 16:25:50 +00:00
Sandro Montanari
8c569d673a Merge "Restrict SDK sandbox unix_stream_socket connections" into main 2024-03-20 15:36:31 +00:00
Sandro Montanari
d226ac41e2 Restrict SDK sandbox unix_stream_socket connections
Bug: 328729812
Test: atest --test-mapping packages/modules/AdServices/sdksandbox
Change-Id: If26e853d66039aebead20076df4387cd6ca9788d
2024-03-20 14:10:12 +00:00
Dennis Shen
10c1046a3f Merge "allow all domain search permission for aconfig_storage_metadata_file dir" into main 2024-03-20 11:56:57 +00:00
Emilian Peev
a31bbfe4e2 Cameraserver: Allow camera to switch thread scheduling policy
Allow camera server to switch the scheduling policy
for certain time critical threads.

Bug: 323292530
Test: Manual using camera application,
Camera CTS

Change-Id: Ib665009c095efc21f65b1d8b3ddd9c2528c1c794
2024-03-19 19:14:45 +00:00
Mitch Phillips
26477ab5a0 Merge "Allow permissive MTE to be set by non-root users" into main 2024-03-19 19:06:13 +00:00
Dennis Shen
cd560f115b allow all domain search permission for aconfig_storage_metadata_file dir
Just allow aconfig_storage_metadata_file:file read permission is not
enough to read the pb file, we also need
aconfig_storage_metadata_file:dir search permission.

Bug: b/312459182
Test: audit2allow after having demo app access the file
Change-Id: I1790ea84a56e83f43313af82378f245e2bb6597e
2024-03-19 17:50:16 +00:00
Treehugger Robot
1b45a0af5e Merge "Allow odrefresh to relabel staging files to apex_art_data_file." into main 2024-03-19 16:27:27 +00:00
Treehugger Robot
69fdfcde37 Merge "Add a trailing newline" into main 2024-03-19 15:34:45 +00:00
Treehugger Robot
2fa70270a2 Merge "Add rule for system_server to send Perfetto a signal" into main 2024-03-19 14:31:25 +00:00
Dennis Shen
30fdc75046 Merge "update aconfigd selinux policy" into main 2024-03-19 14:31:02 +00:00
Dennis Shen
89a2c6988a update aconfigd selinux policy
For aconfigd test, for atest to work, the shell domain needs to be able
to connect to aconfigd_socket. In addition, aconfigd needs to be able to
access the test storage files as shell_data_file. All these policies are
only needed for userdebug_or_eng build.

Bug: 312459182
Test: m, launch avd, atest, then audit2allow, no avc denials found
Change-Id: Ifb369f7e0000dfe35305fe976e330fa516ff440c
2024-03-19 12:24:23 +00:00
Carlos Galo
ea1bd5d68f lmkd: Add sepolicy rules around bpf for lmkd
LMKD needs to be able to attach BPF tracepoints. It needs to be able to
access tracefs, attach and run bpf programs.

Test: m
Test: Verified no denials with lmkd and libmemevents integration
Bug: 244232958
Change-Id: I57248b729c0f011937bec139930ca9d24ba91c3b
Signed-off-by: Carlos Galo <carlosgalo@google.com>
2024-03-19 00:46:47 -07:00
Carmen Jackson
33c057444a Add rule for system_server to send Perfetto a signal
Cancelling/ending traces wasn't working properly in the Developer
Telemetry APIs due to this missing rule. Now, calling destroyForcibly
on the Perfetto process running the trace successfully kills the
process.

Bug: 293957254
Test: locally with atest ProfilingFrameworkTests#testRequestProfilingCancel
Change-Id: I91d83dde01897eb9e48cf4a90e44d088c3f2a45f
2024-03-19 05:36:22 +00:00
Inseob Kim
4914c17ded Add a trailing newline
Bug: 326134149
Test: TH
Change-Id: I7a47014a8cd9d586f521b8926197a3659dd13b6b
2024-03-19 10:24:55 +09:00
Eric Biggers
b58636b2d3 Merge "Stop granting permission to report_off_body to keystore2" into main 2024-03-18 21:08:40 +00:00