Commit graph

41253 commits

Author SHA1 Message Date
Pawan Wagh
6d8487370b Add incidentd_service_fuzzer to bindings
Test: m
Bug: 232439428
Change-Id: I9d91a50af04a18d61c05f88a05e22bbb0920058a
2023-05-16 00:53:11 +00:00
Mugdha Lakhani
2ae45c5766 Create sdk_sandbox_all.
Rename sdk_sandbox to sdk_sandbox_34.
Additionally, Extract out parts of sdk_sandbox_34 to
sdk_sandbox_all.te that will be shared with all sdk_sandbox domains.

Bug: b/270148964
Test: atest PackageManagerLocalTest SdkSandboxDataIsolationHostTest
SdkSandboxRestrictionsTest

Change-Id: I36e0c8795148de83c81dfe12559452812aa2b25e
2023-05-09 15:11:39 +00:00
Maciej Żenczykowski
c56709f9af Merge "remove inprocess tethering" 2023-05-05 20:31:58 +00:00
Gavin Corkery
1bff173ec6 Merge "Allow mediaprovider and mediaserver to read sdk_sandbox_data_file" 2023-05-05 15:45:41 +00:00
Mugdha Lakhani
b86b8e2e99 Merge "Relax sdk sandbox sepolicy." 2023-05-05 07:19:25 +00:00
Peiyong Lin
10c06cea0d Merge "Allow graphics_config_writable_prop to be modified." 2023-05-04 17:06:26 +00:00
Mugdha Lakhani
837b2323a4 Relax sdk sandbox sepolicy.
auditallow block from sdk_sandbox has been removed as we haven't yet
measured the system health impact of adding this. It'll be added to an
audit domain later after we've ruled out negative system health impact.

Bug: b/270148964
Test: atest PackageManagerLocalTest SdkSandboxDataIsolationHostTest
SdkSandboxRestrictionsTest
Change-Id: I4a2112d4097c84c87d23a28a7fc0ac5f208dc5dc

Change-Id: Ic4ce690e82b09ed176495f3b55be6069ffc074ac
2023-05-04 16:46:32 +00:00
Gavin Corkery
a2e6584772 Allow mediaprovider and mediaserver to read sdk_sandbox_data_file
Context: go/videoview-local-sandbox. This change is required to
play local files in a VideoView in the SDK sandbox.

Test: Manual steps described in doc
Bug: 266592086
Change-Id: I940609d5dff4fc73d0376489646488c7b96eebb8
2023-05-04 16:21:38 +00:00
Peiyong Lin
54229d8157 Allow graphics_config_writable_prop to be modified.
vendor_init needs to set graphics_config_writable_prop, moving it to
system_public_prop.

Bug: b/270994705
Test: atest CtsAngleIntegrationHostTestCases
Test: m && boot
Change-Id: I2f47c1048aad4565cb13d4289b9a018734d18c07
2023-05-04 15:56:33 +00:00
Howard Chen
f81124b586 Merge "Allow gsid to create alternative installation directory" 2023-05-04 02:23:03 +00:00
Mugdha Lakhani
7714816d36 Merge "Add neverallow rules to protect SDK's private data" 2023-05-03 16:47:11 +00:00
Mugdha Lakhani
407163cc49 Add neverallow rules to protect SDK's private data
SDK's data should not be accessible directly by other domains, including
system server. Added neverallow to ensure that.

Bug: b/279885689
Test: make and boot device
Change-Id: If6a6b4d43f297ec2aa27434dd26f6c88d0d8bcf2
2023-05-03 13:25:00 +00:00
Jinyoung Jeong
3bb2411564 Fix selinux denial for setupwizard_esim_prop
Bug: 280336861
Test: no denial logs found
Change-Id: Ieedf8343f55f047b3fd33cc1cd2c759400dce2b4
Merged-In: Ieedf8343f55f047b3fd33cc1cd2c759400dce2b4
2023-05-02 10:38:24 +00:00
Jin Jeong
27d3cc7483 Merge "Add setupwizard_esim_prop to access ro.setupwizard.esim_cid_ignore" 2023-05-02 08:33:33 +00:00
Treehugger Robot
5ab4239bfb Merge "Allow snapuserd to write log files to /data/misc" 2023-05-02 02:52:58 +00:00
Treehugger Robot
a5915bd166 Merge "Allow servicemanager to make binder calls to gnss" 2023-05-02 01:58:00 +00:00
Jinyoung Jeong
489abecf67 Add setupwizard_esim_prop to access ro.setupwizard.esim_cid_ignore
bug: 279548423
Test:  http://fusion2/b7c803be-2dca-4195-b91f-6c4939746b5b, http://fusion2/bb76429b-7d84-4e14-b127-8458abb3e2ed
Change-Id: I4b190fca2f3825a09d27cfc74e8a528831f4f15b
Merged-In: I4b190fca2f3825a09d27cfc74e8a528831f4f15b
2023-05-02 01:24:23 +00:00
Kelvin Zhang
dbe230a193 Allow snapuserd to write log files to /data/misc
snapuserd logs are important when OTA failures happen. To make debugging
easier, allow snapuserd to persist logs in /data/misc/snapuserd_logs ,
and capture these logs in bugreport.

Bug: 280127810
Change-Id: I49e30fd97ea143e7b9c799b0c746150217d5cbe0
2023-05-01 17:15:17 -07:00
Roman Kiryanov
1f4b85c9f8 Allow servicemanager to make binder calls to gnss
not device specific

Bug: 274041413
Test: boot emulator
Change-Id: I5a70562865f64a258feefd19042949365197b990
2023-05-01 14:38:21 -07:00
Kalesh Singh
ec4780b7d6 Merge "16k: Add sepolicy for max page size prop" 2023-05-01 18:08:11 +00:00
Treehugger Robot
6ffaf62c10 Merge changes from topic "279597861"
* changes:
  Disallow system_server fs-verity operations to system_file
  Revert "Fix denial for ioctl FS Verity"
2023-05-01 16:28:41 +00:00
Wilson Sung
a296496996 Allow fastbootd set boottime property
Bug: 264489957
Test: flash and no related avc error
Change-Id: Ia9a6d4918aa78e6b3e7df39496d786921192c8af
Signed-off-by: Wilson Sung <wilsonsung@google.com>
2023-04-28 07:31:11 +00:00
Howard Chen
98d3e27812 Allow gsid to create alternative installation directory
Bug: 275484855
Test: adb shell gsi_tool install -n -w \
  --gsi-size $(du -b system.raw|cut -f1) \
  --install-dir /data/gsi/oem --userdata-size 8589934592 < system.raw
Change-Id: I46aa48fafec2f3845fa1a5139afb8c03db6b0d4e
2023-04-28 07:06:02 +00:00
Maciej Żenczykowski
e52d2349dd remove inprocess tethering
Test: TreeHugger
Bug: 279942846
Change-Id: I0fd3a7dfe9b554d18de435e5df47de048e453d00
2023-04-27 19:26:06 +00:00
Victor Hsieh
e8ff14a211 Disallow system_server fs-verity operations to system_file
The original change was not a correct solution and was only intended to
silence an error. After the correct fix (aosp/2559927), we can remove
the rule (which is only allow the operation to happen and fail anyway).

Test: m
Bug: None
Change-Id: Ia41fac38e89653578adab3b10def7b1b0d0a3e61
2023-04-27 09:09:55 -07:00
Inseob Kim
6c6f53b1a8 Use target specific intermediate paths
This won't be harmful and this can help reduce rebuilding sepolicy
artifacts upon lunch target change.

Bug: 279524023
Test: m selinux_policy
Change-Id: I859de6dc0ac1958b44d847159904960bd7f9a0c2
2023-04-27 11:11:48 +09:00
Thiébaud Weksteen
97a5408aca Merge "Remove comments in service_contexts" 2023-04-26 23:42:00 +00:00
Victor Hsieh
7890b191d9 Revert "Fix denial for ioctl FS Verity"
This reverts commit af6035c64f.

Reason for revert: aosp/2559927 is the right fix

Bug: 279597861
Bug: 258093107
Test: see b/258093107#30

Change-Id: I8dbea3ba5541072f2ce8969bf32cf214fabb1965
2023-04-26 15:27:18 -07:00
Pawan Wagh
94b3f498cd Merge "Add gatekeeperd_service_fuzzer to bindings" 2023-04-26 19:37:15 +00:00
Steven Moreland
d8b05e70bf Merge "aidl_lazy_test: additional service context" 2023-04-26 18:45:50 +00:00
Thiébaud Weksteen
74482f5328 Remove comments in service_contexts
Commit b554e59 converted the build rules of contexts to Soong.
Previously, both services_contexts and hwservice_contexts were stripped
of comments. This is useful as a CTS test (testAospServiceContexts)
ensures that the device service_contexts matches AOSP. Restore the
previous behaviour.

Bug: 279384270
Test: m selinux_policy; diff plat_service_contexts; no more comments
Change-Id: Id0245efacf4e4b123f805869d95bacf804ccb915
2023-04-26 13:46:59 +10:00
Steven Moreland
295e68f238 aidl_lazy_test: additional service context
A lazy service shouldn't quit when it has clients, but
sometimes it needs to, such as when the device is
shutting down, so we test that it works.

In Android U, I broke this behavior, and it was caught
by other tests. However, now we have test support
for this directly in aidl_lazy_test.

No fuzzer, because this is a test service only, so it's
low-value.

Bug: 279301793
Bug: 278337172
Bug: 277886514
Bug: 276536663
Bug: 278117892
Test: aidl_lazy_test
Change-Id: I36b2602bb87b56ba1eb72420c7fdd60ff1fa14e2
2023-04-26 00:41:05 +00:00
Pawan Wagh
ef3bc95afc Merge "Adding storaged fuzzers" 2023-04-25 22:23:41 +00:00
Martin Stjernholm
3fac381180 Merge "Revert "Introduce a new sdk_sandbox domain"" 2023-04-25 13:29:49 +00:00
Martin Stjernholm
87143bd904 Revert "Introduce a new sdk_sandbox domain"
This reverts commit 304962477a.

Reason for revert: b/279565840

Change-Id: I6fc3a102994157ea3da751364f80730f4d0e87f0
2023-04-25 12:40:37 +00:00
Mugdha Lakhani
9ee52f56bb Merge "Introduce a new sdk_sandbox domain" 2023-04-25 09:20:26 +00:00
Pawan Wagh
2d184d2885 Adding storaged fuzzers
Test: m
Bug: 232439428
Change-Id: I0be9260ecdbdf8e48905869cc4da2efade651ba8
2023-04-24 23:18:34 +00:00
Parth Sane
0e1302ed9f Merge "Add SysProp to set the number of threads in Apexd bootstrap" 2023-04-24 13:04:25 +00:00
Jooyung Han
babd0604bd Add linker.config.pb test
In apex, ./etc/linker.config.pb file should be readable by linkerconfig.

Bug: 218922042
Test: apex_sepolicy_tests_test
Change-Id: Id41710dc127b5f5bda2d5bbb65271bcc0c5179b1
2023-04-24 15:41:35 +09:00
Pawan Wagh
ac031bff46 Add gatekeeperd_service_fuzzer to bindings
Test: m
Bug: 232439428
Change-Id: Icc93e0fa7df8c74b2330b97055b3f159b8e1a9a9
2023-04-21 23:11:04 +00:00
Jayden Kim
69af6d9f1c Merge "Add sepolicy for new bluetooth le radio path loss compensation sysprops" 2023-04-21 20:13:19 +00:00
Mugdha Lakhani
304962477a Introduce a new sdk_sandbox domain
Define the selinux domain to apply to SDK runtime for
targetSdkVersion=34.
The existing sdk_sandbox domain has been renamed to sdk_sandbox_next.
Future CLs will add logic to apply one of these to the SDK runtime
processes on the device, based on a flag.

auditallow block from sdk_sandbox has been removed as we haven't yet
measured the system health impact of adding this. It'll be added to an
audit domain later after we've ruled out negative system health impact.

Bug: 270148964
Test: make and boot the test device, load SDK using test app
Change-Id: I7438fb16c1c5e85e30683e421ce463f9e0b1470d
2023-04-21 17:26:26 +00:00
Parth Sane
e8a2001086 Add SysProp to set the number of threads in Apexd bootstrap
Test: Manual. Tested on device
Bug: 265019048
Change-Id: I1d559b4398c2e91f50da48dc6d5ccbef63fb9d18
2023-04-21 17:01:45 +00:00
Charles Chen
27a8f43fde Fix attribute plurals for isolated_compute_allowed
Following the naming convention.

Bug: N/A
Test: m
Change-Id: Ie26d67423f9ee484ea91038143ba763ed8f97e2f
2023-04-20 16:39:39 +00:00
Charles Chen
290d1876ff Merge "Move isolated_compute_app to be public" 2023-04-20 16:31:52 +00:00
Eric Rahm
66ef8f01ee Merge changes from topic "cherrypicker-L58100000960054695:N31200001359782734"
* changes:
  Allow system_server to verify installed apps
  Fix denial for ioctl FS Verity
2023-04-20 15:06:22 +00:00
Alexander Roederer
e46266d2ce Merge "Add persist.sysui.notification.builder_extras_ovrd" 2023-04-20 13:22:24 +00:00
Charles Chen
c8ab3593d0 Move isolated_compute_app to be public
This will allow vendor customization of isolated_compute_app. New permissions added should be associated with isolated_compute_allowed.

Bug: 274535894
Test: m
Change-Id: I4239228b80544e6f5ca1dd68ae1f44c0176d1bce
2023-04-20 05:39:29 +00:00
Eric Rahm
588d537f0b Allow system_server to verify installed apps
This commit allows system_server to call FS_IOC_SETFLAGS ioctl

Bug: 259756715
Fixes: 272527416
Test: Flash and pair watch, verify denial logs after apps are updated.
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8d15734fb52ce08461fd4259ddfd22e889cf9061)
Merged-In: I7a99d3bb7deb3683b342795cb1bbef7abbbcbe38

Change-Id: I7a99d3bb7deb3683b342795cb1bbef7abbbcbe38
2023-04-20 03:05:01 +00:00
Eric Rahm
af6035c64f Fix denial for ioctl FS Verity
For unknown reason, denial still happens with system app after applying
ag/20712480. This commit adds a work around to fix this.

Bug: 258093107
Fixes: 272530397

Test: flash build, pair watch with phone, check SE denials log
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:0ade3b2183d850fd508569782e35a59ef2bd4dce)
Merged-In: I16932c793c5ca144746d0903ed1826c1847d2add

Change-Id: I16932c793c5ca144746d0903ed1826c1847d2add
2023-04-20 00:02:07 +00:00