Commit graph

416 commits

Author SHA1 Message Date
Rajesh Nyamagoud
ce542660c9 Added sepolicy rule for vendor uuid mapping config
New type added in sepolicy to restrict Vendor defined uuid mapping
config file access to SecureElement.

Bug: b/180639372
Test: Run OMAPI CTS and VTS tests
Change-Id: I81d715fa5d5a72c893c529eb542ce62747afcd03
2021-11-20 01:08:11 +00:00
Bart Van Assche
7efcbf568c Allow the init and apexd processes to read all block device properties am: ec50aa5180 am: b00618fb9f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1783947

Change-Id: Iac344ff86cae6870c6f29fc2b4fb5529482a4219
2021-08-10 01:54:52 +00:00
Bart Van Assche
ec50aa5180 Allow the init and apexd processes to read all block device properties
Addressing b/194450129 requires configuring the I/O scheduler and the
queue depth of loop devices. Doing this in a generic way requires
iterating over the block devices under /sys/class/block and also to
examine the properties of the boot device (/dev/sda). Hence this patch
that allows 'init' and 'apexd' to read the properties of all block
devices. The patch that configures the queue depth is available at
https://android-review.googlesource.com/c/platform/system/core/+/1783847.

Test: Built Android images, installed these on an Android device and verified that modified init and apexd processes do not trigger any SELinux complaints.
Change-Id: Icb62449fe0d21b3790198768a2bb8e808c7b968e
Signed-off-by: Bart Van Assche <bvanassche@google.com>
2021-08-09 13:46:41 -07:00
Treehugger Robot
7406fa45c1 Merge "Refactor apex data file types." am: 4fea2f0e16 am: cafed410aa
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1763205

Change-Id: I47fec594b7f8af80f46c15c4502105e9b8836211
2021-07-13 08:48:26 +00:00
Alan Stokes
fa10a14fac Refactor apex data file types.
We ended up with 4 labels for specific APEX files that were all
identical; I've replaced them with a single one
(apex_system_server_data_file).

Additionally I created an attribute to be applied to a "standard" APEX
module data file type that establishes the basics (it can be managed
by vold_prepare_subdirs and apexd), to make it easier to add new such
types - which I'm about to do.

Fix: 189415223
Test: Presubmits
Change-Id: I4406f6680aa8aa0e38afddb2f3ba75f8bfbb8c3c
2021-07-12 14:41:04 +01:00
Hasini Gunasinghe
4334d35f01 Add keystore permission for metrics re-routing.
Keystore2 atoms need to be rounted to statsd via a proxy.
The proxy needs to have this permission in order to pull metrics from
keystore.

Ignore-AOSP-First: No mergepath to AOSP.
Bug: 188590587
Test: Statsd Testdrive script
Change-Id: Ic94f4bb19a08b6300cfd2d3ed09b31d5b7081bfd
Merged-In: Ic94f4bb19a08b6300cfd2d3ed09b31d5b7081bfd
(cherry picked from commit 61d07e7ce0)
2021-06-30 17:02:14 -07:00
Janis Danisevskis
e1a289b66f Merge "Rename vpnprofilestore to legacykeystore." into sc-dev am: adb49d3df6
Original change: https://googleplex-android-review.googlesource.com/c/platform/system/sepolicy/+/14981212

Change-Id: Ie341418b9491cd93e2af1ebe354f943e8ff85499
2021-06-30 19:57:20 +00:00
Janis Danisevskis
4678660d83 Rename vpnprofilestore to legacykeystore.
Bug: 191373871
Test: N/A
Merged-In: I3f11827909bd37a2127069de82670776a8e192b3
Change-Id: I3f11827909bd37a2127069de82670776a8e192b3
2021-06-30 12:40:39 -07:00
Janis Danisevskis
ab433c765b Rename vpnprofilestore to legacykeystore.
Ignore-AOSP-First: No mergepath from AOSP.
Bug: 191373871
Test: N/A
Change-Id: I3f11827909bd37a2127069de82670776a8e192b3
2021-06-30 09:36:30 -07:00
Hasini Gunasinghe
7611870f49 Merge "Add keystore permission for metrics re-routing." into sc-dev am: 898fc5b39b
Original change: https://googleplex-android-review.googlesource.com/c/platform/system/sepolicy/+/14937250

Change-Id: I881b239515d17f81099ed16d519e1071e80c68ea
2021-06-30 13:32:33 +00:00
Hasini Gunasinghe
898fc5b39b Merge "Add keystore permission for metrics re-routing." into sc-dev 2021-06-30 13:07:22 +00:00
Thierry Strudel
b65cd0a1d6 Merge "Add support for hal_uwb" into sc-dev 2021-06-24 00:45:50 +00:00
Michael Ayoubi
142f375055 Add support for hal_uwb
Bug: 187386527
Test: Boot and confirm HAL is up
Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: Ia866a9a72b6f2ea5b31de25baefd13c2fd0b9c22
Merged-In: Ia866a9a72b6f2ea5b31de25baefd13c2fd0b9c22
2021-06-23 01:25:09 +00:00
Diego Wilson
11d810a7fb Add camera2 extension property policies
These properties allow to vendors to provide their
own camera2 extensions service. The properties
must be accesible to any android app that wishes
to use camera2 extensions.

Bug: 183533362
Change-Id: I94c7ac336b3103355124830320787472f0d2a8b6
Merged-In: I94c7ac336b3103355124830320787472f0d2a8b6
2021-06-21 22:34:29 +00:00
Joanne Chung
a079c3a9a8 Merge "[Sepolicy] Change sepolicy name back to formal name." 2021-06-18 06:56:05 +00:00
Michael Ayoubi
727fbf07e3 Merge "Add support for hal_uwb" am: 26c35067d5 am: 4958ba6d47
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1732953

Change-Id: I4f1ecf4193670628f57b53b3d632009ff1a3e334
2021-06-18 05:15:36 +00:00
Hasini Gunasinghe
61d07e7ce0 Add keystore permission for metrics re-routing.
Keystore2 atoms need to be rounted to statsd via a proxy.
The proxy needs to have this permission in order to pull metrics from
keystore.

Ignore-AOSP-First: No mergepath to AOSP.
Bug: 188590587
Test: Statsd Testdrive script
Change-Id: Ic94f4bb19a08b6300cfd2d3ed09b31d5b7081bfd
2021-06-15 22:19:39 +00:00
Michael Ayoubi
0be7c67da0 Add support for hal_uwb
Bug: 187386527
Test: Boot and confirm HAL is up
Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: Ia866a9a72b6f2ea5b31de25baefd13c2fd0b9c22
2021-06-10 17:46:23 +00:00
Joanne Chung
a6657178f4 [Sepolicy] Change sepolicy name back to formal name.
The feature is public, we can change the fake name to formal name.

Bug: 185550380
Test: build pass and can run service correctly
Merged-In: I956d916077f9a71cdf1df2f0be6f83e6f1f30a98

Change-Id: Idc29942eee6c2fd7658beb69ba62a70397176a66
2021-06-10 11:02:27 +00:00
Alexander Dorokhine
c694413562 Allow the appsearch apex access to the apexdata misc_ce dir.
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1715470

Bug: 177685938
Test: AppSearchSessionCtsTest
Ignore-AOSP-First: Already submitted in aosp/1715470; being cherry-picked into S

Change-Id: I61282b1cd6c9e46b02f66425f39183c63ee1919b
(cherry picked from commit d0e63d0127)
2021-06-02 17:01:41 +00:00
Alexander Dorokhine
d0e63d0127 Merge "Allow the appsearch apex access to the apexdata misc_ce dir." am: 73854e626d am: 9eeb72826c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1715470

Change-Id: I61282b1cd6c9e46b02f66425f39183c63ee1919b
2021-05-27 21:35:55 +00:00
Alexander Dorokhine
0b2553a32b Allow the appsearch apex access to the apexdata misc_ce dir.
Bug: 177685938
Test: AppSearchSessionCtsTest
Change-Id: I727860a02cb9e612ce6c322662d418cddc2ff358
2021-05-26 09:47:19 -07:00
Michael Ayoubi
45333650ec Add DCK eligibility properties
Bug: 186488185
Test: Confirm GMSCore access
Change-Id: I20baf5c9ae9fbebc9e43d2798401ad49776fb74a
Merged-In: I20baf5c9ae9fbebc9e43d2798401ad49776fb74a
2021-05-25 21:39:51 +00:00
Michael Ayoubi
6080fdc9ec Merge "Add DCK eligibility properties" am: 20af5f1e4e am: 64c125adc0
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1715931

Change-Id: I1765b987167e49e102f6725af797e2ce6e7857be
2021-05-25 01:48:39 +00:00
Michael Ayoubi
77c10eff1e Add DCK eligibility properties
Bug: 186488185
Test: Confirm GMSCore access
Change-Id: I20baf5c9ae9fbebc9e43d2798401ad49776fb74a
2021-05-21 23:31:09 +00:00
Chris Wailes
27cc792529 RESTRICT AUTOMERGE: Revert "Add SELinux properties for artd"
This reverts commit 467d8a80ea.

Test: m
Bug: 184281926
Change-Id: Ie95c5f65645d8d372bae9e7ebc325a42b777c1e8
2021-05-19 19:28:39 +00:00
liuyg
87fc7e06db Revert "Allow the MediaProvider app to set FUSE passthrough property" am: 04c85dcfc4 am: 97e0c02e9e am: bdfad42b09
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1705066

Change-Id: I07875bd5e07c5b2b45fb5fdd064790b50ad7eeb7
2021-05-13 19:55:46 +00:00
Alessio Balsini
4e758d5a43 Allow the MediaProvider app to set FUSE passthrough property am: c1e2918fd9 am: bafbd5eeb0 am: 3c7f9b1c7a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1693545

Change-Id: I4340d1aa457cf190eba110b74ef63f76abe6613d
2021-05-13 19:55:35 +00:00
liuyg
04c85dcfc4 Revert "Allow the MediaProvider app to set FUSE passthrough property"
This reverts commit c1e2918fd9.

Reason for revert: Build broke

Change-Id: I4b95e977cf66c586b0d0b465f1b3654c01074152
2021-05-13 18:18:28 +00:00
Alessio Balsini
c1e2918fd9 Allow the MediaProvider app to set FUSE passthrough property
Allow the MediaProvider app to write the system property
fuse.passthrough.enabled in case FUSE passthrough is enabled.
The need for this additional system property is due to the ScopedStorage
CTS tests that are assuming FUSE passtrhough is always on for devices
supporting it, but there may be some cases (e.g., GSI mixed builds)
where this is not possible true and the feature is disabled at runtime,
thus causing the tests to fail.
This additional system property is only set when FUSE passthrough is
actually being used by the system.

Bug: 186635810
Test: CtsScopedStorageDeviceOnlyTest
Signed-off-by: Alessio Balsini <balsini@google.com>
Change-Id: I623042d67399253a9167188c3748d93eb0f2d41f
2021-05-13 17:38:16 +00:00
Hridya Valsaraju
037300eb6b Merge changes If26ba23d,Ibea38822 am: f35c70b0dd am: 09665a69c3 am: 9413e4b62f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1696318

Change-Id: Ia4af31c21970786ef65764e0d3c2af6fe72c5634
2021-05-05 18:41:01 +00:00
Hridya Valsaraju
f35c70b0dd Merge changes If26ba23d,Ibea38822
* changes:
  Revert "Revert "Exclude vendor_modprobe from debugfs neverallow restrictions""
  Revert "Revert "Add neverallows for debugfs access""
2021-05-05 17:31:35 +00:00
Songchun Fan
c201aff5a9 [sepolicy] allow system server to read incfs metrics from sysfs am: 633f7ca868 am: 5ba48ae269 am: 73793c2fcd
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1696320

Change-Id: I3f62c003ce2f3111f779617343f4ca0c7325a390
2021-05-05 15:55:45 +00:00
Songchun Fan
633f7ca868 [sepolicy] allow system server to read incfs metrics from sysfs
Address denial messages like:

05-05 05:02:21.480  1597  1597 W Binder:1597_12: type=1400 audit(0.0:140): avc: denied { read } for name="reads_delayed_min" dev="sysfs" ino=107358 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

BUG: 184844615
Test: atest android.cts.statsdatom.incremental.AppErrorAtomTests#testAppCrashOnIncremental
Change-Id: I201e27e48a08f99f41a030e06c6f22518294e056
2021-05-04 22:56:41 -07:00
Hridya Valsaraju
498318cc65 Revert "Revert "Exclude vendor_modprobe from debugfs neverallow restrictions""
This reverts commit 231c04b2b9.

Now that b/186727553 is fixed, it should be safe to revert this revert.

Test: build
Bug: 184381659
Change-Id: If26ba23df19e9854a121bbcf10a027c738006515
2021-05-04 22:07:08 -07:00
Nicolas Geoffray
882537a989 Merge "Allow boot animation to update boot status." am: 82bf10a79c am: 75de97b2e4 am: 1f652713d1
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1687883

Change-Id: I791ffa1d83a1bf9bbb5a15f69ffce6e7e86441ce
2021-04-29 09:32:32 +00:00
Nicolas Geoffray
82bf10a79c Merge "Allow boot animation to update boot status." 2021-04-29 07:53:05 +00:00
Christian Wailes
6de8e5debe Merge "Add SELinux properties for artd" am: 6553a8dbe6 am: b9502c818f am: b921e1dac4
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1663786

Change-Id: Ie4bd8ae58edc80993c56ba3cf806135c716526fc
2021-04-28 20:23:52 +00:00
Nicolas Geoffray
6a311471a6 Allow boot animation to update boot status.
This CL was missed from the topic:
https://android-review.googlesource.com/q/topic:bootanim-percent

Test: update ART module, see animation go to 100%
Bug: 184881321
Change-Id: I59706718af11751a7e1f4b5ab1ff2793f554fb19
2021-04-28 15:17:09 +01:00
Chris Wailes
467d8a80ea Add SELinux properties for artd
Test: boot device and check for artd process
Change-Id: I2a161701102ecbde3e293af0346d1db0b11d4aab
2021-04-27 14:49:13 -07:00
Treehugger Robot
88903b91a9 Merge "Fix permissions for vold.post_fs_data_done" am: 206d6d80a1 am: e85d0ef89c am: b99fe5711a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1684054

Change-Id: I0921af74d1309fcaa3f36e53476090da085ab07f
2021-04-26 22:09:08 +00:00
Treehugger Robot
206d6d80a1 Merge "Fix permissions for vold.post_fs_data_done" 2021-04-26 20:36:34 +00:00
Eric Biggers
040ce199b2 Fix permissions for vold.post_fs_data_done
The system property "vold.post_fs_data_done" is used by init and vold to
communicate with each other in order to set up FDE on devices that use
FDE.  It needs to be gettable and settable by vold, and settable by init
and vendor_init.  This was the case in Android 11 and earlier; however,
the change
https://android-review.googlesource.com/c/platform/system/sepolicy/+/1277447
("Rename exported and exported2 vold prop") broke this by giving this
property the type "vold_config_prop", which made it no longer settable
by vold.

Since none of the existing property types appear to be appropriate for
this particular property, define a new type "vold_post_fs_data_prop" and
grant the needed domains permission to get/set it.

This is one of a set of changes that is needed to get FDE working again
so that devices that launched with FDE can be upgraded to Android 12.

Bug: 186165644
Test: Tested FDE on Cuttlefish
Change-Id: I2fd8af0091f8b921ec37381ad3b85a156d074566
2021-04-26 12:43:05 -07:00
Hridya Valsaraju
4d8e3b032b Merge changes from topic "revert-1668411-MWQWEZISXF" am: 7362f58895 am: b4fe53980f am: cb7c75c028
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1685768

Change-Id: I1cb8c339e1f75e3d9c0a8dc5d8c96c7b9ded79a6
2021-04-23 23:05:26 +00:00
Hridya Valsaraju
7362f58895 Merge changes from topic "revert-1668411-MWQWEZISXF"
* changes:
  Revert "Add a neverallow for debugfs mounting"
  Revert "Add neverallows for debugfs access"
  Revert "Exclude vendor_modprobe from debugfs neverallow restrictions"
  Revert "Check that tracefs files are labelled as tracefs_type"
2021-04-23 22:06:31 +00:00
Robert Horvath
f0989714ca Merge "Add bootanim property context, ro.bootanim.quiescent.enabled property" am: dbfe4809ba am: 03070a86ec am: 0b1d2a7385
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1676224

Change-Id: I6b7b8419e27ce03fae35451ba3e7cc842ee67335
2021-04-23 17:46:15 +00:00
Robert Horvath
dbfe4809ba Merge "Add bootanim property context, ro.bootanim.quiescent.enabled property" 2021-04-23 16:45:32 +00:00
Hridya Valsaraju
231c04b2b9 Revert "Exclude vendor_modprobe from debugfs neverallow restrictions"
Revert submission 1668411

Reason for revert: Suspect for b/186173384
Reverted Changes:
Iaa4fce9f0:Check that tracefs files are labelled as tracefs_t...
I743a81489:Exclude vendor_modprobe from debugfs neverallow re...
I63a22402c:Add neverallows for debugfs access
I289f2d256:Add a neverallow for debugfs mounting

Change-Id: I04f8bfdc0e5fe8d2f7d6596ed7b840332d611485
2021-04-23 16:38:20 +00:00
Treehugger Robot
d21e4d0980 Merge changes from topic "debugfs_neverallow" am: 005ae599cd am: 95fef2b070 am: cf2b67a243
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1668411

Change-Id: I1fe5c7c31f12e0a68c76dde8810aba465d499922
2021-04-22 17:30:53 +00:00
Treehugger Robot
005ae599cd Merge changes from topic "debugfs_neverallow"
* changes:
  Check that tracefs files are labelled as tracefs_type
  Exclude vendor_modprobe from debugfs neverallow restrictions
  Add neverallows for debugfs access
  Add a neverallow for debugfs mounting
2021-04-22 16:41:06 +00:00