Commit graph

47693 commits

Author SHA1 Message Date
Ellen Arteca
96da6272a8 Merge "Fix installd not having permission to delete storage area keys" into main am: 19208cb0e3
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3095417

Change-Id: I5714bd938eaa91bfe8e96d13bd407bf2973163f1
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-22 17:04:47 +00:00
Ellen Arteca
19208cb0e3 Merge "Fix installd not having permission to delete storage area keys" into main 2024-05-22 17:03:15 +00:00
Dennis Shen
3a33d825f9 selinux: added a new dir /metadata/aconfig/maps, it assumes existing am: 08da1322db
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3092943

Change-Id: I2e155b96b37b9e0021401814f00709246dfb8aa2
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-22 16:57:22 +00:00
Dennis Shen
08da1322db selinux: added a new dir /metadata/aconfig/maps, it assumes existing
aconfig_storage_metadata_file file type by default

Bug: b/312444587
Test: atest aconfigd_test
Change-Id: Ic0b8974dc33d4ecc3e46f0f595a6b068a78539ff
2024-05-21 18:47:04 +00:00
Ellen Arteca
1c7e529242 Fix installd not having permission to delete storage area keys
Bug: 325129836
Test: atest StorageAreaTest
Change-Id: I6dd1678fe1b184372221b479aaeba17c1ab4788c
2024-05-21 17:58:05 +00:00
Dennis Shen
2e2632b219 Merge "selinux: allow aconfig to read /aepx" into main am: 2f5774f756
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3092562

Change-Id: If0217ac2d3181e58b0c8cf4fbb198ca85dec21a4
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-21 14:55:24 +00:00
Dennis Shen
2f5774f756 Merge "selinux: allow aconfig to read /aepx" into main 2024-05-21 14:39:44 +00:00
Thiébaud Weksteen
30591033a7 Merge changes I9b32916e,I7c4771de into main am: e138fe460b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3088167

Change-Id: I86722870f9d7c216f633fe36cc01049fb3a4efcb
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-21 10:45:14 +00:00
Thiébaud Weksteen
e138fe460b Merge changes I9b32916e,I7c4771de into main
* changes:
  Define new kernel security classes
  Symlink microdroid access_vectors and security_classes
2024-05-21 10:26:46 +00:00
Seungjae Yoo
14898c5d0c Merge "Set sepolicy for vmnic in AVF" into main am: e5df7418a4
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3084846

Change-Id: Ib7f263aad4bf9297b6491de86fb2dc17fdf992e9
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-21 05:01:49 +00:00
Seungjae Yoo
e5df7418a4 Merge "Set sepolicy for vmnic in AVF" into main 2024-05-21 04:40:55 +00:00
Treehugger Robot
bf9aec10fc Merge "statsd: allow misctl property" into main am: 4fa0ed2bc1
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3086708

Change-Id: If41c1bf9b4f981dd959c0a15025acafec4d4b815
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-21 01:55:26 +00:00
Treehugger Robot
4fa0ed2bc1 Merge "statsd: allow misctl property" into main 2024-05-21 01:25:32 +00:00
Inseob Kim
9892ce9cee Remove 1000000.0 mapping files am: 23c543c0ed
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3093740

Change-Id: I342c70bc77bd718d0152465809cd1f05402ccbb8
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-20 06:46:46 +00:00
Seungjae Yoo
f60a1e0b90 Set sepolicy for vmnic in AVF
Bug: 340376951
Test: Presubmit
Change-Id: I5f48ff4a459805de2f74d160c1b61473c6de0466
2024-05-20 14:15:22 +09:00
Inseob Kim
23c543c0ed Remove 1000000.0 mapping files
It's a workaround for -with-phones branch and redundant now.

Test: TH
Change-Id: I0ec9e00a8ee1e3c929f33cbba3b8339c7e42b885
2024-05-20 10:23:55 +09:00
Dennis Shen
f6106361f1 selinux: allow aconfig to read /aepx
Bug: b/312444587
Test: m and avd
Change-Id: I6ac81dd211ad7669952f97f9541c44e14680bec6
2024-05-20 00:44:56 +00:00
Yakun Xu
8077576872 Merge "Thread: allow ot-rcp to bind a specific netif" into main am: 60f55289f8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3081323

Change-Id: I833ea7b2e26feeefdf2529d2ab0c716c696cdda5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-17 04:11:55 +00:00
Yakun Xu
60f55289f8 Merge "Thread: allow ot-rcp to bind a specific netif" into main 2024-05-17 03:52:14 +00:00
Thiébaud Weksteen
31533d3c8b Merge "Grant dumpstate append to app_data_file_type" into main am: 1b85ead322
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3088105

Change-Id: I534f0645532dfa73baf3aa6646f311a2755089d7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-16 23:42:09 +00:00
Thiébaud Weksteen
1b85ead322 Merge "Grant dumpstate append to app_data_file_type" into main 2024-05-16 23:29:39 +00:00
Treehugger Robot
f3e51a6fec Merge "Adjust policy that allows virtualizationservice to access RKPD" into main am: ca83352d1b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3086832

Change-Id: I0ffa6a6ae46e82cffd91cdae6368ea67f1cbee40
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-15 16:13:18 +00:00
Jiakai Zhang
085f25ef20 Add a system property namespace for Pre-reboot Dexopt. am: 1a3775bbb8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3087872

Change-Id: Ic6603cf425be82ca9bc1a36fa12c490649da7a3e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-15 16:12:49 +00:00
Treehugger Robot
ca83352d1b Merge "Adjust policy that allows virtualizationservice to access RKPD" into main 2024-05-15 16:05:38 +00:00
Alice Wang
f7fc9f921a Adjust policy that allows virtualizationservice to access RKPD
Test: atest AvfRkpdAppIntegrationTests
Change-Id: I4f946326af3ce96466bb2c7de1762fbed056ec09
2024-05-15 14:33:36 +00:00
Jiakai Zhang
1a3775bbb8 Add a system property namespace for Pre-reboot Dexopt.
We need to maintain the Pre-reboot Dexopt state across system server
crashes and restarts, but not across reboots. System properties are
suitable for this use case. The state includes whether the job has run
and the OTA slot.

Bug: 311377497
Change-Id: I527d4ba6064c1600d97ce2efc8be211b9460a8f0
Test: Presubmit
2024-05-15 14:20:22 +00:00
Maciej Żenczykowski
0c4f5d4745 Merge "allow non bpfloader creation of bpf maps" into main am: 6e95ee78e3
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2751710

Change-Id: I7166f37d3638241147982db316e44c271506ab6f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-15 07:54:23 +00:00
Maciej Żenczykowski
6e95ee78e3 Merge "allow non bpfloader creation of bpf maps" into main 2024-05-15 07:37:07 +00:00
Thiébaud Weksteen
6772c50574 Define new kernel security classes
Define new classes and access vectors recognised by the kernel.

Bug: 340491179
Test: boot and check logs for undefined class or permission
Change-Id: I9b32916ea231cf396aa326ed7e08cb14e4eb2c9b
2024-05-15 04:45:20 +00:00
Thiébaud Weksteen
4b79c66714 Symlink microdroid access_vectors and security_classes
Symlink the access vectors and classes definitions of microdroid
reqd_mask to microdroid platform.

These definitions are not yet linked to the generic platform policy.

Bug: 340491179
Bug: 215093641
Test: build & TH
Change-Id: I7c4771dedfd2f35a7dda7d78bf863cbc0c288e67
2024-05-15 13:47:25 +10:00
Thiébaud Weksteen
76f7261d14 Grant dumpstate append to app_data_file_type
dumpstate may be executed by apps in different domains. Notably, a
system_app needs to be able to save the output in its own directory.

  avc:  denied  { append } for comm="binder:575_1" dev="dm-50"
  ino=10712 scontext=u:r:dumpstate:s0
  tcontext=u:object_r:system_app_data_file:s0 tclass=file

Using the app_data_file_type attribute to capture all the potential app
data types. For info, the current Cuttlefish policy has:

  $ seinfo -x -a app_data_file_type cf_policy
    attribute app_data_file_type;
        app_data_file
        bluetooth_data_file
        nfc_data_file
        privapp_data_file
        radio_data_file
        sdk_sandbox_data_file
        shell_data_file
        storage_area_app_dir
        storage_area_content_file
        storage_area_dir
        system_app_data_file

Test: bugreport
Change-Id: I7685c1fcdb3896c44fe44008b1b262c3f1e90a01
2024-05-15 10:55:37 +10:00
Steven Moreland
0ae9148a35 statsd: allow misctl property
For detecting 16 KB issues.

Bug: 332406754
Test: build
Change-Id: I27f7044133dad54b91bbab5911b05a6cc254be36
2024-05-14 20:31:11 +00:00
Alan Stokes
c702594172 Suppress denials for odsign console am: 8b80dacadc
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3085865

Change-Id: Id23bd90e60972781e25896dd2a0ee6a8195ec96e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-14 17:42:34 +00:00
Alan Stokes
8b80dacadc Suppress denials for odsign console
When odsign spawns compos_verify it has our stdin/out connected to its
console. But none of the VM processes use stdin/out at all; they log
to logcat instead.

So instead of allowing the access (which immediately leads to the same
denials in virtualizationmanager), just suppress the audit logs.

Bug: 293259827
Test: Exercise isolated compilation successfully with no denials seen.
Change-Id: I454bb2fe106b656a9695511cbf09350402b30bdd
2024-05-14 17:07:35 +01:00
Thiébaud Weksteen
7575d606d5 Collect test names in sepolicy_tests.py am: 70cf2cd6e3
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3084845

Change-Id: I610f574d5ada646ed7bc58c1e48fc3b9e2237b83
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-14 06:32:14 +00:00
Thiébaud Weksteen
70cf2cd6e3 Collect test names in sepolicy_tests.py
Some entries in Tests were not matching their actual function (e.g.,
TestSystemTypeViolators instead of TestSystemTypeViolations).
Automatically generate the list of tests, based on the 'Test' prefix in
their name.

Test: sepolicy_tests -h
Change-Id: I1865e24c6cc1bfe15f633263897ea7530140c41d
2024-05-14 13:42:13 +10:00
Treehugger Robot
c29897e144 Merge "Allow mounting and unmounting functionfs." into main am: fff886e374
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3079245

Change-Id: I921561cb97cbbcf8811acea592b1e327170278a1
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-09 09:07:45 +00:00
Yakun Xu
c5f8e959d3 Thread: allow ot-rcp to bind a specific netif
This commit adds necessary permissions for ot-rcp to bind
to a network interface specified by its address or name.

Test: presubmit
Bug: 329188649
Change-Id: I6731df79c04eeeb2c39017b99b9c2acf315256e2
2024-05-09 17:05:04 +08:00
Treehugger Robot
fff886e374 Merge "Allow mounting and unmounting functionfs." into main 2024-05-09 08:46:08 +00:00
Nate Jiang
f4274ddf4b Change WifiScanner from system_api_service to app_api_service am: 229807f032
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3080743

Change-Id: I1d64dcd03fb53a963bdde998ed7d9522a796a0f2
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-09 06:30:17 +00:00
Jiakai Zhang
be2e719598 Allow mounting and unmounting functionfs.
Pixel has /dev/usb-ffs/adb, /dev/usb-ffs/mtp, and /dev/usb-ffs/ptp in
type functionfs.

Bug: 311377497
Change-Id: Id9388a0d420c712962804f6441c86cfb3c4e9e62
Test: adb shell cmd jobscheduler run android 27873781
2024-05-09 04:03:18 +00:00
Nate Jiang
229807f032 Change WifiScanner from system_api_service to app_api_service
This will allow the CTS get the WifiScanner to test. Also WifiScanner is
a system API and all APIs are protected by the priviliged permissions.

Bug: 339527374
Test: CtsWifiTestCases

Change-Id: Ic06a5804fa81a952e9e8792e93df489a9d47d521
2024-05-09 00:13:26 +00:00
Devin Moore
e015381258 Merge "Allow crash_dump to read misctrl properties" into main am: ba99b14c5c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3073627

Change-Id: I13ca1825e3c62265d49f56a47ca968d405a87fda
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-07 20:18:49 +00:00
Devin Moore
ba99b14c5c Merge "Allow crash_dump to read misctrl properties" into main 2024-05-07 19:55:51 +00:00
Eric Laurent
05cde4e744 Allow native audio server to access the virtual device manager service am: df665c694b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3074638

Change-Id: Iadcf883ad9ce614116bd841ec963c64e2bcfd579
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-07 15:34:01 +00:00
Eric Laurent
df665c694b Allow native audio server to access the virtual device manager service
This is needed when accessing SensorManager since commit 71db5f82

Bug: 336860810
Test: make
Ignore-AOSP-First: needed on internal branch first
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:caad49e71d927e021575c3051d7d10ff7917e09c)
Merged-In: I303c6e3418ca5179c615c2c643fdf9783d323c78
Change-Id: I303c6e3418ca5179c615c2c643fdf9783d323c78
2024-05-07 00:21:30 +00:00
Devin Moore
49a4a06264 Allow crash_dump to read misctrl properties
This is used to determine if the device has been in 16k page size mode
to help debug issues with that.

Test: debuggerd_test with ro.misctl.16kb_before="1"
Bug: 335247092
Change-Id: I7b5fcd39cc5b3247d866814fbcf53299d68846c2
2024-05-06 15:40:12 +00:00
Maciej Żenczykowski
28960d319a allow non bpfloader creation of bpf maps
In practice only bpf programs are critical to device security...

Normally there is basically no use for creating bpf maps outside
of the bpfloader, since they have to be tied directly into the bpf
programs (which is only ever done by the bpfloader during the boot
process) to be of any use.

This means that bpf maps created after the bpfloader is done,
can't actually be used by any bpf code...

Hence we had this restriction.

However, map-in-map support changes this:

It becomes possible to define a boot-time (bpfloader loaded)
bpf program which accesses an (initially empty) outer map
(created by the bpfloader).

This outer map can be populated with inner maps at run time by various
bpf using userspace code.  While it can be populated with bpfloader
created 'static' maps, it also makes sense to be able to create/destroy
these inner maps on demand 'dynamically'.

This allows bpf map memory utilization to be driven by actual runtime
device needs.  For example scaling with the number of users, apps,
or connected networks.

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I93223c660463596c9e50065be819e2fd865da923
2024-05-04 11:02:13 +00:00
Treehugger Robot
d513960000 Merge "Use no_full_install: true instead of installable: false" into main am: 18eb855a0f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/3069483

Change-Id: Ic871a3de158b39b1d66a844f999a1def39f28894
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-04 00:24:07 +00:00
Treehugger Robot
18eb855a0f Merge "Use no_full_install: true instead of installable: false" into main 2024-05-04 00:04:03 +00:00