Commit graph

10154 commits

Author SHA1 Message Date
Thiébaud Weksteen
448968a6d1 Prebuilt updates
Bug: 308058980
Test: m selinux_policy
Change-Id: I23b2265340002b4b9f8d15ad0a8e8324aa0f94e1
2023-11-29 06:01:56 +00:00
Treehugger Robot
e22500d7b9 Merge "Label wifi.interface." into main 2023-11-28 10:20:23 +00:00
Seungjae Yoo
ed25d9436d vendor_microdroid_file shouldn't be overwrited
If malicious process in the host overwrites microdroid vendor image,
unexpected behavior could be happened.

Bug: 285854379
Test: adb shell /apex/com.android.virt/bin/vm run-microdroid --vendor /vendor/etc/avf/microdroid/microdroid_vendor.img

Change-Id: I18ce5112b75b2793c85bb59c137715beb602a5f3
2023-11-28 11:20:18 +09:00
LuK1337
0372255af1 Label wifi.interface.
This lets us override AIDL WiFi HAL interfaces.

Bug: 313385486
Change-Id: I3bb0c274f5fb6f709d09b67deff2df7229e04369
2023-11-27 18:00:55 +00:00
Thiébaud Weksteen
8c225b0c73 Merge "Ignore access to /proc/pagetypeinfo for Settings" into main 2023-11-23 22:55:54 +00:00
Thiébaud Weksteen
bdc7214f85 Ignore access to /proc/pagetypeinfo for Settings
avc:  denied  { read } for  comm="pool-3-thread-6" name="pagetypeinfo"
dev="proc" ino=4026531857 scontext=u:r:system_app:s0
tcontext=u:object_r:proc_pagetypeinfo:s0 tclass=file permissive=0

Bug: 312375728
Test: m selinux_policy
Change-Id: Ic2946e181d3a0af65a6ebe093ef7f257c75a1c22
2023-11-23 10:40:07 +11:00
George Chan
09a7dd1714 Merge "Added system_api_service to bg_install_control_service" into main 2023-11-22 22:32:00 +00:00
George Chan
7d0df3459b Added system_api_service to bg_install_control_service
Bug: 296060433
Test: m
Change-Id: I7b0a20991a417aefae99b4c206ca8234d85ed615
2023-11-22 21:52:58 +00:00
Max Bires
f019332f6d Remove deprecated enable_rkpd property
The enable_rkpd property is no longer needed. This change removes the
vestigial property.

Test: Successful build
Change-Id: I810d5a21cbe01b43a37244959e21febd0880be59
2023-11-22 17:24:07 +00:00
Alice Wang
e79bbf9cf8 Revert^4 "[avf][rkp] Allow virtualizationservice to register RKP HAL"
Revert submission 2829351-revert-2812456-revert-2812435-revert-2778549-expose-avf-rkp-hal-GTFGLMUUKQ-PAWNEHUQBT-WYENGHRTXK

Reason for revert: Relands the original topic:
https://r.android.com/q/topic:%22expose-avf-rkp-hal%22

Changes from the reverted cl aosp/2812455:
 - The AIDL service type has been renamed from avf_* to hal_* to be
   consistent with the others.

 - The new AIDL service type, hal_remotelyprovisionedcomponent_avf_service,
   for the IRPC/avf service, has been set up with the server/client model
   for AIDL Hal. The virtualizationservice is declared as server and
   RKPD is declared as client to access the service instead of raw
   service permission setup as in the reverted cl. This is aligned
   with the AIDL Hal configuration recommendation.

 - Since the existing type for IRPC hal_remotelyprovisionedcomponent is
   already associated with keymint server/client and has specific
   permission requirements, and some of the keymint clients might not
   need the AVF Hal. We decided to create a new AIDL service type
   instead of reusing the exisiting keymint service type.

Reverted changes: /q/submissionid:2829351-revert-2812456-revert-2812435-revert-2778549-expose-avf-rkp-hal-GTFGLMUUKQ-PAWNEHUQBT-WYENGHRTXK

Bug: 312427637
Bug: 310744536
Bug: 299257581
Test: atest MicrodroidHostTests librkp_support_test
Change-Id: Id37764b5f98e3c30c0c63601560697cf1c02c0ad
2023-11-22 08:21:27 +00:00
Inseob Kim
0932bb9ba9 Merge "Flag-guard vfio_handler policies" into main 2023-11-22 07:45:53 +00:00
Ján Sebechlebský
d97e6b1d70 Merge changes I0ca68d6c,Ie621f896 into main
* changes:
  Allow virtual camera service to access gpu.
  Revert^2 "Allow system_server to communicate with virtual_camera"
2023-11-22 06:58:18 +00:00
Inseob Kim
094e8e81a2 Flag-guard vfio_handler policies
vfio_handler will be active only if device assignment feature is turned
on.

Bug: 306563735
Test: microdroid tests with and without the flag
Change-Id: I5559dfca1a29852b65481c95f37edc9977ee9d7d
2023-11-22 05:28:20 +00:00
Ahmad Khalil
95ee9ea719 Add fwk_vibrator_control_service
Convert vibrator_control to a framework service (fwk_vibrator_control_service) in system_server.

Bug: 305961689
Test: N/A
Change-Id: I5f3aba2c58a3166593a11034a8d21dfd12311c2e
2023-11-21 20:59:48 +00:00
Eric Laurent
2fc53fec54 Merge "Bluetooth: add system property for HID transport selection" into main 2023-11-21 18:32:07 +00:00
Shikha Panwar
2838e84381 Merge "Secretkeeper/Sepolicy: Create required domains" into main 2023-11-21 17:56:46 +00:00
Shikha Panwar
59c970703b Secretkeeper/Sepolicy: Create required domains
Add sepolicies rules for Secretkeeper HAL & nonsecure service
implementing the AIDL.

Test: atest VtsHalSkTargetTest & check for Selinux denials
Bug: 293429085
Change-Id: I907cf326e48e4dc180aa0d30e644416d4936ff78
2023-11-21 12:29:18 +00:00
Treehugger Robot
40552f0902 Merge "Allow shell to set persist.logd.audit.rate" into main 2023-11-21 08:56:43 +00:00
Thiébaud Weksteen
1f621afeeb Merge "Revert^2 "Add permission for VFIO device binding"" into android14-tests-dev 2023-11-21 04:37:46 +00:00
Thiébaud Weksteen
fa2999a627 Revert^2 "Add permission for VFIO device binding"
This reverts commit c6227550f7.

Reason for revert: Faulty merging paths have been removed

Change-Id: Icf56c2e977c5517af63e206a0090159e43dd71eb
Merged-In: Ie947adff00d138426d4703cbb8e7a8cd429c2272
2023-11-21 02:18:30 +00:00
Justin Yun
90bee0995e Define ro.llndk.api_level
ro.llndk.api_level shows the maxium vendor api level that the llndk
in the platform supports.

Bug: 312098788
Test: getprop ro.llndk.api_level
Change-Id: I139524724e458300a3c1430c94595e9fa25a85dd
2023-11-21 11:13:09 +09:00
Shubang Lu
0d65502e9e Merge "Add SE policy for tv_ad_service" into main 2023-11-20 19:08:50 +00:00
Eric Laurent
255890ef0e Bluetooth: add system property for HID transport selection
Add property bluetooth.core.le.dsa_transport_preference containing a
list of supported HID transport protocols for IMU data over LE Audio by
order of preference:

Bug: 307588546
Test: make
Change-Id: I7aef404a2c6c8cc872efb994e328a175d5b4efd4
2023-11-20 16:38:56 +01:00
Jan Sebechlebsky
267b6a9cf1 Allow virtual camera service to access gpu.
Bug: 301023410
Test: adb shell cmd virtual_camera enable_test_camera & OpenCamera

Change-Id: I0ca68d6c4831d624a0aa9ad87f7b44cbb02ac96a
2023-11-20 10:42:47 +01:00
Ján Sebechlebský
5d6b66c8ea Revert^2 "Allow system_server to communicate with virtual_camera"
This reverts commit 76a62dfb3e.

Reason for revert: Relanding with virtual_camera flag disabled to prevent test failures before rc entry is added for the service (which needs to be done after this cl is submitted to prevent boot test failing due to selinux denials).

Test: https://android-build.corp.google.com/builds/abtd/run/L11500030000350228
Change-Id: Ie621f89610b173918bb4c0b6eb1f35547f56f6b7
2023-11-20 10:42:11 +01:00
Ted Wang
1193a9c1d6 Add bluetooth finder hal
Bug: 307897939
Test: make
Change-Id: I5ebc1afc33532639fccffc0cf86e2680ab7c910f
2023-11-20 06:01:13 +00:00
Kelvin Zhang
db2d9a23ad Merge "Add sepolicy for ro.virtual_ab.merge_delay_seconds" into main 2023-11-20 02:57:46 +00:00
Jeongik Cha
bfb5615f52 Merge "declare setupwizard_mode_prop as system_vendor_config_prop" into main 2023-11-20 01:22:22 +00:00
Thiébaud Weksteen
1deccbb3f4 Merge "Revert^2 "Introduce sdk_sandbox_audit SELinux domain"" into android14-tests-dev am: 2f98237c4d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2836555

Change-Id: Iffd388a421177b61186f4a7b6e6076313206fd36
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-11-19 23:51:03 +00:00
Kelvin Zhang
f34d7d238d Add sepolicy for ro.virtual_ab.merge_delay_seconds
Bug: 311515963
Test: set ro.virtual_ab.merge_delay_seconds by PRODUCT_PROPERTY_OVERRIDES in mk files and run OTA
Change-Id: Ia9bac57879670e0dbd858705bffbb8dea7d58fba
2023-11-17 12:02:54 +00:00
Sandro Montanari
1e9eb36ad2 Revert^2 "Introduce sdk_sandbox_audit SELinux domain"
This reverts commit a41bfab758.

Reason for revert: Automerger path causing the regression is no more

Change-Id: I4c9ab6f2e18c9d8157f5667bc98fcce00e78f93d
2023-11-17 09:54:33 +00:00
Seungjae Yoo
e95f3f5bd3 Merge "Introduce vendor_microdroid_file for microdroid vendor image" into main 2023-11-17 02:23:30 +00:00
Shubang Lu
98dddde9f0 Add SE policy for tv_ad_service
Bug: 303506816
Bug: 311074646
Test: cuttlefish;
Change-Id: I5dea6d65cf374392bb9b079dda9aa90fb63a4bbd
2023-11-16 23:10:15 +00:00
Matt Stokes
61ba09b9a8 Merge "Revert "Allow system_server to communicate with virtual_camera"" into main 2023-11-16 18:58:19 +00:00
Matt Stokes
76a62dfb3e Revert "Allow system_server to communicate with virtual_camera"
This reverts commit 45f1ecee7a.

Reason for revert: <Droid TestMonitor b/311401010>

Change-Id: I82716e9d52a66018c5e7d7d13c8292d7d19f253c
2023-11-16 17:42:25 +00:00
Jeongik Cha
6cb91a086e declare setupwizard_mode_prop as system_vendor_config_prop
1. declare setupwizard_mode_prop for ro.setupwizard.mode
2. that prop could be set during vendor_init, so changed prop type

Bug: 310208141
Test: boot and check if there is no sepolicy issue
Change-Id: I89246ab2c686db139cad48550b860d69a41106ff
2023-11-17 01:22:37 +09:00
Ján Sebechlebský
4b16e566e1 Merge "Allow system_server to communicate with virtual_camera" into main 2023-11-16 11:20:43 +00:00
Seungjae Yoo
d2a0892121 Introduce vendor_microdroid_file for microdroid vendor image
In AVF, virtualizationmanager checks the selinux label of given disk
image for proving whether the given image is edited maliciously.
Existing one(vendor_configs_file, /vendor/etc/*) was too wide to use for this purpose.

Bug: 285854379
Test: m
Change-Id: I6c966c92b238a2262d2eb7f41041ed4c359e9e0a
2023-11-16 16:44:15 +09:00
Jooyung Han
f8c18cb0f2 Add properties for vulkan apex
ro.vulkan.apex property is added to tell which APEX provides vulkan
driver.

Bug: 205618237
Test: CtsGraphicsTestCases
Change-Id: Icdf6ee5ede16c08405f48d736ed38ad4117d8e2d
2023-11-15 13:45:38 +09:00
Vadim Caen
45f1ecee7a Allow system_server to communicate with virtual_camera
and consitently name service and process as "virtual_camera" (with
underscore)

Test: Cts VirtalCameraTest
Bug: 270352264
Change-Id: I2c6c0c03aab47aa1795cbda19af25e6661a0bf4a
2023-11-14 15:27:57 +01:00
Sandro Montanari
a41bfab758 Revert "Introduce sdk_sandbox_audit SELinux domain"
This reverts commit 5eb6189fc0.

Reason for revert: breaks build in git_udc-qpr-dev-throttled

Change-Id: I97b5fe5e1db668a33d00b15bd3cb5e663050eba2
2023-11-14 12:27:39 +00:00
Sandro Montanari
5eb6189fc0 Introduce sdk_sandbox_audit SELinux domain
Bug: 295861450
Test: atest CtsSdkSandboxInprocessTests and adb shell ps -Z
Change-Id: I9c5873181c925c6b8ebb411328d30aa519053acf
Merged-In: I9c5873181c925c6b8ebb411328d30aa519053acf
2023-11-14 09:14:03 +00:00
Inseob Kim
c6227550f7 Revert "Add permission for VFIO device binding"
This reverts commit 901385f711.

Reason for revert: breaking build

Change-Id: Ib936ca7c347b657b94bb44692cd0e9ceee5db55a
Merged-In: Ie947adff00d138426d4703cbb8e7a8cd429c2272
2023-11-14 08:41:48 +00:00
Treehugger Robot
3f92c1beb3 Merge "Revert "Revert^2 "[avf][rkp] Allow virtualizationservice to regi..."" into main 2023-11-14 02:41:56 +00:00
Inseob Kim
901385f711 Add permission for VFIO device binding
vfio_handler will bind platform devices to VFIO driver, and then
return a file descriptor containing DTBO. This change adds
permissions needed for that.

Bug: 278008182
Bug: 308058980
Test: adb shell /apex/com.android.virt/bin/vm run-microdroid \
      --devices /sys/bus/platform/devices/16d00000.eh --protected
Change-Id: Ie947adff00d138426d4703cbb8e7a8cd429c2272
Merged-In: Ie947adff00d138426d4703cbb8e7a8cd429c2272
(cherry picked from commit 825056de9a)
2023-11-14 01:56:24 +00:00
Alan Stokes
18bcf12fbb Revert "Revert^2 "[avf][rkp] Allow virtualizationservice to regi..."
Revert submission 2812456-revert-2812435-revert-2778549-expose-avf-rkp-hal-GTFGLMUUKQ-PAWNEHUQBT

Reason for revert: SELinux denials: b/310744536

Reverted changes: /q/submissionid:2812456-revert-2812435-revert-2778549-expose-avf-rkp-hal-GTFGLMUUKQ-PAWNEHUQBT

Change-Id: I88b5f03dccb1b4ab906afde7d66853e816cce7f1
2023-11-14 01:40:53 +00:00
Alice Wang
dd034824b1 Merge "Revert^2 "[avf][rkp] Allow virtualizationservice to register RKP HAL"" into main 2023-11-13 21:33:49 +00:00
Snild Dolkow
ef0f3692d7 Allow shell to set persist.logd.audit.rate
This can be useful, for both platform and app developers, when there
are lots of SELinux violations.

The property is only read by init, so no get_prop macros are needed.

Bug: 304313777
Test: set, `for x in $(seq 100); do ls /cache; done`, observe logs
Reference: Ib5352dcf3a85836ae5544c9feeb5222c97c50ecd
Change-Id: Ib23c008ed89e078a20ae136ba97e853f699e2050
2023-11-13 10:42:23 +01:00
Mitch Phillips
980c33614e Allow persist.arm64.memtag.* sysprops to be changed on user devices.
Looks like we missed this, and so non-rooted locked devices can't override the persistent sysprops. On Pixel 8 for example, we ship with 'persist.arm64.memtag.system_server=off' by default (from some droidfood carry-overs), and this can't be edited (https://googleprojectzero.blogspot.com/2023/11/first-handset-with-mte-on-market.html).

We should allow these advanced users to set all the MTE properties on the device that they own, and they can already control the non-persistent properties.

Change-Id: Ie495f6f9ad43146a0bfcd5bb291fca3760467370
Test: N/A
Bug: N/A
2023-11-10 13:03:58 +00:00
Justin Yun
5e4c7fdea9 Define a new sysprop ro.board.api_frozen
ro.board.api_frozen shows if ro.board.api_level is finalized.

Bug: 295269182
Test: getprop ro.board.api_frozen
Change-Id: Ib8fb762eb21e7568c8b7254b3f25741fd2eee77f
2023-11-10 17:43:56 +09:00
Thiébaud Weksteen
cf18974d93 Merge "Document the file_contexts evaluation" into main 2023-11-09 21:56:54 +00:00
Thiébaud Weksteen
aead1ae441 Document the file_contexts evaluation
Remove a duplicate entry with its comment as the sorting logic is not
applied since commit dfa4a48b.

Bug: 299839280
Test: m selinux_policy
Change-Id: I4fa556c2ff8f114b56bba7ab32fac1d17373ef8b
2023-11-09 15:23:13 +11:00
Maciej Żenczykowski
899fdae61f Merge "system_server dontaudit key_socket getopt" into main 2023-11-08 20:21:38 +00:00
Maciej Żenczykowski
70be64b77c system_server dontaudit key_socket getopt
11-08 07:52:43.776 1469 1469 I auditd : type=1400 audit(0.0:4): avc: denied { getopt } for comm="system_server" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=key_socket permissive=0
11-08 07:52:44.360 1469 1469 I auditd : type=1400 audit(0.0:5): avc: denied { getopt } for comm="NetworkStats" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=key_socket permissive=0
11-08 07:52:44.508 1469 1469 I auditd : type=1400 audit(0.0:7): avc: denied { getopt } for comm="android.bg" scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=key_socket permissive=0

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I6799c6fcfed0454f32607150320c0ed12301071c
2023-11-08 08:28:16 +00:00
Treehugger Robot
2ac4d112b8 Merge "Allow bootanimation to access vendor apex" into main 2023-11-08 06:30:38 +00:00
Keith Mok
4bd043ca67 Merge "SEPolicy for AIDL MACSEC HAL" into main 2023-11-07 21:40:41 +00:00
Treehugger Robot
6f789851e9 Merge "add percpu_pagelist_high_fraction type" into main 2023-11-07 13:30:15 +00:00
Martin Liu
52aa5039ba add percpu_pagelist_high_fraction type
Bug: 309409009
Test: boot
Change-Id: I04db2ab3a95a5427e6d89cf128ed953fdc823107
Signed-off-by: Martin Liu <liumartin@google.com>
2023-11-07 11:36:00 +08:00
Sebastian Pickl
c6132a2ae7 bugmap selinux failure
Bug:308043377
Change-Id: Ieb5f41be6b73bf8d6f07e2ae7fab4dd671adf9a0
2023-11-06 12:39:11 +00:00
Jooyung Han
87889b6af2 Allow bootanimation to access vendor apex
Bootanimation needs access to EGL/GLES libraries. When they are in a
vendor apex, it should be able to read its mount point at least.

Bug: 205618237
Test: launch CF and check logcat # bootanimation works with EGL
Change-Id: I6f0727916dd8f69fbfc02bb33ff27c9f11ec9388
2023-11-06 18:26:27 +09:00
Sebastian Pickl
c6c36a4130 Merge "bugmap selinux failure" into main 2023-11-06 08:47:38 +00:00
Keith Mok
df794b4590 SEPolicy for AIDL MACSEC HAL
Bug: 254108688
Test: AIDL MACSEC HAL VTS
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:fba6480fa08001a36faf524d0a6952f29d916a6b)
Change-Id: I5ccaa24c6b9600713bbc0e4c523822567b64c662
2023-11-03 21:29:48 +00:00
Ahmad Khalil
70b7a8c76d Merge "Add new vibrator control service to system_server" into main 2023-11-03 14:03:19 +00:00
Sebastian Pickl
6aa75739d5 bugmap selinux failure
Bug:308043377
Change-Id: I880567e2756b1605b7bf692f75dc20f50013bb25
2023-11-03 12:58:13 +00:00
Ahmad Khalil
7c22e8b3cd Add new vibrator control service to system_server
Bug: 305961689
Test: N/A
Change-Id: Ia4f061d6ae7656fce4c01f5acc2a1314f8ba4ac4
2023-11-03 12:09:04 +00:00
Sebastian Pickl
fe4b397451 Merge "bug_map selinux test failure" into main 2023-11-02 22:09:05 +00:00
James Willcox
f70225771d Merge "Add new keystore2 permission get_last_auth_time." into main 2023-11-02 21:09:20 +00:00
Kyle Zhang
dcf977ac99 Merge "Add system property persist.drm.forcel3.enabled" into main 2023-11-02 17:16:42 +00:00
Sebastian Pickl
7a8028bbb4 bug_map selinux test failure
Bug:308043377
Change-Id: Idca147ac558d68d09d69844fdb382d0ad90d0261
2023-11-02 15:29:28 +00:00
Victor Hsieh
807cd72034 Merge "Allow system_server to read sepolicy from sysfs" into main 2023-11-02 14:47:30 +00:00
Victor Hsieh
5d102ffeb1 Allow system_server to read sepolicy from sysfs
Bug: 308471499
Test: let system server hash the policy
Change-Id: I8fc171e25636698d787be029c00471e0768f4c7a
2023-11-01 15:02:53 -07:00
Hasini Gunasinghe
daa1cec849 Merge "Add sepolicy for non-secure AuthGraph impl" into main 2023-11-01 16:27:51 +00:00
James Willcox
038f859db2 Add new keystore2 permission get_last_auth_time.
This is checked when getting the time of last successful authentication
from keystore2. The auth_service is the only expected caller.

Bug: 303839446
Test: manual
Change-Id: Idf222e69c0553a7be94206b519a95a4006e69507
2023-10-31 20:28:43 +00:00
Alice Wang
0407c993d8 Revert^2 "[avf][rkp] Allow virtualizationservice to register RKP HAL"
Revert submission 2812435-revert-2778549-expose-avf-rkp-hal-GTFGLMUUKQ

Reason for revert: This change relands the topic
https://r.android.com/q/topic:%22expose-avf-rkp-hal%22
The SELinux denial has been fixed in system/sepolicy

Reverted changes: /q/submissionid:2812435-revert-2778549-expose-avf-rkp-hal-GTFGLMUUKQ

Bug: 308596709
Bug: 274881098
Change-Id: Ib23ac4680b0f37b760bff043e1f42ce61a58c3e2
2023-10-31 20:06:23 +00:00
Alice Wang
072d8fc0db Merge "Revert "[avf][rkp] Allow virtualizationservice to register RKP H..."" into main 2023-10-31 15:13:01 +00:00
Alice Wang
ece557dc7a Revert "[avf][rkp] Allow virtualizationservice to register RKP H..."
Revert submission 2778549-expose-avf-rkp-hal

Reason for revert: SELinux denial
avc:  denied  { find } for pid=3400 uid=10085 name=android.hardware.security.keymint.IRemotelyProvisionedComponent/avf scontext=u:r:rkpdapp:s0:c85,c256,c512,c768 tcontext=u:object_r:avf_remotelyprovisionedcomponent_service:s0 tclass=service_manager permissive=0


Reverted changes: /q/submissionid:2778549-expose-avf-rkp-hal

Bug: 308596709
Change-Id: If8e448e745f2701cf00e7757d0a079d8700d43c0
2023-10-31 15:01:18 +00:00
Alice Wang
7109a31496 Merge "[avf][rkp] Allow virtualizationservice to register RKP HAL service" into main 2023-10-31 12:21:41 +00:00
Treehugger Robot
adbef0cf37 Merge "Revert "Suppress a denial on VM boot"" into main 2023-10-31 02:29:57 +00:00
Treehugger Robot
12665a9787 Merge "Add appcompat override files and contexts to SELinux" into main 2023-10-31 02:29:57 +00:00
Alex Xu
f82b6897cf Merge "Add sepolicy for security_state service." into main 2023-10-27 19:20:58 +00:00
Alice Wang
104626ca99 [avf][rkp] Allow virtualizationservice to register RKP HAL service
Bug: 274881098
Test: atest MicrodroidHostTests
Change-Id: Ib0953fa49f27719be63bb244071b132bc385dca3
2023-10-27 09:26:42 +00:00
Treehugger Robot
521d9385ee Merge "Add sepolicy to allow OT daemon to write to statsd" into main 2023-10-27 03:16:16 +00:00
Kyle Zhang
12c42b5f50 Add system property persist.drm.forcel3.enabled
Bug: 299987160
Change-Id: Icf945a2bfb7e25225f30630c5d24bf13a8960a01
2023-10-26 22:16:49 +00:00
Sandro Montanari
4db0e27a50 Introduce sdk_sandbox_audit SELinux domain
Bug: 295861450
Test: atest CtsSdkSandboxInprocessTests and adb shell ps -Z
Change-Id: I9c5873181c925c6b8ebb411328d30aa519053acf
2023-10-26 08:50:26 +00:00
Alex Xu
902a010aaa Add sepolicy for security_state service.
security_state service manages security state (e.g. SPL) information across partitions, modules, etc.

Bug: 307819014
Test: Manual
Change-Id: I4ebcd8431c11b41f7e210947b32cf64c2adf3901
2023-10-26 06:11:58 +00:00
Tony Zhou
4ed6a0d834 Add sepolicy to allow OT daemon to write to statsd
Bug: 230565248

Test: push data to statsd_testdrive and it works now

Change-Id: I48c3affdd1fbd62df5b8eaff9908c5f3bbeda4d8
2023-10-26 05:47:01 +00:00
David Drysdale
c4ab01baad Add sepolicy for non-secure AuthGraph impl
Bug: 284470121
Bug: 291228560
Test: hal_implementation_test
Test: VtsAidlAuthGraphSessionTest
Change-Id: I85bf9e0656bab3c96765cc15a5a983aefb6af66d
2023-10-26 02:00:43 +00:00
Andy Yu
e2fb30d461 Add a new sysprops for toggling game default frame rate
Create a new system property for game default frame
rate. A toggle system setting UI will set
`persist.graphics.game_default_frame_rate.enabled`
via GameMangerService in system_server.

`persist.graphics.game_default_frame_rate.enabled` == 1:
    default frame rate enabled
`persist.graphics.game_default_frame_rate.enabled` == 0:
    default frame rate disabled

Bug: 286084594
Test: m, flash and boots properly on Raven
Change-Id: Iae7ebf39aad6c81475ef3d289d750a818fd4ef79
2023-10-23 15:05:24 -07:00
Nate Myren
0e15f2d9c5 Add appcompat override files and contexts to SELinux
This also allows the zygote to bind mount the system properties

Bug: 291814949
Test: manual
Change-Id: Ie5540faaf3508bc2d244c952904838d56aa67434
2023-10-23 18:34:12 +00:00
Thiébaud Weksteen
a8bcaec228 Merge changes I3a6f9db9,Ifb4453d0,I33d88b42 into main
* changes:
  Refactor contextsTestModule
  Fix private/file_contexts entry order
  checkfc: validate that all rules are matching
2023-10-23 04:06:09 +00:00
Thiébaud Weksteen
f66e1460b1 Merge "Create sepolicy for allowing system_server rw in /metadata/repair-mode" into main 2023-10-23 04:05:46 +00:00
Rhed Jao
ebe1316695 Create sepolicy for allowing system_server rw in /metadata/repair-mode
Bug: 277561275
Test: ls -all -Z /metadata/repair-mode
Change-Id: Ie27b6ef377bb3503e87fbc5bb2446bc0de396123
2023-10-23 13:38:38 +11:00
Treehugger Robot
ea39eb6636 Merge "Add a sysprop to specify game default frame rate" into main 2023-10-23 01:12:53 +00:00
Thiébaud Weksteen
9c2a967114 Fix private/file_contexts entry order
Add test entries for property_service_for_system and virtual_camera.

Re-order file_contexts so that /data/vendor/tombstones/wifi and
/data/misc/perfetto-traces/bugreport are labelled correctly.

Bug: 299839280
Test: checkfc -t ./private/file_contexts ./contexts/plat_file_contexts_test pass
Change-Id: Ifb4453d02327b5cf678e6a4cd927b5df0960086b
2023-10-23 10:51:11 +11:00
Li Li
87fa0f9f77 Merge "Allow system server read binderfs stats" into main 2023-10-20 23:57:19 +00:00
Wonsik Kim
c1ed17561c Merge "property_context: add Codec2 HAL selection property" into main 2023-10-20 23:08:29 +00:00
Li Li
0b3f585a63 Allow system server read binderfs stats
When receiving the binder transaction errors reported by Android
applications, AMS needs a way to verify that information. Currently
Linux kernel doesn't provide such an API. Use binderfs instead until
kernel binder driver adds that functionality in the future.

Bug: 199336863
Test: send binder calls to frozen apps and check logcat
Test: take bugreport and check binder stats logs
Change-Id: I3bab3d4f35616b4a7b99d6ac6dc79fb86e7f28d4
2023-10-20 13:22:24 -07:00
Nate Myren
8dff040569 Revert "Suppress a denial on VM boot"
This reverts commit faa538dbfc.

Reason for revert: aosp/2786963 implements the correct SEPolicy
Test: atest MicrodroidHostTests
Fixes: 306516077

Change-Id: Ia7e6db4ee4f7fa870093a34d1b8fde96d9e9b80a
2023-10-20 19:14:26 +00:00
Vadim Caen
2892de504d Merge "Add sepolicy entry for read only virtual camera property" into main 2023-10-20 12:21:25 +00:00
Alan Stokes
faa538dbfc Suppress a denial on VM boot
The denial is correct, but is causing test failures. However it
appears to be harmless and VMs are operating just fine.

Suppress it until the correct policy is ready.

Bug: 306516077
Test: atest MicrodroidHostTests
Change-Id: I5d8545add4927c2521c3d4e9dc2b5bedb91c0f45
2023-10-20 10:59:52 +01:00