Commit graph

35393 commits

Author SHA1 Message Date
Inseob Kim
1851dcb2ee Convert README to README.md
Just a format change. The contents are copy-and-pasted as-is.

Bug: 196944893
Test: N/A
Change-Id: I4d898d5bae784a8cf2087c7fdeaff7493eb2aa62
2022-04-07 22:44:42 +09:00
Steven Moreland
90bc7c36d9 Merge "crosvm: netlink perms for acpi" 2022-04-06 18:10:05 +00:00
Treehugger Robot
295d74b9e0 Merge "allow system_app domain to be profiled" 2022-04-05 14:39:09 +00:00
Treehugger Robot
45b594f5ef Merge "Remove unnecessary entries from microdroid vendor file_contexts" 2022-04-05 10:20:49 +00:00
Jiyong Park
db9b8670b3 Remove unnecessary entries from microdroid vendor file_contexts
Bug: 225148395
Test: watch TH
Change-Id: Id368605c396fdb79c0044c407abb08ab8c90fa32
2022-04-05 16:41:26 +09:00
Ryan Savitski
6111f0cfc8 allow system_app domain to be profiled
An example app in this domain is com.android.settings.

This was an accidental omission from https://r.android.com/1966610.
Context and rationale remain the same as for that patch, please see the
bug.

Tested: both traced_perf and heapprofd successfully profiled the
settings app with the right additional profileability permissions on a
user build (beta candidate).
Bug: 217368496
Change-Id: Id8a9e16dab7774f8840cdd6b74d59f70584b5156
2022-04-05 01:56:18 +00:00
Steven Moreland
c1e8eb5226 crosvm: netlink perms for acpi
Required by crosvm update.

Bug: 228077254
Bug: 226645768
Test: CompOsTestCase progress
Change-Id: I25e9aa257a26992e48e99e02f04195be52a24194
2022-04-04 20:20:24 +00:00
Max Bires
aaacfdb054 Add ro.remote_provisioning.*.rkp_only properties.
These properties are used to inform keystore2 and the RemoteProvisioner
app how they should behave in the system in the event that RKP keys are
exhausted. The usual behavior in a hybrid system is not to take any
action and fallback to the factory provisioned key if key attestation is
requested and no remotely provisioned keys are available.

However, there are instances where this could happen on a device that
was intended to be RKP only, in which case the system needs to know that
it should go ahead and attempt to remotely provision new certificates or
throw an error in the case where none are available.

Test: New properties are accessible from the two domains
Change-Id: I8d6c9e650566499bf08cfda2f71c64d5c2b26fd6
2022-04-04 11:23:12 -07:00
Andy Yu
9e96849345 SEPolicy: Add read permission to traced_probes
Allow traced_probes to read file
/data/system/game_mode_intervention.list

Bug: 219543620
Doc: go/game-dashboard-information-to-perfetto
Test: manual
Change-Id: I16962d2e544959d00a8d4cf32e6ca9c5bef73064
2022-04-01 16:19:14 -07:00
Lorenzo Colitti
bf8af42bf5 Merge "Connectivity Native AIDL interface Sepolicy" 2022-04-01 21:46:37 +00:00
Neha Pattan
dcb324bdb3 Merge "Sepolicy changes for adding new system service for AdServices." 2022-04-01 18:38:07 +00:00
Bob Badour
586e350678 Merge "Non-module targets." 2022-04-01 07:47:35 +00:00
Bob Badour
267fc16a40 Non-module targets.
Bug: 151177513
Bug: 213388645
Bug: 210912771

Test: m droid dist reportmissinglicenses
Change-Id: I549e9f931347c2ebd89caa419d192e9cd377ef9b
2022-03-31 19:25:33 -07:00
Thiébaud Weksteen
3ad1431a04 Merge "Remove bug_map entry for system_server" 2022-03-31 23:00:09 +00:00
Andy Yu
6a10d563ea Merge "Add label and permission for game_mode_intervention.list" 2022-03-30 19:35:59 +00:00
Thiébaud Weksteen
5c5e0f7ecc Remove bug_map entry for system_server
The permission was granted in 6390b3f.

Bug: 216097542
Bug: 73128755
Test: m selinux_policy
Change-Id: I7b1883a46f3972ed722ebc2844ecdbf24abf0ce1
2022-03-30 02:31:43 +00:00
Andy Yu
8337d04202 Add label and permission for game_mode_intervention.list
Bug: 219543620
Doc: go/game-dashboard-information-to-perfetto
Test: TBD
Change-Id: Ic6622aadef05e22c95d4ba739beed0e6fa1f3a38
2022-03-29 14:12:14 -07:00
Adam Shih
8296a542fe Merge "suppress su behavior when running lsof" 2022-03-29 05:17:26 +00:00
Treehugger Robot
288fee1744 Merge "Allow EVS HAL to use cardisplayproxyd" 2022-03-28 22:04:20 +00:00
Chris Weir
9e4f9120ee Merge "Allow wpa_supplicant to access Netlink Interceptor" 2022-03-28 21:47:48 +00:00
Neha Pattan
64ef8be1de Sepolicy changes for adding new system service for AdServices.
Test: build
Bug: 216375107
Change-Id: I238ac3f8966ce05768aef17bd05217a9772cf2f3
2022-03-28 19:26:50 +00:00
Adam Shih
ae4dbf54d8 suppress su behavior when running lsof
Relevant error logs show up when dumpstate do lsof using su identity:
RunCommand("LIST OF OPEN FILES", {"lsof"}, CommandOptions::AS_ROOT);

This is an intended behavior and the log is useless for debugging so I
suppress them.
Bug: 226717429
Test: do bugreport with relevant error gone.
Change-Id: Ide03315c1189ae2cbfe919566e6b97341c5991bb
2022-03-28 05:55:41 +00:00
Mikhail Naganov
1704f61dcf Merge "Add AIDL audio HAL service to SEPolicy" 2022-03-25 22:23:40 +00:00
Treehugger Robot
d796c9eb6c Merge "Add search in bpf directory for bpfdomains" 2022-03-25 20:32:15 +00:00
Treehugger Robot
ae1844e593 Merge "Add ThermalService and file access to SdkSandbox" 2022-03-25 18:24:13 +00:00
Shiwangi Shah
155d318876 Add ThermalService and file access to SdkSandbox
Thermal Service access needs to be provided to Sdk Sandbox
for Webview to record battery related metrics. We also
provide isolated process access to the file directory for sandbox
so that the renderer process can access it.

Bug: b/226558510
Test: Manual
Change-Id: I1ac14d4df7ab53e567a27086d0418ec612a7686f
2022-03-25 12:20:07 +00:00
Bram Bonné
11b691844f Merge "Restrict sandbox access to drmservice" 2022-03-25 08:07:24 +00:00
Chris Weir
6e92194802 Allow wpa_supplicant to access Netlink Interceptor
wpa_supplicant needs permission to access the Netlink Interceptor HAL.

Bug: 224844967
Test: Modified version of wpa_supplicant can access Netlink Interceptor
Change-Id: I80c6c980b6655beadfaf14535702ad8e96c2befe
2022-03-24 16:49:30 -07:00
Treehugger Robot
c2b73ca1b2 Merge "microdroid: dont audit access to event-log-tags" 2022-03-24 22:16:47 +00:00
Victor Hsieh
e82248bcb0 Merge "Allow odrefresh to use userfaultfd" 2022-03-24 15:15:17 +00:00
Bram Bonne
85dfe313e5 Restrict sandbox access to drmservice
Bug: 226390597
Test: atest SdkSandboxRestrictionsTest

Change-Id: I49b55d66f1cdc1e8d65e3419460615822c3c3ef3
2022-03-24 14:09:46 +01:00
Alan Stokes
f69f5a6512 Remove redundant neverallow
commit 7fd8933f0c removed this from host
sepolicy. It's redundant here as well.

Bug: 223596375
Test: Builds
Change-Id: I39d7432c6e31f49de5eb8dca8acc7e9c5d190617
2022-03-24 11:56:20 +00:00
Treehugger Robot
34f4ca820f Merge "Remove media crash neverallow exception." 2022-03-24 11:22:39 +00:00
Mikhail Naganov
676da7273f Add AIDL audio HAL service to SEPolicy
This adds the two top interfaces: IConfig and IModule
to service context, allows the HAL service to call
Binder, and registers the example implementation
service executable.

Bug: 205884982
Test: m
Change-Id: I322e813c96123167ea29b6c25a08ec9677c9b4d1
2022-03-24 01:39:29 +00:00
Victor Hsieh
6c874fb295 Allow odrefresh to use userfaultfd
This isn't really used at the moment, but since the decision was to keep
the capability for future ART change, we should also allow it in CompOS
for consistency.

While I'm on in, rearrange the policy to group mirrored policies
together.

Bug: 209488862
Test: None
Change-Id: Id6afafc42005e711127a1e0831d4dd03e48959eb
2022-03-23 17:21:22 -07:00
Alessio Balsini
bf729fdcf6 FUSE-BPF: vold and MediaProvider access to ro.fuse.bpf.enabled
This system property is going to be used by vold and MediaProvider to
enable/disable the FUSE-BPF feature in dogfood.
This is a simple way to quickly turn the feature off is breakages are
detected.

Bug: 202785178
Test: adb logcat | grep "FuseDaemon" | grep BPF
Signed-off-by: Alessio Balsini <balsini@google.com>
Change-Id: I65ae60b6a505db52b30232b9e5a504eccaafa1eb
2022-03-23 20:58:32 +00:00
Oleg Matcovschi
f21542906d microdroid: dont audit access to event-log-tags
Bug: 225223271
Test: run microdroid, confirm no denial messages
Signed-off-by: Oleg Matcovschi <omatcovschi@google.com>
Change-Id: I505402c5ff886c18c06133825f9a7ced84c17c1f
2022-03-23 08:55:19 -07:00
Changyeon Jo
3518c9e7f8 Allow EVS HAL to use cardisplayproxyd
This change adds selinux policies to allow EVS HAL implementations to
use cardisplayproxyd, which implements a stable AIDL version of the
automotive display proxy service interface.

Bug: 170401743
Bug: 217271351
Test: Manually confirm that evs_app renders the camera preview through
      cardisplayproxyd
Change-Id: Ia301b782c6c031fe8351bdcda5ce264da6b8aa4d
2022-03-23 12:35:28 +00:00
Gary Jian
ee0b51e099 Merge "Allow system_app to access radio_config system properties" 2022-03-23 05:46:22 +00:00
Adam Shih
92f87ac0b9 Merge "suppress su behavior when running lsof" 2022-03-23 05:03:02 +00:00
Treehugger Robot
3a8977155c Merge "Allow init to relabelto console_device" 2022-03-23 04:29:53 +00:00
Adam Shih
643d2439c2 suppress su behavior when running lsof
Relevant error logs show up when dumpstate do lsof using su identity:
RunCommand("LIST OF OPEN FILES", {"lsof"}, CommandOptions::AS_ROOT);

This is an intended behavior and the log is useless for debugging so I
suppress them.

Bug: 225767289
Test: do bugreport with no su related avc errors
Change-Id: I0f322cfc8a461da9ffb17f7493c6bbdc58cce7b6
2022-03-23 10:52:00 +08:00
Ocean Chen
b299b79473 Merge "Add persist.device_config.storage_native_boot.smart_idle_maint_enabled property policies" 2022-03-23 01:51:08 +00:00
Shikha Malhotra
b00341ad1e Merge "Added permission to allow for ioctl to be added to install_data_file" 2022-03-22 16:32:40 +00:00
Stephane Lee
68e028b731 Merge "Add sepolicies to allow hal_health_default to load BPFs." 2022-03-22 15:29:20 +00:00
Inseob Kim
85091cd806 Allow init to relabelto console_device
Init will try restorecon /dev/console, together with /dev, at the second
stage boot.

Bug: 193118220
Test: atest MicrodroidHostTestCases
Change-Id: Ie9796368b54bb0773eabf5ff6feb2b4aa41d0bfa
2022-03-22 22:11:03 +09:00
Ocean Chen
63e6e1dc02 Add persist.device_config.storage_native_boot.smart_idle_maint_enabled property policies
Add policies to set persist.device_config.storage_native_boot.smart_idle_maint_enabled property.

Bug: 202283480
Bug: 181079477
Bug: 215443809
Change-Id: I998e6dca950a8ceebb5fbc39568e3e8d6b86e8ce
2022-03-22 08:33:40 +00:00
Ocean Chen
bcd0bd7976 Correct the definition sequences of sdk_sandbox_service
It fixs the auto merger conflict

Merged-In: I9fb98e0caee75bdaaa35d11d174004505f236799
Change-Id: I6afc59633ee4f729a86ab5f24c39ebd46d591549
2022-03-22 06:40:43 +00:00
Yi-yo Chiang
bc3f8b3486 Merge "Add proc_cmdline read permission to read_fstab" 2022-03-22 02:37:15 +00:00
Stephane Lee
b30e888b5c Add search in bpf directory for bpfdomains
Bug: 203462310
Test: Ensure that associated BPFs can be loaded
Change-Id: I317a890abb518cf4ac47cd089e882315434342ce
2022-03-21 17:31:17 -07:00