Treehugger Robot
3c03397821
Merge "Allow composd to delete ART staging files" am: 3a7e19c3d4
am: 87e317d603
am: b8386e1027
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1925960
Change-Id: I7a1fdfc7b86f8b3da065f4ce6a6faabf9edc396b
2022-01-04 11:43:29 +00:00
Andrew Walbran
3d0e9e4857
Merge "Add comment explaining why crosvm shouldn't be allowed to open files." am: d020fc05f3
am: 0ae5a68417
am: 9508489a72
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1925961
Change-Id: Ia8cea576cc80d5dbdc00e53f40308143f847c379
2022-01-04 11:43:20 +00:00
Treehugger Robot
3a7e19c3d4
Merge "Allow composd to delete ART staging files"
2022-01-04 11:13:55 +00:00
Andrew Walbran
d020fc05f3
Merge "Add comment explaining why crosvm shouldn't be allowed to open files."
2022-01-04 10:40:23 +00:00
Alan Stokes
ce6e2987de
Allow composd to delete ART staging files
...
If the directory is non-empty when we start we need to delete
everything in it, but didn't have enough access:
avc: denied { getattr } for
path="/data/misc/apexdata/com.android.art/staging/boot-framework.art"
dev="dm-37" ino=57755 scontext=u:r:composd:s0
tcontext=u:object_r:apex_art_staging_data_file:s0 tclass=file
permissive=0
Bug: 205750213
Test: create files in staging/, composd_cmd test-compile
Change-Id: I3a66db7f5fbff82abcf547cb1c2b24e9c53ab158
2022-01-04 09:14:05 +00:00
Jiyong Park
2ce78c5735
Merge "Allow virtualizationservice to check for PKVM extension" am: 0878ac4c47
am: 32c7795f17
am: d06a7c1749
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1934161
Change-Id: Ic3f7eca0ad39e1d56017314ab29abcc4074c86fa
2022-01-03 09:51:24 +00:00
Jiyong Park
0878ac4c47
Merge "Allow virtualizationservice to check for PKVM extension"
2022-01-03 09:30:05 +00:00
Jiyong Park
2dd48d0400
Allow virtualizationservice to check for PKVM extension
...
Bug: 210803811
Test: watch TH for all our tests
Change-Id: Iac4528fa2a0dbebeca4504469624f50832689f43
2022-01-03 14:59:58 +09:00
Maciej Żenczykowski
389fc497d0
Merge "[NC#3] clatd: remove raw and packet socket creation privs" am: 0f1b55ee24
am: 7d517a3712
am: b2425a8e56
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1903467
Change-Id: I2b3b6af74e202b53dbf3c9c343b83576511d81bb
2021-12-30 20:06:44 +00:00
Maciej Żenczykowski
0f1b55ee24
Merge "[NC#3] clatd: remove raw and packet socket creation privs"
2021-12-30 19:50:00 +00:00
Inseob Kim
9d7e9a3491
Merge "Allow app to get dck_prop"
2021-12-28 01:55:30 +00:00
Treehugger Robot
8bf0d2c1dc
Merge "Make surface_flinger_native_boot_prop a system_restricted_prop for ADPF" am: 96c5222c94
am: 6cd97931e3
am: be132f1e8a
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1931900
Change-Id: If86a0c21131caf2fe880f82ee514e2da969639b6
2021-12-28 01:41:32 +00:00
Treehugger Robot
96c5222c94
Merge "Make surface_flinger_native_boot_prop a system_restricted_prop for ADPF"
2021-12-28 00:54:22 +00:00
Matt Buckley
964c68b02d
Make surface_flinger_native_boot_prop a system_restricted_prop for ADPF
...
Test: manual
Bug: b/195990840
Change-Id: Icb758c48a1faa8901a1d2c2c442451c42fc3b5b1
2021-12-27 18:24:12 +00:00
Andrew Walbran
8191dc07cc
Add comment explaining why crosvm shouldn't be allowed to open files.
...
Bug: 192453819
Test: No code change
Change-Id: Iebaa1db2e8eed81122e64999ef58b728e1bf95cc
2021-12-24 13:13:53 +00:00
Thierry Strudel
aa383c8bd3
Allow app to get dck_prop am: f4e3b06683
...
Original change: https://googleplex-android-review.googlesource.com/c/platform/system/sepolicy/+/16530469
Change-Id: I87df425d523b3ed82abf5560cb63543287471222
2021-12-24 06:51:28 +00:00
Thierry Strudel
195149fcf8
Allow app to get dck_prop
...
Bug: 208742539
Test: gts-tradefed run gts -m GtsDckTestCases --log-level-display DEBUG
Merged-In: Ie3f7c54805b9947fd43fe5118fd4808b4744664d
Signed-off-by: Thierry Strudel <tstrudel@google.com>
Change-Id: Ie3f7c54805b9947fd43fe5118fd4808b4744664d
2021-12-24 06:50:53 +00:00
Thierry Strudel
f4e3b06683
Allow app to get dck_prop
...
Ignore-AOSP-First: Touches prebuilts/api/32.0/private/app.te
Bug: 208742539
Test: gts-tradefed run gts -m GtsDckTestCases --log-level-display DEBUG
Signed-off-by: Thierry Strudel <tstrudel@google.com>
Change-Id: Ie3f7c54805b9947fd43fe5118fd4808b4744664d
2021-12-24 06:22:31 +00:00
Devin Moore
6026ac4077
Merge "Add policy for new AIDL IR hal" am: 4f85138c08
am: 4e044e5893
am: 570c442620
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1886401
Change-Id: Id1f7af95e63981f4ae420e9ffe8959411dfb6a44
2021-12-22 22:20:10 +00:00
Devin Moore
4f85138c08
Merge "Add policy for new AIDL IR hal"
2021-12-22 21:44:17 +00:00
Hui Wu
82f06faacd
Merge "Changes in SELinux Policy for cloudsearch API" am: c66fb7aefc
am: 39e16393b7
am: 9f75793c0f
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1927577
Change-Id: I209b092bc400731a61847c5aa3852815888a6a1d
2021-12-17 04:06:19 +00:00
Hui Wu
c66fb7aefc
Merge "Changes in SELinux Policy for cloudsearch API"
2021-12-17 03:04:08 +00:00
Treehugger Robot
5fe9254482
Merge "zygote: Add setattr permission to cgroup" am: d831f2a2f5
am: ea5fa49446
am: 334d3c7c85
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1927857
Change-Id: I6c3858322dcac0ab8a738179aea6780e469dc639
2021-12-17 01:13:21 +00:00
Treehugger Robot
d831f2a2f5
Merge "zygote: Add setattr permission to cgroup"
2021-12-17 00:10:25 +00:00
Greg Kaiser
ed71842c6d
zygote: Add setattr permission to cgroup
...
Credit to Himanshu Agrawal <quic_hagraw@quicinc.com> for this fix.
Like we do with cgroup_v2, we set attribute permission to cgroup
as well.
Test: On a Go device, which uses cgroup instead of cgroup_v2
Bug: 211037424
Change-Id: I5d58c9f549d205f1a8bdce6c5fba1cc833f2b492
Merged-In: I5d58c9f549d205f1a8bdce6c5fba1cc833f2b492
2021-12-16 22:55:34 +00:00
Victor Hsieh
19ec555037
Merge "Allow composd to delete odrefresh target files" am: 5601d70743
am: e642210a9a
am: 969b41347c
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1927358
Change-Id: Id416af36683f735562b74122ee27af9357ced964
2021-12-16 22:40:40 +00:00
Greg Kaiser
f62ef0d798
zygote: Add setattr permission to cgroup
...
Credit to Himanshu Agrawal <quic_hagraw@quicinc.com> for this fix.
Like we do with cgroup_v2, we set attribute permission to cgroup
as well.
Test: On a Go device, which uses cgroup instead of cgroup_v2
Bug: 209933729
Change-Id: I5d58c9f549d205f1a8bdce6c5fba1cc833f2b492
2021-12-16 14:14:29 -08:00
Victor Hsieh
5601d70743
Merge "Allow composd to delete odrefresh target files"
2021-12-16 21:45:43 +00:00
Treehugger Robot
01aca6282a
Merge "Add apexd_payload_metadata_prop" am: a6d6b6aee8
am: a4e0ed83dc
am: ebd1ff5b25
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1885013
Change-Id: I04921eee21ea7a5f1020c83ed560dd811d0562d4
2021-12-16 20:46:04 +00:00
Devin Moore
978b9e5d1c
Add policy for new AIDL IR hal
...
IR interface is converted to AIDL and this contains the necessary
permissions for the default service to serve the interface.
Test: atest VtsHalIrTargetTest hal_implementation_test
Test: check for permission issues after tests
Bug: 205000342
Change-Id: I8d9d81d957bf6ef3c6d815ce089549f8f5337555
2021-12-16 20:24:27 +00:00
Hui Wu
f3e29c7066
Changes in SELinux Policy for cloudsearch API
...
Bug: 210528288
Test: Presubmit Tests
Change-Id: I344d28a95bf7d466620fced9cc85b50bbfcd1947
2021-12-16 19:31:53 +00:00
Alan Stokes
2914610f17
Allow composd to delete odrefresh target files
...
We need to remove any existing files (and the directory) to allow
odrefresh in the VM to re-create them via authfs.
But we don't need, and shouldn't have, any other access to them.
Bug: 210460516
Test: composd_cmd async-odrefresh
Change-Id: Iaafe33934146a6b8dda7c28cc1239c2eed167379
2021-12-16 16:24:56 +00:00
Ramji Jiyani
dec6b44ee4
Merge "Add selinux context for /system_dlkm" am: e3f20ee1e6
am: aaa5919f26
am: 5efbce0fa1
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1899605
Change-Id: Ia23423b9cc4e45ff8fc65e9b1ac987a945bd5896
2021-12-16 03:39:05 +00:00
Richard Fung
0c7c2679b0
Add apexd_payload_metadata_prop
...
This should be read-only and corresponds to apexd.payload_metadata.path
Bug: 191097666
Test: android-sh -c 'setprop apexd.payload_metadata.path'
See permission denied
atest MicrodroidHostTestCases
Change-Id: Ifcb7da1266769895974d4fef86139bad5891a4ec
2021-12-16 03:00:06 +00:00
Ramji Jiyani
e3f20ee1e6
Merge "Add selinux context for /system_dlkm"
2021-12-16 02:41:25 +00:00
Etienne Ruffieux
6b40b2a548
Merge "Adding Bluetooth module sysprop" am: ac45ef86f5
am: b24560a1a3
am: 409e13a954
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1924341
Change-Id: I90173e9518b4c9ca9197e943bad3d97fd6604798
2021-12-15 20:33:32 +00:00
Etienne Ruffieux
ac45ef86f5
Merge "Adding Bluetooth module sysprop"
2021-12-15 19:14:41 +00:00
Etienne Ruffieux
9203c915d1
Adding Bluetooth module sysprop
...
Added Bluetooth sysprop to be able to remove calls to
SystemProperty.set in Bluetooth module.
Tag: #feature
Bug: 197210455
Test: set/get sysprop with SystemProperties
Merged-In: I8070a493fa082ddaa16cd793ed25ad99971950c0
Change-Id: Ia390bd8b3bb064fcae252edb6307e26f07bd53e7
2021-12-15 13:44:33 +00:00
Treehugger Robot
bd22ea499a
Merge "Allow compos_fd_server to create artifacts" am: afc596f8f8
am: 29a90d33cb
am: 3ad3f0b50c
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1922442
Change-Id: If6cea92ebaccb027cab762722b8fd3351ca73dbe
2021-12-15 12:08:07 +00:00
Treehugger Robot
afc596f8f8
Merge "Allow compos_fd_server to create artifacts"
2021-12-15 11:09:24 +00:00
Treehugger Robot
497884ce80
Merge "Add rule for new gesture_prop." am: ac9f469ff0
am: 29be9a0edf
am: f3ece72da2
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1918579
Change-Id: I95521666de397326e70f296aa8abaf71ba77d388
2021-12-15 05:53:21 +00:00
Treehugger Robot
ac9f469ff0
Merge "Add rule for new gesture_prop."
2021-12-15 05:03:42 +00:00
Super Liu
078141a921
Add rule for new gesture_prop.
...
Bug: 209713977
Bug: 193467627
Test: local build and manual check.
Signed-off-by: Super Liu <supercjliu@google.com>
Change-Id: Ib1d2d6dcc7d6ddc6243c806a883d9252d7c081af
2021-12-15 09:32:01 +08:00
Jeff Vander Stoep
13fb51ea0b
Policy for using Apex sepolicy am: bc0fa66cbe
am: 00573254ac
am: f8dfd28b19
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1907858
Change-Id: Iaa5cbfb4efa17e048fd93167e6da9a77ef20b43e
2021-12-14 19:03:58 +00:00
Alan Stokes
8dc7800578
Allow compos_fd_server to create artifacts
...
Previously this was always done by odrefresh. But now we are running
odrefresh in the VM we need to allow FD server to do it as its proxy.
Bug: 209572241
Bug: 209572296
Test: composd_cmd forced-oderefresh
Change-Id: I4bc10d6a3ec73789721a0541f04dd7e3865fe826
2021-12-14 16:06:31 +00:00
Jeff Vander Stoep
bc0fa66cbe
Policy for using Apex sepolicy
...
Bug: 199914227
Test: aosp/1910032
Change-Id: I0726facbf0c28c486ef6501718a6013a040e4b0e
2021-12-14 13:54:03 +01:00
Treehugger Robot
9412cfc810
Merge "[NC#2] clatd: allow clatd access raw and packet socket inherited from netd" am: 7c5faaf3d2
am: 8d35437e6a
am: f419c0e3a4
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1903466
Change-Id: I12e337664f09b7661ad63f9824f0918a37c7b9de
2021-12-13 09:01:54 +00:00
Treehugger Robot
7c5faaf3d2
Merge "[NC#2] clatd: allow clatd access raw and packet socket inherited from netd"
2021-12-13 08:16:26 +00:00
Treehugger Robot
2880a5cd82
Merge "Add hal_vehicle_service for AIDL VHAL service." am: 885bc3ca66
am: e197d7519c
am: 908395f200
...
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1914197
Change-Id: I255ad9d053d2a217ec03d06b48229d2c337adfd8
2021-12-11 01:58:30 +00:00
Treehugger Robot
885bc3ca66
Merge "Add hal_vehicle_service for AIDL VHAL service."
2021-12-11 00:49:12 +00:00