Commit graph

41157 commits

Author SHA1 Message Date
Changyeon Jo
63c301ac62 Revert "Modify the automotive display service file context"
This reverts commit edf5420830.

Bug: 268128589
Test: Treehugger
Change-Id: I3961148239831f41423b03d65de0b9b1b4a47724
2023-04-08 00:14:14 +00:00
Changyeon Jo
916ad0da24 Revert "Move cardisplayproxyd to system_ext"
This reverts commit fc0b3da21f.

Bug: 268128589
Test: Treehugger
Change-Id: I562b78d2f7550ee9e15be049f9db3fd1eeb491d8
2023-04-08 00:13:59 +00:00
Treehugger Robot
9ba65f627b Merge "allow systemserver to sigkill clat" 2023-04-06 19:02:24 +00:00
Ioannis Ilkos
035a1a9dfc Merge "SEPolicy for trace event suspend_resume_minimal" 2023-04-05 14:57:39 +00:00
Treehugger Robot
f850317561 Merge "Fix dalvik property attribute for Microdroid" 2023-04-05 09:45:25 +00:00
Ioannis Ilkos
262a10ff2b SEPolicy for trace event suspend_resume_minimal
This is a more lightweight version of built-in power/suspend_resume

Bug: 277016923
Test: manual
Change-Id: I71cefcab43a8119cfded52e55ebfaaf809e9f205
2023-04-05 07:55:43 +00:00
Slawomir Rosek
608e4923d3 Allow system server to read media config
This patch allows system server to read media config properties.
On 32bit architectures the StorageManager service in system server
needs to access media config while checking if transcoding is supported.

Bug: 276498430
Bug: 276662056
Change-Id: Ifc008d98b893b099c31c1fc8b96de9ed18dd4fbe
Signed-off-by: Slawomir Rosek <srosek@google.com>
2023-04-05 07:51:24 +00:00
Maciej Żenczykowski
9fe0c21672 allow systemserver to sigkill clat
This appears to be an oversight in T sepolicy???

Based on observed logs (on a slightly hacked up setup):

04-04 20:38:38.205  1548  1935 I Nat464Xlat: Stopping clatd on wlan0
04-04 20:38:38.205  1548  1935 I ClatCoordinator: Stopping clatd pid=7300 on wlan0
04-04 20:38:43.408  1548  1548 W ConnectivitySer: type=1400 audit(0.0:8): avc: denied { sigkill } for scontext=u:r:system_server:s0 tcontext=u:r:clatd:s0 tclass=process permissive=0
04-04 20:38:43.412  1548  1935 E jniClatCoordinator: Failed to SIGTERM clatd pid=7300, try SIGKILL
04-04 20:39:27.817  7300  7300 I clatd   : Shutting down clat on wlan0
04-04 20:39:27.819  7300  7300 I clatd   : Clatd on wlan0 already received SIGTERM
04-04 20:39:27.830  2218  2894 D IpClient/wlan0: clatInterfaceRemoved: v4-wlan0
04-04 20:39:27.857  1548  1935 D jniClatCoordinator: clatd process 7300 terminated status=0

I think this means SIGTERM failed to work in time, and we tried SIGKILL and that was denied, and then the SIGTERM succeeded?

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ia55ebd812cb9e7062e3cb10d6cb6851638926868
2023-04-05 07:49:26 +00:00
Lakshman Annadorai
d970b34331 Merge "Add cpu_monitor service context." 2023-04-04 17:20:12 +00:00
Alan Stokes
f85f298b2f Fix dalvik property attribute for Microdroid
Commit 22fb5c7d24 migrated from property
types to attributes in some Microdroid rules, but omitted to
associated the attribute with the relevant types. So we fix that.

Bug: 274530433
Bug: 275469579
Bug: 276895565
Test: Will schedule a test run
Change-Id: I11194be9d1e352fa456c24a3b5784c18ccc03a69
2023-04-04 15:29:40 +01:00
Daeho Jeong
37eb6de3d0 Merge "traced_probes: allow traced_probes to access diskstats info" 2023-04-04 01:25:18 +00:00
Daeho Jeong
bfa8213d8c traced_probes: allow traced_probes to access diskstats info
Test: check selinux log while perfetto I/O profiling
Change-Id: I45247b72343c8bca219c7250c467c97e5dacab5c
Signed-off-by: Daeho Jeong <daehojeong@google.com>
2023-04-03 13:02:34 -07:00
Alexander Roederer
cf1ac9a714 Merge "Add persist.sysui.notification.builder_extras_ovrd" 2023-04-03 13:47:09 +00:00
Jooyung Han
49bd2148a4 Remove unused def
Bug: n/a
Test: m
Change-Id: I7d35c6395b4e956e2d6e34e38749a3bf21af81e1
2023-04-03 15:21:32 +09:00
Treehugger Robot
f784149627 Merge "Use kernel sys/fs/fuse/features/fuse_bpf flag to enable fuse_bpf" 2023-03-31 22:29:31 +00:00
Lakshman Annadorai
99467b5e4e Add cpu_monitor service context.
Change-Id: Idefa3e55521477742f53681058575f11242e5b88
Test: m
Bug: 242722241
2023-03-31 20:55:42 +00:00
Jiakai Zhang
326d35c04b Merge "Allow system server to set dynamic ART properties." 2023-03-31 14:02:56 +00:00
Jiakai Zhang
22fb5c7d24 Allow system server to set dynamic ART properties.
This change gives a new type (dalvik_dynamic_config_prop) to some ART
properties such as dalvik.vm.dex2oat-cpu-set and adds a new rule to
allow system server to set them.

Bug: 274530433
Test: Locally added some code to set those properties and saw it being
  successfull.
Change-Id: Ie28602e9039b7647656594ce5c184d29778fa089
2023-03-31 11:46:05 +01:00
Steven Moreland
ccbe862858 Merge "Introduce vm_manager_device_type for crosvm" 2023-03-30 15:57:43 +00:00
Treehugger Robot
c5da4fc2b9 Merge "Allow EVS HAL to access graphics related properties" 2023-03-30 02:26:28 +00:00
Primiano Tucci
252956dc37 Merge "Allow perfetto to write into perfetto_traces_bugreport_data_file" 2023-03-29 17:25:59 +00:00
Elliot Berman
ae5869abf4 Introduce vm_manager_device_type for crosvm
Introduce hypervisor-generic type for VM managers:
vm_manager_device_type.

Bug: 274758531
Change-Id: I0937e2c717ff973eeb61543bd05a7dcc2e5dc19c
Suggested-by: Steven Moreland <smoreland@google.com>
Signed-off-by: Elliot Berman <quic_eberman@quicinc.com>
2023-03-29 10:19:06 -07:00
Alexander Roederer
829d974505 Add persist.sysui.notification.builder_extras_ovrd
Adds persist.sysui.notification.builder_extras_override property
and associated permissions, which will be used to flag guard
a change in core/...Notification.java.

Permissions are limited in scope to avoid unnecessary access.
Apps may need to read the flag (because Notification.java
is a core library), but setting should only be possible
internally (and via debug shell).

Test: manual flash+adb setprop/getprop
Bug: 169435530
Change-Id: I3f7e2220798d22c90f4326570732a52b0deeb54d
2023-03-29 16:35:39 +00:00
Nikita Ioffe
1b4e9393d3 Merge "Add domain level neverallow to restrict access to ptrace" 2023-03-29 11:46:26 +00:00
Treehugger Robot
1ab1f7cd01 Merge "Add sepolicy rules for CpuMonitorService." 2023-03-28 21:02:14 +00:00
Maciej Żenczykowski
8cd6e1569e Merge "netd/netutils_wrapper/network_stack/system_server - allow getattr on bpf progs/maps" 2023-03-28 20:26:57 +00:00
Steven Moreland
f7fa8ead83 Merge "remove iorapd from sepolicy" 2023-03-28 19:32:32 +00:00
Primiano Tucci
4b8710389f Allow perfetto to write into perfetto_traces_bugreport_data_file
We are changing the --save-for-bugreport feature and moving
the file opening/write from the traced service to the perfetto
cmdline client.
This is as part of a bigger refactor to simplify the API surface
in view of non-destructive snapshots of trace buffers.
Add matching sepolicies to perfetto.te

Bug: 260112703
Test: atest perfetto_integrationtests --test-filter '*PerfettoCmdlineTest*'
Change-Id: Ic1dd6b1bf3183f6b7fb551859e35cae950676ffb
2023-03-28 11:34:58 +00:00
Maciej Żenczykowski
52c8a2ebd5 netd/netutils_wrapper/network_stack/system_server - allow getattr on bpf progs/maps
This is so that we can potentially verify that things
are setup right.

Test: TreeHugger
Bug: 275209284
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I59a49cbece2710345fff0b2fb98e32f4e5f3af44
2023-03-28 03:11:42 +00:00
Steven Moreland
c0ce089045 remove iorapd from sepolicy
It's already marked as removed in:
   ./private/compat/33.0/33.0.cil

Bug: N/A
Test: builds
Change-Id: I1b31f83fb5b210be047edb2896c7b66b58353784
2023-03-27 20:55:55 +00:00
Lakshman Annadorai
124be07e24 Add sepolicy rules for CpuMonitorService.
Change-Id: Icda952c148150e4d7824e303d163996679a0f36b
Test: m
Bug: 242722241
2023-03-27 16:29:09 +00:00
Hector Dearman
c9ff8d010b Merge "Allow traced_probes to subscribe to statsd atoms" 2023-03-27 16:04:42 +00:00
Andy Hung
bd89baaecf Merge "sepolicy: Add spatial audio tuning properties." 2023-03-27 15:22:49 +00:00
Treehugger Robot
35a1bb8e32 Merge "microdroid: allow microdroid_manager to read AVF debug policy" 2023-03-27 14:48:13 +00:00
Nikita Ioffe
4bfda5ba89 Add domain level neverallow to restrict access to ptrace
Bug: 271562015
Test: m
Change-Id: I48f9a0fc5e708e15dd103d6ed369c8fe43d70495
2023-03-27 14:45:33 +01:00
Treehugger Robot
e105f468d7 Merge "Grant execute on toolbox_exec for isolated_compute_app" 2023-03-27 08:03:36 +00:00
Treehugger Robot
42f1cad645 Merge "Allow CompOS to read VM config properties" 2023-03-27 07:58:18 +00:00
Jaewan Kim
867bc33ede microdroid: allow microdroid_manager to read AVF debug policy
Bug: 272752814
Test: atest on devices without AVF debug policy
Change-Id: I3fdbdd49f0e775b4b054328dc25c5f2ba1f9712f
2023-03-27 03:52:27 +00:00
Thiébaud Weksteen
e9ac9ce0f3 Grant execute on toolbox_exec for isolated_compute_app
In commit 7ba4801, the execute permission for all isolated_app was
removed. Grant access to isolated_compute_app which requires it.

The new treble test TestIsolatedAttributeConsistency is updated to
capture the new permission. See b/275263760.

Bug: 265960698
Bug: 275024392
Bug: 275263760
Test: atest CtsVoiceInteractionTestCases:android.voiceinteraction.cts.VoiceInteractionServiceTest
Change-Id: Ide27a7e351e8f53b0f5b1ad918a508d04ef515a1
2023-03-27 12:44:03 +11:00
Alan Stokes
4f92d5bd99 Remove policy for non-existent devices
We still had policy for devices which do not currently exist in
Microdroid. Remove the unused types and all references to them in the
policy, since they have no effect and just bloat the policy.

While I'm here, delete all the bug_map entries. We don't use the
bug_map in Microdroid, and this is just an outdated snapshot from host
policy.

Bug: 274752167
Test: atest MicrodroidTests
Test: composd-cmd test-compile
Change-Id: I3ab90f8e3517c41eff0052a0c8f6610fa35ccdcb
2023-03-24 18:13:18 +00:00
Treehugger Robot
1b382aa8b0 Merge "Don't run ComposHostTestCases in presubmit" 2023-03-24 12:35:10 +00:00
Andy Hung
16a79f885d sepolicy: Add spatial audio tuning properties.
audio.spatializer.pose_predictor_type
audio.spatializer.prediction_duration_ms

Test: compiles
Test: adb shell setprop with invalid enum fails.
Bug: 274849680
Merged-In: Ie7e656acbdd3fe101ecbd2cc9dfb6c8a440a6a8b
Change-Id: Ie7e656acbdd3fe101ecbd2cc9dfb6c8a440a6a8b
2023-03-23 20:56:59 -07:00
Thiébaud Weksteen
8ac5737d42 Merge "Remove implicit access for isolated_app" 2023-03-24 03:46:00 +00:00
Andy Hung
2e206f8cc9 Merge "sepolicy: Add spatial audio configuration properties" 2023-03-24 00:41:02 +00:00
Changyeon Jo
89380c19c8 Allow EVS HAL to access graphics related properties
EVS Display HAL needs to access graphics related properties to configure
a pipeline to render the contents of graphics buffers.

Bug: 274695271
Test: m -j selinux_policy
Change-Id: I97a8a3f35f7118325cff9a8ae69485c0f73fe17f
2023-03-23 22:26:42 +00:00
Alan Stokes
26dcfc5416 Don't run ComposHostTestCases in presubmit
They're flaky on cuttlefish. Move to postsubmit instead.

Bug: 264496291
Test: N/A
Change-Id: I19b0357632be5a89e096fd1d9ce8d47dd865d245
2023-03-23 15:45:24 +00:00
Alan Stokes
a45646c024 Allow CompOS to read VM config properties
We want to allow both the VM and ART to contribute to the VM config
(e.g. memory size), so define labels for 2 sets of properties and
grant the necessary access.

Bug: 274102209
Test: builds
Change-Id: Iaca1e0704301c9155f44e1859fc5a36198917568
2023-03-23 15:40:14 +00:00
Satoshi Niwa
80cd0acd64 sepolicy: Add apex/com.android.tethering.inprocess-file_contexts
Needed when using com.android.tethering.inprocess with
flattened APEX.

Bug: 273821347
Test: trybot
Change-Id: Iae6d9547922575398c634433dc07b2e46fbffd8e
2023-03-23 12:43:48 +09:00
Thiébaud Weksteen
7ba4801b6e Remove implicit access for isolated_app
Bug: 265960698
Test: flash, boot and use Chrome; no denials related to isolated_app
Test: crash Chrome using chrome://crash; no new denials from
      isolated_app
Test: atest CtsWebkitTestCases
Change-Id: I0b9e433eb973a5e99741fc88be5e13e9704c9c9e
2023-03-23 12:59:21 +11:00
Charles Chen
3e86cee7c4 Merge "Compliance test added for isolated_app_all" 2023-03-22 21:55:49 +00:00