Commit graph

35336 commits

Author SHA1 Message Date
Inseob Kim
85091cd806 Allow init to relabelto console_device
Init will try restorecon /dev/console, together with /dev, at the second
stage boot.

Bug: 193118220
Test: atest MicrodroidHostTestCases
Change-Id: Ie9796368b54bb0773eabf5ff6feb2b4aa41d0bfa
2022-03-22 22:11:03 +09:00
Jaegeuk Kim
be66c59171 SELinux policy for /dev/sys/block/by-name/rootdisk
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
Change-Id: I550dfb5649ccb5ca61ea5abbf730bd84756f047e
2022-03-16 11:04:39 -07:00
Alan Stokes
7bde36e94e Remove redundant sepolicy
We don't use MLS in Microdroid, so we don't need MLS rules, nor
mlstrusted[subject|object] labels. (We keep one MLS rule to satisfy
checkpolicy.)

A lot of attributes are unused in Microdroid, so we can remove their
declarations and any references to them. (That may not make the
compiled policy smaller, since hopefully they get optimised out
anyway, but it means there is less policy for humans to deal with.)

Remove labels that relate only to apps, which we don't have - MAC
permissions, run-as, seapp_contexts.

In passing, fix a comment snafu in both system & microdroid policy.

Bug: 223596375
Test: Run staged-apex-compile & compos_verify, no denials
Test: atest MicrodroidTests MicrodroidHostTestCases
Change-Id: Ifd3589945a2d8b4c0361e00eec5678795513fd8c
2022-03-15 15:43:50 +00:00
Sal Savage
45b7782c2b Merge "Add sepolicy for Battery Service client role sysprop" 2022-03-15 01:31:07 +00:00
Andrew Scull
629e12499a Merge "Define access to AVF chosen node properties" 2022-03-14 17:06:24 +00:00
Andrew Scull
2dba72540c Define access to AVF chosen node properties
Give microdroid_manager and the DICE HAL access to the AVF chosen node
properties that are used to indicate that the VM is booting in strict
more and that the current boot is provisioning a new VM instance.

Bug: 221051866
Bug: 217376291
Test: atest MicrodroidTests
Change-Id: Ie8451fc80671557086f8d825ad01600f9cb4557a
2022-03-14 11:38:45 +00:00
Inseob Kim
aaf65c2d65 Merge changes Iace4a45c,I007d3bab
* changes:
  microdroid: Set mls_cats to 1
  Add mls_cats property to se_policy_conf
2022-03-14 04:59:27 +00:00
Treehugger Robot
2c905846fa Merge "system_dlkm: allow dumpstate/bugreport to getattr" 2022-03-13 22:22:54 +00:00
Sal Savage
73fdf668af Add sepolicy for Battery Service client role sysprop
Bug: 224176587
Test: Build, this change only defines the sysprop policy
Change-Id: I27fe872955e45e241948e966b3b10834cfd36135
2022-03-12 15:10:48 -08:00
Ramji Jiyani
3b59a537fc system_dlkm: allow dumpstate/bugreport to getattr
Bug: 223332748
Bug: 223755339
Test: atest SELinuxHostTest#testNoBugreportDenials
Signed-off-by: Ramji Jiyani <ramjiyani@google.com>
Change-Id: Ic0bd8f641cd47cc13df8ec9384e44a7e22e1431e
2022-03-11 21:21:57 +00:00
Frank
711fee7dd0 Add file contexts for OnDevicePersonalization.
Test: build
Change-Id: I7fc206f06ca1dad52772211abef50407437a79dc
2022-03-11 08:31:41 +00:00
Robert Shih
b40bf2faff Merge "clearkey aidl file_contexts: update path regex" 2022-03-10 19:17:07 +00:00
Lokesh Gidra
f8d3a6b9a1 Merge "Add userfaultfd selinux policy for app_zygote" 2022-03-10 15:16:34 +00:00
Lokesh Gidra
b016e51150 Add userfaultfd selinux policy for app_zygote
Like zygote, webview_zygote, add userfaultfd policy for app_zygote as
well.

Bug: 160737021
Test: manual (use userfaultfd in an app-zygote)
Change-Id: I42f558c5b646bb0bd83b81fddfb608567f95c811
2022-03-09 21:50:52 -08:00
Carlos Llamas
82a5ceb80c Merge "sepolicy: allow access to binderfs feature files" 2022-03-10 05:14:52 +00:00
Inseob Kim
35e87367b8 microdroid: Set mls_cats to 1
Because MLS isn't really used in microdroid, setting it to 1 may help
improve performance a bit.

Bug: 223596384
Test: atest MicrodroidTests
Change-Id: Iace4a45ccda98e34fbf82b16ff2096a53b543132
2022-03-10 13:16:13 +09:00
Inseob Kim
6e384f3a4b Add mls_cats property to se_policy_conf
To support overriding mls_num_cats for devices which don't need MLS

Bug: 223596384
Test: build
Change-Id: I007d3bab51e0aa67b14c2af1e92bee1d644ef4c7
2022-03-10 13:15:05 +09:00
Robert Shih
ec7f4244e8 clearkey aidl file_contexts: update path regex
Bug: 221078453
Change-Id: Ic7c0e5a68554f254afb7fbe886fce106c34056ff
2022-03-09 22:57:12 +00:00
Victor Hsieh
e29df1ec4a Merge "Allow dex2oat to use userfaultfd in microdroid" 2022-03-09 17:48:05 +00:00
Carlos Llamas
75821321c7 sepolicy: allow access to binderfs feature files
The binder driver now advertises the features it supports through
individual files under /dev/binderfs/features/*. Let all domains have
access to these files to determine how to interact with the driver.

Bug: 191910201
Tested: clients are able to read feature files via libbinder
Signed-off-by: Carlos Llamas <cmllamas@google.com>
Change-Id: Ice5de9efee74e571ef0a23ce093af162fc3b276e
2022-03-09 08:55:10 -08:00
Alan Stokes
b02ac32420 Allow piping VM failure reason
Allow crosvm to write a VM failure reason to virtualizationservice via the pipe provided.

Fixes this denial: avc: denied { write } for path="pipe:[95872]"
dev="pipefs" ino=95872 scontext=u:r:crosvm:s0
tcontext=u:r:virtualizationservice:s0 tclass=fifo_file

Bug: 220071963
Test: Run VM, no denial.
Change-Id: I3beedc5e715aa33209d3df0cae05f45f31e79e66
2022-03-09 14:32:50 +00:00
Shikha Malhotra
2df2acd1e8 Merge "Adding more permission for selinux to some attributes and flags" 2022-03-09 08:19:09 +00:00
Victor Hsieh
2a017b61a6 Allow dex2oat to use userfaultfd in microdroid
Bug: 209488862
Test: Follow instructions in b/209488862#comment12, compilation can
      only succeed with this patch
Change-Id: I6475a1be0db635de96b9f8fdbf9dd3a76c3a759b
2022-03-08 22:29:43 +00:00
Xin Li
631f68045e Merge "Merge Android 12L" 2022-03-08 06:53:24 +00:00
Evan Rosky
bd4cd1ac70 Merge "Add a persist.wm.debug property type and associated permissions" 2022-03-08 01:42:55 +00:00
Christopher Morin
e65a7b3e2b Merge "Allow dumpstate to create tmpfs files" 2022-03-08 00:34:42 +00:00
Xin Li
6875b8a827 Merge Android 12L
Bug: 222710654
Merged-In: Ia6c46f2de07731b0e423da6bb32a27b8c1bbe171
Change-Id: Ia65e634d559b9ddc3eb9d4dccec9b9358648dddb
2022-03-08 00:21:27 +00:00
Evan Rosky
5cfdf2bd6e Add a persist.wm.debug property type and associated permissions
This is intended for wm properties related to wmshell/sysui.
Using this context allows sysui to manipulate these properties
in debug builds.

Bug: 219067621
Test: manual
Change-Id: I5808bf92dbba37e9e6da5559f8e0a5fdac016bf3
2022-03-07 19:44:59 +00:00
Treehugger Robot
071a0a1d17 Merge "Allow EVS HAL to access data from surfaceflinger" am: b774b141dc
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2010133

Change-Id: Ia6c46f2de07731b0e423da6bb32a27b8c1bbe171
2022-03-07 17:57:06 +00:00
Treehugger Robot
b774b141dc Merge "Allow EVS HAL to access data from surfaceflinger" 2022-03-07 17:31:17 +00:00
Michael Eastwood
b7c5fe9d56 Allow vendor domain to communicate with traced. am: 670b38baa9
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2009117

Change-Id: I87a0933db89b416a50072fbad8f21884f327d554
2022-03-07 15:55:11 +00:00
Changyeon Jo
8c4ebe21f5 Allow EVS HAL to access data from surfaceflinger
Bug: 216727303
Test: m -j selinux_policy
Change-Id: Id89a99372e334c87cd1c80c06b5b695e5c8d69e6
2022-03-07 15:42:17 +00:00
Michael Eastwood
670b38baa9 Allow vendor domain to communicate with traced.
This is necessary for vendor code to be able to send trace packets to
Perfetto, which we are doing as part of an effort to provide more
detailed profiling of some vendor code.

Bug: 222684359
Test: (with downstream policy updates) m selinux_policy
Change-Id: I5ab1c04290f69e391d66a76c262d75cadb794f8d
2022-03-04 08:30:29 -08:00
Bob Badour
bad80e1490 Move comment to license_note am: 97bef10ca6
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2008274

Change-Id: I728a46cbcb6466a466a38dcc24edb8fabd556fef
2022-03-04 08:30:09 +00:00
Bob Badour
97bef10ca6 Move comment to license_note
Comments not preserved during refresh.

Test: m nothing
Change-Id: Ifb0356ca49796b89446a50918bae95069b9c5fb4
2022-03-03 14:58:45 -08:00
Inseob Kim
9acadc754d Merge changes from topic "sepolicy_test" am: 4891dbefad
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2000471

Change-Id: I865886016a9e02c6d53ff775c8b87746dae69a4a
2022-03-03 04:29:57 +00:00
Inseob Kim
4891dbefad Merge changes from topic "sepolicy_test"
* changes:
  Build vndservice_contexts with Android.bp
  Move sepolicy_test to Android.bp
2022-03-03 04:02:25 +00:00
Inseob Kim
c7596c4e61 Build vndservice_contexts with Android.bp
Bug: 33691272
Test: boot a device which uses vndservice_contexts
Change-Id: I28c36b74d4176954099f3b7e80a4869b7c44640f
2022-03-02 17:26:44 +09:00
Inseob Kim
61257ca545 Move sepolicy_test to Android.bp
Bug: 33691272
Test: m selinux_policy triggers sepolicy_test
Change-Id: I1618c2a35b3ce9d747db3955788427dc422fd532
2022-03-02 17:25:52 +09:00
sandrom
6bfe9b9115 Allow apexd to enable fsverity on /metadata am: 6446490287
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1979766

Change-Id: I8bed12a4fe8145d50edf9b2425f1bf97d3b21772
2022-03-02 08:21:21 +00:00
sandrom
6446490287 Allow apexd to enable fsverity on /metadata
Bug: 218672709
Test: manual tests

Change-Id: Idaead3ecd3f3488512908febbdc368e184b7bca9
2022-03-01 16:33:55 +00:00
Thiébaud Weksteen
3886aa5237 Merge "Remove bug_map for hal_wifi_default" am: 8ce2e156d0
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2001830

Change-Id: I1e1a6e65af7e4b4cfd4db5f5a6af3f66b970e793
2022-03-01 09:40:38 +00:00
Thiébaud Weksteen
8ce2e156d0 Merge "Remove bug_map for hal_wifi_default" 2022-03-01 09:06:30 +00:00
Thiébaud Weksteen
b8abcadd5b Remove bug_map for hal_wifi_default
Bug: 220258444
Test: build & boot cuttlefish
Change-Id: I3b5c0ad1b9cbdca5f86e7615d243192163b99aaf
2022-02-28 14:30:22 +11:00
Ankit Goyal
07b5aa323e Merge "Add sepolicy for graphics IAllocator AIDL based HAL" am: b9314baf97
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2000351

Change-Id: I799ec9df6349033df237f473e0c524bdd531b683
2022-02-25 19:44:00 +00:00
Robert Shih
5869511f62 Merge "Allow dumpstate to call dump() on drm hals" am: 9846fb4082
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2000271

Change-Id: I794e8e754076e2e7dfbf67a7c5843906e010417d
2022-02-25 19:43:49 +00:00
Ankit Goyal
b9314baf97 Merge "Add sepolicy for graphics IAllocator AIDL based HAL" 2022-02-25 19:34:38 +00:00
Robert Shih
9846fb4082 Merge "Allow dumpstate to call dump() on drm hals" 2022-02-25 19:19:46 +00:00
Alan Stokes
4c79e09417 Allow shell to read updated APEXes am: 5490752cfc
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1998997

Change-Id: I85fe4921c571f90e9f1fd321d460832c1fed192f
2022-02-25 15:06:53 +00:00
Alan Stokes
5490752cfc Allow shell to read updated APEXes
This is useful for certain tests. Note that it is already possible to
access these files without root via adb pull, since adbd has
access. Shell also already has access to non-updated APEXes on
/system/apex.

Bug: 220918654
Test: adb unroot; pm install --apex /data/apex/decompressed/X.decompressed.apex
Change-Id: I35725499365b297a64c9005c8e45325531d3991d
2022-02-25 12:16:14 +00:00