Commit graph

2004 commits

Author SHA1 Message Date
Eric Biggers
9a5992336e Restrict creating per-user encrypted directories
Creating a per-user encrypted directory such as /data/system_ce/0 and
the subdirectories in it too early has been a recurring bug.  Typically,
individual services in system_server are to blame; system_server has
permission to create these directories, and it's easy to write
"mkdirs()" instead of "mkdir()".  Such bugs are very bad, as they
prevent these directories from being encrypted, as encryption policies
can only be set on empty directories.  Due to recent changes, a factory
reset is now forced in such cases, which helps detect these bugs;
however, it would be much better to prevent them in the first place.

This CL locks down the ability to create these directories to just vold
and init, or to just vold when possible.  This is done by assigning new
types to the directories that contain these directories, and then only
allowing the needed domains to write to these parent directories.  This
is similar to what https://r.android.com/1117297 did for /data itself.

Three new types are used instead of just one, since these directories
had three different types already (system_data_file, media_rw_data_file,
vendor_data_file), and this allows the policy to be a bit more precise.

A significant limitation is that /data/user/0 is currently being created
by init during early boot.  Therefore, this CL doesn't help much for
/data/user/0, though it helps a lot for the other directories.  As the
next step, I'll try to eliminate the /data/user/0 quirk.  Anyway, this
CL is needed regardless of whether we're able to do that.

Test: Booted cuttlefish.  Ran 'sm partition disk:253,32 private', then
      created and deleted a user.  Used 'ls -lZ' to check the relevant
      SELinux labels on both internal and adoptable storage.  Also did
      similar tests on raven, with the addition of going through the
      setup wizard and using an app that creates media files.  No
      relevant SELinux denials seen during any of this.
Bug: 156305599
Change-Id: I1fbdd180f56dd2fe4703763936f5850cef8ab0ba
2022-05-05 04:12:46 +00:00
Richard Chang
1b95e83cb0 Merge "Allow vendor services to access vendor_system_native_prop" am: 0b25ca45cf am: 31260126a0
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2083463

Change-Id: I1d3d7b9b69096a76a4c5ff33fc0a806a11f63767
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-05-03 09:11:03 +00:00
Treehugger Robot
a45377df52 Merge changes from topic "33.0_sepolicy_mapping_file" am: 4410dab4de am: 9c142ddafc
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2083164

Change-Id: I1cda80d8cb93269f944ab913f9bf916f29e74a5e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-05-03 05:23:57 +00:00
Richard Chang
af8fac1c56 Allow vendor services to access vendor_system_native_prop
Bug: 226456604
Test: Build
Change-Id: Icc11b9bf06fd0fb8069388ca5a32e8aedf1743a8
2022-05-03 04:19:07 +00:00
Inseob Kim
4ae05118c1 Add 33.0 mapping files
Steps taken to produce the mapping files:

0. Add 33.0 prebuilts to prebuilts/api/33.0/.

1. Add the following Android.bp modules.

    33.0.board.compat.map
    33.0.board.compat.cil
    33.0.board.ignore.map
    plat_33.0.cil
    system_ext_33.0.cil
    product_33.0.cil
    33.0.ignore.cil
    system_ext_33.0.ignore.cil
    product_33.0.ignore.cil
    33.0.compat.cil
    system_ext_33.0.compat.cil

2. Touch the following three files.

    private/compat/33.0/33.0.cil
    private/compat/33.0/33.0.compat.cil
    private/compat/33.0/33.0.ignore.cil

3. Add 33.0 to PLATFORM_SEPOLICY_COMPAT_VERSIONS on
build/make/core/config.mk. Note that we don't update
sepolicy_major_vers to 33, but just update compat versions.

4. Run the following command.

    $ source build/make/rbesetup.sh && lunch aosp_arm64-userdebug
    $ m sepolicy_generate_compat
    $ sepolicy_generate_compat --branch=tm-dev \
        --build latest --target-version 33.0 \
        --latest-version 32.0

This change also enables treble_sepolicy_tests_33.0 and installs
33.0.cil mapping file onto the device.

Test: m treble_sepolicy_tests_33.0
Test: m 33.0_compat_test
Test: m slinux_policy
Change-Id: Ie969ff0372ff1268776165cee5cb5b07d303453c
2022-05-02 14:12:28 +09:00
Felipe Leme
ba498b48bc Merge "Allow apps to read system_user_mode_emulation_prop." am: c696791a7f am: d221f197c2
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2072574

Change-Id: I8e01bac1b7708cee593163c65bb64164059826f0
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-22 16:02:28 +00:00
Felipe Leme
b85242c00f Allow apps to read system_user_mode_emulation_prop.
As it's used by UserManager...

Test: sesearch --allow -s appdomain -t system_user_mode_emulation_prop $ANDROID_PRODUCT_OUT/vendor/etc/selinux/precompiled_sepolicy
Bug: 226643927

Change-Id: I1134a9e0b8ae758e3ebef054b96f9e3237a2401f
2022-04-21 18:49:12 -07:00
Mitch Phillips
a4e951b3bf Merge "[GWP-ASan] Add sysprop, allow shell and system apps to set it." am: 800e948e61 am: e3256e3d21 am: 41949ce19f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2040964

Change-Id: I93cc3b9a1ff2fe74bea47ed0e7898daf7fef4a4e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-21 19:18:20 +00:00
Mitch Phillips
800e948e61 Merge "[GWP-ASan] Add sysprop, allow shell and system apps to set it." 2022-04-21 18:12:43 +00:00
Jason Macnak
a93398051c Adds GPU sepolicy to support devices with DRM gralloc/rendering
... such as Cuttlefish (Cloud Android virtual device) which has a
DRM virtio-gpu based gralloc and (sometimes) DRM virtio-gpu based
rendering (when forwarding rendering commands to the host machine
with Mesa3D in the guest and virglrenderer on the host).

After this change is submitted, changes such as aosp/1997572 can
be submitted to removed sepolicy that is currently duplicated
across device/google/cuttlefish and device/linaro/dragonboard as
well.

Adds a sysfs_gpu type (existing replicated sysfs_gpu definitions
across several devices are removed in the attached topic). The
uses of `sysfs_gpu:file` comes from Mesa using libdrm's
`drmGetDevices2()` which calls into `drmParsePciDeviceInfo()` to
get vendor id, device id, version etc.

Bug: b/161819018
Test: launch_cvd
Test: launch_cvd --gpu_mode=gfxstream
Change-Id: I4f7d4b0fb90bfeef72f94396ff0c5fe44d53510c
Merged-In: I4f7d4b0fb90bfeef72f94396ff0c5fe44d53510c
2022-04-18 17:30:56 -07:00
Jason Macnak
365024e53f Adds GPU sepolicy to support devices with DRM gralloc/rendering
... such as Cuttlefish (Cloud Android virtual device) which has a
DRM virtio-gpu based gralloc and (sometimes) DRM virtio-gpu based
rendering (when forwarding rendering commands to the host machine
with Mesa3D in the guest and virglrenderer on the host).

After this change is submitted, changes such as aosp/1997572 can
be submitted to removed sepolicy that is currently duplicated
across device/google/cuttlefish and device/linaro/dragonboard as
well.

Adds a sysfs_gpu type (existing replicated sysfs_gpu definitions
across several devices are removed in the attached topic). The
uses of `sysfs_gpu:file` comes from Mesa using libdrm's
`drmGetDevices2()` which calls into `drmParsePciDeviceInfo()` to
get vendor id, device id, version etc.

Ignore-AOSP-First: must be submitted in internal as a topic first to
                   avoid having duplicate definitions of sysfs_gpu
                   in projects that are only available in internal

Bug: b/161819018
Test: launch_cvd
Test: launch_cvd --gpu_mode=gfxstream
Change-Id: I4f7d4b0fb90bfeef72f94396ff0c5fe44d53510c
Merged-In: I4f7d4b0fb90bfeef72f94396ff0c5fe44d53510c
2022-04-18 12:56:38 -07:00
Mitch Phillips
8cd32cd93e [GWP-ASan] Add sysprop, allow shell and system apps to set it.
Bug: 219651032
Test: atest bionic-unit-tests

Change-Id: Ic4804ce0e4f3b6ba8eb8d82aca11b400b45c03dc
2022-04-12 13:20:05 -07:00
Kalesh Singh
ae50165897 Merge changes from topic "mglru-exp" am: 6ba41462d5 am: 65164b314d am: 0c82758926
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2056411

Change-Id: I319daa2c5e8b58e67eb3f5685dfba87836cf5f20
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-12 14:43:26 +00:00
Kalesh Singh
6ba41462d5 Merge changes from topic "mglru-exp"
* changes:
  Add sepolicy for Multi-Gen LRU sysfs control
  Add sepolicy for mglru_native flag namespace
2022-04-12 13:48:48 +00:00
Kalesh Singh
98f63495b2 Add sepolicy for Multi-Gen LRU sysfs control
init is allowed to enable/disable MG-LRU.

Bug: 227651406
Bug: 228525049
Test: setprop persist.device_config.mglru_native.lru_gen_config
Test: verify no avc denials in logcat
Change-Id: I20223f3628cb6909c3fd2eb2b821ff2d52202dd2
2022-04-08 13:37:50 -07:00
Lorenzo Colitti
ce493bd00d Merge "Connectivity Native AIDL interface Sepolicy" am: bf8af42bf5 am: 5ef1893f50 am: 4d7cd06a40
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1943988

Change-Id: I330642784c6fddd6949a55156d1fa6b198425a4a
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-01 22:36:20 +00:00
Lorenzo Colitti
bf8af42bf5 Merge "Connectivity Native AIDL interface Sepolicy" 2022-04-01 21:46:37 +00:00
Neha Pattan
1838513cca Merge "Sepolicy changes for adding new system service for AdServices." am: dcb324bdb3 am: e5d6614096 am: c5c329718a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2046744

Change-Id: I6f1d6ee7b30e7d6a5f26282268b4a56fa57cb873
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-01 19:33:33 +00:00
Neha Pattan
dcb324bdb3 Merge "Sepolicy changes for adding new system service for AdServices." 2022-04-01 18:38:07 +00:00
Andy Yu
1055581f7a Merge "Add label and permission for game_mode_intervention.list" am: 6a10d563ea am: e4e8932d22 am: 7c187abfea
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2045643

Change-Id: Iad6e7ea44a3c98823c7121e554764b64130cb620
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-03-30 20:27:27 +00:00
Andy Yu
8337d04202 Add label and permission for game_mode_intervention.list
Bug: 219543620
Doc: go/game-dashboard-information-to-perfetto
Test: TBD
Change-Id: Ic6622aadef05e22c95d4ba739beed0e6fa1f3a38
2022-03-29 14:12:14 -07:00
Neha Pattan
64ef8be1de Sepolicy changes for adding new system service for AdServices.
Test: build
Bug: 216375107
Change-Id: I238ac3f8966ce05768aef17bd05217a9772cf2f3
2022-03-28 19:26:50 +00:00
Ocean Chen
7eae0544a4 Merge "Add persist.device_config.storage_native_boot.smart_idle_maint_enabled property policies" am: b299b79473 am: eeeb06a4ee am: 1739c39853
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2030532

Change-Id: Ib7cf6da50ce19e543e10cd4c76be28f2190d5798
2022-03-23 02:47:01 +00:00
Ocean Chen
63e6e1dc02 Add persist.device_config.storage_native_boot.smart_idle_maint_enabled property policies
Add policies to set persist.device_config.storage_native_boot.smart_idle_maint_enabled property.

Bug: 202283480
Bug: 181079477
Bug: 215443809
Change-Id: I998e6dca950a8ceebb5fbc39568e3e8d6b86e8ce
2022-03-22 08:33:40 +00:00
Ocean Chen
bcd0bd7976 Correct the definition sequences of sdk_sandbox_service
It fixs the auto merger conflict

Merged-In: I9fb98e0caee75bdaaa35d11d174004505f236799
Change-Id: I6afc59633ee4f729a86ab5f24c39ebd46d591549
2022-03-22 06:40:43 +00:00
Bram Bonne
b93f26fd89 Move sdk_sandbox sepolicy to AOSP.
Bug: 224796470
Bug: 203670791
Bug: 204989872
Bug: 211761016
Bug: 217543371
Bug: 217559719
Bug: 215105355
Bug: 220320098
Test: make, ensure device boots

Change-Id: Ia96ae5407f5a83390ce1b610da0d49264e90d7e2
Merged-In: Ib085c49f29dab47268e479fe5266490a66adaa87
Merged-In: I2215ffe74e0fa19ff936e90c08c4ebfd177e5258
Merged-In: I478c9a16032dc1f1286f5295fc080cbe574f09c9
Merged-In: Ibf478466e5d6ab0ee08fca4da3b4bae974a82db0
Merged-In: I5d519605d9fbe80c7b4c9fb6572bc72425f6e90a
Merged-In: I05d2071e023d0de8a93dcd111674f8d8102a21ce
Merged-In: I6572a7a5c46c52c9421d0e9c9fc653ddbd6de145
Merged-In: I1b6d1a778cb658bdfd930b684e4ba0640031b226
Merged-In: I9fb98e0caee75bdaaa35d11d174004505f236799
2022-03-17 10:22:33 +01:00
Jaegeuk Kim
9ca7b96fc3 SELinux policy for /dev/sys/block/by-name/rootdisk am: be66c59171 am: 7592330707 am: e1d9f6d0fe
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2006729

Change-Id: Iabc3077691cc91c6071761c474f3a8b9b2fa4e61
2022-03-16 23:22:21 +00:00
Jaegeuk Kim
be66c59171 SELinux policy for /dev/sys/block/by-name/rootdisk
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
Change-Id: I550dfb5649ccb5ca61ea5abbf730bd84756f047e
2022-03-16 11:04:39 -07:00
Carlos Llamas
f6be743d0e Merge "sepolicy: allow access to binderfs feature files" am: 82a5ceb80c am: 21d01b7bb6 am: bf8b11fe42
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1998993

Change-Id: I768ca3460466752d9d4dc19906f58e688cb5b750
2022-03-10 06:32:13 +00:00
Carlos Llamas
75821321c7 sepolicy: allow access to binderfs feature files
The binder driver now advertises the features it supports through
individual files under /dev/binderfs/features/*. Let all domains have
access to these files to determine how to interact with the driver.

Bug: 191910201
Tested: clients are able to read feature files via libbinder
Signed-off-by: Carlos Llamas <cmllamas@google.com>
Change-Id: Ice5de9efee74e571ef0a23ce093af162fc3b276e
2022-03-09 08:55:10 -08:00
Evan Rosky
45a0b3a858 Merge "Add a persist.wm.debug property type and associated permissions" am: bd4cd1ac70 am: ded5bd867f am: 9a2c7ceb13
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2005839

Change-Id: I2a56ce8dc08c16b3652387d57b12448c8a057310
2022-03-08 03:01:17 +00:00
Evan Rosky
5cfdf2bd6e Add a persist.wm.debug property type and associated permissions
This is intended for wm properties related to wmshell/sysui.
Using this context allows sysui to manipulate these properties
in debug builds.

Bug: 219067621
Test: manual
Change-Id: I5808bf92dbba37e9e6da5559f8e0a5fdac016bf3
2022-03-07 19:44:59 +00:00
Tyler Wear
691def4fd5 Connectivity Native AIDL interface Sepolicy
Sepolicy files for new ConnectivityNative service.
This is a new service implemented in java accessible from
native code. Stable aidl is used to avoid having to manually write
the unparcling code in two different languages. A new service is
required because there is no connectivity service in the system
server that exposes a stable aidl interface.

Bug: 179733303
Change-Id: If2372712a4a8ac7b0631a2195aabc910d1a829cc
2022-02-24 08:53:13 -08:00
Nikita Ioffe
e2da633ef7 Rename SupplementalProcess to SdkSandbox
Ignore-AOSP-First: sepolicy is not in aosp, yet
Bug: 220320098
Test: presubmit
Change-Id: I9fb98e0caee75bdaaa35d11d174004505f236799
2022-02-23 20:44:20 +00:00
Ramji Jiyani
982c6d39a2 Merge "system_dlkm: sepolicy: add system_dlkm_file_type" am: ba8615a186 am: 86cfb85d49 am: b925768cb3
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1978574

Change-Id: I17438ed404b798434e5cee28981ebd2b78b48e98
2022-02-11 19:24:08 +00:00
Ramji Jiyani
ba8615a186 Merge "system_dlkm: sepolicy: add system_dlkm_file_type" 2022-02-11 18:36:04 +00:00
Ramji Jiyani
4a556890f9 system_dlkm: sepolicy: add system_dlkm_file_type
Add new attribute system_dlkm_file_type for
/system_dlkm partition files.

Bug: 218392646
Bug: 200082547
Test: TH
Signed-off-by: Ramji Jiyani <ramjiyani@google.com>
Change-Id: I193c3f1270f7a1b1259bc241def3fe51d77396f3
2022-02-11 04:19:33 +00:00
Treehugger Robot
a77159c365 Merge changes from topic "revert-1979386-revert-1967140-EVS_sepolicy_updates_T-MBLQTXKQEY-UVTCTRHQWF" am: 48f59f9ec2 am: 33f3804491 am: 35d788475c am: 05ef2c2c88
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1978173

Change-Id: Id411487bab280f9c0e5d5f575ec8d9e3154fd447
2022-02-10 22:06:17 +00:00
Changyeon Jo
eacb1095a8 Revert^2 "Updates sepolicy for EVS HAL"
418f41ad13

Bug: 216727303
Test: m -j selinux_policy on failed targets reported
      in b/218802298
Change-Id: Iec8fd2a1e9073bf3dc679e308407572a8fcf44d9
2022-02-10 17:21:54 +00:00
Changyeon Jo
8c12609bce Revert^2 "Adds a sepolicy for EVS manager service"
0137c98b90

Bug: 216727303
Test: m -j selinux_policy on failed targets reported
      in b/218802298
Change-Id: I2ae2fc85a4055f2cb7d19ff70b120e7b7ff0957d
2022-02-10 17:21:14 +00:00
Mohammed Rashidy
1ea99c86e9 Merge changes from topic "revert-1967140-EVS_sepolicy_updates_T-MBLQTXKQEY" am: 7f1eaf1b45 am: aa0cb606c3 am: 3bed79292e am: f1ea833625
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1979387

Change-Id: I8ad7455e22999359816e3e47dfcb5b95845a63e4
2022-02-10 12:32:56 +00:00
Mohammed Rashidy
5e3beea9bc Revert "Updates sepolicy for EVS HAL" am: 418f41ad13 am: 4d67e0d02b am: a46cbab128 am: 7f9b355e86
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1979386

Change-Id: I6e704950a709e76c8e2c5fdb3829487a4012f887
2022-02-10 12:32:54 +00:00
Mohammed Rashidy
0137c98b90 Revert "Adds a sepolicy for EVS manager service"
Revert submission 1967140-EVS_sepolicy_updates_T

Reason for revert: triggered revert due to breakage https://android-build.googleplex.com/builds/quarterdeck?branch=git_master&target=cf_x86_64_auto-userdebug&lkgb=8168894&lkbb=8168958&fkbb=8168947, bug b/218802298
Reverted Changes:
I730d56ab1:Allows hal_evs_default to read directories
I2df8e10f5:Updates sepolicy for EVS HAL
Ie6cb3e269:Adds a sepolicy for EVS manager service

Change-Id: I207c261bcf2c8498d937ab02c499bf709a5f1b15
2022-02-10 10:07:44 +00:00
Mohammed Rashidy
418f41ad13 Revert "Updates sepolicy for EVS HAL"
Revert submission 1967140-EVS_sepolicy_updates_T

Reason for revert: triggered revert due to breakage https://android-build.googleplex.com/builds/quarterdeck?branch=git_master&target=cf_x86_64_auto-userdebug&lkgb=8168894&lkbb=8168958&fkbb=8168947, bug b/218802298
Reverted Changes:
I730d56ab1:Allows hal_evs_default to read directories
I2df8e10f5:Updates sepolicy for EVS HAL
Ie6cb3e269:Adds a sepolicy for EVS manager service

Change-Id: I1cc37b0e56646db61bdb34cb209aefe7376c5a50
2022-02-10 10:07:44 +00:00
Treehugger Robot
47f43ab23c Merge changes from topic "EVS_sepolicy_updates_T" am: 2cedd28cf9 am: 177cf20196 am: 85c9e1cf9e am: feb9f3f2c2
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1967009

Change-Id: I112edf374e2b96e74f786897d580d396bec33c29
2022-02-10 08:52:51 +00:00
Changyeon Jo
a083d7a8d8 Updates sepolicy for EVS HAL
This CL updates hal_evs_default to be sufficient for the defautl EVS HAL
implementation and modifies other services' policies to be able to
communicate with EVS HAL implementations

Bug: 217271351
Test: m -j selinux_policy and Treehugger
Change-Id: I2df8e10f574d62f8b84e0ff0381656ab1b18b52f
2022-02-10 01:42:59 +00:00
Changyeon Jo
5c3bc58163 Adds a sepolicy for EVS manager service
Bug: 170401743
Bug: 216727303
Test: m -j selinux_policy and TreeHugger
Change-Id: Ie6cb3e269fc46a61b56ca93efd69fbc447da0e3d
2022-02-10 01:42:21 +00:00
Steven Moreland
706d6649bb Merge "Allow BPF programs from vendor." am: 2536bf9dac am: 4e83d24871 am: 75fba000fe am: 6ba9fb383f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1189663

Change-Id: I7c2c05d981dac467a9dc1d4fe0c7486ade14141f
2022-02-09 18:33:39 +00:00
Steven Moreland
2536bf9dac Merge "Allow BPF programs from vendor." 2022-02-09 17:28:16 +00:00
Jayant Chowdhary
58c0794156 Merge "System wide sepolicy changes for aidl camera hals." am: b00bf9d282 am: 4c51fa993e am: f3ccb9095a am: 887847beaa
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1975831

Change-Id: If90113a972d3f96bed74db0ae65da50caff1afbf
2022-02-09 04:04:33 +00:00
Steven Moreland
c27d24c37c Allow BPF programs from vendor.
Who needs all those context switches?

bpfloader controls which types of vendor programs can be used.

Bug: 140330870
Bug: 162057235
Test: successfully load bpf programs from vendor
Change-Id: I36e4f6550da33fea5bad509470dfd39f301f13c8
2022-02-08 22:46:54 +00:00
Jayant Chowdhary
e3019be3db System wide sepolicy changes for aidl camera hals.
Bug: 196432585

Test: Camera CTS

Change-Id: I0ec0158c9cf82937d6c00841448e6e42f6ff4bb0
Signed-off-by: Jayant Chowdhary <jchowdhary@google.com>
2022-02-08 09:37:17 +00:00
Seth Moore
3f7ee1390e Add remotely provisioned key pool se policy am: a75cad0d0a am: 10ec76f621 am: 7a7ac7d5aa am: 38ed66df25
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1969539

Change-Id: If922ac778d3afbb210b284dfd167fc9212ef691f
2022-02-04 00:00:45 +00:00
Seth Moore
a75cad0d0a Add remotely provisioned key pool se policy
Keystore now hosts a native binder for the remotely provisioned key
pool, which is used to services such as credstore to lookup remotely
provisioned keys.

Add a new service context and include it in the keystore services.

Add a dependency on this new service for credstore. Also include a
credstore dependency on IRemotelyProvisionedComponent, as it's needed
to make use of the key pool.

Bug: 194696876
Test: CtsIdentityTestCases
Change-Id: I0fa71c5be79922a279eb1056305bbd3e8078116e
2022-02-02 15:07:26 -08:00
Treehugger Robot
a068287a1e Merge "Adds selinux rules for ICarDisplayProxy service" am: 108fdbc5f7 am: 8a96be8df9 am: 2ac9d08d7e am: baebbb72fd
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1965562

Change-Id: Id6c66d646e8ee01db0250097c3cd967c2be8ecfe
2022-01-31 22:49:41 +00:00
Treehugger Robot
108fdbc5f7 Merge "Adds selinux rules for ICarDisplayProxy service" 2022-01-31 21:52:46 +00:00
Changyeon Jo
66eba13833 Adds selinux rules for ICarDisplayProxy service
Bug: 170401743
Test: m -j selinux_policy
Change-Id: Idf3f09d0bcf24de18d6eddb05e51991b4c5edbe8
2022-01-31 19:40:20 +00:00
Robert Shih
5c11b33da4 Merge "Add sepolicy for DRM AIDL HAL" am: d70f0af2bf am: 0de1ba742a am: 77bf16ed0d am: 7295a03aec
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1918837

Change-Id: I116a39f718ce3d71dea6318191acd57aae8874a6
2022-01-28 19:55:47 +00:00
Robert Shih
d70f0af2bf Merge "Add sepolicy for DRM AIDL HAL" 2022-01-28 18:40:53 +00:00
Treehugger Robot
35fde34cc4 Merge "Changes in SELinux Policy for cloudsearch API naming" am: 27416257f3 am: 45a466e098 am: fb1a824053 am: 51cf103457
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1963460

Change-Id: I4c834e7d376e61c26f7ec26d9ea55e2e8584ea14
2022-01-28 03:01:21 +00:00
Hui Wu
42d24fd59d Changes in SELinux Policy for cloudsearch API naming
Bug: 216507592
Test: Presubmit Tests
Change-Id: I5aa647d146cfea0b44efb4c247d9856e0666ea86
2022-01-27 13:42:17 -08:00
Robert Shih
4968374205 Add sepolicy for DRM AIDL HAL
Bug: 208486736
Test: atest VtsAidlHalDrmTargetTest
Change-Id: Ia2b1488a564d94384d183d30291fbf5a6d2df4ab
2022-01-27 01:51:05 -08:00
Treehugger Robot
37cb5c0ee8 Merge "Move mtectrl to private" am: 6003019fa8 am: d0a3b18e55 am: b709430731 am: e4548984ba
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1958841

Change-Id: I0b25d2d45a17835d9c7a9d68356c48ed860b96f9
2022-01-26 10:34:36 +00:00
Treehugger Robot
6003019fa8 Merge "Move mtectrl to private" 2022-01-26 09:30:59 +00:00
Inseob Kim
3bd63cc206 Move mtectrl to private
Because mtectrl is a system internal domain, and we don't need to expose
the type to vendor.

Test: build and boot
Change-Id: Idb5c4a4c6f175e338722971944bf08ba99835476
2022-01-26 08:59:55 +09:00
Etienne Ruffieux
465106bff0 Merge "Added new context declaration for Bluetooth configs" am: 0a19dbdcd3 am: e1da066e3d am: f38dd0b771 am: d30f5d496b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1944887

Change-Id: I676b1f2500ecfa67a0cfa91b7d3ed5d88ff65223
2022-01-25 15:21:01 +00:00
Etienne Ruffieux
0a19dbdcd3 Merge "Added new context declaration for Bluetooth configs" 2022-01-25 14:00:08 +00:00
Paul Hu
d4a42947c3 Merge "Add sepolicy for mdns service" am: 415a2f9b58 am: 1f935d64bf am: dc91d13405 am: 5f1b07275c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1916037

Change-Id: Ibad85dfc0da838419d71f5a466d77152eb837e5d
2022-01-25 03:40:42 +00:00
Paul Hu
415a2f9b58 Merge "Add sepolicy for mdns service" 2022-01-25 02:35:42 +00:00
Hunsuk Choi
dfbaf937fc Merge "Combining hal_radio_*_service into hal_radio_service" am: 5c27113222 am: f3e65b463f am: 13a711981a am: adee6a673c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1958840

Change-Id: Ifbf8a50deaa0b5c61d5ee70eb5ed81d1cf0b0ebc
2022-01-25 01:52:56 +00:00
Etienne Ruffieux
bde2fc6c48 Added new context declaration for Bluetooth configs
As we need to create new sysprops for Bluetooth mainline
configs, we need to have a property context available to
vendors and be able to access configs from other packages.

Tag: #feature
Bug: 211570675
Test: Added overlays and logs
Change-Id: If9c61f251578b61c070619069519e0aa563a9573
2022-01-25 01:18:05 +00:00
Hunsuk Choi
7938201cbb Combining hal_radio_*_service into hal_radio_service
Test: build and flash
Bug: 198331673
Change-Id: Id5d699ffc77f708e2144ffea6d2a6805822e7f50
2022-01-24 19:42:42 +00:00
paulhu
70b0a77ee0 Add sepolicy for mdns service
mdns service is a subset of netd-provided services, so it gets
the same treatment as netd_service or dnsresolver_service

Bug: 209894875
Test: built, flashed, booted
Change-Id: I33de769c4fff41e816792a34015a70f89e4b8a8c
2022-01-25 00:50:21 +08:00
George Chang
32a844da1f Merge "Add hal_nfc_service" am: 95113bbbed am: c3c16ea2b2 am: a0cae343bb am: 90e0a6832a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1878147

Change-Id: I81761b15b3342d18cb2f11d588757a936da5979d
2022-01-22 02:57:37 +00:00
George Chang
95113bbbed Merge "Add hal_nfc_service" 2022-01-22 01:46:41 +00:00
Sharon Su
2a5d8ecd56 Merge "Change in SELinux Policy for wallpaper effects generation API. Test: presubmit tests" am: 0cd7ba7617 am: 1da3471495 am: 2ca8a20307 am: e4fd25aa8d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1955283

Change-Id: If5e653764f71e4f7f3f3d500158c88023f3147c0
2022-01-22 01:00:35 +00:00
Treehugger Robot
5929ac1cf0 Merge "Add sepolicy for IInputProcessor HAL" am: c23930818d am: e12bcb296e am: 4bec13cf50 am: 94ba617915
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1945423

Change-Id: I471ae65938d4088d05adb4aa0c1a28dc8e9022ad
2022-01-22 00:12:18 +00:00
Sharon Su
0cd7ba7617 Merge "Change in SELinux Policy for wallpaper effects generation API. Test: presubmit tests" 2022-01-22 00:06:00 +00:00
Treehugger Robot
c23930818d Merge "Add sepolicy for IInputProcessor HAL" 2022-01-21 22:45:52 +00:00
Florian Mayer
27cd44ab1f Merge "Add policy for command line tool to control MTE boot state." am: 06337c4260 am: 7aaa59df0a am: 1a3afc5428 am: 95d03982f1
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1954938

Change-Id: Iafb5a1db2e7bdda1c03c2a623e72a7f8e1df2cfb
2022-01-21 19:15:44 +00:00
Florian Mayer
06337c4260 Merge "Add policy for command line tool to control MTE boot state." 2022-01-21 18:11:00 +00:00
Sharon Su
cedde105ae Change in SELinux Policy for wallpaper effects generation API.
Test: presubmit tests

Change-Id: I02f9545376534d1570cfa270dfe15c9df6f81d47
2022-01-21 09:28:49 +00:00
Badhri Jagan Sridharan
51033ba97d Merge "Add selinux rules for android.hardware.usb.IUsb AIDL migration" am: 001b47c547 am: b0c62dd704 am: 289ec8f593 am: acfd07d0c3
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1955730

Change-Id: I85a53a5b7a1d4dc44b590bb7f07be27583250f3a
2022-01-21 06:23:52 +00:00
Siarhei Vishniakou
c655bece6a Add sepolicy for IInputProcessor HAL
This sepolicy is needed so that the vendor can launch a new HAL process,
and then this HAL process could join the servicemanager as an impl for
IInputProcessor. This HAL will be used to contain the previous impl of
InputClassifier and also new features that we are going to add.

Bug: 210158587
Test: use together with a HAL implementation, make sure HAL runs
Change-Id: I476c215ad622ea18b4ce5cba9c07ae3257a65817
2022-01-20 23:40:05 +00:00
Badhri Jagan Sridharan
c887ea3965 Add selinux rules for android.hardware.usb.IUsb AIDL migration
Covers the rules needed for the default AIDL implementation.

Bug: 200993386
Signed-off-by: Badhri Jagan Sridharan <badhri@google.com>
Change-Id: Ib152d12686e225e3c1074295a70c624a5115e9bd
2022-01-20 23:03:26 +00:00
John Reck
10056b058a Merge "Add IAllocator stable-aidl" am: 423f4c7e93 am: 94f409898b am: d22fb4ed68 am: 2abe31e7a9
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1953816

Change-Id: I1af9325c0cc2b08b098912fa86c33c0060f741e6
2022-01-20 18:19:38 +00:00
Florian Mayer
23173455ab Add policy for command line tool to control MTE boot state.
Bug: 206895651

Change-Id: I2e84193668dcdf24bde1c7e12b3cfd8a03954a16
2022-01-20 17:30:09 +00:00
George Chang
0ddfebb4e1 Add hal_nfc_service
Bug: 204868826
Test: atest VtsAidlHalNfcTargetTest
Change-Id: If01d1d0a74f5c787805d3744772d40a7aa7db9cb
2022-01-20 03:48:57 +00:00
John Reck
22903f0435 Add IAllocator stable-aidl
Test: Builds & boots; no sepolicy errors logged
Bug: 193558894
Change-Id: I11e162310548b67addc032ccc0d499cbf391e7f9
2022-01-18 19:40:26 -05:00
Jeremy Meyer
84558678f9 Merge "Add resources_manager_service" am: 0f72360b2f am: bebb429e43 am: 4833a09ba8 am: 81670747b9
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1944288

Change-Id: I8c867849177c82a0d7cb53b0d9589c521880fe9b
2022-01-12 21:46:53 +00:00
Jeremy Meyer
d8a3c2b156 Add resources_manager_service
Test: manual, calling the service with `adb shell cmd` works
Bug: 206615535
Change-Id: I8d3b945f6abff352991446e5d88e5a535a7f9ccf
2022-01-10 23:03:42 +00:00
Xinyi Zhou
ad7ee9515c Merge "Allow system app to find NearbyManager" am: b6a6ff20ef am: ee85803987 am: 82606f8c6b am: 38da50d9ba
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1937217

Change-Id: Ic7bfe94398b6253528cb34688e2028e353c5f477
2022-01-06 20:53:41 +00:00
Xinyi Zhou
e9857ab5cf Allow system app to find NearbyManager
Bug: 189954300
Test: -build, flash, boot
Change-Id: Ia21b10213311b0639f320b559e78963d562f30a3
2022-01-05 11:57:44 -08:00
Treehugger Robot
18685b63db Merge "Make surface_flinger_native_boot_prop a system_restricted_prop for ADPF" am: 96c5222c94 am: 6cd97931e3 am: be132f1e8a am: 8bf0d2c1dc
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1931900

Change-Id: Iaa106a0ef7f4404b596b571a2e709b106e706558
2021-12-28 01:53:33 +00:00
Treehugger Robot
96c5222c94 Merge "Make surface_flinger_native_boot_prop a system_restricted_prop for ADPF" 2021-12-28 00:54:22 +00:00
Matt Buckley
964c68b02d Make surface_flinger_native_boot_prop a system_restricted_prop for ADPF
Test: manual
Bug: b/195990840
Change-Id: Icb758c48a1faa8901a1d2c2c442451c42fc3b5b1
2021-12-27 18:24:12 +00:00
Devin Moore
e966a379b7 Merge "Add policy for new AIDL IR hal" am: 4f85138c08 am: 4e044e5893 am: 570c442620 am: 6026ac4077
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1886401

Change-Id: Ia75ace8881d2761443b63b853558452c2b8d5eed
2021-12-22 22:52:58 +00:00
Devin Moore
4f85138c08 Merge "Add policy for new AIDL IR hal" 2021-12-22 21:44:17 +00:00
Hui Wu
a3a0a6aa0e Merge "Changes in SELinux Policy for cloudsearch API" am: c66fb7aefc am: 39e16393b7 am: 9f75793c0f am: 82f06faacd
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1927577

Change-Id: Id9b1d96e40f6c1687b8e844febc24603a3dfdb90
2021-12-17 04:39:08 +00:00
Hui Wu
c66fb7aefc Merge "Changes in SELinux Policy for cloudsearch API" 2021-12-17 03:04:08 +00:00
Devin Moore
978b9e5d1c Add policy for new AIDL IR hal
IR interface is converted to AIDL and this contains the necessary
permissions for the default service to serve the interface.

Test: atest VtsHalIrTargetTest hal_implementation_test
Test: check for permission issues after tests
Bug: 205000342
Change-Id: I8d9d81d957bf6ef3c6d815ce089549f8f5337555
2021-12-16 20:24:27 +00:00
Hui Wu
f3e29c7066 Changes in SELinux Policy for cloudsearch API
Bug: 210528288
Test: Presubmit Tests

Change-Id: I344d28a95bf7d466620fced9cc85b50bbfcd1947
2021-12-16 19:31:53 +00:00
Treehugger Robot
f2bd40a55d Merge "Add rule for new gesture_prop." am: ac9f469ff0 am: 29be9a0edf am: f3ece72da2 am: 497884ce80
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1918579

Change-Id: Iaffb9425d5c34afd898f2dc44a79801093d912d5
2021-12-15 06:15:05 +00:00
Treehugger Robot
ac9f469ff0 Merge "Add rule for new gesture_prop." 2021-12-15 05:03:42 +00:00
Super Liu
078141a921 Add rule for new gesture_prop.
Bug: 209713977
Bug: 193467627
Test: local build and manual check.
Signed-off-by: Super Liu <supercjliu@google.com>
Change-Id: Ib1d2d6dcc7d6ddc6243c806a883d9252d7c081af
2021-12-15 09:32:01 +08:00
Treehugger Robot
82c5365ef2 Merge "Add hal_vehicle_service for AIDL VHAL service." am: 885bc3ca66 am: e197d7519c am: 908395f200 am: 2880a5cd82
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1914197

Change-Id: Ie8a90a36917c63a64e80dad6078fe62b81421bb0
2021-12-11 02:16:52 +00:00
Treehugger Robot
885bc3ca66 Merge "Add hal_vehicle_service for AIDL VHAL service." 2021-12-11 00:49:12 +00:00
Joanne Chung
c8bd82fea5 Add rule for new system service am: eed1918f7f am: f9637630c6 am: 025b236f3b am: 89a1a242a9
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1891636

Change-Id: Ib4aa58bd2fb5f989bcf517735c382ed92acaefee
2021-12-10 10:03:11 +00:00
Joanne Chung
eed1918f7f Add rule for new system service
Update policy for new system service, used for Apps to present the
toolbar UI.

Bug: 190030331
Bug: 205822301
Test: manual. Can boot to home and get manager successfully.

Change-Id: Iee88681a93ae272a90896ccd2a6b64c26c809e82
2021-12-10 13:30:55 +08:00
Treehugger Robot
5e4344494e Merge "Add charger_vendor type" am: 0ce3e70c84 am: 9f386d408d am: 246b50221e am: e1a8cb87f1
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1870393

Change-Id: I17d6a340f7e0975ca678e1aff15f5e1a945bc006
2021-12-10 03:34:43 +00:00
Xiaowen Lei
dfd02c5633 Update sepolicy for service renaming in ag/16267310.
Note: the service was renamed following ApiLint.kt suggestions.

Ignore-AOSP-First: tied to launch of new upcoming hardware.

Test: atest CtsAppTestCases:CommunalManagerTest

Bug: 206054365
Change-Id: Ieca5eba540e77af09d6a1cfe03cc29a988503b5b
2021-12-08 23:24:16 +00:00
Yu Shan
78be3081e7 Add hal_vehicle_service for AIDL VHAL service.
Add selinux policy for AIDL Vehicel HAL service.
This CL mostly follows https://android-review.googlesource.com/c/platform/system/sepolicy/+/1541205/.

Test: Manually test on emulator, verify AIDL VHAL service is up and
accessible by client.
Bug: 209718034

Change-Id: Icad92e357dacea681b8539f6ebe6110a8ca8b357
2021-12-07 22:23:50 -08:00
Yifan Hong
035ce4b7f4 Add charger_vendor type
This is the context when health HAL runs in offline
charging mode.

This has the same permissions as the health HAL, but
is also able to do charger specific things.

Also restrict neverallow rules in charger_type.

Test: manual in offline charging mode
Bug: 203246116
Change-Id: I6034853c113dff95b26461153501ad0528d10279
2021-12-07 16:24:23 -08:00
Treehugger Robot
92e8282041 Merge "Remove 26.0 and 27.0 compat support" am: 26950bb361 am: f4d3471aac am: cc93d7690f am: 471829bb7b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1903972

Change-Id: I90b4aa601bbca28997966e6eb84437dea2742d65
2021-12-02 07:52:46 +00:00
Inseob Kim
3e4a34ccb9 Merge "Add hal_dumpstate_service to ignore" am: 7182b2e56b am: ae574d77d3 am: f91a52bc59 am: 6303d4df9d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1908650

Change-Id: Ib84737a664c67a78ff18b9b945451b35ccc4e587
2021-12-02 01:53:58 +00:00
Inseob Kim
9dc6d70044 Remove 26.0 and 27.0 compat support
Treble doesn't support T system + O vendor, so removing 26.0 (N) and
27.0 (O) prebuilts and compat files.

Bug: 207815515
Test: build
Change-Id: I98d5972221a8e77f3c45fc48ff50bb2b8eb94275
2021-12-02 10:22:10 +09:00
Inseob Kim
a00439e69a Add hal_dumpstate_service to ignore
Bug: 208705795
Test: build
Change-Id: I211e6e0b98c964ba34db5ffd4bcf7a3cf959a8b5
2021-12-02 09:23:06 +09:00
Treehugger Robot
bc5103bd86 Merge "Add 32.0 mapping files" am: 6cf460c45e am: b5bf051407 am: 7bab865c6e am: 5397c5e66d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1906312

Change-Id: I9d49310e914d04a26ee85a12c85aaf52128f2d86
2021-12-02 00:23:03 +00:00
Treehugger Robot
6cf460c45e Merge "Add 32.0 mapping files" 2021-12-01 23:10:38 +00:00
Kedar Chitnis
d0132d8c3a Merge "Update sepolicy to add dumpstate device service for AIDL HAL" am: bb0315bab9 am: 3591bd6749 am: e09c5cdd49 am: 3f32fe230b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1895075

Change-Id: I2334cebf812c6069fcc88d66882b85da2521ff75
2021-12-01 13:12:57 +00:00
Kedar Chitnis
bb0315bab9 Merge "Update sepolicy to add dumpstate device service for AIDL HAL" 2021-12-01 12:16:33 +00:00
Inseob Kim
bee558e4bb Add 32.0 mapping files
Steps taken to produce the mapping files:

1. Add prebuilts/api/32.0/plat_pub_versioned.cil from the
/vendor/etc/selinux/plat_pub_versioned.cil file built on sc-v2-dev with
lunch target aosp_arm64-eng. Add prebuilts/api/32.0/vendor_sepolicy.cil
as an empty file.

When adding plat_pub_versioned.cil, leave only type and typeattribute
statements, removing the other statements: allow, neverallow, role, etc.

2. Add new file private/compat/32.0/32.0.cil by doing the following:
- copy /system/etc/selinux/mapping/32.0.cil from sc-v2-dev
aosp_arm64-eng device to private/compat/32.0/32.0.cil
- remove all attribute declaration statement (typeattribute ...) and
sort lines alphabetically
- some selinux types were added/renamed/deleted w.r.t 32 sepolicy.
Find all such types using treble_sepolicy_tests_32.0 test.
- for all these types figure out where to map them by looking at
31.0.[ignore.]cil files and add approprite entries to 32.0.[ignore.]cil.

This change also enables treble_sepolicy_tests_32.0 and installs
32.0.cil mapping file onto the device.

Bug: 206330997
Test: m treble_sepolicy_tests_32.0
Test: m 32.0_compat_test
Test: m selinux_policy
Change-Id: I8b2991e64e2f531ce12db7aaacad955e4e8ed687
2021-12-01 10:58:25 +09:00
Paul Lawrence
04cddf8af2 Merge "Allow bpfloader to read fuse's bpf_prog number" 2021-11-29 16:18:42 +00:00
Treehugger Robot
caeaefa7b9 Merge "Make 31.0 prebuilts and compat files up to date" am: 906797a9bc am: 7d68e1e458 am: 15dfe5051d am: 14daffc5e8
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1903979

Change-Id: I96b055320caab54ffad859613e007a1441459c06
2021-11-29 14:06:29 +00:00
Inseob Kim
5a8afdcfa6 Make 31.0 prebuilts and compat files up to date
Bug: 208126864
Test: m selinux_policy 31.0_compat_test treble_sepolicy_tests_31.0
Change-Id: Ic97d17b39f7307ed5af200c97c8c09ca0511c216
2021-11-29 19:40:59 +09:00
Kedar Chitnis
a465cbc194 Update sepolicy to add dumpstate device service for AIDL HAL
- Add hal_dumpstate_service AIDL service to hal_dumpstate.te,
  service.te
- Add default example hal_dumpstate service to file_contexts,
  service_contexts
- Adde hal_dumpstate_service to API level 31 compatibility
  ignore list (31.0.ignore.cil)

Bug: 205760700
Test: VtsHalDumpstateTargetTest, dumpstate, dumpstate_test, dumpsys
Change-Id: If49fa16ac5ab1d3a1930bb800d530cbd32c5dec1
2021-11-25 07:52:32 +00:00
Jack Yu
0b373e5fde Merge changes from topic "OMAPI_VNTF" am: b25774f53c am: 55cd3d5260 am: 9c4918ca8d am: 256bb6d01c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1897109

Change-Id: I87e2bfe890a79171ef7ca57a50fbe39a87d695e3
2021-11-23 06:00:30 +00:00
Rajesh Nyamagoud
ce542660c9 Added sepolicy rule for vendor uuid mapping config
New type added in sepolicy to restrict Vendor defined uuid mapping
config file access to SecureElement.

Bug: b/180639372
Test: Run OMAPI CTS and VTS tests
Change-Id: I81d715fa5d5a72c893c529eb542ce62747afcd03
2021-11-20 01:08:11 +00:00
Paul Lawrence
e3e26b7bea Allow bpfloader to read fuse's bpf_prog number
Bug: 202785178
Test: Along with rest of topic, file
/sys/fs/bpf/prog_fuse_media_fuse_media
appears on boot with fuse-bpf in kernel

Merged-In: Ibccdf177c75fef0314c86319be3f0b0f249ce59d
Change-Id: Ibccdf177c75fef0314c86319be3f0b0f249ce59d
2021-11-19 01:43:58 +00:00
Paul Lawrence
3efe0a7b22 Allow bpfloader to read fuse's bpf_prog number
Bug: 202785178
Test: Along with rest of topic, file
/sys/fs/bpf/prog_fuse_media_fuse_media
appears on boot with fuse-bpf in kernel
Ignore-AOSP-First: Does not merge cleanly, so putting in both places

Change-Id: Ibccdf177c75fef0314c86319be3f0b0f249ce59d
2021-11-19 00:29:31 +00:00
Gavin Corkery
1319c3dafd Merge "Sepolicy for SupplementalProcessManager" 2021-11-18 09:57:56 +00:00
Treehugger Robot
e14d580090 Merge changes I74797b13,I5d0b06e3 am: 1b0415fcb0 am: e58de1b17a am: 22c1952033 am: ed61968975
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1887529

Change-Id: If12fecb71b54f8714c25086ee4e2459e21483142
2021-11-18 01:06:03 +00:00
Treehugger Robot
1b0415fcb0 Merge changes I74797b13,I5d0b06e3
* changes:
  Dice HAL: Add policy for dice HAL.
  Diced: Add policy for diced the DICE daemon.
2021-11-17 23:56:14 +00:00
Daniel Norman
45d0b935b3 Merge "Revert "Revert "Adds a new prop context for choosing between mul..."" am: 0dd5118c74 am: a8570d7e9c am: 8d50c9d1a9 am: 7fdcce2f15
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1894203

Change-Id: Ifb0946c997c9456f6e50e17b25664f1263f17940
2021-11-17 23:04:24 +00:00
Janis Danisevskis
bc7a33ece9 Dice HAL: Add policy for dice HAL.
And allow diced to talk to the dice HAL.

Bug: 198197213
Test: N/A
Change-Id: I74797b13656b38b50d7cd28a4c4c6ec4c8d1d1aa
2021-11-17 13:36:18 -08:00
Janis Danisevskis
2b6c6063ae Diced: Add policy for diced the DICE daemon.
Bug: 198197213
Test: N/A
Change-Id: I5d0b06e3cd0c594cff6120856ca3bb4f7c1dd98d
2021-11-17 13:36:18 -08:00
Daniel Norman
0dd5118c74 Merge "Revert "Revert "Adds a new prop context for choosing between mul..."" 2021-11-17 21:24:28 +00:00
Daniel Norman
2f8ce0d9c1 Revert "Revert "Adds a new prop context for choosing between mul..."
Revert "Revert "Adds multi_install_skip_symbol_files field (defa..."

Revert submission 1893459-revert-1869814-vapex-multi-config-VKODFOVCWY

Reason for revert: Fix-forward in https://r.android.com/1894088
Reverted Changes:
I087bfe0dc:Revert "Adds a new prop context for choosing betwe...
I27a498506:Revert "Load persist props before starting apexd."...
Ib5344edc0:Revert "Allow users to choose between multi-instal...
If09bf590e:Revert "Adds multi_install_skip_symbol_files field...
I905dac14c:Revert "Demonstrate multi-installed APEXes."

Change-Id: I03fb124d4e7044f236539a132816fd96cb814775
2021-11-16 20:28:29 +00:00
Owen Kim
addb386f76 Merge "Revert "Adds a new prop context for choosing between multi-insta..."" am: 95d7aaa339 am: a6bd8d83f0 am: 755dee1782 am: 29e1bf186a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1893458

Change-Id: I1af6927e3f7dab88863305ddc3f21a33df42b820
2021-11-16 09:50:54 +00:00
Owen Kim
95d7aaa339 Merge "Revert "Adds a new prop context for choosing between multi-insta..."" 2021-11-16 08:39:27 +00:00
Owen Kim
780cd02d52 Revert "Adds a new prop context for choosing between multi-insta..."
Revert "Adds multi_install_skip_symbol_files field (default fals..."

Revert submission 1869814-vapex-multi-config

Bug: 206551398
Reason for revert: DroidMonitor-triggered revert due to breakage https://android-build.googleplex.com/builds/tests/view?invocationId=I55600009996329947&testResultId=TR93527797572038984, bug b/206551398
Reverted Changes:
I0cd9d748d:Adds multi_install_skip_symbol_files field (defaul...
I5912a18e3:Demonstrate multi-installed APEXes.
I0e6881e3a:Load persist props before starting apexd.
I932442ade:Adds a new prop context for choosing between multi...
I754ecc3f7:Allow users to choose between multi-installed vend...

Change-Id: I087bfe0dcf8d6ab38d861b82196bac4e9147e8e6
2021-11-16 07:08:15 +00:00
Daniel Norman
44bcee8bfa Merge "Adds a new prop context for choosing between multi-installed APEXes." am: 8e276eae6b am: d6746bd67a am: bee9f24f08 am: bdb51edfe3
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1869814

Change-Id: I28c910ab30dcc9615871b006feb64a7e7f81b34a
2021-11-16 01:44:45 +00:00
Daniel Norman
8e276eae6b Merge "Adds a new prop context for choosing between multi-installed APEXes." 2021-11-16 00:45:32 +00:00
Daniel Norman
6b0049dcf0 Adds a new prop context for choosing between multi-installed APEXes.
Bug: 199290365
Test: see https://r.android.com/1872018
Change-Id: I932442adefc7ad10d7cd81e61e95efd41f8cf379
2021-11-11 19:11:11 +00:00
Maciej Żenczykowski
51d6c0c597 introduce new 'proc_bpf' for bpf related sysctls am: 3702f3385e am: 127f77ff8c am: aed3c394e8 am: 0b4cec93d8 am: b08a6e4cf0
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1888379

Change-Id: I6943650f4dcc39e291aafd6140d858e686b26886
2021-11-11 13:41:13 +00:00
Maciej Żenczykowski
3702f3385e introduce new 'proc_bpf' for bpf related sysctls
What to tag chosen based on output of:
  find /proc 2>/dev/null | egrep bpf
on a 5.10 kernel.

Tagged with prefixes to be more likely not require changes in the future

  $ adb root
  $ adb shell 'ls -lZ /proc/sys/net/core/bpf_* /proc/sys/kernel/*bpf*'

Before:
  -rw-r--r-- 1 root root u:object_r:proc:s0      0 2021-11-11 02:11 /proc/sys/kernel/bpf_stats_enabled
  -rw-r--r-- 1 root root u:object_r:proc:s0      0 2021-11-11 02:11 /proc/sys/kernel/unprivileged_bpf_disabled
  -rw-r--r-- 1 root root u:object_r:proc_net:s0  0 2021-11-11 02:11 /proc/sys/net/core/bpf_jit_enable
  -rw------- 1 root root u:object_r:proc_net:s0  0 2021-11-11 02:11 /proc/sys/net/core/bpf_jit_harden
  -rw------- 1 root root u:object_r:proc_net:s0  0 2021-11-11 02:11 /proc/sys/net/core/bpf_jit_kallsyms
  -rw------- 1 root root u:object_r:proc_net:s0  0 2021-11-11 02:11 /proc/sys/net/core/bpf_jit_limit

After:
  -rw-r--r-- 1 root root u:object_r:proc_bpf:s0  0 2021-11-11 02:08 /proc/sys/kernel/bpf_stats_enabled
  -rw-r--r-- 1 root root u:object_r:proc_bpf:s0  0 2021-11-11 02:08 /proc/sys/kernel/unprivileged_bpf_disabled
  -rw-r--r-- 1 root root u:object_r:proc_bpf:s0  0 2021-11-11 02:08 /proc/sys/net/core/bpf_jit_enable
  -rw------- 1 root root u:object_r:proc_bpf:s0  0 2021-11-11 02:08 /proc/sys/net/core/bpf_jit_harden
  -rw------- 1 root root u:object_r:proc_bpf:s0  0 2021-11-11 02:08 /proc/sys/net/core/bpf_jit_kallsyms
  -rw------- 1 root root u:object_r:proc_bpf:s0  0 2021-11-11 02:08 /proc/sys/net/core/bpf_jit_limit

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I46ea81ff42d3b915cf7a96735dc2636d9808ead6
2021-11-11 02:54:21 -08:00
Gavin Corkery
79214e605e Sepolicy for SupplementalProcessManager
Test: Builds
Bug: 204989700
Ignore-AOSP-First: Feature developed internally
Change-Id: I4c03cd79ca7456defc46333d61b58101f80f1ca8
2021-11-09 12:35:51 +00:00
Sarah Chin
ba891e6dcb Merge "Sepolicy for IRadio modules" am: 0185fc6e12 am: 703e69e517 am: 45849ee180 am: 1214fbd0bb am: 72798396a1
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1883570

Change-Id: If5ef8def0884635bbae2a0b404d5003a4f9d263e
2021-11-09 10:41:50 +00:00
Sarah Chin
e3dfbdb52d Sepolicy for IRadio modules
Test: build and flash
Bug: 198331673
Change-Id: I06513050252874400bcd81fb5735d6790f6e2ac1
2021-11-05 17:00:28 -07:00
Treehugger Robot
b393017d62 Merge "Remove references to nonplat sepolicy" am: 37919f5b87 am: 012a7d8166 am: 91850c27fb am: 61682bd7da am: a3b021024d
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1882149

Change-Id: I6151804967293ae766fdf74e9485e56eea88731d
2021-11-05 16:30:49 +00:00
Treehugger Robot
37919f5b87 Merge "Remove references to nonplat sepolicy" 2021-11-05 15:25:54 +00:00
Jeff Vander Stoep
f098071ac7 Remove references to nonplat sepolicy
"nonplat" was renamed to "vendor" in Android Pie, but was retained
here for Treble compatibility.

We're now outside of the compatbility window for these devices so
it can safely be removed.

Test: atest treble_sepolicy_tests
Change-Id: Iaa22af41a07b13adb7290f570db7a9d43b6e85cc
2021-11-05 15:07:57 +01:00
Serik Beketayev
7aa36f1873 Merge "[IRadioConfig] Applying new IRadioConfig AIDL" 2021-11-03 17:51:04 +00:00
Gabriel Biren
efee4568dd Add SeLinux policy for supplicant AIDL service. am: 4a0673e369 am: 9229edf01d am: 9961b167c1 am: 1a9729ea1c am: f06cc37d10
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1845631

Change-Id: Ie5dcf2cd47e8b4d2a6bb575e7513d9e5035299e8
2021-11-03 16:49:03 +00:00
Serik Beketayev
22b5fdfd1c [IRadioConfig] Applying new IRadioConfig AIDL
Bug: 198332054
Test: m -j
Change-Id: I7558a7488c41aac6cd9cae1f0ccf777045909f85
Merged-In: I7558a7488c41aac6cd9cae1f0ccf777045909f85
(cherry picked from commit 1862a52750)
2021-11-03 09:27:50 -07:00
Serik Beketayev
1862a52750 [IRadioConfig] Applying new IRadioConfig AIDL
Bug: 198332054
Test: m -j
Change-Id: I7558a7488c41aac6cd9cae1f0ccf777045909f85
2021-11-03 09:18:49 -07:00
Gabriel Biren
4a0673e369 Add SeLinux policy for supplicant AIDL service.
Bug: 196235436
Test: Manual - connect to WiFi
Change-Id: I613a2e7eac620543872a1af7ed477b8d36713b45
2021-11-02 22:24:39 +00:00
Chris Weir
c37571ae60 Merge "SEPolicy for Netlink Interceptor" am: 07fcb348fa am: d93b30412c am: edeca7b9c2 am: 6fb43d86b4 am: 10dea2d98e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1845629

Change-Id: Ie38892a5703f8d0aecf657162e8442e1f7edc68e
2021-11-02 19:39:49 +00:00
Chris Weir
07fcb348fa Merge "SEPolicy for Netlink Interceptor" 2021-11-02 18:02:45 +00:00
Treehugger Robot
865cfdcc8b Merge "Allow init to write to /proc/cpu/alignment" am: 54bd8438b1 am: c9c4f7fab2 am: 44b7ff808f am: f1be036c13 am: a6e5a53a98
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1874738

Change-Id: I417633e1c51f3115cd5239996cb83fac1b10e039
2021-11-02 00:04:42 +00:00
Treehugger Robot
54bd8438b1 Merge "Allow init to write to /proc/cpu/alignment" 2021-11-01 22:33:09 +00:00
Alistair Delva
6092d633b0 Allow init to write to /proc/cpu/alignment
The root init.rc does "write /proc/cpu/alignment 4", but we don't
actually allow this write in core sepolicy. This seems to be a 32-bit
ARM only proc file.

Noticed when booting 32-bit ARM Cuttlefish.

Bug: 145371497
Change-Id: Ic099395708f7236bcc2fc5c561809a7e129786de
2021-11-01 10:17:26 -07:00
Shubang Lu
094acaac77 Merge "Add SE policy for tv_iapp" am: 69a7983d31 am: 6dcca98eac am: 0befb376c5 am: 537eae743a am: 65d709e7f0
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1867710

Change-Id: Ie2653529cf2b6cb32a05496f709eec63df2191d8
2021-10-29 21:07:25 +00:00
Shubang Lu
69a7983d31 Merge "Add SE policy for tv_iapp" 2021-10-29 19:44:18 +00:00
brycelee
49595a3c48 Merge "Revert "Remove the bdev_type and sysfs_block_type SELinux attributes"" am: 1a6fbe3dfe am: 773e881fe8 am: c6738e359e am: 3a981f0f4e am: 887bc57334
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1873981

Change-Id: Ib8a0d9157c9d11af08fe2965cd667080074ab2aa
2021-10-28 19:59:47 +00:00
brycelee
1a6fbe3dfe Merge "Revert "Remove the bdev_type and sysfs_block_type SELinux attributes"" 2021-10-28 18:31:01 +00:00
Bart Van Assche
afc201064f Merge "Remove the bdev_type and sysfs_block_type SELinux attributes" am: 187ffea5b8 am: 81f861e9fc am: b602e2e510 am: 27c8e3fabc am: f3c3c05d72
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1862919

Change-Id: I36d488864dffe1b135929929323538e6ce4f3ca4
2021-10-28 18:17:23 +00:00
Bart Van Assche
e3cfa9e1d3 Revert "Remove the bdev_type and sysfs_block_type SELinux attributes"
This reverts commit 63930d3850.

Reason for revert: Broken build (https://android-build.googleplex.com/builds/submitted/7863094/aosp_raven-userdebug/latest/view/logs/error.log)

Change-Id: I1742d69d471e9b00359a2e7e654aa752513990df
2021-10-28 18:03:49 +00:00
Bart Van Assche
187ffea5b8 Merge "Remove the bdev_type and sysfs_block_type SELinux attributes" 2021-10-28 16:45:54 +00:00
Yifan Hong
9e7a4e7f01 Add health AIDL HAL. am: 388bbbccb3 am: c0451e34e9 am: ecbbe81647 am: 156e621273 am: 20694c593e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1865954

Change-Id: I50d8874842e08bee04c36a940300b3bc7773ef00
2021-10-27 07:05:36 +00:00
Yifan Hong
388bbbccb3 Add health AIDL HAL.
Test: pass
Bug: 177269435
Change-Id: I755d5158715b38a89a28af753ad4c27cdfa93546
2021-10-26 19:34:34 -07:00
Chris Weir
4ac3d74a70 SEPolicy for Netlink Interceptor
Make Netlink Interceptor work when SELinux is enforcing

Test: Netlink Interceptor HAL comes up and works
Bug: 194683902
Change-Id: I3afc7ae04eba82f2f6385b66ddd5f4a8310dff88
2021-10-26 10:03:14 -07:00
Bart Van Assche
63930d3850 Remove the bdev_type and sysfs_block_type SELinux attributes
Remove these SELinux attributes since the apexd and init SELinux policies
no longer rely on these attributes.

The only difference between a previous version of this patch and the
current patch is that the current patch moves these attributes to the
'compat' policy. See also
https://android-review.googlesource.com/c/platform/system/sepolicy/+/1850656.

This patch includes a revert of commit 8b2b951349 ("Restore permission
for shell to list /sys/class/block"). That commit is no longer necessary
since it was a bug fix for the introduction of the sysfs_block type.

Bug: 202520796
Test: source build/envsetup.sh && lunch aosp_x86_64 && m && launch_cvd && adb -e shell dmesg | grep avc
Change-Id: Id7d32a914e48bc74da63d87ce6a09f11e323c186
Signed-off-by: Bart Van Assche <bvanassche@google.com>
2021-10-25 16:26:07 -07:00
shubang
9fa7dc9c7b Add SE policy for tv_iapp
Bug: 203730671
Test: cuttlefish;
Change-Id: I533f2004343aafe5660e4018e73111880dfa647f
2021-10-22 00:02:05 -07:00
Yifan Hong
603d7f876b Merge "Remove healthd." am: 48732e041c am: a0f7f4c30a am: aae18739b5 am: 562cde497b am: 9cb30538a7
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1865953

Change-Id: I4f46ffb4d60d9c3bec7974cb09f2d5589ddaddab
2021-10-22 01:20:36 +00:00
Yifan Hong
aabea20d89 Remove healthd.
Test: pass
Bug: 203245871
Change-Id: I4eb0b4333d7fde2096c4c75b7655baf897900005
2021-10-20 18:47:41 -07:00
Ady Abraham
057739c7b2 Composer stable AIDL HAL sepolicy am: 7ed18e6d66 am: 5ffad8d9dc am: 1854578f75 am: 4c07b5561b am: 71b0300e4a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1863914

Change-Id: Ib6fe57f031225e0b5665bc0a725dab324a6d0037
2021-10-20 06:10:04 +00:00
Ady Abraham
37aee5553a Remove vrflinger am: df28371462 am: 05553287d1 am: 15fca4224b am: 1b9f2a662c am: 3a24ede36f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1863913

Change-Id: I513877fdc8f3fad3bbe22aaf33c6a0d008b047fe
2021-10-20 06:10:02 +00:00
Ady Abraham
7ed18e6d66 Composer stable AIDL HAL sepolicy
Test: build + presubmit
Bug: 198690444
Change-Id: I6a26823c4ad363d137526c96580b05363d0ac894
2021-10-20 02:58:20 +00:00
Ady Abraham
df28371462 Remove vrflinger
Not used anymore.

Test: build + presubmit
Bug: 170681929
Change-Id: I3ac9b842f89acf620e9f08516e44977d83064f2f
2021-10-20 02:02:57 +00:00
Maurice Lam
79573a2e1b Merge "SELinux rules for virtual device" am: cde20c1fc6 am: 1d46f6ab8c am: df7c5d2f85 am: fa3451a99f am: d60514c834
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1832971

Change-Id: I609e155d889ca259ec1f6513662e80014262f390
2021-10-18 21:26:40 +00:00
Lucas Silva
ea604140d9 Merge "Add sepolicy changes for new communal system service." 2021-10-18 00:13:00 +00:00
Maurice Lam
1517644d4d SELinux rules for virtual device
Bug: 194949534
Test: Manual
Change-Id: I5fcc83e313ce464e4a855b24d32fc2d82ee0b07e
2021-10-15 18:16:01 -07:00
Lucas Silva
e56afbd06d Add sepolicy changes for new communal system service.
Ignore-AOSP-First: tied to launch of new upcoming hardware
Test: locally on device
Bug: 191994709
Bug: 191996331
Bug: 200324021
Change-Id: I2c1072c720658159a50905d20ca02a13e1b1c128
2021-10-15 19:15:54 +00:00
Arthur Ishiguro
29dc02c044 Sensors stable AIDL HAL sepolicy
Bug: 195593357
Test: TreeHugger
Change-Id: I02b88a93d829654a1ce946681b59e648b2cd7550
2021-10-15 17:39:56 +00:00
Dave McCloskey
74fd233c29 Merge "SEPolicy changes to support Attestation Verification Service" 2021-10-14 00:12:50 +00:00
Ian Hua
91d153e9b5 Update sepolicy for adding nnapi_native namespace.
Test: mm
Bug: 201399117
Change-Id: I40a2431b6f5a54deae27fe68f503aff9b99e2793
2021-10-12 11:50:26 +01:00
Dave McCloskey
a7e47db710 SEPolicy changes to support Attestation Verification Service
Bug: 201696614
Change-Id: I4a7a830ba809ed59a030a87c4f479199685d8a42
Test: Verify device boots
2021-10-08 14:53:24 -07:00
Enrico Granata
393ebdda04 Merge "Introduce ro.boot.hypervisor properties" am: dd35626853
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1843773

Change-Id: I4ff9a7c008590a5ca17987aac95c5afab441f392
2021-10-04 19:20:47 +00:00
Enrico Granata
645c390d1a Introduce ro.boot.hypervisor properties
In virtualized deployments of Android, it can be useful to have
access to a description of the hypervisor/host environment being
used to run the guest OS instance.

This is represented by means of a new system property
ro.boot.hypervisor.version, which is meant to convey a
free-form descriptor of the current host/hypervisor version

The property is meant to be provided to Android as androidboot.
by whatever host-specific means are used to supply other boot
properties to the target Android instance. Access could be later
opened to other vendor processes to set if needed for specific
setups where init is not a sufficiently-early stage for
host/guest communication. Such setups are not known at this time.

For a native Android incantation, the property defaults to
being missing

Other properties could later be added to this same namespace
and context if they turn out to be useful in specific scenarios.

Bug: 178749018
Test: build cuttlefish
Change-Id: Id721c14ef1958b525c2866a660dcae8fd176a79d
2021-10-04 11:14:03 -06:00
Ankita Vyas
e0d6c3604f Merge "Add selinux changes for Locale Manager Service" am: 7ac013be94
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1810459

Change-Id: Idd51d097ffd18b7e0f4c47e4e83221d24b787b94
2021-08-27 04:13:38 +00:00
Ankita Vyas
7ac013be94 Merge "Add selinux changes for Locale Manager Service" 2021-08-27 03:59:42 +00:00
Treehugger Robot
209b78ab83 Merge "sepolicy: Change UWB HAL from HIDL to versioned AIDL" am: d7fc7bd30b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1809163

Change-Id: I423431ce2bee07fd3c2a968f4c59799b17fa71c6
2021-08-27 01:55:54 +00:00
Roshan Pius
7076dfaa4f Merge "sepolicy: Add UWB HAL interface in AOSP" am: ea6c84b560
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1808158

Change-Id: I8168654bf875acbec024e8a2d144cbfb0486ef17
2021-08-27 00:37:05 +00:00
Roshan Pius
cd8333b53a sepolicy: Change UWB HAL from HIDL to versioned AIDL
No new HIDL HAL's are allowed in Android T. UWB HAL converted to
versioned AIDL interface to be compliant.

Bug: 195308730
Test: Compiles
Change-Id: I35cf8edd244baa02778ee8eff46840ae26424869
2021-08-27 00:28:56 +00:00
“Ankita
623ece0386 Add selinux changes for Locale Manager Service
Test: build and booted device

Bug: 194094788

Change-Id: Ic3c1f135985a5003ed07a8da9dbd7a3f8b61ae71
2021-08-26 14:33:24 +00:00
Roshan Pius
37ee61f663 sepolicy: Rename hal_uwb -> hal_uwb_vendor
Since we are now creating an AOSP HAL for uwb. Rename Pixel specific
internal UWB HAL from Android S to hal_uwb_vendor to avoid conflicts
with the AOSP HAL sepolicy rules that are going to be added in
Android T.

Android S Architecture:
|Apps | AOSP API | Vendor Service | Vendor HAL Interface | Vendor HAL
Implementation | Vendor driver/firmware

Android T Architecture:
|Apps | AOSP API | AOSP Service | AOSP HAL Interface | Vendor HAL
Implementation | Vendor driver/firmware

Ignore-AOSP-First: Dependent changes in internal-only projects.

Bug: 195308730
Test: Compiles
Change-Id: I7bf4794232604372134ea299c8e2a6ba14a801d3
Merged-In: I7bf4794232604372134ea299c8e2a6ba14a801d3
(cherry picked from commit 40465250e4)
(cherry picked from commit 27ab309fad)
2021-08-26 05:20:39 +00:00
Roshan Pius
8a5370c5e4 sepolicy: Add UWB HAL interface in AOSP
Adding sepolicy rules for the AOSP HAL interface.

Ignore-AOSP-First: Dependent changes in internal-only projects.

Bug: 195308730
Test: Compiles
Change-Id: I56302b570a749f7d72b6fe8f4f4a8767ea4785c1
Merged-In: I56302b570a749f7d72b6fe8f4f4a8767ea4785c1
2021-08-24 20:10:21 -07:00
Roshan Pius
65e938e539 sepolicy: Rename hal_uwb -> hal_uwb_vendor
Since we are now creating an AOSP HAL for uwb. Rename Pixel specific
internal UWB HAL from Android S to hal_uwb_vendor to avoid conflicts
with the AOSP HAL sepolicy rules that are going to be added in
Android T.

Android S Architecture:
|Apps | AOSP API | Vendor Service | Vendor HAL Interface | Vendor HAL
Implementation | Vendor driver/firmware

Android T Architecture:
|Apps | AOSP API | AOSP Service | AOSP HAL Interface | Vendor HAL
Implementation | Vendor driver/firmware

Ignore-AOSP-First: Dependent changes in internal-only projects.

Bug: 195308730
Test: Compiles
Change-Id: I7bf4794232604372134ea299c8e2a6ba14a801d3
Merged-In: I7bf4794232604372134ea299c8e2a6ba14a801d3
2021-08-24 20:10:06 -07:00
Suren Baghdasaryan
a3152de04d Merge "Allow init to execute extra_free_kbytes.sh script" am: ce8e066761
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1782248

Change-Id: I53559bd04d3e65dec4ee2187636677e91ededc27
2021-08-17 19:24:23 +00:00
Suren Baghdasaryan
6988677f22 Allow init to execute extra_free_kbytes.sh script
extra_free_kbytes.sh is used by init to set /sys/vm/watermark_scale_factor
value. Allow init to execute extra_free_kbytes.sh and the script to access
/proc/sys/vm/watermark_scale_factor and /proc/sys/vm/extra_free_kbytes
files.

Bug: 109664768
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Change-Id: I55ec07e12a1cc5322cfdd4a48d0bdc607f45d832
2021-08-17 17:02:38 +00:00
Arthur Ishiguro
cfa6d86d50 Context Hub stable AIDL sepolicy am: e1ced2f4d8 am: 779c996ebd
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1792668

Change-Id: Icdfb36f33e59953f6f13eb9901803ff61d2d4c90
2021-08-11 03:28:18 +00:00
Arthur Ishiguro
e1ced2f4d8 Context Hub stable AIDL sepolicy
Bug: 194285834
Test: TreeHugger
Change-Id: I88675f7f61821619abbff87fa5ee321836745324
2021-08-10 22:06:43 +00:00
Jiyong Park
047e5af29b Merge "Don't prevent crosvm from accessing vendor-owned VM disk images" am: 11d2b1c5c9 am: 88e069900e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1789271

Change-Id: I06bef31e792e6f8c6e6745e9281dbaf518674016
2021-08-10 01:54:59 +00:00
Bart Van Assche
7efcbf568c Allow the init and apexd processes to read all block device properties am: ec50aa5180 am: b00618fb9f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1783947

Change-Id: Iac344ff86cae6870c6f29fc2b4fb5529482a4219
2021-08-10 01:54:52 +00:00
Jiyong Park
11d2b1c5c9 Merge "Don't prevent crosvm from accessing vendor-owned VM disk images" 2021-08-10 01:34:08 +00:00
Bart Van Assche
ec50aa5180 Allow the init and apexd processes to read all block device properties
Addressing b/194450129 requires configuring the I/O scheduler and the
queue depth of loop devices. Doing this in a generic way requires
iterating over the block devices under /sys/class/block and also to
examine the properties of the boot device (/dev/sda). Hence this patch
that allows 'init' and 'apexd' to read the properties of all block
devices. The patch that configures the queue depth is available at
https://android-review.googlesource.com/c/platform/system/core/+/1783847.

Test: Built Android images, installed these on an Android device and verified that modified init and apexd processes do not trigger any SELinux complaints.
Change-Id: Icb62449fe0d21b3790198768a2bb8e808c7b968e
Signed-off-by: Bart Van Assche <bvanassche@google.com>
2021-08-09 13:46:41 -07:00
Jiyong Park
3fee5a43c1 Don't prevent crosvm from accessing vendor-owned VM disk images
There can be VM disk images that are specific to the underlying SoC.
e.g. in case where SoC-specific hardware is dedicated to a VM and the VM
needs drivers (or HALs) for the hardware.

Don't prevent crosvm from reading such a SoC-specific VM disk images.

Note that this doesn't actually allow crosvm to do that in AOSP. Such an
allow rule could be added in downstreams where such use cases exist.

Bug: 193605879
Test: m
Change-Id: If19c0b6adae4c91676b142324c2903879548a135
2021-08-09 11:13:54 +09:00
Rick Yiu
e7d3b3d499 Merge "Move vendor_sched to common sepolicy" am: 2e8a281466 am: 2daa7d932b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1781205

Change-Id: Ic0104cc1606286dba5066dceea8b66c75f4480f0
2021-07-30 04:11:22 +00:00
Rick Yiu
2e8a281466 Merge "Move vendor_sched to common sepolicy" 2021-07-30 03:47:38 +00:00
Rick Yiu
b31ec34eef Move vendor_sched to common sepolicy
Previously vendor_sched is put under product area which will be replaced
by GSI. To solve it, move it to system/sepolicy.

Bug: 194656257
Test: build pass
Change-Id: Ia0b855e3a876a58b58f79b4fba09293419797b47
2021-07-30 03:01:32 +00:00
Linzhao Ye
b2abee1922 Merge "Add SeLinux policy for hostapd AIDL service." am: f023c126fc am: ded1063fd2
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1781487

Change-Id: Id5fd54b83225a7e7caa5d3c102dff6a68753cdbd
2021-07-29 16:42:16 +00:00
Linzhao Ye
f023c126fc Merge "Add SeLinux policy for hostapd AIDL service." 2021-07-29 16:12:41 +00:00
Chris Ye
b7bb89b551 Add SeLinux policy for hostapd AIDL service.
Bug: 194806512
Test: Manual test wifi hotspot.
Change-Id: I12b3e93650fcc6f2ea8794970fa8cf62c0a82475
2021-07-28 23:37:46 -07:00
David Anderson
8429ed5bdf Merge "Add new snapuserd socket and property rules." am: f595435798 am: f9d4e5003b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1778706

Change-Id: Ie1d65724b6b8e4e3cfb2413bd7838c27c310559c
2021-07-28 22:25:06 +00:00
David Anderson
bf5b6ce422 Add new snapuserd socket and property rules.
This adds a new property prefix owned by snapuserd, for communicating
when the service is ready to accept connections (snapuserd.ready and
snapuserd.proxy_ready).

This also adds a new socket context. This is a seqpacket socket used to
communicate with a special instance of snapuserd that bridges to the
first-stage daemon.

Bug: 193833730
Test: no denials after OTA applies and boots
Change-Id: Ibad03659eba5c25e205ba00f27d0b4f98585a84b
2021-07-27 10:50:59 -07:00
Hongguang
e6b51cec20 Allow Tuner AIDL sample HAL. am: 2179e112e1 am: cc12e7bf00
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1760683

Change-Id: I66bb1ec1efe05f6e0725fb25c09984cbc33c7bd7
2021-07-26 22:17:05 +00:00
Hongguang
2179e112e1 Allow Tuner AIDL sample HAL.
Bug: 191825295
Test: tuner HAL can run
Change-Id: I069da68cb4fec535c6549a9a0f89202eb17ef003
2021-07-26 11:35:18 -07:00
Kalesh Singh
21baa7a9cd sepolicy: Serve suspend AIDL hal from system_suspend am: 0e903620a5 am: 599387666b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1772908

Change-Id: I4d55e0a02f283fd1405d406cddf0a967fd5d4528
2021-07-23 21:25:40 +00:00
Kalesh Singh
599387666b sepolicy: Serve suspend AIDL hal from system_suspend am: 0e903620a5
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1772908

Change-Id: If424997bdb78a1b14b78b6ffcaf0d7f3cc2c8380
2021-07-23 20:56:44 +00:00
Kalesh Singh
792d519b56 Merge changes from topic "suspend-aidl-1"
* changes:
  sepolicy: Update wakelock_use macro
  sepolicy: Serve suspend AIDL hal from system_suspend
2021-07-23 17:16:28 +00:00
Kalesh Singh
0e903620a5 sepolicy: Serve suspend AIDL hal from system_suspend
Allow system_suspend to server the suspend AIDL hal service.

Bug: 170260236
Test: Check logcat for supend avc denials
Change-Id: Ie4c07e2e8d75fd4b12e55db15511060e09be59cf
2021-07-20 18:54:55 +00:00
Daniel Norman
072de7b4b2 Merge "Rename vpnprofilestore to legacykeystore in 31.0 mapping files." am: f541acd250 am: ffb2010a0a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1771593

Change-Id: I7699781df4dccce679a8baccdb5e47074e0fb3db
2021-07-20 00:44:25 +00:00
Daniel Norman
f541acd250 Merge "Rename vpnprofilestore to legacykeystore in 31.0 mapping files." 2021-07-20 00:19:37 +00:00
Daniel Norman
31aaac3f18 Rename vpnprofilestore to legacykeystore in 31.0 mapping files.
This service was renamed in
commit 8aaf796f980f21a8acda73180a876095b960fc28
after the mapping files were originally created in
commit 4f20ff73ee.

Bug: 191304621
Test: Merge redfin_vf_s T-based system with S-based vendor.
Change-Id: I3430f13a3438c06c6cb469a35a80390f83b1c0b4
2021-07-19 11:51:14 -07:00
Treehugger Robot
ce3a4de8d8 Merge "Add TARE service to SE policy." am: 9daeadb31e am: ba23828e12
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1766506

Change-Id: I7498a860b4dae6e1f5c4e4b4cd38fe700794558b
2021-07-17 02:03:39 +00:00
Kweku Adams
988d073012 Add TARE service to SE policy.
Bug: 158300259
Test: adb shell dumpsys tare
Change-Id: I30c11631110d6bc4f291357dda639449aa9c39d3
2021-07-14 10:25:14 -07:00
Treehugger Robot
7406fa45c1 Merge "Refactor apex data file types." am: 4fea2f0e16 am: cafed410aa
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1763205

Change-Id: I47fec594b7f8af80f46c15c4502105e9b8836211
2021-07-13 08:48:26 +00:00
Alan Stokes
fa10a14fac Refactor apex data file types.
We ended up with 4 labels for specific APEX files that were all
identical; I've replaced them with a single one
(apex_system_server_data_file).

Additionally I created an attribute to be applied to a "standard" APEX
module data file type that establishes the basics (it can be managed
by vold_prepare_subdirs and apexd), to make it easier to add new such
types - which I'm about to do.

Fix: 189415223
Test: Presubmits
Change-Id: I4406f6680aa8aa0e38afddb2f3ba75f8bfbb8c3c
2021-07-12 14:41:04 +01:00
Bram Bonné
3f36b24504 Merge "untrusted_app_30: add new targetSdk domain" am: c1d9d9a85c am: 86943d839a
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1752122

Change-Id: I243310bb512309a3bf0cb3dc0267cec78e430925
2021-07-08 11:41:10 +00:00
Bram Bonné
ea5460ab6e untrusted_app_30: add new targetSdk domain
Enforce new requirements on app with targetSdkVersion=32 including:
- No RTM_GETNEIGH on netlink route sockets.
- No RTM_GETNEIGHTBL on netlink route sockets.

Bug: 171572148
Test: atest NetworkInterfaceTest
Test: atest bionic-unit-tests-static
Test: atest CtsSelinuxTargetSdkCurrentTestCases
Test: atest CtsSelinuxTargetSdk30TestCases
Test: atest CtsSelinuxTargetSdk29TestCases
Test: atest CtsSelinuxTargetSdk28TestCases
Test: atest CtsSelinuxTargetSdk27TestCases
Test: atest CompatChangesSelinuxTest
Test: atest NetlinkSocketTest
Change-Id: I2167e6cd564854c2656ee06c2202cfff2b727af5
2021-07-05 11:42:31 +02:00
Treehugger Robot
2422d8c87d Merge "allow init to access watermark_boost_factor" am: 6ab599ec46 am: c74f64278b
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1753820

Change-Id: I2f71652ec00855267ac02fc239d9a4af96c5b127
2021-07-04 08:42:17 +00:00
Treehugger Robot
6ab599ec46 Merge "allow init to access watermark_boost_factor" 2021-07-04 08:16:08 +00:00
Martin Liu
4db56b0b52 allow init to access watermark_boost_factor
Bug: 189938926
Test: boot
Signed-off-by: Martin Liu <liumartin@google.com>
Change-Id: I07c8490c94c837952921e95f12efa6213edbf056
2021-07-01 12:24:52 +08:00
Hasini Gunasinghe
4334d35f01 Add keystore permission for metrics re-routing.
Keystore2 atoms need to be rounted to statsd via a proxy.
The proxy needs to have this permission in order to pull metrics from
keystore.

Ignore-AOSP-First: No mergepath to AOSP.
Bug: 188590587
Test: Statsd Testdrive script
Change-Id: Ic94f4bb19a08b6300cfd2d3ed09b31d5b7081bfd
Merged-In: Ic94f4bb19a08b6300cfd2d3ed09b31d5b7081bfd
(cherry picked from commit 61d07e7ce0)
2021-06-30 17:02:14 -07:00
Janis Danisevskis
e1a289b66f Merge "Rename vpnprofilestore to legacykeystore." into sc-dev am: adb49d3df6
Original change: https://googleplex-android-review.googlesource.com/c/platform/system/sepolicy/+/14981212

Change-Id: Ie341418b9491cd93e2af1ebe354f943e8ff85499
2021-06-30 19:57:20 +00:00
Janis Danisevskis
4678660d83 Rename vpnprofilestore to legacykeystore.
Bug: 191373871
Test: N/A
Merged-In: I3f11827909bd37a2127069de82670776a8e192b3
Change-Id: I3f11827909bd37a2127069de82670776a8e192b3
2021-06-30 12:40:39 -07:00
Janis Danisevskis
ab433c765b Rename vpnprofilestore to legacykeystore.
Ignore-AOSP-First: No mergepath from AOSP.
Bug: 191373871
Test: N/A
Change-Id: I3f11827909bd37a2127069de82670776a8e192b3
2021-06-30 09:36:30 -07:00
Hasini Gunasinghe
7611870f49 Merge "Add keystore permission for metrics re-routing." into sc-dev am: 898fc5b39b
Original change: https://googleplex-android-review.googlesource.com/c/platform/system/sepolicy/+/14937250

Change-Id: I881b239515d17f81099ed16d519e1071e80c68ea
2021-06-30 13:32:33 +00:00
Hasini Gunasinghe
898fc5b39b Merge "Add keystore permission for metrics re-routing." into sc-dev 2021-06-30 13:07:22 +00:00
Paul Hobbs
2dec873de0 Revert "untrusted_app_30: add new targetSdk domain" am: f6fc9377ad am: dc26e38e21
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1750189

Change-Id: I1a771e26fca7a9ec98f5434918416eb9dcb3a961
2021-06-30 08:18:40 +00:00
Paul Hobbs
f6fc9377ad Revert "untrusted_app_30: add new targetSdk domain"
Revert "Ignore SELinux denials for all untrusted_app domains"

Revert "Update tests to check RTM_GETNEIGH{TBL} restrictions"

Revert submission 1748045-getneigh-enable-restrictions

Reason for revert: Breaks android.net.netlink.NetlinkSocketTest#testBasicWorkingGetNeighborsQuery with permissions error.

Bug: 192406650

Reverted Changes:
Iea29a1b36:Ignore SELinux denials for all untrusted_app domai...
I14b755020:Update tests to check RTM_GETNEIGH{TBL} restrictio...
I32ebb407b:untrusted_app_30: add new targetSdk domain
I8598662b7:libsepol: trigger new RTM_GETNEIGH{TBL} behavior

Change-Id: I525544191520607fdd238b5ac55aa5132f679253
2021-06-30 07:41:39 +00:00
Bram Bonné
040fa575e0 untrusted_app_30: add new targetSdk domain am: 55badc22c1 am: d9fea8c063
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1728087

Change-Id: I7ff99f17fcf264e071e42dc65e6df5779ac744d4
2021-06-29 19:24:52 +00:00
Bram Bonné
55badc22c1 untrusted_app_30: add new targetSdk domain
Enforce new requirements on app with targetSdkVersion=32 including:
- No RTM_GETNEIGH on netlink route sockets.
- No RTM_GETNEIGHTBL on netlink route sockets.

Bug: 171572148
Test: atest NetworkInterfaceTest
Test: atest bionic-unit-tests-static
Test: atest CtsSelinuxTargetSdkCurrentTestCases

Change-Id: I32ebb407b8dde1c872f53a1bc3c1ec20b9a5cb49
2021-06-29 17:50:22 +02:00
Thierry Strudel
b65cd0a1d6 Merge "Add support for hal_uwb" into sc-dev 2021-06-24 00:45:50 +00:00
Michael Ayoubi
142f375055 Add support for hal_uwb
Bug: 187386527
Test: Boot and confirm HAL is up
Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: Ia866a9a72b6f2ea5b31de25baefd13c2fd0b9c22
Merged-In: Ia866a9a72b6f2ea5b31de25baefd13c2fd0b9c22
2021-06-23 01:25:09 +00:00
Diego Wilson
11d810a7fb Add camera2 extension property policies
These properties allow to vendors to provide their
own camera2 extensions service. The properties
must be accesible to any android app that wishes
to use camera2 extensions.

Bug: 183533362
Change-Id: I94c7ac336b3103355124830320787472f0d2a8b6
Merged-In: I94c7ac336b3103355124830320787472f0d2a8b6
2021-06-21 22:34:29 +00:00
Diego Wilson
0bc6711577 Merge "Add camera2 extension property policies" am: 1c1525198a am: 5df6558de9
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1736939

Change-Id: I216c3230210c7b182ab922475afa24fbe2574fbb
2021-06-19 01:52:38 +00:00
Diego Wilson
5908c353e3 Add camera2 extension property policies
These properties allow to vendors to provide their
own camera2 extensions service. The properties
must be accesible to any android app that wishes
to use camera2 extensions.

Change-Id: I94c7ac336b3103355124830320787472f0d2a8b6
2021-06-18 23:59:41 +00:00
Treehugger Robot
b8c77e90c2 Merge changes from topic "31.0_compat_mapping" am: 111c57970f am: a3d254164c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1736247

Change-Id: Ief404fece0f81b2b838bb069fc2eb61f6ff47a16
2021-06-18 11:41:46 +00:00