Commit graph

39019 commits

Author SHA1 Message Date
Inseob Kim
bf2a967f1f Fix wrongly hardcoded version
Also removed 10000.0 as there is no 10000.0 in the cil (only 10000_0
exists)

Test: manual
Change-Id: I8c88622e75847388394ba7a0e2e16ceb600ac4f1
2022-10-19 18:31:07 +09:00
Inseob Kim
73172d83ca Remove deprecated distutils dependency
Test: manual
Change-Id: I18747dc6dc47d8e865cadb87dee4a88d1ec32d49
2022-10-19 18:25:23 +09:00
Inseob Kim
0c4a3ed6e9 Remove redundant comments
Because compat/Android.bp will be modified by compat generate script.

Bug: 207344718
Test: N/A
Change-Id: I4e94db4a9aab492d7fd6df97fad7bfe80756260c
2022-10-19 18:22:48 +09:00
Treehugger Robot
4a5c2dee68 Merge "Add policies for new services HDMI and HDMICEC" 2022-10-19 02:58:03 +00:00
Steven Moreland
586703a90c Merge "servicemanager: kernel log perms" 2022-10-18 20:06:41 +00:00
Steven Moreland
5c3f315771 servicemanager: kernel log perms
Bug: 210919187
Fixes: 235390578
Test: boot (logs still only show up sometimes)
Change-Id: I16b9814260103ce550836655d0409d43b8850ea0
2022-10-17 21:30:50 +00:00
Pawan Wagh
59f3e11574 Merge "Revert "Revert "Updating exisiting fuzzers in fuzzer bindings""" 2022-10-17 16:21:46 +00:00
Hunsuk Choi
0c00096874 Merge "Add IRadioIms and IImsMedia context" 2022-10-17 06:13:01 +00:00
Treehugger Robot
184064cd13 Merge "Add selinux policy to register remote access HAL." 2022-10-15 03:13:07 +00:00
Pawan Wagh
fe3d48f3fb Revert "Revert "Updating exisiting fuzzers in fuzzer bindings""
This reverts commit e3245a40df.

Reason for revert: Check for missing dependency is added now. It should fix builds on master-art branch.
Bug: 253648584
Change-Id: I1ecd4521a1038ace711a4abeb0964b764ad5bc94
2022-10-14 18:51:34 +00:00
Pawan Wagh
093c870e67 Merge "sepolicy : check if missing dependencies are allowed" 2022-10-14 18:04:55 +00:00
Rob Seymour
9833c60b35 Merge "Allow service managers access to apex data." 2022-10-14 18:04:46 +00:00
Keir Fraser
5cbe30c386 Allow microdroid_manager to create a ZRAM swap device
Bug: 238284600
Test: Start a VM, confirm swap is available
Change-Id: I5b6050fabd652d9c15584afa0bfdc10b33401dd1
2022-10-13 14:22:15 +00:00
Hunsuk Choi
24abed20f5 Add IRadioIms and IImsMedia context
Bug: 216387835
Test: build & flash
Change-Id: I7eb3a45e1b13ca702e6bab7e152c4b4722ceccdd
(cherry picked from commit 26a4cc08701586459e1042604a204f6485c27d08)
Merged-In: I7eb3a45e1b13ca702e6bab7e152c4b4722ceccdd
2022-10-13 06:17:30 +00:00
Treehugger Robot
c3b7489ee5 Merge "Fix too-broad allows granted to domain" 2022-10-13 05:37:13 +00:00
Inseob Kim
4e141f6241 Fix too-broad allows granted to domain
These are wrongly added to microdroid policy while bring up. The
permissions should be restricted to select domains.

Bug: 248478536
Test: atest MicrodroidTests MicrodroidHostTestCases
Change-Id: I9cd94728e84dfd4d69e1bc8e979d204d9d9afbd1
2022-10-13 13:14:29 +09:00
Pawan Wagh
54eebadb3e sepolicy : check if missing dependencies are allowed
Panic only if missing dependencies are not allowed while checking
fuzzer bindings. This fix should breakages on branches like master-art
where SOONG_ALLOW_MISSING_DEPENDENCIES is set.

Bug: 246590424
Test: m
Change-Id: I0f908f27de5f761495848f461c7d479117f9feda
2022-10-12 22:32:58 +00:00
Shraddha Basantwani
bacf949002 Allow CAS AIDL sample HAL
Bug: 230377377, 227673974
Test: manual
Change-Id: Ied6822d8114404b85dbed56ae4806de1bfb43e54
2022-10-12 19:42:20 +05:30
Sandro Montanari
9a8980aed5 Merge "Add auditallow for system properties access from the sdk sandbox" 2022-10-12 09:27:01 +00:00
Steven Moreland
dda67f95f0 Merge "crosvm: socket getopt" 2022-10-11 23:57:52 +00:00
Akilesh Kailash
9f7ab3c0cf Merge "Supress permissive audit messages post OTA reboot" 2022-10-11 21:04:42 +00:00
Sandro
d0553529bb Add auditallow for system properties access from the sdk sandbox
We want to more closely monitor the system properties that the
sdk_sandbox has access to.

Bug: 210811873
Test: adb logcat | grep "r:sdk_sandbox"
Change-Id: I0d590374e931ca41d5451cd7c2de5b02fee619e9
2022-10-11 15:21:08 +00:00
Seungjae Yoo
3ad46dcaa4 Allow reading some files in /proc by microdroid_manager
Bug: 236253808
Test: N/A
Change-Id: I5e5062335ace5c511aab2216c3745a2c8aa1204e
2022-10-11 10:30:03 +09:00
Steven Moreland
34f6b26719 crosvm: socket getopt
Required in latest merge.

Bug: 250998415
Test: atest MicrodroidTestApp
Change-Id: I2888636bc5ed69c7908862cdb2ff48da37231a51
2022-10-11 01:13:29 +00:00
Akilesh Kailash
1044702704 Supress permissive audit messages post OTA reboot
For post-OTA boot, we run a userspace block device daemon to mount /system.
However if we let the daemon run while loading sepolicy, it would spam permissive audits.
Since sepolicy is still not enforced yet, we can supress these
audit messages.

Bug: 240321741
Test: Full OTA on pixel
Signed-off-by: Akilesh Kailash <akailash@google.com>
Change-Id: I0af484f95b6a1deb41498d67de82afd3c6bb29b6
2022-10-10 21:58:41 +00:00
Treehugger Robot
24b66bcf11 Merge "Fix zipfuse race condition" 2022-10-10 15:51:12 +00:00
Venkatarama Avadhani
38ff3b4115 Add policies for new services HDMI and HDMICEC
Test: atest vts_treble_vintf_framework_test
      atest vts_treble_vintf_vendor_test
Change-Id: Ic2c0525368218e207be236d073a3fe736151c43f
2022-10-10 15:40:42 +05:30
Andrew Scull
3ea9f16acf Merge "Move DICE logic into microdroid_manager" 2022-10-10 09:55:31 +00:00
Nicolas Geoffray
e3245a40df Revert "Updating exisiting fuzzers in fuzzer bindings"
This reverts commit f38fb73371.

Bug: 246590424

Reason for revert: Breaks projects which don't include a full tree (eg master-art)

Change-Id: I2a87bde5e959e9a700f0569d2ccf7894ea3dc7ab
2022-10-09 13:28:05 +00:00
Pawan Wagh
431ef36077 Merge "Updating exisiting fuzzers in fuzzer bindings" 2022-10-07 21:27:19 +00:00
Yu Shan
941ab0a90b Add selinux policy to register remote access HAL.
All remote access HAL needs to register itself to service manager,
so add the policy to system/sepolicy/vendor.

Test: Manually run cf_x86_64_auto, verify remote access HAL is
running.
Bug: 241483300

Change-Id: If8c1162eecfcce4792e6309ba351c498e8117687
2022-10-07 13:29:22 -07:00
Pawan Wagh
f38fb73371 Updating exisiting fuzzers in fuzzer bindings
Bug: 246590424
Test: m
Change-Id: I327a9d86b68b00e64ce0fd87395037c641fb5901
2022-10-07 19:04:17 +00:00
Andrew Scull
6892b3f212 Move DICE logic into microdroid_manager
The DICE service is deleted and microdroid_maanger takes over the DICE
logic.

Bug: 243133253
Test: atest MicrodroidTests
Test: atest ComposHostTestCases
Change-Id: Idc4cb53f46aa0bc1f197c6267b05f6c5678a34ae
2022-10-07 17:53:50 +00:00
Alan Stokes
fb9911a9bb Fix zipfuse race condition
Allow zipfuse to signal to microdroid_manager via property when it is
ready.

Bug: 243513572
Test: atest MicrodroidTests (locally & via acloud)
Change-Id: Ifcf3d0924faa61ce87124a5ac55bd6a2b193cd99
2022-10-07 16:37:37 +01:00
Alice Wang
34c9f94938 Allow the microdroid app to use vm payload service
Bug: 243512047
Test: atest MicrodroidTestApp
Change-Id: I651781a7cf87b3fa31828a1b46d33dc7f381614c
2022-10-07 08:57:58 +00:00
Peiyong Lin
33e03e09b4 Merge "Update SEPolicy for Thermal AIDL" 2022-10-07 04:00:17 +00:00
Keir Fraser
ad58b8d38a Allow virtualizationservice to create and manage socket files in its data folder
...and crosvm to access a listener socket when passed to it by file
descriptor from virtualizationservice.

Bug: 235579465
Test: Start a VM
Change-Id: I7e89cfb4fb8a1ce845eaea64a33dbaad6bff9969
2022-10-05 08:36:15 +00:00
Peiyong Lin
4a5d0f13c4 Update SEPolicy for Thermal AIDL
Bug: b/205762943
Test: build and boot
Change-Id: I301b85dafbf8fbb1c4be388aa0291e22f4717c99
2022-10-05 00:55:20 +00:00
Vikram Gaur
7bc1648f4a Merge "Add SELinux policies for remote_key_provisioning_native namespace." 2022-10-05 00:47:30 +00:00
Pete Bentley
96268c6622 Update sepolicy prebuilts for PRNG seeder changes.
Bug: 243933553
Test: m sepolicy_freeze_test
Change-Id: Idc011c66dfe71aa6c8dfdbc0b0377d2957571b83
2022-10-04 14:29:12 +01:00
Steven Moreland
07c5387324 Merge "hidl2aidl: sepolicy changes for confirmationui aidl" 2022-10-03 19:10:31 +00:00
Florian Mayer
565653a0c4 Merge "[MTE] ignore mtectrl selinux error for device tree." 2022-10-03 16:23:19 +00:00
Florian Mayer
09f14e9c12 [MTE] ignore mtectrl selinux error for device tree.
Bug: 245624194
Test: adb logcat | grep sysfs_dt_firmware_android
Change-Id: Ia51def3dcc27b6d91cc10733b741186b3bd460c5
2022-09-29 22:53:58 +00:00
Vikram Gaur
e1c49f5524 Add SELinux policies for remote_key_provisioning_native namespace.
We need to separate out the feature flags in use by remote key
provisioning daemon (RKPD). For this, I have set up a new namespace
remote_key_provisioning_native. This change adds the SELinux policies to
make sure appropriate permissions are present when accessing the feature
flag for read/write.

Change-Id: I9e73a623f847a058b6236dd0aa370a7f9a9e6da7
Test: TreeHugger
2022-09-29 21:32:58 +00:00
Pawan Wagh
38292f168a Merge "sepolicy: updating error message for fuzzer bindings" 2022-09-29 15:44:13 +00:00
Treehugger Robot
b44cb478d4 Merge "Grant appdomain remove_name permission on user_profile_data_file." 2022-09-29 11:46:41 +00:00
Jiakai Zhang
3c614b2ee1 Grant appdomain remove_name permission on user_profile_data_file.
To prevent race condition on a profile, the app holds a flock when writing the profile, and profman needs to hold a flock to read it. This
is not ideal because either side can get blocked by the flock.

We want to avoid using flock and do it in a move-based way: instead of
mutating the profile in place, the app creates a temp file next to it,
works on the temp file, and replaces the original file after it's done
(or deletes the temp file if it fails).

To achieve that, the app needs the remove_name permission.

Bug: 249522285
Change-Id: I16f27e6a9c5c3a7ab2ab8e24d3ad0a20119e16db
Test: Presubmit
2022-09-29 09:56:30 +00:00
Treehugger Robot
f974811fd7 Merge "Allow dumpstate to exec derive_sdk" 2022-09-28 23:03:35 +00:00
Pawan Wagh
a103fde7ea sepolicy: updating error message for fuzzer bindings
BUG: 249122938
Test: m
Change-Id: I562cc9207f821025180c647d4a07e433abb2cc6c
2022-09-28 19:38:31 +00:00
Andrew Scull
e325a7e554 Merge "Merge logic of DICE HAL and diced in to dice-service" 2022-09-28 18:52:26 +00:00