Commit graph

3468 commits

Author SHA1 Message Date
Hridya Valsaraju
92448c6830 Label debugfs files correctly am: 9e6528da08
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14490412

Change-Id: I2b511b5931ab3175615a99b0d23c15a55e14252c
2021-05-13 07:39:50 +00:00
TreeHugger Robot
3e000a7c04 Merge changes from topic "186500818-set1" into sc-dev am: 775771b811
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14490413

Change-Id: I62c1f964005d368cab7972aa05a3b03dd6cfa031
2021-05-13 07:39:05 +00:00
TreeHugger Robot
775771b811 Merge changes from topic "186500818-set1" into sc-dev
* changes:
  Let debugfs be accessed only for non-user builds
  Label debugfs files correctly
2021-05-13 07:07:13 +00:00
Vineeta Srivastava
5e7734b411 Merge "Add sepolicy for the UDFPS antispoof property" into sc-dev am: 14a07e230a am: 4d42a986f8
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14467424

Change-Id: Ia6d1856f2936d25405cec14da6f6d38f84e77248
2021-05-12 22:43:29 +00:00
TreeHugger Robot
292337148c Merge "Grant vendor_sched sysfs nodes access" into sc-dev am: d4f9ef4303 am: 1fbb91ef97
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14512449

Change-Id: I530ba8b8ffc0c0c49c3f18bcab0eae4726ba77ff
2021-05-12 22:42:35 +00:00
Vineeta Srivastava
a48428ff45 Merge "Add sepolicy for the UDFPS antispoof property" into sc-dev am: 14a07e230a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14467424

Change-Id: I748e49d7b4d5da35007b83c9e8f0795cc2847e02
2021-05-12 22:21:39 +00:00
Vineeta Srivastava
4d42a986f8 Merge "Add sepolicy for the UDFPS antispoof property" into sc-dev am: 14a07e230a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14467424

Change-Id: Ib9a1b9ecff6942671528b782229ea60605437ea5
2021-05-12 22:21:10 +00:00
Vineeta Srivastava
f4d2a0d365 Merge "Add sepolicy for the UDFPS antispoof property" into sc-dev am: 14a07e230a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14467424

Change-Id: Iab230781e0e88d86bcc08deecf0a2deca3c99756
2021-05-12 22:19:10 +00:00
Vineeta Srivastava
14a07e230a Merge "Add sepolicy for the UDFPS antispoof property" into sc-dev 2021-05-12 21:45:44 +00:00
TreeHugger Robot
1fbb91ef97 Merge "Grant vendor_sched sysfs nodes access" into sc-dev am: d4f9ef4303
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14512449

Change-Id: Iedca46d44602399a84822bc636c8b54ed025f045
2021-05-12 18:49:09 +00:00
TreeHugger Robot
7ef1e1ee2a Merge "Grant vendor_sched sysfs nodes access" into sc-dev am: d4f9ef4303
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14512449

Change-Id: I9e281e324c3906eb309a77ad103fbcfc703fd26b
2021-05-12 18:47:24 +00:00
TreeHugger Robot
c232d79fdc Merge "Grant vendor_sched sysfs nodes access" into sc-dev am: d4f9ef4303
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14512449

Change-Id: Id53d3d71b57e49fc30f1079c6544a70f9c26fca5
2021-05-12 18:47:09 +00:00
TreeHugger Robot
d4f9ef4303 Merge "Grant vendor_sched sysfs nodes access" into sc-dev 2021-05-12 18:28:51 +00:00
Grace Chen
4b59c5b98e Add selinux permissions for NFC/eSIM firmware upgrade and recovery
Bug: 181246088
Test: Confirm selinux permissions.
Change-Id: I71c59d1afc50e273b840cd2df7600b4e806c0661
2021-05-12 10:07:55 -07:00
TreeHugger Robot
6432a7bc7a Merge "Add SELinux policy for allowing dumping GSC info" into sc-dev am: 1f594ec562 am: e723f80ba9
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14491675

Change-Id: I08ae3cbad6204c0b25415d1eea95f4a1af30d33c
2021-05-12 10:41:16 +00:00
TreeHugger Robot
8a1ed47bba Merge "correctly label networking gadgets" into sc-dev am: 7fd939fdd7 am: b3ae9a8c03
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14495070

Change-Id: I32c987673a819fea3bd13ecb9527b8fd15552fbf
2021-05-12 10:41:11 +00:00
TreeHugger Robot
e723f80ba9 Merge "Add SELinux policy for allowing dumping GSC info" into sc-dev am: 1f594ec562
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14491675

Change-Id: I2be4e332d0f1b79f9e744203127b48da25cd1554
2021-05-12 10:26:57 +00:00
TreeHugger Robot
5d91d63244 Merge "Add SELinux policy for allowing dumping GSC info" into sc-dev am: 1f594ec562
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14491675

Change-Id: I21e2facab7cb7b83c86d38788343eb8d7304585a
2021-05-12 10:25:05 +00:00
TreeHugger Robot
2264b80f38 Merge "correctly label networking gadgets" into sc-dev am: 7fd939fdd7
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14495070

Change-Id: I21f3ceffcd4e137da42f94c204ada2bae896683f
2021-05-12 10:24:58 +00:00
TreeHugger Robot
70273f60f7 Merge "Add SELinux policy for allowing dumping GSC info" into sc-dev am: 1f594ec562
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14491675

Change-Id: Iac966d1822a7f47a2b700cb424cb1c93286eeb01
2021-05-12 10:23:17 +00:00
TreeHugger Robot
41c6887b56 Merge "correctly label networking gadgets" into sc-dev am: 7fd939fdd7
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14495070

Change-Id: I884720235281e77408a0872697d0ade9ea7d817d
2021-05-12 10:23:11 +00:00
TreeHugger Robot
0c4611ecb0 Merge "bthal: allow bthal to access bluetooth kernel driver logbuffer_btlpm and logbuffer_btuart device node" into sc-dev am: 9b8e2b7ba8 am: e7fe59fb13
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14009545

Change-Id: I428409b43fbac1c0c6d4613b5be5d9e8c60f7e93
2021-05-12 10:02:42 +00:00
TreeHugger Robot
1f594ec562 Merge "Add SELinux policy for allowing dumping GSC info" into sc-dev 2021-05-12 10:02:28 +00:00
TreeHugger Robot
b3ae9a8c03 Merge "correctly label networking gadgets" into sc-dev am: 7fd939fdd7
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14495070

Change-Id: I27d3d5a87b676167ffc00af83099c8547c4e3810
2021-05-12 07:43:07 +00:00
TreeHugger Robot
7fd939fdd7 Merge "correctly label networking gadgets" into sc-dev 2021-05-12 07:38:42 +00:00
TreeHugger Robot
e7fe59fb13 Merge "bthal: allow bthal to access bluetooth kernel driver logbuffer_btlpm and logbuffer_btuart device node" into sc-dev am: 9b8e2b7ba8
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14009545

Change-Id: I2c7c39f279ec96eaa6138859ca3982bc85a21f6b
2021-05-12 07:35:16 +00:00
TreeHugger Robot
96d84253b8 Merge "bthal: allow bthal to access bluetooth kernel driver logbuffer_btlpm and logbuffer_btuart device node" into sc-dev am: 9b8e2b7ba8
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14009545

Change-Id: Ia305e564de5aeac5f395f4bd20b2a793e1377db2
2021-05-12 07:33:40 +00:00
TreeHugger Robot
2ac2a0fa96 Merge "bthal: allow bthal to access bluetooth kernel driver logbuffer_btlpm and logbuffer_btuart device node" into sc-dev am: 9b8e2b7ba8
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14009545

Change-Id: Ic6bc599ae9c6a55d3a9bec762f34a05a1b2f61c1
2021-05-12 07:33:38 +00:00
TreeHugger Robot
9b8e2b7ba8 Merge "bthal: allow bthal to access bluetooth kernel driver logbuffer_btlpm and logbuffer_btuart device node" into sc-dev 2021-05-12 07:06:45 +00:00
TreeHugger Robot
7a4d420378 Merge "com.qorvo.uwb: signed with dedicated key and running as android.uid.uwb uid" into sc-dev am: e2a0158fdf am: 6d2c152bcf
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14506301

Change-Id: Ie31251dcf3d49a4844c13b223452caac39f93681
2021-05-12 07:02:52 +00:00
TreeHugger Robot
6d2c152bcf Merge "com.qorvo.uwb: signed with dedicated key and running as android.uid.uwb uid" into sc-dev am: e2a0158fdf
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14506301

Change-Id: Id1e7ebe45d7abab203646ed038cd74d194fd2014
2021-05-12 06:41:43 +00:00
TreeHugger Robot
3e991c2d81 Merge "com.qorvo.uwb: signed with dedicated key and running as android.uid.uwb uid" into sc-dev am: e2a0158fdf
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14506301

Change-Id: If8d04254549b617266e9c8fc097a80b285a890fe
2021-05-12 06:39:56 +00:00
TreeHugger Robot
48d64f3f99 Merge "com.qorvo.uwb: signed with dedicated key and running as android.uid.uwb uid" into sc-dev am: e2a0158fdf
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14506301

Change-Id: I774b7fad8823b9b5cb30fca010350c1449a4ebc1
2021-05-12 06:39:40 +00:00
TreeHugger Robot
e2a0158fdf Merge "com.qorvo.uwb: signed with dedicated key and running as android.uid.uwb uid" into sc-dev 2021-05-12 06:22:21 +00:00
jonerlin
cb3f59b89e bthal: allow bthal to access bluetooth kernel driver logbuffer_btlpm
and logbuffer_btuart device node

* add sepolicy rules to let bthal can access bluetooth kernel device
  nodes dev/logbuffer_btlpm and dev/logbuffer_tty16 in engineer
  or user debug build

Bug: 177794127
Test: Manually
Change-Id: I5253719df82ca7ef8e64cbd3f2b0ff6d3f088edc
2021-05-12 13:27:40 +08:00
Wei Wang
6883250a44 Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev am: 53ae55618a am: c515c8345d
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14509955

Change-Id: I7f52c6c8fe5f6eac81410f10c4db73f13eaf46dc
2021-05-12 04:49:43 +00:00
Wei Wang
c515c8345d Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev am: 53ae55618a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14509955

Change-Id: I9a79e69ca43827358937aebcab730471715acb4c
2021-05-12 04:28:06 +00:00
Wei Wang
1e378dbfa3 Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev am: 53ae55618a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14509955

Change-Id: Ib6ade70fbfd568b17f9ca1ff49b8dc0c78590bb0
2021-05-12 04:26:57 +00:00
Wei Wang
edf3463646 Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev am: 53ae55618a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14509955

Change-Id: I680bd82ec4b05f197db3f520e0416fa12204d1e2
2021-05-12 04:26:40 +00:00
Thierry Strudel
03f4884884 com.qorvo.uwb: signed with dedicated key and running as android.uid.uwb uid
Test:
05-11 21:05:48.077   786   786 I qorvo.uwb.main: UWB HAL start
05-11 21:05:48.078   412   412 I servicemanager: Found hardware.qorvo.uwb.IUwb/default in device VINTF manifest.
05-11 21:05:50.960  1639  1639 W PackageSettings: Missing permission state for package: com.qorvo.uwbtestapp.system
05-11 21:05:53.530  1639  1639 V StorageManagerService: Package com.qorvo.uwb does not have legacy storage
05-11 21:05:53.548  1639  1639 V StorageManagerService: Package com.qorvo.uwbtestapp.system does not have legacy storage
05-11 21:05:56.571  1639  1902 I am_proc_start: [0,3055,1083,com.qorvo.uwb,added application,com.qorvo.uwb]
05-11 21:05:56.571  1639  1902 I ActivityManager: Start proc 3055:com.qorvo.uwb/1083 for added application com.qorvo.uwb
05-11 21:05:56.653  1639  2264 I am_proc_bound: [0,3055,com.qorvo.uwb]
05-11 21:05:56.709  3055  3055 I TetheringManager: registerTetheringEventCallback:com.qorvo.uwb
05-11 21:05:56.710  3055  3055 V GraphicsEnvironment: ANGLE Developer option for 'com.qorvo.uwb' set to: 'default'
05-11 21:06:05.045  1639  1900 I am_pss  : [3055,1083,com.qorvo.uwb,5719040,4239360,0,88702976,2,0,6]
05-11 21:06:07.233  1639  1981 I am_compact: [3055,com.qorvo.uwb,all,84816,39052,44628,0,-816,0,-816,816,26,0,0,-800,0,1921532,-768]
05-11 21:06:38.442   786   786 I qorvo.Uwb: open
05-11 21:06:38.443   786   786 I qorvo.uwb.McpsUtils: ListHardware
05-11 21:06:38.443   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.443   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.443   786   786 I qorvo.uwb.IeeeUtils: ListDevices
05-11 21:06:38.443   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.443   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.443   786   786 I qorvo.uwb.UwbIface: Load calibration on wpan0, hw index: 0
05-11 21:06:38.445   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.445   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.445   786   786 I qorvo.uwb.UwbIface: Load properties on wpan0, hw index: 0
05-11 21:06:38.446   786   786 I qorvo.Uwb: getIface
05-11 21:06:38.449   786   786 I qorvo.uwb.UwbIface: firaController
05-11 21:06:38.449   786   786 I qorvo.Uwb: listHardwareIndex
05-11 21:06:38.449   786   786 I qorvo.uwb.McpsUtils: ListHardware
05-11 21:06:38.449   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.450   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.450   786   786 I qorvo.Uwb: getIface
05-11 21:06:38.450   786   786 I qorvo.uwb.UwbIface: cccController

Bug: 187766150
Signed-off-by: Thierry Strudel <tstrudel@google.com>
Change-Id: Ie667a666a445e907aa99542f1c52046522b5dd02
2021-05-12 04:07:58 +00:00
Taeju Park
1d0e8106f3 Grant vendor_sched sysfs nodes access
Bug: 182509410
Signed-off-by: Taeju Park <taeju@google.com>
Change-Id: I68bf0c6e4f7b53a871a3393cb317bf6c79ace5e3
2021-05-11 21:03:30 -07:00
Wei Wang
53ae55618a Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev 2021-05-12 03:56:58 +00:00
Wei Wang
73b65a0f8b Revert "Grant vendor_sched sysfs nodes access"
This reverts commit 638778c654.

Reason for revert: b/187884708
Bug: 187884708
Change-Id: I60e80246345ca3e827d7b4749f25e2d5c4dddf9d
2021-05-12 03:56:42 +00:00
TreeHugger Robot
8966b0738f Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev am: 004c299011 am: 223f9da106
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14485438

Change-Id: Id7fa2e92ca7ec7ef0cf92bca58d54bcd3bd3428f
2021-05-12 02:43:53 +00:00
TreeHugger Robot
223f9da106 Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev am: 004c299011
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14485438

Change-Id: Ib9d1708d8e53619827b81850d6e5e97729754825
2021-05-12 02:16:15 +00:00
TreeHugger Robot
0c07533adc Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev am: 004c299011
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14485438

Change-Id: Ia25ada37e66cdb62f56b3e97b6a43d53fee711a8
2021-05-12 02:14:29 +00:00
TreeHugger Robot
a4e1f1a4fb Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev am: 004c299011
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14485438

Change-Id: If42fcd5d12b79c15b9bb69a602a8c36007939a10
2021-05-12 02:14:08 +00:00
Kris Chen
00e1b9a704 Add sepolicy for the UDFPS antispoof property
Fixes the following avc denial:
/system/bin/init: type=1107 audit(0.0:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=fingerprint.disable.fake pid=364 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=0'
android.hardwar: type=1400 audit(0.0:7): avc: denied { read } for name="u:object_r:vendor_fingerprint_fake_prop:s0" dev="tmpfs" ino=307 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:vendor_fingerprint_fake_prop:s0 tclass=file permissive=0

Bug: 187394838
Bug: 187562932
Test: Antispoof is disabled by default.
Test: Use the following adb command to manully turn on antispoof.
      "setprop persist.vendor.fingerprint.disable.fake.override 0"
Change-Id: I90d6ea70d5e0e1a125efb902f1fd61ff4b51baa2
2021-05-12 09:48:48 +08:00
TreeHugger Robot
004c299011 Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev 2021-05-12 01:32:03 +00:00
Hridya Valsaraju
70551d2bc9 Let debugfs be accessed only for non-user builds
Since production devices(with user builds) must not mount debugfs,
provide dumpstate HAL permission to access debugfs only in userdebug/eng
builds.

Also, delete dumpstate domain's access to
vendor_dmabuf_debugfs(/d/dma_buf/bufinfo) since dumpstate now obtains
the same information from /sys/kernel/dmabuf.

Test: build
Bug: 186500818
Change-Id: I17007d495fba6332bbf17dc7d030e5c6e4d5248b
2021-05-11 17:35:20 -07:00