Commit graph

2937 commits

Author SHA1 Message Date
Robert Shih
cb04f5981f whitechapel: sepolicy for Widevine AIDL HAL
Bug: 219538389
Test: atest GtsMediaTestCases
Change-Id: I431554dcbef014f8235f048ee062a218a2131f9c
2022-02-20 12:35:22 -08:00
Junkyu Kang
07f17be3f3 [automerger skipped] Add persist.vendor.gps to sepolicy am: 9244051b35 am: a5b052c132 am: 86d20c2552 -s ours
am skip reason: Merged-In I3fdaf564eacec340003eed0b5845a2c08922362c with SHA-1 b9ad182d4a is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1989989

Change-Id: I6f04e1a3b94eda3ddc3ace332aaebaa0da1e9501
2022-02-18 07:37:40 +00:00
Junkyu Kang
86d20c2552 Add persist.vendor.gps to sepolicy am: 9244051b35 am: a5b052c132
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1989989

Change-Id: I0844fbc02141fc6efa77d0cd47d00fd56a15f3e2
2022-02-18 07:12:19 +00:00
Junkyu Kang
a5b052c132 Add persist.vendor.gps to sepolicy am: 9244051b35
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1989989

Change-Id: Ibb1a3b4cca8fa3549eeef548d0939829413e8af1
2022-02-18 06:50:19 +00:00
TreeHugger Robot
d95da03285 Merge "Add hal_usb_impl permission" 2022-02-17 16:42:12 +00:00
Midas Chien
943cb1278a Merge "Allow composer to read panel_idle sysfs node" 2022-02-17 09:17:44 +00:00
Junkyu Kang
9244051b35 Add persist.vendor.gps to sepolicy
Bug: 196002632
Test: PixelLogger can modify persist.vendor.gps.*
Change-Id: I3fdaf564eacec340003eed0b5845a2c08922362c
Merged-In: I3fdaf564eacec340003eed0b5845a2c08922362c
2022-02-17 08:55:49 +00:00
Midas Chien
32307ac30d Allow composer to read panel_idle sysfs node
Change panel_idle selinux type to sysfs_display to allow composer can
read it.

Bug: 198808492
Bug: 219857957
Test: ls -Z to check selinux type
Test: make sure init(write) and composer(read) can access it
Change-Id: I77ae701a73a047b26b4ebb3c9d482c8cb9220999
2022-02-16 16:28:06 +08:00
Junkyu Kang
26e6d6f2b6 Merge "Add persist.vendor.gps to sepolicy" 2022-02-16 08:16:05 +00:00
Ricky Niu
05eb29e217 Add hal_usb_impl permission
Add hal_usb_impl get below permission

allow hal_usb_impl configfs:dir rw_dir_perms;
allow hal_usb_impl configfs:file create_file_perms;

avc denied
02-16 12:05:19.820   788   788 I android.hardwar: type=1400 audit(0.0:4882): avc: denied { search } for name="/" dev="configfs" ino=13419 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=1
02-16 12:05:19.820   788   788 I android.hardwar: type=1400 audit(0.0:4883): avc: denied { write } for name="g1" dev="configfs" ino=38003 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=1
02-16 12:05:19.820   788   788 I android.hardwar: type=1400 audit(0.0:4884): avc: denied { add_name } for name="UDC" scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=1
02-16 12:05:19.820   788   788 I android.hardwar: type=1400 audit(0.0:4885): avc: denied { create } for name="UDC" scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:configfs:s0 tclass=file permissive=1
02-16 12:05:19.820   788   788 I android.hardwar: type=1400 audit(0.0:4886): avc: denied { write } for name="UDC" dev="configfs" ino=106988 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:configfs:s0 tclass=file permissive=1

Bug: 218997592
Signed-off-by: Ricky Niu <rickyniu@google.com>
Change-Id: I854479cef1a0b8ad518814fb9d20558cf52202e7
2022-02-16 14:27:36 +08:00
Xin Li
78a2d63a45 [automerger skipped] Merge sc-v2-dev-plus-aosp-without-vendor@8084891 am: 81caef24ad -s ours am: 14abf01391 -s ours
am skip reason: Merged-In Icecca9f69ee9b57d43aa2864864951bf66c4905f with SHA-1 ca06222472 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16844142

Change-Id: I1d3f3dc99e04d19b61696677a4bf1fd87a168fe4
2022-02-14 18:21:12 +00:00
Xin Li
14abf01391 [automerger skipped] Merge sc-v2-dev-plus-aosp-without-vendor@8084891 am: 81caef24ad -s ours
am skip reason: Merged-In Icecca9f69ee9b57d43aa2864864951bf66c4905f with SHA-1 ca06222472 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16844142

Change-Id: I12d27f867dd598e669aa86e1bec26c3aafbef4a3
2022-02-14 18:03:48 +00:00
Xin Li
81caef24ad Merge sc-v2-dev-plus-aosp-without-vendor@8084891
Bug: 214455710
Merged-In: Icecca9f69ee9b57d43aa2864864951bf66c4905f
Change-Id: Ibf8d551c16f8f941cfc8072a29ef5c57e8bef170
2022-02-11 07:12:06 +00:00
Ankit Goyal
9e7ecb5fae Merge "Rename vulkan library to be platform agnostic" 2022-02-11 00:52:58 +00:00
Jack Wu
dcb05d1377 sepolicy: gs101: fix charger_vendor permission denied
[   27.025458][  T443] type=1400 audit(1644391560.640:11): avc: denied { search } for comm="android.hardwar" name="vendor" dev="tmpfs" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0
[   26.563658][  T447] type=1400 audit(1644397622.588:5): avc: denied { search } for comm="android.hardwar" name="/" dev="sda1" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=0
[   27.198144][  T442] type=1400 audit(1644398156.152:5): avc: denied { search } for comm="android.hardwar" name="battery" dev="sda1" ino=12 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=0
[   27.327035][  T443] type=1400 audit(1644398785.276:5): avc: denied { read } for comm="android.hardwar" name="defender_active_time" dev="sda1" ino=17 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=0
[   27.355009][  T443] type=1400 audit(1644398785.276:6): avc: denied { write } for comm="android.hardwar" name="defender_charger_time" dev="sda1" ino=16 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=0
[   26.771705][  T444] type=1400 audit(1644379988.804:4): avc: denied { read } for comm="android.hardwar" name="specification_version" dev="sysfs" ino=56257 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=0
[   27.898684][  T445] type=1400 audit(1644392754.928:8): avc: denied { read } for comm="android.hardwar" name="thermal_zone6" dev="sysfs" ino=15901 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=lnk_file permissive=0
[   29.180076][  T447] type=1400 audit(1644397625.200:9): avc: denied { write } for comm="android.hardwar" name="mode" dev="sysfs" ino=15915 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
[   27.043845][  T444] type=1400 audit(1644379988.808:9): avc: denied { search } for comm="android.hardwar" name="thermal" dev="tmpfs" ino=899 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:thermal_link_device:s0 tclass=dir permissive=0
[   27.064916][  T444] type=1400 audit(1644379988.808:10): avc: denied { read } for comm="android.hardwar" name="u:object_r:vendor_battery_defender_prop:s0" dev="tmpfs" ino=306 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=file permissive=0
[   27.356266][  T444] type=1107 audit(1644404450.376:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.battery.defender.state pid=457 uid=1000 gid=1000 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=property_service permissive=0'

Bug: 218485039
Test: manually test, no avc: denied
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I091dbbca35fb833e59fdbc234d74b90bfe74014c
2022-02-09 19:16:22 +08:00
TeYuan Wang
2d02b11311 move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba am: aeebc898cb am: 912673f8ce am: 9ad50b3952
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120

Change-Id: I8c46cd1a01c86d453886e246e000d90974cd8806
2022-02-08 12:07:35 +00:00
TeYuan Wang
9ad50b3952 move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba am: aeebc898cb am: 912673f8ce
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120

Change-Id: Iaf7721a2b7a2f4def1a302c71d6f293b371b7661
2022-02-08 11:51:56 +00:00
TeYuan Wang
912673f8ce move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba am: aeebc898cb
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120

Change-Id: Ib49a0a78843456c9b170dd968259e9e1d51e6317
2022-02-08 11:40:52 +00:00
TeYuan Wang
aeebc898cb move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120

Change-Id: Id7692611610e82be8489a0c73e2040d15101e09b
2022-02-08 10:04:37 +00:00
TeYuan Wang
c292dd65ba move vendor_thermal_prop rules to pixel-sepolicy
Bug: 213257759
Test: no denied log after "setprop persist.vendor.disable.thermal.control 1"
Change-Id: Ic150959bc6084034d9afcc70bf446692fbe22d11
2022-02-08 08:10:32 +00:00
Treehugger Robot
91dcb418e2 Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537 am: 02e7ad9fb5 am: d70a957518 am: 674aa657fb
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966

Change-Id: I796f41b8ac07406a747dde6cd77c9878339e2de7
2022-02-08 02:12:46 +00:00
Treehugger Robot
674aa657fb Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537 am: 02e7ad9fb5 am: d70a957518
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966

Change-Id: I109245e668ffa38851ced506270ec6d6d1d29fd1
2022-02-08 01:49:40 +00:00
Treehugger Robot
d70a957518 Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537 am: 02e7ad9fb5
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966

Change-Id: I1da16035bcc4af82e8c671398b76daf7cc8efd28
2022-02-08 01:26:58 +00:00
Treehugger Robot
02e7ad9fb5 Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966

Change-Id: I2807e116f14305f0e829eec6907db6c817f000c3
2022-02-08 01:08:56 +00:00
Treehugger Robot
2c1750e537 Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" 2022-02-08 00:53:08 +00:00
Will McVicker
5a88ee6af1 genfs_contexts: add paths for unnamed cs40l25a i2c devices
In the 5.10 kernel, the i2c paths are named using an out-of-tree patch
[1]. For kernels that don't support that, let's add the unnamed sysfs
paths as well to the selinux policy.

[1] https://android-review.googlesource.com/c/kernel/common/+/1646148

Bug: 217774013
Change-Id: I3a1f279270d22bf82144ce60a08c215308764be3
2022-02-04 11:54:06 -08:00
Marco Nelissen
126a85b4ec Allow logd to read the Trusty log am: 7df1fa1574 am: 983f5f2d96 am: 6072583f8a am: a9004241c2
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381

Change-Id: Ie626aaa3652cb8aa47062f32c38d658d5f1ce251
2022-02-04 02:34:39 +00:00
Marco Nelissen
a9004241c2 Allow logd to read the Trusty log am: 7df1fa1574 am: 983f5f2d96 am: 6072583f8a
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381

Change-Id: I599f4256ea82b4917eceafeced56aef1214de588
2022-02-04 02:15:43 +00:00
Marco Nelissen
6072583f8a Allow logd to read the Trusty log am: 7df1fa1574 am: 983f5f2d96
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381

Change-Id: I3ef810bd7a3ecddf60a0b13f1262abce14a5ece1
2022-02-04 01:59:53 +00:00
Marco Nelissen
983f5f2d96 Allow logd to read the Trusty log am: 7df1fa1574
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381

Change-Id: Ic66382bd03df28287fc3817c6f66a414d69637b3
2022-02-04 01:43:42 +00:00
Marco Nelissen
7df1fa1574 Allow logd to read the Trusty log
Bug: 190050919
Test: build
Change-Id: I8a42cd90b1581272f4dafc37d6eb29a98e1fa2e3
2022-02-03 10:37:13 -08:00
Marco Nelissen
64fe59aba5 Merge "Allow logd to read the Trusty log" 2022-02-01 21:37:54 +00:00
Marco Nelissen
a2d6a19bcd Allow logd to read the Trusty log
Bug: 190050919
Test: build
Change-Id: I8a42cd90b1581272f4dafc37d6eb29a98e1fa2e3
2022-02-01 21:37:36 +00:00
Ankit Goyal
ec2a9fb8fc Rename vulkan library to be platform agnostic
Bug: 174232579
Test: Boots to home
Change-Id: I39d633e79896d7196ca7011dd7e017950248e2d8
2022-01-26 20:36:29 -08:00
Stephen Crane
e48d11c26c [automerged blank] Allow TEE storageproxyd permissions needed for DSU handling 2p: b9beafc9fa
Blank merge reason: Change-Id I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b with SHA-1 3f9a11fa0b is in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16727208

Bug: 203719297
Change-Id: I337cd189a9a8ffa6d58f0e1284e09884f8fb86f5
2022-01-26 22:12:29 +00:00
Stephen Crane
b9beafc9fa Allow TEE storageproxyd permissions needed for DSU handling
Allows the vendor TEE access to GSI metadata files (which are publicly
readable). Storageproxyd needs access to this metadata to determine if a
GSI image is currently booted. Also allows the TEE domain to make new
directories in its data path.

Includes the fixed directory creation permission change from
Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a.

Test: access /metadata/gsi/dsu/booted from storageproxyd
Bug: 203719297
Merged-In: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b
Merged-In: Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a
Change-Id: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b
(cherry picked from commit b69ac35ff0)
2022-01-26 14:00:44 -08:00
Treehugger Robot
2fa102876a Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b am: 0e4789159c am: 26f020fc70 am: 35d7efaf11
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462

Change-Id: I1e789353fb2ce05e05f097ab48b2bb2054887efe
2022-01-26 21:49:48 +00:00
Treehugger Robot
35d7efaf11 Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b am: 0e4789159c am: 26f020fc70
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462

Change-Id: I91b0e8f0033c4736516f9341a5b6166f14f7894f
2022-01-26 21:26:26 +00:00
Treehugger Robot
26f020fc70 Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b am: 0e4789159c
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462

Change-Id: Ie20d1e1d6037a42acba87ab92007657f4f6be83d
2022-01-26 21:07:28 +00:00
Treehugger Robot
0e4789159c Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462

Change-Id: I021cffca681495143a279470e73e194cd5faf635
2022-01-26 20:44:17 +00:00
Treehugger Robot
423a9a467b Merge "Allow storageproxyd to create directories in its data location" 2022-01-26 20:29:27 +00:00
Junkyu Kang
b9ad182d4a Add persist.vendor.gps to sepolicy
Bug: 196002632
Test: PixelLogger can modify persist.vendor.gps.*
Change-Id: I3fdaf564eacec340003eed0b5845a2c08922362c
2022-01-26 08:02:27 +00:00
Stephen Crane
45850f812e Allow storageproxyd to create directories in its data location
storageproxyd already has rw_dir_perms for tee_data_file from
vendor/tee.te in platform. We need create_dir_perms to make the
"alternate/" directory for handling DSU correctly.

Test: m dist, flash, and test DSU
Bug: 203719297
Change-Id: Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a
2022-01-25 17:54:22 -08:00
TeYuan Wang
9afdb48a85 Move thermal netlink socket sepolicy rules to pixel sepolicy am: 66f1d74123 am: 8cb5857dac am: 0fe33df6c0 am: e925f85169
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1958926

Change-Id: I77230680556c9029ca702c6b73c56119221689e8
2022-01-25 12:22:55 +00:00
TeYuan Wang
e925f85169 Move thermal netlink socket sepolicy rules to pixel sepolicy am: 66f1d74123 am: 8cb5857dac am: 0fe33df6c0
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1958926

Change-Id: I86642d387feb6f99939ffb52341e26ba4faef082
2022-01-25 12:05:36 +00:00
TeYuan Wang
0fe33df6c0 Move thermal netlink socket sepolicy rules to pixel sepolicy am: 66f1d74123 am: 8cb5857dac
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1958926

Change-Id: I08f70c5940c8d7f8d40fb97791b762a935ac5dfa
2022-01-25 11:47:21 +00:00
TeYuan Wang
8cb5857dac Move thermal netlink socket sepolicy rules to pixel sepolicy am: 66f1d74123
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1958926

Change-Id: I5b35f6bb9f7a5ff6ab3abaeac370384125c60abf
2022-01-25 10:39:06 +00:00
TeYuan Wang
66f1d74123 Move thermal netlink socket sepolicy rules to pixel sepolicy
Bug: 213257759
Test: verified genlink function with emul_temp under enforcing mode
Change-Id: I8f5518e5f866ed0813be1e6630c6a9aefaf06e63
2022-01-25 11:59:06 +08:00
linpeter
da28bad8c4 atc context change am: 85d5a9a60a am: af647ece2f am: 39363f3e1a am: 7931384a9d
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1951025

Change-Id: I45ea9c111e1a512ca7efc88e22bb06b888f67464
2022-01-24 05:05:59 +00:00
Treehugger Robot
2bb6f148c1 Merge "Allow TEE storageproxyd permissions needed for DSU handling" am: 05ca30173e am: 3cde81c794 am: 5dd5b0dd29 am: b0ecddbd4e
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1923363

Change-Id: Ic0087e6e3aef8a61f2c0b44fd48a8953e66e1868
2022-01-24 05:05:48 +00:00