Presubmit Automerger Backend
03b2c4e33e
[automerge] Add vendor SELinux denial to allowlist 2p: ed2c8d78ae
am: bb9f892d56
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16672552
Change-Id: I991901e8d67be19d479d0cba5852aa7cca3d8301
2022-01-21 06:24:13 +00:00
Presubmit Automerger Backend
bb9f892d56
[automerge] Add vendor SELinux denial to allowlist 2p: ed2c8d78ae
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16672552
Bug: 215640468
Change-Id: Ie94576056af0683b0cb23b51ae8543ef14b2bca7
2022-01-21 03:37:25 +00:00
eddielan
ed2c8d78ae
Add vendor SELinux denial to allowlist
...
Bug: 215640468
Test: Build Pass
Change-Id: I8c2aa5ce4c6cc229837f763c6a20a1c27e1978a6
2022-01-21 03:37:16 +00:00
Stephen Crane
b69ac35ff0
Allow TEE storageproxyd permissions needed for DSU handling
...
Allows the vendor TEE access to GSI metadata files (which are publicly
readable). Storageproxyd needs access to this metadata to determine if a
GSI image is currently booted. Also allows the TEE domain to make new
directories in its data path.
Test: access /metadata/gsi/dsu/booted from storageproxyd
Bug: 203719297
Merged-In: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b
Change-Id: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b
2022-01-18 11:43:16 -08:00
linpeter
85d5a9a60a
atc context change
...
Give atc nodes are changed to dqe0 form.
Bug: 213133646
test: test: check avc denied
Change-Id: Ibbcb7538b7874912f8c7e19a77ae6dd32f097ab0
2022-01-17 16:53:53 +08:00
Treehugger Robot
05ca30173e
Merge "Allow TEE storageproxyd permissions needed for DSU handling"
2022-01-12 23:34:32 +00:00
YiHo Cheng
5254b52656
Merge "thermal: Label tmu register dump sysfs" into sc-v2-dev am: e400db11ba
am: b4024884f1
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16569088
Change-Id: Icf3374f059b914f09e5dd6650a60c7f0a825672d
2022-01-12 23:26:50 +00:00
YiHo Cheng
b4024884f1
Merge "thermal: Label tmu register dump sysfs" into sc-v2-dev am: e400db11ba
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16569088
Change-Id: I3c9929f0ec857786766b892e415d4b58163797be
2022-01-12 23:14:55 +00:00
YiHo Cheng
e400db11ba
Merge "thermal: Label tmu register dump sysfs" into sc-v2-dev
2022-01-12 23:03:42 +00:00
TeYuan Wang
32458cdc49
Label TMU as sysfs_thermal
...
Bug: 202805103
Test: switch thermal tj property and check thermal threshold
Change-Id: Id113b80f856e26412e2e07b9c9b4a61d519b194f
2022-01-12 10:16:49 +08:00
Yabin Cui
9ee70a3d7f
Merge "Add SOC specific ETM sysfs paths"
2022-01-11 19:40:23 +00:00
TreeHugger Robot
1d086e460c
Merge "Allow HWC to get device_config_surface_flinger_native_boot_prop for adpf flags"
2022-01-11 18:59:33 +00:00
Jasmine Cha
2abecb1519
audio: add sepolicy for getting thermal event
...
type=1400 audit(0.0:15): avc: denied { call } for scontext=u:r:hal_audio_default:s0
tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1
type=1400 audit(0.0:16): avc: denied { transfer } for scontext=u:r:hal_audio_default:s0
tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1
Bug: 204271308
Test: build pass
Signed-off-by: Jasmine Cha <chajasmine@google.com>
Change-Id: I900de2a2d8bf0753543ef4428374e782908e7aee
2022-01-11 13:42:58 +08:00
Jasmine Cha
a21b7f8800
audio: add permission to request health/sensor data
...
- Add audio hal into hal_health clients
- Allow audio hal to find fwk_sensor_hwservice
SELinux : avc: denied { find } for interface=android.frameworks.sensorservice::ISensorManager sid=u:r:hal_audio_default:s0 pid=5907 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:fwk_sensor_hwservice:s0 tclass=hwservice_manager permissive=1
SELinux : avc: denied { find } for interface=android.hardware.health::IHealth sid=u:r:hal_audio_default:s0 pid=9875 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:hal_health_hwservice:s0 tclass=hwservice_manager permissive=1
audio.service: type=1400 audit(0.0:14): avc: denied { call } for scontext=u:r:hal_audio_default:s0 tcontext=u:r:hal_health_default:s0 tclass=binder permissive=1
audio.service: type=1400 audit(0.0:15): avc: denied { transfer } for scontext=u:r:hal_audio_default:s0 tcontext=u:r:hal_health_default:s0 tclass=binder permissive=1
Bug: 199382564
Bug: 199801586
Test: build pass
Signed-off-by: Jasmine Cha <chajasmine@google.com>
Change-Id: I8e8a512cfbd6be814c98bac75ff6c0e5db028db2
Merged-In: I8e8a512cfbd6be814c98bac75ff6c0e5db028db2
2022-01-11 13:42:55 +08:00
YiHo Cheng
ca06222472
thermal: Label tmu register dump sysfs
...
Allow dumpstate to access tmu register dump sysfs
[ 1155.422181] type=1400 audit(1641335196.892:8): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_reg_dump_state" dev="sysfs"
ino=68561
scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs:s0
tclass=file permissive=0
[ 1155.423398] type=1400 audit(1641335196.892:9): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_reg_dump_current_temp" dev="sysfs"
ino
=68562 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 1155.443740] type=1400 audit(1641335196.896:10): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_top_reg_dump_rise_thres"
dev="sysfs"
ino=68563 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 1155.466064] type=1400 audit(1641335196.896:11): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_top_reg_dump_fall_thres"
dev="sysfs"
ino=68565 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 1155.488251] type=1400 audit(1641335196.916:12): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_sub_reg_dump_rise_thres"
dev="sysfs" ino=68564 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 1155.510614] type=1400 audit(1641335196.960:13): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_sub_reg_dump_fall_thres"
dev="sysfs"
ino=68566 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
o
Bug: 202736838
Test: check thermal section in dumpstate
Change-Id: Icecca9f69ee9b57d43aa2864864951bf66c4905f
2022-01-11 08:42:45 +08:00
Yabin Cui
1459e9734a
Add SOC specific ETM sysfs paths
...
Bug: 213519191
Test: run profcollectd on oriole
Change-Id: Ib1ae7466c76362b8242f2bb8560bb8b1d80c4253
2022-01-10 11:25:25 -08:00
Vinay Kalia
72ac373dfd
[automerger skipped] [DO NOT MERGE] Allow media codec to access power HAL am: 8337626f4a
am: 97addf8500
-s ours
...
am skip reason: subject contains skip directive
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16483773
Change-Id: Ife2d22606bc4da9a4f94fa65ae0d36a86b4c2ed2
2022-01-10 06:32:26 +00:00
Vinay Kalia
97addf8500
[DO NOT MERGE] Allow media codec to access power HAL am: 8337626f4a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16483773
Change-Id: I4ce0bb633c8d27e798c7a8e80e1d23eb06b3a2a0
2022-01-10 06:13:59 +00:00
Matt Buckley
c876449a7b
Allow HWC to get device_config_surface_flinger_native_boot_prop for adpf flags
...
For the hardware composer and surfaceflinger to coordinate on certain features, it is necessary for the hardware composer to be able to read the surface_flinger_native_boot_prop to know what should be enabled.
Bug: b/195990840
Test: None
Change-Id: I41e1aa0f80c1138cf46f4f139253158b005a8634
2022-01-08 00:00:58 +00:00
Joel Galenson
cbb76860dd
Merge "Include core policy OWNERS."
2022-01-07 14:17:21 +00:00
Yifan Hong
ca7275beee
Merge "Implement health AIDL HAL."
2022-01-06 23:01:32 +00:00
Vinay Kalia
8337626f4a
[DO NOT MERGE] Allow media codec to access power HAL
...
This commit fixes the following denials:
W /vendor/bin/hw/google.hardware.media.c2@1.0-service: type=1400 audit(0.0:276): avc: denied
{ call } for comm=436F646563322E30204C6F6F706572 scontext=u:r:mediacodec:s0
tcontext=u:r:servicemanager:s0 tclass=binder permissive=0
bug: 206687836
Test: Secure HFR AV1 video playback with resolution change.
Signed-off-by: Vinay Kalia <vinaykalia@google.com>
Change-Id: I79c20bda87af6066ae667a5176747378718a3a62
2022-01-06 20:18:34 +00:00
Joel Galenson
b0880417ff
Include core policy OWNERS.
...
Test: None
Change-Id: I053d84eba7695fe125783b536421d43117b3f16d
(cherry picked from commit b287da183e
)
2022-01-06 10:17:14 -08:00
Yifan Hong
5521fb530c
Implement health AIDL HAL.
...
Test: VTS
Test: manual charger mode
Test: recovery
Bug: 213273090
Change-Id: Iabaf31644f4406092a881841fb4084499fb4de89
2022-01-05 23:08:07 -08:00
David Anderson
2fe229352b
Fix sepolicy denial in update_engine.
...
pvmfw is an A/B partition but is not properly labeled and update_engine
gets a denial trying to write to it.
Bug: N/A
Test: m otapackage, apply OTA, check for denials
Change-Id: I55f41a8937384d3bcda5797b5df3f34257f7a114
2021-12-28 21:52:12 -08:00
Matt Buckley
317166636f
Allow HWC to get device_config_surface_flinger_native_boot_prop for adpf flags
...
For the hardware composer and surfaceflinger to coordinate on certain features, it is necessary for the hardware composer to be able to read the surface_flinger_native_boot_prop to know what should be enabled.
Bug: b/195990840
Test: None
Change-Id: Idc1599820026febecda84233d60982e7db7b14b5
2021-12-28 19:08:06 +00:00
Joel Galenson
b287da183e
Include core policy OWNERS.
...
Test: None
Change-Id: I053d84eba7695fe125783b536421d43117b3f16d
2021-12-21 07:27:03 -08:00
Cyan Hsieh
6e1c9d88cd
Merge "Add pvmfw to custom_ab_block_device"
2021-12-20 03:22:22 +00:00
Cyan_Hsieh
0b5b4a9692
Add pvmfw to custom_ab_block_device
...
Bug: 211070100
Change-Id: Icd8f6d1837b8124bd8cd7b3d59d43b755455bae6
2021-12-20 10:10:46 +08:00
TreeHugger Robot
899faa57e4
Merge "Allow vendor init to read gesture_prop."
2021-12-15 09:01:23 +00:00
Stephen Crane
3f9a11fa0b
Allow TEE storageproxyd permissions needed for DSU handling
...
Allows the vendor TEE access to GSI metadata files (which are publicly
readable). Storageproxyd needs access to this metadata to determine if a
GSI image is currently booted. Also allows the TEE domain to make new
directories in its data path.
Test: access /metadata/gsi/dsu/booted from storageproxyd
Bug: 203719297
Change-Id: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b
2021-12-14 14:33:56 -08:00
Xin Li
0d05632eb8
Merge Android 12 QPR1
...
Bug: 210511427
Merged-In: Ie31b278a639fd5a9e249ca934d543de770fb3217
Change-Id: I0daddb05e061916c60055b7df00164a76c69ebd2
2021-12-14 08:38:59 -08:00
Super Liu
8f356044ff
Allow vendor init to read gesture_prop.
...
Bug: 209713977
Bug: 193467627
Test: local test.
Signed-off-by: Super Liu <supercjliu@google.com>
Change-Id: I7f061f550bcf6c3a61b5528e8c21eae8567e677b
2021-12-13 09:28:02 +08:00
Cliff Wu
11c8ad745a
Update the sepolicy for exo_camera_injection v1.1
...
- Update exo_camera_injection hal service from 1.0 to 1.1.
- Selinux avc log:
avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs"
ino=152 scontext=u:r:hal_camera_default:s0
tcontext=u:object_r:default_prop:s0 tclass=file permissive=0.
Bug: 202092371
Test: Verified exo_camera_injection provider service use cases function
as expected; no denials.
Change-Id: Ica94a00db580356158d94af2ae6dbe9c9a81be0a
2021-12-11 05:26:06 +00:00
Chris Kuiper
178337b449
selinux: Allow sensor HAL to access the display service HAL am: 734d79bdaf
am: 3ce470c235
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16376281
Change-Id: Ic98462405b50b5ae86477d799d0497e00f41c450
2021-12-10 18:08:12 +00:00
Chris Kuiper
3ce470c235
selinux: Allow sensor HAL to access the display service HAL am: 734d79bdaf
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16376281
Change-Id: Ib3f0609b74dbb05a7e4936fa2055a1e050777b3e
2021-12-10 17:44:16 +00:00
Chris Kuiper
734d79bdaf
selinux: Allow sensor HAL to access the display service HAL
...
Add necessary permissions.
Bug: b/204471211
Test: Testing with corresponding sensor HAL changes and sensor_test commands.
Change-Id: I01774210693ceb4a6d0d4dee4fb5e905117774d3
2021-12-10 11:00:07 +08:00
TreeHugger Robot
8e9e3a4375
[automerger skipped] Merge "Label min_vrefresh and idle_delay_ms as sysfs_display" into sc-v2-dev am: f7db23e139
-s ours am: 65a718976e
-s ours
...
am skip reason: Merged-In I29243751ab5f38eca5d8e4221122764f79c75e04 with SHA-1 8d4e8a65d6
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16302392
Change-Id: I840471543fece99908a58003235b0ab8ad3f4f43
2021-12-08 02:12:07 +00:00
TreeHugger Robot
65a718976e
[automerger skipped] Merge "Label min_vrefresh and idle_delay_ms as sysfs_display" into sc-v2-dev am: f7db23e139
-s ours
...
am skip reason: Merged-In I29243751ab5f38eca5d8e4221122764f79c75e04 with SHA-1 8d4e8a65d6
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16302392
Change-Id: Ib87c387438c8ada00867ef1422dfa6bc2c4c6df9
2021-12-08 01:57:41 +00:00
TreeHugger Robot
f7db23e139
Merge "Label min_vrefresh and idle_delay_ms as sysfs_display" into sc-v2-dev
2021-12-08 01:40:06 +00:00
joenchen
85626ab654
[automerger skipped] Label min_vrefresh and idle_delay_ms as sysfs_display am: 8d4e8a65d6
-s ours
...
am skip reason: Merged-In I29243751ab5f38eca5d8e4221122764f79c75e04 with SHA-1 02a20e025f
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16406482
Change-Id: I1bff1b6dfa65252c54755f0453f2e90955a4051e
2021-12-07 19:25:59 +00:00
joenchen
8d4e8a65d6
Label min_vrefresh and idle_delay_ms as sysfs_display
...
Bug: 202567084
Test: Check the files label by "adb shell ls -Z"
Change-Id: I29243751ab5f38eca5d8e4221122764f79c75e04
Merged-In: I29243751ab5f38eca5d8e4221122764f79c75e04
2021-12-07 03:42:52 +00:00
joenchen
bef2d7397c
Label min_vrefresh and idle_delay_ms as sysfs_display
...
Bug: 202567084
Test: Check the files label by "adb shell ls -Z"
Change-Id: I29243751ab5f38eca5d8e4221122764f79c75e04
Merged-In: I29243751ab5f38eca5d8e4221122764f79c75e04
2021-12-06 02:45:51 +00:00
joenchen
02a20e025f
Label min_vrefresh and idle_delay_ms as sysfs_display
...
Bug: 202567084
Test: Check the files label by "adb shell ls -Z"
Change-Id: I29243751ab5f38eca5d8e4221122764f79c75e04
2021-12-04 17:18:46 +00:00
Albert Wang
2caa560163
Allow suspend_control to access xHCI wakeup node am: a506ed1e06
am: 43bde53275
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16370946
Change-Id: I6b86ed75839021c860f8f556f25caedd4443fc84
2021-12-02 02:29:37 +00:00
Albert Wang
43bde53275
Allow suspend_control to access xHCI wakeup node am: a506ed1e06
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16370946
Change-Id: I17198ed93403abe1b6526b385218847616b52c5b
2021-12-02 01:53:59 +00:00
Albert Wang
a506ed1e06
Allow suspend_control to access xHCI wakeup node
...
This is a WORKAROUND to avoid the xHCI wakeup node permission problem,
since system will automatically allocated device ID.
Bug: 205138535
Test: n/a
Signed-off-by: Albert Wang <albertccwang@google.com>
Change-Id: Ia2ca04618f950bdded4aea76c897579eb4b92daf
2021-12-01 23:45:19 +08:00
Rick Yiu
10bd8547d7
Merge "gs101-sepolicy: Fix avc denials"
2021-11-26 10:40:43 +00:00
Rick Yiu
4075287498
gs101-sepolicy: Fix avc denials
...
Fix below and other potential denials
11-21 10:10:43.984 3417 3417 I auditd : type=1400 audit(0.0:4): avc: denied { write } for comm=4173796E635461736B202332 path="/sys/kernel/vendor_sched/set_task_group_fg" dev="sysfs" ino=44511 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs_vendor_sched:s0 tclass=file permissive=0 app=com.google.android.pixel.setupwizard
11-21 10:10:44.840 3976 3976 I auditd : type=1400 audit(0.0:10): avc: denied { write } for comm="StallDetector-1" path="/sys/kernel/vendor_sched/set_task_group_fg" dev="sysfs" ino=44511 scontext=u:r:untrusted_app_30:s0:c170,c256,c512,c768 tcontext=u:object_r:sysfs_vendor_sched:s0 tclass=file permissive=0 app=com.google.android.inputmethod.latin
11-21 18:10:51.280 5595 5595 I auditd : type=1400 audit(0.0:102): avc: denied { write } for comm="SharedPreferenc" path="/sys/kernel/vendor_sched/set_task_group_fg" dev="sysfs" ino=44511 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:sysfs_vendor_sched:s0 tclass=file permissive=0 app=com.google.android.gms
Bug: 206970384
Test: make selinux_policy pass
Change-Id: I7c981ef0516dc5be93ec825768de57c15786b4bd
2021-11-25 14:26:35 +00:00
TreeHugger Robot
27e7eeb875
Merge "aoc: add audio property for audio aocdump feature"
2021-11-25 07:05:25 +00:00