Commit graph

1042 commits

Author SHA1 Message Date
Treehugger Robot
2c1750e537 Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" 2022-02-08 00:53:08 +00:00
Will McVicker
5a88ee6af1 genfs_contexts: add paths for unnamed cs40l25a i2c devices
In the 5.10 kernel, the i2c paths are named using an out-of-tree patch
[1]. For kernels that don't support that, let's add the unnamed sysfs
paths as well to the selinux policy.

[1] https://android-review.googlesource.com/c/kernel/common/+/1646148

Bug: 217774013
Change-Id: I3a1f279270d22bf82144ce60a08c215308764be3
2022-02-04 11:54:06 -08:00
Marco Nelissen
7df1fa1574 Allow logd to read the Trusty log
Bug: 190050919
Test: build
Change-Id: I8a42cd90b1581272f4dafc37d6eb29a98e1fa2e3
2022-02-03 10:37:13 -08:00
Treehugger Robot
423a9a467b Merge "Allow storageproxyd to create directories in its data location" 2022-01-26 20:29:27 +00:00
Stephen Crane
45850f812e Allow storageproxyd to create directories in its data location
storageproxyd already has rw_dir_perms for tee_data_file from
vendor/tee.te in platform. We need create_dir_perms to make the
"alternate/" directory for handling DSU correctly.

Test: m dist, flash, and test DSU
Bug: 203719297
Change-Id: Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a
2022-01-25 17:54:22 -08:00
TeYuan Wang
66f1d74123 Move thermal netlink socket sepolicy rules to pixel sepolicy
Bug: 213257759
Test: verified genlink function with emul_temp under enforcing mode
Change-Id: I8f5518e5f866ed0813be1e6630c6a9aefaf06e63
2022-01-25 11:59:06 +08:00
linpeter
85d5a9a60a atc context change
Give atc nodes are changed to dqe0 form.

Bug: 213133646
test: test: check avc denied
Change-Id: Ibbcb7538b7874912f8c7e19a77ae6dd32f097ab0
2022-01-17 16:53:53 +08:00
Treehugger Robot
05ca30173e Merge "Allow TEE storageproxyd permissions needed for DSU handling" 2022-01-12 23:34:32 +00:00
TeYuan Wang
32458cdc49 Label TMU as sysfs_thermal
Bug: 202805103
Test: switch thermal tj property and check thermal threshold
Change-Id: Id113b80f856e26412e2e07b9c9b4a61d519b194f
2022-01-12 10:16:49 +08:00
Yabin Cui
9ee70a3d7f Merge "Add SOC specific ETM sysfs paths" 2022-01-11 19:40:23 +00:00
Jasmine Cha
2abecb1519 audio: add sepolicy for getting thermal event
type=1400 audit(0.0:15): avc: denied { call } for scontext=u:r:hal_audio_default:s0
tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1

type=1400 audit(0.0:16): avc: denied { transfer } for scontext=u:r:hal_audio_default:s0
tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1

Bug: 204271308
Test: build pass

Signed-off-by: Jasmine Cha <chajasmine@google.com>
Change-Id: I900de2a2d8bf0753543ef4428374e782908e7aee
2022-01-11 13:42:58 +08:00
Jasmine Cha
a21b7f8800 audio: add permission to request health/sensor data
- Add audio hal into hal_health clients
- Allow audio hal to find fwk_sensor_hwservice
SELinux : avc:  denied  { find } for interface=android.frameworks.sensorservice::ISensorManager sid=u:r:hal_audio_default:s0 pid=5907 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:fwk_sensor_hwservice:s0 tclass=hwservice_manager permissive=1
SELinux : avc:  denied  { find } for interface=android.hardware.health::IHealth sid=u:r:hal_audio_default:s0 pid=9875 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:hal_health_hwservice:s0 tclass=hwservice_manager permissive=1
audio.service: type=1400 audit(0.0:14): avc: denied { call } for scontext=u:r:hal_audio_default:s0 tcontext=u:r:hal_health_default:s0 tclass=binder permissive=1
audio.service: type=1400 audit(0.0:15): avc: denied { transfer } for scontext=u:r:hal_audio_default:s0 tcontext=u:r:hal_health_default:s0 tclass=binder permissive=1

Bug: 199382564
Bug: 199801586
Test: build pass

Signed-off-by: Jasmine Cha <chajasmine@google.com>
Change-Id: I8e8a512cfbd6be814c98bac75ff6c0e5db028db2
Merged-In: I8e8a512cfbd6be814c98bac75ff6c0e5db028db2
2022-01-11 13:42:55 +08:00
Yabin Cui
1459e9734a Add SOC specific ETM sysfs paths
Bug: 213519191
Test: run profcollectd on oriole
Change-Id: Ib1ae7466c76362b8242f2bb8560bb8b1d80c4253
2022-01-10 11:25:25 -08:00
David Anderson
2fe229352b Fix sepolicy denial in update_engine.
pvmfw is an A/B partition but is not properly labeled and update_engine
gets a denial trying to write to it.

Bug: N/A
Test: m otapackage, apply OTA, check for denials
Change-Id: I55f41a8937384d3bcda5797b5df3f34257f7a114
2021-12-28 21:52:12 -08:00
Matt Buckley
317166636f Allow HWC to get device_config_surface_flinger_native_boot_prop for adpf flags
For the hardware composer and surfaceflinger to coordinate on certain features, it is necessary for the hardware composer to be able to read the surface_flinger_native_boot_prop to know what should be enabled.

Bug: b/195990840
Test: None
Change-Id: Idc1599820026febecda84233d60982e7db7b14b5
2021-12-28 19:08:06 +00:00
Joel Galenson
b287da183e Include core policy OWNERS.
Test: None
Change-Id: I053d84eba7695fe125783b536421d43117b3f16d
2021-12-21 07:27:03 -08:00
Stephen Crane
3f9a11fa0b Allow TEE storageproxyd permissions needed for DSU handling
Allows the vendor TEE access to GSI metadata files (which are publicly
readable). Storageproxyd needs access to this metadata to determine if a
GSI image is currently booted. Also allows the TEE domain to make new
directories in its data path.

Test: access /metadata/gsi/dsu/booted from storageproxyd
Bug: 203719297
Change-Id: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b
2021-12-14 14:33:56 -08:00
Xin Li
0d05632eb8 Merge Android 12 QPR1
Bug: 210511427
Merged-In: Ie31b278a639fd5a9e249ca934d543de770fb3217
Change-Id: I0daddb05e061916c60055b7df00164a76c69ebd2
2021-12-14 08:38:59 -08:00
chenpaul
37d4cfa648 Remove wifi_logger related sepolicy settings
Due to the fact that /vendor/bin/wifi_logger no longer exists
on the P21 master branch any more, we remove obsolete sepolicy.

Bug: 201599426
Test: wlan_logger in Pixel Logger is workable
Change-Id: I22d99c3577f3cceb786e2ffd01c327a67d420202
2021-11-15 02:05:06 +00:00
Xin Li
856fe3d040 Merge sc-qpr1-dev-plus-aosp-without-vendor@7810918
Bug: 205056467
Merged-In: I8f9932ad8885aaefde9548f87c6d2c6cc148cd4c
Change-Id: Ie31b278a639fd5a9e249ca934d543de770fb3217
2021-11-10 08:06:11 +00:00
Jiyong Park
90d1e82ae6 Remove ndk_platform backend. Use the ndk backend.
The ndk_platform backend will soon be deprecated because the ndk backend
can serve the same purpose. This is to eliminate the confusion about
having two variants (ndk and ndk_platform) for the same ndk backend.

Bug: 161456198
Test: m

Merged-In: Icc9af3798ac89742fa56b1cb37d8116d99b4a9c2
Change-Id: Icc9af3798ac89742fa56b1cb37d8116d99b4a9c2
(cherry picked from commit 5cc5d52bd7)
2021-10-26 14:59:28 +09:00
Alfred Lin
7bfec1ad53 [Display] Add SELinux policy for hal_graphics_composer_default am: 24693cd264
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16004355

Change-Id: I8f9932ad8885aaefde9548f87c6d2c6cc148cd4c
2021-10-08 13:29:54 +00:00
Alfred Lin
24693cd264 [Display] Add SELinux policy for hal_graphics_composer_default
Add SELinux policy for hal_graphics_composer_default to find persist_display_file

Bug: 202487234

Test: device boot will not find avc denied log as "avc: denied { search } for name="display" dev="sda1" ino=21 scontext=u:r:hal_graphics_composer_default:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=0"
Change-Id: I8fc386cb18397911404e1f2803601711e40edead
2021-10-08 11:07:40 +00:00
Max Kogan
49a05309af Merge "sepolicy: gs101: allow dumpstate to access AoC stats" into sc-qpr1-dev am: 2a166c0eb5
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15900366

Change-Id: I71ca6648ff0305c5142047c75eeda8e7d41cb2b6
2021-10-04 18:15:19 +00:00
Max Kogan
2a166c0eb5 Merge "sepolicy: gs101: allow dumpstate to access AoC stats" into sc-qpr1-dev 2021-10-04 18:04:01 +00:00
George Lee
6613966d5d Merge "power_hal: add bcl file permission" into sc-qpr1-dev am: 9d3965da4f
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15905927

Change-Id: Ic3e85e9bb8b4ac9139b6c9606edcc3522da818ee
2021-10-04 17:11:49 +00:00
George Lee
9d3965da4f Merge "power_hal: add bcl file permission" into sc-qpr1-dev 2021-10-04 16:54:14 +00:00
Edwin Tung
14719fc742 Merge "gps: add sepolicy to allow gps access pps gpio" into sc-qpr1-dev am: 6c249e4a9f
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15897560

Change-Id: I327b8257a1c929c94a4adc02037488bdb547d642
2021-09-30 14:26:41 +00:00
Edwin Tung
6c249e4a9f Merge "gps: add sepolicy to allow gps access pps gpio" into sc-qpr1-dev 2021-09-30 14:11:49 +00:00
Edwin Tung
4d6a7023e1 gps: add sepolicy to allow gps access pps gpio
Bug: 175086879
Test: no avc deny
Change-Id: I960940d7223c25732021ff4d92ae72255c044291
2021-09-30 12:41:17 +08:00
Jenny Ho
948eeb2de5 sepolicy: add rule for new debug file node am: c8651e514c
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15773285

Change-Id: I459d1f82f9680d87a2533568259cd54c11233d5f
2021-09-27 15:57:26 +00:00
George Lee
2a4bce5b31 power_hal: add bcl file permission
Bug: 201002339
Test: Local test and ensure proper ratio written via PowerHAL
Signed-off-by: George Lee <geolee@google.com>
Change-Id: Ib0a3a5401312403ce870b9c4a4ca971f05c253e4
2021-09-24 16:10:53 +00:00
Max Kogan
b92bc5f51c sepolicy: gs101: allow dumpstate to access AoC stats
Add AoC DRAM votes to bugreports.

Bug: 198203507
Change-Id: I77addf15709fceb70514d552b9fa8553cb129a7c
2021-09-23 17:52:51 -07:00
Jenny Ho
c8651e514c sepolicy: add rule for new debug file node
W dumpstate@1.1-s: type=1400 audit(0.0:7): avc: denied { read } for name="logbuffer_maxfg_monitor" dev="tmpfs" ino=500 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0

Bug: 196755019
Signed-off-by: Jenny Ho <hsiufangho@google.com>
Merged-In: I0ddf68d5e15fe8d77d8d61287f65621c14024f46
Change-Id: I0ddf68d5e15fe8d77d8d61287f65621c14024f46
2021-09-23 23:29:29 +00:00
Roshan Pius
a3f040d2ac gs101-sepolicy: Rename hal_uwb -> hal_uwb_vendor
Since we are now creating an AOSP HAL for uwb. Rename qorvo's internal
HAL to hal_uwb_vendor to avoid conflicts with the AOSP HAL sepolicy
rules.

Bug: 195308730
Test: Compiles
Change-Id: Ief48eacde68b062b2199b20c0c1bb3af23795240
Merged-In: Ief48eacde68b062b2199b20c0c1bb3af23795240
2021-08-26 01:07:43 +00:00
Roshan Pius
4eeb587d95 [automerger skipped] gs101-sepolicy: Rename hal_uwb -> hal_uwb_vendor am: 04fbca104c -s ours
am skip reason: skipped by user rpius

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15675687

Change-Id: I2d51df14c755847d1a270bdb98e9b702e22f8b7f
2021-08-26 01:01:24 +00:00
Victor Liu
5dfabe8acf uwb: permissions for factory uwb calibration file am: 29aa981623
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15616315

Change-Id: Ifa053b14b8fe06af7d076b103657ec7232aa8510
2021-08-25 23:29:46 +00:00
Victor Liu
29aa981623 uwb: permissions for factory uwb calibration file
add permission to:
copy factory uwb calib files from persist to /data/vendor/uwb
convert copied file to proper format for uwb stack to consume

Bug: 195659525
Signed-off-by: Victor Liu <victorliu@google.com>
Change-Id: I3e5282477fd391b483e03242ce0b806bd447dc54
Merged-In: I3e5282477fd391b483e03242ce0b806bd447dc54
2021-08-25 19:14:10 +00:00
Roshan Pius
04fbca104c gs101-sepolicy: Rename hal_uwb -> hal_uwb_vendor
Since we are now creating an AOSP HAL for uwb. Rename qorvo's internal
HAL to hal_uwb_vendor to avoid conflicts with the AOSP HAL sepolicy
rules.

Bug: 195308730
Test: Compiles
Change-Id: Ief48eacde68b062b2199b20c0c1bb3af23795240
Merged-In: Ief48eacde68b062b2199b20c0c1bb3af23795240
2021-08-25 17:32:53 +00:00
TreeHugger Robot
c3521edd8c Merge "Allow boot color propagation" into sc-qpr1-dev am: 9c97417d3a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15600825

Change-Id: Ibef6a94ac176f32b8bb0a87d3eb8283573bbcc74
2021-08-19 23:12:37 +00:00
TreeHugger Robot
9c97417d3a Merge "Allow boot color propagation" into sc-qpr1-dev 2021-08-19 22:52:31 +00:00
davidycchen
945de94222 Allow twoshay to access fwk_stats_service and system_server am: c0922582bc
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15605516

Change-Id: I8a500539a2738d27fa47d2d3f45cfe5e68bfe099
2021-08-19 01:30:20 +00:00
davidycchen
c0922582bc Allow twoshay to access fwk_stats_service and system_server
avc:  denied  { find } for pid=813 uid=0
name=android.frameworks.stats.IStats/default scontext=u:r:twoshay:s0
tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager

avc: denied { call } for scontext=u:r:twoshay:s0
tcontext=u:r:system_server:s0 tclass=binder

Bug: 179334953
Test: Make selinux_policy and push related files to the device.

Signed-off-by: davidycchen <davidycchen@google.com>
Change-Id: Ib95debbc9ce10919c5f935e8f70b340bb293b54a
Merged-In: Ib95debbc9ce10919c5f935e8f70b340bb293b54a
2021-08-18 09:47:01 +08:00
Bart Van Assche
742ff4f98c Add the 'bdev_type' attribute to all block device types am: 37b5741301 am: 79b41e3c3a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15517922

Change-Id: I693db84157721b8ff20ae7bd8da213469352cc75
2021-08-18 01:01:59 +00:00
Bart Van Assche
ea25044059 Add the 'bdev_type' attribute to all block device types am: 37b5741301 am: 239bcceb78
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15517922

Change-Id: I0ca50d490ad5aa49bcc2f1c7db52f5b81a44dcd2
2021-08-18 00:56:43 +00:00
Bart Van Assche
239bcceb78 Add the 'bdev_type' attribute to all block device types am: 37b5741301
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15517922

Change-Id: I19d709e960fe8ccf066bdbd20dc6817ee20e55d0
2021-08-18 00:34:10 +00:00
Bart Van Assche
79b41e3c3a Add the 'bdev_type' attribute to all block device types am: 37b5741301
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15517922

Change-Id: I52ac9161ae22eafecd60a8317370ddc3b243263d
2021-08-18 00:31:25 +00:00
Bart Van Assche
37b5741301 Add the 'bdev_type' attribute to all block device types
The following patch introduces code that iterates over all block
devices:
https://android-review.googlesource.com/c/platform/system/core/+/1783847/9

The following patch grants 'init' and 'apexd' permission to iterate over
all block devices:
https://android-review.googlesource.com/c/platform/system/sepolicy/+/1783947

The above SELinux policy change requires to add the 'bdev_type'
attribute to all block devices. Hence this patch.

Bug: 194450129
Bug: 196982345
Test: Built Android images that include this change and verified that neither init nor apexd triggers any SELinux access denied errors.
Change-Id: I6ce1127f199c5b33812f15fe280d86594d7d7ebf
Signed-off-by: Bart Van Assche <bvanassche@google.com>
2021-08-17 15:23:23 -07:00
Lucas Dupin
6e887cf3a0 Allow boot color propagation
Allows SystemUI to write the boot color sysprop

Test: manual
Bug: 190093578
Change-Id: I844a4dae87fe09a09ff3368c540ffab5f745d455
(cherry picked from commit 8a586e6786)
2021-08-17 21:06:23 +00:00
Edmond Chung
07fbe5b0d8 Merge "gs101: Allow camera HAL to access interrupt handles" into sc-dev am: 7e581b9a7b am: c45a1b5828
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15584607

Change-Id: Ia7663a410cd3ffcbb554dc653c2470e53efa2f4b
2021-08-16 22:32:00 +00:00