Adam Shih
8b326703e1
modularize dmd
...
Bug: 190331463
Test: build ROM and make sure dmd is launched
Change-Id: If1e51b6bc100e870a15a40f5e0d93a75fe68bac3
2021-06-24 14:17:29 +08:00
Alex Hong
d912300853
Merge "Move the type definition of properties from product to vendor" into sc-dev
2021-06-24 02:15:36 +00:00
Alex Hong
e44e432672
Move the type definition of properties from product to vendor
...
These properties cannot be resolved after product sepolicy is replaced.
vendor_persist_config_default_prop
vendor_rild_prop
Test: The device can boot to home after replacing with GSI
Bug: 191236468
Change-Id: Ib797601a44306987e5a85897c7b6cd7827ad91b2
2021-06-24 02:01:20 +00:00
Minchan Kim
650cf48406
Merge "sepolicy: gs101: allow dump cma statistics" into sc-dev
2021-06-24 01:45:11 +00:00
Thierry Strudel
e99c749cbd
Merge "Add support for non-su hal_uwb" into sc-dev
2021-06-24 00:45:49 +00:00
Minchan Kim
7f9abeee45
sepolicy: gs101: allow dump cma statistics
...
Provide necessary sepolicy for bugreport dump to access cma metric
information under /sys/kernel/pixel_stat/*
Test: Run "adb bugreport <zip>" and verify it contains the output
from dumpstate_board.txt
Bug: 191904985
Signed-off-by: Minchan Kim <minchan@google.com>
Change-Id: Iaa92006eeb5158a0962652427d1af061fe1cf03d
2021-06-23 14:15:46 -07:00
TreeHugger Robot
c431abb5bf
Merge "Allow fingerprint hal to read sysfs_chosen" into sc-dev
2021-06-23 11:20:51 +00:00
Sungwoo choi
5aaa0f6044
gs101-sepolicy: add oemrilservice_app.te
...
Seperate oemrilservice_app.te from vendor_telephony_app.te.
- target process: com.samsung.slsi.telephony.oemril
- selabel: oemrilservice_app
- allow to find app_api_service
- allow to find radio_service
- allow to find vendor HAL
- a binder communication with rild
Bug: 191830874
Test: Manual
Signed-off-by: Sungwoo choi <sungwoo48.choi@samsung.com>
Change-Id: I5e31b4a16f0b4d25bf4889da0150084937354808
2021-06-23 16:51:57 +08:00
Kris Chen
a23d1bb37b
Allow fingerprint hal to read sysfs_chosen
...
Fixes the following avc denial:
android.hardwar: type=1400 audit(0.0:49): avc: denied { search } for name="chosen" dev="sysfs" ino=9575 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_chosen:s0 tclass=dir permissive=1
android.hardwar: type=1400 audit(0.0:50): avc: denied { read } for name="platform" dev="sysfs" ino=9591 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_chosen:s0 tclass=file permissive=1
android.hardwar: type=1400 audit(0.0:51): avc: denied { open } for path="/sys/firmware/devicetree/base/chosen/plat/platform" dev="sysfs" ino=9591 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_chosen:s0 tclass=file permissive=1
Bug: 191832617
Test: Enroll and authenticate fingerprints.
Change-Id: I5c576cc210d9e85b1999655bdc27736183db8aed
2021-06-23 16:20:57 +08:00
Denny cy Lee
433aeb2d4d
Sepolicy: Pixel stats wireless charger sepolicy
...
Bug: 171853251
Bug: 188601686
Test: manually, do wirelees charge, check logcat
Change-Id: I4cbd7da038365ae92e34780131056da61b9a55dc
Signed-off-by: Denny cy Lee <dennycylee@google.com>
2021-06-23 06:48:42 +00:00
Denny cy Lee
0b21a2d44a
Pixelstat: battery history access premission
...
Test: manually, relate seploicy not show; battery history log printed
05-24 13:29:19.637 2829 2829 D pixelstats_BatteryEEPROM:
checkAndReport: 0940 0a80 0500 0200 0200 0000
Bug: 189050725
Change-Id: I20567e168db43fe2168a9a30ac7a4b0cec65a665
Signed-off-by: Denny cy Lee <dennycylee@google.com>
2021-06-23 13:50:32 +08:00
Adam Shih
a70819d2f0
modularize pktrouter
...
Bug: 190331212
Test: make sure pktrouter gets initialized
06-23 13:21:19.372 1 1 I init : Parsing file /vendor/etc/init/pktrouter.rc...
06-23 13:21:23.510 1 1 I init : processing action (vendor.pktrouter=1) from (/vendor/etc/init/pktrouter.rc:7)
06-23 13:21:23.510 1 1 I init : starting service 'pktrouter'...
Change-Id: Icc7ab88505aea47cfed5ffc5182d0625b7a7609d
2021-06-23 05:24:01 +00:00
SalmaxChang
a926055749
vendor_init/dumpstate: Grant to access logger prop
...
Bug: 176176656
Change-Id: I551ccfac57d983aab95aa23e1f350f78ee0a159f
2021-06-23 10:06:09 +08:00
Michael Ayoubi
cebbf14174
Add support for non-su hal_uwb
...
Bug: 187386527
Test: Boot and confirm HAL is up
Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: Ia9f3f90fba6981762fe375aa37c81f8474ad9c53
2021-06-23 01:26:25 +00:00
Adam Shih
d74e989739
modulize init.radio.sh
...
Bug: 190331600
Test: build ROM and make sure the file is there and functional.
Change-Id: Icb3e0e590ae315d53eb5251fd5e74d6aacab1fe2
2021-06-23 01:07:26 +00:00
TreeHugger Robot
e2ef28efca
Merge "Allow camera hal to access devfreq query" into sc-dev
2021-06-22 12:06:16 +00:00
Speth Chang
419019a71a
Allow camera hal to access devfreq query
...
Bug: 190687351
Test: p21 checklist
Change-Id: Id0cb74b483882a6ede93cadc475a7be334ecf20d
2021-06-22 10:19:49 +00:00
Alex Hong
1f17829dc2
Merge "Move the genfs_contexts of sched nodes from vendor to product" into sc-dev
2021-06-22 03:01:07 +00:00
Alex Hong
c598db170c
Move the genfs_contexts of sched nodes from vendor to product
...
For sched nodes, "proc_vendor_sched" and "sysfs_vendor_sched",
their type definition is in product sepolicy,
while genfs_contexts is in vendor sepolicy.
In this case, genfs_contexts cannot be resolved after product sepolicy
is replaced by Dynamic System Update.
Need to keep the type definition and genfs_contexts in the same partition.
Now move genfs_contexts because the type definition has to be in product for now
since other private domains are accessing these sched nodes.
Test: $ make selinux_policy
The device can boot to home after replacing with GSI.
Bug: 191236468
Change-Id: I02ea78b04dfcade4ceb426ff6ebf498daa81ac32
2021-06-21 14:55:08 +00:00
Srinivas Patibandla
51c891fa7b
Update time sync seinfo to not use platform signature
...
Bug: b/190695230
Change-Id: I2dbee2e624c8794b3aa9ff85d8985a15ee159a0f
2021-06-21 14:47:28 +00:00
Thiebaud Weksteen
c4d98b5c11
Merge "Fix access permissions for sysfs_aoc_reset" into sc-dev
2021-06-21 08:38:37 +00:00
Jack Wu
2794370557
sepolicy: gs101: allows pixelstat to access wlc file nodes
...
05-31 11:14:57.280 1000 3126 3126 W pixelstats-vend: type=1400 audit(0.0:162): avc: denied { search } for name="i2c-p9412" dev="sysfs" ino=60862 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=0
05-31 11:14:57.280 1000 3126 3126 W pixelstats-vend: type=1400 audit(0.0:163): avc: denied { search } for name="i2c-p9412" dev="sysfs" ino=60862 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=0
05-31 13:12:23.940 1000 2838 2838 W pixelstats-vend: type=1400 audit(0.0:182): avc: denied { read } for name="charge_stats" dev="sysfs" ino=73276 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
05-31 15:02:02.215 1000 13169 13169 W pixelstats-vend: type=1400 audit(0.0:166): avc: denied { write } for name="charge_stats" dev="sysfs" ino=73483 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
05-31 15:02:02.215 1000 13169 13169 W pixelstats-vend: type=1400 audit(0.0:167): avc: denied { write } for name="charge_stats" dev="sysfs" ino=73483 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
Bug: 176195960
Test: manually test, no avc: denied
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I0af03dd8099e246c5f94e8e8530d7b2bcf50ff95
2021-06-18 13:50:59 +00:00
Franklin He
6a488b8a81
Merge "Add new sepolicy to allow Power Hint" into sc-dev
2021-06-18 08:37:19 +00:00
Krzysztof Kosiński
c18265aaaa
Merge changes I18cbcf1b,I28a27741 into sc-dev
...
* changes:
Allow camera HAL to set vendor.camera properties
Allow rlsservice/camera HAL to read /apex/apex-info-list.xml
2021-06-18 07:46:33 +00:00
Thiébaud Weksteen
7e232446dc
Fix access permissions for sysfs_aoc_reset
...
avc: denied { getattr } for comm="UsfHalWorker" path="/sys/devices/platform/19000000.aoc/reset" dev="sysfs" ino=69873 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs_aoc_reset:s0 tclass=file permissive=0
Bug: 190712449
Bug: 191415949
Change-Id: Ibad4e75aa60b06129221086031289c855c561e96
2021-06-18 08:56:59 +02:00
Yuriy Romanenko
6bf4661e8f
Allow camera HAL to set vendor.camera properties
...
Bug: 188246923
Test: See topic
Change-Id: I18cbcf1b622ad7cd6d6bd1ea258b3d537db54412
2021-06-17 21:58:54 -07:00
Adam Shih
d77bc5a970
organize confirmationui settings
...
Bug: 190331547
Bug: 190331370
Test: build ROM and make sure file and sepolicy is still there
Change-Id: I4cabf9280ab5e21038bcb72615799b7ed0fb1670
2021-06-18 12:56:05 +08:00
Badhri Jagan Sridharan
d9876fd266
Merge "Add file context for /dev/logbuffer_tcpm" into sc-dev
2021-06-18 03:38:35 +00:00
Badhri Jagan Sridharan
eb3881dbe7
Add file context for /dev/logbuffer_tcpm
...
/dev/logbuffer_tcpm gets accessed by dumpstate while bugreport
generation.
Bug: 189792358
Signed-off-by: Badhri Jagan Sridharan <badhri@google.com>
Change-Id: Ica0f3557ad9c41844f8411b0bdf68d66fbba00e5
2021-06-17 16:11:28 -07:00
Craig Dooley
7fe9d053e8
Merge "Allow hal_dumpstate to collect AoC statistics" into sc-dev
2021-06-17 16:32:38 +00:00
Franklin He
c53c03b843
Add new sepolicy to allow Power Hint
...
SELinux policy changes to work with https://googleplex-android-review.git.corp.google.com/c/device/google/gs101/+/14997393
This allows the NNAPI HAL to make IPC calls to the Power HAL in order to request power hints
Bug: 191241561
Test: Pushed new SEPolicy to device, verified no AVC problems when making IPC calls
Change-Id: I8209b3677bedf908901389c07304f4478d0431b0
2021-06-17 07:59:11 +00:00
Yuriy Romanenko
14786d9b40
Allow rlsservice/camera HAL to read /apex/apex-info-list.xml
...
To detect apex updates
Bug: 188246923
Test: See topic
Change-Id: I28a27741c1c285f8b49a2aa50bc0665143c1b7cb
2021-06-16 20:55:38 -07:00
TreeHugger Robot
502b653380
Merge "vendor_telephony_app.te: add selinuxfs:file" into sc-dev
2021-06-17 01:14:20 +00:00
Yu-Chi Cheng
643e5a7123
Allowed EdgeTPU compilation services (tflite and nnapi) to access
...
overcommit_memory info.
This is required as part of the compilation process, likely part of
the jemalloc which was added recently.
Bug: 190790251
Test: verified on local P21 device.
Change-Id: I4d90ea92afd7beaa4c4efa6ed509d703764932a1
2021-06-16 16:17:14 -07:00
Craig Dooley
3031b077a3
Allow hal_dumpstate to collect AoC statistics
...
Bug: 188114650
Signed-off-by: Craig Dooley <dooleyc@google.com>
Change-Id: Iba5525af2c651070b9a5f7769c0439ef320d666b
2021-06-16 17:18:55 +00:00
TreeHugger Robot
11ebd6122e
Merge "Add sepolicy for hwcomposer to access lhbm sysfs" into sc-dev
2021-06-16 13:51:37 +00:00
Adam Shih
2cdde93f15
Merge "remove vcd from user ROM" into sc-dev
2021-06-16 06:40:28 +00:00
TreeHugger Robot
6550281b13
Merge "Use label persist_ss_file" into sc-dev
2021-06-16 05:45:04 +00:00
SHUCHI LILU
5624d07640
Merge "Update avc error on ROM 7457955" into sc-dev
2021-06-16 01:25:10 +00:00
Wenhao Wang
dc0cdc36f3
Use label persist_ss_file
...
The label "persist_ss_file" was created for "/mnt/vendor/persist/ss(/.*)?".
But we erroneously didn't assign the label to the path.
This patch fixes the error.
Bug: 173971240
Bug: 173032298
Test: Trusty storage tests
Change-Id: I8e891ebd90ae47ab8a4aad1c2b0a3bbb734174d8
2021-06-15 17:24:01 -07:00
sukiliu
673b8f1014
Update avc error on ROM 7457955
...
Bug: 191132545
Bug: 191133059
Test: PtsSELinuxTestCases
Change-Id: I6a8e7924819734e38c2b6f761eb738f3e4d21c32
2021-06-15 23:23:43 +08:00
Armelle Laine
10e8126e2d
Merge "add se-policy to /dev/trusty-log0 so it can be accessed by dumpstate hal" into sc-dev
2021-06-15 14:35:43 +00:00
linpeter
81aaf6cda3
Add sepolicy for hwcomposer to access lhbm sysfs
...
avc: denied { read write } for comm="android.hardwar" name="local_hbm_mode" dev="sysfs" ino=70189 scontext=u:r:hal_graphics_composer_default:s0 tcontext=u:object_r:sysfs_lhbm:s0 tclass=file permissive=0
Bug: 190563896
test: check avc denied
Change-Id: I0f6abc1244d24781ff3318908b524a889490993d
2021-06-15 19:37:14 +08:00
Jiyoung
02ada4f463
vendor_telephony_app.te: add selinuxfs:file
...
- add selinuxfs:file for AP TCP dump
- allow userdebug or eng
Bug: 188422036
Signed-off-by: Jiyoung <ji_young.bae@samsung.com>
Change-Id: I9502f9f7320ca4ee298b38e40da0ccf11adfba7f
2021-06-15 15:06:39 +08:00
sukiliu
90ae782e26
Move oriole bug map to whitechapel folder
...
Bug: 190563896
Bug: 190671898
Test: PtsSELinuxTestCases
Change-Id: I15f1a6d2ebab9c5794a79abccf3530eb4bfc8307
2021-06-15 04:39:50 +00:00
TreeHugger Robot
441bae6d1a
Merge "remove obsolete entries" into sc-dev
2021-06-15 01:39:02 +00:00
Rick Yiu
aa315a6082
Merge "gs101-sepolicy: Fix avc denial for permissioncontroller_app" into sc-dev
2021-06-15 00:28:52 +00:00
Armelle Laine
5bb07db1de
add se-policy to /dev/trusty-log0 so it can be accessed by dumpstate hal
...
reuse logbuffer_device group as dumpstate hal already has read perms
on this group.
Bug: 188285071
Test: adb bugreport to include a trusty section in dumpstate_board.txt
Change-Id: I623a5d450bdbe2ceef4fe460bf31bfe740d847b2
2021-06-13 23:59:37 +00:00
Richard Hsu
753e62f39c
Merge "[BugFix] SEPolicy for libedgetpu_darwinn2.so logging to stats service" into sc-dev
2021-06-13 06:11:41 +00:00
Jayachandran Chinnakkannu
1c130a7e1d
Merge "Allow telephony to access the file descriptor of the priv_apps tcp_socket" into sc-dev
2021-06-12 17:19:33 +00:00