Commit graph

773 commits

Author SHA1 Message Date
Lucas Dupin
6e887cf3a0 Allow boot color propagation
Allows SystemUI to write the boot color sysprop

Test: manual
Bug: 190093578
Change-Id: I844a4dae87fe09a09ff3368c540ffab5f745d455
(cherry picked from commit 8a586e6786)
2021-08-17 21:06:23 +00:00
Edmond Chung
c45a1b5828 Merge "gs101: Allow camera HAL to access interrupt handles" into sc-dev am: 7e581b9a7b
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15584607

Change-Id: I97f8f143230d13f64b34ee11c7a46cfcc5f2f3f9
2021-08-16 22:17:00 +00:00
Edmond Chung
7e581b9a7b Merge "gs101: Allow camera HAL to access interrupt handles" into sc-dev 2021-08-16 22:01:46 +00:00
Edmond Chung
6b30dbc54c gs101: Allow camera HAL to access interrupt handles
This is to allow camera HAL to modify IRQ affinity for different use
cases.

Bug: 196058977
Test: Camera use cases
Change-Id: I498b0ac763b735d05299e1f4b09de14e131fd6e3
2021-08-16 10:52:27 -07:00
Rick Yiu
1f4c69a11d gs101-sepolicy: Use untrusted_app_all for vendor_sched denials am: 2ef3daba50
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15531061

Change-Id: I54a069f83c389b69a73d9d4d64a34177ba652d1c
2021-08-16 13:54:58 +00:00
Rick Yiu
2ef3daba50 gs101-sepolicy: Use untrusted_app_all for vendor_sched denials
Use untrusted_app_all to cover all Use untrusted_app versions.

Bug: 196109806
Test: no untrusted_app denials for vendor_sched
Change-Id: Ic6426b26b8a05f8a0bc7e2a4a4a293b2988812d3
2021-08-16 13:40:32 +00:00
Victor Liu
39b5815a1e allow uwb hal sys_nice access
hardware.qorvo.: type=1400 audit(0.0:9): avc: denied { sys_nice } for capability=23 scontext=u:r:hal_uwb_default:s0 tcontext=u:r:hal_uwb_default:s0 tclass=capability permissive=0
hardware.qorvo.: type=1400 audit(0.0:9): avc: denied { setsched } for scontext=u:r:hal_uwb_default:s0 tcontext=u:r:kernel:s0 tclass=process permissive=0

Bug: 196438549
Signed-off-by: Victor Liu <victorliu@google.com>
Change-Id: I742bae701cfcc7b4842cd63abbc8c275d82c8ba1
2021-08-12 16:11:06 -07:00
Victor Liu
0c429efc07 uwb: allow uwb to access the radio service
07-07 18:28:28.391   409   409 E SELinux : avc:  denied  { find } for pid=4609 uid=1083 name=isub scontext=u:r:uwb_vendor_app:s0:c59,c260,c512,c768 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=0

Bug: 192833779
Test: on device, no avc denied message
Change-Id: I4a6b778dce6f493093d3a05683473bb60e9cfa5c
2021-08-10 22:47:35 +00:00
Siqi Lin
505d9d692e Merge "sepolicy: gs101: allow dumpstate to access AoC stats" into sc-dev am: df73384b2e
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15475450

Change-Id: I7c546f38519158fa1237e713bb1200e304a82650
2021-08-09 20:05:08 +00:00
Siqi Lin
df73384b2e Merge "sepolicy: gs101: allow dumpstate to access AoC stats" into sc-dev 2021-08-09 19:52:02 +00:00
TreeHugger Robot
cfcf725081 Merge "Add sepolicy to allow camera HAL to read display backlight" into sc-dev 2021-08-06 14:04:38 +00:00
Siqi Lin
57d81aa6c1 sepolicy: gs101: allow dumpstate to access AoC stats
Add AP wakeups from AoC DRAM exceptions to bugreports.

Bug: 186456919
Change-Id: I31df82addf1b5024b8e33c6284e5da1f473ac5d9
2021-08-05 10:47:13 -07:00
Alice Yang
0d7ab6ea8b Add sepolicy to allow camera HAL to read display backlight
Add sepolicy to allow camera HAL to read display backlight to use in
gabc algorithm.

Bug: 187917645
Test: build pass,  go/p21-camera-test-checklist
Change-Id: I628ee2dedd48dd1360d0818137ba9139ae194029
2021-08-03 16:31:12 +00:00
Erik Staats
1b7ae244b0 Merge "Allow sensor HAL to read AoC dumpstate." into sc-dev 2021-08-03 15:27:12 +00:00
Charles Chiu
50ebe02d44 Merge "Allow init to set Camera properties." into sc-dev 2021-08-03 05:52:49 +00:00
Erik Staats
ad42045b87 Allow sensor HAL to read AoC dumpstate.
Bug: 194021578
Test: Simulated communication failure and verified AoC services state
 log.
Test: See details in testing done comment in
 https://googleplex-android-review.git.corp.google.com/15444398 .
Change-Id: I76f376577abad26fe86b5ecb6a570716381227f0
2021-08-02 15:56:57 -07:00
Quinn Yan
be5aa28148 Merge "Revert the unnecessary sepolicy rules for hal_neuralnetworks_darwinn." into sc-dev 2021-08-02 18:01:50 +00:00
Charles Chiu
718a856e26 Allow init to set Camera properties.
Test: Camera CTS
Bug: 194656156

Change-Id: I2f8f89a02984bfb9fea96df7b0a1d4150c9fdd8d
2021-08-02 23:21:14 +08:00
Mark Chang
f7fa1fa877 Merge "[DO NOT MERGE] sepolicy: Add "dontaudit" for twoshay dac_override." into sc-dev 2021-07-31 00:01:26 +00:00
qinyiyan
ee4e7f45ce Revert the unnecessary sepolicy rules for hal_neuralnetworks_darwinn.
Bug: 194241380
Test: flashed forrest build and ran PtsSELinuxTestCases
Change-Id: Ie2f0572a368f09e522bc2cdfdf9da1859c1c44e7
2021-07-30 23:36:06 +00:00
TreeHugger Robot
4720a91c52 Merge "Add vendor SELinux denial to allowlist" into sc-dev 2021-07-30 13:12:12 +00:00
Rick Yiu
dba7013033 Merge "gs101: Remove vendor_sched" into sc-dev 2021-07-30 06:52:10 +00:00
Rick Yiu
7de8a5d4a7 gs101: Remove vendor_sched
Moved to system/sepolicy.

Bug: 194656257
Test: build pass
Change-Id: Ia5ea1bbc05bdc52b43cb403d99994bad70613e08
Merged-In: Ia5ea1bbc05bdc52b43cb403d99994bad70613e08
2021-07-30 03:13:39 +00:00
Mark Chang
a1aab562ca [DO NOT MERGE] sepolicy: Add "dontaudit" for twoshay dac_override.
Bug: 193224954
Test: build pass and boot to home
Signed-off-by: Mark Chang <changmark@google.com>
Change-Id: I5c330564cc026e113c5d33d5d093dbcdb3ede5e4
2021-07-30 01:49:59 +00:00
Jaineel Mehta
0474bcf10e Add vendor SELinux denial to allowlist
Change-Id: If7435e9c62811ef3c9757f22f06018c32a8d3597
Test: None
Bug: 194281028
2021-07-29 21:23:34 +00:00
TreeHugger Robot
750888bc5b Merge "gs101: Allow camera hal to create file in persist camera folder" into sc-dev 2021-07-29 08:40:36 +00:00
Michael Eastwood
9bfbb3c0d4 Merge "Allow hal_dumpstate_default to access vendor_camera_debug_prop" into sc-dev 2021-07-28 21:36:38 +00:00
Michael Eastwood
30bd5e8ed6 Allow hal_dumpstate_default to access vendor_camera_debug_prop
Bug: 193365129
Test: atest com.google.android.selinux.pts.SELinuxTest#scanBugreport
Change-Id: I43e389d46e8116844bb9ca4259e5ea28e86c50f4
2021-07-27 17:22:47 -07:00
TreeHugger Robot
fead41d573 Merge "Add AoC wakeup stats to dump state" into sc-dev 2021-07-27 19:23:06 +00:00
Max Kogan
5374497df5 Add AoC wakeup stats to dump state
Need add support for wakeup stats to track AoC to AP messages
resulting in frequent wake-ups.

Bug: 192668026
Change-Id: I073406cc101e114135c863b0e0b86357e93c0415
2021-07-26 22:45:16 +00:00
Jack Wu
d6c1a50bba sepolicy: gs101: allows pixelstat to access pca file nodes
07-23 14:24:45.512  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:10): avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:45.512  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:11): avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:12): avc: denied { read } for name="chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:13): avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:14): avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:15): avc: denied { write } for name="chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1

Bug: 194386750
Test: manually test, no avc: denied
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I1a16edb5bb7820f62b3ce598aa50eba2d9455927
2021-07-24 06:42:39 +00:00
TreeHugger Robot
b3225f0f6c Merge "Add SE policies for memtrack HAL" into sc-dev 2021-07-23 20:52:52 +00:00
Ankit Goyal
0f9820830c Add SE policies for memtrack HAL
Bug: 191966412
Test: adb shell dumpsys meminfo
Change-Id: Ia7ec64840d2bb7c3ae0d61304e109d2ceb9e5f78
2021-07-24 02:18:36 +08:00
Max Shi
0bd50d1eb5 Allow USF sensor HAL to read camera persist files.
USF sensor HAL requires access to camera persist files to determine if
the camera module has been replaced (e.g. via repair), which may affect
calibration of the magnetometer.

Bug: 193727762
Test: Verify sensor HAL can open and read files under
Test: /mnt/vendor/persist/camera/
Change-Id: Icb9d7a46bf8465e1a72054ac9c8493ba18445ef3
2021-07-22 21:11:44 +00:00
Badhri Jagan Sridharan
49804d8d6f Merge "Update Usb hal permissions to allow pushing overheat suez events" into sc-dev 2021-07-22 20:31:13 +00:00
George Lee
79a15eed2a Merge "pixelstats: add bcl directory permission" into sc-dev 2021-07-22 17:03:33 +00:00
Gary Jian
9b5a97d65e Merge "Allow to set vendor_rild_prop for oemrilservice_app" into sc-dev 2021-07-22 08:16:42 +00:00
chened
561ce13d59 gs101: Allow camera hal to create file in persist camera folder
Test: build pass, no cts regression
Bug: 189844464
Change-Id: If150a94f184424f21c509a44001192e36b6ee24a
2021-07-22 07:11:05 +00:00
Badhri Jagan Sridharan
1ebd84703b Update Usb hal permissions to allow pushing overheat suez events
Usb hal now pushes the Usb port overheat event through statsd.
Usb hal also accesses usbc-throttling stats to gather info.

Bug: 193615568
Signed-off-by: Badhri Jagan Sridharan <badhri@google.com>
Change-Id: I4918458bc7a8a25d7655b66d1fe40eafc7ccb070
2021-07-21 14:38:55 -07:00
Sungwoo choi
b47cdf282a Allow to set vendor_rild_prop for oemrilservice_app
Bug: 193367138
Test: make sure no denied logs in oemrilservice_app when access the
radio property

Signed-off-by: Sungwoo choi <sungwoo48.choi@samsung.com>
Change-Id: I9014002476df7b4e650f7a5a2f153e4eca47d23d
2021-07-21 08:01:44 +00:00
Petri Gynther
d12714ccc0 Add vbmeta_vendor_[ab] to file_contexts
Bug: 181909612
Test: build + install + boot to home
Change-Id: Ibb7bd8e5a61d86de1b51a3780a5bfa8cf4caf59b
2021-07-20 23:41:31 -07:00
sukiliu
411aa59779 Update avc error on ROM 7566803
avc: denied { read } for name="platform:1cc40000.sysmmu--platform:1ce00000.abrolhos" dev="sysfs" ino=21006 scontext=u:r:hal_neuralnetworks_darwinn:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0

Bug: 194241380
Test: PtsSELinuxTestCases
Change-Id: If7ee99a36bca88fffc37c12dc306e0453afb1395
2021-07-21 09:36:05 +08:00
TreeHugger Robot
b3cc71258b Merge "ims: allow finding mediametrics_service for vendor_ims_app" into sc-dev 2021-07-20 13:00:25 +00:00
Sungjun Park
0612b5aa85 ims: allow finding mediametrics_service for vendor_ims_app
For generate dtmf tone, ImsService find mediametrics_service.
So, added the seplicy rule for finding mediametrics_service.

<Related log>
07-14 15:37:21.391   411   411 E SELinux : avc:  denied  { find } for
pid=2263 uid=10217 name=media.metrics scontext=u:r:vendor_ims_app:s0:
c217,c256,c512,c768 tcontext=u:object_r:mediametrics_service:s0 tclass
=service_manager permissive=0

Bug: 192543653
Signed-off-by: Sungjun Park <sj19385.park@samsung.com>
Change-Id: Ia0f6610ecc454533d9584367694228245afe46e4
2021-07-20 09:35:23 +00:00
Alex Hong
f0589d11df Allow suspend_control to access the AOC wakeup node
Test: Check avc denials during boot
      $ adb shell su 0 dumpsys suspend_control
Bug: 194164089

Change-Id: I9edcf6398f61daec6fdde0f7ac69ddd5d275f753
2021-07-20 09:29:15 +00:00
TreeHugger Robot
fa62e602fc Merge "ssr_detector_app: Add additional vendor dir and crgroup allow for debug" into sc-dev 2021-07-20 06:09:35 +00:00
sukiliu
d9309ef34d Update avc error on ROM 7562467
avc: denied { read } for name="u:object_r:odsign_prop:s0" dev="tmpfs" ino=229 scontext=u:r:postinstall_dexopt:s0 tcontext=u:object_r:odsign_prop:s0 tclass=file permissive=0
avc: denied { read } for comm="otapreopt" name="u:object_r:odsign_prop:s0" dev="tmpfs" ino=229 scontext=u:r:postinstall_dexopt:s0 tcontext=u:object_r:odsign_prop:s0 tclass=file permissive=0

Bug: 194142604
Bug: 194065991
Test: PtsSELinuxTestCases
Change-Id: Ic3bb544f05ffff0df42f820d2f9cf6cd7cb24879
2021-07-20 10:03:30 +08:00
TreeHugger Robot
f8b8e0cb53 Merge "Add cpm/pca9468 logbuffer directories so that bugreports can take a snapshot" into sc-dev 2021-07-19 20:54:38 +00:00
TreeHugger Robot
fc321aabe2 Merge "Allow HAL to access sysfs." into sc-dev 2021-07-19 18:22:13 +00:00
Andrew LeCain
ff13d1adee Merge "sepolicy allow fingerprint hal to read mfg_data" into sc-dev 2021-07-19 17:46:18 +00:00