Anthony Stange
836f25d64b
Update gs101 sepolicy for contexthub HAL
...
Bug: 168941570
Test: Load nanoapp via HAL
Change-Id: If133a3290e4fc02677523d737980ee5944885c36
2021-04-29 16:59:36 +00:00
Chris Fries
2d2adb3e56
Fix android.hardware.drm@1.4-service.clearkey label
...
Bug: 186617617
Change-Id: Icad8008686ef57d4b6c3fca27af41e2b2991f74f
2021-04-28 14:40:02 -05:00
Roger Fang
66634d4d20
sepolicy: gs101: allows pixelstat to access audio metrics nodes
...
audio.service: type=1400 audit(0.0:30): avc: denied { read write } for name="amcs" dev="tmpfs" ino=739 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:amcs_device:s0 tclass=chr_file permissive=0
pixelstats-vend: type=1400 audit(0.0:9): avc: denied { read } for name="speaker_impedance" dev="sysfs" ino=67611 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
HwBinder:696_2: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/amcs" dev="tmpfs" ino=766 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:amcs_device:s0 tclass=chr_file permissive=0
Bug: 171854614
Test: manually test, no avc: denied.
Change-Id: I82ebd22f167200ab3cf59e6525ef43c0be8f722a
2021-04-28 10:52:06 +08:00
Wenhao Wang
a16b1668be
Merge "Fix selinux for RPMB daemon" into sc-dev
2021-04-20 17:20:50 +00:00
Tai Kuo
0e9abb4ef2
sepolicy: add cs40l26 haptics modules
...
Fix the following avc denial:
avc: denied { module_load } for comm="insmod" path="/vendor_dlkm/lib/modules/cl_dsp.ko" dev="overlay" ino=41 scontext=u:r:init-insmod-sh:s0 tcontext=u:object_r:vendor_file:s0 tclass=system permissive=1
Bug: 184610991
Test: Full built. Check if the avc denial was gone.
Signed-off-by: Tai Kuo <taikuo@google.com>
Change-Id: Ic41ea6a6add818bfdf95e71e20df77b9e06db6c1
2021-04-20 11:43:03 +00:00
Wenhao Wang
f5277482c1
Fix selinux for RPMB daemon
...
Secure persistent storage has been moved to persist root.
The corresponding pathes on SELinux policy has to be updated.
Bug: 173971240
Bug: 173032298
Test: Trusty storage tests
Change-Id: I0e7756f3b4d5c6be705a87e1d7d80247df1ec4bb
2021-04-20 13:01:23 +08:00
Adam Shih
99988c4c5f
remove obsolete domains
...
Bug: 168013500
Test: Check that abox and rpmbd are not in ROM anywhere in oriole, raven user,
userdebug and factory ROM
Change-Id: Ie091a1036ba6c25a3c7f0ef0b8f69cc9fc4e306a
2021-04-19 11:14:54 +08:00
Jenny Ho
9ec58d031a
Merge "Allow to dump pps-dc" into sc-dev
2021-04-15 10:26:57 +00:00
Charlie Chen
742daf873c
Merge changes from topic "remove_video_system_heap" into sc-dev
...
* changes:
Formatting file_contexts
remove video_system_heap
2021-04-15 07:56:19 +00:00
Charlie Chen
01a33d0cb7
Formatting file_contexts
...
Test: Youtube playback, video recording, ExoPlayer playback
Bug: 181380463
Change-Id: I9eeb08987794336aafa7945a9d648a38f0e7989a
2021-04-15 11:08:10 +08:00
Taehwan Kim
9d20b97534
remove video_system_heap
...
Test: Youtube playback, video recording, ExoPlayer playback
Bug: 181380463
Signed-off-by: Taehwan Kim <t_h.kim@samsung.com>
Change-Id: If2aad557365755156e4c088048dc351bc66df281
2021-04-15 11:07:20 +08:00
Benjamin Schwartz
dde4b6bf1f
Allow power stats HAL to read gnss stats
...
Bug: 181577366
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: Iea8c332f9b73358e1a6464d69cbef6af4a603f84
2021-04-14 17:28:02 -07:00
Sidath Senanayake
7c8d4d86e8
Fix Android GPU Inspector (AGI) support
...
In order for AGI to work, it needs to dlopen the libgpudataproducer.so
shared object.
Bug: 185127179
Bug: 175593589
Change-Id: I9ad9c587f10e0fd6e27c4743c1d4cb85c896c41d
2021-04-12 17:41:01 +01:00
Ted Lin
cd12670940
Allow to dump pps-dc
...
Bug:185041587
Test: adb bugreport
Change-Id: Ia4adcc335b05f5f7d06625c274842e6a9f5d2637
Signed-off-by: Ted Lin <tedlin@google.com>
2021-04-12 18:27:20 +08:00
Jenny Ho
b94e7586ce
Fix avc denied for maxfg_base/flip and wireless dump
...
Bug: 184780667
Signed-off-by: Jenny Ho <hsiufangho@google.com>
Change-Id: Ice4102cf541dc80c85beb05ad5c523a4306a77bc
2021-04-09 18:24:32 +08:00
Eddie Tashjian
5bbdd82a4e
Merge "Add TCP dump permissions." into sc-dev
2021-04-08 18:25:30 +00:00
Craig Dooley
cd888e847f
Merge "Fix SELinux errors with aocd" into sc-dev
2021-04-08 17:27:56 +00:00
Craig Dooley
3d4d9159c9
Fix SELinux errors with aocd
...
Add inotify support for /dev
Fix the aoc vendor property
Bug: 184173298
Change-Id: I40a71edd56b2d51f848085c43ae1d10a4c2c0c4b
2021-04-08 03:59:23 +00:00
Eddie Tashjian
b2fb9cdace
Add TCP dump permissions.
...
Copy selinux policy for tcp dump binary from previous Pixel to support
TCP logging on P21 through PixelLogger.
Bug: 184777243
Test: Check PixelLogger TCP dump works.
Change-Id: Id958c8a3e6375a7aae569d6fc94deb9f8072b57b
2021-04-08 03:13:55 +00:00
Adam Shih
a346a7fa34
remove wildcard on kernel modules
...
Bug: 170786122
Test: Boot with all kernal modules loaded
Change-Id: I0d1d861af290181231223630497788c051c83ecb
2021-04-07 14:10:00 +08:00
Cheng Gu
72011a8a87
gs101-sepolicy: Allow rlsservice to access range sensor
...
Fix: 184295618
Test: rlsservice_test
Change-Id: Iee4cc5376e0eb67e75ae94cd15b5211a7ec819ef
2021-04-02 22:27:48 +00:00
Krzysztof Kosiński
8a1f0bed01
Mark libGralloc4Wrapper.so as same-process HAL.
...
Updating the library name after upgrade to gralloc version 4.
Bug: 178656396
Test: GCA on oriole
Change-Id: I638b3cd0d7f4759f89a62a1d102cc98d9a3db622
2021-04-01 22:21:44 -07:00
Charlie Chen
5602dfde45
SELinux error coming from mediacodec when using GCA and secure playback
...
Fixes the following denials:
avc: denied { read } for name="name" dev="sysfs" ino=63727 \
scontext=u:r:mediacodec:s0 tcontext=u:object_r:sysfs:s0 tclass=file \
permissive=0
avc: denied { read } for name="name" dev="sysfs" ino=63743 \
scontext=u:r:mediacodec:s0 tcontext=u:object_r:sysfs:s0 tclass=file \
permissive=0
avc: denied { read } for name="name" dev="sysfs" ino=64010 \
scontext=u:r:mediacodec:s0 tcontext=u:object_r:sysfs:s0 tclass=file \
permissive=0
avc: denied { search } for name="video6" dev="sysfs" ino=64587 \
scontext=u:r:mediacodec:s0 tcontext=u:object_r:sysfs_video:s0 \
tclass=dir permissive=0
Bug: 182525521
Bug: 184145552
Test: GCA recording works properly, \
Netflix and ExoPlayer can play videos
Change-Id: Ib7220feedc5031fb0e5c05a2b487da2ddf8b98cd
2021-04-01 02:53:24 +00:00
Ilya Matyukhin
52a4f701c1
Merge "Add sepolicy for Goodix AIDL HAL" into sc-dev
2021-03-31 21:57:29 +00:00
Zhijun He
a7d3992396
Merge "Revert "Allow Exoplayer access to the vstream-secure heap for secure playback"" into sc-dev
2021-03-31 15:38:31 +00:00
Charlie Chen
ac3d49d41d
Revert "Allow Exoplayer access to the vstream-secure heap for secure playback"
...
This reverts commit 7c92613185
.
Reason for revert: This commit breaks camera recording
Bug: 184154831
Change-Id: Ia4286dab9c5d44c59a3b224e0e24c191eb2be84b
2021-03-31 15:37:48 +00:00
Yu-Chi Cheng
53982a4372
Merge "Labelled EdgeTPU service libraries as SP-HAL." into sc-dev
2021-03-31 14:24:54 +00:00
Charlie Chen
7c92613185
Allow Exoplayer access to the vstream-secure heap for secure playback
...
Fixes the following denials:
avc: denied { read } for name="name" dev="sysfs" ino=63727 \
scontext=u:r:mediacodec:s0 tcontext=u:object_r:sysfs:s0 tclass=file \
permissive=0
avc: denied { read } for name="name" dev="sysfs" ino=63743 \
scontext=u:r:mediacodec:s0 tcontext=u:object_r:sysfs:s0 tclass=file \
permissive=0
avc: denied { read } for name="name" dev="sysfs" ino=64010 \
scontext=u:r:mediacodec:s0 tcontext=u:object_r:sysfs:s0 tclass=file \
permissive=0
Bug: 182525521
Test: no more denials and able to play video via ExoPlayer App
Change-Id: I21033bc78858fd407c16d2cd2df4549f97273221
2021-03-31 05:41:26 +00:00
Erik Cheng
90ed4cc72e
Merge "Grant permission for more camera device nodes" into sc-dev
2021-03-31 03:09:15 +00:00
Ankit Goyal
b07d84f087
Fix SELinux denials for arm.graphics AIDL interface
...
Denial example:
03-30 05:44:44.468 490 490 W RenderEngine: type=1400 audit(0.0:4): avc: denied { read } for name="arm.graphics-V1-ndk_platform.so" dev="dm-9" ino=1923 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=0
Bug: 143246001
Test: Build and boot to home
Change-Id: Id7c2bd98aa634f852a21812fb2421a2e96ef7636
2021-03-30 22:22:22 +08:00
Erik Cheng
5f6e263527
Grant permission for more camera device nodes
...
Bug: 184004655
Test: aosp camera
Change-Id: I52fdb3f7f3d37537461c94b139e72add1a300bb2
2021-03-30 17:34:38 +08:00
Yu-Chi Cheng
93bf9b613b
Labelled EdgeTPU service libraries as SP-HAL.
...
The EdgeTPU service libraries (libedgetpu_client.google.so and
com.google.edgetpu-V1-ndk.so) provide both the system_ext and
vendor variants. Since these need to be linked by pre-built
applications from /product/, this change labelled them as
the same_process_hal_file in order to allow the applications
to link with the vendor variant.
Bug: 184008444
Test: tested on local Oriole with GCA.
Change-Id: I8c510f51ccc1a76d14978962d72fd91f15bf7a90
2021-03-29 23:22:33 -07:00
Oleg Matcovschi
6862b8e239
vendor: remove sscoredump policies
...
Bug: 180760068
Signed-off-by: Oleg Matcovschi <omatcovschi@google.com>
Change-Id: Ib8d360b227286bdea7de00125ef2ed6ad7978e67
2021-03-28 21:26:34 -07:00
Krzysztof Kosiński
74bc4bf947
Merge "Mark libGrallocWrapper.so as same-process HAL." into sc-dev
2021-03-25 16:34:28 +00:00
Steven Liu
acf218cb51
Merge "Add sepolicy for the wifi firmware config OTA feature" into sc-dev
2021-03-25 14:40:18 +00:00
Ilya Matyukhin
3233492f78
Add sepolicy for Goodix AIDL HAL
...
Bug: 183054007
Test: adb logcat | grep "avc: denied"
Change-Id: Iea9a652dbc78c488a72600b4226140ccf123b004
2021-03-24 21:00:41 -07:00
Krzysztof Kosiński
1314a15cb9
Merge "Revert "Add lazy service binary to hal_camera_default domain."" into sc-dev
2021-03-24 20:57:35 +00:00
Krzysztof Kosiński
9818e25500
Revert "Add lazy service binary to hal_camera_default domain."
...
This reverts commit d02e73b966
.
Reason for revert: This HAL is actually not intended to be present
on GS101 devices. The denial logs come from people who did "adb sync"
after building binaries that are not included in the device image.
SELinux should not allow access to this HAL.
Change-Id: Id179023eeb79d749a0bde13e1d83af41fc42780e
2021-03-24 15:59:55 +00:00
Steven Liu
c6eca53b9e
Add sepolicy for the wifi firmware config OTA feature
...
Bug: 177083009
Test: the OTA updated files can be updated and applied.
Change-Id: I2f269dbc146aae41cab57abd568af7e26fd23876
2021-03-24 06:59:08 -07:00
Krzysztof Kosiński
7e469b9941
Mark libGrallocWrapper.so as same-process HAL.
...
This library is indirectly loaded by lib_aion_buffer.so, which
is an ABI-stable wrapper for some vendor-specific APIs used by
GCA (the Pixel camera app)
Bug: 182962346
Test: ran GCA on oriole
Change-Id: Ida5171110081cac0ac13ea769f9d434499faebe6
2021-03-24 06:42:05 -07:00
TreeHugger Robot
40df476219
Merge "Add the sepolicy for UWB hal" into sc-dev
2021-03-24 02:13:43 +00:00
Hridya Valsaraju
fb862c0888
Allow Exoplayer access to the vstream-secure heap for secure playback
...
Fixes the following denials:
avc: denied { read } for name="vstream-secure" dev="tmpfs"
ino=736 scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0 tclass=chr_file permissive=0
app=com.google.android.exoplayer.demo
avc: denied { read } for name="vstream-secure" dev="tmpfs" ino=736
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0
tclass=chr_file permissive=0 app=com.google.android.exoplayer.demo
avc: denied { read } for name="vstream-secure" dev="tmpfs" ino=736
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0
tclass=chr_file permissive=0 app=com.google.android.exoplayer.demo
Bug: 178865267
Test: no more denials
Change-Id: I6612bd56c49558b13e2ae72cfbf3552715729e7a
Signed-off-by: Hridya Valsaraju <hridya@google.com>
2021-03-23 14:37:01 -07:00
Krzysztof Kosiński
61e515e4ce
Merge "Add lazy service binary to hal_camera_default domain." into sc-dev
2021-03-23 01:31:50 +00:00
Krzysztof Kosiński
d02e73b966
Add lazy service binary to hal_camera_default domain.
...
Avoids denial logs from init on service (re)start. See bug for
details.
Bug: 183441948
Test: Restarted the service
Change-Id: I9ee9b8099d2ffae4d6a115552800fa844c192132
2021-03-22 16:25:57 -07:00
David Li
6dce033807
Merge "audio: add /dev/acd-audio_dcdoff_ref for audio effect visualizer" into sc-dev
2021-03-22 02:07:33 +00:00
Alex Hong
b640326154
Add the sepolicy for UWB hal
...
Bug: 182727934
Test: $ make selinux_policy
Push SELinux modules and check the denials during boot
Change-Id: I630e6e353897a85d1b90c7d8a4250703a4c3a245
2021-03-19 21:42:07 +08:00
TreeHugger Robot
9a865e84c7
Merge "Allow fingerprint hal to access fingerprint device" into sc-dev
2021-03-19 02:19:59 +00:00
David Li
fa11af6a07
audio: add /dev/acd-audio_dcdoff_ref for audio effect visualizer
...
Set /dev/acd-audio_dcdoff_ref as u:object_r:aoc_device:s0
crw-rw---- 1 system audio u:object_r:aoc_device:s0 500, 29 2021-03-18 22:19 /dev/acd-audio_dcdoff_ref
Bug: 180984363
Bug: 165719427
Test: make -j128
Test: ls -alZ /dev/acd-audio_dcdoff_ref
Change-Id: If7cd3ef99885730287648afebb222d4f925d325e
2021-03-19 10:10:49 +08:00
Kris Chen
10fda56cd1
Allow fingerprint hal to access fingerprint device
...
Fixes the following avc denials:
03-18 10:57:10.612 947 947 I android.hardwar: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/goodix_fp" dev="tmpfs" ino=482 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:10.632 947 947 I android.hardwar: type=1400 audit(0.0:9): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6707 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:13.672 947 947 I android.hardwar: type=1400 audit(0.0:14): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6706 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:32.704 947 947 I HwBinder:947_1: type=1400 audit(0.0:26): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6705 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
Bug: 171943101
Test: No above avc denials in logcat.
Change-Id: I254a01a2c11fcaba9ad3f387862a8d0ddafffd38
2021-03-18 19:23:54 +08:00
iayara
adeaaead76
Add "libedgetpu_darwinn2.so" library duplicate to be used for external
...
launch.
This change is intended to keep naming consistency with previous
Darwinn external launch. In the future, all "libedgetpu_darwinn2.so"
instances should be replaced by "libedgetpu_util.so".
Bug: 182303547
Change-Id: I99e83f5f2e317b195b2061c781cb23544e547c55
2021-03-17 23:47:07 +00:00