Aaron Tsai
e704af0ed7
Fix selinux error for system_app am: 05565c1f14
am: d2d83c8e2d
am: 84bacff9ab
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1992670
Change-Id: I6e91791926ff7d840c7317fbf5d9656338960132
2022-02-22 02:29:22 +00:00
Aaron Tsai
84bacff9ab
Fix selinux error for system_app am: 05565c1f14
am: d2d83c8e2d
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1992670
Change-Id: Ibdbeeee937e4c856adfebad71a956a343b820dfa
2022-02-22 01:56:28 +00:00
Aaron Tsai
d2d83c8e2d
Fix selinux error for system_app am: 05565c1f14
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1992670
Change-Id: Ia3c6c0aae82c19a5d1c019cce2700c5e64c8bb11
2022-02-22 01:35:41 +00:00
Shubham Dubey
5e2e261148
Temporarily don't audit hal_fingerprint to fix avc denial
...
Fix: 220263520
Change-Id: Ic06981fdc071c5027e6ccd137c1a2d19b9366c98
2022-02-21 13:07:23 +00:00
Aaron Tsai
05565c1f14
Fix selinux error for system_app
...
01-26 05:04:53.364 440 440 I auditd : avc: denied { find } for interface=vendor.samsung_slsi.telephony.hardware.radioExternal::IOemSlsiRadioExternal sid=u:r:system_app:s0 pid=3063 scontext=u:r:system_app:s0 tcontext=u:object_r:hal_exynos_rild_hwservice:s0 tclass=hwservice_manager permissive=0
Bug: 216531913
Test: verified with the forrest ROM and error log gone
Change-Id: I73d45f3cf1fe0bd918bb4856ce554e81702e4ff9
Merged-In: I73d45f3cf1fe0bd918bb4856ce554e81702e4ff9
2022-02-21 12:16:45 +08:00
Robert Shih
cb04f5981f
whitechapel: sepolicy for Widevine AIDL HAL
...
Bug: 219538389
Test: atest GtsMediaTestCases
Change-Id: I431554dcbef014f8235f048ee062a218a2131f9c
2022-02-20 12:35:22 -08:00
Junkyu Kang
07f17be3f3
[automerger skipped] Add persist.vendor.gps to sepolicy am: 9244051b35
am: a5b052c132
am: 86d20c2552
-s ours
...
am skip reason: Merged-In I3fdaf564eacec340003eed0b5845a2c08922362c with SHA-1 b9ad182d4a
is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1989989
Change-Id: I6f04e1a3b94eda3ddc3ace332aaebaa0da1e9501
2022-02-18 07:37:40 +00:00
Junkyu Kang
86d20c2552
Add persist.vendor.gps to sepolicy am: 9244051b35
am: a5b052c132
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1989989
Change-Id: I0844fbc02141fc6efa77d0cd47d00fd56a15f3e2
2022-02-18 07:12:19 +00:00
Junkyu Kang
a5b052c132
Add persist.vendor.gps to sepolicy am: 9244051b35
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1989989
Change-Id: Ibb1a3b4cca8fa3549eeef548d0939829413e8af1
2022-02-18 06:50:19 +00:00
TreeHugger Robot
d95da03285
Merge "Add hal_usb_impl permission"
2022-02-17 16:42:12 +00:00
Midas Chien
943cb1278a
Merge "Allow composer to read panel_idle sysfs node"
2022-02-17 09:17:44 +00:00
Junkyu Kang
9244051b35
Add persist.vendor.gps to sepolicy
...
Bug: 196002632
Test: PixelLogger can modify persist.vendor.gps.*
Change-Id: I3fdaf564eacec340003eed0b5845a2c08922362c
Merged-In: I3fdaf564eacec340003eed0b5845a2c08922362c
2022-02-17 08:55:49 +00:00
Midas Chien
32307ac30d
Allow composer to read panel_idle sysfs node
...
Change panel_idle selinux type to sysfs_display to allow composer can
read it.
Bug: 198808492
Bug: 219857957
Test: ls -Z to check selinux type
Test: make sure init(write) and composer(read) can access it
Change-Id: I77ae701a73a047b26b4ebb3c9d482c8cb9220999
2022-02-16 16:28:06 +08:00
Junkyu Kang
26e6d6f2b6
Merge "Add persist.vendor.gps to sepolicy"
2022-02-16 08:16:05 +00:00
Ricky Niu
05eb29e217
Add hal_usb_impl permission
...
Add hal_usb_impl get below permission
allow hal_usb_impl configfs:dir rw_dir_perms;
allow hal_usb_impl configfs:file create_file_perms;
avc denied
02-16 12:05:19.820 788 788 I android.hardwar: type=1400 audit(0.0:4882): avc: denied { search } for name="/" dev="configfs" ino=13419 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=1
02-16 12:05:19.820 788 788 I android.hardwar: type=1400 audit(0.0:4883): avc: denied { write } for name="g1" dev="configfs" ino=38003 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=1
02-16 12:05:19.820 788 788 I android.hardwar: type=1400 audit(0.0:4884): avc: denied { add_name } for name="UDC" scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=1
02-16 12:05:19.820 788 788 I android.hardwar: type=1400 audit(0.0:4885): avc: denied { create } for name="UDC" scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:configfs:s0 tclass=file permissive=1
02-16 12:05:19.820 788 788 I android.hardwar: type=1400 audit(0.0:4886): avc: denied { write } for name="UDC" dev="configfs" ino=106988 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:configfs:s0 tclass=file permissive=1
Bug: 218997592
Signed-off-by: Ricky Niu <rickyniu@google.com>
Change-Id: I854479cef1a0b8ad518814fb9d20558cf52202e7
2022-02-16 14:27:36 +08:00
Xin Li
78a2d63a45
[automerger skipped] Merge sc-v2-dev-plus-aosp-without-vendor@8084891 am: 81caef24ad
-s ours am: 14abf01391
-s ours
...
am skip reason: Merged-In Icecca9f69ee9b57d43aa2864864951bf66c4905f with SHA-1 ca06222472
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16844142
Change-Id: I1d3f3dc99e04d19b61696677a4bf1fd87a168fe4
2022-02-14 18:21:12 +00:00
Xin Li
14abf01391
[automerger skipped] Merge sc-v2-dev-plus-aosp-without-vendor@8084891 am: 81caef24ad
-s ours
...
am skip reason: Merged-In Icecca9f69ee9b57d43aa2864864951bf66c4905f with SHA-1 ca06222472
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16844142
Change-Id: I12d27f867dd598e669aa86e1bec26c3aafbef4a3
2022-02-14 18:03:48 +00:00
Xin Li
81caef24ad
Merge sc-v2-dev-plus-aosp-without-vendor@8084891
...
Bug: 214455710
Merged-In: Icecca9f69ee9b57d43aa2864864951bf66c4905f
Change-Id: Ibf8d551c16f8f941cfc8072a29ef5c57e8bef170
2022-02-11 07:12:06 +00:00
Ankit Goyal
9e7ecb5fae
Merge "Rename vulkan library to be platform agnostic"
2022-02-11 00:52:58 +00:00
Jack Wu
dcb05d1377
sepolicy: gs101: fix charger_vendor permission denied
...
[ 27.025458][ T443] type=1400 audit(1644391560.640:11): avc: denied { search } for comm="android.hardwar" name="vendor" dev="tmpfs" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0
[ 26.563658][ T447] type=1400 audit(1644397622.588:5): avc: denied { search } for comm="android.hardwar" name="/" dev="sda1" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=0
[ 27.198144][ T442] type=1400 audit(1644398156.152:5): avc: denied { search } for comm="android.hardwar" name="battery" dev="sda1" ino=12 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=0
[ 27.327035][ T443] type=1400 audit(1644398785.276:5): avc: denied { read } for comm="android.hardwar" name="defender_active_time" dev="sda1" ino=17 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=0
[ 27.355009][ T443] type=1400 audit(1644398785.276:6): avc: denied { write } for comm="android.hardwar" name="defender_charger_time" dev="sda1" ino=16 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=0
[ 26.771705][ T444] type=1400 audit(1644379988.804:4): avc: denied { read } for comm="android.hardwar" name="specification_version" dev="sysfs" ino=56257 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=0
[ 27.898684][ T445] type=1400 audit(1644392754.928:8): avc: denied { read } for comm="android.hardwar" name="thermal_zone6" dev="sysfs" ino=15901 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=lnk_file permissive=0
[ 29.180076][ T447] type=1400 audit(1644397625.200:9): avc: denied { write } for comm="android.hardwar" name="mode" dev="sysfs" ino=15915 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
[ 27.043845][ T444] type=1400 audit(1644379988.808:9): avc: denied { search } for comm="android.hardwar" name="thermal" dev="tmpfs" ino=899 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:thermal_link_device:s0 tclass=dir permissive=0
[ 27.064916][ T444] type=1400 audit(1644379988.808:10): avc: denied { read } for comm="android.hardwar" name="u:object_r:vendor_battery_defender_prop:s0" dev="tmpfs" ino=306 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=file permissive=0
[ 27.356266][ T444] type=1107 audit(1644404450.376:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.battery.defender.state pid=457 uid=1000 gid=1000 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=property_service permissive=0'
Bug: 218485039
Test: manually test, no avc: denied
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I091dbbca35fb833e59fdbc234d74b90bfe74014c
2022-02-09 19:16:22 +08:00
TeYuan Wang
2d02b11311
move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba
am: aeebc898cb
am: 912673f8ce
am: 9ad50b3952
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120
Change-Id: I8c46cd1a01c86d453886e246e000d90974cd8806
2022-02-08 12:07:35 +00:00
TeYuan Wang
9ad50b3952
move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba
am: aeebc898cb
am: 912673f8ce
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120
Change-Id: Iaf7721a2b7a2f4def1a302c71d6f293b371b7661
2022-02-08 11:51:56 +00:00
TeYuan Wang
912673f8ce
move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba
am: aeebc898cb
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120
Change-Id: Ib49a0a78843456c9b170dd968259e9e1d51e6317
2022-02-08 11:40:52 +00:00
TeYuan Wang
aeebc898cb
move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120
Change-Id: Id7692611610e82be8489a0c73e2040d15101e09b
2022-02-08 10:04:37 +00:00
TeYuan Wang
c292dd65ba
move vendor_thermal_prop rules to pixel-sepolicy
...
Bug: 213257759
Test: no denied log after "setprop persist.vendor.disable.thermal.control 1"
Change-Id: Ic150959bc6084034d9afcc70bf446692fbe22d11
2022-02-08 08:10:32 +00:00
Treehugger Robot
91dcb418e2
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537
am: 02e7ad9fb5
am: d70a957518
am: 674aa657fb
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966
Change-Id: I796f41b8ac07406a747dde6cd77c9878339e2de7
2022-02-08 02:12:46 +00:00
Treehugger Robot
674aa657fb
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537
am: 02e7ad9fb5
am: d70a957518
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966
Change-Id: I109245e668ffa38851ced506270ec6d6d1d29fd1
2022-02-08 01:49:40 +00:00
Treehugger Robot
d70a957518
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537
am: 02e7ad9fb5
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966
Change-Id: I1da16035bcc4af82e8c671398b76daf7cc8efd28
2022-02-08 01:26:58 +00:00
Treehugger Robot
02e7ad9fb5
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966
Change-Id: I2807e116f14305f0e829eec6907db6c817f000c3
2022-02-08 01:08:56 +00:00
Treehugger Robot
2c1750e537
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices"
2022-02-08 00:53:08 +00:00
Will McVicker
5a88ee6af1
genfs_contexts: add paths for unnamed cs40l25a i2c devices
...
In the 5.10 kernel, the i2c paths are named using an out-of-tree patch
[1]. For kernels that don't support that, let's add the unnamed sysfs
paths as well to the selinux policy.
[1] https://android-review.googlesource.com/c/kernel/common/+/1646148
Bug: 217774013
Change-Id: I3a1f279270d22bf82144ce60a08c215308764be3
2022-02-04 11:54:06 -08:00
Marco Nelissen
126a85b4ec
Allow logd to read the Trusty log am: 7df1fa1574
am: 983f5f2d96
am: 6072583f8a
am: a9004241c2
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381
Change-Id: Ie626aaa3652cb8aa47062f32c38d658d5f1ce251
2022-02-04 02:34:39 +00:00
Marco Nelissen
a9004241c2
Allow logd to read the Trusty log am: 7df1fa1574
am: 983f5f2d96
am: 6072583f8a
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381
Change-Id: I599f4256ea82b4917eceafeced56aef1214de588
2022-02-04 02:15:43 +00:00
Marco Nelissen
6072583f8a
Allow logd to read the Trusty log am: 7df1fa1574
am: 983f5f2d96
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381
Change-Id: I3ef810bd7a3ecddf60a0b13f1262abce14a5ece1
2022-02-04 01:59:53 +00:00
Marco Nelissen
983f5f2d96
Allow logd to read the Trusty log am: 7df1fa1574
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381
Change-Id: Ic66382bd03df28287fc3817c6f66a414d69637b3
2022-02-04 01:43:42 +00:00
Marco Nelissen
7df1fa1574
Allow logd to read the Trusty log
...
Bug: 190050919
Test: build
Change-Id: I8a42cd90b1581272f4dafc37d6eb29a98e1fa2e3
2022-02-03 10:37:13 -08:00
Marco Nelissen
64fe59aba5
Merge "Allow logd to read the Trusty log"
2022-02-01 21:37:54 +00:00
Marco Nelissen
a2d6a19bcd
Allow logd to read the Trusty log
...
Bug: 190050919
Test: build
Change-Id: I8a42cd90b1581272f4dafc37d6eb29a98e1fa2e3
2022-02-01 21:37:36 +00:00
Ankit Goyal
ec2a9fb8fc
Rename vulkan library to be platform agnostic
...
Bug: 174232579
Test: Boots to home
Change-Id: I39d633e79896d7196ca7011dd7e017950248e2d8
2022-01-26 20:36:29 -08:00
Stephen Crane
e48d11c26c
[automerged blank] Allow TEE storageproxyd permissions needed for DSU handling 2p: b9beafc9fa
...
Blank merge reason: Change-Id I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b with SHA-1 3f9a11fa0b
is in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16727208
Bug: 203719297
Change-Id: I337cd189a9a8ffa6d58f0e1284e09884f8fb86f5
2022-01-26 22:12:29 +00:00
Stephen Crane
b9beafc9fa
Allow TEE storageproxyd permissions needed for DSU handling
...
Allows the vendor TEE access to GSI metadata files (which are publicly
readable). Storageproxyd needs access to this metadata to determine if a
GSI image is currently booted. Also allows the TEE domain to make new
directories in its data path.
Includes the fixed directory creation permission change from
Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a.
Test: access /metadata/gsi/dsu/booted from storageproxyd
Bug: 203719297
Merged-In: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b
Merged-In: Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a
Change-Id: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b
(cherry picked from commit b69ac35ff0
)
2022-01-26 14:00:44 -08:00
Treehugger Robot
2fa102876a
Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b
am: 0e4789159c
am: 26f020fc70
am: 35d7efaf11
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462
Change-Id: I1e789353fb2ce05e05f097ab48b2bb2054887efe
2022-01-26 21:49:48 +00:00
Treehugger Robot
35d7efaf11
Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b
am: 0e4789159c
am: 26f020fc70
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462
Change-Id: I91b0e8f0033c4736516f9341a5b6166f14f7894f
2022-01-26 21:26:26 +00:00
Treehugger Robot
26f020fc70
Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b
am: 0e4789159c
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462
Change-Id: Ie20d1e1d6037a42acba87ab92007657f4f6be83d
2022-01-26 21:07:28 +00:00
Treehugger Robot
0e4789159c
Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462
Change-Id: I021cffca681495143a279470e73e194cd5faf635
2022-01-26 20:44:17 +00:00
Treehugger Robot
423a9a467b
Merge "Allow storageproxyd to create directories in its data location"
2022-01-26 20:29:27 +00:00
Junkyu Kang
b9ad182d4a
Add persist.vendor.gps to sepolicy
...
Bug: 196002632
Test: PixelLogger can modify persist.vendor.gps.*
Change-Id: I3fdaf564eacec340003eed0b5845a2c08922362c
2022-01-26 08:02:27 +00:00
Stephen Crane
45850f812e
Allow storageproxyd to create directories in its data location
...
storageproxyd already has rw_dir_perms for tee_data_file from
vendor/tee.te in platform. We need create_dir_perms to make the
"alternate/" directory for handling DSU correctly.
Test: m dist, flash, and test DSU
Bug: 203719297
Change-Id: Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a
2022-01-25 17:54:22 -08:00
TeYuan Wang
9afdb48a85
Move thermal netlink socket sepolicy rules to pixel sepolicy am: 66f1d74123
am: 8cb5857dac
am: 0fe33df6c0
am: e925f85169
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1958926
Change-Id: I77230680556c9029ca702c6b73c56119221689e8
2022-01-25 12:22:55 +00:00
TeYuan Wang
e925f85169
Move thermal netlink socket sepolicy rules to pixel sepolicy am: 66f1d74123
am: 8cb5857dac
am: 0fe33df6c0
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1958926
Change-Id: I86642d387feb6f99939ffb52341e26ba4faef082
2022-01-25 12:05:36 +00:00