Michael Ayoubi
075ba05575
Merge "allow recovery and fastboot to access secure elment" into sc-dev
2021-06-30 17:39:40 +00:00
Jeffrey Carlyle
14fcd5ffaf
allow recovery and fastboot to access secure elment
...
This is to enable clearing of secure element during a master reset.
Bug: 182508814
Test: master reset on device with keys; verified no keys after reset
Signed-off-by: Jeffrey Carlyle <jcarlyle@google.com>
Change-Id: I9bb569e09f8cd6f5640757bd0d10a14ef32946ff
2021-06-30 15:19:22 +09:00
Gazi Yamin Iqbal
2e1cafdfd8
Merge "gs101-sepolicy: allow rlsservice to read display status files" into sc-dev
2021-06-30 05:41:19 +00:00
Ted Lin
cb3ca1e87b
Remove dontaudit form tracking_denials for maxfg and regmap
...
Bug:190337297
Test: Check the bugreport
Change-Id: I0887e6256b4f158bd525ed66475cd1ef5672c9df
Signed-off-by: Ted Lin <tedlin@google.com>
2021-06-30 11:11:22 +08:00
Adam Shih
3ded724256
Merge "Avoid VTS testDataTypeViolators failure" into sc-dev
2021-06-30 01:45:29 +00:00
Kevin Han
1d54c8dd21
Merge "Revert "allow recovery and fastboot to access secure elment"" into sc-dev
2021-06-29 19:33:01 +00:00
Kevin Han
fd47b11162
Revert "allow recovery and fastboot to access secure elment"
...
Revert "add gs101-specific recovery library"
Revert "recovery: enable support for device-specific WipeSe impl..."
Revert "clear secure element of Digital Car Keys during factory ..."
Revert submission 14983788-clear_keys
Reason for revert: b/192373955
Reverted Changes:
Ia8fc29e6c:add gs101-specific recovery library
Icc1eabfd4:clear secure element of Digital Car Keys during fa...
I943d97b26:recovery: enable support for device-specific WipeS...
I15c7fbd7f:allow recovery and fastboot to access secure elmen...
Change-Id: Ic576b40641171298ad840bedbd4a9f7b67052d95
2021-06-29 19:19:24 +00:00
TreeHugger Robot
be3d2bf325
Merge "allow recovery and fastboot to access secure elment" into sc-dev
2021-06-29 17:50:35 +00:00
TreeHugger Robot
432ed9b527
Merge "Fix denial when flashing vendor_boot in fastbootd." into sc-dev
2021-06-29 17:04:07 +00:00
David Anderson
2354e3a924
Fix denial when flashing vendor_boot in fastbootd.
...
This mirrors the same sepolicy line in previous Pixel devices.
Bug: 189493387
Test: fastboot flash vendor_boot on r4
Change-Id: Ie15c8e6e5c01b249e1e5e244666c461253279f0b
2021-06-28 21:06:05 -07:00
Neo Yu
9c27ce91c8
Merge "Fix avc denied for getprop "vendor.radio.call_end_reason"" into sc-dev
2021-06-29 03:05:02 +00:00
TreeHugger Robot
15f7a61603
Merge "Sepolicy: Remove permission for fuel gauge" into sc-dev
2021-06-29 01:48:34 +00:00
neoyu
93944a8b1c
Fix avc denied for getprop "vendor.radio.call_end_reason"
...
06-10 11:13:02.867 10224 2377 2377 W libc : Access denied finding property "vendor.radio.call_end_reason"
Bug: 191204793
Test: error is gone with this fix
Change-Id: I50c1d21ba4e2343aa2cee0c533b8c3dbe535e4b5
2021-06-29 01:18:12 +00:00
TreeHugger Robot
22f27cb215
Merge "Sepolicy: Pixel stats wireless charger sepolicy" into sc-dev
2021-06-29 01:16:35 +00:00
Adam Shih
f9501fc87c
Avoid VTS testDataTypeViolators failure
...
Bug: 192209720
Test: run -m CtsSecurityHostTestCases -t android.security.cts.SELinuxHostTest
Change-Id: I9043c5adfb544179bceb0f6e5cf73c2b2ddd3d02
2021-06-29 07:58:57 +08:00
TreeHugger Robot
a63fbd68d4
Merge "Hardwareinfo: battery info porting" into sc-dev
2021-06-28 16:20:12 +00:00
Gazi Yamin Iqbal
4ea317bb6a
gs101-sepolicy: allow rlsservice to read display status files
...
major changes:
1. This change is to allow rlsservice to read the status of
display status file. Similar method was employed in previous
pixels.
Bug: 191122203
Test: p21 camera test checklist
Change-Id: I09483881294fd6dde46d4d0b7283311a2d20c404
2021-06-28 22:15:08 +08:00
TreeHugger Robot
407d0cf58d
Merge "gs101-sepolicy: add oemrilservice_app.te" into sc-dev
2021-06-27 01:47:21 +00:00
Jeffrey Carlyle
9ac870aa22
allow recovery and fastboot to access secure elment
...
This is to enable clearing of secure element during a master reset.
Bug: 182508814
Test: master reset on device with keys; verified no keys after reset
Signed-off-by: Jeffrey Carlyle <jcarlyle@google.com>
Change-Id: I15c7fbd7f2c4fb34dcad0ae4f5cee3238f526fa5
2021-06-25 17:54:29 -07:00
sukiliu
7ea816284d
Update avc error on ROM 7492139
...
avc: denied { call } for comm="servicemanager" scontext=u:r:servicemanager:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=binder permissive=0
Bug: 192040144
Test: PtsSELinuxTestCases
Change-Id: I2de11d2706222a88c4234d99399b7b2437f36e31
2021-06-25 14:40:17 +08:00
sukiliu
e31c8840de
Update avc error on ROM 7490489
...
avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:hal_uwb_default:s0 tclass=binder permissive=0
avc: denied { call } for comm="dumpstate" scontext=u:r:dumpstate:s0 tcontext=u:r:hal_uwb_default:s0 tclass=binder permissive=0
Bug: 192026913
Test: PtsSELinuxTestCases
Change-Id: Ieca08e87db1b46f3b7fc7de1492e45d4a5bec868
2021-06-25 09:42:51 +08:00
Ilya Matyukhin
f9828a9944
Merge "raviole: transition SystemUI to use HWC for LHBM" into sc-dev
2021-06-25 01:12:52 +00:00
Adam Shih
99bfde4f38
Merge "modularize dmd" into sc-dev
2021-06-25 01:12:50 +00:00
TreeHugger Robot
655f5cfd8f
Merge "vendor_init/dumpstate: Grant to access logger prop" into sc-dev
2021-06-24 10:02:11 +00:00
Adam Shih
9b0b96b907
Merge "modularize pktrouter" into sc-dev
2021-06-24 07:24:45 +00:00
Ilya Matyukhin
2460cdcc9f
raviole: transition SystemUI to use HWC for LHBM
...
This change removes direct access to the LHBM sysfs node from SystemUI,
but allows SystemUI to make binder calls to the hardware composer (HWC),
which can be used to enable or disable LHBM.
Bug: 191132545
Bug: 190563896
Bug: 184768835
Test: no avc denials
Change-Id: I5417377ff096e869ad772e4fd2fb23f8c1fd4f1e
2021-06-23 23:38:27 -07:00
Adam Shih
8b326703e1
modularize dmd
...
Bug: 190331463
Test: build ROM and make sure dmd is launched
Change-Id: If1e51b6bc100e870a15a40f5e0d93a75fe68bac3
2021-06-24 14:17:29 +08:00
Alex Hong
d912300853
Merge "Move the type definition of properties from product to vendor" into sc-dev
2021-06-24 02:15:36 +00:00
Alex Hong
e44e432672
Move the type definition of properties from product to vendor
...
These properties cannot be resolved after product sepolicy is replaced.
vendor_persist_config_default_prop
vendor_rild_prop
Test: The device can boot to home after replacing with GSI
Bug: 191236468
Change-Id: Ib797601a44306987e5a85897c7b6cd7827ad91b2
2021-06-24 02:01:20 +00:00
Minchan Kim
650cf48406
Merge "sepolicy: gs101: allow dump cma statistics" into sc-dev
2021-06-24 01:45:11 +00:00
Thierry Strudel
e99c749cbd
Merge "Add support for non-su hal_uwb" into sc-dev
2021-06-24 00:45:49 +00:00
Minchan Kim
7f9abeee45
sepolicy: gs101: allow dump cma statistics
...
Provide necessary sepolicy for bugreport dump to access cma metric
information under /sys/kernel/pixel_stat/*
Test: Run "adb bugreport <zip>" and verify it contains the output
from dumpstate_board.txt
Bug: 191904985
Signed-off-by: Minchan Kim <minchan@google.com>
Change-Id: Iaa92006eeb5158a0962652427d1af061fe1cf03d
2021-06-23 14:15:46 -07:00
TreeHugger Robot
c431abb5bf
Merge "Allow fingerprint hal to read sysfs_chosen" into sc-dev
2021-06-23 11:20:51 +00:00
Sungwoo choi
5aaa0f6044
gs101-sepolicy: add oemrilservice_app.te
...
Seperate oemrilservice_app.te from vendor_telephony_app.te.
- target process: com.samsung.slsi.telephony.oemril
- selabel: oemrilservice_app
- allow to find app_api_service
- allow to find radio_service
- allow to find vendor HAL
- a binder communication with rild
Bug: 191830874
Test: Manual
Signed-off-by: Sungwoo choi <sungwoo48.choi@samsung.com>
Change-Id: I5e31b4a16f0b4d25bf4889da0150084937354808
2021-06-23 16:51:57 +08:00
Kris Chen
a23d1bb37b
Allow fingerprint hal to read sysfs_chosen
...
Fixes the following avc denial:
android.hardwar: type=1400 audit(0.0:49): avc: denied { search } for name="chosen" dev="sysfs" ino=9575 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_chosen:s0 tclass=dir permissive=1
android.hardwar: type=1400 audit(0.0:50): avc: denied { read } for name="platform" dev="sysfs" ino=9591 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_chosen:s0 tclass=file permissive=1
android.hardwar: type=1400 audit(0.0:51): avc: denied { open } for path="/sys/firmware/devicetree/base/chosen/plat/platform" dev="sysfs" ino=9591 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_chosen:s0 tclass=file permissive=1
Bug: 191832617
Test: Enroll and authenticate fingerprints.
Change-Id: I5c576cc210d9e85b1999655bdc27736183db8aed
2021-06-23 16:20:57 +08:00
Denny cy Lee
433aeb2d4d
Sepolicy: Pixel stats wireless charger sepolicy
...
Bug: 171853251
Bug: 188601686
Test: manually, do wirelees charge, check logcat
Change-Id: I4cbd7da038365ae92e34780131056da61b9a55dc
Signed-off-by: Denny cy Lee <dennycylee@google.com>
2021-06-23 06:48:42 +00:00
Denny cy Lee
0b21a2d44a
Pixelstat: battery history access premission
...
Test: manually, relate seploicy not show; battery history log printed
05-24 13:29:19.637 2829 2829 D pixelstats_BatteryEEPROM:
checkAndReport: 0940 0a80 0500 0200 0200 0000
Bug: 189050725
Change-Id: I20567e168db43fe2168a9a30ac7a4b0cec65a665
Signed-off-by: Denny cy Lee <dennycylee@google.com>
2021-06-23 13:50:32 +08:00
Adam Shih
a70819d2f0
modularize pktrouter
...
Bug: 190331212
Test: make sure pktrouter gets initialized
06-23 13:21:19.372 1 1 I init : Parsing file /vendor/etc/init/pktrouter.rc...
06-23 13:21:23.510 1 1 I init : processing action (vendor.pktrouter=1) from (/vendor/etc/init/pktrouter.rc:7)
06-23 13:21:23.510 1 1 I init : starting service 'pktrouter'...
Change-Id: Icc7ab88505aea47cfed5ffc5182d0625b7a7609d
2021-06-23 05:24:01 +00:00
SalmaxChang
a926055749
vendor_init/dumpstate: Grant to access logger prop
...
Bug: 176176656
Change-Id: I551ccfac57d983aab95aa23e1f350f78ee0a159f
2021-06-23 10:06:09 +08:00
Michael Ayoubi
cebbf14174
Add support for non-su hal_uwb
...
Bug: 187386527
Test: Boot and confirm HAL is up
Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: Ia9f3f90fba6981762fe375aa37c81f8474ad9c53
2021-06-23 01:26:25 +00:00
Adam Shih
d74e989739
modulize init.radio.sh
...
Bug: 190331600
Test: build ROM and make sure the file is there and functional.
Change-Id: Icb3e0e590ae315d53eb5251fd5e74d6aacab1fe2
2021-06-23 01:07:26 +00:00
TreeHugger Robot
e2ef28efca
Merge "Allow camera hal to access devfreq query" into sc-dev
2021-06-22 12:06:16 +00:00
Speth Chang
419019a71a
Allow camera hal to access devfreq query
...
Bug: 190687351
Test: p21 checklist
Change-Id: Id0cb74b483882a6ede93cadc475a7be334ecf20d
2021-06-22 10:19:49 +00:00
Alex Hong
1f17829dc2
Merge "Move the genfs_contexts of sched nodes from vendor to product" into sc-dev
2021-06-22 03:01:07 +00:00
Alex Hong
c598db170c
Move the genfs_contexts of sched nodes from vendor to product
...
For sched nodes, "proc_vendor_sched" and "sysfs_vendor_sched",
their type definition is in product sepolicy,
while genfs_contexts is in vendor sepolicy.
In this case, genfs_contexts cannot be resolved after product sepolicy
is replaced by Dynamic System Update.
Need to keep the type definition and genfs_contexts in the same partition.
Now move genfs_contexts because the type definition has to be in product for now
since other private domains are accessing these sched nodes.
Test: $ make selinux_policy
The device can boot to home after replacing with GSI.
Bug: 191236468
Change-Id: I02ea78b04dfcade4ceb426ff6ebf498daa81ac32
2021-06-21 14:55:08 +00:00
Srinivas Patibandla
51c891fa7b
Update time sync seinfo to not use platform signature
...
Bug: b/190695230
Change-Id: I2dbee2e624c8794b3aa9ff85d8985a15ee159a0f
2021-06-21 14:47:28 +00:00
Thiebaud Weksteen
c4d98b5c11
Merge "Fix access permissions for sysfs_aoc_reset" into sc-dev
2021-06-21 08:38:37 +00:00
Jack Wu
2794370557
sepolicy: gs101: allows pixelstat to access wlc file nodes
...
05-31 11:14:57.280 1000 3126 3126 W pixelstats-vend: type=1400 audit(0.0:162): avc: denied { search } for name="i2c-p9412" dev="sysfs" ino=60862 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=0
05-31 11:14:57.280 1000 3126 3126 W pixelstats-vend: type=1400 audit(0.0:163): avc: denied { search } for name="i2c-p9412" dev="sysfs" ino=60862 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=0
05-31 13:12:23.940 1000 2838 2838 W pixelstats-vend: type=1400 audit(0.0:182): avc: denied { read } for name="charge_stats" dev="sysfs" ino=73276 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
05-31 15:02:02.215 1000 13169 13169 W pixelstats-vend: type=1400 audit(0.0:166): avc: denied { write } for name="charge_stats" dev="sysfs" ino=73483 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
05-31 15:02:02.215 1000 13169 13169 W pixelstats-vend: type=1400 audit(0.0:167): avc: denied { write } for name="charge_stats" dev="sysfs" ino=73483 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
Bug: 176195960
Test: manually test, no avc: denied
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I0af03dd8099e246c5f94e8e8530d7b2bcf50ff95
2021-06-18 13:50:59 +00:00
Franklin He
6a488b8a81
Merge "Add new sepolicy to allow Power Hint" into sc-dev
2021-06-18 08:37:19 +00:00
Krzysztof Kosiński
c18265aaaa
Merge changes I18cbcf1b,I28a27741 into sc-dev
...
* changes:
Allow camera HAL to set vendor.camera properties
Allow rlsservice/camera HAL to read /apex/apex-info-list.xml
2021-06-18 07:46:33 +00:00