Commit graph

485 commits

Author SHA1 Message Date
Yu-Chi Cheng
b989b6c2d5 Merge "Added the SELinux rule for the EdgeTPU vendor service." into sc-dev am: 7eef8643a3
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14299125

Change-Id: I7413d1da70dc4e5a5895296f7dde4be3dde45291
2021-05-04 20:11:24 +00:00
Yu-Chi Cheng
7eef8643a3 Merge "Added the SELinux rule for the EdgeTPU vendor service." into sc-dev 2021-05-04 19:39:32 +00:00
Yu-Chi Cheng
b844190a34 Added the SELinux rule for the EdgeTPU vendor service.
To comply with the GSI compliance test, this change
splits the compiler part of the edgetpu_service into a
separate edgetpu_vendor_service under vendor.

The edgetpu_service locates under /system_ext/ and used
to be connected by both applications and vendor clients.
With this change, vendor clients could talk to the vendor
part of this service directly without having to cross
the system and vendor boundary.

Applications will still talk to the system_ext one, which
will forward the requests to the vendor service.

Bug: 185432427
Test: tested on Oriole + GCA.
Change-Id: I1ee47946f1fc3694d5f8b5325c192d6bd720a76e
2021-05-04 10:36:21 -07:00
Daniel Mentz
dfd70f5140 Merge "Remove /vendor/lib/modules from file_contexts" into sc-dev am: 48e3555770
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14416770

Change-Id: Id338f87631bcd0dac2a8f98cf85c3372b0b5fe84
2021-05-04 04:49:30 +00:00
Daniel Mentz
48e3555770 Merge "Remove /vendor/lib/modules from file_contexts" into sc-dev 2021-05-04 04:28:49 +00:00
Daniel Mentz
3d63e648fa Merge "Revert "remove wildcard on kernel modules"" into sc-dev am: 1473b1d155
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14393364

Change-Id: I108e79936a1bf016b84e3442eca15d559b5b09d0
2021-05-04 04:15:30 +00:00
TreeHugger Robot
869798380a Merge changes from topic "tcpdump_logger" into sc-dev am: 3186a0f24c
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14048497

Change-Id: I4ac7202553d43883b405b68b9342e056bcfadfe3
2021-05-04 04:15:25 +00:00
lucaslin
a068c23698 Add sepolicy for tcpdump_logger to access wlan_logs folder am: 4099f60681
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14410096

Change-Id: Ib593cb56d978978d6a2dce2649ce7eb83dbcc565
2021-05-04 04:15:24 +00:00
Daniel Mentz
1473b1d155 Merge "Revert "remove wildcard on kernel modules"" into sc-dev 2021-05-04 03:50:16 +00:00
TreeHugger Robot
3186a0f24c Merge changes from topic "tcpdump_logger" into sc-dev
* changes:
  Add sepolicy for dumpstate to access logs of tcpdump_logger
  Add sepolicy for tcpdump_logger to access wlan_logs folder
2021-05-04 03:48:04 +00:00
Jenny Ho
e6334ffd7c Merge "set sepolicy for testing_battery_profile" into sc-dev am: 93e25c878a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14409676

Change-Id: Id42c10ec5258075cea310766db6e72c75e602820
2021-05-04 03:06:09 +00:00
Jenny Ho
93e25c878a Merge "set sepolicy for testing_battery_profile" into sc-dev 2021-05-04 02:48:41 +00:00
lucaslin
34278f05a0 Add sepolicy for dumpstate to access logs of tcpdump_logger
Bug: 183467815
Test: 1. Enable tcpdump_logger always-on function
      2. Dump bugreport
      3. Pull dumpstate_board.bin and chagne it to zip
      4. Unzip dumpstate_board.zip and check if tcpdump files
         are there.
Change-Id: I178aca40d94602994eef619f05a26ceb78eeff1f
2021-05-04 10:30:22 +08:00
Daniel Mentz
2fb432f08c Remove /vendor/lib/modules from file_contexts
Vendor kernel modules were moved to /vendor_dlkm/lib/modules. Let's
remove the old directory /vendor/lib/modules from file_contexts.

Bug: 185184472
Bug: 186777291
Change-Id: I38f1b25cb2d73a804f1cdb113edc9b11f8e516f7
2021-05-03 18:16:05 -07:00
Daniel Mentz
a3c0b2ba9e Revert "remove wildcard on kernel modules"
This reverts commit a346a7fa34.

Let's move back to wildcards for kernel modules. This better supports
kernel pre-submit testing and local kernel development where the script
build.sh from the kernel repo is used to create the vendor_dlkm parition
image.  With build.sh, the path to a .ko file includes the kernel
version as well as additional directory components like "extra/" that
describe where in the kernel source key the module is located. Example:

/vendor_dlkm/lib/modules/5.10.33-g2f01cf4c7282-dirty/extra/ftm5.ko

Bug: 185184472
Bug: 186777291
Change-Id: I32f85dae7ca60d9063ad6c63f21ffdaecbb66039
2021-05-03 15:38:56 -07:00
SHUCHI LILU
1ed37f06e9 Merge "Update avc error on ROM 7330059" into sc-dev am: 1d6ffc2305
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14408671

Change-Id: I80d6669d7fc3c072d41469754fa4ba238925948e
2021-05-03 09:51:00 +00:00
SHUCHI LILU
1d6ffc2305 Merge "Update avc error on ROM 7330059" into sc-dev 2021-05-03 09:34:35 +00:00
TreeHugger Robot
76c9592ec4 Merge "update error on ROM 7331131" into sc-dev am: 4ae391d780
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14409678

Change-Id: I352882dc64ceff300d4a69cc3cf1b9f77bdd7c84
2021-05-03 09:11:39 +00:00
TreeHugger Robot
4ae391d780 Merge "update error on ROM 7331131" into sc-dev 2021-05-03 08:56:20 +00:00
lucaslin
4099f60681 Add sepolicy for tcpdump_logger to access wlan_logs folder
tcpdump cannot be zipped into wlan logs when using tcpdump_logger
on-demand function is because tcpdump_logger doesn't have access
of wlan_logs folder.
Add related sepolicies to fix it.

Bug: 183467815
Test: 1. Set logger to wlan
      2. Enable tcpdump_logger on-demand
      3. Start logging
      4. Stop logging
      5. Pull wlan_logs
      6. Check if tcpdump.pcap is zipped into the zip file
Change-Id: Ib1b6c8cbd4512acdbe756d11bfe6f540e16c8db6
2021-05-03 16:29:18 +08:00
TreeHugger Robot
d51f97bd33 Merge "Add sepolicy for sensor HAL accessing AOC sysfs node." into sc-dev am: 2391c852bd
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14327406

Change-Id: I5757a039510386f588b934debeb279312f3f3f8d
2021-05-03 07:57:01 +00:00
Adam Shih
722b181dd3 update error on ROM 7331131
Bug: 187016929
Bug: 187016930
Bug: 187016910
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: I294a27fd272f73cc371a4a8dc9783ba5f60203ff
2021-05-03 15:48:46 +08:00
Jenny Ho
4510c55091 set sepolicy for testing_battery_profile
need run /vendor/bin/sh before setprop

Bug: 180511460
Signed-off-by: Jenny Ho <hsiufangho@google.com>
Change-Id: I3dbaa984407c82662dea537da671745851035fa2
2021-05-03 15:47:14 +08:00
TreeHugger Robot
2391c852bd Merge "Add sepolicy for sensor HAL accessing AOC sysfs node." into sc-dev 2021-05-03 07:42:00 +00:00
sukiliu
58238158ab Update avc error on ROM 7330059
Bug: 187014717
Bug: 187015705
Bug: 187015816
Test: PtsSELinuxTestCases
Change-Id: I2d79fee24d18865090cd350485daea4e66bb5184
2021-05-03 15:25:20 +08:00
Eddie Lan
94500a15a8 Merge "Add sepolicy for fpc AIDL HAL" into sc-dev am: 2d4071ca8c
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14282485

Change-Id: I6803cbc12ccf7eb331ceb98eeae12a23e7d0b77d
2021-05-03 04:06:44 +00:00
Eddie Lan
2d4071ca8c Merge "Add sepolicy for fpc AIDL HAL" into sc-dev 2021-05-03 03:48:40 +00:00
TreeHugger Robot
e72dd4fc97 Merge "Provide fastbootd permissions to invoke the set_active command" into sc-dev am: 1256869c5c
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14391698

Change-Id: I7c45dee73fa499b2188126ec642c64e6921a6999
2021-05-03 03:36:00 +00:00
TreeHugger Robot
1256869c5c Merge "Provide fastbootd permissions to invoke the set_active command" into sc-dev 2021-05-03 03:19:23 +00:00
Hridya Valsaraju
1711a2d5c7 Provide fastbootd permissions to invoke the set_active command
These permissions fix the following denials:
[   66.641731][   T59] audit: type=1400 audit(1619815760.952:17): avc:
denied  { open } for  pid=360 comm="fastbootd" path="/dev/block/sdd1"
dev="tmpfs" ino=416 scontext=u:r:fastbootd:s0
tcontext=u:object_r:devinfo_block_device:s0 tclass=blk_file permissive=1
[   66.664509][   T59] audit: type=1400 audit(1619815760.952:18): avc:
denied  { write } for  pid=360 comm="fastbootd" name="sdd1" dev="tmpfs"
ino=416 scontext=u:r:fastbootd:s0
tcontext=u:object_r:devinfo_block_device:s0 tclass=blk_file permissive=1
[   66.686431][   T59] audit: type=1400 audit(1619815760.952:19): avc:
denied  { read write } for  pid=360 comm="fastbootd"
name="boot_lun_enabled" dev="sysfs" ino=57569 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
[   66.708623][   T59] audit: type=1400 audit(1619815760.952:20): avc:
denied  { open } for  pid=360 comm="fastbootd"
path="/sys/devices/platform/14700000.ufs/pixel/boot_lun_enabled"
dev="sysfs" ino=57569 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
[   56.680861][   T59] audit: type=1400 audit(1619806507.020:10): avc:
denied  { read write } for  pid=357 comm="fastbootd" name="sda"
dev="tmpfs" ino=476 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sda_block_device:s0 tclass=blk_file permissive=0

Test: fastboot set_active
Bug: 185955438
Change-Id: I9339b2a5f2a00c9e1768f479fdeac2e1f27f04bc
2021-04-30 14:37:58 -07:00
TreeHugger Robot
0adcb526f5 Merge "Remove platform certification from imsservice" into sc-dev am: 6a5cfd86f5
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14343989

Change-Id: I6c66e6103c284a46e57efb5760226139e8e2a965
2021-04-30 17:01:41 +00:00
TreeHugger Robot
6a5cfd86f5 Merge "Remove platform certification from imsservice" into sc-dev 2021-04-30 16:55:56 +00:00
TreeHugger Robot
5c14296690 Merge "Update gs101 sepolicy for contexthub HAL" into sc-dev am: ff7948fc48
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14354723

Change-Id: Ibba6e73ddecc5a7984dc59900f256ad9a1ff114f
2021-04-30 16:54:08 +00:00
TreeHugger Robot
ff7948fc48 Merge "Update gs101 sepolicy for contexthub HAL" into sc-dev 2021-04-30 16:34:37 +00:00
TreeHugger Robot
521d0635f1 Merge "sepolicy:gs101: allow init-insmod-sh to access sysfs_leds nodes" into sc-dev am: c134ed985a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14357213

Change-Id: Idd9f94fa544f5a2248cc68f8bb93e1bd155fb8f0
2021-04-29 23:14:57 +00:00
TreeHugger Robot
c134ed985a Merge "sepolicy:gs101: allow init-insmod-sh to access sysfs_leds nodes" into sc-dev 2021-04-29 22:48:22 +00:00
TreeHugger Robot
52ba04007b Merge "change persist.camera to persit.vendor.camera" into sc-dev am: 2c4b0fd96a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14356785

Change-Id: Idb7fed4b35a5342936aa4247c79a20077ca82083
2021-04-29 21:44:32 +00:00
Oleg Matcovschi
963848fdaa sepolicy:gs101: allow init-insmod-sh to access sysfs_leds nodes
Bug: 186788772
Signed-off-by: Oleg Matcovschi <omatcovschi@google.com>
Change-Id: I9cc44571eb5c8f52d6307bff9cb77f08712c5404
2021-04-29 14:34:55 -07:00
TreeHugger Robot
2c4b0fd96a Merge "change persist.camera to persit.vendor.camera" into sc-dev 2021-04-29 21:26:12 +00:00
Lida Wang
bb7ae85a0d change persist.camera to persit.vendor.camera
Bug: 186670529
Change-Id: I3a6d4202ec2b90cc0ce9cc9ba62d2cf2ce3a5c29
2021-04-29 13:18:01 -07:00
Anthony Stange
836f25d64b Update gs101 sepolicy for contexthub HAL
Bug: 168941570
Test: Load nanoapp via HAL
Change-Id: If133a3290e4fc02677523d737980ee5944885c36
2021-04-29 16:59:36 +00:00
TreeHugger Robot
18525b89e6 Merge "Add sepolicy for sensor HAL to read lhbm" into sc-dev am: 7a4cd3a6e0
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14299201

Change-Id: Ib1331ad73723ea5518f0e80d0a52f64d008255a8
2021-04-29 16:33:03 +00:00
TreeHugger Robot
7a4cd3a6e0 Merge "Add sepolicy for sensor HAL to read lhbm" into sc-dev 2021-04-29 15:48:15 +00:00
Taesoon Park
b6f2b0bad9 Remove platform certification from imsservice
The platform certification is removed form com.shannon.imsservice.
So, remove seinfo from com.shannon.imsservice item.

Bug: 186135657
Test: VoLTE and VoWiFi

Signed-off-by: Taesoon Park <ts89.park@samsung.com>
Change-Id: Ie493abfd7a146766ad819bb7a5240d9f1e2f1d0e
2021-04-29 11:28:08 +08:00
Chia-Ching Yu
3f91d6417a Add sepolicy for sensor HAL to read lhbm
04-23 08:54:18.000   742   742 I /vendor/bin/hw/android.hardware.sensors@2.0-service.multihal: type=1400 audit(0.0:23): avc: denied { read } for comm=504F5349582074696D6572203430 name="local_hbm_mode" dev="sysfs" ino=70515 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs_lhbm:s0 tclass=file permissive=1

Bug: 181617640
Test: Forrest build with this patch(ab/P22167685).
      No local_hbm_mode related avc deined log.
Change-Id: Ibac3317cbca8652885310b1f5af8f4ea4d44a5c4
2021-04-29 03:00:19 +00:00
TreeHugger Robot
cbce7f27e3 Merge "Fix android.hardware.drm@1.4-service.clearkey label" into sc-dev am: 7ecd67743c
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14340676

Change-Id: I161a70490c9e985c731c4880cce9b0aeda19276f
2021-04-28 23:12:22 +00:00
TreeHugger Robot
7ecd67743c Merge "Fix android.hardware.drm@1.4-service.clearkey label" into sc-dev 2021-04-28 22:26:38 +00:00
Victor Liu
2d6895ee81 Merge "uwb: allow uwb service to access nfc service" into sc-dev am: 247097a000
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14281933

Change-Id: I25542ed6cc608427679b8b347d6e60aaad7d9014
2021-04-28 21:22:23 +00:00
Victor Liu
247097a000 Merge "uwb: allow uwb service to access nfc service" into sc-dev 2021-04-28 20:49:50 +00:00
Chris Fries
2d2adb3e56 Fix android.hardware.drm@1.4-service.clearkey label
Bug: 186617617
Change-Id: Icad8008686ef57d4b6c3fca27af41e2b2991f74f
2021-04-28 14:40:02 -05:00