Commit graph

1906 commits

Author SHA1 Message Date
Adam Shih
89923acb04 review radio app
Bug: 198532074
Test: boot with app correctly labeled
Change-Id: Iba1f5c949052fafca8e629aba24484a7705f3f21
2021-09-08 11:27:34 +08:00
Adam Shih
948098bcd6 review hal_radioext_default
Bug: 198532074
Test: boot with hal_radioext_default started
Change-Id: I083fd55749f0d82cabe527e7fa611ad2633d0ecd
2021-09-08 10:54:34 +08:00
Adam Shih
aef3b66218 review con_monitor
bug: 198532074
Test: boot with the app labeled
Change-Id: I1d268c292603aabb25e5e626f442b39a7ad7b4e7
2021-09-06 11:31:36 +08:00
Adam Shih
2fc26d0a5e refactor ims app
Bug: 198532074
Test: boot with those apps labeled correctly
Change-Id: I15c559551b7af8a9688b4e489b6daeba032da308
2021-09-06 11:24:37 +08:00
Adam Shih
6f97e91778 review init.radio.sh
Bug: 198532074
Test: boot with init.radio.sh started
Change-Id: Ieb47925b319866cc648e4de9b34fc3153ba1717b
2021-09-06 10:59:10 +08:00
Adam Shih
98ebd6e7f1 review tee
Bug: 198723116
Test: boot with tee started
Change-Id: Ib50698834d16887fa00bdbbaf81801f1067909ba
2021-09-03 15:26:51 +08:00
Adam Shih
b05c0902ad refactor hal_secure_element
01-01 20:00:07.579   419   419 E SELinux : avc:  denied  { find } for interface=android.hardware.secure_element::ISecureElement sid=u:r:hal_secure_element_gto_ese2:s0 pid=748 scontext=u:r:hal_secure_element_gto_ese2:s0 tcontext=u:object_r:hal_secure_element_hwservice:s0 tclass=hwservice_manager permissive=1
01-01 20:00:07.595   419   419 E SELinux : avc:  denied  { add } for interface=android.hardware.secure_element::ISecureElement sid=u:r:hal_secure_element_gto_ese2:s0 pid=748 scontext=u:r:hal_secure_element_gto_ese2:s0 tcontext=u:object_r:hal_secure_element_hwservice:s0 tclass=hwservice_manager permissive=1
01-01 20:00:07.596   419   419 E SELinux : avc:  denied  { add } for interface=android.hidl.base::IBase sid=u:r:hal_secure_element_gto_ese2:s0 pid=748 scontext=u:r:hal_secure_element_gto_ese2:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
01-01 20:00:07.597   419   419 E SELinux : avc:  denied  { find } for interface=android.hardware.secure_element::ISecureElement sid=u:r:hal_secure_element_gto:s0 pid=749 scontext=u:r:hal_secure_element_gto:s0 tcontext=u:object_r:hal_secure_element_hwservice:s0 tclass=hwservice_manager permissive=1
01-01 20:00:07.597   419   419 E SELinux : avc:  denied  { find } for interface=android.hardware.secure_element::ISecureElement sid=u:r:hal_secure_element_uicc:s0 pid=750 scontext=u:r:hal_secure_element_uicc:s0 tcontext=u:object_r:hal_secure_element_hwservice:s0 tclass=hwservice_manager permissive=1
01-01 20:00:07.599   419   419 E SELinux : avc:  denied  { add } for interface=android.hardware.secure_element::ISecureElement sid=u:r:hal_secure_element_uicc:s0 pid=750 scontext=u:r:hal_secure_element_uicc:s0 tcontext=u:object_r:hal_secure_element_hwservice:s0 tclass=hwservice_manager permissive=1
01-01 20:00:07.600   419   419 E SELinux : avc:  denied  { add } for interface=android.hidl.base::IBase sid=u:r:hal_secure_element_uicc:s0 pid=750 scontext=u:r:hal_secure_element_uicc:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
01-01 20:00:07.601   419   419 E SELinux : avc:  denied  { add } for interface=android.hardware.secure_element::ISecureElement sid=u:r:hal_secure_element_gto:s0 pid=749 scontext=u:r:hal_secure_element_gto:s0 tcontext=u:object_r:hal_secure_element_hwservice:s0 tclass=hwservice_manager permissive=1
01-01 20:00:07.602   419   419 E SELinux : avc:  denied  { add } for interface=android.hidl.base::IBase sid=u:r:hal_secure_element_gto:s0 pid=749 scontext=u:r:hal_secure_element_gto:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
09-03 10:51:44.574   419   419 E SELinux : avc:  denied  { find } for interface=vendor.samsung_slsi.telephony.hardware.radioExternal::IOemSlsiRadioExternal sid=u:r:hal_secure_element_uicc:s0 pid=750 scontext=u:r:hal_secure_element_uicc:s0 tcontext=u:object_r:hal_exynos_rild_hwservice:s0 tclass=hwservice_manager permissive=1
Bug: 198713948
Test: boot with secure_element started
Change-Id: Ie79b80f3c0fbe21c898e6a67384d98a2cc282f93

Change-Id: I14d9f01b6ef901fd87e8927d691ce96a9b174ed3
2021-09-03 15:26:38 +08:00
Adam Shih
18fb79d460 review rild
Bug: 198532074
Test: boot with rild started
Change-Id: Ic29d2cbbb9691f1386c024d1438fdd050ef14b8f
2021-09-03 15:25:10 +08:00
Kyle Tso
7295743ea6 Add file context for /dev/logbuffer_tcpm
/dev/logbuffer_tcpm gets accessed by dumpstate while bugreport
generation.

(Port of ag/15019635)

Bug: 189792358
Signed-off-by: Kyle Tso <kyletso@google.com>
Change-Id: Id73f7c884f45364b5386a9fe13900cb94d914520
2021-09-03 11:57:59 +08:00
Adam Shih
7a20b1d9c0 Merge changes I183c75b5,I938fe187,Ic3e07e73
* changes:
  review rfsd
  review bootdevice_sysdev
  review mount and block devices
2021-09-03 02:03:02 +00:00
Adam Shih
ff91ffd98a review rfsd
Bug: 198532074
Test: boot with rfsd started
Change-Id: I183c75b5fad35eec56fbca693896c94f7a1ca410
2021-09-02 14:48:13 +08:00
Adam Shih
a90c8fe1b5 review bootdevice_sysdev
Bug: 196916111
Test: boot with bootdevice_sysdev labeled
Change-Id: I938fe18718356bf4156bb55937528a1ca3e072fb
2021-09-02 13:24:46 +08:00
Adam Shih
91d989bca4 review mount and block devices
Bug: 196916111
Test: make sure all path under ufs is labeled
Change-Id: Ic3e07e7341f838f54c483ab8b272407a70f1f8f2
2021-09-02 12:49:38 +08:00
Adam Shih
59b7224754 Merge changes I30184915,Iced4bfaa
* changes:
  review modem_svc_sit
  review cbd
2021-09-02 04:22:17 +00:00
Adam Shih
ee0c81fbc6 review modem_svc_sit
Bug: 198532074
Test: boot with modem_svc_sit started
Change-Id: I3018491564eb3bb5dafc5e9ad6446f353d54b18b
2021-09-02 11:41:59 +08:00
Adam Shih
c6111a8666 review cbd
Bug: 198532074
Test: boot with cbd started
Change-Id: Iced4bfaa9ea8e749cc0a8cb7a8da91abfc88d765
2021-09-02 11:41:48 +08:00
Adam Shih
3a8ed7968c sscoredump: remove sepolicy
Bug: 198365717
Test: build ROM with sscoredump started
Change-Id: I3fd72ed6958bd0a95947dbf513f5ba658a229948
2021-09-02 01:24:39 +00:00
Adam Shih
f5ed5632e2 review recovery related operations
Bug: 196916111
Test: make sure the files are labeled correctly (ls -Z)
Change-Id: I735de8b9635c7852a18ec8f32733cb0a0abd38f3
2021-08-30 14:45:29 +08:00
Adam Shih
ffc779eaa8 review chre
Bug: 198109521
Test: boot with chre started
Change-Id: Ibca6cc3ca0049a412d36e433cb5dcb3363d60527
2021-08-30 14:02:30 +08:00
Adam Shih
e1db507a06 review cbrs app
Bug: 198107733
Test: boot with app launched.
Change-Id: I6e32a4ff04f84bba42060bffadf82466f1c7a749
2021-08-30 13:30:56 +08:00
Adam Shih
2220917375 review bipchmgr
Bug: 198102284
Test: boot with bipchmgr started
Change-Id: I29a35ac4c93749481fe08edd3c1f25bffd013224
2021-08-30 10:40:57 +08:00
Adam Shih
49784e0285 modularize gpsd
Bug: 197914244
Test: boot with gpsd started
Change-Id: I4bcb0b55f95609a770810d676e8496c389b5cc73
2021-08-27 12:08:37 +08:00
Adam Shih
d646306b48 modularize hal_gnss_default
Bug: 197914244
Test: boot with hal_gnss_default started
Change-Id: I7b3d71fb9ae151363e3ce54587721ffe04d42b55
2021-08-27 11:38:00 +08:00
Adam Shih
99ab56746a modularize lhd
Bug: 197914244
Test: boot with lhd started
Change-Id: I873a151e4dc6e512b8831b936c3e057ae544888c
2021-08-27 11:29:09 +08:00
Adam Shih
8f611991f7 modularize scd
Bug: 197914244
Test: boot with scd started
Change-Id: If2c033e9aaf33b47f2fe5db3507fac052dcaef1a
2021-08-27 11:16:47 +08:00
Adam Shih
2cdc065832 Merge changes from topic "aoc-module"
* changes:
  modularize hal_audiometricext_default
  modularize hal_audio_default
  modularize aocdump
  modularize aocd
2021-08-26 02:47:17 +00:00
Adam Shih
7d4d5a8940 modularize hal_audiometricext_default
Bug: 197585437
Test: boot with hal_audiometricext_default initialized
Change-Id: I3d9aa576af2faefd2b03b911141d5ffdafc7902e
2021-08-25 15:40:02 +08:00
Roshan Pius
6ec775cffd Merge "gs201-sepolicy: Rename hal_uwb -> hal_uwb_vendor" 2021-08-25 00:49:38 +00:00
Adam Shih
d9c4ed7b59 modularize hal_audio_default
Bug: 197585437
Test: boot with hal_audio_default initialized
Change-Id: I90435ffa66d342ee5c96bcb872d2ebefe5b4ef7c
2021-08-24 15:18:53 +08:00
Adam Shih
ee94f61357 modularize aocdump
Bug: 197585437
Test: build ROM with aocdump labeled correctly
Change-Id: Ia2c2877a337bca6711d0f15a309b9012624ce76b
2021-08-24 14:31:54 +08:00
Adam Shih
1eeb466b55 modularize aocd
Bug: 197585437
Test: boot with aoc started
Change-Id: Ib8f3aad606f8a2c3d5d5a75287816ab4cb8318a8
2021-08-24 13:57:53 +08:00
Roshan Pius
6fc63f75c3 gs201-sepolicy: Rename hal_uwb -> hal_uwb_vendor
Since we are now creating an AOSP HAL for uwb. Rename qorvo's internal
HAL to hal_uwb_vendor to avoid conflicts with the AOSP HAL sepolicy
rules.

Bug: 195308730
Test: Compiles
Change-Id: I0c06a9d191d6bf2f2e5c66f70be0c7f8e8aa96b4
2021-08-23 13:05:58 -07:00
Adam Shih
72ad95d1eb review vcd and remove obsolete declarations
Bug: 196916111
Test: boot with vcd started
Change-Id: Ic82975e998dad4437c38afc625a7a88428417b7a
2021-08-23 14:06:17 +08:00
Adam Shih
dcf0597594 review sced
Bug: 196916111
Test: boot with sced started
Change-Id: I9140b5bc0f7ad4efedbbbcf58f9e773e5246df74
2021-08-23 11:45:31 +08:00
Adam Shih
5656f81f62 reuse gs101 confirmation UI
Bug: 196916111
Test: boot with confirmation UI started
Change-Id: I39ff3c0eecb017bb78118a1f7b42c8ce87eda971
2021-08-23 10:56:10 +08:00
Adam Shih
6dc0391fab reuse gs101 pktrouter
Bug: 196916111
Test: boot with pktrouter launched
Change-Id: Ie901adcba877aa11fcae188e360538c38184db00
2021-08-23 10:26:58 +08:00
Adam Shih
e7538e644a review modem_logging_control
Bug: 196916111
Test: boot with modem_logging_control launched
Change-Id: I16c810298343310003a626397d88861f47c5a207
2021-08-18 11:21:15 +08:00
Adam Shih
b12473a9de review modem_diagnostic_app
Bug: 196916111
Test: boot with modem_diagnostic_app running
Change-Id: Ic79f2048f840845ba73cc4d0853371a50ce63317
2021-08-18 11:07:37 +08:00
Adam Shih
c2582ecc01 review dmd sepolicy
Bug: 196916111
Test: boot with dmd launched successfully
Change-Id: Ic962ab09dcd7697c27f9b2ab68400a0060573888
2021-08-18 09:46:29 +08:00
Adam Shih
c1ffe9c177 Initialize gs201 to zero
Bug: 196916111
Test: boot to home with all services launched
Change-Id: I3453fc01cec5fd7b2b2a44a6f20c64e818ce1acd
2021-08-18 09:46:14 +08:00
Petri Gynther
471fb507d1 Add vbmeta_vendor_[ab] to file_contexts
Bug: 197026498
Change-Id: Icd6a6ac7b2cd302a7bc2032241ff1a540eaa5024
2021-08-17 17:30:47 -07:00
TreeHugger Robot
2d2ddfca10 Merge "storage: update sepolicy for hardwareinfoservice" 2021-08-17 21:26:55 +00:00
Ocean Chen
827b204adb storage: update sepolicy for hardwareinfoservice
Bug: 188793183
Test: run pixel/022
Change-Id: I921c4eae0744278896007183a7947f281925b24f
2021-08-17 16:25:46 +00:00
Richard Hsu
63bf045d2a Merge "[Bringup] Add Janeiro sysfs(s) to part of sysfs_edgetpu group" 2021-08-13 01:27:22 +00:00
Richard Hsu
da3b06d9c4 [Bringup] Add Janeiro sysfs(s) to part of sysfs_edgetpu group
For the logging service to access sysfs, the sysfs needs to be included in the sysfs_edgetpu group. This CL makes gs201 sepolicy on par with the gs101 version, by including janeiro (PRO) in the gs201 setup.

gs101 genfs file: https://source.corp.google.com/sc-dev/device/google/gs101-sepolicy/edgetpu/genfs_contexts;l=2?q=sysfs_edgetpu&ct=os

Bug: 196105736

Test: Restarted logging service on cloudripper. No AVC denial.

Change-Id: I4d5fa33e1110c28904f7fffea0024d7688387b11
2021-08-12 15:54:22 -07:00
Jiyong Park
3652d4beda Remove ndk_platform backend. Use the ndk backend.
The ndk_platform backend will soon be deprecated because the ndk backend
can serve the same purpose. This is to eliminate the confusion about
having two variants (ndk and ndk_platform) for the same ndk backend.

Bug: 161456198
Test: m
Change-Id: Icc9af3798ac89742fa56b1cb37d8116d99b4a9c2
2021-08-10 03:15:31 +00:00
Rick Yiu
0d404b7105 gs201-sepolicy: Remove sysfs_vendor_sched
Moved to system/sepolicy.

Bug: 194656257
Test: build pass
Change-Id: I5b392d001495d77408f2078f3a8e0f9d1eec6e65
2021-07-30 00:45:03 +00:00
Armelle Laine
c6ac9f51a4 Replace se-policy of the deprecated Keymaster HAL with Keymint HAL's
Bug: 193715461
Test: `vendor.keymint-trusty` service up
Change-Id: Ib5d5234a0501c93f56dbdfc2e4796d50e7f0be3a
Signed-off-by: Armelle Laine <armellel@google.com>
2021-07-15 00:18:07 +00:00
Ted Wang
d33073eba5 Grant sepolicy for Bluetooth Ccc Timesync feature
Add sepolicy rules for Bluetooth Ccc Timessync

Bug: 191846449
Test: make
Change-Id: Ibca95f7a9bd1da7b2c599d97f46856322e7f3487
2021-06-29 16:39:31 +08:00
Armelle Laine
ba494ca01d Add se-policy to /dev/trusty-log0
Allows /dev/trusty-logs to be accessed by dumpstate hal

Test: adb bugreport to include a trusty section in dumpstate_board.txt
Bug: 192036703
Change-Id: Ib4e1825b4167880e05fed0afbc87d2d5f1595790
Signed-off-by: Armelle Laine <armellel@google.com>
2021-06-25 20:37:12 +00:00