Treehugger Robot
0f96c2225e
Merge "ril: dump radio hal from user build." into udc-d1-dev
2023-04-21 01:49:54 +00:00
Ankit Goyal
2f30e8ca85
Merge "Mark video secure devices as default dmabuf heaps" into udc-d1-dev
2023-04-20 17:03:32 +00:00
Tim Lin
54bb68984a
ril: dump radio hal from user build.
...
Sync from ag/17155484
To get radio hal debug info on user build as we do on previous Pixels.
Bug: 278477468
Test: Trigger bugreport on USERDEBUG with dumpstate.unroot set
to true and check IRadio log
Change-Id: Ic9dd8357eb326d5c5f03b16408b7ba0a5e5f5818
(cherry picked from commit e08be6ab76327511002ebd343bda13a2fcc1434d)
2023-04-20 03:40:59 +00:00
Treehugger Robot
b51385226b
Merge "Camera: Allow rw access to TEE devices" into udc-d1-dev
2023-04-19 20:02:33 +00:00
Ankit Goyal
ded9266dd4
Mark video secure devices as default dmabuf heaps
...
Mali driver (and codec HAL as well) require direct access to video
secure dmabuf devices. Mali driver being an SP-HAL cannot explicitly
write blanket rules for all the scontext. So, we piggyback on
dmabuf_system_secure_heap_device to allow all scontext to be able to use
these device nodes.
This is just as secure as dmabuf_system_secure_heap_device in that case.
There is no additional security impact. An app can still use gralloc to
allocate buffers from these heaps and disallowing access to these heaps
to the intended users.
Fix: 278823239
Fix: 278513588
Fix: 275646321
Test: dEQP-VK.memory.allocation
Change-Id: I01a2730fc222efe94d4e48e7ee4c317aa65f0064
2023-04-19 19:48:38 +00:00
Edmond Chung
57d920f582
Camera: Allow rw access to TEE devices
...
This is to enable face authentication on P23 devices.
Bug: 278898746
Test: Build, face authentication
Change-Id: I75311770a9780e0d97a9240b589e4e4cd9e2dc56
2023-04-19 11:18:14 -07:00
Dave Mankoff
633f19376e
Merge "Give SystemUI access to necessary selinux properties." into udc-d1-dev
2023-04-18 17:50:42 +00:00
Dave Mankoff
78b9dcdb69
Give SystemUI access to necessary selinux properties.
...
Other errors mentioned in the bugs are already absent.
Fixes: 269964574
Fixes: 272628396
Fixes: 272628174
Test: built and flash device. No selinux errors printed.
Change-Id: Ic285b1f5a2ce6973899011a7c6a596e807c3e933
2023-04-17 14:28:59 +00:00
Bruno BELANYI
ac239dd97d
Merge "Move ARM runtime option SELinux rules out of 'legacy/'" into udc-d1-dev
2023-04-17 11:00:08 +00:00
Jenny Ho
2e3228660e
Merge "sepolicy: fix charger_vendor permission denied" into udc-d1-dev
2023-04-17 10:56:58 +00:00
Dinesh Yadav
39b4b20545
Merge "Add se-policies for google_camera_app from pro" into udc-d1-dev
2023-04-17 08:32:26 +00:00
Jenny Ho
6f201db16a
sepolicy: fix charger_vendor permission denied
...
type=1400 audit(1679973171.472:14): avc: denied { search } for comm="android.hardwar" name="vendor" dev="tmpfs" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0
type=1400 audit(1679973171.256:10): avc: denied { read } for comm="android.hardwar" name="stat" dev="sysfs" ino=67924 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=0␍␊
type=1107 audit(1679973171.472:20): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.battery.defender.state pid=414 uid=1000 gid=1000 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=property_service permissive=0
type=1400 audit(1679973171.476:23): avc: denied { read } for comm="android.hardwar" name="u:object_r:vendor_battery_defender_prop:s0" dev="tmpfs" ino=356 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=file permissive=0
type=1400 audit(1679973171.472:21): avc: denied { write } for comm="android.hardwar" name="capacity" dev="sysfs" ino=74690 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=0
type=1400 audit(1679973171.476:32): avc: denied { read } for comm="android.hardwar" name="u:object_r:default_prop:s0" dev="tmpfs" ino=164 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
type=1400 audit(1681358719.792:6): avc: denied { search } for comm="android.hardwar" name="/" dev="sda1" ino=3 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=0
Bug: 277898259
Change-Id: I055eaab6df7c4549cc3817aaec80b0f85ec3b475
Signed-off-by: Jenny Ho <hsiufangho@google.com>
2023-04-17 07:24:32 +00:00
Treehugger Robot
cccb610bb4
Merge "allow vendor_init to acces watermark_scale_factor" into udc-d1-dev
2023-04-17 03:05:35 +00:00
Martin Liu
fe24903d2c
allow vendor_init to acces watermark_scale_factor
...
Bug: 278075546
Test: boot
Change-Id: Ib5fc92b4f21ca9b1ff6fdd3a32c97117cc12aac0
Merged-in: Ib5fc92b4f21ca9b1ff6fdd3a32c97117cc12aac0
Signed-off-by: Martin Liu <liumartin@google.com>
2023-04-16 03:59:57 +00:00
Bruno BELANYI
cd905228d1
Move ARM runtime option SELinux rules out of 'legacy/'
...
Addressing some review feedback on ag/22381542 about this folder being
removed in the future.
Bug: b/272740524
Test: CtsDeqpTestCases (dEQP-VK.protected_memory.stack.stacksize_*)
Change-Id: I8506da9b80fe060cd5093acafd58594e4db3341b
2023-04-14 09:20:40 +00:00
Dinesh Yadav
b8b2445251
Add se-policies for google_camera_app from pro
...
- Found selinux violations on google_camera_app for these services which are fixed after these changes are included.
Bug: 264490031
Change-Id: Ib6f4a8a548425b0b98ed9b69edff6c973b9cbe3e
Signed-off-by: Dinesh Yadav <dkyadav@google.com>
2023-04-14 03:59:03 +00:00
TreeHugger Robot
89d4a4df13
Merge "Suppress bootanim behavior meant for Android Wear devices" into udc-d1-dev
2023-04-14 03:19:53 +00:00
Treehugger Robot
224eebae32
Merge "Remove ofl_app selinux policy" into udc-d1-dev
2023-04-14 02:11:22 +00:00
Treehugger Robot
fde5823b6f
Merge "Update rules for android.hardware.secure_element-service.thales" into udc-d1-dev
2023-04-14 01:21:56 +00:00
Ankit Goyal
9576cfaca7
Add sepolicy for framebuffer-secure heap
...
Bug: 245053092
Test: Secure video playback
Change-Id: I715ea5a4e9ee70ec2a022351b9e722a25bfb9f93
2023-04-13 13:47:11 -07:00
Sayanna Chandula
34ff37262f
Merge "thermal: enable pixelstats access to thermal metrics" into udc-d1-dev
2023-04-13 20:26:31 +00:00
Yixuan Wang
2c0e44805a
Merge "Add hal_contexthub_default to zuma sepolicy; Remove dontaudit rules for chre" into udc-d1-dev
2023-04-13 19:38:38 +00:00
Joner Lin
edd47032af
Merge "allow bthal to access vendor bluetooth folder" into udc-d1-dev
2023-04-13 13:57:32 +00:00
George
95d0a4b76f
Update rules for android.hardware.secure_element-service.thales
...
A new domain hal_secure_element_st54spi_aidl for AIDL HAL
Bug: 261566299
Test: run cts -m CtsOmapiTestCases
Test: atest VtsAidlHalNfcTargetTest
Change-Id: Id76a3f3337e2ee72031b39975eb010178855f36f
2023-04-13 11:02:49 +00:00
Lily Lin
6f41705151
Remove ofl_app selinux policy
...
OFLAgent is deprecated in ag/22504130. This CL is to remove ofl_app
selinux policy.
Bug: 224611871
Test: adb bugreport
Change-Id: I2264d79b8fe4084c3acd65db8f5384bb08216c5f
(cherry picked from commit 0fed5cc2b6cae6aebb411a58319474798d2fb25a)
2023-04-13 10:49:13 +00:00
Yixuan Wang
1095231e38
Add hal_contexthub_default to zuma sepolicy; Remove dontaudit rules for
...
chre
[ 7.760870] type=1400 audit(1669944054.440:61): avc: denied { write } for comm="android.hardwar" name="chre" dev="tmpfs" ino=1099 scontext=u:r:hal_contexthub_default:s0 tcontext=u:object_r:chre_socket:s0 tclass=sock_file permissive=1
[ 12.519414] type=1400 audit(1669944059.196:138): avc: denied {connectto } for comm="android.hardwar" path="/dev/socket/chre"scontext=u:r:hal_contexthub_default:s0 tcontext=u:r:chre:s0 tclass=unix_stream_socket permissive=1
Bug: 264489794
Bug: 261105224
Test: atest scanAvcDeniedLogRightAfterReboot
Change-Id: I7bf13913188deedc987f82e54626a18357ab84c5
2023-04-13 06:43:41 +00:00
Wilson Sung
3df3008917
Suppress bootanim behavior meant for Android Wear devices
...
Fix: 260522279
Test: boot-to-home and no bootanim avc error
Change-Id: I29d4168720887bc2f90d5f7ad20367887f9cae51
2023-04-13 00:00:38 +00:00
Minchan Kim
a382f85f96
move vendor_cma_debugfs into gs-common
...
The CMA dump is common feature for pixel devices so move
it to gs-common.
Bug: 276901078
Test: dumpstate_board.txt on adb bugreport includes the info
Change-Id: I46be7899939da3ae7e9323a0d3ee92f4b3759acf
Signed-off-by: Minchan Kim <minchan@google.com>
(cherry picked from commit afb8d91c5dd0df836c6c8a53963b44e23005efb7)
2023-04-12 13:25:46 +00:00
Wilson Sung
5bee37db26
Merge "Add recovery related policy" into udc-d1-dev
2023-04-12 01:44:17 +00:00
Treehugger Robot
bc7379022a
Merge "Add btbcm wakelock node context" into udc-d1-dev
2023-04-12 00:32:46 +00:00
Wilson Sung
c2eedff70c
Add recovery related policy
...
Fix: 275143841
Fix: 264490092
Test: adb sideload and no avc error
Change-Id: I52003c9417560a6c5dab815a6929681710f0b0a4
2023-04-12 03:46:54 +08:00
jonerlin
940b51e1e4
allow bthal to access vendor bluetooth folder
...
Bug: 240636731
Test: enable vendor btsnoop property and check the vendor snoop log
Change-Id: Ib7c36e7398bdbe7abc2f3b2dba684f95a4ce90a8
2023-04-11 17:01:40 +00:00
Wei Wang
4cd8d2fef9
Merge "sepolicy: label bci and dsu max frequency" into udc-d1-dev
2023-04-11 16:14:29 +00:00
Wilson Sung
2e19e54fe5
Add btbcm wakelock node context
...
avc: denied { read } for name="wakeup178" dev="sysfs" ino=119871 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0
Bug: 277717252
Test: boot-to-home and no avc error
Change-Id: I82ed45ff6bf28c0cf2237098c54b6ead59c6c284
2023-04-11 11:02:26 +00:00
Wilson Sung
79b4b329f0
Allow update_engine to change slot
...
Bug: 275143841
Change-Id: Id9e19ae74a32521ab083eff87e4e3e583f881bbb
2023-04-11 11:03:12 +08:00
Ali K. Zadeh
1f56ec32b6
sepolicy: label bci and dsu max frequency
...
Bug: 274005880
Test: powerhint is able to change the bci/dsu max frequency
Change-Id: I8d59450878ba8e349d7f797cc74f0f1cc00c6187
2023-04-10 23:24:55 +00:00
Sayanna Chandula
0df51526da
thermal: enable pixelstats access to thermal metrics
...
Allow pixelstats daemon to access thermal metric nodes
Bug: 277625975
Test: Build and boot on device. Check DFS stats
Change-Id: I50d71d12f4f9d3a1b83a606ba6a7159c46ebec14
Signed-off-by: Sayanna Chandula <sayanna@google.com>
2023-04-10 13:55:26 -07:00
Adam Shih
46fd63b761
comply with VTS requirements am: 22e1c0756a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zuma-sepolicy/+/22344148
Change-Id: I02d1e5a2af5bb6d3009d2b7687dff6080f56724f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-04-06 03:08:17 +00:00
Dinesh Yadav
478b11708f
Allow google_camera_app to access edgetpu
...
These permissions are needed by GCA-release & GCA-dogfood to access
edgetpu.
Bug: 264490031
Change-Id: Idd9dff906c86f9e83f1dc67698c23387e174d99c
Signed-off-by: Dinesh Yadav <dkyadav@google.com>
2023-04-04 06:11:47 +00:00
Adam Shih
22e1c0756a
comply with VTS requirements
...
Bug: 275142299
Test:
atest VtsHalDumpstateTargetTest:PerInstanceAndMode/DumpstateAidlPerModeTest#TestOk/0_android_hardware_dumpstate_IDumpstateDevice_default_FULL
atest VtsHalDumpstateTargetTest:PerInstance/DumpstateAidlGeneralTest#TestInvalidModeArgument_Negative/0_android_hardware_dumpstate_IDumpstateDevice_default
Built pass on target-userdebug and aosp_target-userdebug
Change-Id: I6a114aa2aa92f7b06cfd5bbd1f73d34b5477b109
2023-03-30 13:28:43 +08:00
TreeHugger Robot
8041addc24
Merge "sepolicy: fix VTS failure for system suspend [RESTRICT AUTOMERGE]" into udc-d1-dev
2023-03-30 01:52:41 +00:00
TreeHugger Robot
4bb2e02b1c
Merge "Add logd selinux allow permissions" into udc-d1-dev
2023-03-30 01:44:29 +00:00
TreeHugger Robot
6cbdc36e1b
Merge "Move pixel dumpstate to gs-common" into udc-d1-dev
2023-03-29 16:06:45 +00:00
Darren Hsu
bc15f1c8ee
sepolicy: fix VTS failure for system suspend [RESTRICT AUTOMERGE]
...
Bug: 275143652
Test: run vts -m SuspendSepolicyTests
Change-Id: I7cb5fdb18e7b16d98961bfed11da21496e8fa026
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2023-03-29 18:46:56 +08:00
Donnie Pollitz
885a790f2d
Add logd selinux allow permissions
...
Bug: 261105354
Bug: 264489639
Test: Ran atest SELinuxTest#scanAvcDeniedLogRightAfterReboot
Change-Id: I377dbb3bbdecd6780c1bdfb3aab53ee3c754c163
Signed-off-by: Donnie Pollitz <donpollitz@google.com>
2023-03-29 09:24:47 +02:00
TreeHugger Robot
83588e636f
Merge "Keep name "dmabuf_system_secure_heap_device" for secure playback" into udc-d1-dev
2023-03-29 02:56:22 +00:00
TreeHugger Robot
5d6157b523
Merge "Allow bootctl to access trusty device" into udc-d1-dev
2023-03-29 00:00:55 +00:00
Mingguang Xu
203dd313e7
Merge "Add permissions to connect radioext to twoshay." into udc-dev am: 57e322c17c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zuma-sepolicy/+/21956466
Change-Id: Ib70d523bc36e1a789b003374207094f2eaf722d5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-03-28 23:09:15 +00:00
Mingguang Xu
57e322c17c
Merge "Add permissions to connect radioext to twoshay." into udc-dev
2023-03-28 23:03:46 +00:00
Feiyu Chen
02cc06b4ab
Merge "Allow camera HAL to access edgetpu_app_service" into udc-dev am: 2d34b0b1f6
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zuma-sepolicy/+/22248613
Change-Id: Icf1b60bc90121ad358639abe52ea15b4b69bb652
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-03-28 09:19:09 +00:00