Commit graph

19 commits

Author SHA1 Message Date
jonerlin
a9b6884b3a allow hal_bluetooth_btlinux write sysfs file
12-04 19:32:23.040000  1002   784   784 I auditd  : type=1400 audit(0.0:30): avc:  denied  { write } for  comm="binder:784_2" name="uart_dbg" dev="sysfs" ino=60136 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sysfs_bt_uart:s0 tclass=file permissive=0
12-04 19:32:23.040000  1002   784   784 W binder:784_2: type=1400 audit(0.0:30): avc:  denied  { write } for  name="uart_dbg" dev="sysfs" ino=60136 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sysfs_bt_uart:s0 tclass=file permissive=0

Bug: 376774204
Test: v2/pixel-pts/release/bootstress/1200counts/suspend-resume
Flag: EXEMPT project configuration patch
Change-Id: I6c1a28d0e5e22b03b088d64d550fd475d796ae67
2024-12-05 02:41:13 +00:00
Leo Hsieh
ac26d97317 Allow hal_fingerprint_default to access sysfs_aoc_udfps
Fix the following avc denial:
avc:  denied  { search } for  name="17000000.aoc" dev="sysfs" ino=26962 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=dir permissive=1
avc:  denied  { write } for  name="udfps_set_clock_source" dev="sysfs" ino=110484 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
avc:  denied  { read } for  name="udfps_get_disp_freq" dev="sysfs" ino=110486 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
avc:  denied  { write } for  name="udfps_set_clock_source" dev="sysfs" ino=109423 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc_udfps:s0 tclass=file permissive=0

Bug: 357976286
Test: Verify fingerprint HAL process can read/write to the sysfs node.
Flag: EXEMPT NDK
Change-Id: Ia8d6288812ef47dad2018d384f43374da7005a4a
2024-09-30 08:44:07 +00:00
chenkris
dbc540c147 Allow fingerprint to access sysfs_lhbm
Fix following avc denail:
android.hardwar: type=1400 audit(0.0:17): avc:  denied  { write } for  name="local_hbm_delay_frames" dev="sysfs" ino=83619 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_lhbm:s0 tclass=file permissive=0

Bug: 362149568
Test: enroll and authenticate fingerprint
Change-Id: I8c4b18b39fa5c391e9773c7780afe9e0de16e2a9
2024-08-29 05:08:49 +00:00
Jason Chiu
4d6d0adb8f zumapro: move sepolicy related to bootctrl hal to gs-common
Bug: 265063384
Change-Id: I0eaa0b798f46a32404c8d7d797b5aeceb12326a0
Signed-off-by: Jason Chiu <jasoncschiu@google.com>
2023-12-05 01:35:46 +08:00
Wilson Sung
e531406f68 Move legacy file.te to vendor and tracking_denials
Bug: 312143882
Bug: 314035704
Test: make selinux_policy
Change-Id: Ibf5ac4c3e06bb2f5aab44e59073156181ab0b5a1
2023-11-30 05:07:58 +00:00
guibing
6c797e281a zumapro: sepolicy: update ospm selinux settings.
Use the similar setting from zuma: ag/23270943 and ag/22980665

Bug: 300516041
Test: Power hal works without related avc errors.
Change-Id: I45fb13299f153f0f472e21f54af393147c7fbd7c
2023-11-28 00:36:38 +00:00
Chien Kun Niu
84ef937a19 hal_usb_impl: Move hal_usb_impl and hal_usb_gadget_impl to vendor
Move hal_usb_impl and hal_usb_gadget_impl to right space

Bug: 310816620
Change-Id: I04d3710dd7f4e52b204f537de73d18a1351a6836
Signed-off-by: Chien Kun Niu <rickyniu@google.com>
2023-11-15 17:50:29 +08:00
Tai Kuo
a3abd5ad39 Allow regmap debugfs for drivers probed by insmod
auditd  : type=1400 audit(0.0:731): avc:  denied  { search } for
comm="modprobe" name="regmap" dev="debugfs" ino=2057
scontext=u:r:insmod-sh:s0 tcontext=u:object_r:vendor_regmap_debugfs:s0
tclass=dir permissive=1 bug=b/274727542

vendor_kernel_boot and vendor_dlkm modules probe by insmod need this.
Move regmap debugfs from legacy/whitechapel_pro/ to vendor/.

Bug: 274727542
Bug: 289012421
Bug: 285343932
Test: ls -d /sys/kernel/debug/regmap/*-0043
Change-Id: I1db7a5a3413467b4e14954d994b071b206fe0300
2023-09-12 16:42:21 +08:00
Hasan Awais
3ca2aca558 uwb: add permissions for factory uwb calib file
needed for copying the factory calib file from persist to
/data/vendor/uwb, along with converting the file to a valid format
for uwb HAL

Equivalent CL: ag/22980180

Bug: 296108382
Bug: 296108391
Test: local build passed
Change-Id: I576d21433e2d0b958ef876bd42c382dd2061796e
Signed-off-by: Hasan Awais <hasanawais@google.com>
2023-09-11 17:36:08 +00:00
Wilson Sung
a202da5e8a sepolicy: allows pixelstat to access pca file nodes
Bug: 298628728
Test: no Permission denied while accessing the file node
Change-Id: I0a2ffa3eb583775fa8e6dae02367d156152ee386
Signed-off-by: Jack Wu <wjack@google.com>
2023-09-04 07:14:52 +00:00
Wilson Sung
863d41f6c6 Move vendor to legacy/zuma/vendor
Bug: 296187211
Change-Id: I28450565c4ee585060387ad988e7efbb1620eaee
2023-09-04 11:07:29 +08:00
Alec Foster
8d86f12d0e Add selinux policy for QFP UDFPS.
Bug: 295228935
Test: adb logcat -b events -e avc -d
Test: Fingerprint sensor works.
Change-Id: I22a92d6acdc8b4211bf84f33ab9d7c524f078ebc
2023-08-28 19:36:23 +00:00
Wilson Sung
c7a757a4ee Revert "Sync zuma-sepolicy to legacy folder"
This reverts commit 355f0df8fd.

Bug: 297270938
Merged-In: I3b15b35df4bc40716d0aa757a226c5075c7e29ff
Change-Id: I44cbb1a0ea6248fbc5a4dc3c12e96d2b66a32282
2023-08-24 08:47:01 +08:00
Wilson Sung
355f0df8fd Sync zuma-sepolicy to legacy folder
Duplicate from zuma-sepolicy 7f3e2b9

Test: make selinux_policy
Bug: 296187211
Change-Id: If686fbdcf058849479019e8b37bb1d57a0215ed6
Signed-off-by: Wilson Sung <wilsonsung@google.com>
2023-08-22 15:37:56 +08:00
Ilya Matyukhin
dc29ce7753 zumapro: Add sysfs_faceauth_gcma_heap type
Bug: 288156745
Test: build
Change-Id: I009e0721c09886d96a8d071afaf9244305e1a257
2023-08-11 05:32:18 +00:00
Yixuan Wang
ea65f1e6bd Add selinux policy for chre vendor data directory
Bug: 278114604
Test: on device test
Change-Id: Ic8f0256c43ab3bc7c7bd30484f47e77bb970ce56
2023-06-22 18:18:28 +00:00
Robin Peng
30ab759177 Sync with device/google/zuma-sepolicy a89fbcc4aa1ae
fix build breakage:
device/google/zumapro-sepolicy/legacy/whitechapel_pro/file.te:4:ERROR 'Duplicate declaration of type' at token ';' on line 104436:
type tcpdump_vendor_data_file, file_type, data_file_type;
type updated_wifi_firmware_data_file, file_type, data_file_type;

Bug: 272725898
Change-Id: Ic17d18409c28760d172a4ee7a5beb6c90016a381
2023-05-01 10:04:38 +00:00
Minchan Kim
bc5690cd84 remove dump_cma.sh
We will introduce it into gs-common

Bug: 276901078
Change-Id: I395e3ca45a3ad4aa346e56fd8746ffc70ae94107
Signed-off-by: Minchan Kim <minchan@google.com>
2023-04-11 22:35:22 +00:00
Robin Peng
bff99af2da init zumapro from zuma sha 43d5907677d0f
Bug: 272725898
Change-Id: If35d9efdda9dd3b8d8b24008f0738a0cbbe5bd9b
2023-03-31 14:16:57 +00:00