cweichun
f080553fa0
display: low-light blocking zone support
...
Bug: 315876417
Test: verify the functionality works
Change-Id: I8de35ac0685c9b5b07385001479906a84901b347
2024-04-01 22:39:32 +00:00
Shiyong Li
7835c69828
Merge "Label te2_rate_hz and te2_option as sysfs_display" into 24D1-dev am: a06f6749c8
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/26481942
Change-Id: I23e6fe5f8f808ee1b6b32b187fafb59d9760ec8f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-28 21:37:16 +00:00
Shiyong Li
a06f6749c8
Merge "Label te2_rate_hz and te2_option as sysfs_display" into 24D1-dev
2024-03-28 21:10:16 +00:00
Priyanka Advani
1492ce0ed4
Merge "Revert "sepolicy: Allow PixelGnss to connect to Chre HAL"" into 24D1-dev am: 3f268ee8a9
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/26750102
Change-Id: I14a8d6f7148f73eed745269fb2d3e06381e5db4f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-28 20:20:54 +00:00
Priyanka Advani
3f268ee8a9
Merge "Revert "sepolicy: Allow PixelGnss to connect to Chre HAL"" into 24D1-dev
2024-03-28 20:01:53 +00:00
Priyanka Advani
7299abaa81
Revert "sepolicy: Allow PixelGnss to connect to Chre HAL"
...
Revert submission 26593083-lassen_pps
Reason for revert: Culprit for test breakages in b/331680556. Will be verifying through ABTD for confirmation and before submitting the revert.
Bug: b/331680556
Reverted changes: /q/submissionid:26593083-lassen_pps
Change-Id: I64487bc049ac7aa53b5bff461a033f70428ab6a9
2024-03-28 19:54:08 +00:00
Chris Lu
2c3dc0c668
Label te2_rate_hz and te2_option as sysfs_display
...
Bug: 307787644
Test: Check the files label: adb shell ls -Z
Change-Id: Iab036b86b6d0c28191212a3ac10be6ddb5dcbd2b
2024-03-28 00:31:25 +00:00
WeiChungChang
8f872df64a
display: create entity_name property am: c46f6cf333
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/26714643
Change-Id: Ic20b233c5112eafd1829dea6280680016b0945bf
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-27 19:10:34 +00:00
WeiChungChang
c46f6cf333
display: create entity_name property
...
HWC should designate the entity name 'Inner-Display'
for the primary display in cases of dual panels.
Bug: 329370514
Test: verify powerstats for dual panel devices
Change-Id: I284ff460709da6a8cb48a35bf2b805ea3d09c990
2024-03-26 22:40:54 +00:00
Cheng Chang
07d703b246
Merge "sepolicy: Allow PixelGnss to connect to Chre HAL" into 24D1-dev am: 3d57c4ee96
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/26588701
Change-Id: I766c697005435e4a74bd3f8003ecb9b92255ac96
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-25 13:09:33 +00:00
Cheng Chang
3d57c4ee96
Merge "sepolicy: Allow PixelGnss to connect to Chre HAL" into 24D1-dev
2024-03-25 12:51:10 +00:00
Cheng Chang
79e12fe426
sepolicy: Allow PixelGnss to connect to Chre HAL
...
avc: denied { call } for scontext=u:r:hal_contexthub_default:s0 tcontext=u:r:hal_gnss_pixel:s0 tclass=binder permissive=0
Bug: 316227249
Test: Verify PixelGnss HAL can connect to Chre HAL.
Test: Function test verification b/330120749 without disable selinux.
Test: No avc error log in logcat.
Change-Id: I7f6a45cd80c7ccbba2af1a0d3f3d89f30267db00
2024-03-25 06:59:51 +00:00
Sam Ou
d03db6fe73
Merge "sepolicy: fix odpm scale value path" into 24D1-dev am: 69b8799f82
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/26678608
Change-Id: I8cab9f4ee662b370e1118215f76841735631bf36
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-03-25 02:52:18 +00:00
samou
8ff89c21d0
sepolicy: fix odpm scale value path
...
Extend odpm sysfs path to cover the
different startup sequence.
Bug: 330815850
Change-Id: Ifd346f379b71c790e175e08e74398bae0c0417df
Signed-off-by: samou <samou@google.com>
2024-03-22 10:38:08 +00:00
Spade Lee
b3e3319964
Merge "sepolicy: allow kernel to search vendor debugfs" into main
2024-03-21 06:35:25 +00:00
Spade Lee
bac2d41b9c
sepolicy: allow kernel to search vendor debugfs
...
audit: type=1400 audit(1710259012.824:4): avc: denied { search } for pid=128 comm="kworker/3:1" name="max77779fg" dev="debugfs" ino=24204 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_maxfg_debugfs:s0 tclass=dir permissive=0
audit: type=1400 audit(1710427790.680:2): avc: denied { search } for pid=10 comm="kworker/u16:1" name="gvotables" dev="debugfs" ino=10582 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_votable_debugfs:s0 tclass=dir permissive=1
audit: type=1400 audit(1710427790.680:3): avc: denied { search } for pid=211 comm="kworker/u16:4" name="google_charger" dev="debugfs" ino=16673 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_charger_debugfs:s0 tclass=dir permissive=1
Bug: 328016570
Bug: 329317898
Test: check all debugfs folders are correctly mounted
Change-Id: Ib25cc13a329b40bebe87fab43e955e2e4395de9e
Signed-off-by: Spade Lee <spadelee@google.com>
2024-03-20 18:13:22 +00:00
Chris Lu
026570c6c7
Allow hwc to access te_info
...
Bug: 315094023
Test: can access sysfs node te_info
Change-Id: I9d418ab92cc68e0234e19162812cc33a8c07e40c
2024-03-18 11:57:24 +08:00
Zheng Pan
561bce895b
Merge "Move display properties from tracking_denials to vendor" into main
2024-03-11 21:04:23 +00:00
Zheng Pan
e29dd9a08b
Merge "Move display properties from tracking_denials to vendor" into 24D1-dev
2024-03-11 21:04:14 +00:00
John Chang
46d2322311
Move display properties from tracking_denials to vendor
...
Bug: 328001545
Test: Test MRR Version 2 is properly configured
Change-Id: Ib586398670b21bb88cd122647880149daa628d0d
2024-03-08 16:32:30 +00:00
John Chang
21601cc866
Move display properties from tracking_denials to vendor
...
Bug: 328001545
Test: Test MRR Version 2 is properly configured
Change-Id: Ib586398670b21bb88cd122647880149daa628d0d
2024-03-08 16:23:52 +00:00
Yabin Cui
76c40d23cf
Add SOC specific ETE sysfs paths
...
Bug: 321061072
Test: run profcollectd on device
Change-Id: I7eb39a5e9f586e36edd11679b0988af2ff6b986b
2024-03-07 19:53:25 +00:00
Yabin Cui
af6b895528
Add SOC specific ETE sysfs paths
...
Bug: 321061072
Test: run profcollectd on device
Change-Id: I7eb39a5e9f586e36edd11679b0988af2ff6b986b
2024-03-06 11:06:13 -08:00
Kah Xuan Lim
6914e7a49b
Modem ML: Add sepolicy for TFLiteService
...
Add the sepolicy required to:
- Introduce modemml_tflite_service which runs on the system server.
- Allow modem_ml_svc_sit to access the new service.
- Allow system_server to access NNAPI TPU service.
Relevant logs before the sepolicy changes are made:
```
auditd : avc: denied { find } for pid=1000 uid=1001 name=com.android.server.modemml.ITFLiteService/default scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:object_r:modemml_tflite_service:s0 tclass=service_manager permissive=1
```
```
11-14 03:03:44.392 1064 1064 I auditd : type=1400 audit(0.0:9): avc: denied { call } for comm="modem_ml_svc_si" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1
```
```
SELinux : avc: denied { find } for pid=1115 uid=1000 name=android.hardware.neuralnetworks.IDevice/google-edgetpu scontext=u:r:system_server:s0 tcontext=u:object_r:edgetpu_nnapi_service:s0 tclass=service_manager permissive=1
```
Bug: 307449478
Change-Id: I14c2aa02eca08a026d100af6eea11ac9ac9e4fc7
2024-03-06 13:35:33 +08:00
Hwayoung Helen Kim
dc37b510fa
Merge "Allow imssvc property access for the audio path in PDK build" into main
2024-03-05 06:48:16 +00:00
Treehugger Robot
87c046a3bf
Merge "Add AIDL media.c2 into service_contexts" into main
2024-03-05 06:17:02 +00:00
Treehugger Robot
4d305706a5
Merge "add dsim wakeup labels" into main
2024-02-28 03:59:20 +00:00
Sungtak Lee
f8aaa7afa0
Add AIDL media.c2 into service_contexts
...
Bug: 321808716
Change-Id: Ieff24ebd4c5ce6201faecf819828f21cb598de67
2024-02-27 18:14:13 +00:00
Peter Lin
f88ffce8c7
add dsim wakeup labels
...
Bug: 321733124
test: ls sys/devices/platform/19440000.drmdsim/19440000.drmdsim.0/wakeup -Z
Change-Id: I28bc16f23478131dfecf2ad61b306ce9ae1e2767
2024-02-27 12:59:04 +00:00
Jack Wu
85aa1cb4b1
dontaudit on dir search for vendor_charger_debugfs
...
Bug: 326869335
Test: make selinux_policy
Change-Id: I22623dd1c47a431233eb6666dbe37fa2d9aa73a3
Signed-off-by: Jack Wu <wjack@google.com>
2024-02-26 21:10:51 +08:00
Helen
1518455ede
Allow imssvc property access for the audio path in PDK build
...
Bug: 319336100
Test: build and test using the PDK build in live network
Change-Id: I2e2045cde6a4cc5c5ea52b205aea6cb6da18e0b9
2024-02-23 08:45:53 +00:00
Treehugger Robot
4f275afd4e
Merge "moving charger nodes to user build" into main
2024-02-21 02:01:55 +00:00
Treehugger Robot
35907c0769
Merge "dontaudit on dir search for vendor_votable_debugfs" into main
2024-02-21 01:55:49 +00:00
Darren Hsu
7b65b7fb2b
sepolicy: allow hal_power_stats to read GPS files
...
avc: denied { search } for name="gps" dev="dm-49" ino=381
scontext=u:r:hal_power_stats_default:s0
tcontext=u:object_r:vendor_gps_file:s0 tclass=dir permissive=0
Bug: 309876364
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: I577443effaf8c3072e05c24025ec2c9ba63639b8
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2024-02-19 16:37:21 +08:00
Wilson Sung
0ae4d6f09e
dontaudit on dir search for vendor_votable_debugfs
...
Bug: 305880925
Bug: 310539058
Bug: 318033504
Test: make selinux_policy
Change-Id: I5e13370fe5430f3dfbf73ccff787986fbe80f9ea
2024-02-19 14:58:56 +08:00
Ken Yang
7da489c7ad
SELinux: fix SELinux denials
...
devices/platform/108d0000.hsi2c/i2c-6/6-0066/max77779-pmic-irq.2.auto/wakeup/wakeup69
Bug: 325680852
Change-Id: I974c65bab46f3de3bdcacb42c67257d91a3ecf8a
Signed-off-by: Ken Yang <yangken@google.com>
2024-02-19 04:21:12 +00:00
Treehugger Robot
bb48ecd1e2
Merge "Allow CccDkTimeSyncService to access bluetooth extension HAL" into main
2024-02-17 08:49:51 +00:00
Daniel Okazaki
7d46482f86
moving charger nodes to user build
...
Bug: 323415060
Test: adb bugreport
Change-Id: I2f613d513b2c8a1eb5f52dbd6ba9f8381486a150
Signed-off-by: Daniel Okazaki <dtokazaki@google.com>
2024-02-15 23:09:32 +00:00
Imo Umoren
a8ad4fb402
Merge "Add CHRE SELinux Permissions for Twoshay [Zuma Pro]" into main
2024-02-13 21:09:09 +00:00
Imo Richard Umoren
52fe3a2703
Add CHRE SELinux Permissions for Twoshay [Zuma Pro]
...
Adds permissions for chre socket to SELinux policy.
Used for the Wallaby nanoapp.
Bug: b/324278826
Test: Manually tested on zuma pro devices
Change-Id: Ied113002ec0650607f657cc47d183635916ae83e
2024-02-08 02:09:58 +00:00
Roy Luo
0e115d4d15
hal_usb_impl: Grant read permission to usb overheat files
...
Carried over from WHI PRO setting.
Bug: 307583011
Test: no audit logs
Change-Id: Icdcf36ee739f009a1e87ecd346b6178d096079b9
2024-02-07 05:19:37 +00:00
Kuen-Han Tsai
01658d880d
Merge "Set SEPolicy for the disable_contaminant_detection script" into main
2024-02-06 08:34:52 +00:00
Wiwit Rifa'i
bf3e95edb1
Allow binder call from servicemanager to composer
...
This will fix below avc denial:
type=1400 audit(0.0:4): avc: denied { call } for
comm="servicemanager" scontext=u:r:servicemanager:s0
tcontext=u:r:hal_graphics_composer_default:s0 tclass=binder
permissive=0
Bug: 323761837
Bug: 315497129
Test: verify this avc denial doesn't appear
Change-Id: I76d7ea9e52e7140a715e375142abd904be8fa6ce
2024-02-05 15:40:17 +08:00
Treehugger Robot
ad3761f873
Merge changes from topic "threadbt_se_policy" into main
...
* changes:
Grant Thread HAL service to access BT HAL folder
Grant BT HAL to access socket file
2024-02-05 03:31:48 +00:00
shihchienc
ed3ca1e266
Grant Thread HAL service to access BT HAL folder
...
02-02 14:36:00.660 2378 2378 I android.hardwar: type=1400 audit(0.0:15): avc: denied { read } for name="bluetooth" dev="dm-53" ino=399 scontext=u:r:hal_threadnetwork_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
02-02 14:36:00.660 2378 2378 I android.hardwar: type=1400 audit(0.0:16): avc: denied { watch } for path="/data/vendor/bluetooth" dev="dm-53" ino=399 scontext=u:r:hal_threadnetwork_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
02-02 14:36:02.664 2378 2378 I android.hardwar: type=1400 audit(0.0:17): avc: denied { search } for name="bluetooth" dev="dm-53" ino=399 scontext=u:r:hal_threadnetwork_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=dir permissive=1
14:36:29.076 7627 7627 I android.hardwar: type=1400 audit(0.0:30): avc: denied { getattr } for path="/data/vendor/bluetooth/thread_dispatcher_socket" dev="dm-53" ino=46090 scontext=u:r:hal_threadnetwork_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=sock_file permissive=1
02-02 14:36:29.076 7627 7627 I android.hardwar: type=1400 audit(0.0:31): avc: denied { write } for name="thread_dispatcher_socket" dev="dm-53" ino=46090 scontext=u:r:hal_threadnetwork_default:s0 tcontext=u:object_r:vendor_bt_data_file:s0 tclass=sock_file permissive=1
02-02 14:36:29.076 7627 7627 I android.hardwar: type=1400 audit(0.0:32): avc: denied { connectto } for path="/data/vendor/bluetooth/thread_dispatcher_socket" scontext=u:r:hal_threadnetwork_default:s0 tcontext=u:r:hal_bluetooth_btlinux:s0 tclass=unix_stream_socket permissive=1
Bug: 318594282
Test: reboot and open bluetooth
Change-Id: Ia63ed27b732eafa2e0aa3311fc7cea9c77e7b50c
2024-02-04 23:00:54 +00:00
Kuen-Han Tsai
25748e9d93
Set SEPolicy for the disable_contaminant_detection script
...
This patch ports Zuma project SEPolicy and corrects the platform device
name.
init : Command 'exec /vendor/bin/hw/disable_contaminant_detection.sh'
action=vendor.usb.contaminantdisable=true (/vendor/etc/init/hw/
init.zumapro.usb.rc:288) took 5ms and failed: Could not start exec
service: File /vendor/bin/hw/disable_contaminant_detection.sh(labeled
"u:object_r:vendor_file:s0") has incorrect label or no domain transition
from u:r:init:s0 to another SELinux domain defined. Have you configured
your service correctly?
https://source.android.com/security/selinux/device-policy#
label_new_services_and_address_denials. Note: this error shows up even
in permissive mode in order to make auditing denials possible.
Bug: 295127978
Test: manual test
Change-Id: I4269127f0101250615aad9218a9e2684579a653b
Signed-off-by: Kuen-Han Tsai <khtsai@google.com>
2024-02-02 18:07:36 +08:00
Wiwit Rifa'i
24ad0c2d7f
Allow binder calls between composer and powerstats
...
This will fix some avc denials:
* SELinux : avc: denied { find } for pid=508 uid=1000
name=power.stats-vendor scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:hal_power_stats_vendor_service:s0
tclass=service_manager permissive=0
* binder:501_1: type=1400 audit(0.0:30): avc: denied { call } for
scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:r:hal_power_stats_default:s0 tclass=binder permissive=0
* android.hardwar: type=1400 audit(0.0:10): avc: denied { call }
for scontext=u:r:hal_power_stats_default:s0
tcontext=u:r:hal_graphics_composer_default:s0 tclass=binder
permissive=0
Bug: 315497129
Test: check no avc denied between composer & powerstats
Change-Id: I6033e088d5706a0d2a6f942f983a05e6148764a9
2024-02-01 09:13:27 +08:00
Wiwit Rifa'i
19a720dbe0
Move hal_graphics_composer_default from legacy to vendor
...
Bug: 315497129
Test: boot to home
Change-Id: I7408333a5a43a49045b66d697c71bdc89af25ff0
2024-02-01 09:06:57 +08:00
Ted Wang
b867cabc87
Allow CccDkTimeSyncService to access bluetooth extension HAL
...
Bug: 308381394
Test: build and check for avc denied
Change-Id: Ic602d3caf0b0cdfb1041d339e48d4671e7150d85
2024-01-31 02:37:19 +00:00
Treehugger Robot
a886395f0e
Merge "sepolicy: allow hal_power_stats to read sysfs_display" into main
2024-01-24 06:03:41 +00:00