Commit graph

631 commits

Author SHA1 Message Date
Steve Muckle
9316da8e12 allow modprobe to read /proc/cmdline
This is needed for libmodprobe to pass module options on the kernel
commandline to kernel modules when they are loaded.

Bug: 155422904
Change-Id: I9df7e211765268815bfb9269365264f5ca468712
Merged-In: I9df7e211765268815bfb9269365264f5ca468712
2020-05-07 11:28:50 -07:00
Steve Muckle
c340f2a313 Merge "allow modprobe to read /proc/cmdline" am: 73c62d3516 am: c9c8d130b9
Change-Id: I3871b35c4de088917c3c1e941f8987ffba88953a
2020-05-06 00:53:12 +00:00
Steve Muckle
e3788c93e5 allow modprobe to read /proc/cmdline
This is needed for libmodprobe to pass module options on the kernel
commandline to kernel modules when they are loaded.

Bug: 155422904
Change-Id: I9df7e211765268815bfb9269365264f5ca468712
2020-05-05 08:50:11 -07:00
Robert Shih
a2e4038266 Merge "Allow drm hals to access allocator hal" am: b60b51d352 am: c5bf73f0d8
Change-Id: I57c6e21e36e4b4374c71204763f5481b99ee514f
2020-04-13 23:25:07 +00:00
Robert Shih
67bbb71550 Allow drm hals to access allocator hal
Bug: 150468341
Test: atest VtsHalDrmV1_3TargetTest
Change-Id: Iea8934567cda343dedf17f75cb0807a68742764d
Merged-In: Iea8934567cda343dedf17f75cb0807a68742764d
2020-04-13 20:01:06 +00:00
Robert Shih
0ade37909c Allow drm hals to access allocator hal
Bug: 150468341
Test: atest VtsHalDrmV1_3TargetTest
Change-Id: Iea8934567cda343dedf17f75cb0807a68742764d
2020-04-13 17:30:18 +00:00
TreeHugger Robot
8ab8009b87 Merge "Add sepolicy to access ion dev from Tuner service" into rvc-dev am: afd27274cd
Change-Id: Iaa4d0ce2b8183f9118ad254243774ff9425a3a6f
2020-03-28 04:16:17 +00:00
TreeHugger Robot
afd27274cd Merge "Add sepolicy to access ion dev from Tuner service" into rvc-dev 2020-03-28 03:55:51 +00:00
Amy Zhang
73f0159390 Add sepolicy to access ion dev from Tuner service
Tuner default implementation is testing with Ion buffer on Cuttlefish
to make sure the secure handle merchanism would work with media data
pass between the Tuner Hal and the Tuner Java.

Ion access would be needed for all the Tuner Hal implementation

Test: atest
Bug: 150952766
Change-Id: I39117f96bdc84ce24afcb3ef528b6d942ded505e
2020-03-27 17:40:41 -07:00
Roman Kiryanov
8a2b099e7a Label android.hardware.lights-service.example as hal_light_default_exec
Bug: 152544844
Test: ls -Z /vendor/bin/hw/android.hardware.lights-service.example
Signed-off-by: Roman Kiryanov <rkir@google.com>
Merged-In: I32a6a443c57986b37fdcca788bfe01bf0cdd3e07
Change-Id: Iabba4e35522b8393c5c4188870225fb1c6bbd835
2020-03-26 19:20:33 -07:00
Roman Kiryanov
8e8d7c5b31 Merge "Label android.hardware.lights-service.example as hal_light_default_exec" am: f7e86d40e1 am: 30ec5f3405
Change-Id: Ieabb2c6c08f60dbd33a2a58c5484c6860900d55e
2020-03-27 01:07:09 +00:00
Roman Kiryanov
f7e86d40e1 Merge "Label android.hardware.lights-service.example as hal_light_default_exec" 2020-03-27 00:39:38 +00:00
Hayden Gomes
b391ffa5a3 Merge "Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts" into rvc-dev 2020-03-26 22:48:08 +00:00
Roman Kiryanov
e0cc8b0f63 Label android.hardware.lights-service.example as hal_light_default_exec
Bug: 152544844
Test: ls -Z /vendor/bin/hw/android.hardware.lights-service.example
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: I32a6a443c57986b37fdcca788bfe01bf0cdd3e07
2020-03-26 14:32:15 -07:00
Hayden Gomes
18af143240 Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts am: a010cef7ad am: 0355e5f4d2
Change-Id: I4d0d4e6762a694c3aee1e85f119ced8605c67d64
2020-03-26 20:38:22 +00:00
Hayden Gomes
c10979afd9 Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts
Bug: 148098383
Test: built and ran with new version
Change-Id: I06f8f2cd73dce73111559664871bdd3c9b814d7c
Merged-In: I06f8f2cd73dce73111559664871bdd3c9b814d7c
(cherry picked from commit a010cef7ad)
2020-03-26 13:17:46 -07:00
Hayden Gomes
a010cef7ad Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts
Bug: 148098383
Test: built and ran with new version
Change-Id: I06f8f2cd73dce73111559664871bdd3c9b814d7c
2020-03-25 15:00:10 -07:00
TreeHugger Robot
28e7fc113b Merge "Add android.hardware.dumpstate@1.1-service.example to file_contexts" into rvc-dev 2020-03-25 19:55:24 +00:00
Roman Kiryanov
0c60039e5d Add android.hardware.dumpstate@1.1-service.example to file_contexts am: fc2956a559 am: 546897f6c6
Change-Id: Ie2ca9f8a82a93ffc3d1110cc9d06b05d9b4a77eb
2020-03-25 17:38:13 +00:00
Roman Kiryanov
546897f6c6 Add android.hardware.dumpstate@1.1-service.example to file_contexts am: fc2956a559
Change-Id: I4c9284855e9d445c352321c3afeff52883f0aac7
2020-03-25 17:16:51 +00:00
Treehugger Robot
d8f270ef6e Merge "Add android.hardware.dumpstate@1.1-service.example to file_contexts" 2020-03-25 16:54:06 +00:00
Ilya Matyukhin
244953b54c Add sepolicy for biometrics.face@1.[0-9]
Bug: 151331855
Bug: 145027036
Test: build and run on cuttlefish
Test: atest vts_treble_vintf_vendor_test
Merged-In: Iae0f157d3a670b506d6cc82686318544db41d559
Change-Id: Ia396005e0f569856e7d9873d48293bb9e05095b6
2020-03-24 11:02:13 -07:00
Roman Kiryanov
eff46106e3 Add android.hardware.dumpstate@1.1-service.example to file_contexts
Bug: 152067221
Test: VtsHalDumpstateV1_1TargetTest
Signed-off-by: Roman Kiryanov <rkir@google.com>
Merged-In: I448e1e4bd94c16f0f8cbd07a7d8390c0201056fa
Change-Id: I93f3d6cae005ade1e6edb69b81d2ea1a96b402d4
2020-03-24 10:26:49 -07:00
Ilya Matyukhin
1dce26cf96 Merge "Add sepolicy for biometrics.face@1.[0-9]" am: 3d8c069e97 am: ca695d5b5d
Change-Id: I3e35dc421204d865d25a30014c33f6eb1446f7eb
2020-03-23 23:51:39 +00:00
Ilya Matyukhin
3d8c069e97 Merge "Add sepolicy for biometrics.face@1.[0-9]" 2020-03-23 23:14:27 +00:00
Roman Kiryanov
fc2956a559 Add android.hardware.dumpstate@1.1-service.example to file_contexts
Bug: 152067221
Test: VtsHalDumpstateV1_1TargetTest
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: I448e1e4bd94c16f0f8cbd07a7d8390c0201056fa
2020-03-23 16:13:33 -07:00
Ilya Matyukhin
6d7d1b6687 Add sepolicy for biometrics.face@1.[0-9]
Bug: 151331855
Bug: 145027036
Test: build and run on cuttlefish
Change-Id: Iae0f157d3a670b506d6cc82686318544db41d559
2020-03-23 14:04:58 -07:00
Alistair Delva
4e264516ab Merge "Add gnss_device dev_type" am: d5a222d75a am: 8e755ce345
Change-Id: I6e9163b033008c5cd66e5894556ce2389800131f
2020-03-23 19:45:50 +00:00
Alistair Delva
d5a222d75a Merge "Add gnss_device dev_type" 2020-03-23 18:58:59 +00:00
Chris Weir
dcc585fcf0 Merge "Enable CAN HAL to scan /sys/devices for USB CAN" am: c58ad4b82c am: a2ad628f4f
Change-Id: I8d05c044bf753b4b5eb9572b3a13ea5a31de63e2
2020-03-17 21:39:03 +00:00
Chris Weir
c58ad4b82c Merge "Enable CAN HAL to scan /sys/devices for USB CAN" 2020-03-17 20:49:34 +00:00
Alistair Delva
1a3ee382ec Add gnss_device dev_type
This grants default access to the new GNSS subsystem for Linux to the
GNSS HAL default implementation. The GNSS subsystem creates character
devices similar to ttys but without much unneeded complexity. The GNSS
device class is specific to location use cases.

Bug: 151670529
Change-Id: I03b27aa5bbfdf600eb830de1c8748aacb9bf4663
2020-03-17 20:25:51 +00:00
chrisweir
05e9a6545c Enable CAN HAL to scan /sys/devices for USB CAN
CAN HAL needs access to /sys/devices to search for USB serial numbers
for SocketCAN devices and for USB serial devices.

Bug: 142654031
Test: Manual + VTS
Change-Id: I3d9bff94f8d8f936f7d859c01b9ff920fcbc5130
2020-03-17 12:10:07 -07:00
Steven Moreland
bfceeabe3c Allow vndservicemanager to self-register.
This is useful for tools like dumpsys, so that they work on all services
equally as well. Also, so that there is no difference with the regular
service manager.

Bug: 150579832
Test: 'adb shell /vendor/bin/dumpsys -l' shows 'manager'
Test: denial is no longer present:
03-05 12:23:47.346   221   221 E SELinux : avc:  denied  { add } for pid=221 uid=1000 name=manager scontext=u:r:vndservicemanager:s0 tcontext=u:object_r:service_manager_vndservice:s0 tclass=service_manager permissive=0

Change-Id: Id6126e8277462a2c4d5f6022ab67a4bacaa3241e
(cherry picked from commit 52a96cc7dd)
2020-03-06 16:35:52 -08:00
Automerger Merge Worker
c84153170f Merge "Allow vndservicemanager to self-register." am: 48eed15c35 am: cb31f479c5
Change-Id: Ie9a2a33659e8714bc50de909705b477680a38819
2020-03-06 18:16:10 +00:00
Steven Moreland
52a96cc7dd Allow vndservicemanager to self-register.
This is useful for tools like dumpsys, so that they work on all services
equally as well. Also, so that there is no difference with the regular
service manager.

Bug: 150579832
Test: 'adb shell /vendor/bin/dumpsys -l' shows 'manager'
Test: denial is no longer present:
03-05 12:23:47.346   221   221 E SELinux : avc:  denied  { add } for pid=221 uid=1000 name=manager scontext=u:r:vndservicemanager:s0 tcontext=u:object_r:service_manager_vndservice:s0 tclass=service_manager permissive=0

Change-Id: Id6126e8277462a2c4d5f6022ab67a4bacaa3241e
2020-03-05 17:43:35 +00:00
Changyeon Jo
3198f09709 Update automotive display service rules
This change updates sepolicies for automotive display service to make it
available to the vendor processes.

Bug: 149017572
Test: m -j selinux_policy
Change-Id: I48708fe25e260f9302e02749c3777c0ca0d84e4b
Signed-off-by: Changyeon Jo <changyeon@google.com>
(cherry picked from commit 17b38d526d)
2020-02-29 11:01:26 -08:00
Automerger Merge Worker
32f582a23c Merge "Update automotive display service rules" am: d36a0750e4 am: 3e54bef43f
Change-Id: I75af71dba278c7a72902b7dfa236d4632a30aa17
2020-02-25 16:11:43 +00:00
Changyeon Jo
17b38d526d Update automotive display service rules
This change updates sepolicies for automotive display service to make it
available to the vendor processes.

Bug: 149017572
Test: m -j selinux_policy
Change-Id: I48708fe25e260f9302e02749c3777c0ca0d84e4b
Signed-off-by: Changyeon Jo <changyeon@google.com>
2020-02-25 02:02:54 +00:00
Automerger Merge Worker
7934472245 Merge "Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL." am: 1948c11d13 am: 19516eb39f am: 5d5da562ba
Change-Id: Id5d55d29f52b7ed56c16de946c4c0e5fdf054f35
2020-02-19 23:18:16 +00:00
Automerger Merge Worker
efbd524476 Merge "Update file_contexts for contexthub HAL 1.1" am: c5953aba8b am: ab1bf2c331 am: 5beece6e58
Change-Id: Ic709e86c1e9ff2337c710d3e521e3f97a8343d66
2020-02-19 22:20:14 +00:00
David Zeuthen
1948c11d13 Merge "Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL." 2020-02-19 21:14:40 +00:00
David Zeuthen
02bf814aa2 Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL.
The credstore service is a system service which backs the
android.security.identity.* Framework APIs. It essentially calls into
the Identity Credential HAL while providing persistent storage for
credentials.

Bug: 111446262
Test: atest android.security.identity.cts
Test: VtsHalIdentityTargetTest
Test: android.hardware.identity-support-lib-test
Change-Id: I5cd9a6ae810e764326355c0842e88c490f214c60
2020-02-19 13:46:45 -05:00
Anthony Stange
667b2fa6ec Update file_contexts for contexthub HAL 1.1
Bug: 135951924
Test: Verify this lets contexthub HAL 1.1 run on a device that supports
it

Change-Id: I049e77d476ac0d090e48895a19a454b764aac74c
2020-02-18 23:12:05 +00:00
Automerger Merge Worker
db9794f0ed Merge "rebootescrow: allow use of block file" am: ebbc1b43cc am: d0cb7bf39a am: 9f707e3c15
Change-Id: I93247f43f6b6ecd448d606a8bba2c620b41ba91b
2020-01-28 17:46:23 +00:00
Kenny Root
ebbc1b43cc Merge "rebootescrow: allow use of block file" 2020-01-28 17:10:37 +00:00
Automerger Merge Worker
ad06d1c3ee Merge "Allow reading dt fstab in boot control HAL." am: 23a3355004 am: b4f243d0b9 am: 2ef17e8b8c
Change-Id: I2d900fa38a7980227c4f60e109e0e30658145539
2020-01-28 16:35:43 +00:00
David Anderson
9853c7522d Allow reading dt fstab in boot control HAL.
Fixes the following denial:
  type=1400 audit(0.0:4): avc: denied { read } for comm="android.hardwar" name="compatible" dev="sysfs" ino=28205 scontext=u:r:hal_bootctl_default:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=file permissive=0

This permission is needed for ReadDefaultFstab, which searches the device tree for fstab entries. Devices that use dt-fstab may fail to find the misc block device.

Bug: 143589455
Test: manual test
Change-Id: Ied52fe9b1056d26b4dd00811c4690fa4c505fae8
2020-01-28 01:03:38 +00:00
Kenny Root
960f73b75b rebootescrow: allow use of block file
pmem uses a block file while access_ramoops uses a char file. Allow both for
now until we can unify on pmem.

Additionally allow the reading of vendor properties so it can read the
path to the character or block device to open.

Test: atest VtsHalRebootEscrowTargetTest
Bug: 146400078
Change-Id: Ief61534e0946480a01c635ce1672579959ec8db5
2020-01-27 12:28:44 -08:00
Automerger Merge Worker
e987034615 Merge "Add sepolicy for biometrics.face@1.1" am: 915ad1ecbf am: 29b9d7d68e am: 82045b4624
Change-Id: Id04a58be24ba92ea06d4e71d2ff26c05a769f10b
2020-01-23 12:25:34 +00:00
Ilya Matyukhin
536796c6dd Add sepolicy for biometrics.face@1.1
Bug: 145027036
Test: build and run on cuttlefish
Change-Id: Ic3cc7755e65ba3537cbe817e0835ac34c04d6561
2020-01-22 17:17:12 -08:00
Automerger Merge Worker
ac2dd1ad0d Merge "stable aidl Power HAL policy" am: fbe4afa7aa am: 4cb024e790 am: 03a1842686
Change-Id: I83dd34152278d0b38ee50525950e06f7d77925d7
2020-01-16 23:09:09 +00:00
Wei Wang
fbe4afa7aa Merge "stable aidl Power HAL policy" 2020-01-16 22:35:42 +00:00
Automerger Merge Worker
da1f8e6709 Merge "Fix spelling of 'system' for android.hardware.identity@1.0-service.example" am: 89277a412d am: 91c15d1bc2 am: 550e7f28dd
Change-Id: I045e0fa2164a04541093637a72940ce3ec8e5982
2020-01-16 19:15:18 +00:00
Treehugger Robot
89277a412d Merge "Fix spelling of 'system' for android.hardware.identity@1.0-service.example" 2020-01-16 18:43:34 +00:00
Automerger Merge Worker
6acd552f07 Merge "Add sepolicy for usb gadget hal v1.1" am: a1f829d3f8 am: 5b62692346 am: f8cafa6bec
Change-Id: Ie61864b459214892fa15bfe1a65651ce95fc071e
2020-01-16 11:29:01 +00:00
Treehugger Robot
a1f829d3f8 Merge "Add sepolicy for usb gadget hal v1.1" 2020-01-16 11:01:35 +00:00
Automerger Merge Worker
ea13ded3a3 Merge "Add rebootescrow default HAL rules" am: 1145b90b69 am: 4e4bb65056 am: f2bb2e241b
Change-Id: I86c5354a5203982cedff4a4884520839df35c52d
2020-01-16 01:32:34 +00:00
Wei Wang
32b24c0f0b stable aidl Power HAL policy
Test: boot and dumpsys -l
Change-Id: I58022c9e0c24ba4e2d695acf63375c9f74c51b22
2020-01-15 16:53:40 -08:00
Treehugger Robot
1145b90b69 Merge "Add rebootescrow default HAL rules" 2020-01-16 00:24:59 +00:00
David Zeuthen
05ade22c65 Fix spelling of 'system' for android.hardware.identity@1.0-service.example
Bug: 111446262
Test: Manually
Change-Id: I37764f0ed580b4242e02c1958eabed88957adfd1
2020-01-15 19:05:24 -05:00
Automerger Merge Worker
5a24828f3e Merge "Add SELinux policy for Identity Credential HAL" am: a5527b4e46 am: 8924b794a7 am: 700b98a507
Change-Id: If6578fc781106395bd8e47b13aba4994d41ba986
2020-01-15 23:43:10 +00:00
Kenny Root
70c40e05f3 Add rebootescrow default HAL rules
Bug: 63928581
Test: build and check HAL label
Change-Id: I057b26eb20c5a6b022c7f391a6c8535f2953051c
2020-01-15 13:14:35 -08:00
Howard Yen
a98cdefad6 Add sepolicy for usb gadget hal v1.1
Bug: 147645728
Test: build pass and service running correctly
Change-Id: I52b6bcae2c05998e3f22c39998597e2ecef55036
2020-01-15 16:44:39 +08:00
David Zeuthen
b8b5da4305 Add SELinux policy for Identity Credential HAL
Bug: 111446262
Test: VtsHalIdentityCredentialTargetTest
Change-Id: Icb5a0d8b24d463a2f1533f8dd3bfa84bf90acc6f
2020-01-14 20:13:39 -05:00
Automerger Merge Worker
a36a52b562 Add device file for Resume on Reboot am: 2073d5b685 am: 58b31517b1 am: c7d5d9fcd7
Change-Id: I04a00fd23f019dd32c5dcad4daa986b3028db2e7
2019-12-19 02:46:50 +00:00
Kenny Root
2073d5b685 Add device file for Resume on Reboot
This adds the type and permissions for the default implementation to talk to
its kernel module.

Bug: 63928581
Test: boot Pixel 4 with default implementation

Change-Id: Ie847e4db975b95e90ea64937401e8d8a8ed812cb
2019-12-18 10:39:21 -08:00
Automerger Merge Worker
cbd87608df Merge "Modify SEPolicy to support SLCAN" am: 6ad4f3207a am: f1daf7567d am: 9beeb34e7b
Change-Id: I4101a255a284fcc1c04cf1833c30a23fcbdd4576
2019-12-11 22:08:06 +00:00
Chris Weir
6ad4f3207a Merge "Modify SEPolicy to support SLCAN" 2019-12-11 21:25:14 +00:00
Kenny Root
64de2059d3 Merge "Support Resume on Reboot" am: 6a9f7b265a am: 25e571fa5d
am: c11be97479

Change-Id: If3f7b5f69dc0cfba89e37d3bb22db84f5bde8e44
2019-12-10 05:11:13 -08:00
Kenny Root
6a9f7b265a Merge "Support Resume on Reboot" 2019-12-10 12:59:35 +00:00
Kenny Root
76ea325a3d Support Resume on Reboot
When an OTA is downloaded, the RecoverySystem can be triggered to store
the user's lock screen knowledge factor in a secure way using the
IRebootEscrow HAL. This will allow the credential encrypted (CE)
storage, keymaster credentials, and possibly others to be unlocked when
the device reboots after an OTA.

Bug: 63928581
Test: make
Test: boot emulator with default implementation
Test: boot Pixel 4 with default implementation
Change-Id: I1f02e7a502478715fd642049da01eb0c01d112f6
2019-12-09 14:25:04 -08:00
chrisweir
cd40aa0ab7 Modify SEPolicy to support SLCAN
SLCAN setup requires certain ioctls and read/write operations to
certain tty's. This change allows the HAL to set up SLCAN devices while
complying with SEPolicy.

In addition to adding support for SLCAN, I've also included permissions
for using setsockopt. In order for the CAN HAL receive error frames from
the CAN bus controller, we need to first set the error mask and filter
via setsockopt.

Test: manual
Bug: 144458917
Bug: 144513919
Change-Id: I63a48ad6677a22f05d50d665a81868011c027898
2019-12-04 14:06:09 -08:00
Stan Rokita
00231e4415 Merge "Add sensors multihal support in file_contexts regex" am: d494872641 am: 193dfaeca0
am: 50bd8a131b

Change-Id: Iae1cbd872e6ef7c6f3c8106ec4190f43ef761671
2019-12-02 13:45:37 -08:00
Stan Rokita
d494872641 Merge "Add sensors multihal support in file_contexts regex" 2019-12-02 20:54:57 +00:00
Harpreet \"Eli\" Sangha
ff8c5d6468 Merge "Fix File Context Entry for Bluetooth Services." am: d6a91453d8 am: ae8ad79141
am: bca6554594

Change-Id: I1756a10d49425e3611b9ab6dfe2e66d56012eabf
2019-11-26 20:11:34 -08:00
Harpreet \"Eli\" Sangha
078689ae03 Fix File Context Entry for Bluetooth Services.
Test: Boot on HiKey960 and check dmesg errors.
Change-Id: I9ac0968753c7cd9a23c63eac98b20a7778277716
Signed-off-by: Harpreet \"Eli\" Sangha <eliptus@google.com>
2019-11-27 10:11:12 +09:00
Tomasz Wasilczyk
82f3cba4e1 Merge "Vehicle HAL: allow communication with CAN bus HAL and alternative service naming" am: eeb6279953 am: fadede5a4d
am: 22e795881c

Change-Id: I8f65ad29253d701225722273e7fbad4da43ab31a
2019-11-22 13:47:59 -08:00
Tomasz Wasilczyk
eeb6279953 Merge "Vehicle HAL: allow communication with CAN bus HAL and alternative service naming" 2019-11-22 20:27:23 +00:00
Shawn Willden
129bdb4ddd Merge "Add Keymaster 4.1" am: 88554af5c0 am: e44ba58615
am: 138c5d4374

Change-Id: Ib574ba4f4cdf3ffe3db425b60818056cb759b57f
2019-11-21 15:01:37 -08:00
Stan Rokita
16d522871d Add sensors multihal support in file_contexts regex
Bug: 144722764
Test: N/A
Change-Id: Ic595d9c21639bdf2874dc6734344ff1a41767399
2019-11-21 08:57:58 -08:00
Shawn Willden
10f0b53ef7 Add Keymaster 4.1
Bug: 140193672
Bug: 140192237
Bug: 140824829
Test: Manual boot test
Change-Id: Iccc8cc5e8fc7c9301478faa50d0e18fa917283fb
2019-11-20 12:14:36 -07:00
Steven Moreland
231958e28d Merge "stable aidl vibrator policy" am: a71c74c188 am: 416aa29a30
am: 685d10c87f

Change-Id: Icbdf813b1317d3cbdec4547f2d832432763bb222
2019-11-01 14:54:22 -07:00
Tomasz Wasilczyk
3846fc25f6 Vehicle HAL: allow communication with CAN bus HAL and alternative service naming
Bug: 143779011
Test: implemented a VHAL service prototype that communicates with VHAL
Change-Id: I8f449510fc638e29a5cb23c0e32f3d87386ba9bc
2019-11-01 14:21:03 -07:00
Steven Moreland
d87649c645 stable aidl vibrator policy
Bug: 141828236
Test: boot, dumpsys -l
Change-Id: Id3fc8724238883116e840794309efbf6c91226c9
2019-10-29 16:39:55 -07:00
Yifan Hong
318582f265 Merge "Add health 2.1 HAL" am: ba48222bc7 am: 5daea7332d am: 55ed721302
am: 51bc766658

Change-Id: I8b4882a9ae8f64db9108b8ce98dd9b9eb6ec1790
2019-10-23 18:51:33 -07:00
Yifan Hong
ba48222bc7 Merge "Add health 2.1 HAL" 2019-10-24 01:03:09 +00:00
Yifan Hong
fbce5cce11 Add health 2.1 HAL
Test: VTS health 2.1 HAL test
Bug: 137670450
Change-Id: Iedc6972154c6e948eaf22b4650da39a9e73cb6f8
2019-10-17 16:35:43 -07:00
Henry Fang
414674f103 Merge "Update sepolicy to support cas@1.2" am: b3f755fbb4 am: 04abc97c6a am: 98346620f5
am: 571640f96d

Change-Id: I21e4c07603b7a346a198df422e4c4d1f3b6ec130
2019-10-15 22:06:24 -07:00
Henry Fang
b418dd991a Update sepolicy to support cas@1.2
Test: Manual
bug: 141783130
Change-Id: I973cb5d59d74c495eea18f4865baf0bd6f55e2fb
2019-10-14 17:37:17 -07:00
David Anderson
b12a53a7f5 Merge "Add sepolicy for IBootControl 1.1 and the default HAL." am: 0fb0781fb6 am: 25e83f480c am: f5c42c2738
am: 166982566c

Change-Id: Ief5166c30eb59baa08c2412b503b3d144a7c1709
2019-10-10 21:48:25 -07:00
David Anderson
0fb0781fb6 Merge "Add sepolicy for IBootControl 1.1 and the default HAL." 2019-10-10 19:19:49 +00:00
David Anderson
549e3c6d91 Add sepolicy for IBootControl 1.1 and the default HAL.
Bug: 138861550
Test: manual test
Change-Id: Ibc9a55266a2726cb8dc8550be0264db30b66109e
2019-10-08 14:24:38 -07:00
Bill Peckham
05fd2e52b9 Merge "Moving recovery resources from /system to /vendor" am: 0109fb24fc am: 62b54c4f8e am: dcdb3ebbf0
am: 8ee0b85f2a

Change-Id: I2db7b19266d4c75367b8399e07cd4d9c33549fa3
2019-10-04 20:45:05 -07:00
Bill Peckham
d0dc1a057d Moving recovery resources from /system to /vendor
This change is part of a topic that moves the recovery resources from the
system partition to the vendor partition, if it exists, or the vendor directory
on the system partition otherwise. The recovery resources are moving from the
system image to the vendor partition so that a single system image may be used
with either an A/B or a non-A/B vendor image. The topic removes a delta in the
system image that prevented such reuse in the past.

The recovery resources that are moving are involved with updating the recovery
partition after an update. In a non-A/B configuration, the system boots from
the recovery partition, updates the other partitions (system, vendor, etc.)
Then, the next time the system boots normally, a script updates the recovery
partition (if necessary). This script, the executables it invokes, and the data
files that it uses were previously on the system partition. The resources that
are moving include the following.

* install-recovery.sh
* applypatch
* recovery-resource.dat (if present)
* recovery-from-boot.p (if present)

This change includes the sepolicy changes to move the recovery resources from
system to vendor. The big change is renaming install_recovery*.te to
vendor_install_recovery*.te to emphasize the move to vendor. Other changes
follow from that. The net result is that the application of the recovery patch
has the same permissions that it had when it lived in system.

Bug: 68319577
Test: Ensure that recovery partition is updated correctly.
Change-Id: If29cb22b2a7a5ce1b25d45ef8635e6cb81103327
2019-10-04 14:40:27 -07:00
Steven Moreland
9b11665bf3 Deprecate libhwbinder/libhidltransport from VNDK. am: 9104421b1d
am: cc27e5f200

Change-Id: I10a2a94d895bdd76b7e7e957bd173f27eba25c71
2019-10-01 09:27:19 -07:00
Steven Moreland
9104421b1d Deprecate libhwbinder/libhidltransport from VNDK.
Since these libraries were vndk-sp, previously, passthrough HALs were
able to load them. However, now that they have been removed from the
vndk-sp set (these libraries are empty), marking them as
same_process_hal_file so that vendor passthrough implementations that
still link against these empty libraries can still use them.

Bug: 135686713
Test: boot device using these libraries from an sphal (otherwise,
    bootloops)
Change-Id: Ic5170eb0fcbb87c82bbea840dcfcb17899eaa899
(cherry picked from commit 71a596a49b443e5ae3518301ffdf9e6b95d4d94d)
2019-10-01 01:39:51 +00:00
Steven Moreland
b081eee00e Deprecate libhwbinder/libhidltransport from VNDK.
Since these libraries were vndk-sp, previously, passthrough HALs were
able to load them. However, now that they have been removed from the
vndk-sp set (these libraries are empty), marking them as
same_process_hal_file so that vendor passthrough implementations that
still link against these empty libraries can still use them.

Bug: 135686713
Test: boot device using these libraries from an sphal (otherwise,
    bootloops)
Change-Id: Ic5170eb0fcbb87c82bbea840dcfcb17899eaa899
2019-09-26 15:49:50 -07:00
Tri Vo
b23ec2efab Merge "sepolicy: ashmem entry point for libcutils" am: e612ecd6ed am: e570bf7ea4 am: 76333c6b08
am: 498c8fb53f

Change-Id: Ib3eb8d7f37bb94ec6363e6a77e2bdf04663300b0
2019-09-26 12:08:42 -07:00
Tri Vo
a7f61021b7 sepolicy: ashmem entry point for libcutils
This duplicated ashmem device is intended to replace ashmemd.

Ashmem fd has a label of the domain that opens it. Now with ashmemd
removed, ashmem fds can have labels other than "ashmemd", e.g.
"system_server". We add missing permissions to make ashmem fds usable.

Bug: 139855428
Test: boot device
Change-Id: Iec8352567f1e4f171f76db1272935eee59156954
2019-09-25 11:26:18 -07:00
Steven Moreland
9106bf90f8 Merge "Rename dumpstate service to include '.example'." am: 2d572464af am: 82d825df79 am: 44a58b7112 am: cfda39e3b0
am: b3d1b4ed9a

Change-Id: Ibc02cd22d73329eb5cec05b17976dd4051e2c0f6
2019-08-27 18:52:34 -07:00
Steven Moreland
82d825df79 Merge "Rename dumpstate service to include '.example'."
am: 2d572464af

Change-Id: I81ce7c04472893d7e77aa974969b484b93c7beaa
2019-08-27 16:26:23 -07:00
Steven Moreland
10d260950d Rename dumpstate service to include '.example'.
Since this was an example service providing no real functionality and
accidentally got installed on a device.

Bug: 140115084
Test: install on test device and see that it runs
Change-Id: I553da8e1f4da7d6a9f0c3e7d4a3561f0b22321dc
2019-08-27 11:07:51 -07:00
Jon Spivack
2a97c025e3 Merge "Allow vndservicemanager to start processes" am: 018f745b90 am: 685af5eaab am: fdc17e034e am: 0e4d8301aa
am: ad016e8060

Change-Id: Id236bbca47876be8370e25108ae47afd26098e00
2019-08-26 12:43:19 -07:00
Marissa Wall
16ff192d62 Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy" am: 1751aa5b80 am: 6782faba9f am: dd52020c88 am: 86b7d95c79
am: dfc86e4036

Change-Id: I351fc8efa4254e366e4f8c1e953e0941d0a19713
2019-08-26 12:41:36 -07:00
Jon Spivack
685af5eaab Merge "Allow vndservicemanager to start processes"
am: 018f745b90

Change-Id: I42f16342f807cabebc1e258a353b1cea5b13472e
2019-08-22 18:50:11 -07:00
Jon Spivack
018f745b90 Merge "Allow vndservicemanager to start processes" 2019-08-23 01:29:06 +00:00
Marissa Wall
6782faba9f Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy"
am: 1751aa5b80

Change-Id: I072a3950a3f57ab0a78e95ee2c73c6d71245d373
2019-08-22 10:48:50 -07:00
Treehugger Robot
1751aa5b80 Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy" 2019-08-22 17:20:45 +00:00
Steven Moreland
52afb27ec7 Merge changes Icdf207c5,I20aa48ef am: 30a06d278f am: 169bfcfe88 am: 99f2860521 am: 4a474dc430
am: bc0374bdc4

Change-Id: Ib48f8593db8744cddb9bb6b877947c5ca13bc5f4
2019-08-20 14:26:29 -07:00
Steven Moreland
169bfcfe88 Merge changes Icdf207c5,I20aa48ef
am: 30a06d278f

Change-Id: Ia505b1539cfd64bb93c2f5fe0dbd0603df5e9f5f
2019-08-20 13:41:45 -07:00
Steven Moreland
641c45e258 mediacodec: remove non-Treble allows
Since mediacodec system services have been entirely deleted.

Bug: 80317992
Test: TH
Change-Id: I20aa48ef57474df000279a487f6b077790d273c1
2019-08-20 00:03:24 +00:00
Jon Spivack
b58c4c2a62 Allow vndservicemanager to start processes
Used to lazily start AIDL services.

Bug: 138756857
Test: Manual
Change-Id: I890ca70e654f8e8bb795189abb4018c0d5d05865
2019-08-19 16:05:13 -07:00
Amy Zhang
c23667f999 Merge "Tuner Hal 1.0 Enable ITuner service" am: 3e7429359f am: 3b62596f4f am: 11739f3126 am: a588ba4e3e
am: 5bd0803562

Change-Id: I7dfa4df490f1365edcecaf69e2971378177d56ef
2019-08-15 16:07:07 -07:00
Amy Zhang
3b62596f4f Merge "Tuner Hal 1.0 Enable ITuner service"
am: 3e7429359f

Change-Id: Ic4442460d60d51e97c84ea430830cd12c205e5f6
2019-08-15 13:23:33 -07:00
Amy
89b4bbd4d8 Tuner Hal 1.0 Enable ITuner service
Test: cuttlefish
Bug: 135708935
Change-Id: Ica063458860df45f0e2ab640a2ab35cd4da3da8e
2019-08-14 11:22:09 -07:00
Tomasz Wasilczyk
9794dd74a3 SEPolicy rules for CAN bus HAL am: 602b30302a am: 0540154021 am: 2f0ee4345f am: ce9863e755
am: b94bb81337

Change-Id: Id35783f576554cfce08126bc1ee0216af7fc70bd
2019-08-01 20:21:08 -07:00
Tomasz Wasilczyk
0540154021 SEPolicy rules for CAN bus HAL
am: 602b30302a

Change-Id: I5ae916b8f4c3d6038c48a522df1efc2ce8fc3d39
2019-08-01 19:34:47 -07:00
Tomasz Wasilczyk
602b30302a SEPolicy rules for CAN bus HAL
Bug: 135918744
Test: VTS (separate new change)
Change-Id: Idd3ca882e3bd36b95a5412bdfbf6fe9d6e911ba9
2019-08-01 10:24:00 -07:00
Changyeon Jo
154451ff7a Update sepolicy for EVS v1.x am: 5ee628f0ce am: c90bc366e6 am: d8072b0fef am: ee1ad87354
am: 51b22f6155

Change-Id: I7466c5a9c359a83e4d38027a3d29c6d9cf3a5f13
2019-07-30 20:40:48 -07:00
Changyeon Jo
c90bc366e6 Update sepolicy for EVS v1.x
am: 5ee628f0ce

Change-Id: I3aa2c140f2ab37a604ab70221926d15c25822bef
2019-07-30 19:57:29 -07:00
Changyeon Jo
5ee628f0ce Update sepolicy for EVS v1.x
Modify vendor file context and hal_evs_server policy to enable EVS v1.1
service.

Change-Id: I1e717b3209200300005c3fa7f91423589505a41c
Signed-off-by: Changyeon Jo <changyeon@google.com>
2019-07-30 13:22:03 -07:00
Kevin Rocard
647c58e50c Merge "Rename audio hal service" am: e4466e8ec7 am: 09a2074c71 am: f027d2f140
am: db63da9e39

Change-Id: Ie8a1afe479fc663e14b2907248c7a2d25515cee2
2019-07-09 11:39:39 -07:00
Kevin Rocard
09a2074c71 Merge "Rename audio hal service"
am: e4466e8ec7

Change-Id: Ib8824bda3c2fd3bd350290bf40171898d408fa60
2019-07-09 11:06:25 -07:00
Kevin Rocard
8fcd26e448 Rename audio hal service
The audio HAL service name previously contained the audio HAL version
of the first audio HAL it supported.
Nevertheless, the same service can and do host all audio HAL versions.

Aka there is only one audio HAL service, and the version in its name is
technical dept and should not be changed.

This caused many confusions during vendor HAL upgrade as the
service version number was erroneously updated leading to
device boot loop.

The new service name is:
android.hardware.audio.service
The old one was:
android.hardware.audio@2.0-service

Keeping both names valid as most phones will not rename
the service immediately.

Bug: 78516186
Test: boot & check the audio HAL is up with the old and new name
Change-Id: I2ce0182fd919af6eb8325d49682b4374be00344e
Signed-off-by: Kevin Rocard <krocard@google.com>
2019-07-08 22:25:18 +00:00
Marissa Wall
3474653bd0 gralloc: add IAllocator/IMapper 4.0 sepolicy
Add support for gralloc 4.0 to sepolicy

Bug: 136016160
Test: Compiles and boots

Change-Id: I148cc19176275e8cbd19cc95aa95d4d450353b7a
2019-06-25 12:17:36 -07:00
Matthias Kramm
2a7f5db521 Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" am: f4362c08c7 am: 199db0ceb1 am: 1710bbd6fe
am: c69c613942

Change-Id: I396e68b0ca30ba884c43acf685d7100849e635ee
2019-06-19 21:37:37 -07:00
Matthias Kramm
1710bbd6fe Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" am: f4362c08c7
am: 199db0ceb1

Change-Id: Icce34a06c681b8d3717061c31d142622acbfd979
2019-06-19 18:36:04 -07:00
Treehugger Robot
f4362c08c7 Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" 2019-06-19 23:44:27 +00:00
Matthias Kramm
ebcc08249b Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."
This reverts commit 3a44b17897.

Reason for revert: Moved to downstream repo.

Change-Id: I7d3ad43335f71ed03e7a93bc5c96a8933785afd8
2019-06-19 20:15:50 +00:00
Matthias Kramm
469932dec9 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." am: 9faeec71f2 am: c58cd73209 am: cf010dcb85
am: 44bb087de2

Change-Id: I44ab3f9695e778ddc45d7c098b99d1c974e7312d
2019-06-17 14:41:22 -07:00
Matthias Kramm
cf010dcb85 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." am: 9faeec71f2
am: c58cd73209

Change-Id: I102966877e40ec5c56033feb510e519c033aa407
2019-06-17 12:48:25 -07:00
Matthias Kramm
9faeec71f2 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." 2019-06-17 19:31:50 +00:00
Valerie Hau
bffbdf0d08 Add IMapper2.1 same process hal permissions am: d3499df3cf am: 178ef8ccad am: 5162b0c3d0
am: ec0fc9a7d9

Change-Id: Ic91709f5b9564b409c7a0a4b28a853ad527442b5
2019-06-17 11:57:06 -07:00
Valerie Hau
5162b0c3d0 Add IMapper2.1 same process hal permissions am: d3499df3cf
am: 178ef8ccad

Change-Id: Ifaef339d29e8f0547cc5c3eb4992b14f1c7a81f3
2019-06-17 11:42:02 -07:00
Valerie Hau
d3499df3cf Add IMapper2.1 same process hal permissions
Bug: 135166668
Test: build, boot, VtsHalGraphicsComposerV2_2TargetTest
Change-Id: Iedc11b73d3e3ba54dcd622b128cb513adec11d69
2019-06-14 12:31:17 -07:00
Matthias Kramm
3a44b17897 Allow hal_face to write to /data/vendor/camera_calibration/*.
Also, allow hal_camera to read from there.

Bug: 133792720
Change-Id: Iedec8d7325b4424d166f8e4d09182e1f29808ef2
Test: Running presubmit.
2019-06-14 05:53:59 -07:00
Joel Galenson
08a0379943 Merge "Give hal_drm_server appdomain fd access." am: 7d258073df am: 2c465fa2bb am: d181604ce1
am: 926731d20d

Change-Id: I278eed76e64ef768491982f901f8065a3da81b64
2019-06-10 11:53:12 -07:00
Joel Galenson
d181604ce1 Merge "Give hal_drm_server appdomain fd access." am: 7d258073df
am: 2c465fa2bb

Change-Id: I89eff6ce6cb82ad2a65c79a3c4e934b9a6ea81b6
2019-06-10 11:43:41 -07:00
Joel Galenson
0608ab5f9d Give hal_drm_server appdomain fd access.
Test: Build.
Change-Id: I29f68964f4ae2ad2c3a00c96f57f48448d8b6dfb
2019-06-05 10:12:28 -07:00
Pawin Vongmasa
7b41487d1f Merge "Properly define hal_codec2 and related policies" into qt-dev am: cf48bfd082 am: 789db9aeca
am: aacbaf7685

Change-Id: I43943a50bc022d4c7e17e0764dbb51b4f624b7e7
2019-05-24 18:33:42 -07:00
TreeHugger Robot
cf48bfd082 Merge "Properly define hal_codec2 and related policies" into qt-dev 2019-05-24 07:21:23 +00:00
Pawin Vongmasa
609c243dd0 Properly define hal_codec2 and related policies
Test: make cts -j123 && cts-tradefed run cts-dev -m \
CtsMediaTestCases --compatibility:module-arg \
CtsMediaTestCases:include-annotation:\
android.platform.test.annotations.RequiresDevice

Bug: 131677974
Change-Id: I59c3d225499a8c53c2ed9f3bd677ff3d7423990b
2019-05-23 03:53:47 -07:00
Tao Bao
a5243f01a9 Merge "Add vendor_misc_writer." am: ccf8af80b0 am: 986d2b296a am: 848861d8a3
am: c576c2c835

Change-Id: I71e4f4544616bf9be3d80b1c4f964bd0b9cb4dad
2019-05-21 07:53:20 -07:00
Tao Bao
8f39cce73a Add vendor_misc_writer.
The space between 2K and 16K in /misc is currently reserved for vendor's
use (as claimed in bootloader_message.h), but we don't allow vendor
module to access misc_block_device other than vendor_init.

The change in the topic adds a `misc_writer` tool as a vendor module,
which allows writing data to the vendor space to bridge the gap in the
short term. This CL adds matching labels to grant access.

Long term goal is to move /misc as vendor owned, then to provide HAL
access from core domain (b/132906936).

Bug: 132906936
Test: Build crosshatch that includes misc_writer module. Invoke
      /vendor/bin/misc_writer to write data to /misc.
Change-Id: I4c18d78171a839ae5497b3a61800193ef9e51b3b
Merged-In: I4c18d78171a839ae5497b3a61800193ef9e51b3b
(cherry picked from commit 42c05cfcc1)
2019-05-21 07:06:31 -07:00
Tao Bao
848861d8a3 Merge "Add vendor_misc_writer." am: ccf8af80b0
am: 986d2b296a

Change-Id: I89d5eb83fc0caacf8a883321c14d5c26925fe6da
2019-05-21 06:56:51 -07:00
Tao Bao
42c05cfcc1 Add vendor_misc_writer.
The space between 2K and 16K in /misc is currently reserved for vendor's
use (as claimed in bootloader_message.h), but we don't allow vendor
module to access misc_block_device other than vendor_init.

The change in the topic adds a `misc_writer` tool as a vendor module,
which allows writing data to the vendor space to bridge the gap in the
short term. This CL adds matching labels to grant access.

Long term goal is to move /misc as vendor owned, then to provide HAL
access from core domain (b/132906936).

Bug: 132906936
Test: Build crosshatch that includes misc_writer module. Invoke
      /vendor/bin/misc_writer to write data to /misc.
Change-Id: I4c18d78171a839ae5497b3a61800193ef9e51b3b
2019-05-20 14:40:15 -07:00
Roshan Pius
56dfc06397 sepolicy: Remove offload HAL sepolicy rules
This is unused currently & there are no concrete plans to use it
in the future.

Bug: 130080335
Test: Device boots up & connects to networks.
Test: Will send for regression tests
Change-Id: I785389bc2c934c8792c8f631362d6aa0298007af
2019-05-01 12:48:45 -07:00
Jack Yu
58329f6536 Add sepolicy for nfc hal v1.2
Bug: 130509605
Test: No avc denial log and NFC works with hal v1.2
Change-Id: If54884f76a32705d11f2085f66fe83b9e0354f79
Merged-In: If54884f76a32705d11f2085f66fe83b9e0354f79
(cherry picked from commit a5dde796b5)
2019-04-24 09:58:44 +08:00
Jack Yu
181b6376d0 Merge "Add sepolicy for nfc hal v1.2" am: fd2d7b3f5c
am: c4b5e0a3a8

Change-Id: Id4c20b3c5fd3538359ce9d2756e19ae993b0c855
2019-04-22 23:56:05 -07:00
Jack Yu
a5dde796b5 Add sepolicy for nfc hal v1.2
Bug: 130509605
Test: No avc denial log and NFC works with hal v1.2
Change-Id: If54884f76a32705d11f2085f66fe83b9e0354f79
2019-04-22 12:08:20 +00:00
Henry Fang
1f1e36069d Change sepolicy to allow cas@1.1 service
Modify sepolicy configure file, so that cas@1.1 service can run
Test: Manual
bug: 124016538

Change-Id: I0b160bc1c575aa18ffead7ff136509fc9dcfb472
Merged-In: I142a6cd66a81ad9e0c8b4d87da672fb8f5c181d6
2019-02-08 22:05:25 +00:00
Henry Fang
1087a9e3e2 enable cas@1.1 interface
Change sepolicy to allow cas@1.1 service to run
Test: Manual
bug: 123903559

Change-Id: I142a6cd66a81ad9e0c8b4d87da672fb8f5c181d6
2019-02-05 13:16:37 -08:00
Peter Kalauskas
60c468c312 Merge "Allow lazy wifi HAL to run" am: 2613456a36 am: 66e92002e0
am: 8f91716a6b

Change-Id: I075e0062107a17351493693eaa2784023a861943
2019-01-31 14:40:41 -08:00
Peter Kalauskas
2613456a36 Merge "Allow lazy wifi HAL to run" 2019-01-31 22:05:47 +00:00
Jeff Vander Stoep
c4bc7d04db Initial selinux policy support for memfd am: 9f5d0d90a3 am: 5314cb2a93
am: beb8e5d159

Change-Id: Ia03563336f924ea99af2763b2edc71c2be52b6d3
2019-01-30 11:51:10 -08:00
Jeff Vander Stoep
9f5d0d90a3 Initial selinux policy support for memfd
Move all app tmpfs types to appdomain_tmpfs. These are still protected
by mls categories and DAC. TODO clean up other app tmpfs types in a
separate change.

Treble-ize tmpfs passing between graphics composer HAL and
surfaceflinger.

Bug: 122854450
Test: boot Blueline with memfd enabled.
Change-Id: Ib98aaba062f10972af6ae80fb85b7a0f60a32eee
2019-01-30 19:11:49 +00:00
Peter Kalauskas
03f43017b2 Allow lazy wifi HAL to run
Test: Manually check that lazy wifi HAL runs
Bug: 123307146
Change-Id: I22f9bc7a097056215d249b692b6f39a71b6b9811
2019-01-30 18:52:19 +00:00
Jeff Vander Stoep
41a2abfc0d Properly Treble-ize tmpfs access
This is being done in preparation for the migration from ashmem to
memfd. In order for tmpfs objects to be usable across the Treble
boundary, they need to be declared in public policy whereas, they're
currently all declared in private policy as part of the
tmpfs_domain() macro. Remove the type declaration from the
macro, and remove tmpfs_domain() from the init_daemon_domain() macro
to avoid having to declare the *_tmpfs types for all init launched
domains. tmpfs is mostly used by apps and the media frameworks.

Bug: 122854450
Test: Boot Taimen and blueline. Watch videos, make phone calls, browse
internet, send text, install angry birds...play angry birds, keep
playing angry birds...

Change-Id: I20a47d2bb22e61b16187015c7bc7ca10accf6358
Merged-In: I20a47d2bb22e61b16187015c7bc7ca10accf6358
(cherry picked from commit e16fb9109c)
2019-01-26 17:30:41 +00:00
Jeff Vander Stoep
e16fb9109c Properly Treble-ize tmpfs access
This is being done in preparation for the migration from ashmem to
memfd. In order for tmpfs objects to be usable across the Treble
boundary, they need to be declared in public policy whereas, they're
currently all declared in private policy as part of the
tmpfs_domain() macro. Remove the type declaration from the
macro, and remove tmpfs_domain() from the init_daemon_domain() macro
to avoid having to declare the *_tmpfs types for all init launched
domains. tmpfs is mostly used by apps and the media frameworks.

Bug: 122854450
Test: Boot Taimen and blueline. Watch videos, make phone calls, browse
internet, send text, install angry birds...play angry birds, keep
playing angry birds...

Change-Id: I20a47d2bb22e61b16187015c7bc7ca10accf6358
2019-01-25 08:56:45 -08:00
Peter Kalauskas
74eed68b46 Merge "Allow lazy HAL to run" am: b6388fe753 am: a8ee48d499
am: 91dc2bca8c

Change-Id: I379d162d5a1f4f235049e74339ecdc3c2b9d413b
2019-01-24 07:52:24 -08:00
Peter Kalauskas
b1bdbb58cf Allow lazy HAL to run
Test: Manual
Change-Id: Ic4c3fd5b2d8d709573f8cc6332a6340d28d3ba26
2019-01-23 15:29:05 -08:00
Brian Stack
b1122f9372 Merge "Add selinux policy for Sensors HAL 2.0" am: 1e6055f172 am: 38626e4975
am: 76b2cccbc3

Change-Id: I1b1b6912556bffe17ce9d2a52a3fb1d53f11129a
2019-01-22 20:34:11 -08:00
Brian Stack
b8baed8fa7 Add selinux policy for Sensors HAL 2.0
Bug: 122267378
Test: Builds, no dmesg errors when starting Sensors HAL 2.0
Change-Id: Ieb52449579f72421bf8f36fb6af0cb110d04bd1c
2019-01-22 21:02:21 +00:00
Marissa Wall
c82e6e3671 Merge "gralloc3: add sepolicy for allocator/mapper 3.0" am: 7f22034591 am: e41834c88e
am: cfd4adebac

Change-Id: I25195cbaeab45407cd131b5ea1eea60f78d19ba4
2019-01-17 16:19:44 -08:00
Marissa Wall
97f5383895 gralloc3: add sepolicy for allocator/mapper 3.0
IAllocator and IMappaer are being rev'd to 3.0. Update sepolicy to
allow them to be used.

Test: compile with allocator/mapper patches add boot the device
Bug: 120493579
Change-Id: Id241c6bd79c02ec93d8dd415539f90a18f733d03
2019-01-17 11:56:08 -08:00
Wei Wang
d8339d7b28 Thermal: remove mock implementation sepolicy
Test: Build
Change-Id: I92562077535593aa62e4536b58cd43378aa65a6d
2019-01-14 09:18:32 -08:00
Siarhei Vishniakou
434dd2d6c7 Merge "Permissions for InputClassifier HAL" am: 1531e72e76 am: f01aeef78c
am: 26670ab73f

Change-Id: I45ee39fb63dab2ec91a5a909e59c990bacc7c48a
2019-01-11 11:54:26 -08:00
Eino-Ville Talvala
579314c66a Camera HAL: Allow minor version changes to camera.provider
Test: Adding a camera.provider@2.5 to a device works correctly
Merged-In: I516698afedad1294c0af3f4efedb0aed0a141780
Change-Id: I516698afedad1294c0af3f4efedb0aed0a141780
2019-01-11 19:24:47 +00:00
TreeHugger Robot
11111939ef Merge "Camera HAL: Allow minor version changes to camera.provider" 2019-01-11 04:28:51 +00:00
Siarhei Vishniakou
41a871ba84 Permissions for InputClassifier HAL
Add the required permissions for the InputClassifier HAL.

Bug: 62940136
Test: no selinux denials in logcat when HAL is used inside input flinger.
Change-Id: Ibc9b115a83719421d56ecb4bca2fd196ec71fd76
2019-01-11 02:08:19 +00:00
Eino-Ville Talvala
2efd25cc4a Camera HAL: Allow minor version changes to camera.provider
Test: Adding a camera.provider@2.5 to a device works correctly
Change-Id: I516698afedad1294c0af3f4efedb0aed0a141780
2019-01-08 17:02:43 -08:00
Peter Kalauskas
d1eeffc551 Allow lazy drm services to run
Change-Id: I13f7bb0d04b5388180683edd6d5dc75555ada644
2018-12-28 13:16:55 -08:00
Zachary Iqbal
4c7469ad38 Added placeholder SELinux policy for the biometric face HAL. am: 893272d883 am: f8be9cf1c0
am: ab1e43cdad

Change-Id: If9c63acee76a9574c2e2fdbd7a2796bf89d194cc
2018-12-28 13:00:42 -08:00
Zachary Iqbal
893272d883 Added placeholder SELinux policy for the biometric face HAL.
Notes:
- Added face hal domain, context and file types for the default
  SELinux policy.
- Please see aosp/q/topic:"Face+Authentication"

Bug: 80155388
Test: Built successfully.
Change-Id: I2e02cf6df009c5ca476dfd842b493c6b76b7712a
2018-12-28 12:23:56 -08:00
Peiyong Lin
3a4b920de6 [SEPolicy] Add composer 2.3
Use regular expression for all composer service versions.

BUG: 115554640
Test: Build, flash and boot

Merged-In: Ie84ebb0a43c9eaad66829b15deaa8b3046bd7fe4
Change-Id: Ie84ebb0a43c9eaad66829b15deaa8b3046bd7fe4
2018-12-22 03:00:03 +00:00
Peiyong Lin
da3a837b97 [SEPolicy] Add composer 2.3
Use regular expression for all composer service versions.

BUG: 115554640
Test: Build, flash and boot

Change-Id: Ie84ebb0a43c9eaad66829b15deaa8b3046bd7fe4
2018-12-21 06:42:33 -08:00
Chong Zhang
bb2c7eb3dd Merge "Use hidl memory from allocator in CAS" am: 490cbfdbd3 am: fd59441275
am: c13fa3ce4d

Change-Id: I2adc312dd0eb948be0bcdf8bf24e67d8ab06efc0
2018-12-18 12:47:50 -08:00
Chong Zhang
404e40c6c1 Use hidl memory from allocator in CAS
Make mediaextractor use hidl memory allocated by
hidl allocator, instead of constructing hidl memory
from IMemory.

bug: 112766913
bug: 111407253
Change-Id: I7902f18768005c995925bc9a7947299e9988b68a
(Needed for internal commit I39e131718ea41f9cb23177c28213ddf7b7741338)
2018-12-17 22:49:18 +00:00
Peter Kalauskas
359d659cd6 Merge "Allow lazy cas service to run" am: f0b4fedc1c am: 85a60b8d99
am: c9e5f6518d

Change-Id: Iddef2266775ea4d2c00c7c7c3bab0e4ea8df69a9
2018-12-16 15:12:59 -08:00
Peter Kalauskas
4cc196f48a Allow lazy cas service to run
Test: Run CtsMediaTestCases on aosp_marlin_svelte
Change-Id: Ie7d491fbc11ef5c24826a0d69e479bc03bd2ad08
2018-12-14 21:29:58 +00:00
Yu-Han Yang
01dcae13b5 Merge "Add sepolicy for GNSS HAL 2.0 and 1.1" am: 66f75b699f am: c668a9ab13
am: d42cd8b5b2

Change-Id: I70c9ce2598bed332929124d212d4e77c98759487
2018-12-13 15:10:21 -08:00
Yu-Han Yang
63de8591e8 Add sepolicy for GNSS HAL 2.0 and 1.1
Bug: 112260995
Bug: 120277977
Test: atest VtsHalGnssV2_0TargetTest
Change-Id: I196d8506b2f7c2153e1f647ea5ba61b81bf3d881
2018-12-12 13:41:01 -08:00
Benjamin Schwartz
e7040eada0 Add power.stats HAL 1.0 sepolicy
Also giving statsd permission to access it. This change copies the internal sepolicy to AOSP.

Bug: 111185513
Bug: 120551881
Test: make
Change-Id: I7e0386777e05580299caf9b97cb7804459f1a9d0
2018-12-11 00:11:08 +00:00
Peter Kalauskas
46b6d252e8 Add rules to allow default lazy camera HAL
Test: Reboot and ensure lazy camera HAL can run
Change-Id: I4cd9fe75537c6aca561830524e25fba631a12def
2018-12-07 13:29:22 -08:00
Kevin DuBois
7fc5b9ff83 Merge "add updated graphics.composer (2.3) to sepolicy" 2018-10-29 15:05:17 +00:00
Kevin DuBois
815f504cae add updated graphics.composer (2.3) to sepolicy
Allows graphics.composer@2.3 services to run.

Test: Boot, make sure UI comes up, 2.3 service is running
Bug: 116028976

Change-Id: I58c2a7523aa3277596add74eef61eaaba6230622
2018-10-25 13:36:34 -07:00
Vinay Kalia
fa445507d2 Merge "Add power.stats HAL 1.0 sepolicy" 2018-10-23 23:34:03 +00:00
Vinay Kalia
a4babcf2be Add power.stats HAL 1.0 sepolicy
BUG: 117424656
BUG: 111185513
Test: run vts -m VtsHalPowerStatsV1_0Target

Change-Id: Icb0790219df4189c0dabbe41221e69e56d000755
2018-10-23 18:12:10 +00:00
Wei Wang
03c669f5a3 Merge "Add sepolicy for thermal HAL 2.0" 2018-10-20 04:52:42 +00:00
Wei Wang
b0517359c4 Add sepolicy for thermal HAL 2.0
Bug: 116540200
Test: add default ThermalHAL 2.0 and VtsHalThermalV2_0TargetTest pass
Change-Id: I9e6f8d040b331f07a931d91cafd6921600f04ccd
2018-10-19 16:49:17 -07:00
Kim Low
dfc7348b25 Merge "Add input_device permission to hal_sensors_default" am: 24e2b82446 am: 22fbea2c34
am: b1edca4ae9

Change-Id: I73f8af3eca7bc63d58b49d3c3d1b1a0986b23632
2018-10-19 15:48:13 -07:00
Treehugger Robot
24e2b82446 Merge "Add input_device permission to hal_sensors_default" 2018-10-19 22:24:54 +00:00
Chong Zhang
f6721de82e Merge "add mediaswcodec service" am: 9977e25411 am: 817027b055
am: b1b6bf9bb3

Change-Id: I9f0252a0661c5ce533ba5f307035456b5c55a3ed
2018-10-11 19:19:35 -07:00
Chong Zhang
bdbfff1b00 add mediaswcodec service
Set up a new service for sw media codec services.

Bug: 111407413

Test: cts-tradefed run cts-dev --module CtsMediaTestCases --compatibility:module-arg CtsMediaTestCases:include-annotation:android.platform.test.annotations.RequiresDevice
Change-Id: Ia1c6a9ef3f0c1d84b2be8756eb1853ffa0597f8e
2018-10-11 15:10:17 -07:00
Wei Wang
bc71a6109e Add atrace HAL 1.0 sepolicy
Bug: 111098596
Test: atrace/systrace

(cherry picked from commit 9ed5cf6e43)

Change-Id: I97772ff21754d03a0aea0d53b39e8da5312a17c0
2018-09-27 23:18:29 +00:00
Wei Wang
9ed5cf6e43 Add atrace HAL 1.0 sepolicy
Bug: 111098596
Test: atrace/systrace
Change-Id: I06ca76750d640c98849c475c8a237d62c8e582b9
2018-09-25 21:02:10 -07:00
Tri Vo
f16aad1cce Merge "More granular vendor access to /system files." am: 6816044271 am: 70f1c88fa6
am: 2ce65bef69

Change-Id: Ia6bda63626f088f7c6211706f6b6a42f9e8c1a42
2018-09-21 18:46:06 -07:00
Tri Vo
6816044271 Merge "More granular vendor access to /system files." 2018-09-22 01:30:25 +00:00
Yifan Hong
1cef6a94eb health.filesystem HAL renamed to health.storage
...to reflect that the HAL operates on storage devices,
not filesystem.

Bug: 111655771
Test: compiles
Change-Id: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
Merged-In: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
2018-09-20 04:12:45 +00:00
Tri Vo
5c1fe61eaa More granular vendor access to /system files.
This change limits global access to /system files down to:
/system/bin/linker*
/system/lib[64]/*
/system/etc/ld.config*
/system/etc/seccomp_policy/*
/system/etc/security/cacerts/*
/system/usr/share/zoneinfo/*

Bug: 111243627
Test: boot device, browse internet without denials to system_* types.
Test: VtsHalDrmV1_{1, 0}TargetTest without denials
Change-Id: I69894b29733979c2bc944ac80229e84de5d519f4
2018-09-20 03:07:50 +00:00
Yifan Hong
145940f6cf health.filesystem HAL renamed to health.storage
...to reflect that the HAL operates on storage devices,
not filesystem.

Bug: 111655771
Test: compiles
Change-Id: Ibb0572cb1878359e5944aa6711331f0c7993ba6e
2018-09-19 12:01:10 -07:00
Joel Galenson
732e92b6fe Remove fixed bugs from bug_map.
Test: Build.
Change-Id: I5c02916dfa3b2e8d5ba2bc586d05a69bd1f1254f
Merged-In: I150bc74b13a77f00a7e8b31a6c2edf9654bdbe59
2018-09-17 08:42:55 -07:00
Andy Hung
33f9b05cb1 Merge "hal_audio_default: allow audioserver fd for status dump" am: 02d778e0c4 am: 168e78e77e
am: f64a2a269e

Change-Id: Ia81e818b8b69f67280318c83d57e3d89d1551eb2
2018-09-14 15:53:36 -07:00
Andy Hung
544201ba67 hal_audio_default: allow audioserver fd for status dump
Test: USB device plug/unplug check for avc: denied
Test: AudioFlinger dumpsys
Bug: 115722843
Change-Id: I0c4186f97a46e41e9f2d75b3f324b6b85399e2b5
2018-09-14 13:50:44 -07:00
Kim Low
a42faff53f Add input_device permission to hal_sensors_default
This is done so that /dev/input/event* nodes can be read by
dynamic sensors framework.

Bug: 38511270
Change-Id: Ib017c5621a8b7e08ddfa088453d061a6537a2a1c
2018-08-21 18:20:54 +00:00
Yifan Hong
68eb18664d Merge "Add sepolicy for health filesystem HAL" am: 3dd465a097 am: 33eee9c584 am: 562a0d2f97
am: 0df9f9514e

Change-Id: I2ae09712c83dc48881aa40cb3acebe04dcd9f4f7
2018-08-10 18:09:57 -07:00
Yifan Hong
0814795c79 Add sepolicy for health filesystem HAL
Test: builds
Test: vts
Bug: 111655771
Change-Id: Iabad3d124bf476cb624addf7d7898e0c2894d550
2018-08-10 11:02:21 -07:00
Dmitry Shmidt
48bf5e998e Merge "btlinux: Move HAL definitions from system/bt"
am: 9214238418

Change-Id: Ib1a4c54dacb5e3999ffa130d170cdef04e383b57
2018-06-27 19:22:04 -07:00
Dmitry Shmidt
a0c3416b2a btlinux: Move HAL definitions from system/bt
Test: ls -laZ /vendor/bin/hw/android.hardware.bluetooth*
Change-Id: I394594ad041f87583ca6b5b44d836cfab5da8103
Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
Merged-In: I394594ad041f87583ca6b5b44d836cfab5da8103
2018-06-27 23:56:31 +00:00
Dmitry Shmidt
1b4917bd1b btlinux: Move HAL definitions from system/bt
Test: ls -laZ /vendor/bin/hw/android.hardware.bluetooth*
Change-Id: I394594ad041f87583ca6b5b44d836cfab5da8103
Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
(cherry picked from commit 467f32160bf8b4e8faafba43289f340e9b8c7352)
2018-06-27 14:51:00 -07:00
Joel Galenson
3b45198068 Clean up bug_map by removing fixed bugs.
Bug: 110346694
Test: Boot Walleye and see no denials.
Change-Id: I150bc74b13a77f00a7e8b31a6c2edf9654bdbe59
2018-06-18 13:14:44 -07:00
Steven Moreland
8cf94ca0a2 mediacodec->mediacodec+hal_omx{,_server,_client} am: 7baf725ea6 am: 6ad7e65447
am: d0c4d4e7db

Change-Id: Ide1410e139b1ebcf0d97705ad992e02b3ef95149
2018-05-30 13:59:55 -07:00
Steven Moreland
d0c4d4e7db mediacodec->mediacodec+hal_omx{,_server,_client} am: 7baf725ea6
am: 6ad7e65447

Change-Id: I9b60e71be957d43f66605958915d3cfb45d42573
2018-05-30 13:51:23 -07:00
Steven Moreland
7baf725ea6 mediacodec->mediacodec+hal_omx{,_server,_client}
(breaks vendor blobs, will have to be regenerated
after this CL)

This moves mediacodec to vendor so it is replaced with
hal_omx_server. The main benefit of this is that someone
can create their own implementation of mediacodec without
having to alter the one in the tree. mediacodec is still
seccomp enforced by CTS tests.

Fixes: 36375899
Test: (sanity) YouTube
Test: (sanity) camera pics + video
Test: check for denials
Change-Id: I31f91b7ad6cd0a891a1681ff3b9af82ab400ce5e
2018-05-30 18:12:32 +00:00
Kourosh Derakshan
8dfb18157e Allow 64bit version of Camera Provider to run am: 2054bb4e71
am: c413d60915

Change-Id: I2f3745e3f19b808fae3e2fd34e7c072a60ef2d05
2018-05-11 19:17:40 -07:00
Kourosh Derakshan
2054bb4e71 Allow 64bit version of Camera Provider to run
Test: camera operation
Bug: 73173997
Change-Id: I17668a2e4cc56499bc837920e2cdcfd96d608153
2018-05-12 02:06:19 +00:00
TreeHugger Robot
4031b265fd Merge "Adding ability for hal keymaster to read vendor SPL" into pi-dev 2018-05-11 22:15:46 +00:00
Max Bires
37fd4bd485 Adding ability for hal keymaster to read vendor SPL
Keymaster hal needs to be able to read the vendor SPL for purposes of
rollback protection.

Bug: 76428542
Test: Keymaster can access the hal_keymaster_default property
Change-Id: Ifa53adb23f6ab79346e9dd9616b34d8b24395a0a
2018-05-11 16:51:58 +00:00
android-build-prod (mdb)
62f19477c2 Merge "Adding ability for hal keymaster to read vendor SPL" am: 81bb3c6e18 am: 8a5e2d7788
am: 4a42ad5ca7

Change-Id: I480c9b687444055fa18b9c153dfabc33c229accf
2018-05-08 12:17:18 -07:00
android-build-prod (mdb)
4a42ad5ca7 Merge "Adding ability for hal keymaster to read vendor SPL" am: 81bb3c6e18
am: 8a5e2d7788

Change-Id: I37e4a86ec60fb10f057727e2a3a05a8b5ade0bd4
2018-05-08 11:52:24 -07:00
android-build-prod (mdb)
81bb3c6e18 Merge "Adding ability for hal keymaster to read vendor SPL" 2018-05-08 18:36:58 +00:00
Max Bires
7332216811 Adding ability for hal keymaster to read vendor SPL
Keymaster hal needs to be able to read the vendor SPL for purposes of
rollback protection.

Test: Keymaster can access the hal_keymaster_default property
Change-Id: Ifa53adb23f6ab79346e9dd9616b34d8b24395a0a
2018-05-07 13:25:44 -07:00
Pavel Maltsev
43e172af66 Move automotive HALs sepolicy to system/
Bug: 70637118
Test: build, flash and boot automotive builds

Change-Id: I6db23258de30174d6db09d241e91b08aa5afedef
Merged-In: I6db23258de30174d6db09d241e91b08aa5afedef
(cherry picked from commit 394dbe34a0)
2018-05-04 21:36:48 +00:00
Roshan Pius
d7b34a48ff sepolicy(hostapd): Add a HIDL interface for hostapd
* Note on cherry-pick: Some of the dependent changes are not in AOSP.
In order to keep hostapd running correctly in AOSP, I've modified this
change to only include policy additions.

Change sepolicy permissions to now classify hostapd as a HAL exposing
HIDL interface.

Sepolicy denial for accessing /data/vendor/misc/wifi/hostapd:
12-27 23:40:55.913  4952  4952 W hostapd : type=1400 audit(0.0:19): avc:
denied { write } for name="hostapd" dev="sda13" ino=4587601
scontext=u:r:hal_wifi_hostapd_default:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0

01-02 19:07:16.938  5791  5791 W hostapd : type=1400 audit(0.0:31): avc:
denied { search } for name="net" dev="sysfs" ino=30521
scontext=u:r:hal_wifi_hostapd_default:s0
tcontext=u:object_r:sysfs_net:s0 tclass=dir permissive=0

Bug: 36646171
Test: Device boots up and able to turn on SoftAp.
Change-Id: Ibacfcc938deab40096b54b8d0e608d53ca91b947
Merged-In: Ibacfcc938deab40096b54b8d0e608d53ca91b947
(cherry picked from commit 5bca3e860d)
2018-05-04 21:36:24 +00:00
Alan Stokes
607d73f286 Use proc_net_type instead of proc_net.
This restores the change made in ag/3883322, which was inadvertently
reverted with the combination of ag/3998755 and the merge of
aosp/666885.

Bug: 9496886
Bug: 68016944

Test: Builds, device boots, no denial seen.
Change-Id: I6af83c5bf982283d69ac31c0495471079555c894
2018-05-04 14:44:02 +01:00
Alan Stokes
2818b902dc Allow wpa_supplicant to write to files in /proc/net.
This is needed for interface configuration - see e.g. nl80211_configure_data_frame_filters.

Bug: 77903086
Test: Device boots, denial not seen, wifi works

(cherry picked from commit 72ed615228)

Change-Id: Ia781e7c56f6e8e77e654cd28ca34de09180e2213
Merged-In: Ia55c4af1fcee75ada0e67a162fdb92ecc0089312
2018-05-03 15:28:48 +00:00
android-build-team Robot
b6e1ad6105 Merge "Move automotive HALs sepolicy to system/" into pi-dev
am: 26ee5a8590

Change-Id: Ifc8dfb550ed04335140a7f625dd0cef3fa89148e
2018-04-27 15:19:02 -07:00
android-build-team Robot
26ee5a8590 Merge "Move automotive HALs sepolicy to system/" into pi-dev 2018-04-27 22:11:56 +00:00
Alan Stokes
0bff1ac478 Allow wpa_supplicant to write to files in /proc/net. am: 72ed615228
am: 2ee3ad73b8

Change-Id: Ia55c4af1fcee75ada0e67a162fdb92ecc0089312
2018-04-26 08:16:00 -07:00
Alan Stokes
72ed615228 Allow wpa_supplicant to write to files in /proc/net.
This is needed for interface configuration - see e.g. nl80211_configure_data_frame_filters.

Bug: 77903086
Test: WiFi still working

Change-Id: I4b5e2b59eeeb6d0ac19dbcbcf0e7e80942247893
2018-04-26 16:00:49 +01:00
Pavel Maltsev
394dbe34a0 Move automotive HALs sepolicy to system/
Bug: 70637118
Test: build, flash and boot bat_land and owl automotive builds

Change-Id: I6db23258de30174d6db09d241e91b08aa5afedef
2018-04-23 15:46:41 -07:00
sqian
b951e7330d Add sepolicy for radio sap 1.2
Bug: 74114758
Test: Checked radio-service and sap-service is on the lshal after running the service
Change-Id: I1b18711286e000a7d17664e7d3a2045aeeb8c285
Merged-In: I1b18711286e000a7d17664e7d3a2045aeeb8c285
(cherry picked from commit 64839e874b)
2018-04-16 12:00:11 -07:00
sqian
64839e874b Add sepolicy for radio sap 1.2
Bug: 74114758
Test: Checked radio-service and sap-service is on the lshal after running the service
Change-Id: I1b18711286e000a7d17664e7d3a2045aeeb8c285
2018-04-11 01:40:37 +00:00
Treehugger Robot
529ce19708 Merge "Ensure taking a bugreport generates no denials." 2018-03-13 17:54:03 +00:00
Treehugger Robot
49c4a4ee35 Merge "Revert "Revert "Move rild from public to vendor.""" 2018-03-12 22:44:38 +00:00
TreeHugger Robot
13c46ef54c Merge "Hide denial for wpa_supplicant writing to /data/misc/wifi." into pi-dev 2018-03-12 22:35:29 +00:00
Joel Galenson
e7cad6cdc2 Hide denial for wpa_supplicant writing to /data/misc/wifi.
It should instead write to /data/vendor/wifi.

Bug: 36645291
Test: Built policy.
Change-Id: Ib7ba3477fbc03ebf07b886c60bcf4a64b954934a
(cherry picked from commit cc9b30a1cd)
2018-03-12 13:24:52 -07:00
TreeHugger Robot
7cfabb12be Merge "Ensure taking a bugreport generates no denials." into pi-dev 2018-03-12 20:19:01 +00:00
Amit Mahajan
3007344dcd Revert "Revert "Move rild from public to vendor.""
This reverts commit 016f0a58a9.

Reason for revert: Was temporarily reverted, merging back in with fix.

Test: Basic telephony sanity, treehugger
Bug: 74486619
Bug: 36427227
Merged-in: Ide68726a90d5485c2758673079427407aee1e4f2
Change-Id: Ide68726a90d5485c2758673079427407aee1e4f2
(cherry picked from commit 312248ff72)
2018-03-12 13:13:39 -07:00
TreeHugger Robot
37666db3ff Merge "Revert "Revert "Move rild from public to vendor.""" into pi-dev 2018-03-12 20:02:01 +00:00
Amit Mahajan
58758dc222 Revert "Move rild from public to vendor."
This reverts commit aed57d4e4d.

Reason for revert: This CL is expected to break pre-submit tests (b/74486619)

Merged-in: I103c3faa1604fddc27b3b4602b587f2d733827b1
Change-Id: I0eb7a744e0d43ab15fc490e7e7c870d0f44e1401
2018-03-12 17:35:17 +00:00
Amit Mahajan
312248ff72 Revert "Revert "Move rild from public to vendor.""
This reverts commit 016f0a58a9.

Reason for revert: Was temporarily reverted, merging back in with fix.

Bug: 74486619
Bug: 36427227
Change-Id: Ide68726a90d5485c2758673079427407aee1e4f2
2018-03-12 17:12:53 +00:00
Joel Galenson
cc9b30a1cd Hide denial for wpa_supplicant writing to /data/misc/wifi.
It should instead write to /data/vendor/wifi.

Bug: 36645291
Test: Built policy.
Change-Id: Ib7ba3477fbc03ebf07b886c60bcf4a64b954934a
2018-03-12 09:14:38 -07:00
TreeHugger Robot
cb4e3b77ca Merge "Revert "Move rild from public to vendor."" into pi-dev 2018-03-12 00:01:17 +00:00
Jeffrey Vander Stoep
016f0a58a9 Revert "Move rild from public to vendor."
This reverts commit eeda6c6106.

Reason for revert: broken presubmit tests

Bug: 74486619
Change-Id: I103c3faa1604fddc27b3b4602b587f2d733827b1
2018-03-11 20:46:50 +00:00
Amit Mahajan
aed57d4e4d Move rild from public to vendor.
Also change the neverallow exceptions to be for hal_telephony_server
instead of rild.

Test: Basic telephony sanity, treehugger
Bug: 36427227
Merged-in: If892b28416d98ca1f9c241c5fcec70fbae35c82e
Change-Id: If892b28416d98ca1f9c241c5fcec70fbae35c82e
2018-03-10 00:10:16 +00:00
TreeHugger Robot
910f63f9ee Merge "Move rild from public to vendor." into pi-dev 2018-03-09 22:42:30 +00:00
Amit Mahajan
eeda6c6106 Move rild from public to vendor.
Also change the neverallow exceptions to be for hal_telephony_server
instead of rild.

Test: Basic telephony sanity, treehugger
Bug: 36427227
Change-Id: If892b28416d98ca1f9c241c5fcec70fbae35c82e
2018-03-08 12:50:13 -08:00
TreeHugger Robot
178d0adbfc Merge "Add secure_element_device" into pi-dev 2018-03-08 17:53:28 +00:00