Commit graph

414 commits

Author SHA1 Message Date
Automerger Merge Worker
cbd87608df Merge "Modify SEPolicy to support SLCAN" am: 6ad4f3207a am: f1daf7567d am: 9beeb34e7b
Change-Id: I4101a255a284fcc1c04cf1833c30a23fcbdd4576
2019-12-11 22:08:06 +00:00
Chris Weir
6ad4f3207a Merge "Modify SEPolicy to support SLCAN" 2019-12-11 21:25:14 +00:00
Kenny Root
64de2059d3 Merge "Support Resume on Reboot" am: 6a9f7b265a am: 25e571fa5d
am: c11be97479

Change-Id: If3f7b5f69dc0cfba89e37d3bb22db84f5bde8e44
2019-12-10 05:11:13 -08:00
Kenny Root
6a9f7b265a Merge "Support Resume on Reboot" 2019-12-10 12:59:35 +00:00
Kenny Root
76ea325a3d Support Resume on Reboot
When an OTA is downloaded, the RecoverySystem can be triggered to store
the user's lock screen knowledge factor in a secure way using the
IRebootEscrow HAL. This will allow the credential encrypted (CE)
storage, keymaster credentials, and possibly others to be unlocked when
the device reboots after an OTA.

Bug: 63928581
Test: make
Test: boot emulator with default implementation
Test: boot Pixel 4 with default implementation
Change-Id: I1f02e7a502478715fd642049da01eb0c01d112f6
2019-12-09 14:25:04 -08:00
chrisweir
cd40aa0ab7 Modify SEPolicy to support SLCAN
SLCAN setup requires certain ioctls and read/write operations to
certain tty's. This change allows the HAL to set up SLCAN devices while
complying with SEPolicy.

In addition to adding support for SLCAN, I've also included permissions
for using setsockopt. In order for the CAN HAL receive error frames from
the CAN bus controller, we need to first set the error mask and filter
via setsockopt.

Test: manual
Bug: 144458917
Bug: 144513919
Change-Id: I63a48ad6677a22f05d50d665a81868011c027898
2019-12-04 14:06:09 -08:00
Stan Rokita
00231e4415 Merge "Add sensors multihal support in file_contexts regex" am: d494872641 am: 193dfaeca0
am: 50bd8a131b

Change-Id: Iae1cbd872e6ef7c6f3c8106ec4190f43ef761671
2019-12-02 13:45:37 -08:00
Stan Rokita
d494872641 Merge "Add sensors multihal support in file_contexts regex" 2019-12-02 20:54:57 +00:00
Harpreet \"Eli\" Sangha
ff8c5d6468 Merge "Fix File Context Entry for Bluetooth Services." am: d6a91453d8 am: ae8ad79141
am: bca6554594

Change-Id: I1756a10d49425e3611b9ab6dfe2e66d56012eabf
2019-11-26 20:11:34 -08:00
Harpreet \"Eli\" Sangha
078689ae03 Fix File Context Entry for Bluetooth Services.
Test: Boot on HiKey960 and check dmesg errors.
Change-Id: I9ac0968753c7cd9a23c63eac98b20a7778277716
Signed-off-by: Harpreet \"Eli\" Sangha <eliptus@google.com>
2019-11-27 10:11:12 +09:00
Tomasz Wasilczyk
82f3cba4e1 Merge "Vehicle HAL: allow communication with CAN bus HAL and alternative service naming" am: eeb6279953 am: fadede5a4d
am: 22e795881c

Change-Id: I8f65ad29253d701225722273e7fbad4da43ab31a
2019-11-22 13:47:59 -08:00
Tomasz Wasilczyk
eeb6279953 Merge "Vehicle HAL: allow communication with CAN bus HAL and alternative service naming" 2019-11-22 20:27:23 +00:00
Shawn Willden
129bdb4ddd Merge "Add Keymaster 4.1" am: 88554af5c0 am: e44ba58615
am: 138c5d4374

Change-Id: Ib574ba4f4cdf3ffe3db425b60818056cb759b57f
2019-11-21 15:01:37 -08:00
Stan Rokita
16d522871d Add sensors multihal support in file_contexts regex
Bug: 144722764
Test: N/A
Change-Id: Ic595d9c21639bdf2874dc6734344ff1a41767399
2019-11-21 08:57:58 -08:00
Shawn Willden
10f0b53ef7 Add Keymaster 4.1
Bug: 140193672
Bug: 140192237
Bug: 140824829
Test: Manual boot test
Change-Id: Iccc8cc5e8fc7c9301478faa50d0e18fa917283fb
2019-11-20 12:14:36 -07:00
Steven Moreland
231958e28d Merge "stable aidl vibrator policy" am: a71c74c188 am: 416aa29a30
am: 685d10c87f

Change-Id: Icbdf813b1317d3cbdec4547f2d832432763bb222
2019-11-01 14:54:22 -07:00
Tomasz Wasilczyk
3846fc25f6 Vehicle HAL: allow communication with CAN bus HAL and alternative service naming
Bug: 143779011
Test: implemented a VHAL service prototype that communicates with VHAL
Change-Id: I8f449510fc638e29a5cb23c0e32f3d87386ba9bc
2019-11-01 14:21:03 -07:00
Steven Moreland
d87649c645 stable aidl vibrator policy
Bug: 141828236
Test: boot, dumpsys -l
Change-Id: Id3fc8724238883116e840794309efbf6c91226c9
2019-10-29 16:39:55 -07:00
Yifan Hong
318582f265 Merge "Add health 2.1 HAL" am: ba48222bc7 am: 5daea7332d am: 55ed721302
am: 51bc766658

Change-Id: I8b4882a9ae8f64db9108b8ce98dd9b9eb6ec1790
2019-10-23 18:51:33 -07:00
Yifan Hong
ba48222bc7 Merge "Add health 2.1 HAL" 2019-10-24 01:03:09 +00:00
Yifan Hong
fbce5cce11 Add health 2.1 HAL
Test: VTS health 2.1 HAL test
Bug: 137670450
Change-Id: Iedc6972154c6e948eaf22b4650da39a9e73cb6f8
2019-10-17 16:35:43 -07:00
Henry Fang
414674f103 Merge "Update sepolicy to support cas@1.2" am: b3f755fbb4 am: 04abc97c6a am: 98346620f5
am: 571640f96d

Change-Id: I21e4c07603b7a346a198df422e4c4d1f3b6ec130
2019-10-15 22:06:24 -07:00
Henry Fang
b418dd991a Update sepolicy to support cas@1.2
Test: Manual
bug: 141783130
Change-Id: I973cb5d59d74c495eea18f4865baf0bd6f55e2fb
2019-10-14 17:37:17 -07:00
David Anderson
b12a53a7f5 Merge "Add sepolicy for IBootControl 1.1 and the default HAL." am: 0fb0781fb6 am: 25e83f480c am: f5c42c2738
am: 166982566c

Change-Id: Ief5166c30eb59baa08c2412b503b3d144a7c1709
2019-10-10 21:48:25 -07:00
David Anderson
0fb0781fb6 Merge "Add sepolicy for IBootControl 1.1 and the default HAL." 2019-10-10 19:19:49 +00:00
David Anderson
549e3c6d91 Add sepolicy for IBootControl 1.1 and the default HAL.
Bug: 138861550
Test: manual test
Change-Id: Ibc9a55266a2726cb8dc8550be0264db30b66109e
2019-10-08 14:24:38 -07:00
Bill Peckham
05fd2e52b9 Merge "Moving recovery resources from /system to /vendor" am: 0109fb24fc am: 62b54c4f8e am: dcdb3ebbf0
am: 8ee0b85f2a

Change-Id: I2db7b19266d4c75367b8399e07cd4d9c33549fa3
2019-10-04 20:45:05 -07:00
Bill Peckham
d0dc1a057d Moving recovery resources from /system to /vendor
This change is part of a topic that moves the recovery resources from the
system partition to the vendor partition, if it exists, or the vendor directory
on the system partition otherwise. The recovery resources are moving from the
system image to the vendor partition so that a single system image may be used
with either an A/B or a non-A/B vendor image. The topic removes a delta in the
system image that prevented such reuse in the past.

The recovery resources that are moving are involved with updating the recovery
partition after an update. In a non-A/B configuration, the system boots from
the recovery partition, updates the other partitions (system, vendor, etc.)
Then, the next time the system boots normally, a script updates the recovery
partition (if necessary). This script, the executables it invokes, and the data
files that it uses were previously on the system partition. The resources that
are moving include the following.

* install-recovery.sh
* applypatch
* recovery-resource.dat (if present)
* recovery-from-boot.p (if present)

This change includes the sepolicy changes to move the recovery resources from
system to vendor. The big change is renaming install_recovery*.te to
vendor_install_recovery*.te to emphasize the move to vendor. Other changes
follow from that. The net result is that the application of the recovery patch
has the same permissions that it had when it lived in system.

Bug: 68319577
Test: Ensure that recovery partition is updated correctly.
Change-Id: If29cb22b2a7a5ce1b25d45ef8635e6cb81103327
2019-10-04 14:40:27 -07:00
Steven Moreland
9b11665bf3 Deprecate libhwbinder/libhidltransport from VNDK. am: 9104421b1d
am: cc27e5f200

Change-Id: I10a2a94d895bdd76b7e7e957bd173f27eba25c71
2019-10-01 09:27:19 -07:00
Steven Moreland
9104421b1d Deprecate libhwbinder/libhidltransport from VNDK.
Since these libraries were vndk-sp, previously, passthrough HALs were
able to load them. However, now that they have been removed from the
vndk-sp set (these libraries are empty), marking them as
same_process_hal_file so that vendor passthrough implementations that
still link against these empty libraries can still use them.

Bug: 135686713
Test: boot device using these libraries from an sphal (otherwise,
    bootloops)
Change-Id: Ic5170eb0fcbb87c82bbea840dcfcb17899eaa899
(cherry picked from commit 71a596a49b443e5ae3518301ffdf9e6b95d4d94d)
2019-10-01 01:39:51 +00:00
Steven Moreland
b081eee00e Deprecate libhwbinder/libhidltransport from VNDK.
Since these libraries were vndk-sp, previously, passthrough HALs were
able to load them. However, now that they have been removed from the
vndk-sp set (these libraries are empty), marking them as
same_process_hal_file so that vendor passthrough implementations that
still link against these empty libraries can still use them.

Bug: 135686713
Test: boot device using these libraries from an sphal (otherwise,
    bootloops)
Change-Id: Ic5170eb0fcbb87c82bbea840dcfcb17899eaa899
2019-09-26 15:49:50 -07:00
Tri Vo
b23ec2efab Merge "sepolicy: ashmem entry point for libcutils" am: e612ecd6ed am: e570bf7ea4 am: 76333c6b08
am: 498c8fb53f

Change-Id: Ib3eb8d7f37bb94ec6363e6a77e2bdf04663300b0
2019-09-26 12:08:42 -07:00
Tri Vo
a7f61021b7 sepolicy: ashmem entry point for libcutils
This duplicated ashmem device is intended to replace ashmemd.

Ashmem fd has a label of the domain that opens it. Now with ashmemd
removed, ashmem fds can have labels other than "ashmemd", e.g.
"system_server". We add missing permissions to make ashmem fds usable.

Bug: 139855428
Test: boot device
Change-Id: Iec8352567f1e4f171f76db1272935eee59156954
2019-09-25 11:26:18 -07:00
Steven Moreland
9106bf90f8 Merge "Rename dumpstate service to include '.example'." am: 2d572464af am: 82d825df79 am: 44a58b7112 am: cfda39e3b0
am: b3d1b4ed9a

Change-Id: Ibc02cd22d73329eb5cec05b17976dd4051e2c0f6
2019-08-27 18:52:34 -07:00
Steven Moreland
82d825df79 Merge "Rename dumpstate service to include '.example'."
am: 2d572464af

Change-Id: I81ce7c04472893d7e77aa974969b484b93c7beaa
2019-08-27 16:26:23 -07:00
Steven Moreland
10d260950d Rename dumpstate service to include '.example'.
Since this was an example service providing no real functionality and
accidentally got installed on a device.

Bug: 140115084
Test: install on test device and see that it runs
Change-Id: I553da8e1f4da7d6a9f0c3e7d4a3561f0b22321dc
2019-08-27 11:07:51 -07:00
Jon Spivack
2a97c025e3 Merge "Allow vndservicemanager to start processes" am: 018f745b90 am: 685af5eaab am: fdc17e034e am: 0e4d8301aa
am: ad016e8060

Change-Id: Id236bbca47876be8370e25108ae47afd26098e00
2019-08-26 12:43:19 -07:00
Marissa Wall
16ff192d62 Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy" am: 1751aa5b80 am: 6782faba9f am: dd52020c88 am: 86b7d95c79
am: dfc86e4036

Change-Id: I351fc8efa4254e366e4f8c1e953e0941d0a19713
2019-08-26 12:41:36 -07:00
Jon Spivack
685af5eaab Merge "Allow vndservicemanager to start processes"
am: 018f745b90

Change-Id: I42f16342f807cabebc1e258a353b1cea5b13472e
2019-08-22 18:50:11 -07:00
Jon Spivack
018f745b90 Merge "Allow vndservicemanager to start processes" 2019-08-23 01:29:06 +00:00
Marissa Wall
6782faba9f Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy"
am: 1751aa5b80

Change-Id: I072a3950a3f57ab0a78e95ee2c73c6d71245d373
2019-08-22 10:48:50 -07:00
Treehugger Robot
1751aa5b80 Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy" 2019-08-22 17:20:45 +00:00
Steven Moreland
52afb27ec7 Merge changes Icdf207c5,I20aa48ef am: 30a06d278f am: 169bfcfe88 am: 99f2860521 am: 4a474dc430
am: bc0374bdc4

Change-Id: Ib48f8593db8744cddb9bb6b877947c5ca13bc5f4
2019-08-20 14:26:29 -07:00
Steven Moreland
169bfcfe88 Merge changes Icdf207c5,I20aa48ef
am: 30a06d278f

Change-Id: Ia505b1539cfd64bb93c2f5fe0dbd0603df5e9f5f
2019-08-20 13:41:45 -07:00
Steven Moreland
641c45e258 mediacodec: remove non-Treble allows
Since mediacodec system services have been entirely deleted.

Bug: 80317992
Test: TH
Change-Id: I20aa48ef57474df000279a487f6b077790d273c1
2019-08-20 00:03:24 +00:00
Jon Spivack
b58c4c2a62 Allow vndservicemanager to start processes
Used to lazily start AIDL services.

Bug: 138756857
Test: Manual
Change-Id: I890ca70e654f8e8bb795189abb4018c0d5d05865
2019-08-19 16:05:13 -07:00
Amy Zhang
c23667f999 Merge "Tuner Hal 1.0 Enable ITuner service" am: 3e7429359f am: 3b62596f4f am: 11739f3126 am: a588ba4e3e
am: 5bd0803562

Change-Id: I7dfa4df490f1365edcecaf69e2971378177d56ef
2019-08-15 16:07:07 -07:00
Amy Zhang
3b62596f4f Merge "Tuner Hal 1.0 Enable ITuner service"
am: 3e7429359f

Change-Id: Ic4442460d60d51e97c84ea430830cd12c205e5f6
2019-08-15 13:23:33 -07:00
Amy
89b4bbd4d8 Tuner Hal 1.0 Enable ITuner service
Test: cuttlefish
Bug: 135708935
Change-Id: Ica063458860df45f0e2ab640a2ab35cd4da3da8e
2019-08-14 11:22:09 -07:00
Tomasz Wasilczyk
9794dd74a3 SEPolicy rules for CAN bus HAL am: 602b30302a am: 0540154021 am: 2f0ee4345f am: ce9863e755
am: b94bb81337

Change-Id: Id35783f576554cfce08126bc1ee0216af7fc70bd
2019-08-01 20:21:08 -07:00
Tomasz Wasilczyk
0540154021 SEPolicy rules for CAN bus HAL
am: 602b30302a

Change-Id: I5ae916b8f4c3d6038c48a522df1efc2ce8fc3d39
2019-08-01 19:34:47 -07:00
Tomasz Wasilczyk
602b30302a SEPolicy rules for CAN bus HAL
Bug: 135918744
Test: VTS (separate new change)
Change-Id: Idd3ca882e3bd36b95a5412bdfbf6fe9d6e911ba9
2019-08-01 10:24:00 -07:00
Changyeon Jo
154451ff7a Update sepolicy for EVS v1.x am: 5ee628f0ce am: c90bc366e6 am: d8072b0fef am: ee1ad87354
am: 51b22f6155

Change-Id: I7466c5a9c359a83e4d38027a3d29c6d9cf3a5f13
2019-07-30 20:40:48 -07:00
Changyeon Jo
c90bc366e6 Update sepolicy for EVS v1.x
am: 5ee628f0ce

Change-Id: I3aa2c140f2ab37a604ab70221926d15c25822bef
2019-07-30 19:57:29 -07:00
Changyeon Jo
5ee628f0ce Update sepolicy for EVS v1.x
Modify vendor file context and hal_evs_server policy to enable EVS v1.1
service.

Change-Id: I1e717b3209200300005c3fa7f91423589505a41c
Signed-off-by: Changyeon Jo <changyeon@google.com>
2019-07-30 13:22:03 -07:00
Kevin Rocard
647c58e50c Merge "Rename audio hal service" am: e4466e8ec7 am: 09a2074c71 am: f027d2f140
am: db63da9e39

Change-Id: Ie8a1afe479fc663e14b2907248c7a2d25515cee2
2019-07-09 11:39:39 -07:00
Kevin Rocard
09a2074c71 Merge "Rename audio hal service"
am: e4466e8ec7

Change-Id: Ib8824bda3c2fd3bd350290bf40171898d408fa60
2019-07-09 11:06:25 -07:00
Kevin Rocard
8fcd26e448 Rename audio hal service
The audio HAL service name previously contained the audio HAL version
of the first audio HAL it supported.
Nevertheless, the same service can and do host all audio HAL versions.

Aka there is only one audio HAL service, and the version in its name is
technical dept and should not be changed.

This caused many confusions during vendor HAL upgrade as the
service version number was erroneously updated leading to
device boot loop.

The new service name is:
android.hardware.audio.service
The old one was:
android.hardware.audio@2.0-service

Keeping both names valid as most phones will not rename
the service immediately.

Bug: 78516186
Test: boot & check the audio HAL is up with the old and new name
Change-Id: I2ce0182fd919af6eb8325d49682b4374be00344e
Signed-off-by: Kevin Rocard <krocard@google.com>
2019-07-08 22:25:18 +00:00
Marissa Wall
3474653bd0 gralloc: add IAllocator/IMapper 4.0 sepolicy
Add support for gralloc 4.0 to sepolicy

Bug: 136016160
Test: Compiles and boots

Change-Id: I148cc19176275e8cbd19cc95aa95d4d450353b7a
2019-06-25 12:17:36 -07:00
Matthias Kramm
2a7f5db521 Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" am: f4362c08c7 am: 199db0ceb1 am: 1710bbd6fe
am: c69c613942

Change-Id: I396e68b0ca30ba884c43acf685d7100849e635ee
2019-06-19 21:37:37 -07:00
Matthias Kramm
1710bbd6fe Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" am: f4362c08c7
am: 199db0ceb1

Change-Id: Icce34a06c681b8d3717061c31d142622acbfd979
2019-06-19 18:36:04 -07:00
Treehugger Robot
f4362c08c7 Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" 2019-06-19 23:44:27 +00:00
Matthias Kramm
ebcc08249b Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."
This reverts commit 3a44b17897.

Reason for revert: Moved to downstream repo.

Change-Id: I7d3ad43335f71ed03e7a93bc5c96a8933785afd8
2019-06-19 20:15:50 +00:00
Matthias Kramm
469932dec9 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." am: 9faeec71f2 am: c58cd73209 am: cf010dcb85
am: 44bb087de2

Change-Id: I44ab3f9695e778ddc45d7c098b99d1c974e7312d
2019-06-17 14:41:22 -07:00
Matthias Kramm
cf010dcb85 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." am: 9faeec71f2
am: c58cd73209

Change-Id: I102966877e40ec5c56033feb510e519c033aa407
2019-06-17 12:48:25 -07:00
Matthias Kramm
9faeec71f2 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." 2019-06-17 19:31:50 +00:00
Valerie Hau
bffbdf0d08 Add IMapper2.1 same process hal permissions am: d3499df3cf am: 178ef8ccad am: 5162b0c3d0
am: ec0fc9a7d9

Change-Id: Ic91709f5b9564b409c7a0a4b28a853ad527442b5
2019-06-17 11:57:06 -07:00
Valerie Hau
5162b0c3d0 Add IMapper2.1 same process hal permissions am: d3499df3cf
am: 178ef8ccad

Change-Id: Ifaef339d29e8f0547cc5c3eb4992b14f1c7a81f3
2019-06-17 11:42:02 -07:00
Valerie Hau
d3499df3cf Add IMapper2.1 same process hal permissions
Bug: 135166668
Test: build, boot, VtsHalGraphicsComposerV2_2TargetTest
Change-Id: Iedc11b73d3e3ba54dcd622b128cb513adec11d69
2019-06-14 12:31:17 -07:00
Matthias Kramm
3a44b17897 Allow hal_face to write to /data/vendor/camera_calibration/*.
Also, allow hal_camera to read from there.

Bug: 133792720
Change-Id: Iedec8d7325b4424d166f8e4d09182e1f29808ef2
Test: Running presubmit.
2019-06-14 05:53:59 -07:00
Joel Galenson
08a0379943 Merge "Give hal_drm_server appdomain fd access." am: 7d258073df am: 2c465fa2bb am: d181604ce1
am: 926731d20d

Change-Id: I278eed76e64ef768491982f901f8065a3da81b64
2019-06-10 11:53:12 -07:00
Joel Galenson
d181604ce1 Merge "Give hal_drm_server appdomain fd access." am: 7d258073df
am: 2c465fa2bb

Change-Id: I89eff6ce6cb82ad2a65c79a3c4e934b9a6ea81b6
2019-06-10 11:43:41 -07:00
Joel Galenson
0608ab5f9d Give hal_drm_server appdomain fd access.
Test: Build.
Change-Id: I29f68964f4ae2ad2c3a00c96f57f48448d8b6dfb
2019-06-05 10:12:28 -07:00
Pawin Vongmasa
7b41487d1f Merge "Properly define hal_codec2 and related policies" into qt-dev am: cf48bfd082 am: 789db9aeca
am: aacbaf7685

Change-Id: I43943a50bc022d4c7e17e0764dbb51b4f624b7e7
2019-05-24 18:33:42 -07:00
TreeHugger Robot
cf48bfd082 Merge "Properly define hal_codec2 and related policies" into qt-dev 2019-05-24 07:21:23 +00:00
Pawin Vongmasa
609c243dd0 Properly define hal_codec2 and related policies
Test: make cts -j123 && cts-tradefed run cts-dev -m \
CtsMediaTestCases --compatibility:module-arg \
CtsMediaTestCases:include-annotation:\
android.platform.test.annotations.RequiresDevice

Bug: 131677974
Change-Id: I59c3d225499a8c53c2ed9f3bd677ff3d7423990b
2019-05-23 03:53:47 -07:00
Tao Bao
a5243f01a9 Merge "Add vendor_misc_writer." am: ccf8af80b0 am: 986d2b296a am: 848861d8a3
am: c576c2c835

Change-Id: I71e4f4544616bf9be3d80b1c4f964bd0b9cb4dad
2019-05-21 07:53:20 -07:00
Tao Bao
8f39cce73a Add vendor_misc_writer.
The space between 2K and 16K in /misc is currently reserved for vendor's
use (as claimed in bootloader_message.h), but we don't allow vendor
module to access misc_block_device other than vendor_init.

The change in the topic adds a `misc_writer` tool as a vendor module,
which allows writing data to the vendor space to bridge the gap in the
short term. This CL adds matching labels to grant access.

Long term goal is to move /misc as vendor owned, then to provide HAL
access from core domain (b/132906936).

Bug: 132906936
Test: Build crosshatch that includes misc_writer module. Invoke
      /vendor/bin/misc_writer to write data to /misc.
Change-Id: I4c18d78171a839ae5497b3a61800193ef9e51b3b
Merged-In: I4c18d78171a839ae5497b3a61800193ef9e51b3b
(cherry picked from commit 42c05cfcc1)
2019-05-21 07:06:31 -07:00
Tao Bao
848861d8a3 Merge "Add vendor_misc_writer." am: ccf8af80b0
am: 986d2b296a

Change-Id: I89d5eb83fc0caacf8a883321c14d5c26925fe6da
2019-05-21 06:56:51 -07:00
Tao Bao
42c05cfcc1 Add vendor_misc_writer.
The space between 2K and 16K in /misc is currently reserved for vendor's
use (as claimed in bootloader_message.h), but we don't allow vendor
module to access misc_block_device other than vendor_init.

The change in the topic adds a `misc_writer` tool as a vendor module,
which allows writing data to the vendor space to bridge the gap in the
short term. This CL adds matching labels to grant access.

Long term goal is to move /misc as vendor owned, then to provide HAL
access from core domain (b/132906936).

Bug: 132906936
Test: Build crosshatch that includes misc_writer module. Invoke
      /vendor/bin/misc_writer to write data to /misc.
Change-Id: I4c18d78171a839ae5497b3a61800193ef9e51b3b
2019-05-20 14:40:15 -07:00
Roshan Pius
56dfc06397 sepolicy: Remove offload HAL sepolicy rules
This is unused currently & there are no concrete plans to use it
in the future.

Bug: 130080335
Test: Device boots up & connects to networks.
Test: Will send for regression tests
Change-Id: I785389bc2c934c8792c8f631362d6aa0298007af
2019-05-01 12:48:45 -07:00
Jack Yu
58329f6536 Add sepolicy for nfc hal v1.2
Bug: 130509605
Test: No avc denial log and NFC works with hal v1.2
Change-Id: If54884f76a32705d11f2085f66fe83b9e0354f79
Merged-In: If54884f76a32705d11f2085f66fe83b9e0354f79
(cherry picked from commit a5dde796b5)
2019-04-24 09:58:44 +08:00
Jack Yu
181b6376d0 Merge "Add sepolicy for nfc hal v1.2" am: fd2d7b3f5c
am: c4b5e0a3a8

Change-Id: Id4c20b3c5fd3538359ce9d2756e19ae993b0c855
2019-04-22 23:56:05 -07:00
Jack Yu
a5dde796b5 Add sepolicy for nfc hal v1.2
Bug: 130509605
Test: No avc denial log and NFC works with hal v1.2
Change-Id: If54884f76a32705d11f2085f66fe83b9e0354f79
2019-04-22 12:08:20 +00:00
Henry Fang
1f1e36069d Change sepolicy to allow cas@1.1 service
Modify sepolicy configure file, so that cas@1.1 service can run
Test: Manual
bug: 124016538

Change-Id: I0b160bc1c575aa18ffead7ff136509fc9dcfb472
Merged-In: I142a6cd66a81ad9e0c8b4d87da672fb8f5c181d6
2019-02-08 22:05:25 +00:00
Henry Fang
1087a9e3e2 enable cas@1.1 interface
Change sepolicy to allow cas@1.1 service to run
Test: Manual
bug: 123903559

Change-Id: I142a6cd66a81ad9e0c8b4d87da672fb8f5c181d6
2019-02-05 13:16:37 -08:00
Peter Kalauskas
60c468c312 Merge "Allow lazy wifi HAL to run" am: 2613456a36 am: 66e92002e0
am: 8f91716a6b

Change-Id: I075e0062107a17351493693eaa2784023a861943
2019-01-31 14:40:41 -08:00
Peter Kalauskas
2613456a36 Merge "Allow lazy wifi HAL to run" 2019-01-31 22:05:47 +00:00
Jeff Vander Stoep
c4bc7d04db Initial selinux policy support for memfd am: 9f5d0d90a3 am: 5314cb2a93
am: beb8e5d159

Change-Id: Ia03563336f924ea99af2763b2edc71c2be52b6d3
2019-01-30 11:51:10 -08:00
Jeff Vander Stoep
9f5d0d90a3 Initial selinux policy support for memfd
Move all app tmpfs types to appdomain_tmpfs. These are still protected
by mls categories and DAC. TODO clean up other app tmpfs types in a
separate change.

Treble-ize tmpfs passing between graphics composer HAL and
surfaceflinger.

Bug: 122854450
Test: boot Blueline with memfd enabled.
Change-Id: Ib98aaba062f10972af6ae80fb85b7a0f60a32eee
2019-01-30 19:11:49 +00:00
Peter Kalauskas
03f43017b2 Allow lazy wifi HAL to run
Test: Manually check that lazy wifi HAL runs
Bug: 123307146
Change-Id: I22f9bc7a097056215d249b692b6f39a71b6b9811
2019-01-30 18:52:19 +00:00
Jeff Vander Stoep
41a2abfc0d Properly Treble-ize tmpfs access
This is being done in preparation for the migration from ashmem to
memfd. In order for tmpfs objects to be usable across the Treble
boundary, they need to be declared in public policy whereas, they're
currently all declared in private policy as part of the
tmpfs_domain() macro. Remove the type declaration from the
macro, and remove tmpfs_domain() from the init_daemon_domain() macro
to avoid having to declare the *_tmpfs types for all init launched
domains. tmpfs is mostly used by apps and the media frameworks.

Bug: 122854450
Test: Boot Taimen and blueline. Watch videos, make phone calls, browse
internet, send text, install angry birds...play angry birds, keep
playing angry birds...

Change-Id: I20a47d2bb22e61b16187015c7bc7ca10accf6358
Merged-In: I20a47d2bb22e61b16187015c7bc7ca10accf6358
(cherry picked from commit e16fb9109c)
2019-01-26 17:30:41 +00:00
Jeff Vander Stoep
e16fb9109c Properly Treble-ize tmpfs access
This is being done in preparation for the migration from ashmem to
memfd. In order for tmpfs objects to be usable across the Treble
boundary, they need to be declared in public policy whereas, they're
currently all declared in private policy as part of the
tmpfs_domain() macro. Remove the type declaration from the
macro, and remove tmpfs_domain() from the init_daemon_domain() macro
to avoid having to declare the *_tmpfs types for all init launched
domains. tmpfs is mostly used by apps and the media frameworks.

Bug: 122854450
Test: Boot Taimen and blueline. Watch videos, make phone calls, browse
internet, send text, install angry birds...play angry birds, keep
playing angry birds...

Change-Id: I20a47d2bb22e61b16187015c7bc7ca10accf6358
2019-01-25 08:56:45 -08:00
Peter Kalauskas
74eed68b46 Merge "Allow lazy HAL to run" am: b6388fe753 am: a8ee48d499
am: 91dc2bca8c

Change-Id: I379d162d5a1f4f235049e74339ecdc3c2b9d413b
2019-01-24 07:52:24 -08:00
Peter Kalauskas
b1bdbb58cf Allow lazy HAL to run
Test: Manual
Change-Id: Ic4c3fd5b2d8d709573f8cc6332a6340d28d3ba26
2019-01-23 15:29:05 -08:00
Brian Stack
b1122f9372 Merge "Add selinux policy for Sensors HAL 2.0" am: 1e6055f172 am: 38626e4975
am: 76b2cccbc3

Change-Id: I1b1b6912556bffe17ce9d2a52a3fb1d53f11129a
2019-01-22 20:34:11 -08:00
Brian Stack
b8baed8fa7 Add selinux policy for Sensors HAL 2.0
Bug: 122267378
Test: Builds, no dmesg errors when starting Sensors HAL 2.0
Change-Id: Ieb52449579f72421bf8f36fb6af0cb110d04bd1c
2019-01-22 21:02:21 +00:00
Marissa Wall
c82e6e3671 Merge "gralloc3: add sepolicy for allocator/mapper 3.0" am: 7f22034591 am: e41834c88e
am: cfd4adebac

Change-Id: I25195cbaeab45407cd131b5ea1eea60f78d19ba4
2019-01-17 16:19:44 -08:00
Marissa Wall
97f5383895 gralloc3: add sepolicy for allocator/mapper 3.0
IAllocator and IMappaer are being rev'd to 3.0. Update sepolicy to
allow them to be used.

Test: compile with allocator/mapper patches add boot the device
Bug: 120493579
Change-Id: Id241c6bd79c02ec93d8dd415539f90a18f733d03
2019-01-17 11:56:08 -08:00
Wei Wang
d8339d7b28 Thermal: remove mock implementation sepolicy
Test: Build
Change-Id: I92562077535593aa62e4536b58cd43378aa65a6d
2019-01-14 09:18:32 -08:00