Commit graph

542 commits

Author SHA1 Message Date
Ilya Matyukhin
c71c2993e9 Add sepolicy for IFingerprint
Bug: 152416783
Test: run on cuttlefish
Change-Id: I58d7c3bc9c81612b03bab3b9da938c091c02e3c1
2020-09-10 16:50:19 -07:00
Amy Zhang
7a9148faa2 Merge "Add Tuner HAL 1.1 service into the default tuner domain" am: ce67a16be1 am: 71968d9d2c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1364041

Change-Id: Ie998140005353326d5d6b39d27d52aa8385354fc
2020-07-17 19:02:37 +00:00
Amy Zhang
2e148351af Add Tuner HAL 1.1 service into the default tuner domain
Test: cuttlefish, atest VtsHalTvTunerV1_1TargetTest
Bug: b/159058358
Change-Id: I67fbfb29c3097953e6d30d17a8d40d586162088f
2020-07-15 18:25:48 -07:00
Mark Salyzyn
3227821bce modprobe: add -s/--syslog flag am: c86d3886ab am: fb9c0d1e95
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1349035

Change-Id: Idafe34481f5e78b4b618dc9e87cd3066566585bf
2020-06-25 20:39:23 +00:00
Mark Salyzyn
c86d3886ab modprobe: add -s/--syslog flag
There is a desire to ensure that modprobe as a service can log to
kmesg to help triage issues, so add support for the -s or --syslog
flag to do so.

Bug: 159424228
Bug: 151950334
Test: use modprobe as a service to load modules, check logs
Change-Id: I884995f364b0fc604861797eb90d7225a372f864
2020-06-25 11:30:24 -07:00
TreeHugger Robot
d5495ba9e8 Merge "Copying platform seinfo into vendor partition" into rvc-dev am: b1d807bbba
Original change: https://googleplex-android-review.googlesource.com/c/platform/system/sepolicy/+/11708190

Change-Id: I91aa36b0134df73a5b7fe8ed421317e043402032
2020-06-04 15:44:52 +00:00
Bowgo Tsai
3ffd6b3f01 Copying platform seinfo into vendor partition
Some vendor apps are using platform key for signing.
This moves them to untrusted_app domain when the system partition is
switched to a Generic System Image (GSI), because the value of
platform's seinfo in /system/etc/selinux/plat_mac_permissions.xml
has been changed.

Duplicating the device-specific platform seinfo into
/vendor/etc/selinux/vendor_mac_permissions.xml to make it
self-contained within the vendor partition.

Bug: 157141777
Test: boot the device with a GSI, then `adb shell ps -eZ | grep qtidata`
Test: ./build/make/tools/releasetools/sign_target_files_apks \
      --default_key_mappings path/to/keydir \
      -o out/dist/<lunch>-target_files-*.zip \
      signed-tardis-target_files.zip and checks the platform seinfo in
      /vendor/etc/selinux/vendor_mac_permissions.xml is replaced.

Change-Id: Ic9a79780e30f456138e4de67210cc60ac2e490d6
Merged-In: Ic9a79780e30f456138e4de67210cc60ac2e490d6
(cherry picked from commit 8a86424e34)
2020-06-04 17:27:15 +08:00
Bowgo Tsai
8a86424e34 Copying platform seinfo into vendor partition
Some vendor apps are using platform key for signing.
This moves them to untrusted_app domain when the system partition is
switched to a Generic System Image (GSI), because the value of
platform's seinfo in /system/etc/selinux/plat_mac_permissions.xml
has been changed.

Duplicating the device-specific platform seinfo into
/vendor/etc/selinux/vendor_mac_permissions.xml to make it
self-contained within the vendor partition.

Bug: 157141777
Test: boot the device with a GSI, then `adb shell ps -eZ | grep qtidata`
Test: ./build/make/tools/releasetools/sign_target_files_apks \
      --default_key_mappings path/to/keydir \
      -o out/dist/<lunch>-target_files-*.zip \
      signed-tardis-target_files.zip and checks the platform seinfo in
      /vendor/etc/selinux/vendor_mac_permissions.xml is replaced.

Change-Id: Ic9a79780e30f456138e4de67210cc60ac2e490d6
2020-06-03 17:46:07 +08:00
Treehugger Robot
7a4adba63b Merge "Move aac_drc props to aac_drc_prop" am: a00b1ea2db am: b9688d505d
Change-Id: I76ba555e6d1e41e06c68088b59f5bd97a1aa809e
2020-05-12 05:16:46 +00:00
Inseob Kim
bdcbcf0742 Move aac_drc props to aac_drc_prop
Bug: 155844385
Test: sepolicy_tests
Change-Id: I1755672b5cef876955f93020c519aaaabf814bbf
2020-05-12 08:21:42 +09:00
Roshan Pius
d42c7571aa sepolicy: Remove offload HAL sepolicy rules
This is unused currently & there are no concrete plans to use it
in the future.

Bug: 130080335
Test: Device boots up & connects to networks.
Test: Will send for regression tests
Change-Id: I785389bc2c934c8792c8f631362d6aa0298007af
Merged-In: I785389bc2c934c8792c8f631362d6aa0298007af
(cherry picked from commit 56dfc06397)
2020-05-08 11:17:12 +09:00
Steve Muckle
9316da8e12 allow modprobe to read /proc/cmdline
This is needed for libmodprobe to pass module options on the kernel
commandline to kernel modules when they are loaded.

Bug: 155422904
Change-Id: I9df7e211765268815bfb9269365264f5ca468712
Merged-In: I9df7e211765268815bfb9269365264f5ca468712
2020-05-07 11:28:50 -07:00
Steve Muckle
c340f2a313 Merge "allow modprobe to read /proc/cmdline" am: 73c62d3516 am: c9c8d130b9
Change-Id: I3871b35c4de088917c3c1e941f8987ffba88953a
2020-05-06 00:53:12 +00:00
Steve Muckle
e3788c93e5 allow modprobe to read /proc/cmdline
This is needed for libmodprobe to pass module options on the kernel
commandline to kernel modules when they are loaded.

Bug: 155422904
Change-Id: I9df7e211765268815bfb9269365264f5ca468712
2020-05-05 08:50:11 -07:00
Robert Shih
a2e4038266 Merge "Allow drm hals to access allocator hal" am: b60b51d352 am: c5bf73f0d8
Change-Id: I57c6e21e36e4b4374c71204763f5481b99ee514f
2020-04-13 23:25:07 +00:00
Robert Shih
67bbb71550 Allow drm hals to access allocator hal
Bug: 150468341
Test: atest VtsHalDrmV1_3TargetTest
Change-Id: Iea8934567cda343dedf17f75cb0807a68742764d
Merged-In: Iea8934567cda343dedf17f75cb0807a68742764d
2020-04-13 20:01:06 +00:00
Robert Shih
0ade37909c Allow drm hals to access allocator hal
Bug: 150468341
Test: atest VtsHalDrmV1_3TargetTest
Change-Id: Iea8934567cda343dedf17f75cb0807a68742764d
2020-04-13 17:30:18 +00:00
TreeHugger Robot
8ab8009b87 Merge "Add sepolicy to access ion dev from Tuner service" into rvc-dev am: afd27274cd
Change-Id: Iaa4d0ce2b8183f9118ad254243774ff9425a3a6f
2020-03-28 04:16:17 +00:00
TreeHugger Robot
afd27274cd Merge "Add sepolicy to access ion dev from Tuner service" into rvc-dev 2020-03-28 03:55:51 +00:00
Amy Zhang
73f0159390 Add sepolicy to access ion dev from Tuner service
Tuner default implementation is testing with Ion buffer on Cuttlefish
to make sure the secure handle merchanism would work with media data
pass between the Tuner Hal and the Tuner Java.

Ion access would be needed for all the Tuner Hal implementation

Test: atest
Bug: 150952766
Change-Id: I39117f96bdc84ce24afcb3ef528b6d942ded505e
2020-03-27 17:40:41 -07:00
Roman Kiryanov
8a2b099e7a Label android.hardware.lights-service.example as hal_light_default_exec
Bug: 152544844
Test: ls -Z /vendor/bin/hw/android.hardware.lights-service.example
Signed-off-by: Roman Kiryanov <rkir@google.com>
Merged-In: I32a6a443c57986b37fdcca788bfe01bf0cdd3e07
Change-Id: Iabba4e35522b8393c5c4188870225fb1c6bbd835
2020-03-26 19:20:33 -07:00
Roman Kiryanov
8e8d7c5b31 Merge "Label android.hardware.lights-service.example as hal_light_default_exec" am: f7e86d40e1 am: 30ec5f3405
Change-Id: Ieabb2c6c08f60dbd33a2a58c5484c6860900d55e
2020-03-27 01:07:09 +00:00
Roman Kiryanov
f7e86d40e1 Merge "Label android.hardware.lights-service.example as hal_light_default_exec" 2020-03-27 00:39:38 +00:00
Hayden Gomes
b391ffa5a3 Merge "Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts" into rvc-dev 2020-03-26 22:48:08 +00:00
Roman Kiryanov
e0cc8b0f63 Label android.hardware.lights-service.example as hal_light_default_exec
Bug: 152544844
Test: ls -Z /vendor/bin/hw/android.hardware.lights-service.example
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: I32a6a443c57986b37fdcca788bfe01bf0cdd3e07
2020-03-26 14:32:15 -07:00
Hayden Gomes
18af143240 Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts am: a010cef7ad am: 0355e5f4d2
Change-Id: I4d0d4e6762a694c3aee1e85f119ced8605c67d64
2020-03-26 20:38:22 +00:00
Hayden Gomes
c10979afd9 Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts
Bug: 148098383
Test: built and ran with new version
Change-Id: I06f8f2cd73dce73111559664871bdd3c9b814d7c
Merged-In: I06f8f2cd73dce73111559664871bdd3c9b814d7c
(cherry picked from commit a010cef7ad)
2020-03-26 13:17:46 -07:00
Hayden Gomes
a010cef7ad Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts
Bug: 148098383
Test: built and ran with new version
Change-Id: I06f8f2cd73dce73111559664871bdd3c9b814d7c
2020-03-25 15:00:10 -07:00
TreeHugger Robot
28e7fc113b Merge "Add android.hardware.dumpstate@1.1-service.example to file_contexts" into rvc-dev 2020-03-25 19:55:24 +00:00
Roman Kiryanov
0c60039e5d Add android.hardware.dumpstate@1.1-service.example to file_contexts am: fc2956a559 am: 546897f6c6
Change-Id: Ie2ca9f8a82a93ffc3d1110cc9d06b05d9b4a77eb
2020-03-25 17:38:13 +00:00
Roman Kiryanov
546897f6c6 Add android.hardware.dumpstate@1.1-service.example to file_contexts am: fc2956a559
Change-Id: I4c9284855e9d445c352321c3afeff52883f0aac7
2020-03-25 17:16:51 +00:00
Treehugger Robot
d8f270ef6e Merge "Add android.hardware.dumpstate@1.1-service.example to file_contexts" 2020-03-25 16:54:06 +00:00
Ilya Matyukhin
244953b54c Add sepolicy for biometrics.face@1.[0-9]
Bug: 151331855
Bug: 145027036
Test: build and run on cuttlefish
Test: atest vts_treble_vintf_vendor_test
Merged-In: Iae0f157d3a670b506d6cc82686318544db41d559
Change-Id: Ia396005e0f569856e7d9873d48293bb9e05095b6
2020-03-24 11:02:13 -07:00
Roman Kiryanov
eff46106e3 Add android.hardware.dumpstate@1.1-service.example to file_contexts
Bug: 152067221
Test: VtsHalDumpstateV1_1TargetTest
Signed-off-by: Roman Kiryanov <rkir@google.com>
Merged-In: I448e1e4bd94c16f0f8cbd07a7d8390c0201056fa
Change-Id: I93f3d6cae005ade1e6edb69b81d2ea1a96b402d4
2020-03-24 10:26:49 -07:00
Ilya Matyukhin
1dce26cf96 Merge "Add sepolicy for biometrics.face@1.[0-9]" am: 3d8c069e97 am: ca695d5b5d
Change-Id: I3e35dc421204d865d25a30014c33f6eb1446f7eb
2020-03-23 23:51:39 +00:00
Ilya Matyukhin
3d8c069e97 Merge "Add sepolicy for biometrics.face@1.[0-9]" 2020-03-23 23:14:27 +00:00
Roman Kiryanov
fc2956a559 Add android.hardware.dumpstate@1.1-service.example to file_contexts
Bug: 152067221
Test: VtsHalDumpstateV1_1TargetTest
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: I448e1e4bd94c16f0f8cbd07a7d8390c0201056fa
2020-03-23 16:13:33 -07:00
Ilya Matyukhin
6d7d1b6687 Add sepolicy for biometrics.face@1.[0-9]
Bug: 151331855
Bug: 145027036
Test: build and run on cuttlefish
Change-Id: Iae0f157d3a670b506d6cc82686318544db41d559
2020-03-23 14:04:58 -07:00
Alistair Delva
4e264516ab Merge "Add gnss_device dev_type" am: d5a222d75a am: 8e755ce345
Change-Id: I6e9163b033008c5cd66e5894556ce2389800131f
2020-03-23 19:45:50 +00:00
Alistair Delva
d5a222d75a Merge "Add gnss_device dev_type" 2020-03-23 18:58:59 +00:00
Chris Weir
dcc585fcf0 Merge "Enable CAN HAL to scan /sys/devices for USB CAN" am: c58ad4b82c am: a2ad628f4f
Change-Id: I8d05c044bf753b4b5eb9572b3a13ea5a31de63e2
2020-03-17 21:39:03 +00:00
Chris Weir
c58ad4b82c Merge "Enable CAN HAL to scan /sys/devices for USB CAN" 2020-03-17 20:49:34 +00:00
Alistair Delva
1a3ee382ec Add gnss_device dev_type
This grants default access to the new GNSS subsystem for Linux to the
GNSS HAL default implementation. The GNSS subsystem creates character
devices similar to ttys but without much unneeded complexity. The GNSS
device class is specific to location use cases.

Bug: 151670529
Change-Id: I03b27aa5bbfdf600eb830de1c8748aacb9bf4663
2020-03-17 20:25:51 +00:00
chrisweir
05e9a6545c Enable CAN HAL to scan /sys/devices for USB CAN
CAN HAL needs access to /sys/devices to search for USB serial numbers
for SocketCAN devices and for USB serial devices.

Bug: 142654031
Test: Manual + VTS
Change-Id: I3d9bff94f8d8f936f7d859c01b9ff920fcbc5130
2020-03-17 12:10:07 -07:00
Steven Moreland
bfceeabe3c Allow vndservicemanager to self-register.
This is useful for tools like dumpsys, so that they work on all services
equally as well. Also, so that there is no difference with the regular
service manager.

Bug: 150579832
Test: 'adb shell /vendor/bin/dumpsys -l' shows 'manager'
Test: denial is no longer present:
03-05 12:23:47.346   221   221 E SELinux : avc:  denied  { add } for pid=221 uid=1000 name=manager scontext=u:r:vndservicemanager:s0 tcontext=u:object_r:service_manager_vndservice:s0 tclass=service_manager permissive=0

Change-Id: Id6126e8277462a2c4d5f6022ab67a4bacaa3241e
(cherry picked from commit 52a96cc7dd)
2020-03-06 16:35:52 -08:00
Automerger Merge Worker
c84153170f Merge "Allow vndservicemanager to self-register." am: 48eed15c35 am: cb31f479c5
Change-Id: Ie9a2a33659e8714bc50de909705b477680a38819
2020-03-06 18:16:10 +00:00
Steven Moreland
52a96cc7dd Allow vndservicemanager to self-register.
This is useful for tools like dumpsys, so that they work on all services
equally as well. Also, so that there is no difference with the regular
service manager.

Bug: 150579832
Test: 'adb shell /vendor/bin/dumpsys -l' shows 'manager'
Test: denial is no longer present:
03-05 12:23:47.346   221   221 E SELinux : avc:  denied  { add } for pid=221 uid=1000 name=manager scontext=u:r:vndservicemanager:s0 tcontext=u:object_r:service_manager_vndservice:s0 tclass=service_manager permissive=0

Change-Id: Id6126e8277462a2c4d5f6022ab67a4bacaa3241e
2020-03-05 17:43:35 +00:00
Changyeon Jo
3198f09709 Update automotive display service rules
This change updates sepolicies for automotive display service to make it
available to the vendor processes.

Bug: 149017572
Test: m -j selinux_policy
Change-Id: I48708fe25e260f9302e02749c3777c0ca0d84e4b
Signed-off-by: Changyeon Jo <changyeon@google.com>
(cherry picked from commit 17b38d526d)
2020-02-29 11:01:26 -08:00
Automerger Merge Worker
32f582a23c Merge "Update automotive display service rules" am: d36a0750e4 am: 3e54bef43f
Change-Id: I75af71dba278c7a72902b7dfa236d4632a30aa17
2020-02-25 16:11:43 +00:00
Changyeon Jo
17b38d526d Update automotive display service rules
This change updates sepolicies for automotive display service to make it
available to the vendor processes.

Bug: 149017572
Test: m -j selinux_policy
Change-Id: I48708fe25e260f9302e02749c3777c0ca0d84e4b
Signed-off-by: Changyeon Jo <changyeon@google.com>
2020-02-25 02:02:54 +00:00
Automerger Merge Worker
7934472245 Merge "Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL." am: 1948c11d13 am: 19516eb39f am: 5d5da562ba
Change-Id: Id5d55d29f52b7ed56c16de946c4c0e5fdf054f35
2020-02-19 23:18:16 +00:00
Automerger Merge Worker
efbd524476 Merge "Update file_contexts for contexthub HAL 1.1" am: c5953aba8b am: ab1bf2c331 am: 5beece6e58
Change-Id: Ic709e86c1e9ff2337c710d3e521e3f97a8343d66
2020-02-19 22:20:14 +00:00
David Zeuthen
1948c11d13 Merge "Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL." 2020-02-19 21:14:40 +00:00
David Zeuthen
02bf814aa2 Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL.
The credstore service is a system service which backs the
android.security.identity.* Framework APIs. It essentially calls into
the Identity Credential HAL while providing persistent storage for
credentials.

Bug: 111446262
Test: atest android.security.identity.cts
Test: VtsHalIdentityTargetTest
Test: android.hardware.identity-support-lib-test
Change-Id: I5cd9a6ae810e764326355c0842e88c490f214c60
2020-02-19 13:46:45 -05:00
Anthony Stange
667b2fa6ec Update file_contexts for contexthub HAL 1.1
Bug: 135951924
Test: Verify this lets contexthub HAL 1.1 run on a device that supports
it

Change-Id: I049e77d476ac0d090e48895a19a454b764aac74c
2020-02-18 23:12:05 +00:00
Automerger Merge Worker
db9794f0ed Merge "rebootescrow: allow use of block file" am: ebbc1b43cc am: d0cb7bf39a am: 9f707e3c15
Change-Id: I93247f43f6b6ecd448d606a8bba2c620b41ba91b
2020-01-28 17:46:23 +00:00
Kenny Root
ebbc1b43cc Merge "rebootescrow: allow use of block file" 2020-01-28 17:10:37 +00:00
Automerger Merge Worker
ad06d1c3ee Merge "Allow reading dt fstab in boot control HAL." am: 23a3355004 am: b4f243d0b9 am: 2ef17e8b8c
Change-Id: I2d900fa38a7980227c4f60e109e0e30658145539
2020-01-28 16:35:43 +00:00
David Anderson
9853c7522d Allow reading dt fstab in boot control HAL.
Fixes the following denial:
  type=1400 audit(0.0:4): avc: denied { read } for comm="android.hardwar" name="compatible" dev="sysfs" ino=28205 scontext=u:r:hal_bootctl_default:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=file permissive=0

This permission is needed for ReadDefaultFstab, which searches the device tree for fstab entries. Devices that use dt-fstab may fail to find the misc block device.

Bug: 143589455
Test: manual test
Change-Id: Ied52fe9b1056d26b4dd00811c4690fa4c505fae8
2020-01-28 01:03:38 +00:00
Kenny Root
960f73b75b rebootescrow: allow use of block file
pmem uses a block file while access_ramoops uses a char file. Allow both for
now until we can unify on pmem.

Additionally allow the reading of vendor properties so it can read the
path to the character or block device to open.

Test: atest VtsHalRebootEscrowTargetTest
Bug: 146400078
Change-Id: Ief61534e0946480a01c635ce1672579959ec8db5
2020-01-27 12:28:44 -08:00
Automerger Merge Worker
e987034615 Merge "Add sepolicy for biometrics.face@1.1" am: 915ad1ecbf am: 29b9d7d68e am: 82045b4624
Change-Id: Id04a58be24ba92ea06d4e71d2ff26c05a769f10b
2020-01-23 12:25:34 +00:00
Ilya Matyukhin
536796c6dd Add sepolicy for biometrics.face@1.1
Bug: 145027036
Test: build and run on cuttlefish
Change-Id: Ic3cc7755e65ba3537cbe817e0835ac34c04d6561
2020-01-22 17:17:12 -08:00
Automerger Merge Worker
ac2dd1ad0d Merge "stable aidl Power HAL policy" am: fbe4afa7aa am: 4cb024e790 am: 03a1842686
Change-Id: I83dd34152278d0b38ee50525950e06f7d77925d7
2020-01-16 23:09:09 +00:00
Wei Wang
fbe4afa7aa Merge "stable aidl Power HAL policy" 2020-01-16 22:35:42 +00:00
Automerger Merge Worker
da1f8e6709 Merge "Fix spelling of 'system' for android.hardware.identity@1.0-service.example" am: 89277a412d am: 91c15d1bc2 am: 550e7f28dd
Change-Id: I045e0fa2164a04541093637a72940ce3ec8e5982
2020-01-16 19:15:18 +00:00
Treehugger Robot
89277a412d Merge "Fix spelling of 'system' for android.hardware.identity@1.0-service.example" 2020-01-16 18:43:34 +00:00
Automerger Merge Worker
6acd552f07 Merge "Add sepolicy for usb gadget hal v1.1" am: a1f829d3f8 am: 5b62692346 am: f8cafa6bec
Change-Id: Ie61864b459214892fa15bfe1a65651ce95fc071e
2020-01-16 11:29:01 +00:00
Treehugger Robot
a1f829d3f8 Merge "Add sepolicy for usb gadget hal v1.1" 2020-01-16 11:01:35 +00:00
Automerger Merge Worker
ea13ded3a3 Merge "Add rebootescrow default HAL rules" am: 1145b90b69 am: 4e4bb65056 am: f2bb2e241b
Change-Id: I86c5354a5203982cedff4a4884520839df35c52d
2020-01-16 01:32:34 +00:00
Wei Wang
32b24c0f0b stable aidl Power HAL policy
Test: boot and dumpsys -l
Change-Id: I58022c9e0c24ba4e2d695acf63375c9f74c51b22
2020-01-15 16:53:40 -08:00
Treehugger Robot
1145b90b69 Merge "Add rebootescrow default HAL rules" 2020-01-16 00:24:59 +00:00
David Zeuthen
05ade22c65 Fix spelling of 'system' for android.hardware.identity@1.0-service.example
Bug: 111446262
Test: Manually
Change-Id: I37764f0ed580b4242e02c1958eabed88957adfd1
2020-01-15 19:05:24 -05:00
Automerger Merge Worker
5a24828f3e Merge "Add SELinux policy for Identity Credential HAL" am: a5527b4e46 am: 8924b794a7 am: 700b98a507
Change-Id: If6578fc781106395bd8e47b13aba4994d41ba986
2020-01-15 23:43:10 +00:00
Kenny Root
70c40e05f3 Add rebootescrow default HAL rules
Bug: 63928581
Test: build and check HAL label
Change-Id: I057b26eb20c5a6b022c7f391a6c8535f2953051c
2020-01-15 13:14:35 -08:00
Howard Yen
a98cdefad6 Add sepolicy for usb gadget hal v1.1
Bug: 147645728
Test: build pass and service running correctly
Change-Id: I52b6bcae2c05998e3f22c39998597e2ecef55036
2020-01-15 16:44:39 +08:00
David Zeuthen
b8b5da4305 Add SELinux policy for Identity Credential HAL
Bug: 111446262
Test: VtsHalIdentityCredentialTargetTest
Change-Id: Icb5a0d8b24d463a2f1533f8dd3bfa84bf90acc6f
2020-01-14 20:13:39 -05:00
Automerger Merge Worker
a36a52b562 Add device file for Resume on Reboot am: 2073d5b685 am: 58b31517b1 am: c7d5d9fcd7
Change-Id: I04a00fd23f019dd32c5dcad4daa986b3028db2e7
2019-12-19 02:46:50 +00:00
Kenny Root
2073d5b685 Add device file for Resume on Reboot
This adds the type and permissions for the default implementation to talk to
its kernel module.

Bug: 63928581
Test: boot Pixel 4 with default implementation

Change-Id: Ie847e4db975b95e90ea64937401e8d8a8ed812cb
2019-12-18 10:39:21 -08:00
Automerger Merge Worker
cbd87608df Merge "Modify SEPolicy to support SLCAN" am: 6ad4f3207a am: f1daf7567d am: 9beeb34e7b
Change-Id: I4101a255a284fcc1c04cf1833c30a23fcbdd4576
2019-12-11 22:08:06 +00:00
Chris Weir
6ad4f3207a Merge "Modify SEPolicy to support SLCAN" 2019-12-11 21:25:14 +00:00
Kenny Root
64de2059d3 Merge "Support Resume on Reboot" am: 6a9f7b265a am: 25e571fa5d
am: c11be97479

Change-Id: If3f7b5f69dc0cfba89e37d3bb22db84f5bde8e44
2019-12-10 05:11:13 -08:00
Kenny Root
6a9f7b265a Merge "Support Resume on Reboot" 2019-12-10 12:59:35 +00:00
Kenny Root
76ea325a3d Support Resume on Reboot
When an OTA is downloaded, the RecoverySystem can be triggered to store
the user's lock screen knowledge factor in a secure way using the
IRebootEscrow HAL. This will allow the credential encrypted (CE)
storage, keymaster credentials, and possibly others to be unlocked when
the device reboots after an OTA.

Bug: 63928581
Test: make
Test: boot emulator with default implementation
Test: boot Pixel 4 with default implementation
Change-Id: I1f02e7a502478715fd642049da01eb0c01d112f6
2019-12-09 14:25:04 -08:00
chrisweir
cd40aa0ab7 Modify SEPolicy to support SLCAN
SLCAN setup requires certain ioctls and read/write operations to
certain tty's. This change allows the HAL to set up SLCAN devices while
complying with SEPolicy.

In addition to adding support for SLCAN, I've also included permissions
for using setsockopt. In order for the CAN HAL receive error frames from
the CAN bus controller, we need to first set the error mask and filter
via setsockopt.

Test: manual
Bug: 144458917
Bug: 144513919
Change-Id: I63a48ad6677a22f05d50d665a81868011c027898
2019-12-04 14:06:09 -08:00
Stan Rokita
00231e4415 Merge "Add sensors multihal support in file_contexts regex" am: d494872641 am: 193dfaeca0
am: 50bd8a131b

Change-Id: Iae1cbd872e6ef7c6f3c8106ec4190f43ef761671
2019-12-02 13:45:37 -08:00
Stan Rokita
d494872641 Merge "Add sensors multihal support in file_contexts regex" 2019-12-02 20:54:57 +00:00
Harpreet \"Eli\" Sangha
ff8c5d6468 Merge "Fix File Context Entry for Bluetooth Services." am: d6a91453d8 am: ae8ad79141
am: bca6554594

Change-Id: I1756a10d49425e3611b9ab6dfe2e66d56012eabf
2019-11-26 20:11:34 -08:00
Harpreet \"Eli\" Sangha
078689ae03 Fix File Context Entry for Bluetooth Services.
Test: Boot on HiKey960 and check dmesg errors.
Change-Id: I9ac0968753c7cd9a23c63eac98b20a7778277716
Signed-off-by: Harpreet \"Eli\" Sangha <eliptus@google.com>
2019-11-27 10:11:12 +09:00
Tomasz Wasilczyk
82f3cba4e1 Merge "Vehicle HAL: allow communication with CAN bus HAL and alternative service naming" am: eeb6279953 am: fadede5a4d
am: 22e795881c

Change-Id: I8f65ad29253d701225722273e7fbad4da43ab31a
2019-11-22 13:47:59 -08:00
Tomasz Wasilczyk
eeb6279953 Merge "Vehicle HAL: allow communication with CAN bus HAL and alternative service naming" 2019-11-22 20:27:23 +00:00
Shawn Willden
129bdb4ddd Merge "Add Keymaster 4.1" am: 88554af5c0 am: e44ba58615
am: 138c5d4374

Change-Id: Ib574ba4f4cdf3ffe3db425b60818056cb759b57f
2019-11-21 15:01:37 -08:00
Stan Rokita
16d522871d Add sensors multihal support in file_contexts regex
Bug: 144722764
Test: N/A
Change-Id: Ic595d9c21639bdf2874dc6734344ff1a41767399
2019-11-21 08:57:58 -08:00
Shawn Willden
10f0b53ef7 Add Keymaster 4.1
Bug: 140193672
Bug: 140192237
Bug: 140824829
Test: Manual boot test
Change-Id: Iccc8cc5e8fc7c9301478faa50d0e18fa917283fb
2019-11-20 12:14:36 -07:00
Steven Moreland
231958e28d Merge "stable aidl vibrator policy" am: a71c74c188 am: 416aa29a30
am: 685d10c87f

Change-Id: Icbdf813b1317d3cbdec4547f2d832432763bb222
2019-11-01 14:54:22 -07:00
Tomasz Wasilczyk
3846fc25f6 Vehicle HAL: allow communication with CAN bus HAL and alternative service naming
Bug: 143779011
Test: implemented a VHAL service prototype that communicates with VHAL
Change-Id: I8f449510fc638e29a5cb23c0e32f3d87386ba9bc
2019-11-01 14:21:03 -07:00
Steven Moreland
d87649c645 stable aidl vibrator policy
Bug: 141828236
Test: boot, dumpsys -l
Change-Id: Id3fc8724238883116e840794309efbf6c91226c9
2019-10-29 16:39:55 -07:00
Yifan Hong
318582f265 Merge "Add health 2.1 HAL" am: ba48222bc7 am: 5daea7332d am: 55ed721302
am: 51bc766658

Change-Id: I8b4882a9ae8f64db9108b8ce98dd9b9eb6ec1790
2019-10-23 18:51:33 -07:00
Yifan Hong
ba48222bc7 Merge "Add health 2.1 HAL" 2019-10-24 01:03:09 +00:00
Yifan Hong
fbce5cce11 Add health 2.1 HAL
Test: VTS health 2.1 HAL test
Bug: 137670450
Change-Id: Iedc6972154c6e948eaf22b4650da39a9e73cb6f8
2019-10-17 16:35:43 -07:00
Henry Fang
414674f103 Merge "Update sepolicy to support cas@1.2" am: b3f755fbb4 am: 04abc97c6a am: 98346620f5
am: 571640f96d

Change-Id: I21e4c07603b7a346a198df422e4c4d1f3b6ec130
2019-10-15 22:06:24 -07:00
Henry Fang
b418dd991a Update sepolicy to support cas@1.2
Test: Manual
bug: 141783130
Change-Id: I973cb5d59d74c495eea18f4865baf0bd6f55e2fb
2019-10-14 17:37:17 -07:00
David Anderson
b12a53a7f5 Merge "Add sepolicy for IBootControl 1.1 and the default HAL." am: 0fb0781fb6 am: 25e83f480c am: f5c42c2738
am: 166982566c

Change-Id: Ief5166c30eb59baa08c2412b503b3d144a7c1709
2019-10-10 21:48:25 -07:00
David Anderson
0fb0781fb6 Merge "Add sepolicy for IBootControl 1.1 and the default HAL." 2019-10-10 19:19:49 +00:00
David Anderson
549e3c6d91 Add sepolicy for IBootControl 1.1 and the default HAL.
Bug: 138861550
Test: manual test
Change-Id: Ibc9a55266a2726cb8dc8550be0264db30b66109e
2019-10-08 14:24:38 -07:00
Bill Peckham
05fd2e52b9 Merge "Moving recovery resources from /system to /vendor" am: 0109fb24fc am: 62b54c4f8e am: dcdb3ebbf0
am: 8ee0b85f2a

Change-Id: I2db7b19266d4c75367b8399e07cd4d9c33549fa3
2019-10-04 20:45:05 -07:00
Bill Peckham
d0dc1a057d Moving recovery resources from /system to /vendor
This change is part of a topic that moves the recovery resources from the
system partition to the vendor partition, if it exists, or the vendor directory
on the system partition otherwise. The recovery resources are moving from the
system image to the vendor partition so that a single system image may be used
with either an A/B or a non-A/B vendor image. The topic removes a delta in the
system image that prevented such reuse in the past.

The recovery resources that are moving are involved with updating the recovery
partition after an update. In a non-A/B configuration, the system boots from
the recovery partition, updates the other partitions (system, vendor, etc.)
Then, the next time the system boots normally, a script updates the recovery
partition (if necessary). This script, the executables it invokes, and the data
files that it uses were previously on the system partition. The resources that
are moving include the following.

* install-recovery.sh
* applypatch
* recovery-resource.dat (if present)
* recovery-from-boot.p (if present)

This change includes the sepolicy changes to move the recovery resources from
system to vendor. The big change is renaming install_recovery*.te to
vendor_install_recovery*.te to emphasize the move to vendor. Other changes
follow from that. The net result is that the application of the recovery patch
has the same permissions that it had when it lived in system.

Bug: 68319577
Test: Ensure that recovery partition is updated correctly.
Change-Id: If29cb22b2a7a5ce1b25d45ef8635e6cb81103327
2019-10-04 14:40:27 -07:00
Steven Moreland
9b11665bf3 Deprecate libhwbinder/libhidltransport from VNDK. am: 9104421b1d
am: cc27e5f200

Change-Id: I10a2a94d895bdd76b7e7e957bd173f27eba25c71
2019-10-01 09:27:19 -07:00
Steven Moreland
9104421b1d Deprecate libhwbinder/libhidltransport from VNDK.
Since these libraries were vndk-sp, previously, passthrough HALs were
able to load them. However, now that they have been removed from the
vndk-sp set (these libraries are empty), marking them as
same_process_hal_file so that vendor passthrough implementations that
still link against these empty libraries can still use them.

Bug: 135686713
Test: boot device using these libraries from an sphal (otherwise,
    bootloops)
Change-Id: Ic5170eb0fcbb87c82bbea840dcfcb17899eaa899
(cherry picked from commit 71a596a49b443e5ae3518301ffdf9e6b95d4d94d)
2019-10-01 01:39:51 +00:00
Steven Moreland
b081eee00e Deprecate libhwbinder/libhidltransport from VNDK.
Since these libraries were vndk-sp, previously, passthrough HALs were
able to load them. However, now that they have been removed from the
vndk-sp set (these libraries are empty), marking them as
same_process_hal_file so that vendor passthrough implementations that
still link against these empty libraries can still use them.

Bug: 135686713
Test: boot device using these libraries from an sphal (otherwise,
    bootloops)
Change-Id: Ic5170eb0fcbb87c82bbea840dcfcb17899eaa899
2019-09-26 15:49:50 -07:00
Tri Vo
b23ec2efab Merge "sepolicy: ashmem entry point for libcutils" am: e612ecd6ed am: e570bf7ea4 am: 76333c6b08
am: 498c8fb53f

Change-Id: Ib3eb8d7f37bb94ec6363e6a77e2bdf04663300b0
2019-09-26 12:08:42 -07:00
Tri Vo
a7f61021b7 sepolicy: ashmem entry point for libcutils
This duplicated ashmem device is intended to replace ashmemd.

Ashmem fd has a label of the domain that opens it. Now with ashmemd
removed, ashmem fds can have labels other than "ashmemd", e.g.
"system_server". We add missing permissions to make ashmem fds usable.

Bug: 139855428
Test: boot device
Change-Id: Iec8352567f1e4f171f76db1272935eee59156954
2019-09-25 11:26:18 -07:00
Steven Moreland
9106bf90f8 Merge "Rename dumpstate service to include '.example'." am: 2d572464af am: 82d825df79 am: 44a58b7112 am: cfda39e3b0
am: b3d1b4ed9a

Change-Id: Ibc02cd22d73329eb5cec05b17976dd4051e2c0f6
2019-08-27 18:52:34 -07:00
Steven Moreland
82d825df79 Merge "Rename dumpstate service to include '.example'."
am: 2d572464af

Change-Id: I81ce7c04472893d7e77aa974969b484b93c7beaa
2019-08-27 16:26:23 -07:00
Steven Moreland
10d260950d Rename dumpstate service to include '.example'.
Since this was an example service providing no real functionality and
accidentally got installed on a device.

Bug: 140115084
Test: install on test device and see that it runs
Change-Id: I553da8e1f4da7d6a9f0c3e7d4a3561f0b22321dc
2019-08-27 11:07:51 -07:00
Jon Spivack
2a97c025e3 Merge "Allow vndservicemanager to start processes" am: 018f745b90 am: 685af5eaab am: fdc17e034e am: 0e4d8301aa
am: ad016e8060

Change-Id: Id236bbca47876be8370e25108ae47afd26098e00
2019-08-26 12:43:19 -07:00
Marissa Wall
16ff192d62 Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy" am: 1751aa5b80 am: 6782faba9f am: dd52020c88 am: 86b7d95c79
am: dfc86e4036

Change-Id: I351fc8efa4254e366e4f8c1e953e0941d0a19713
2019-08-26 12:41:36 -07:00
Jon Spivack
685af5eaab Merge "Allow vndservicemanager to start processes"
am: 018f745b90

Change-Id: I42f16342f807cabebc1e258a353b1cea5b13472e
2019-08-22 18:50:11 -07:00
Jon Spivack
018f745b90 Merge "Allow vndservicemanager to start processes" 2019-08-23 01:29:06 +00:00
Marissa Wall
6782faba9f Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy"
am: 1751aa5b80

Change-Id: I072a3950a3f57ab0a78e95ee2c73c6d71245d373
2019-08-22 10:48:50 -07:00
Treehugger Robot
1751aa5b80 Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy" 2019-08-22 17:20:45 +00:00
Steven Moreland
52afb27ec7 Merge changes Icdf207c5,I20aa48ef am: 30a06d278f am: 169bfcfe88 am: 99f2860521 am: 4a474dc430
am: bc0374bdc4

Change-Id: Ib48f8593db8744cddb9bb6b877947c5ca13bc5f4
2019-08-20 14:26:29 -07:00
Steven Moreland
169bfcfe88 Merge changes Icdf207c5,I20aa48ef
am: 30a06d278f

Change-Id: Ia505b1539cfd64bb93c2f5fe0dbd0603df5e9f5f
2019-08-20 13:41:45 -07:00
Steven Moreland
641c45e258 mediacodec: remove non-Treble allows
Since mediacodec system services have been entirely deleted.

Bug: 80317992
Test: TH
Change-Id: I20aa48ef57474df000279a487f6b077790d273c1
2019-08-20 00:03:24 +00:00
Jon Spivack
b58c4c2a62 Allow vndservicemanager to start processes
Used to lazily start AIDL services.

Bug: 138756857
Test: Manual
Change-Id: I890ca70e654f8e8bb795189abb4018c0d5d05865
2019-08-19 16:05:13 -07:00
Amy Zhang
c23667f999 Merge "Tuner Hal 1.0 Enable ITuner service" am: 3e7429359f am: 3b62596f4f am: 11739f3126 am: a588ba4e3e
am: 5bd0803562

Change-Id: I7dfa4df490f1365edcecaf69e2971378177d56ef
2019-08-15 16:07:07 -07:00
Amy Zhang
3b62596f4f Merge "Tuner Hal 1.0 Enable ITuner service"
am: 3e7429359f

Change-Id: Ic4442460d60d51e97c84ea430830cd12c205e5f6
2019-08-15 13:23:33 -07:00
Amy
89b4bbd4d8 Tuner Hal 1.0 Enable ITuner service
Test: cuttlefish
Bug: 135708935
Change-Id: Ica063458860df45f0e2ab640a2ab35cd4da3da8e
2019-08-14 11:22:09 -07:00
Tomasz Wasilczyk
9794dd74a3 SEPolicy rules for CAN bus HAL am: 602b30302a am: 0540154021 am: 2f0ee4345f am: ce9863e755
am: b94bb81337

Change-Id: Id35783f576554cfce08126bc1ee0216af7fc70bd
2019-08-01 20:21:08 -07:00
Tomasz Wasilczyk
0540154021 SEPolicy rules for CAN bus HAL
am: 602b30302a

Change-Id: I5ae916b8f4c3d6038c48a522df1efc2ce8fc3d39
2019-08-01 19:34:47 -07:00
Tomasz Wasilczyk
602b30302a SEPolicy rules for CAN bus HAL
Bug: 135918744
Test: VTS (separate new change)
Change-Id: Idd3ca882e3bd36b95a5412bdfbf6fe9d6e911ba9
2019-08-01 10:24:00 -07:00
Changyeon Jo
154451ff7a Update sepolicy for EVS v1.x am: 5ee628f0ce am: c90bc366e6 am: d8072b0fef am: ee1ad87354
am: 51b22f6155

Change-Id: I7466c5a9c359a83e4d38027a3d29c6d9cf3a5f13
2019-07-30 20:40:48 -07:00
Changyeon Jo
c90bc366e6 Update sepolicy for EVS v1.x
am: 5ee628f0ce

Change-Id: I3aa2c140f2ab37a604ab70221926d15c25822bef
2019-07-30 19:57:29 -07:00
Changyeon Jo
5ee628f0ce Update sepolicy for EVS v1.x
Modify vendor file context and hal_evs_server policy to enable EVS v1.1
service.

Change-Id: I1e717b3209200300005c3fa7f91423589505a41c
Signed-off-by: Changyeon Jo <changyeon@google.com>
2019-07-30 13:22:03 -07:00
Kevin Rocard
647c58e50c Merge "Rename audio hal service" am: e4466e8ec7 am: 09a2074c71 am: f027d2f140
am: db63da9e39

Change-Id: Ie8a1afe479fc663e14b2907248c7a2d25515cee2
2019-07-09 11:39:39 -07:00
Kevin Rocard
09a2074c71 Merge "Rename audio hal service"
am: e4466e8ec7

Change-Id: Ib8824bda3c2fd3bd350290bf40171898d408fa60
2019-07-09 11:06:25 -07:00
Kevin Rocard
8fcd26e448 Rename audio hal service
The audio HAL service name previously contained the audio HAL version
of the first audio HAL it supported.
Nevertheless, the same service can and do host all audio HAL versions.

Aka there is only one audio HAL service, and the version in its name is
technical dept and should not be changed.

This caused many confusions during vendor HAL upgrade as the
service version number was erroneously updated leading to
device boot loop.

The new service name is:
android.hardware.audio.service
The old one was:
android.hardware.audio@2.0-service

Keeping both names valid as most phones will not rename
the service immediately.

Bug: 78516186
Test: boot & check the audio HAL is up with the old and new name
Change-Id: I2ce0182fd919af6eb8325d49682b4374be00344e
Signed-off-by: Kevin Rocard <krocard@google.com>
2019-07-08 22:25:18 +00:00
Marissa Wall
3474653bd0 gralloc: add IAllocator/IMapper 4.0 sepolicy
Add support for gralloc 4.0 to sepolicy

Bug: 136016160
Test: Compiles and boots

Change-Id: I148cc19176275e8cbd19cc95aa95d4d450353b7a
2019-06-25 12:17:36 -07:00
Matthias Kramm
2a7f5db521 Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" am: f4362c08c7 am: 199db0ceb1 am: 1710bbd6fe
am: c69c613942

Change-Id: I396e68b0ca30ba884c43acf685d7100849e635ee
2019-06-19 21:37:37 -07:00
Matthias Kramm
1710bbd6fe Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" am: f4362c08c7
am: 199db0ceb1

Change-Id: Icce34a06c681b8d3717061c31d142622acbfd979
2019-06-19 18:36:04 -07:00
Treehugger Robot
f4362c08c7 Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" 2019-06-19 23:44:27 +00:00
Matthias Kramm
ebcc08249b Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."
This reverts commit 3a44b17897.

Reason for revert: Moved to downstream repo.

Change-Id: I7d3ad43335f71ed03e7a93bc5c96a8933785afd8
2019-06-19 20:15:50 +00:00
Matthias Kramm
469932dec9 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." am: 9faeec71f2 am: c58cd73209 am: cf010dcb85
am: 44bb087de2

Change-Id: I44ab3f9695e778ddc45d7c098b99d1c974e7312d
2019-06-17 14:41:22 -07:00
Matthias Kramm
cf010dcb85 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." am: 9faeec71f2
am: c58cd73209

Change-Id: I102966877e40ec5c56033feb510e519c033aa407
2019-06-17 12:48:25 -07:00
Matthias Kramm
9faeec71f2 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." 2019-06-17 19:31:50 +00:00
Valerie Hau
bffbdf0d08 Add IMapper2.1 same process hal permissions am: d3499df3cf am: 178ef8ccad am: 5162b0c3d0
am: ec0fc9a7d9

Change-Id: Ic91709f5b9564b409c7a0a4b28a853ad527442b5
2019-06-17 11:57:06 -07:00
Valerie Hau
5162b0c3d0 Add IMapper2.1 same process hal permissions am: d3499df3cf
am: 178ef8ccad

Change-Id: Ifaef339d29e8f0547cc5c3eb4992b14f1c7a81f3
2019-06-17 11:42:02 -07:00
Valerie Hau
d3499df3cf Add IMapper2.1 same process hal permissions
Bug: 135166668
Test: build, boot, VtsHalGraphicsComposerV2_2TargetTest
Change-Id: Iedc11b73d3e3ba54dcd622b128cb513adec11d69
2019-06-14 12:31:17 -07:00
Matthias Kramm
3a44b17897 Allow hal_face to write to /data/vendor/camera_calibration/*.
Also, allow hal_camera to read from there.

Bug: 133792720
Change-Id: Iedec8d7325b4424d166f8e4d09182e1f29808ef2
Test: Running presubmit.
2019-06-14 05:53:59 -07:00
Joel Galenson
08a0379943 Merge "Give hal_drm_server appdomain fd access." am: 7d258073df am: 2c465fa2bb am: d181604ce1
am: 926731d20d

Change-Id: I278eed76e64ef768491982f901f8065a3da81b64
2019-06-10 11:53:12 -07:00
Joel Galenson
d181604ce1 Merge "Give hal_drm_server appdomain fd access." am: 7d258073df
am: 2c465fa2bb

Change-Id: I89eff6ce6cb82ad2a65c79a3c4e934b9a6ea81b6
2019-06-10 11:43:41 -07:00