Commit graph

630 commits

Author SHA1 Message Date
Amy Zhang
d23de3f9ac Allow tuner default implementation to access /dev/dma_heap/system
This is for Tuner default impl to use DMA buffer

Test: local tested on Cuttlefish
Bug: 181341260
Change-Id: I7630a7908bedfe9c5878b7a8c6d4d67cbb5924e1
2021-03-02 15:21:45 -08:00
Treehugger Robot
9c26e0265d Merge "Add CEC HAL 1.1" 2021-02-17 00:17:54 +00:00
Marvin Ramin
90c2c856ae Add CEC HAL 1.1
Update contexts to include CEC HAL v1.1

Bug: 169121290
Test: make
Change-Id: Ia28afad7d9963886b0d4286436e2024cdd93c8d4
2021-02-15 09:36:55 +01:00
Chirag Pathak
814e89a1b2 The SE Policies to incorporate ISecureClock and ISharedSecret services along with IKeyMintDevice service into default keymint HAL Server.
Test: Rebuild, execute and run atest VtsAidlSharedSecretTargetTest and atest VtsAidlSecureClockTargetTest.
Bug: b/171844725, b/168673523.

Change-Id: I8b81ec12c45566d31edcd117e41fd559df32c37d
2021-02-10 18:45:07 +00:00
ChengYou Ho
291890a954 Add sepolicy for weaver aidl HAL service
Bug: 176107318
Change-Id: I9ca1a68e45b462c9b6ac912debb196b3a3ca45ba
2021-01-22 06:34:41 +00:00
Yifan Hong
06e4b8417a Add health storage AIDL service.
Test: adb shell sm idle-maint run
Bug: 177470478
Change-Id: Id7ee5af64e8d21eafd041c9e8fa1382f65a3958b
2021-01-15 18:23:01 -08:00
Treehugger Robot
cf7118cc65 Merge "Allow mediacodec to allocate from the DMA-BUF system heap" 2021-01-14 18:02:59 +00:00
Hridya Valsaraju
0fee0133c6 Allow mediacodec to allocate from the DMA-BUF system heap
mediacodec currently only has permissions to allocate from ION heaps.
The following permission is required for it to allocate from the
DMA-BUF system heap via the the codec2 allocator.

It resolves the following denial in the sdk_gphone_x86_64-userdebug
target:

01-08 22:43:48.712   337   337 I auditd  : type=1400 audit(0.0:6): avc:
denied { getattr } for comm="android.hardwar"
path="/dev/dma_heap/system-uncached" dev="tmpfs" ino=311
scontext=u:r:mediacodec:s0
tcontext=u:object_r:dmabuf_system_heap_device:s0 tclass=chr_file
permissive=0

Bug: 170887642
Test: make and boot
Change-Id: I5503ed6ffa47a84f614792de866ddafbec0cdcda
2021-01-14 05:13:54 +00:00
Tomasz Wasilczyk
c848de1480 Merge "Revert "Revert "hal_can_*: use hal_attribute_service""" 2021-01-12 16:45:24 +00:00
Tomasz Wasilczyk
d99750d79e Revert "Revert "hal_can_*: use hal_attribute_service""
This reverts commit 061b56b497.

Reason for revert: second submission attempt

Change-Id: I632968c7c0c369ecc07ec829f59b629c39fb71e9
2021-01-11 18:25:51 +00:00
ChengYou Ho
553afe7242 Add sepolicy for oemlock aidl HAL
Bug: 176107318
Change-Id: I26f8926401b15136f0aca79b3d5964ab3b59fbdd
2021-01-11 05:57:17 +00:00
Nazanin Bakhshi
51872d888d Merge "Revert "hal_can_*: use hal_attribute_service"" 2020-12-29 22:57:03 +00:00
Nazanin Bakhshi
061b56b497 Revert "hal_can_*: use hal_attribute_service"
This reverts commit c8e937efe5.

Reason for revert: <DroidMonitor-triggered revert due to breakage https://android-build.googleplex.com/builds/quarterdeck?build-cop=true, bug 176180039>

Change-Id: I0aff6ebba8b6a7a45af7229a0506f0426a8ebadf
2020-12-29 22:53:29 +00:00
Steven Moreland
8e5c457f2e Merge "hal_can_*: use hal_attribute_service" 2020-12-29 20:43:20 +00:00
Steven Moreland
c8e937efe5 hal_can_*: use hal_attribute_service
This macro creates the necessary neverallow to assert the
hal_can_*_{client,server} attribute has exclusive ownership of
the service.

Bug: 176180039
Test: build/TH
Change-Id: I876b50e4184ef787117d5ca67c7fbd522d82687c
2020-12-23 01:36:02 +00:00
Kalesh Singh
24ada7dbee Reland: Memtrack HAL stable aidl sepolicy
Bug: 175021432
Test: Check logcat for denials
Change-Id: Id92fc543791072d8682e3a89cbf08370007108bf
2020-12-22 16:08:53 -05:00
Joel Galenson
1c7eb3c3bd Clean up keymint service policy.
Test: VtsAidlKeyMintTargetTest
Change-Id: Id6e83d63ffb1de7c48dbdf435fd9988e9174cfe2
2020-12-16 08:59:09 -08:00
Kalesh Singh
3619437561 Merge "Revert "Memtrack HAL stable aidl sepolicy"" 2020-12-16 00:48:06 +00:00
Kalesh Singh
5db6857fe1 Revert "Memtrack HAL stable aidl sepolicy"
Revert "Add android.hardware.memtrack-unstable-ndk_platform"

Revert submission 1518702-memtrack-aidl

Reason for revert: Broken tests and boot time regressions
Reverted Changes:
Ic4dd70e2c:Add android.hardware.memtrack-unstable-ndk_platfor...
Iaf99d0ca4:Add stable aidl memtrack HAL to product packages
Iac54ae2ba:Add stable aidl memtrack hal to vndk list
If310210a3:libmemtrack: Add support for AIDL memtrack HAL
Ib6c634def:Memtrack HAL: Add stable AIDL implementation
I5e1d0e006:Memtrack HAL stable aidl sepolicy

Change-Id: I0c55ee100c7fd8d09a5b188a39b17c95c8a43c39
2020-12-16 00:19:38 +00:00
Treehugger Robot
6d560dee90 Merge "Memtrack HAL stable aidl sepolicy" 2020-12-14 18:36:10 +00:00
Shawn Willden
b41f4985a9 Revert^2 "Move keymint to android.hardware.security."
16d61d0383


Bug: 175345910
Bug: 171429297
Exempt-From-Owner-Approval: re-landing topic with no changes in this CL.
Change-Id: I1352c6b46b007dba3448b3c9cbdf454d7862a176
2020-12-11 20:36:53 +00:00
Orion Hodson
16d61d0383 Revert "Move keymint to android.hardware.security."
Revert submission 1522123-move_keymint

Reason for revert: Build breakage
Bug: 175345910
Bug: 171429297
Reverted Changes:
Ief0e9884a:Keystore 2.0: Move keymint spec to security namesp...
Idb54e8846:Keystore 2.0: Move keymint spec to security namesp...
I9f70db0e4:Remove references to keymint1
I2b4ce3349:Keystore 2.0 SPI: Move keymint spec to security na...
I2498073aa:Move keymint to android.hardware.security.
I098711e7d:Move keymint to android.hardware.security.
I3ec8d70fe:Configure CF to start KeyMint service by default.
Icbb373c50:Move keymint to android.hardware.security.
I86bccf40e:Move keymint to android.hardware.security.

Change-Id: Ib5591c2379bbd2fd6dde0558ba0e68f39d27fbaf
2020-12-11 10:45:43 +00:00
Selene Huang
2c3bdb28de Move keymint to android.hardware.security.
Test: VtsAidlKeyMintTargetTest
Change-Id: I098711e7ddbcac0fc761801a1bf582a71a8f9baa
2020-12-10 19:12:29 +00:00
Kalesh Singh
545c5bfe47 Memtrack HAL stable aidl sepolicy
Bug: 175021432
Test: Check logcat for denials
Change-Id: I5e1d0e006d86a65552acb78c23b421155881555b
2020-12-08 14:09:09 -05:00
Kevin Chyn
a492bf048d Add SEPolicy for fingerprint2.2 example HAL
Bug: 172957689
Test: atest CtsBiometricsTestCases
Change-Id: I0de92a880e4ca04765da3e3184e5ad0382dc958a
2020-12-03 01:11:30 -08:00
Hayden Gomes
bf08517f2c Adding support for AIDL AudioControl HAL
Bug: 170335834
Test: built and ran without sepolicy issues
Change-Id: Ia25b82aaf676fd2bd37e60bc0d2960f398fa3c90
2020-10-29 10:56:23 -07:00
Benjamin Schwartz
92bb74c851 Rename PowerStats HAL service
Bug: 169864180
Test: m
Merged-In: I79ddf26acf398e80c6ff4a96c26b04aef73feac3
Change-Id: Ic458514285f819f44e50e2bee26a08fc6cf54261
2020-10-07 21:56:53 +00:00
Ilya Matyukhin
d2acfb0f9c Merge "Add sepolicy for IFace" 2020-09-29 20:20:00 +00:00
Treehugger Robot
1ae3b13e39 Merge "Add android.hardware.audio@7.0-service.example service" 2020-09-28 22:58:29 +00:00
Ilya Matyukhin
9bd164241e Add sepolicy for IFace
Bug: 168730443
Test: run on cuttlefish
Change-Id: Ie3cf791e7aac090788c7213d23487ae9f50b0690
2020-09-28 15:57:59 -07:00
Treehugger Robot
0dab4a6be8 Merge "Restrict the policy for IFingerprint to example only" 2020-09-25 19:59:18 +00:00
Ilya Matyukhin
b27180660c Restrict the policy for IFingerprint to example only
Bug: 152416783
Test: run on cuttlefish
Change-Id: I3df58ca37c4d7f183690ab4f6917515f9a3eb5be
2020-09-25 11:00:15 -07:00
Mikhail Naganov
fc56fe6fd0 Add android.hardware.audio@7.0-service.example service
This service will demonstrate a minimal audio HAL V7.0

Bug: 142480271
Test: atest VtsHalAudioV7_0TargetTest
      (HAL and test are not available in AOSP yet)
Change-Id: I2e7f166a47f21eb6c8621d0ddb33cfea84aa20da
2020-09-24 23:35:34 +00:00
Yu-Han Yang
bbd0ecedbb Add GNSS AIDL interfaces (system/sepolicy)
Bug: 159467682
Test: built and run on cuttlefish
Change-Id: I071e8427ea0251139661aa8123376c56e0839390
2020-09-24 12:03:30 -07:00
Aleks Rozman
a1ba5a9f5a Revert "Add GNSS AIDL interfaces (system/sepolicy)"
This reverts commit d5f59b1b77.

Reason for revert: b/169150373

Change-Id: I3d5e20400ea8ee0e9ae439497245c09a13aaa716
2020-09-22 18:25:48 +00:00
Yu-Han Yang
d5f59b1b77 Add GNSS AIDL interfaces (system/sepolicy)
Bug: 159467682
Test: on cuttlefish
Change-Id: Iae7ceefe985096bcf9140e2a3592aade7ad70407
2020-09-17 13:31:29 -07:00
Benjamin Schwartz
dc505c51ea Merge "Create Power Stats AIDL interface" 2020-09-15 16:39:36 +00:00
Benjamin Schwartz
af8b21a6d2 Create Power Stats AIDL interface
Bug: 162472196
Test: m
Merged-In: I948ef2959b25d776d3b01985fea5eb695fd4fc1e
Change-Id: I12dc33ce055c7275559cce33142cfb2aacc5471f
2020-09-10 22:34:49 -07:00
Ilya Matyukhin
c71c2993e9 Add sepolicy for IFingerprint
Bug: 152416783
Test: run on cuttlefish
Change-Id: I58d7c3bc9c81612b03bab3b9da938c091c02e3c1
2020-09-10 16:50:19 -07:00
Amy Zhang
7a9148faa2 Merge "Add Tuner HAL 1.1 service into the default tuner domain" am: ce67a16be1 am: 71968d9d2c
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1364041

Change-Id: Ie998140005353326d5d6b39d27d52aa8385354fc
2020-07-17 19:02:37 +00:00
Amy Zhang
2e148351af Add Tuner HAL 1.1 service into the default tuner domain
Test: cuttlefish, atest VtsHalTvTunerV1_1TargetTest
Bug: b/159058358
Change-Id: I67fbfb29c3097953e6d30d17a8d40d586162088f
2020-07-15 18:25:48 -07:00
Mark Salyzyn
3227821bce modprobe: add -s/--syslog flag am: c86d3886ab am: fb9c0d1e95
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1349035

Change-Id: Idafe34481f5e78b4b618dc9e87cd3066566585bf
2020-06-25 20:39:23 +00:00
Mark Salyzyn
c86d3886ab modprobe: add -s/--syslog flag
There is a desire to ensure that modprobe as a service can log to
kmesg to help triage issues, so add support for the -s or --syslog
flag to do so.

Bug: 159424228
Bug: 151950334
Test: use modprobe as a service to load modules, check logs
Change-Id: I884995f364b0fc604861797eb90d7225a372f864
2020-06-25 11:30:24 -07:00
TreeHugger Robot
d5495ba9e8 Merge "Copying platform seinfo into vendor partition" into rvc-dev am: b1d807bbba
Original change: https://googleplex-android-review.googlesource.com/c/platform/system/sepolicy/+/11708190

Change-Id: I91aa36b0134df73a5b7fe8ed421317e043402032
2020-06-04 15:44:52 +00:00
Bowgo Tsai
3ffd6b3f01 Copying platform seinfo into vendor partition
Some vendor apps are using platform key for signing.
This moves them to untrusted_app domain when the system partition is
switched to a Generic System Image (GSI), because the value of
platform's seinfo in /system/etc/selinux/plat_mac_permissions.xml
has been changed.

Duplicating the device-specific platform seinfo into
/vendor/etc/selinux/vendor_mac_permissions.xml to make it
self-contained within the vendor partition.

Bug: 157141777
Test: boot the device with a GSI, then `adb shell ps -eZ | grep qtidata`
Test: ./build/make/tools/releasetools/sign_target_files_apks \
      --default_key_mappings path/to/keydir \
      -o out/dist/<lunch>-target_files-*.zip \
      signed-tardis-target_files.zip and checks the platform seinfo in
      /vendor/etc/selinux/vendor_mac_permissions.xml is replaced.

Change-Id: Ic9a79780e30f456138e4de67210cc60ac2e490d6
Merged-In: Ic9a79780e30f456138e4de67210cc60ac2e490d6
(cherry picked from commit 8a86424e34)
2020-06-04 17:27:15 +08:00
Bowgo Tsai
8a86424e34 Copying platform seinfo into vendor partition
Some vendor apps are using platform key for signing.
This moves them to untrusted_app domain when the system partition is
switched to a Generic System Image (GSI), because the value of
platform's seinfo in /system/etc/selinux/plat_mac_permissions.xml
has been changed.

Duplicating the device-specific platform seinfo into
/vendor/etc/selinux/vendor_mac_permissions.xml to make it
self-contained within the vendor partition.

Bug: 157141777
Test: boot the device with a GSI, then `adb shell ps -eZ | grep qtidata`
Test: ./build/make/tools/releasetools/sign_target_files_apks \
      --default_key_mappings path/to/keydir \
      -o out/dist/<lunch>-target_files-*.zip \
      signed-tardis-target_files.zip and checks the platform seinfo in
      /vendor/etc/selinux/vendor_mac_permissions.xml is replaced.

Change-Id: Ic9a79780e30f456138e4de67210cc60ac2e490d6
2020-06-03 17:46:07 +08:00
Treehugger Robot
7a4adba63b Merge "Move aac_drc props to aac_drc_prop" am: a00b1ea2db am: b9688d505d
Change-Id: I76ba555e6d1e41e06c68088b59f5bd97a1aa809e
2020-05-12 05:16:46 +00:00
Inseob Kim
bdcbcf0742 Move aac_drc props to aac_drc_prop
Bug: 155844385
Test: sepolicy_tests
Change-Id: I1755672b5cef876955f93020c519aaaabf814bbf
2020-05-12 08:21:42 +09:00
Roshan Pius
d42c7571aa sepolicy: Remove offload HAL sepolicy rules
This is unused currently & there are no concrete plans to use it
in the future.

Bug: 130080335
Test: Device boots up & connects to networks.
Test: Will send for regression tests
Change-Id: I785389bc2c934c8792c8f631362d6aa0298007af
Merged-In: I785389bc2c934c8792c8f631362d6aa0298007af
(cherry picked from commit 56dfc06397)
2020-05-08 11:17:12 +09:00
Steve Muckle
9316da8e12 allow modprobe to read /proc/cmdline
This is needed for libmodprobe to pass module options on the kernel
commandline to kernel modules when they are loaded.

Bug: 155422904
Change-Id: I9df7e211765268815bfb9269365264f5ca468712
Merged-In: I9df7e211765268815bfb9269365264f5ca468712
2020-05-07 11:28:50 -07:00
Steve Muckle
c340f2a313 Merge "allow modprobe to read /proc/cmdline" am: 73c62d3516 am: c9c8d130b9
Change-Id: I3871b35c4de088917c3c1e941f8987ffba88953a
2020-05-06 00:53:12 +00:00
Steve Muckle
e3788c93e5 allow modprobe to read /proc/cmdline
This is needed for libmodprobe to pass module options on the kernel
commandline to kernel modules when they are loaded.

Bug: 155422904
Change-Id: I9df7e211765268815bfb9269365264f5ca468712
2020-05-05 08:50:11 -07:00
Robert Shih
a2e4038266 Merge "Allow drm hals to access allocator hal" am: b60b51d352 am: c5bf73f0d8
Change-Id: I57c6e21e36e4b4374c71204763f5481b99ee514f
2020-04-13 23:25:07 +00:00
Robert Shih
67bbb71550 Allow drm hals to access allocator hal
Bug: 150468341
Test: atest VtsHalDrmV1_3TargetTest
Change-Id: Iea8934567cda343dedf17f75cb0807a68742764d
Merged-In: Iea8934567cda343dedf17f75cb0807a68742764d
2020-04-13 20:01:06 +00:00
Robert Shih
0ade37909c Allow drm hals to access allocator hal
Bug: 150468341
Test: atest VtsHalDrmV1_3TargetTest
Change-Id: Iea8934567cda343dedf17f75cb0807a68742764d
2020-04-13 17:30:18 +00:00
TreeHugger Robot
8ab8009b87 Merge "Add sepolicy to access ion dev from Tuner service" into rvc-dev am: afd27274cd
Change-Id: Iaa4d0ce2b8183f9118ad254243774ff9425a3a6f
2020-03-28 04:16:17 +00:00
TreeHugger Robot
afd27274cd Merge "Add sepolicy to access ion dev from Tuner service" into rvc-dev 2020-03-28 03:55:51 +00:00
Amy Zhang
73f0159390 Add sepolicy to access ion dev from Tuner service
Tuner default implementation is testing with Ion buffer on Cuttlefish
to make sure the secure handle merchanism would work with media data
pass between the Tuner Hal and the Tuner Java.

Ion access would be needed for all the Tuner Hal implementation

Test: atest
Bug: 150952766
Change-Id: I39117f96bdc84ce24afcb3ef528b6d942ded505e
2020-03-27 17:40:41 -07:00
Roman Kiryanov
8a2b099e7a Label android.hardware.lights-service.example as hal_light_default_exec
Bug: 152544844
Test: ls -Z /vendor/bin/hw/android.hardware.lights-service.example
Signed-off-by: Roman Kiryanov <rkir@google.com>
Merged-In: I32a6a443c57986b37fdcca788bfe01bf0cdd3e07
Change-Id: Iabba4e35522b8393c5c4188870225fb1c6bbd835
2020-03-26 19:20:33 -07:00
Roman Kiryanov
8e8d7c5b31 Merge "Label android.hardware.lights-service.example as hal_light_default_exec" am: f7e86d40e1 am: 30ec5f3405
Change-Id: Ieabb2c6c08f60dbd33a2a58c5484c6860900d55e
2020-03-27 01:07:09 +00:00
Roman Kiryanov
f7e86d40e1 Merge "Label android.hardware.lights-service.example as hal_light_default_exec" 2020-03-27 00:39:38 +00:00
Hayden Gomes
b391ffa5a3 Merge "Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts" into rvc-dev 2020-03-26 22:48:08 +00:00
Roman Kiryanov
e0cc8b0f63 Label android.hardware.lights-service.example as hal_light_default_exec
Bug: 152544844
Test: ls -Z /vendor/bin/hw/android.hardware.lights-service.example
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: I32a6a443c57986b37fdcca788bfe01bf0cdd3e07
2020-03-26 14:32:15 -07:00
Hayden Gomes
18af143240 Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts am: a010cef7ad am: 0355e5f4d2
Change-Id: I4d0d4e6762a694c3aee1e85f119ced8605c67d64
2020-03-26 20:38:22 +00:00
Hayden Gomes
c10979afd9 Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts
Bug: 148098383
Test: built and ran with new version
Change-Id: I06f8f2cd73dce73111559664871bdd3c9b814d7c
Merged-In: I06f8f2cd73dce73111559664871bdd3c9b814d7c
(cherry picked from commit a010cef7ad)
2020-03-26 13:17:46 -07:00
Hayden Gomes
a010cef7ad Add android.hardware.automotive.audiocontrol@2.0-service to file_contexts
Bug: 148098383
Test: built and ran with new version
Change-Id: I06f8f2cd73dce73111559664871bdd3c9b814d7c
2020-03-25 15:00:10 -07:00
TreeHugger Robot
28e7fc113b Merge "Add android.hardware.dumpstate@1.1-service.example to file_contexts" into rvc-dev 2020-03-25 19:55:24 +00:00
Roman Kiryanov
0c60039e5d Add android.hardware.dumpstate@1.1-service.example to file_contexts am: fc2956a559 am: 546897f6c6
Change-Id: Ie2ca9f8a82a93ffc3d1110cc9d06b05d9b4a77eb
2020-03-25 17:38:13 +00:00
Roman Kiryanov
546897f6c6 Add android.hardware.dumpstate@1.1-service.example to file_contexts am: fc2956a559
Change-Id: I4c9284855e9d445c352321c3afeff52883f0aac7
2020-03-25 17:16:51 +00:00
Treehugger Robot
d8f270ef6e Merge "Add android.hardware.dumpstate@1.1-service.example to file_contexts" 2020-03-25 16:54:06 +00:00
Ilya Matyukhin
244953b54c Add sepolicy for biometrics.face@1.[0-9]
Bug: 151331855
Bug: 145027036
Test: build and run on cuttlefish
Test: atest vts_treble_vintf_vendor_test
Merged-In: Iae0f157d3a670b506d6cc82686318544db41d559
Change-Id: Ia396005e0f569856e7d9873d48293bb9e05095b6
2020-03-24 11:02:13 -07:00
Roman Kiryanov
eff46106e3 Add android.hardware.dumpstate@1.1-service.example to file_contexts
Bug: 152067221
Test: VtsHalDumpstateV1_1TargetTest
Signed-off-by: Roman Kiryanov <rkir@google.com>
Merged-In: I448e1e4bd94c16f0f8cbd07a7d8390c0201056fa
Change-Id: I93f3d6cae005ade1e6edb69b81d2ea1a96b402d4
2020-03-24 10:26:49 -07:00
Ilya Matyukhin
1dce26cf96 Merge "Add sepolicy for biometrics.face@1.[0-9]" am: 3d8c069e97 am: ca695d5b5d
Change-Id: I3e35dc421204d865d25a30014c33f6eb1446f7eb
2020-03-23 23:51:39 +00:00
Ilya Matyukhin
3d8c069e97 Merge "Add sepolicy for biometrics.face@1.[0-9]" 2020-03-23 23:14:27 +00:00
Roman Kiryanov
fc2956a559 Add android.hardware.dumpstate@1.1-service.example to file_contexts
Bug: 152067221
Test: VtsHalDumpstateV1_1TargetTest
Signed-off-by: Roman Kiryanov <rkir@google.com>
Change-Id: I448e1e4bd94c16f0f8cbd07a7d8390c0201056fa
2020-03-23 16:13:33 -07:00
Ilya Matyukhin
6d7d1b6687 Add sepolicy for biometrics.face@1.[0-9]
Bug: 151331855
Bug: 145027036
Test: build and run on cuttlefish
Change-Id: Iae0f157d3a670b506d6cc82686318544db41d559
2020-03-23 14:04:58 -07:00
Alistair Delva
4e264516ab Merge "Add gnss_device dev_type" am: d5a222d75a am: 8e755ce345
Change-Id: I6e9163b033008c5cd66e5894556ce2389800131f
2020-03-23 19:45:50 +00:00
Alistair Delva
d5a222d75a Merge "Add gnss_device dev_type" 2020-03-23 18:58:59 +00:00
Chris Weir
dcc585fcf0 Merge "Enable CAN HAL to scan /sys/devices for USB CAN" am: c58ad4b82c am: a2ad628f4f
Change-Id: I8d05c044bf753b4b5eb9572b3a13ea5a31de63e2
2020-03-17 21:39:03 +00:00
Chris Weir
c58ad4b82c Merge "Enable CAN HAL to scan /sys/devices for USB CAN" 2020-03-17 20:49:34 +00:00
Alistair Delva
1a3ee382ec Add gnss_device dev_type
This grants default access to the new GNSS subsystem for Linux to the
GNSS HAL default implementation. The GNSS subsystem creates character
devices similar to ttys but without much unneeded complexity. The GNSS
device class is specific to location use cases.

Bug: 151670529
Change-Id: I03b27aa5bbfdf600eb830de1c8748aacb9bf4663
2020-03-17 20:25:51 +00:00
chrisweir
05e9a6545c Enable CAN HAL to scan /sys/devices for USB CAN
CAN HAL needs access to /sys/devices to search for USB serial numbers
for SocketCAN devices and for USB serial devices.

Bug: 142654031
Test: Manual + VTS
Change-Id: I3d9bff94f8d8f936f7d859c01b9ff920fcbc5130
2020-03-17 12:10:07 -07:00
Steven Moreland
bfceeabe3c Allow vndservicemanager to self-register.
This is useful for tools like dumpsys, so that they work on all services
equally as well. Also, so that there is no difference with the regular
service manager.

Bug: 150579832
Test: 'adb shell /vendor/bin/dumpsys -l' shows 'manager'
Test: denial is no longer present:
03-05 12:23:47.346   221   221 E SELinux : avc:  denied  { add } for pid=221 uid=1000 name=manager scontext=u:r:vndservicemanager:s0 tcontext=u:object_r:service_manager_vndservice:s0 tclass=service_manager permissive=0

Change-Id: Id6126e8277462a2c4d5f6022ab67a4bacaa3241e
(cherry picked from commit 52a96cc7dd)
2020-03-06 16:35:52 -08:00
Automerger Merge Worker
c84153170f Merge "Allow vndservicemanager to self-register." am: 48eed15c35 am: cb31f479c5
Change-Id: Ie9a2a33659e8714bc50de909705b477680a38819
2020-03-06 18:16:10 +00:00
Steven Moreland
52a96cc7dd Allow vndservicemanager to self-register.
This is useful for tools like dumpsys, so that they work on all services
equally as well. Also, so that there is no difference with the regular
service manager.

Bug: 150579832
Test: 'adb shell /vendor/bin/dumpsys -l' shows 'manager'
Test: denial is no longer present:
03-05 12:23:47.346   221   221 E SELinux : avc:  denied  { add } for pid=221 uid=1000 name=manager scontext=u:r:vndservicemanager:s0 tcontext=u:object_r:service_manager_vndservice:s0 tclass=service_manager permissive=0

Change-Id: Id6126e8277462a2c4d5f6022ab67a4bacaa3241e
2020-03-05 17:43:35 +00:00
Changyeon Jo
3198f09709 Update automotive display service rules
This change updates sepolicies for automotive display service to make it
available to the vendor processes.

Bug: 149017572
Test: m -j selinux_policy
Change-Id: I48708fe25e260f9302e02749c3777c0ca0d84e4b
Signed-off-by: Changyeon Jo <changyeon@google.com>
(cherry picked from commit 17b38d526d)
2020-02-29 11:01:26 -08:00
Automerger Merge Worker
32f582a23c Merge "Update automotive display service rules" am: d36a0750e4 am: 3e54bef43f
Change-Id: I75af71dba278c7a72902b7dfa236d4632a30aa17
2020-02-25 16:11:43 +00:00
Changyeon Jo
17b38d526d Update automotive display service rules
This change updates sepolicies for automotive display service to make it
available to the vendor processes.

Bug: 149017572
Test: m -j selinux_policy
Change-Id: I48708fe25e260f9302e02749c3777c0ca0d84e4b
Signed-off-by: Changyeon Jo <changyeon@google.com>
2020-02-25 02:02:54 +00:00
Automerger Merge Worker
7934472245 Merge "Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL." am: 1948c11d13 am: 19516eb39f am: 5d5da562ba
Change-Id: Id5d55d29f52b7ed56c16de946c4c0e5fdf054f35
2020-02-19 23:18:16 +00:00
Automerger Merge Worker
efbd524476 Merge "Update file_contexts for contexthub HAL 1.1" am: c5953aba8b am: ab1bf2c331 am: 5beece6e58
Change-Id: Ic709e86c1e9ff2337c710d3e521e3f97a8343d66
2020-02-19 22:20:14 +00:00
David Zeuthen
1948c11d13 Merge "Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL." 2020-02-19 21:14:40 +00:00
David Zeuthen
02bf814aa2 Add SELinux policy for credstore and update for IC HAL port from HIDL to AIDL.
The credstore service is a system service which backs the
android.security.identity.* Framework APIs. It essentially calls into
the Identity Credential HAL while providing persistent storage for
credentials.

Bug: 111446262
Test: atest android.security.identity.cts
Test: VtsHalIdentityTargetTest
Test: android.hardware.identity-support-lib-test
Change-Id: I5cd9a6ae810e764326355c0842e88c490f214c60
2020-02-19 13:46:45 -05:00
Anthony Stange
667b2fa6ec Update file_contexts for contexthub HAL 1.1
Bug: 135951924
Test: Verify this lets contexthub HAL 1.1 run on a device that supports
it

Change-Id: I049e77d476ac0d090e48895a19a454b764aac74c
2020-02-18 23:12:05 +00:00
Automerger Merge Worker
db9794f0ed Merge "rebootescrow: allow use of block file" am: ebbc1b43cc am: d0cb7bf39a am: 9f707e3c15
Change-Id: I93247f43f6b6ecd448d606a8bba2c620b41ba91b
2020-01-28 17:46:23 +00:00
Kenny Root
ebbc1b43cc Merge "rebootescrow: allow use of block file" 2020-01-28 17:10:37 +00:00
Automerger Merge Worker
ad06d1c3ee Merge "Allow reading dt fstab in boot control HAL." am: 23a3355004 am: b4f243d0b9 am: 2ef17e8b8c
Change-Id: I2d900fa38a7980227c4f60e109e0e30658145539
2020-01-28 16:35:43 +00:00
David Anderson
9853c7522d Allow reading dt fstab in boot control HAL.
Fixes the following denial:
  type=1400 audit(0.0:4): avc: denied { read } for comm="android.hardwar" name="compatible" dev="sysfs" ino=28205 scontext=u:r:hal_bootctl_default:s0 tcontext=u:object_r:sysfs_dt_firmware_android:s0 tclass=file permissive=0

This permission is needed for ReadDefaultFstab, which searches the device tree for fstab entries. Devices that use dt-fstab may fail to find the misc block device.

Bug: 143589455
Test: manual test
Change-Id: Ied52fe9b1056d26b4dd00811c4690fa4c505fae8
2020-01-28 01:03:38 +00:00
Kenny Root
960f73b75b rebootescrow: allow use of block file
pmem uses a block file while access_ramoops uses a char file. Allow both for
now until we can unify on pmem.

Additionally allow the reading of vendor properties so it can read the
path to the character or block device to open.

Test: atest VtsHalRebootEscrowTargetTest
Bug: 146400078
Change-Id: Ief61534e0946480a01c635ce1672579959ec8db5
2020-01-27 12:28:44 -08:00
Automerger Merge Worker
e987034615 Merge "Add sepolicy for biometrics.face@1.1" am: 915ad1ecbf am: 29b9d7d68e am: 82045b4624
Change-Id: Id04a58be24ba92ea06d4e71d2ff26c05a769f10b
2020-01-23 12:25:34 +00:00
Ilya Matyukhin
536796c6dd Add sepolicy for biometrics.face@1.1
Bug: 145027036
Test: build and run on cuttlefish
Change-Id: Ic3cc7755e65ba3537cbe817e0835ac34c04d6561
2020-01-22 17:17:12 -08:00
Automerger Merge Worker
ac2dd1ad0d Merge "stable aidl Power HAL policy" am: fbe4afa7aa am: 4cb024e790 am: 03a1842686
Change-Id: I83dd34152278d0b38ee50525950e06f7d77925d7
2020-01-16 23:09:09 +00:00
Wei Wang
fbe4afa7aa Merge "stable aidl Power HAL policy" 2020-01-16 22:35:42 +00:00
Automerger Merge Worker
da1f8e6709 Merge "Fix spelling of 'system' for android.hardware.identity@1.0-service.example" am: 89277a412d am: 91c15d1bc2 am: 550e7f28dd
Change-Id: I045e0fa2164a04541093637a72940ce3ec8e5982
2020-01-16 19:15:18 +00:00
Treehugger Robot
89277a412d Merge "Fix spelling of 'system' for android.hardware.identity@1.0-service.example" 2020-01-16 18:43:34 +00:00
Automerger Merge Worker
6acd552f07 Merge "Add sepolicy for usb gadget hal v1.1" am: a1f829d3f8 am: 5b62692346 am: f8cafa6bec
Change-Id: Ie61864b459214892fa15bfe1a65651ce95fc071e
2020-01-16 11:29:01 +00:00
Treehugger Robot
a1f829d3f8 Merge "Add sepolicy for usb gadget hal v1.1" 2020-01-16 11:01:35 +00:00
Automerger Merge Worker
ea13ded3a3 Merge "Add rebootescrow default HAL rules" am: 1145b90b69 am: 4e4bb65056 am: f2bb2e241b
Change-Id: I86c5354a5203982cedff4a4884520839df35c52d
2020-01-16 01:32:34 +00:00
Wei Wang
32b24c0f0b stable aidl Power HAL policy
Test: boot and dumpsys -l
Change-Id: I58022c9e0c24ba4e2d695acf63375c9f74c51b22
2020-01-15 16:53:40 -08:00
Treehugger Robot
1145b90b69 Merge "Add rebootescrow default HAL rules" 2020-01-16 00:24:59 +00:00
David Zeuthen
05ade22c65 Fix spelling of 'system' for android.hardware.identity@1.0-service.example
Bug: 111446262
Test: Manually
Change-Id: I37764f0ed580b4242e02c1958eabed88957adfd1
2020-01-15 19:05:24 -05:00
Automerger Merge Worker
5a24828f3e Merge "Add SELinux policy for Identity Credential HAL" am: a5527b4e46 am: 8924b794a7 am: 700b98a507
Change-Id: If6578fc781106395bd8e47b13aba4994d41ba986
2020-01-15 23:43:10 +00:00
Kenny Root
70c40e05f3 Add rebootescrow default HAL rules
Bug: 63928581
Test: build and check HAL label
Change-Id: I057b26eb20c5a6b022c7f391a6c8535f2953051c
2020-01-15 13:14:35 -08:00
Howard Yen
a98cdefad6 Add sepolicy for usb gadget hal v1.1
Bug: 147645728
Test: build pass and service running correctly
Change-Id: I52b6bcae2c05998e3f22c39998597e2ecef55036
2020-01-15 16:44:39 +08:00
David Zeuthen
b8b5da4305 Add SELinux policy for Identity Credential HAL
Bug: 111446262
Test: VtsHalIdentityCredentialTargetTest
Change-Id: Icb5a0d8b24d463a2f1533f8dd3bfa84bf90acc6f
2020-01-14 20:13:39 -05:00
Automerger Merge Worker
a36a52b562 Add device file for Resume on Reboot am: 2073d5b685 am: 58b31517b1 am: c7d5d9fcd7
Change-Id: I04a00fd23f019dd32c5dcad4daa986b3028db2e7
2019-12-19 02:46:50 +00:00
Kenny Root
2073d5b685 Add device file for Resume on Reboot
This adds the type and permissions for the default implementation to talk to
its kernel module.

Bug: 63928581
Test: boot Pixel 4 with default implementation

Change-Id: Ie847e4db975b95e90ea64937401e8d8a8ed812cb
2019-12-18 10:39:21 -08:00
Automerger Merge Worker
cbd87608df Merge "Modify SEPolicy to support SLCAN" am: 6ad4f3207a am: f1daf7567d am: 9beeb34e7b
Change-Id: I4101a255a284fcc1c04cf1833c30a23fcbdd4576
2019-12-11 22:08:06 +00:00
Chris Weir
6ad4f3207a Merge "Modify SEPolicy to support SLCAN" 2019-12-11 21:25:14 +00:00
Kenny Root
64de2059d3 Merge "Support Resume on Reboot" am: 6a9f7b265a am: 25e571fa5d
am: c11be97479

Change-Id: If3f7b5f69dc0cfba89e37d3bb22db84f5bde8e44
2019-12-10 05:11:13 -08:00
Kenny Root
6a9f7b265a Merge "Support Resume on Reboot" 2019-12-10 12:59:35 +00:00
Kenny Root
76ea325a3d Support Resume on Reboot
When an OTA is downloaded, the RecoverySystem can be triggered to store
the user's lock screen knowledge factor in a secure way using the
IRebootEscrow HAL. This will allow the credential encrypted (CE)
storage, keymaster credentials, and possibly others to be unlocked when
the device reboots after an OTA.

Bug: 63928581
Test: make
Test: boot emulator with default implementation
Test: boot Pixel 4 with default implementation
Change-Id: I1f02e7a502478715fd642049da01eb0c01d112f6
2019-12-09 14:25:04 -08:00
chrisweir
cd40aa0ab7 Modify SEPolicy to support SLCAN
SLCAN setup requires certain ioctls and read/write operations to
certain tty's. This change allows the HAL to set up SLCAN devices while
complying with SEPolicy.

In addition to adding support for SLCAN, I've also included permissions
for using setsockopt. In order for the CAN HAL receive error frames from
the CAN bus controller, we need to first set the error mask and filter
via setsockopt.

Test: manual
Bug: 144458917
Bug: 144513919
Change-Id: I63a48ad6677a22f05d50d665a81868011c027898
2019-12-04 14:06:09 -08:00
Stan Rokita
00231e4415 Merge "Add sensors multihal support in file_contexts regex" am: d494872641 am: 193dfaeca0
am: 50bd8a131b

Change-Id: Iae1cbd872e6ef7c6f3c8106ec4190f43ef761671
2019-12-02 13:45:37 -08:00
Stan Rokita
d494872641 Merge "Add sensors multihal support in file_contexts regex" 2019-12-02 20:54:57 +00:00
Harpreet \"Eli\" Sangha
ff8c5d6468 Merge "Fix File Context Entry for Bluetooth Services." am: d6a91453d8 am: ae8ad79141
am: bca6554594

Change-Id: I1756a10d49425e3611b9ab6dfe2e66d56012eabf
2019-11-26 20:11:34 -08:00
Harpreet \"Eli\" Sangha
078689ae03 Fix File Context Entry for Bluetooth Services.
Test: Boot on HiKey960 and check dmesg errors.
Change-Id: I9ac0968753c7cd9a23c63eac98b20a7778277716
Signed-off-by: Harpreet \"Eli\" Sangha <eliptus@google.com>
2019-11-27 10:11:12 +09:00
Tomasz Wasilczyk
82f3cba4e1 Merge "Vehicle HAL: allow communication with CAN bus HAL and alternative service naming" am: eeb6279953 am: fadede5a4d
am: 22e795881c

Change-Id: I8f65ad29253d701225722273e7fbad4da43ab31a
2019-11-22 13:47:59 -08:00
Tomasz Wasilczyk
eeb6279953 Merge "Vehicle HAL: allow communication with CAN bus HAL and alternative service naming" 2019-11-22 20:27:23 +00:00
Shawn Willden
129bdb4ddd Merge "Add Keymaster 4.1" am: 88554af5c0 am: e44ba58615
am: 138c5d4374

Change-Id: Ib574ba4f4cdf3ffe3db425b60818056cb759b57f
2019-11-21 15:01:37 -08:00
Stan Rokita
16d522871d Add sensors multihal support in file_contexts regex
Bug: 144722764
Test: N/A
Change-Id: Ic595d9c21639bdf2874dc6734344ff1a41767399
2019-11-21 08:57:58 -08:00
Shawn Willden
10f0b53ef7 Add Keymaster 4.1
Bug: 140193672
Bug: 140192237
Bug: 140824829
Test: Manual boot test
Change-Id: Iccc8cc5e8fc7c9301478faa50d0e18fa917283fb
2019-11-20 12:14:36 -07:00
Steven Moreland
231958e28d Merge "stable aidl vibrator policy" am: a71c74c188 am: 416aa29a30
am: 685d10c87f

Change-Id: Icbdf813b1317d3cbdec4547f2d832432763bb222
2019-11-01 14:54:22 -07:00
Tomasz Wasilczyk
3846fc25f6 Vehicle HAL: allow communication with CAN bus HAL and alternative service naming
Bug: 143779011
Test: implemented a VHAL service prototype that communicates with VHAL
Change-Id: I8f449510fc638e29a5cb23c0e32f3d87386ba9bc
2019-11-01 14:21:03 -07:00
Steven Moreland
d87649c645 stable aidl vibrator policy
Bug: 141828236
Test: boot, dumpsys -l
Change-Id: Id3fc8724238883116e840794309efbf6c91226c9
2019-10-29 16:39:55 -07:00
Yifan Hong
318582f265 Merge "Add health 2.1 HAL" am: ba48222bc7 am: 5daea7332d am: 55ed721302
am: 51bc766658

Change-Id: I8b4882a9ae8f64db9108b8ce98dd9b9eb6ec1790
2019-10-23 18:51:33 -07:00
Yifan Hong
ba48222bc7 Merge "Add health 2.1 HAL" 2019-10-24 01:03:09 +00:00
Yifan Hong
fbce5cce11 Add health 2.1 HAL
Test: VTS health 2.1 HAL test
Bug: 137670450
Change-Id: Iedc6972154c6e948eaf22b4650da39a9e73cb6f8
2019-10-17 16:35:43 -07:00
Henry Fang
414674f103 Merge "Update sepolicy to support cas@1.2" am: b3f755fbb4 am: 04abc97c6a am: 98346620f5
am: 571640f96d

Change-Id: I21e4c07603b7a346a198df422e4c4d1f3b6ec130
2019-10-15 22:06:24 -07:00
Henry Fang
b418dd991a Update sepolicy to support cas@1.2
Test: Manual
bug: 141783130
Change-Id: I973cb5d59d74c495eea18f4865baf0bd6f55e2fb
2019-10-14 17:37:17 -07:00
David Anderson
b12a53a7f5 Merge "Add sepolicy for IBootControl 1.1 and the default HAL." am: 0fb0781fb6 am: 25e83f480c am: f5c42c2738
am: 166982566c

Change-Id: Ief5166c30eb59baa08c2412b503b3d144a7c1709
2019-10-10 21:48:25 -07:00
David Anderson
0fb0781fb6 Merge "Add sepolicy for IBootControl 1.1 and the default HAL." 2019-10-10 19:19:49 +00:00
David Anderson
549e3c6d91 Add sepolicy for IBootControl 1.1 and the default HAL.
Bug: 138861550
Test: manual test
Change-Id: Ibc9a55266a2726cb8dc8550be0264db30b66109e
2019-10-08 14:24:38 -07:00
Bill Peckham
05fd2e52b9 Merge "Moving recovery resources from /system to /vendor" am: 0109fb24fc am: 62b54c4f8e am: dcdb3ebbf0
am: 8ee0b85f2a

Change-Id: I2db7b19266d4c75367b8399e07cd4d9c33549fa3
2019-10-04 20:45:05 -07:00
Bill Peckham
d0dc1a057d Moving recovery resources from /system to /vendor
This change is part of a topic that moves the recovery resources from the
system partition to the vendor partition, if it exists, or the vendor directory
on the system partition otherwise. The recovery resources are moving from the
system image to the vendor partition so that a single system image may be used
with either an A/B or a non-A/B vendor image. The topic removes a delta in the
system image that prevented such reuse in the past.

The recovery resources that are moving are involved with updating the recovery
partition after an update. In a non-A/B configuration, the system boots from
the recovery partition, updates the other partitions (system, vendor, etc.)
Then, the next time the system boots normally, a script updates the recovery
partition (if necessary). This script, the executables it invokes, and the data
files that it uses were previously on the system partition. The resources that
are moving include the following.

* install-recovery.sh
* applypatch
* recovery-resource.dat (if present)
* recovery-from-boot.p (if present)

This change includes the sepolicy changes to move the recovery resources from
system to vendor. The big change is renaming install_recovery*.te to
vendor_install_recovery*.te to emphasize the move to vendor. Other changes
follow from that. The net result is that the application of the recovery patch
has the same permissions that it had when it lived in system.

Bug: 68319577
Test: Ensure that recovery partition is updated correctly.
Change-Id: If29cb22b2a7a5ce1b25d45ef8635e6cb81103327
2019-10-04 14:40:27 -07:00
Steven Moreland
9b11665bf3 Deprecate libhwbinder/libhidltransport from VNDK. am: 9104421b1d
am: cc27e5f200

Change-Id: I10a2a94d895bdd76b7e7e957bd173f27eba25c71
2019-10-01 09:27:19 -07:00
Steven Moreland
9104421b1d Deprecate libhwbinder/libhidltransport from VNDK.
Since these libraries were vndk-sp, previously, passthrough HALs were
able to load them. However, now that they have been removed from the
vndk-sp set (these libraries are empty), marking them as
same_process_hal_file so that vendor passthrough implementations that
still link against these empty libraries can still use them.

Bug: 135686713
Test: boot device using these libraries from an sphal (otherwise,
    bootloops)
Change-Id: Ic5170eb0fcbb87c82bbea840dcfcb17899eaa899
(cherry picked from commit 71a596a49b443e5ae3518301ffdf9e6b95d4d94d)
2019-10-01 01:39:51 +00:00
Steven Moreland
b081eee00e Deprecate libhwbinder/libhidltransport from VNDK.
Since these libraries were vndk-sp, previously, passthrough HALs were
able to load them. However, now that they have been removed from the
vndk-sp set (these libraries are empty), marking them as
same_process_hal_file so that vendor passthrough implementations that
still link against these empty libraries can still use them.

Bug: 135686713
Test: boot device using these libraries from an sphal (otherwise,
    bootloops)
Change-Id: Ic5170eb0fcbb87c82bbea840dcfcb17899eaa899
2019-09-26 15:49:50 -07:00
Tri Vo
b23ec2efab Merge "sepolicy: ashmem entry point for libcutils" am: e612ecd6ed am: e570bf7ea4 am: 76333c6b08
am: 498c8fb53f

Change-Id: Ib3eb8d7f37bb94ec6363e6a77e2bdf04663300b0
2019-09-26 12:08:42 -07:00
Tri Vo
a7f61021b7 sepolicy: ashmem entry point for libcutils
This duplicated ashmem device is intended to replace ashmemd.

Ashmem fd has a label of the domain that opens it. Now with ashmemd
removed, ashmem fds can have labels other than "ashmemd", e.g.
"system_server". We add missing permissions to make ashmem fds usable.

Bug: 139855428
Test: boot device
Change-Id: Iec8352567f1e4f171f76db1272935eee59156954
2019-09-25 11:26:18 -07:00
Steven Moreland
9106bf90f8 Merge "Rename dumpstate service to include '.example'." am: 2d572464af am: 82d825df79 am: 44a58b7112 am: cfda39e3b0
am: b3d1b4ed9a

Change-Id: Ibc02cd22d73329eb5cec05b17976dd4051e2c0f6
2019-08-27 18:52:34 -07:00
Steven Moreland
82d825df79 Merge "Rename dumpstate service to include '.example'."
am: 2d572464af

Change-Id: I81ce7c04472893d7e77aa974969b484b93c7beaa
2019-08-27 16:26:23 -07:00
Steven Moreland
10d260950d Rename dumpstate service to include '.example'.
Since this was an example service providing no real functionality and
accidentally got installed on a device.

Bug: 140115084
Test: install on test device and see that it runs
Change-Id: I553da8e1f4da7d6a9f0c3e7d4a3561f0b22321dc
2019-08-27 11:07:51 -07:00
Jon Spivack
2a97c025e3 Merge "Allow vndservicemanager to start processes" am: 018f745b90 am: 685af5eaab am: fdc17e034e am: 0e4d8301aa
am: ad016e8060

Change-Id: Id236bbca47876be8370e25108ae47afd26098e00
2019-08-26 12:43:19 -07:00
Marissa Wall
16ff192d62 Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy" am: 1751aa5b80 am: 6782faba9f am: dd52020c88 am: 86b7d95c79
am: dfc86e4036

Change-Id: I351fc8efa4254e366e4f8c1e953e0941d0a19713
2019-08-26 12:41:36 -07:00
Jon Spivack
685af5eaab Merge "Allow vndservicemanager to start processes"
am: 018f745b90

Change-Id: I42f16342f807cabebc1e258a353b1cea5b13472e
2019-08-22 18:50:11 -07:00
Jon Spivack
018f745b90 Merge "Allow vndservicemanager to start processes" 2019-08-23 01:29:06 +00:00
Marissa Wall
6782faba9f Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy"
am: 1751aa5b80

Change-Id: I072a3950a3f57ab0a78e95ee2c73c6d71245d373
2019-08-22 10:48:50 -07:00
Treehugger Robot
1751aa5b80 Merge "gralloc: add IAllocator/IMapper 4.0 sepolicy" 2019-08-22 17:20:45 +00:00
Steven Moreland
52afb27ec7 Merge changes Icdf207c5,I20aa48ef am: 30a06d278f am: 169bfcfe88 am: 99f2860521 am: 4a474dc430
am: bc0374bdc4

Change-Id: Ib48f8593db8744cddb9bb6b877947c5ca13bc5f4
2019-08-20 14:26:29 -07:00
Steven Moreland
169bfcfe88 Merge changes Icdf207c5,I20aa48ef
am: 30a06d278f

Change-Id: Ia505b1539cfd64bb93c2f5fe0dbd0603df5e9f5f
2019-08-20 13:41:45 -07:00
Steven Moreland
641c45e258 mediacodec: remove non-Treble allows
Since mediacodec system services have been entirely deleted.

Bug: 80317992
Test: TH
Change-Id: I20aa48ef57474df000279a487f6b077790d273c1
2019-08-20 00:03:24 +00:00
Jon Spivack
b58c4c2a62 Allow vndservicemanager to start processes
Used to lazily start AIDL services.

Bug: 138756857
Test: Manual
Change-Id: I890ca70e654f8e8bb795189abb4018c0d5d05865
2019-08-19 16:05:13 -07:00
Amy Zhang
c23667f999 Merge "Tuner Hal 1.0 Enable ITuner service" am: 3e7429359f am: 3b62596f4f am: 11739f3126 am: a588ba4e3e
am: 5bd0803562

Change-Id: I7dfa4df490f1365edcecaf69e2971378177d56ef
2019-08-15 16:07:07 -07:00
Amy Zhang
3b62596f4f Merge "Tuner Hal 1.0 Enable ITuner service"
am: 3e7429359f

Change-Id: Ic4442460d60d51e97c84ea430830cd12c205e5f6
2019-08-15 13:23:33 -07:00
Amy
89b4bbd4d8 Tuner Hal 1.0 Enable ITuner service
Test: cuttlefish
Bug: 135708935
Change-Id: Ica063458860df45f0e2ab640a2ab35cd4da3da8e
2019-08-14 11:22:09 -07:00
Tomasz Wasilczyk
9794dd74a3 SEPolicy rules for CAN bus HAL am: 602b30302a am: 0540154021 am: 2f0ee4345f am: ce9863e755
am: b94bb81337

Change-Id: Id35783f576554cfce08126bc1ee0216af7fc70bd
2019-08-01 20:21:08 -07:00
Tomasz Wasilczyk
0540154021 SEPolicy rules for CAN bus HAL
am: 602b30302a

Change-Id: I5ae916b8f4c3d6038c48a522df1efc2ce8fc3d39
2019-08-01 19:34:47 -07:00
Tomasz Wasilczyk
602b30302a SEPolicy rules for CAN bus HAL
Bug: 135918744
Test: VTS (separate new change)
Change-Id: Idd3ca882e3bd36b95a5412bdfbf6fe9d6e911ba9
2019-08-01 10:24:00 -07:00
Changyeon Jo
154451ff7a Update sepolicy for EVS v1.x am: 5ee628f0ce am: c90bc366e6 am: d8072b0fef am: ee1ad87354
am: 51b22f6155

Change-Id: I7466c5a9c359a83e4d38027a3d29c6d9cf3a5f13
2019-07-30 20:40:48 -07:00
Changyeon Jo
c90bc366e6 Update sepolicy for EVS v1.x
am: 5ee628f0ce

Change-Id: I3aa2c140f2ab37a604ab70221926d15c25822bef
2019-07-30 19:57:29 -07:00
Changyeon Jo
5ee628f0ce Update sepolicy for EVS v1.x
Modify vendor file context and hal_evs_server policy to enable EVS v1.1
service.

Change-Id: I1e717b3209200300005c3fa7f91423589505a41c
Signed-off-by: Changyeon Jo <changyeon@google.com>
2019-07-30 13:22:03 -07:00
Kevin Rocard
647c58e50c Merge "Rename audio hal service" am: e4466e8ec7 am: 09a2074c71 am: f027d2f140
am: db63da9e39

Change-Id: Ie8a1afe479fc663e14b2907248c7a2d25515cee2
2019-07-09 11:39:39 -07:00
Kevin Rocard
09a2074c71 Merge "Rename audio hal service"
am: e4466e8ec7

Change-Id: Ib8824bda3c2fd3bd350290bf40171898d408fa60
2019-07-09 11:06:25 -07:00
Kevin Rocard
8fcd26e448 Rename audio hal service
The audio HAL service name previously contained the audio HAL version
of the first audio HAL it supported.
Nevertheless, the same service can and do host all audio HAL versions.

Aka there is only one audio HAL service, and the version in its name is
technical dept and should not be changed.

This caused many confusions during vendor HAL upgrade as the
service version number was erroneously updated leading to
device boot loop.

The new service name is:
android.hardware.audio.service
The old one was:
android.hardware.audio@2.0-service

Keeping both names valid as most phones will not rename
the service immediately.

Bug: 78516186
Test: boot & check the audio HAL is up with the old and new name
Change-Id: I2ce0182fd919af6eb8325d49682b4374be00344e
Signed-off-by: Kevin Rocard <krocard@google.com>
2019-07-08 22:25:18 +00:00
Marissa Wall
3474653bd0 gralloc: add IAllocator/IMapper 4.0 sepolicy
Add support for gralloc 4.0 to sepolicy

Bug: 136016160
Test: Compiles and boots

Change-Id: I148cc19176275e8cbd19cc95aa95d4d450353b7a
2019-06-25 12:17:36 -07:00
Matthias Kramm
2a7f5db521 Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" am: f4362c08c7 am: 199db0ceb1 am: 1710bbd6fe
am: c69c613942

Change-Id: I396e68b0ca30ba884c43acf685d7100849e635ee
2019-06-19 21:37:37 -07:00
Matthias Kramm
1710bbd6fe Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" am: f4362c08c7
am: 199db0ceb1

Change-Id: Icce34a06c681b8d3717061c31d142622acbfd979
2019-06-19 18:36:04 -07:00
Treehugger Robot
f4362c08c7 Merge "Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."" 2019-06-19 23:44:27 +00:00
Matthias Kramm
ebcc08249b Revert "Allow hal_face to write to /data/vendor/camera_calibration/*."
This reverts commit 3a44b17897.

Reason for revert: Moved to downstream repo.

Change-Id: I7d3ad43335f71ed03e7a93bc5c96a8933785afd8
2019-06-19 20:15:50 +00:00
Matthias Kramm
469932dec9 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." am: 9faeec71f2 am: c58cd73209 am: cf010dcb85
am: 44bb087de2

Change-Id: I44ab3f9695e778ddc45d7c098b99d1c974e7312d
2019-06-17 14:41:22 -07:00
Matthias Kramm
cf010dcb85 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." am: 9faeec71f2
am: c58cd73209

Change-Id: I102966877e40ec5c56033feb510e519c033aa407
2019-06-17 12:48:25 -07:00
Matthias Kramm
9faeec71f2 Merge "Allow hal_face to write to /data/vendor/camera_calibration/*." 2019-06-17 19:31:50 +00:00
Valerie Hau
bffbdf0d08 Add IMapper2.1 same process hal permissions am: d3499df3cf am: 178ef8ccad am: 5162b0c3d0
am: ec0fc9a7d9

Change-Id: Ic91709f5b9564b409c7a0a4b28a853ad527442b5
2019-06-17 11:57:06 -07:00
Valerie Hau
5162b0c3d0 Add IMapper2.1 same process hal permissions am: d3499df3cf
am: 178ef8ccad

Change-Id: Ifaef339d29e8f0547cc5c3eb4992b14f1c7a81f3
2019-06-17 11:42:02 -07:00
Valerie Hau
d3499df3cf Add IMapper2.1 same process hal permissions
Bug: 135166668
Test: build, boot, VtsHalGraphicsComposerV2_2TargetTest
Change-Id: Iedc11b73d3e3ba54dcd622b128cb513adec11d69
2019-06-14 12:31:17 -07:00
Matthias Kramm
3a44b17897 Allow hal_face to write to /data/vendor/camera_calibration/*.
Also, allow hal_camera to read from there.

Bug: 133792720
Change-Id: Iedec8d7325b4424d166f8e4d09182e1f29808ef2
Test: Running presubmit.
2019-06-14 05:53:59 -07:00
Joel Galenson
08a0379943 Merge "Give hal_drm_server appdomain fd access." am: 7d258073df am: 2c465fa2bb am: d181604ce1
am: 926731d20d

Change-Id: I278eed76e64ef768491982f901f8065a3da81b64
2019-06-10 11:53:12 -07:00
Joel Galenson
d181604ce1 Merge "Give hal_drm_server appdomain fd access." am: 7d258073df
am: 2c465fa2bb

Change-Id: I89eff6ce6cb82ad2a65c79a3c4e934b9a6ea81b6
2019-06-10 11:43:41 -07:00
Joel Galenson
0608ab5f9d Give hal_drm_server appdomain fd access.
Test: Build.
Change-Id: I29f68964f4ae2ad2c3a00c96f57f48448d8b6dfb
2019-06-05 10:12:28 -07:00
Pawin Vongmasa
7b41487d1f Merge "Properly define hal_codec2 and related policies" into qt-dev am: cf48bfd082 am: 789db9aeca
am: aacbaf7685

Change-Id: I43943a50bc022d4c7e17e0764dbb51b4f624b7e7
2019-05-24 18:33:42 -07:00
TreeHugger Robot
cf48bfd082 Merge "Properly define hal_codec2 and related policies" into qt-dev 2019-05-24 07:21:23 +00:00
Pawin Vongmasa
609c243dd0 Properly define hal_codec2 and related policies
Test: make cts -j123 && cts-tradefed run cts-dev -m \
CtsMediaTestCases --compatibility:module-arg \
CtsMediaTestCases:include-annotation:\
android.platform.test.annotations.RequiresDevice

Bug: 131677974
Change-Id: I59c3d225499a8c53c2ed9f3bd677ff3d7423990b
2019-05-23 03:53:47 -07:00
Tao Bao
a5243f01a9 Merge "Add vendor_misc_writer." am: ccf8af80b0 am: 986d2b296a am: 848861d8a3
am: c576c2c835

Change-Id: I71e4f4544616bf9be3d80b1c4f964bd0b9cb4dad
2019-05-21 07:53:20 -07:00
Tao Bao
8f39cce73a Add vendor_misc_writer.
The space between 2K and 16K in /misc is currently reserved for vendor's
use (as claimed in bootloader_message.h), but we don't allow vendor
module to access misc_block_device other than vendor_init.

The change in the topic adds a `misc_writer` tool as a vendor module,
which allows writing data to the vendor space to bridge the gap in the
short term. This CL adds matching labels to grant access.

Long term goal is to move /misc as vendor owned, then to provide HAL
access from core domain (b/132906936).

Bug: 132906936
Test: Build crosshatch that includes misc_writer module. Invoke
      /vendor/bin/misc_writer to write data to /misc.
Change-Id: I4c18d78171a839ae5497b3a61800193ef9e51b3b
Merged-In: I4c18d78171a839ae5497b3a61800193ef9e51b3b
(cherry picked from commit 42c05cfcc1)
2019-05-21 07:06:31 -07:00
Tao Bao
848861d8a3 Merge "Add vendor_misc_writer." am: ccf8af80b0
am: 986d2b296a

Change-Id: I89d5eb83fc0caacf8a883321c14d5c26925fe6da
2019-05-21 06:56:51 -07:00
Tao Bao
42c05cfcc1 Add vendor_misc_writer.
The space between 2K and 16K in /misc is currently reserved for vendor's
use (as claimed in bootloader_message.h), but we don't allow vendor
module to access misc_block_device other than vendor_init.

The change in the topic adds a `misc_writer` tool as a vendor module,
which allows writing data to the vendor space to bridge the gap in the
short term. This CL adds matching labels to grant access.

Long term goal is to move /misc as vendor owned, then to provide HAL
access from core domain (b/132906936).

Bug: 132906936
Test: Build crosshatch that includes misc_writer module. Invoke
      /vendor/bin/misc_writer to write data to /misc.
Change-Id: I4c18d78171a839ae5497b3a61800193ef9e51b3b
2019-05-20 14:40:15 -07:00
Roshan Pius
56dfc06397 sepolicy: Remove offload HAL sepolicy rules
This is unused currently & there are no concrete plans to use it
in the future.

Bug: 130080335
Test: Device boots up & connects to networks.
Test: Will send for regression tests
Change-Id: I785389bc2c934c8792c8f631362d6aa0298007af
2019-05-01 12:48:45 -07:00
Jack Yu
58329f6536 Add sepolicy for nfc hal v1.2
Bug: 130509605
Test: No avc denial log and NFC works with hal v1.2
Change-Id: If54884f76a32705d11f2085f66fe83b9e0354f79
Merged-In: If54884f76a32705d11f2085f66fe83b9e0354f79
(cherry picked from commit a5dde796b5)
2019-04-24 09:58:44 +08:00
Jack Yu
181b6376d0 Merge "Add sepolicy for nfc hal v1.2" am: fd2d7b3f5c
am: c4b5e0a3a8

Change-Id: Id4c20b3c5fd3538359ce9d2756e19ae993b0c855
2019-04-22 23:56:05 -07:00
Jack Yu
a5dde796b5 Add sepolicy for nfc hal v1.2
Bug: 130509605
Test: No avc denial log and NFC works with hal v1.2
Change-Id: If54884f76a32705d11f2085f66fe83b9e0354f79
2019-04-22 12:08:20 +00:00