Salmax Chang
854e4dfd60
Merge "dumpstate/incident: Fix avc errors" into sc-dev
2021-04-19 10:00:10 +00:00
SalmaxChang
1b17b0fbaa
dumpstate/incident: Fix avc errors
...
avc: denied { append } for path="/storage/emulated/0/Android/data/com.android.pixellogger/files/bugreport-oriole-MASTER-2021-04-19-14-57-22.zip" dev="dm-7" ino=35424 scontext=u:r:dumpstate:s0 tcontext=u:object_r:media_rw_data_file:s0:c28,c257,c512,c768 tclass=file
avc: denied { use } for path="/storage/emulated/0/Android/data/com.android.pixellogger/files/bugreport-oriole-MASTER-2021-04-19-14-57-22.zip" dev="dm-7" ino=35424 scontext=u:r:incident:s0 tcontext=u:r:logger_app:s0:c28,c257,c512,c768 tclass=fd
avc: denied { append } for path="/storage/emulated/0/Android/data/com.android.pixellogger/files/bugreport-oriole-MASTER-2021-04-19-16-30-05.zip" dev="dm-7" ino=12639 scontext=u:r:incident:s0 tcontext=u:object_r:media_rw_data_file:s0:c30,c257,c512,c768 tclass=file
Bug: 178744858
Change-Id: I07eb1f4abf6cb9b399c773854ca6f47fcd5e2f37
2021-04-19 08:34:57 +00:00
Hongbo Zeng
8b9e2b3834
allow RilConfigService to call oemrilhook api
...
04-15 21:19:42.312 373 373 E SELinux : avc: denied { find } for pid=10245 uid=1001 name=telephony.oem.oemrilhook scontext=u:r:ril_config_service_app:s0 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=0
Bug: 185747692
Test: after apply the rule, the denial log is gone
Change-Id: I447c9c695f48ee3b528190ff33261ca3e9cd69df
2021-04-19 16:26:59 +08:00
TreeHugger Robot
c049172863
Merge "Add sepolicy rules when PowerAnomalyDataDetection service enabled" into sc-dev am: 8c30e63758
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14207376
Change-Id: I623850de79cd6d44921f5ea79c8ab8d3ea56016f
2021-04-19 06:20:23 +00:00
TreeHugger Robot
8a2e0ac237
Merge "remove obsolete domains" into sc-dev am: 07121f1245
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14230396
Change-Id: I1b821e90e2dfe6ad07440a14d15d41d4291d6143
2021-04-19 06:20:01 +00:00
TreeHugger Robot
8c30e63758
Merge "Add sepolicy rules when PowerAnomalyDataDetection service enabled" into sc-dev
2021-04-19 06:03:11 +00:00
TreeHugger Robot
07121f1245
Merge "remove obsolete domains" into sc-dev
2021-04-19 05:56:38 +00:00
Rios Kao
546bc74b3e
Merge "Allow ssr_detector to read aoc version property" into sc-dev am: 1b25799252
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14185472
Change-Id: I670b3c3cae62c0b7f0cd5acf26ab4c769f0905e5
2021-04-19 04:35:23 +00:00
Rios Kao
1b25799252
Merge "Allow ssr_detector to read aoc version property" into sc-dev
2021-04-19 04:19:34 +00:00
Adam Shih
487b7ef4ef
update error on ROM 7293525 am: 59a1c3f04a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14230390
Change-Id: I4df5074d99314748940179af7678e61c5e03a33c
2021-04-19 03:45:17 +00:00
Adam Shih
99988c4c5f
remove obsolete domains
...
Bug: 168013500
Test: Check that abox and rpmbd are not in ROM anywhere in oriole, raven user,
userdebug and factory ROM
Change-Id: Ie091a1036ba6c25a3c7f0ef0b8f69cc9fc4e306a
2021-04-19 11:14:54 +08:00
Adam Shih
59a1c3f04a
update error on ROM 7293525
...
Bug: 185723618
Bug: 185723492
Bug: 185723694
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: I5cc12384aca5dcc2658b914e5c7783f2e1e70b5d
2021-04-19 09:52:55 +08:00
TreeHugger Robot
3e60566e85
Merge "sepolicy: fix fingerprint sepolicy" into sc-dev am: 96ed3bb51c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14207375
Change-Id: Iaae8bfba152a1411ab33e66128fde5e2a8d26f5b
2021-04-16 09:57:44 +00:00
TreeHugger Robot
96ed3bb51c
Merge "sepolicy: fix fingerprint sepolicy" into sc-dev
2021-04-16 09:25:33 +00:00
eddielan
75a9ea1ee4
sepolicy: fix fingerprint sepolicy
...
04-16 01:56:07.948 1039 1039 W fingerprint@2.1: type=1400 audit(0.0:110):
avc: denied { write } for name="wakeup_enable" dev="sysfs" ino=69197
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:sysfs:s0
tclass=file permissive=0
Bug: 185538163
Test: Build Pass
Change-Id: I8f75daf22577e6a68f3b2a0250eebebd1873ea28
2021-04-16 15:17:20 +08:00
SalmaxChang
c73d07ada1
Create vendor_logger_prop am: 3c692b942a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14207372
Change-Id: I32ef66fbc32e1ca1a1c5cf4765ce0ff586c23b26
2021-04-16 06:33:03 +00:00
SalmaxChang
3c692b942a
Create vendor_logger_prop
...
Bug: 178744858
Change-Id: I4abb6f73b068c5ed265979c3190bcc2feac76f94
2021-04-16 06:06:36 +00:00
Hsiaoan Hsu
0790114826
Add sepolicy rules when PowerAnomalyDataDetection service enabled
...
- Fix avc denied when Power anomaly data detection enable.
Bug: 185544799
Test: Verified Pass
Change-Id: I7b81e09842acb71767f60df18fd0ca4a95e0ff09
2021-04-16 13:37:04 +08:00
TreeHugger Robot
e13ba8bc04
Merge "Update sepolicy for the egetpu_logging service to access the sysfs." into sc-dev am: ca24e70422
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14194013
Change-Id: I38b0a7ebaed84c336440558b030329fdcdd06e10
2021-04-16 02:38:54 +00:00
TreeHugger Robot
ca24e70422
Merge "Update sepolicy for the egetpu_logging service to access the sysfs." into sc-dev
2021-04-16 02:15:58 +00:00
Max Shi
bf808b39f5
Add sepolicy for sensor HAL accessing AOC reset sysfs node. am: 55bd05960f
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14167428
Change-Id: Ibcd80f9711e1d9976dfcf9a745c7bdd600479235
2021-04-16 00:04:38 +00:00
Ahmed ElArabawy
d191543cb2
Merge "ssr_detector: provide wlan firmware version" into sc-dev am: 4a5d646504
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14197331
Change-Id: I1a439519d7d2150983b17e606126a95cfb2d3181
2021-04-16 00:04:32 +00:00
qinyiyan
4585613637
Update sepolicy for the egetpu_logging service to access the sysfs.
...
Test: make selinux_policy -j128 and pushed sepolicy modules to the
device. The avc denials are gone.
Bug:185448476
Change-Id: Ibff482b64a6cdbc5a7967bb8cc4281c8bd0b5b98
2021-04-15 23:57:32 +00:00
Max Shi
55bd05960f
Add sepolicy for sensor HAL accessing AOC reset sysfs node.
...
Bug: 184858369
Test: Verify sensor HAL process can write to the sysfs node.
Change-Id: I9700323bafa413b88f25e4117499bcc936bce9c6
2021-04-15 23:37:15 +00:00
Ahmed ElArabawy
4a5d646504
Merge "ssr_detector: provide wlan firmware version" into sc-dev
2021-04-15 23:32:26 +00:00
rioskao
a0a4a7f2a2
Allow ssr_detector to read aoc version property
...
sst_detector would need firmware version in order to
parse dump information with corresponding symbol of the version
04-15 13:05:39.196 28845 28864 W libc : Access denied finding property "vendor.aoc.firmware.version"
Bug: 185473950
Test: validate by force ramdump of aoc.
Change-Id: Iebf62b97897ccc2a84a174dafca90f446b771915
2021-04-15 22:53:18 +08:00
Jenny Ho
c15e4b72f2
Merge "Allow to dump pps-dc" into sc-dev am: 9ec58d031a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14140257
Change-Id: Iacaa2d56fc4ace8a91cc2e341f4f1f20dff5a6af
2021-04-15 11:21:24 +00:00
Jenny Ho
9ec58d031a
Merge "Allow to dump pps-dc" into sc-dev
2021-04-15 10:26:57 +00:00
Roger Wang
da8122c867
ssr_detector: provide wlan firmware version
...
In this commit, we allow ssr_detector to collect
wlan firmware version from property. This information
is useful for doing SSR statistic.
avc log:
avc: denied { read } for comm="FileObserver" name="u:object_r:vendor_wifi_version:s0" dev="tmpfs" ino=324 scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:object_r:vendor_wifi_version:s0 tclass=file permissive=0
Bug: 185457155
Test: check firmware version can be collected.
ssrInfo SSRInfo{mSubsystem='wlan', mCrashReason='Dongle_Trap_traptest+0x8_pcidev_handle_user_disconnect+0xbb', mRamdumpFile='coredump_wlan_2021-04-15_18-01-54.bin', mTimeStamp='2021-04-15_18-01-54', mBuildVersion='20.25.423.4', mUID='05a6029c-4f74-3172-9a3f-7fa8e8bcc6c4', mExtraBuildVersion=''}, uid 05a6029c-4f74-3172-9a3f-7fa8e8bcc6c4
Change-Id: Ibf2ce8f0c7a7dd752963c738bf28da14034cc209
2021-04-15 18:08:52 +08:00
Charlie Chen
bbe9ffe0e8
Merge changes from topic "remove_video_system_heap" into sc-dev am: 742daf873c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14187064
Change-Id: If5d1cecad9d65888364eb43f4ba2d5b296452058
2021-04-15 09:11:41 +00:00
Charlie Chen
742daf873c
Merge changes from topic "remove_video_system_heap" into sc-dev
...
* changes:
Formatting file_contexts
remove video_system_heap
2021-04-15 07:56:19 +00:00
TreeHugger Robot
6b2103ed0c
Merge "Allow power stats HAL read uwb power_stats sysfs node" into sc-dev am: a4d458026a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14189309
Change-Id: I67474bd39ad5bb247df79ad27d88cb14b7bc8955
2021-04-15 06:57:10 +00:00
TreeHugger Robot
a4d458026a
Merge "Allow power stats HAL read uwb power_stats sysfs node" into sc-dev
2021-04-15 06:26:00 +00:00
TeYuan Wang
66fd237730
thermal: add sepolicy rule to access ODPM sysfs
...
Bug: 170653634
Test: test thermal behavior under enforcing mode
Change-Id: I37500de957cc2375213f1d0416a88356f36d2367
2021-04-15 05:55:10 +00:00
Benjamin Schwartz
09c2e2802a
Merge "Allow power stats HAL to read gnss stats" into sc-dev am: 948f48997b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14106551
Change-Id: I3668916da82cf5f5ec4f31710fd91ccdd0ee6a39
2021-04-15 05:27:07 +00:00
Vova Sharaienko
350b5e41c8
Merge "Stats: removed obsolete IStats HIDL sepolicies" into sc-dev am: d7e81afb35
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14192518
Change-Id: I8a06090a82aa3c3fad6797af240a69bbccbcef90
2021-04-15 05:26:51 +00:00
Chris Lu
bbabdc9504
display: remove dontaudit for hal_memtrack_default am: 86582e6ce0
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14187062
Change-Id: I71b0e37954933ed6f0fae9eb18e57d3ef7d5ccf2
2021-04-15 05:26:29 +00:00
Benjamin Schwartz
948f48997b
Merge "Allow power stats HAL to read gnss stats" into sc-dev
2021-04-15 05:08:16 +00:00
Vova Sharaienko
d7e81afb35
Merge "Stats: removed obsolete IStats HIDL sepolicies" into sc-dev
2021-04-15 05:01:22 +00:00
Charlie Chen
01a33d0cb7
Formatting file_contexts
...
Test: Youtube playback, video recording, ExoPlayer playback
Bug: 181380463
Change-Id: I9eeb08987794336aafa7945a9d648a38f0e7989a
2021-04-15 11:08:10 +08:00
Taehwan Kim
9d20b97534
remove video_system_heap
...
Test: Youtube playback, video recording, ExoPlayer playback
Bug: 181380463
Signed-off-by: Taehwan Kim <t_h.kim@samsung.com>
Change-Id: If2aad557365755156e4c088048dc351bc66df281
2021-04-15 11:07:20 +08:00
Chris Lu
86582e6ce0
display: remove dontaudit for hal_memtrack_default
...
Bug: 181913683
Test: make pts -j60 pts-tradefed run pts -m PtsSELinuxTest -t
com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Change-Id: I72963aed5aff9bcbf2de16b11b16033ca594d7f0
2021-04-15 10:12:01 +08:00
Vova Sharaienko
a0a8cb2dff
Stats: removed obsolete IStats HIDL sepolicies
...
Bug: 181887265
Test: Build, flash, and logcat for sepolicies messages
Change-Id: I702a8d59fadf04658addd6e3acf3a126a0a4cae7
2021-04-15 01:42:45 +00:00
Benjamin Schwartz
dde4b6bf1f
Allow power stats HAL to read gnss stats
...
Bug: 181577366
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: Iea8c332f9b73358e1a6464d69cbef6af4a603f84
2021-04-14 17:28:02 -07:00
Benjamin Schwartz
a791d93318
Allow power stats HAL read uwb power_stats sysfs node
...
Bug: 180956351
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: Id157c1e10f4d9491ae54dd1babb82e6f282c257c
2021-04-14 15:35:53 -07:00
Aaron Tsai
ab5ab00a89
Fix avc denied for Silent Logging am: 204dc05aa4
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14182163
Change-Id: I23df127195424ce93b544767f450bd687a3a604c
2021-04-14 12:47:34 +00:00
Aaron Tsai
204dc05aa4
Fix avc denied for Silent Logging
...
04-08 23:18:20.684 920 920 I HwBinder:920_1: type=1400 audit(0.0:486): avc: denied { call } for scontext=u:r:sced:s0 tcontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tclass=binder permissive=1
04-08 22:51:36.312 1000 6890 6890 I Thread-2: type=1400 audit(0.0:1390): avc: denied { call } for scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:r:sced:s0 tclass=binder permissive=1
04-08 23:18:20.684 7099 7099 I auditd : type=1400 audit(0.0:487): avc: denied { execute } for comm="HwBinder:920_1" name="sh" dev="dm-0" ino=464 scontext=u:r:sced:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
04-08 23:18:20.684 7099 7099 I auditd : type=1400 audit(0.0:488): avc: denied { read open } for comm="HwBinder:920_1" path="/system/bin/sh" dev="overlay" ino=464 scontext=u:r:sced:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
04-08 22:51:36.312 1000 8554 8554 I HwBinder:908_1: type=1400 audit(0.0:1391): avc: denied { execute_no_trans } for path="/vendor/bin/sh" dev="overlay" ino=377 scontext=u:r:sced:s0 tcontext=u:object_r:vendor_shell_exec:s0 tclass=file permissive=1
04-08 22:51:36.324 1000 908 908 I HwBinder:908_1: type=1400 audit(0.0:1392): avc: denied { search } for name="slog" dev="dm-7" ino=245 scontext=u:r:sced:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=1
04-08 22:51:36.324 1000 908 908 I HwBinder:908_1: type=1400 audit(0.0:1393): avc: denied { write } for name="slog" dev="dm-7" ino=245 scontext=u:r:sced:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=1
04-08 22:51:36.324 1000 908 908 I HwBinder:908_1: type=1400 audit(0.0:1394): avc: denied { add_name } for name="tcplog_20210408225136.pcap" scontext=u:r:sced:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=1
04-08 22:52:24.720 1000 908 908 I HwBinder:908_1: type=1400 audit(0.0:1427): avc: denied { create } for name="tcplog_20210408225224.pcap" scontext=u:r:sced:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=file permissive=1
04-08 23:18:23.160 7099 7099 I auditd : type=1400 audit(0.0:505): avc: denied { getopt } for comm="tcpdump" scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-08 23:18:23.160 7099 7099 I tcpdump : type=1400 audit(0.0:505): avc: denied { getopt } for scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-08 23:18:23.160 7099 7099 I auditd : type=1400 audit(0.0:506): avc: denied { setopt } for comm="tcpdump" scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-08 23:18:23.160 7099 7099 I tcpdump : type=1400 audit(0.0:506): avc: denied { setopt } for scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-08 23:58:53.664 8514 8514 I auditd : type=1400 audit(0.0:500): avc: denied { getattr } for comm="sh" path="/system/bin/tcpdump" dev="overlay" ino=502 scontext=u:r:sced:s0 tcontext=u:object_r:tcpdump_exec:s0 tclass=file permissive=1
04-08 23:58:53.664 8514 8514 I auditd : type=1400 audit(0.0:501): avc: denied { execute } for comm="sh" name="tcpdump" dev="dm-0" ino=502 scontext=u:r:sced:s0 tcontext=u:object_r:tcpdump_exec:s0 tclass=file permissive=1
04-08 23:58:53.664 8514 8514 I auditd : type=1400 audit(0.0:502): avc: denied { read open } for comm="sh" path="/system/bin/tcpdump" dev="overlay" ino=502 scontext=u:r:sced:s0 tcontext=u:object_r:tcpdump_exec:s0 tclass=file permissive=1
04-08 23:58:53.668 8514 8514 I auditd : type=1400 audit(0.0:503): avc: denied { execute_no_trans } for comm="sh" path="/system/bin/tcpdump" dev="overlay" ino=502 scontext=u:r:sced:s0 tcontext=u:object_r:tcpdump_exec:s0 tclass=file permissive=1
04-08 23:58:53.668 8514 8514 I auditd : type=1400 audit(0.0:504): avc: denied { map } for comm="tcpdump" path="/system/bin/tcpdump" dev="overlay" ino=502 scontext=u:r:sced:s0 tcontext=u:object_r:tcpdump_exec:s0 tclass=file permissive=1
04-08 23:58:53.680 8514 8514 I auditd : type=1400 audit(0.0:505): avc: denied { create } for comm="tcpdump" scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-08 23:58:53.680 8514 8514 I auditd : type=1400 audit(0.0:506): avc: denied { net_raw } for comm="tcpdump" capability=13 scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=capability permissive=1
04-08 23:58:53.680 8514 8514 I auditd : type=1400 audit(0.0:507): avc: denied { ioctl } for comm="tcpdump" path="socket:[96140]" dev="sockfs" ino=96140 ioctlcmd=0x8933 scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-13 19:19:38.493 1000 403 403 I auditd : avc: denied { find } for interface=vendor.samsung_slsi.telephony.hardware.oemservice::IOemService sid=u:r:sced:s0 pid=909 scontext=u:r:sced:s0 tcontext=u:object_r:hal_vendor_oem_hwservice:s0 tclass=hwservice_manager permissive=0
04-13 21:40:13.054 404 404 I auditd : avc: denied { add } for interface=vendor.samsung_slsi.telephony.hardware.oemservice::IOemService sid=u:r:sced:s0 pid=911 scontext=u:r:sced:s0 tcontext=u:object_r:hal_vendor_oem_hwservice:s0 tclass=hwservice_manager permissive=1
04-13 21:40:13.055 404 404 I auditd : avc: denied { add } for interface=android.hidl.base::IBase sid=u:r:sced:s0 pid=911 scontext=u:r:sced:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
Bug: 184921478
Test: manual test
Change-Id: I39eb403272a8a4fba0728c9f8eab5ea23096a540
2021-04-14 18:18:55 +08:00
Adam Shih
6c77867c16
Merge "change assigned bug" into sc-dev am: 65355b49a3
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14167787
Change-Id: Ide6ac2b00c2a571517c3496a95a84aed22b9428c
2021-04-14 08:01:55 +00:00
Adam Shih
65355b49a3
Merge "change assigned bug" into sc-dev
2021-04-14 07:09:32 +00:00
Ray Chi
f4589fecba
usb: Add sepolicy for extcon access
...
USB gadget hal will access extcon folder so that this patch
will add new rule to allow USB gadget hal to access extcon.
Bug: 185302867
Test: apply the rule and verify it
Change-Id: I0bc44dbf89a02c4fa5b561baf1c0c1c43d5183e9
2021-04-14 14:36:44 +08:00