Commit graph

766 commits

Author SHA1 Message Date
Victor Liu
0c429efc07 uwb: allow uwb to access the radio service
07-07 18:28:28.391   409   409 E SELinux : avc:  denied  { find } for pid=4609 uid=1083 name=isub scontext=u:r:uwb_vendor_app:s0:c59,c260,c512,c768 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=0

Bug: 192833779
Test: on device, no avc denied message
Change-Id: I4a6b778dce6f493093d3a05683473bb60e9cfa5c
2021-08-10 22:47:35 +00:00
Siqi Lin
505d9d692e Merge "sepolicy: gs101: allow dumpstate to access AoC stats" into sc-dev am: df73384b2e
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15475450

Change-Id: I7c546f38519158fa1237e713bb1200e304a82650
2021-08-09 20:05:08 +00:00
Siqi Lin
df73384b2e Merge "sepolicy: gs101: allow dumpstate to access AoC stats" into sc-dev 2021-08-09 19:52:02 +00:00
TreeHugger Robot
cfcf725081 Merge "Add sepolicy to allow camera HAL to read display backlight" into sc-dev 2021-08-06 14:04:38 +00:00
Siqi Lin
57d81aa6c1 sepolicy: gs101: allow dumpstate to access AoC stats
Add AP wakeups from AoC DRAM exceptions to bugreports.

Bug: 186456919
Change-Id: I31df82addf1b5024b8e33c6284e5da1f473ac5d9
2021-08-05 10:47:13 -07:00
Alice Yang
0d7ab6ea8b Add sepolicy to allow camera HAL to read display backlight
Add sepolicy to allow camera HAL to read display backlight to use in
gabc algorithm.

Bug: 187917645
Test: build pass,  go/p21-camera-test-checklist
Change-Id: I628ee2dedd48dd1360d0818137ba9139ae194029
2021-08-03 16:31:12 +00:00
Erik Staats
1b7ae244b0 Merge "Allow sensor HAL to read AoC dumpstate." into sc-dev 2021-08-03 15:27:12 +00:00
Charles Chiu
50ebe02d44 Merge "Allow init to set Camera properties." into sc-dev 2021-08-03 05:52:49 +00:00
Erik Staats
ad42045b87 Allow sensor HAL to read AoC dumpstate.
Bug: 194021578
Test: Simulated communication failure and verified AoC services state
 log.
Test: See details in testing done comment in
 https://googleplex-android-review.git.corp.google.com/15444398 .
Change-Id: I76f376577abad26fe86b5ecb6a570716381227f0
2021-08-02 15:56:57 -07:00
Quinn Yan
be5aa28148 Merge "Revert the unnecessary sepolicy rules for hal_neuralnetworks_darwinn." into sc-dev 2021-08-02 18:01:50 +00:00
Charles Chiu
718a856e26 Allow init to set Camera properties.
Test: Camera CTS
Bug: 194656156

Change-Id: I2f8f89a02984bfb9fea96df7b0a1d4150c9fdd8d
2021-08-02 23:21:14 +08:00
Mark Chang
f7fa1fa877 Merge "[DO NOT MERGE] sepolicy: Add "dontaudit" for twoshay dac_override." into sc-dev 2021-07-31 00:01:26 +00:00
qinyiyan
ee4e7f45ce Revert the unnecessary sepolicy rules for hal_neuralnetworks_darwinn.
Bug: 194241380
Test: flashed forrest build and ran PtsSELinuxTestCases
Change-Id: Ie2f0572a368f09e522bc2cdfdf9da1859c1c44e7
2021-07-30 23:36:06 +00:00
TreeHugger Robot
4720a91c52 Merge "Add vendor SELinux denial to allowlist" into sc-dev 2021-07-30 13:12:12 +00:00
Rick Yiu
dba7013033 Merge "gs101: Remove vendor_sched" into sc-dev 2021-07-30 06:52:10 +00:00
Rick Yiu
7de8a5d4a7 gs101: Remove vendor_sched
Moved to system/sepolicy.

Bug: 194656257
Test: build pass
Change-Id: Ia5ea1bbc05bdc52b43cb403d99994bad70613e08
Merged-In: Ia5ea1bbc05bdc52b43cb403d99994bad70613e08
2021-07-30 03:13:39 +00:00
Mark Chang
a1aab562ca [DO NOT MERGE] sepolicy: Add "dontaudit" for twoshay dac_override.
Bug: 193224954
Test: build pass and boot to home
Signed-off-by: Mark Chang <changmark@google.com>
Change-Id: I5c330564cc026e113c5d33d5d093dbcdb3ede5e4
2021-07-30 01:49:59 +00:00
Jaineel Mehta
0474bcf10e Add vendor SELinux denial to allowlist
Change-Id: If7435e9c62811ef3c9757f22f06018c32a8d3597
Test: None
Bug: 194281028
2021-07-29 21:23:34 +00:00
TreeHugger Robot
750888bc5b Merge "gs101: Allow camera hal to create file in persist camera folder" into sc-dev 2021-07-29 08:40:36 +00:00
Michael Eastwood
9bfbb3c0d4 Merge "Allow hal_dumpstate_default to access vendor_camera_debug_prop" into sc-dev 2021-07-28 21:36:38 +00:00
Michael Eastwood
30bd5e8ed6 Allow hal_dumpstate_default to access vendor_camera_debug_prop
Bug: 193365129
Test: atest com.google.android.selinux.pts.SELinuxTest#scanBugreport
Change-Id: I43e389d46e8116844bb9ca4259e5ea28e86c50f4
2021-07-27 17:22:47 -07:00
TreeHugger Robot
fead41d573 Merge "Add AoC wakeup stats to dump state" into sc-dev 2021-07-27 19:23:06 +00:00
Max Kogan
5374497df5 Add AoC wakeup stats to dump state
Need add support for wakeup stats to track AoC to AP messages
resulting in frequent wake-ups.

Bug: 192668026
Change-Id: I073406cc101e114135c863b0e0b86357e93c0415
2021-07-26 22:45:16 +00:00
Jack Wu
d6c1a50bba sepolicy: gs101: allows pixelstat to access pca file nodes
07-23 14:24:45.512  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:10): avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:45.512  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:11): avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:12): avc: denied { read } for name="chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:13): avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:14): avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:15): avc: denied { write } for name="chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1

Bug: 194386750
Test: manually test, no avc: denied
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I1a16edb5bb7820f62b3ce598aa50eba2d9455927
2021-07-24 06:42:39 +00:00
TreeHugger Robot
b3225f0f6c Merge "Add SE policies for memtrack HAL" into sc-dev 2021-07-23 20:52:52 +00:00
Ankit Goyal
0f9820830c Add SE policies for memtrack HAL
Bug: 191966412
Test: adb shell dumpsys meminfo
Change-Id: Ia7ec64840d2bb7c3ae0d61304e109d2ceb9e5f78
2021-07-24 02:18:36 +08:00
Max Shi
0bd50d1eb5 Allow USF sensor HAL to read camera persist files.
USF sensor HAL requires access to camera persist files to determine if
the camera module has been replaced (e.g. via repair), which may affect
calibration of the magnetometer.

Bug: 193727762
Test: Verify sensor HAL can open and read files under
Test: /mnt/vendor/persist/camera/
Change-Id: Icb9d7a46bf8465e1a72054ac9c8493ba18445ef3
2021-07-22 21:11:44 +00:00
Badhri Jagan Sridharan
49804d8d6f Merge "Update Usb hal permissions to allow pushing overheat suez events" into sc-dev 2021-07-22 20:31:13 +00:00
George Lee
79a15eed2a Merge "pixelstats: add bcl directory permission" into sc-dev 2021-07-22 17:03:33 +00:00
Gary Jian
9b5a97d65e Merge "Allow to set vendor_rild_prop for oemrilservice_app" into sc-dev 2021-07-22 08:16:42 +00:00
chened
561ce13d59 gs101: Allow camera hal to create file in persist camera folder
Test: build pass, no cts regression
Bug: 189844464
Change-Id: If150a94f184424f21c509a44001192e36b6ee24a
2021-07-22 07:11:05 +00:00
Badhri Jagan Sridharan
1ebd84703b Update Usb hal permissions to allow pushing overheat suez events
Usb hal now pushes the Usb port overheat event through statsd.
Usb hal also accesses usbc-throttling stats to gather info.

Bug: 193615568
Signed-off-by: Badhri Jagan Sridharan <badhri@google.com>
Change-Id: I4918458bc7a8a25d7655b66d1fe40eafc7ccb070
2021-07-21 14:38:55 -07:00
Sungwoo choi
b47cdf282a Allow to set vendor_rild_prop for oemrilservice_app
Bug: 193367138
Test: make sure no denied logs in oemrilservice_app when access the
radio property

Signed-off-by: Sungwoo choi <sungwoo48.choi@samsung.com>
Change-Id: I9014002476df7b4e650f7a5a2f153e4eca47d23d
2021-07-21 08:01:44 +00:00
Petri Gynther
d12714ccc0 Add vbmeta_vendor_[ab] to file_contexts
Bug: 181909612
Test: build + install + boot to home
Change-Id: Ibb7bd8e5a61d86de1b51a3780a5bfa8cf4caf59b
2021-07-20 23:41:31 -07:00
sukiliu
411aa59779 Update avc error on ROM 7566803
avc: denied { read } for name="platform:1cc40000.sysmmu--platform:1ce00000.abrolhos" dev="sysfs" ino=21006 scontext=u:r:hal_neuralnetworks_darwinn:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0

Bug: 194241380
Test: PtsSELinuxTestCases
Change-Id: If7ee99a36bca88fffc37c12dc306e0453afb1395
2021-07-21 09:36:05 +08:00
TreeHugger Robot
b3cc71258b Merge "ims: allow finding mediametrics_service for vendor_ims_app" into sc-dev 2021-07-20 13:00:25 +00:00
Sungjun Park
0612b5aa85 ims: allow finding mediametrics_service for vendor_ims_app
For generate dtmf tone, ImsService find mediametrics_service.
So, added the seplicy rule for finding mediametrics_service.

<Related log>
07-14 15:37:21.391   411   411 E SELinux : avc:  denied  { find } for
pid=2263 uid=10217 name=media.metrics scontext=u:r:vendor_ims_app:s0:
c217,c256,c512,c768 tcontext=u:object_r:mediametrics_service:s0 tclass
=service_manager permissive=0

Bug: 192543653
Signed-off-by: Sungjun Park <sj19385.park@samsung.com>
Change-Id: Ia0f6610ecc454533d9584367694228245afe46e4
2021-07-20 09:35:23 +00:00
Alex Hong
f0589d11df Allow suspend_control to access the AOC wakeup node
Test: Check avc denials during boot
      $ adb shell su 0 dumpsys suspend_control
Bug: 194164089

Change-Id: I9edcf6398f61daec6fdde0f7ac69ddd5d275f753
2021-07-20 09:29:15 +00:00
TreeHugger Robot
fa62e602fc Merge "ssr_detector_app: Add additional vendor dir and crgroup allow for debug" into sc-dev 2021-07-20 06:09:35 +00:00
sukiliu
d9309ef34d Update avc error on ROM 7562467
avc: denied { read } for name="u:object_r:odsign_prop:s0" dev="tmpfs" ino=229 scontext=u:r:postinstall_dexopt:s0 tcontext=u:object_r:odsign_prop:s0 tclass=file permissive=0
avc: denied { read } for comm="otapreopt" name="u:object_r:odsign_prop:s0" dev="tmpfs" ino=229 scontext=u:r:postinstall_dexopt:s0 tcontext=u:object_r:odsign_prop:s0 tclass=file permissive=0

Bug: 194142604
Bug: 194065991
Test: PtsSELinuxTestCases
Change-Id: Ic3bb544f05ffff0df42f820d2f9cf6cd7cb24879
2021-07-20 10:03:30 +08:00
TreeHugger Robot
f8b8e0cb53 Merge "Add cpm/pca9468 logbuffer directories so that bugreports can take a snapshot" into sc-dev 2021-07-19 20:54:38 +00:00
TreeHugger Robot
fc321aabe2 Merge "Allow HAL to access sysfs." into sc-dev 2021-07-19 18:22:13 +00:00
Andrew LeCain
ff13d1adee Merge "sepolicy allow fingerprint hal to read mfg_data" into sc-dev 2021-07-19 17:46:18 +00:00
Stephane Lee
022b61751e Add cpm/pca9468 logbuffer directories so that bugreports can take a snapshot
Test: adb bugreport; check "dumpstate_board.txt"
Bug: 193894298
Change-Id: I222405ab6d78bd4367a91cc0f13b8d8a0f1ca578
2021-07-16 16:27:42 -07:00
Sina Hassani
e763f3cc9b Allow HAL to access sysfs.
This is so that it can read fw metrics from sysfs and dump them through
dumpsys.

Test: Ran dumpsys and bugreport.
Bug: 193841666
Change-Id: I08c08e35bad35d0eefc3f6ad218fb47e24051b0c
2021-07-16 16:27:34 -07:00
Wenhao Wang
5305955a86 Merge "Add wakelock access for storageproxyd" into sc-dev 2021-07-16 17:12:01 +00:00
Alex Hong
ea6934fda9 Merge "sepolicy: gs101: support tetheroffload hal version 1.y" into sc-dev 2021-07-16 06:28:32 +00:00
Namkyu Kim
4055c31faf sepolicy: gs101: support tetheroffload hal version 1.y
Support both 1.0 and 1.1.

Bug: 186539538
Test: run vts -m VtsHalTetheroffloadControlV1_0TargetTest
      run vts -m VtsHalTetheroffloadControlV1_1TargetTest

Signed-off-by: Namkyu Kim <namkyu78.kim@samsung.com>
Change-Id: I76a26dcd22e1c8985d470a39b9aeae618f459d00
2021-07-16 04:05:21 +00:00
Stephane Lee
ea6996bc52 Merge "odpm: Rename the odpm_config sepolicies to be more consistent" into sc-dev 2021-07-16 01:55:33 +00:00
Wenhao Wang
5c009fb96f Add wakelock access for storageproxyd
The storageproxyd needs a wakelock around the sequence of UFS commands

Bug: 193456223
Test: Trusty storage tests
Change-Id: I1efe3144c8bcc17c056fc3b9b796e080f77991d5
2021-07-15 17:10:31 -07:00