Charlie Chen
bbe9ffe0e8
Merge changes from topic "remove_video_system_heap" into sc-dev am: 742daf873c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14187064
Change-Id: If5d1cecad9d65888364eb43f4ba2d5b296452058
2021-04-15 09:11:41 +00:00
Charlie Chen
89e6693435
Merge changes from topic "remove_video_system_heap" into sc-dev am: 742daf873c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14187064
Change-Id: I98048923a0865e28d6b67c5efffce8b8295371c5
2021-04-15 08:59:10 +00:00
Charlie Chen
742daf873c
Merge changes from topic "remove_video_system_heap" into sc-dev
...
* changes:
Formatting file_contexts
remove video_system_heap
2021-04-15 07:56:19 +00:00
TreeHugger Robot
6b2103ed0c
Merge "Allow power stats HAL read uwb power_stats sysfs node" into sc-dev am: a4d458026a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14189309
Change-Id: I67474bd39ad5bb247df79ad27d88cb14b7bc8955
2021-04-15 06:57:10 +00:00
TreeHugger Robot
29e20026d9
Merge "Allow power stats HAL read uwb power_stats sysfs node" into sc-dev am: a4d458026a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14189309
Change-Id: I4e5d42b5a2f8e7a613fe6276196c56f4404ecb1e
2021-04-15 06:51:17 +00:00
TreeHugger Robot
a4d458026a
Merge "Allow power stats HAL read uwb power_stats sysfs node" into sc-dev
2021-04-15 06:26:00 +00:00
TeYuan Wang
66fd237730
thermal: add sepolicy rule to access ODPM sysfs
...
Bug: 170653634
Test: test thermal behavior under enforcing mode
Change-Id: I37500de957cc2375213f1d0416a88356f36d2367
2021-04-15 05:55:10 +00:00
Benjamin Schwartz
09c2e2802a
Merge "Allow power stats HAL to read gnss stats" into sc-dev am: 948f48997b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14106551
Change-Id: I3668916da82cf5f5ec4f31710fd91ccdd0ee6a39
2021-04-15 05:27:07 +00:00
Vova Sharaienko
350b5e41c8
Merge "Stats: removed obsolete IStats HIDL sepolicies" into sc-dev am: d7e81afb35
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14192518
Change-Id: I8a06090a82aa3c3fad6797af240a69bbccbcef90
2021-04-15 05:26:51 +00:00
Chris Lu
bbabdc9504
display: remove dontaudit for hal_memtrack_default am: 86582e6ce0
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14187062
Change-Id: I71b0e37954933ed6f0fae9eb18e57d3ef7d5ccf2
2021-04-15 05:26:29 +00:00
Benjamin Schwartz
34cdd13183
Merge "Allow power stats HAL to read gnss stats" into sc-dev am: 948f48997b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14106551
Change-Id: I677e694c52a44e7931f45017ce05ab8f1f652e9a
2021-04-15 05:21:05 +00:00
Vova Sharaienko
52d208d3ed
Merge "Stats: removed obsolete IStats HIDL sepolicies" into sc-dev am: d7e81afb35
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14192518
Change-Id: I92c7a1f4705b9d4f85dcba7e3cda05d0fd349769
2021-04-15 05:20:51 +00:00
Chris Lu
fd0a28c8d1
display: remove dontaudit for hal_memtrack_default am: 86582e6ce0
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14187062
Change-Id: I6de95dadec78a8a7ba9a31ca7817a52e93bf6925
2021-04-15 05:20:38 +00:00
Benjamin Schwartz
948f48997b
Merge "Allow power stats HAL to read gnss stats" into sc-dev
2021-04-15 05:08:16 +00:00
Vova Sharaienko
d7e81afb35
Merge "Stats: removed obsolete IStats HIDL sepolicies" into sc-dev
2021-04-15 05:01:22 +00:00
Charlie Chen
01a33d0cb7
Formatting file_contexts
...
Test: Youtube playback, video recording, ExoPlayer playback
Bug: 181380463
Change-Id: I9eeb08987794336aafa7945a9d648a38f0e7989a
2021-04-15 11:08:10 +08:00
Taehwan Kim
9d20b97534
remove video_system_heap
...
Test: Youtube playback, video recording, ExoPlayer playback
Bug: 181380463
Signed-off-by: Taehwan Kim <t_h.kim@samsung.com>
Change-Id: If2aad557365755156e4c088048dc351bc66df281
2021-04-15 11:07:20 +08:00
Chris Lu
86582e6ce0
display: remove dontaudit for hal_memtrack_default
...
Bug: 181913683
Test: make pts -j60 pts-tradefed run pts -m PtsSELinuxTest -t
com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Change-Id: I72963aed5aff9bcbf2de16b11b16033ca594d7f0
2021-04-15 10:12:01 +08:00
Vova Sharaienko
a0a8cb2dff
Stats: removed obsolete IStats HIDL sepolicies
...
Bug: 181887265
Test: Build, flash, and logcat for sepolicies messages
Change-Id: I702a8d59fadf04658addd6e3acf3a126a0a4cae7
2021-04-15 01:42:45 +00:00
Benjamin Schwartz
dde4b6bf1f
Allow power stats HAL to read gnss stats
...
Bug: 181577366
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: Iea8c332f9b73358e1a6464d69cbef6af4a603f84
2021-04-14 17:28:02 -07:00
Benjamin Schwartz
a791d93318
Allow power stats HAL read uwb power_stats sysfs node
...
Bug: 180956351
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: Id157c1e10f4d9491ae54dd1babb82e6f282c257c
2021-04-14 15:35:53 -07:00
Aaron Tsai
ab5ab00a89
Fix avc denied for Silent Logging am: 204dc05aa4
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14182163
Change-Id: I23df127195424ce93b544767f450bd687a3a604c
2021-04-14 12:47:34 +00:00
Aaron Tsai
9c8ec42d54
Fix avc denied for Silent Logging am: 204dc05aa4
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14182163
Change-Id: I32b6542ade23e244d4758e88d8d2f2faa10bfdcb
2021-04-14 12:42:13 +00:00
Aaron Tsai
204dc05aa4
Fix avc denied for Silent Logging
...
04-08 23:18:20.684 920 920 I HwBinder:920_1: type=1400 audit(0.0:486): avc: denied { call } for scontext=u:r:sced:s0 tcontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tclass=binder permissive=1
04-08 22:51:36.312 1000 6890 6890 I Thread-2: type=1400 audit(0.0:1390): avc: denied { call } for scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:r:sced:s0 tclass=binder permissive=1
04-08 23:18:20.684 7099 7099 I auditd : type=1400 audit(0.0:487): avc: denied { execute } for comm="HwBinder:920_1" name="sh" dev="dm-0" ino=464 scontext=u:r:sced:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
04-08 23:18:20.684 7099 7099 I auditd : type=1400 audit(0.0:488): avc: denied { read open } for comm="HwBinder:920_1" path="/system/bin/sh" dev="overlay" ino=464 scontext=u:r:sced:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
04-08 22:51:36.312 1000 8554 8554 I HwBinder:908_1: type=1400 audit(0.0:1391): avc: denied { execute_no_trans } for path="/vendor/bin/sh" dev="overlay" ino=377 scontext=u:r:sced:s0 tcontext=u:object_r:vendor_shell_exec:s0 tclass=file permissive=1
04-08 22:51:36.324 1000 908 908 I HwBinder:908_1: type=1400 audit(0.0:1392): avc: denied { search } for name="slog" dev="dm-7" ino=245 scontext=u:r:sced:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=1
04-08 22:51:36.324 1000 908 908 I HwBinder:908_1: type=1400 audit(0.0:1393): avc: denied { write } for name="slog" dev="dm-7" ino=245 scontext=u:r:sced:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=1
04-08 22:51:36.324 1000 908 908 I HwBinder:908_1: type=1400 audit(0.0:1394): avc: denied { add_name } for name="tcplog_20210408225136.pcap" scontext=u:r:sced:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=1
04-08 22:52:24.720 1000 908 908 I HwBinder:908_1: type=1400 audit(0.0:1427): avc: denied { create } for name="tcplog_20210408225224.pcap" scontext=u:r:sced:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=file permissive=1
04-08 23:18:23.160 7099 7099 I auditd : type=1400 audit(0.0:505): avc: denied { getopt } for comm="tcpdump" scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-08 23:18:23.160 7099 7099 I tcpdump : type=1400 audit(0.0:505): avc: denied { getopt } for scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-08 23:18:23.160 7099 7099 I auditd : type=1400 audit(0.0:506): avc: denied { setopt } for comm="tcpdump" scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-08 23:18:23.160 7099 7099 I tcpdump : type=1400 audit(0.0:506): avc: denied { setopt } for scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-08 23:58:53.664 8514 8514 I auditd : type=1400 audit(0.0:500): avc: denied { getattr } for comm="sh" path="/system/bin/tcpdump" dev="overlay" ino=502 scontext=u:r:sced:s0 tcontext=u:object_r:tcpdump_exec:s0 tclass=file permissive=1
04-08 23:58:53.664 8514 8514 I auditd : type=1400 audit(0.0:501): avc: denied { execute } for comm="sh" name="tcpdump" dev="dm-0" ino=502 scontext=u:r:sced:s0 tcontext=u:object_r:tcpdump_exec:s0 tclass=file permissive=1
04-08 23:58:53.664 8514 8514 I auditd : type=1400 audit(0.0:502): avc: denied { read open } for comm="sh" path="/system/bin/tcpdump" dev="overlay" ino=502 scontext=u:r:sced:s0 tcontext=u:object_r:tcpdump_exec:s0 tclass=file permissive=1
04-08 23:58:53.668 8514 8514 I auditd : type=1400 audit(0.0:503): avc: denied { execute_no_trans } for comm="sh" path="/system/bin/tcpdump" dev="overlay" ino=502 scontext=u:r:sced:s0 tcontext=u:object_r:tcpdump_exec:s0 tclass=file permissive=1
04-08 23:58:53.668 8514 8514 I auditd : type=1400 audit(0.0:504): avc: denied { map } for comm="tcpdump" path="/system/bin/tcpdump" dev="overlay" ino=502 scontext=u:r:sced:s0 tcontext=u:object_r:tcpdump_exec:s0 tclass=file permissive=1
04-08 23:58:53.680 8514 8514 I auditd : type=1400 audit(0.0:505): avc: denied { create } for comm="tcpdump" scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-08 23:58:53.680 8514 8514 I auditd : type=1400 audit(0.0:506): avc: denied { net_raw } for comm="tcpdump" capability=13 scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=capability permissive=1
04-08 23:58:53.680 8514 8514 I auditd : type=1400 audit(0.0:507): avc: denied { ioctl } for comm="tcpdump" path="socket:[96140]" dev="sockfs" ino=96140 ioctlcmd=0x8933 scontext=u:r:sced:s0 tcontext=u:r:sced:s0 tclass=packet_socket permissive=1
04-13 19:19:38.493 1000 403 403 I auditd : avc: denied { find } for interface=vendor.samsung_slsi.telephony.hardware.oemservice::IOemService sid=u:r:sced:s0 pid=909 scontext=u:r:sced:s0 tcontext=u:object_r:hal_vendor_oem_hwservice:s0 tclass=hwservice_manager permissive=0
04-13 21:40:13.054 404 404 I auditd : avc: denied { add } for interface=vendor.samsung_slsi.telephony.hardware.oemservice::IOemService sid=u:r:sced:s0 pid=911 scontext=u:r:sced:s0 tcontext=u:object_r:hal_vendor_oem_hwservice:s0 tclass=hwservice_manager permissive=1
04-13 21:40:13.055 404 404 I auditd : avc: denied { add } for interface=android.hidl.base::IBase sid=u:r:sced:s0 pid=911 scontext=u:r:sced:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
Bug: 184921478
Test: manual test
Change-Id: I39eb403272a8a4fba0728c9f8eab5ea23096a540
2021-04-14 18:18:55 +08:00
Adam Shih
6c77867c16
Merge "change assigned bug" into sc-dev am: 65355b49a3
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14167787
Change-Id: Ide6ac2b00c2a571517c3496a95a84aed22b9428c
2021-04-14 08:01:55 +00:00
Adam Shih
42c83f05e5
Merge "change assigned bug" into sc-dev am: 65355b49a3
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14167787
Change-Id: I23f0d624063b78900c88c375df8c242c889d1640
2021-04-14 07:56:12 +00:00
Adam Shih
65355b49a3
Merge "change assigned bug" into sc-dev
2021-04-14 07:09:32 +00:00
Ray Chi
f4589fecba
usb: Add sepolicy for extcon access
...
USB gadget hal will access extcon folder so that this patch
will add new rule to allow USB gadget hal to access extcon.
Bug: 185302867
Test: apply the rule and verify it
Change-Id: I0bc44dbf89a02c4fa5b561baf1c0c1c43d5183e9
2021-04-14 14:36:44 +08:00
SalmaxChang
eac287b429
Add more modem properties am: f23a4423c4
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14173742
Change-Id: I2d5ad4b11041c31259bcda951ea8463653be1c2a
2021-04-14 05:50:35 +00:00
SalmaxChang
335dfc11c3
Add more modem properties am: f23a4423c4
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14173742
Change-Id: I4e6ae1e9739e895de2499f8b97b1fc0ce0426998
2021-04-14 05:44:57 +00:00
SalmaxChang
f23a4423c4
Add more modem properties
...
init : Do not have permissions to set 'ro.vendor.sys.modem.logging.loc' to '/data/vendor/slog' in property file '/vendor/build.prop': SELinux permission check failed
Bug: 184101903
Change-Id: I8c2dfd48e177e4a5127c1efd977c0f6c18b50379
2021-04-14 04:46:32 +00:00
Roshan Pius
2b15027412
Uwb: Create a new Uwb system service am: 8119d482ed
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14057967
Change-Id: I8b6f621cfc308e31b746388329af060420f528e9
2021-04-14 03:48:04 +00:00
Roshan Pius
7658d333ea
Uwb: Create a new Uwb system service am: 8119d482ed
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14057967
Change-Id: I3b402d319fe6527c2f227494546320586970c742
2021-04-14 03:42:09 +00:00
Ilya Matyukhin
d22884d3cd
Merge "Add sepolicy for SystemUIGoogle to write to lhbm" into sc-dev am: 75d0cce94f
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14105113
Change-Id: Iaaf7aacccae46d584eacc2f687f31583d6c605b2
2021-04-14 01:31:44 +00:00
Ilya Matyukhin
0226800307
Merge "Add sepolicy for SystemUIGoogle to write to lhbm" into sc-dev am: 75d0cce94f
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14105113
Change-Id: I232b907292500d053fa55696a388a04c1bdd9879
2021-04-14 01:25:39 +00:00
Roshan Pius
8119d482ed
Uwb: Create a new Uwb system service
...
Move the vendor service to a different name which will be used by AOSP
uwb service.
Also, create a new domain for the UWB vendor app which can expose this
vendor service.
Denials:
04-12 16:38:38.282 411 411 E SELinux : avc: denied { find } for pid=2964
uid=1000 name=tethering scontext=u:r:uwb_vendor_app:s0:c232,c259,c512,c768
tcontext=u:object_r:tethering_service:s0 tclass=service_manager permissive=0
04-12 17:56:49.320 411 411 E SELinux : avc: denied { find } for pid=2964
uid=1000 name=hardware.qorvo.uwb.IUwb/default scontext=u:r:uwb_vendor_app:s0:c232,c259,c512,c768
tcontext=u:object_r:hal_uwb_service:s0 tclass=service_manager permissive=0
04-12 20:13:37.952 3034 3034 W com.qorvo.uwb: type=1400 audit(0.0:8): avc: denied
{ getattr } for path="/data/user/0/com.qorvo.uwb" dev="dm-11" ino=7176
scontext=u:r:uwb_vendor_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0
tclass=dir permissive=0
04-12 20:13:38.003 408 408 E SELinux : avc: denied { find } for pid=3034
uid=1000 name=content_capture scontext=u:r:uwb_vendor_app:s0:c232,c259,c512,c768
tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=0
04-12 21:25:03.244 2992 2992 W com.qorvo.uwb: type=1400 audit(0.0:7): avc: denied
{ getattr } for path="/data/user/0/com.qorvo.uwb" dev="dm-11" ino=7176
scontext=u:r:uwb_vendor_app:s0:c232,c259,c512,c768 tcontext=u:object_r:
system_app_data_file:s0:c232,c259,c512,c768 tclass=dir permissive=0
Bug: 183904955
Test: atest android.uwb.cts.UwbManagerTest
Change-Id: Iecb871902ebe7d110f2deb9ddb960c1a3945d8e9
2021-04-13 17:54:42 -07:00
Ilya Matyukhin
75d0cce94f
Merge "Add sepolicy for SystemUIGoogle to write to lhbm" into sc-dev
2021-04-14 00:16:35 +00:00
Vova Sharaienko
b0a79e65a1
wirelesscharger-adapter: updated sepolicy am: 72f80a3c90
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14176231
Change-Id: Id446f4625b0d89a27365d3385395ef190f6cf0e2
2021-04-13 23:53:23 +00:00
Vova Sharaienko
54fbaee2e2
wirelesscharger-adapter: updated sepolicy am: 72f80a3c90
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14176231
Change-Id: I8c5bd90516347079ea1a51e744614f4d30921805
2021-04-13 23:48:26 +00:00
Vova Sharaienko
72f80a3c90
wirelesscharger-adapter: updated sepolicy
...
This allows the wirelesscharger-adapter to access AIDL Stats service
Bug: 181892307
Test: Build, flash, boot & and logcat | grep "platform_app"
Change-Id: I801e801133e4c7a0977f6c1e816b7c64135f59a3
2021-04-13 19:26:01 +00:00
Ilya Matyukhin
acf6b1f5ae
Add sepolicy for SystemUIGoogle to write to lhbm
...
Bug: 184768835
Bug: 182520014
Test: adb logcat | grep "avc: denied"
Change-Id: Ia200983c87e0b826a0b62052e65cc731453a632f
2021-04-13 11:26:34 -07:00
TreeHugger Robot
ad6d6919ec
Merge "logger_app: Remove Pixelize rule" into sc-dev am: 421bee976b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13805048
Change-Id: I3fcb8e777ebb3b22be823603eb9260a45762e9e5
2021-04-13 12:37:11 +00:00
TreeHugger Robot
2a113e7403
Merge "Fix Android GPU Inspector (AGI) support" into sc-dev am: f7c08818e6
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14160223
Change-Id: Id30e6d4082331c23514da82d3f515e9da4a0abd8
2021-04-13 12:36:39 +00:00
TreeHugger Robot
421bee976b
Merge "logger_app: Remove Pixelize rule" into sc-dev
2021-04-13 11:54:20 +00:00
TreeHugger Robot
f7c08818e6
Merge "Fix Android GPU Inspector (AGI) support" into sc-dev
2021-04-13 10:27:29 +00:00
SalmaxChang
674ed8943f
hal_dumpstate_default: Fix avc error am: cbc7709c10
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14160604
Change-Id: I246ab92b5e9ab33312e78eca151fb8fa6aa80bb9
2021-04-13 08:50:47 +00:00
SalmaxChang
cbc7709c10
hal_dumpstate_default: Fix avc error
...
avc: denied { set } for property=vendor.sys.modem.logging.enable pid=9743 uid=1000 gid=1000 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_modem_prop:s0 tclass=property_service permissive=0
Bug: 185196642
Change-Id: I955271fa4d2d9bc2ef4b306068623f79f5b37c74
2021-04-13 07:43:29 +00:00
Adam Shih
e541cce49b
change assigned bug
...
Bug: 182531832
Test: take bugreport and see no relevant log
Change-Id: I33911bf652c7d21eb2a153e6b6129162434be72f
2021-04-13 15:08:13 +08:00
KRIS CHEN
257a9b2464
Merge "Allow fingerprint hal to access dmabuf_system_heap_device" into sc-dev am: ef5cde63e6
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14112452
Change-Id: I9ee3f7401b214f0544049f6d5743c57566f42496
2021-04-13 06:53:39 +00:00
Adam Shih
77e7ed4983
Merge changes Ieac81e9d,I7c069770 into sc-dev am: a071425509
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14160597
Change-Id: Ib81459027e1949d2b1756e236b5d9ace46dc49e0
2021-04-13 06:53:10 +00:00