TreeHugger Robot
d70813575b
Merge "Allow Exoplayer access to the vstream-secure heap for secure playback" into sc-dev
2021-03-24 00:26:19 +00:00
labib
a0c5ec2305
Add se-policy for new GRIL service and RadioExt hal APIs
...
Bug: 172294179
Change-Id: Ief4c7ec7959676126f35037006016e1454a34f5e
2021-03-24 06:16:03 +08:00
Christine Franks
28ab0ae8c3
Merge "Add uhid access for exo" into sc-dev
2021-03-23 21:57:15 +00:00
Hridya Valsaraju
fb862c0888
Allow Exoplayer access to the vstream-secure heap for secure playback
...
Fixes the following denials:
avc: denied { read } for name="vstream-secure" dev="tmpfs"
ino=736 scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0 tclass=chr_file permissive=0
app=com.google.android.exoplayer.demo
avc: denied { read } for name="vstream-secure" dev="tmpfs" ino=736
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0
tclass=chr_file permissive=0 app=com.google.android.exoplayer.demo
avc: denied { read } for name="vstream-secure" dev="tmpfs" ino=736
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0
tclass=chr_file permissive=0 app=com.google.android.exoplayer.demo
Bug: 178865267
Test: no more denials
Change-Id: I6612bd56c49558b13e2ae72cfbf3552715729e7a
Signed-off-by: Hridya Valsaraju <hridya@google.com>
2021-03-23 14:37:01 -07:00
Greg Kaiser
9ec1be4eb9
Merge "Revert "Add se-policy for new GRIL service and RadioExt hal APIs"" into sc-dev
2021-03-23 19:12:13 +00:00
LABIB MD RASHID
97bfa35d4f
Revert "Add se-policy for new GRIL service and RadioExt hal APIs"
...
Revert "BT SAR client implementation for GRIL"
Revert submission 13944227-gril-bt-sar
Reason for revert: TreeHugger builds failing due to changes requiring se-linux permissions for GRIL. Need to add permissions for more devices before attempting this change again.
Reverted Changes:
I556657928:Add se-policy for new GRIL service and RadioExt ha...
I96cf9176a:BT SAR client implementation for GRIL
Change-Id: Ib800962d07d305a5a42ee40f019535f663beacd1
2021-03-23 19:00:57 +00:00
TreeHugger Robot
25e39f7d37
Merge "Add se-policy for new GRIL service and RadioExt hal APIs" into sc-dev
2021-03-23 16:02:35 +00:00
TreeHugger Robot
3bf9cddeb7
Merge "modem_svc_sit: Fix avc errors" into sc-dev
2021-03-23 11:16:25 +00:00
TreeHugger Robot
1cf98386f6
Merge "update error on ROM 7228492" into sc-dev
2021-03-23 11:16:22 +00:00
Hongbo Zeng
4211025746
Fix denials for ril_config_service_app
...
- RilConfigService is a common google project in vendor/google/tools,
sync related rules from the previous project(ag/6697240, ag/7153946)
to allow it to:
(1) receive intents
(2) update database files under /data/vendor/radio
(3) update RIL properties
- Two new denials found in this project only:
avc: denied { search } for name="data" dev="dm-7" ino=93
scontext=u:r:ril_config_service_app:s0
tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=1
avc: denied { search } for name="0" dev="dm-7" ino=192
scontext=u:r:ril_config_service_app:s0
tcontext=u:object_r:user_profile_root_file:s0:c512,c768 tclass=dir permissive=1
Bug: 182715439
Test: apply these rules and check there is no denial for
RilConfigService finally
Change-Id: Icfb0e121d0d11600bda900dff0511187518105ab
2021-03-23 17:22:33 +08:00
labib
6516f369ff
Add se-policy for new GRIL service and RadioExt hal APIs
...
Bug: 172294179
Change-Id: I556657928caa441b3530bb371902d5f4ce0be257
2021-03-23 09:20:18 +00:00
SalmaxChang
b4fbecb9fb
modem_svc_sit: Fix avc errors
...
avc: denied { search } for comm="modem_svc_sit" name="vendor" dev="tmpfs" ino=2 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir
avc: denied { write open } for path="/mnt/vendor/modem_userdata/replay/dds.bin" dev="sda7" ino=14 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file
avc: denied { remove_name } for name="dds.bin" dev="sda7" ino=14 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir
Bug: 183467321
Change-Id: Ic5b8fcf324bb0a8b0f6312b3ae755d73a53f0e9c
2021-03-23 15:11:38 +08:00
Adam Shih
01376cbe06
update error on ROM 7228492
...
Bug: 183467306
Bug: 183467321
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: Ia8473c1a4e1f56cc52bc765dea56e3bc497c7cc9
2021-03-23 15:11:24 +08:00
Adam Shih
fd45b5ef27
permission required for adb sideload to work
...
Bug: 183174452
Test: do adb sideload under enforcing mode
Change-Id: I2ba05b22729894d2677859fd33a6370f2ff9d409
2021-03-23 14:23:44 +08:00
TreeHugger Robot
9c46632091
Merge "permissions required for OTA" into sc-dev
2021-03-23 04:45:37 +00:00
Adam Shih
7314a7b522
permissions required for OTA
...
Bug: 183174452
Test: do OTA under enforcing mode
Change-Id: I0edf7703713e24351f57ef0e68096ca03c59e6f8
2021-03-23 09:49:02 +08:00
Krzysztof Kosiński
61e515e4ce
Merge "Add lazy service binary to hal_camera_default domain." into sc-dev
2021-03-23 01:31:50 +00:00
Krzysztof Kosiński
d02e73b966
Add lazy service binary to hal_camera_default domain.
...
Avoids denial logs from init on service (re)start. See bug for
details.
Bug: 183441948
Test: Restarted the service
Change-Id: I9ee9b8099d2ffae4d6a115552800fa844c192132
2021-03-22 16:25:57 -07:00
TreeHugger Robot
8d9094345e
Merge "allow bootctl to read devinfo" into sc-dev
2021-03-22 09:16:23 +00:00
Adam Shih
f05cdba220
allow bootctl to read devinfo
...
Bug: 182705986
Test: boot with no relevant log found
Change-Id: I6d4c699fe1492f8fbcd5b8a9ba98da2fade57bd7
2021-03-22 16:10:22 +08:00
TreeHugger Robot
df64c08266
Merge "update error on ROM 7225160" into sc-dev
2021-03-22 02:52:56 +00:00
David Li
6dce033807
Merge "audio: add /dev/acd-audio_dcdoff_ref for audio effect visualizer" into sc-dev
2021-03-22 02:07:33 +00:00
Adam Shih
38e55f2331
update error on ROM 7225160
...
Bug: 183338483
Bug: 183338543
Bug: 183338421
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: I16548c00f2a2c38b190664a5cc20ae67d04a8454
2021-03-22 09:52:45 +08:00
Christine Franks
a334f079cc
Add uhid access for exo
...
This is required to write input events to /dev/uinput.
Bug: 182854143
Test: n/a
Change-Id: Icd9714a61be62d40d1b3e5e9d7dcb33ce5f0bf6b
2021-03-19 23:31:08 +00:00
Alex Hong
b640326154
Add the sepolicy for UWB hal
...
Bug: 182727934
Test: $ make selinux_policy
Push SELinux modules and check the denials during boot
Change-Id: I630e6e353897a85d1b90c7d8a4250703a4c3a245
2021-03-19 21:42:07 +08:00
TreeHugger Robot
9225f4e5d0
Merge "remove workaround as vendor_init is ready" into sc-dev
2021-03-19 06:43:54 +00:00
Adam Shih
3f6e2bba41
Merge "label missing vibrator sys nodes" into sc-dev
2021-03-19 05:32:27 +00:00
TreeHugger Robot
fc6b81d188
Merge "Add sepolicy rules for fingerprint hal" into sc-dev
2021-03-19 04:37:58 +00:00
Adam Shih
ac6b1273e4
remove workaround as vendor_init is ready
...
Bug: 171942789
Test: boot under enforcing ROM
Change-Id: If4bb070ecf2272dd927ceaeda1882d2fad62b4c3
2021-03-19 11:58:39 +08:00
TreeHugger Robot
4eba688673
Merge "update error on ROM 7219510" into sc-dev
2021-03-19 03:51:31 +00:00
Kris Chen
09996bc810
Add sepolicy rules for fingerprint hal
...
Fixes the following avc denials:
03-18 11:23:15.692 956 956 I android.hardwar: type=1400 audit(0.0:7): avc: denied { read write } for name="trusty-ipc-dev0" dev="tmpfs" ino=691 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:23:15.692 956 956 I android.hardwar: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/trusty-ipc-dev0" dev="tmpfs" ino=691 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:23:15.692 956 956 I android.hardwar: type=1400 audit(0.0:9): avc: denied { ioctl } for path="/dev/trusty-ipc-dev0" dev="tmpfs" ino=691 ioctlcmd=0x7280 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:40:56.072 973 973 I fingerprint@2.1: type=1400 audit(0.0:39): avc: denied { search } for name="battery" dev="sysfs" ino=66502 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
03-18 11:40:56.072 973 973 I fingerprint@2.1: type=1400 audit(0.0:40): avc: denied { read } for name="temp" dev="sysfs" ino=66520 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
03-18 11:40:56.072 973 973 I fingerprint@2.1: type=1400 audit(0.0:41): avc: denied { open } for path="/sys/devices/platform/google,battery/power_supply/battery/temp" dev="sysfs" ino=66520 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
03-18 14:11:23.476 979 979 I fingerprint@2.1: type=1400 audit(0.0:13): avc: denied { search } for name="battery" dev="sysfs" ino=66502 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:9): avc: denied { create } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:10): avc: denied { bind } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:11): avc: denied { write } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:12): avc: denied { read } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:56:30.446 404 404 E SELinux : avc: denied { add } for interface=vendor.goodix.hardware.biometrics.fingerprint::IGoodixFingerprintDaemon sid=u:r:hal_fingerprint_default:s0 pid=967 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager permissive=1
Bug: 171943101
Test: No above avc denials in logcat.
Change-Id: I67b397f86c39625b77ebe6d32d37e42cd87b3f93
2021-03-19 03:41:18 +00:00
TreeHugger Robot
46b51cd204
Merge "power: Add policy to access sysfs_bcl" into sc-dev
2021-03-19 03:39:32 +00:00
Adam Shih
8d2feed7ed
label missing vibrator sys nodes
...
Bug: 182954060
Test: boot with no avc error found
Change-Id: I1ffd97c6646d106c88efe36bfb4483ae44415eaa
2021-03-19 11:14:36 +08:00
George Lee
9c3d77d088
power: Add policy to access sysfs_bcl
...
Bug: 180620276
Test: adb bugreport
dumpstate_board.txt shows:
------ BCL (/sys/devices/virtual/pmic/mitigation/triggered_stats) ------
Source Count Last Triggered Last SOC Last Voltage
smpl_warn 0 0 0 0
ocp_cpu1 0 0 0 0
ocp_cpu2 0 0 0 0
soft_ocp_cpu1 0 0 0 0
soft_ocp_cpu2 0 0 0 0
ocp_tpu 0 0 0 0
soft_ocp_tpu 0 0 0 0
pmic_120c 0 0 0 0
pmic_140c 0 0 0 0
pmic_overheat 0 0 0 0
ocp_gpu 0 0 0 0
soft_ocp_gpu 0 0 0 0
------ IF PMIC (/sys/devices/virtual/pmic/max77759-mitigation/triggered_stats) ------
Source Count Last Triggered Last SOC Last Voltage
VDROOP1 0 0 0 0
VDROOP2 0 0 0 0
BATOILO 0 0 0 0
Signed-off-by: George Lee <geolee@google.com>
Change-Id: If7874e19b8202175071d474502e77748168565ce
2021-03-19 02:56:32 +00:00
Adam Shih
857ea2e064
update error on ROM 7219510
...
Bug: 183161715
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: Id5c7856e7b77600f47df652a95ac342f11c924f5
2021-03-19 10:52:09 +08:00
TreeHugger Robot
9a865e84c7
Merge "Allow fingerprint hal to access fingerprint device" into sc-dev
2021-03-19 02:19:59 +00:00
David Li
fa11af6a07
audio: add /dev/acd-audio_dcdoff_ref for audio effect visualizer
...
Set /dev/acd-audio_dcdoff_ref as u:object_r:aoc_device:s0
crw-rw---- 1 system audio u:object_r:aoc_device:s0 500, 29 2021-03-18 22:19 /dev/acd-audio_dcdoff_ref
Bug: 180984363
Bug: 165719427
Test: make -j128
Test: ls -alZ /dev/acd-audio_dcdoff_ref
Change-Id: If7cd3ef99885730287648afebb222d4f925d325e
2021-03-19 10:10:49 +08:00
Kris Chen
10fda56cd1
Allow fingerprint hal to access fingerprint device
...
Fixes the following avc denials:
03-18 10:57:10.612 947 947 I android.hardwar: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/goodix_fp" dev="tmpfs" ino=482 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:10.632 947 947 I android.hardwar: type=1400 audit(0.0:9): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6707 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:13.672 947 947 I android.hardwar: type=1400 audit(0.0:14): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6706 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:32.704 947 947 I HwBinder:947_1: type=1400 audit(0.0:26): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6705 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
Bug: 171943101
Test: No above avc denials in logcat.
Change-Id: I254a01a2c11fcaba9ad3f387862a8d0ddafffd38
2021-03-18 19:23:54 +08:00
TreeHugger Robot
2433a82427
Merge "sepolicy: fix usb hal selinux permission" into sc-dev
2021-03-18 05:47:52 +00:00
SalmaxChang
2797490192
Update vendor_modem_prop and add rules for mds
...
Bug: 181185131
Change-Id: Ie709e08152d23428a687c949359316206843b9fa
2021-03-18 04:48:19 +00:00
TreeHugger Robot
8a191daf92
Merge changes I15473321,Id60bb2e8 into sc-dev
...
* changes:
remove obsolete entries
update error on ROM 7216638
2021-03-18 04:02:01 +00:00
Ines Ayara
338d324e5a
Merge "Add "libedgetpu_darwinn2.so" library duplicate to be used for external launch." into sc-dev
2021-03-18 02:54:19 +00:00
Adam Shih
c36661eb0b
remove obsolete entries
...
Bug: 177389198
Bug: 177860960
Bug: 178752576
Bug: 178753472
Bug: 179310892
Bug: 179437292
Bug: 179437988
Bug: 180656125
Bug: 180960879
Bug: 182705863
Test: boot and grab bugreport with no gmscore error found
Change-Id: I154733215aeca58a76add8d346cc0016a5f0dff7
2021-03-18 10:15:43 +08:00
Adam Shih
15a0c61432
update error on ROM 7216638
...
Bug: 183055762
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: Id60bb2e822734e23803b8f937b71dc59a325c27b
2021-03-18 10:03:37 +08:00
Albert Wang
beb4f82d32
sepolicy: fix usb hal selinux permission
...
avc: denied { read } for name="port0-partner" dev="sysfs" ino=98412 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-6/6-0025/typec/port0/port0-partner" dev="sysfs" ino=98412 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0025/typec/port0/power_role" dev="sysfs" ino=67861 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0025/typec/port0/power_role" dev="sysfs" ino=67861 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
avc: denied { write } for name="port_type" dev="sysfs" ino=71778 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
Bug: 182122983
Test: atest VtsHalUsbV1_0TargetTest
atest HalUsbGadgetV1_0HostTest
Signed-off-by: Albert Wang <albertccwang@google.com>
Change-Id: Ia2cf9061dd5eaa7af582331477afd34db56531e8
2021-03-18 09:51:14 +08:00
TreeHugger Robot
57ec723c5e
Merge "Fix selinux error for vendor_init" into sc-dev
2021-03-18 00:49:15 +00:00
iayara
adeaaead76
Add "libedgetpu_darwinn2.so" library duplicate to be used for external
...
launch.
This change is intended to keep naming consistency with previous
Darwinn external launch. In the future, all "libedgetpu_darwinn2.so"
instances should be replaced by "libedgetpu_util.so".
Bug: 182303547
Change-Id: I99e83f5f2e317b195b2061c781cb23544e547c55
2021-03-17 23:47:07 +00:00
Hridya Valsaraju
2f772dd166
Merge "Add a label for Pixel DMA-BUF heap tracepoints" into sc-dev
2021-03-17 21:58:55 +00:00
Yu-Chi Cheng
a802ac3b05
Merge "Allowed Camera hal to access EdgeTPU service for on-device compilation." into sc-dev
2021-03-17 20:37:44 +00:00
Yu-Chi Cheng
86aa156202
Allowed Camera hal to access EdgeTPU service for on-device compilation.
...
Camera hal DarwiNN pipelines are switching to use the on-device
compilation, which achieves by talking to the EdgeTPU service.
This change added the required selinux policies to allow accessing
the service, as well as allowing file descriptors to be shared
between them for passing the compilation info around.
Bug: 182423730
Bug: 182706078
Test: verified on Oriole running camera.
Change-Id: I5d3bc84fd54d4618f505f37d9773894261061d7f
2021-03-17 08:18:55 -07:00