Commit graph

1042 commits

Author SHA1 Message Date
Adam Shih
d77bc5a970 organize confirmationui settings
Bug: 190331547
Bug: 190331370
Test: build ROM and make sure file and sepolicy is still there
Change-Id: I4cabf9280ab5e21038bcb72615799b7ed0fb1670
2021-06-18 12:56:05 +08:00
Badhri Jagan Sridharan
4632b7aa7d Merge "Add file context for /dev/logbuffer_tcpm" into sc-dev am: d9876fd266
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15019635

Change-Id: Ie59d003bc6d1e74f1b37f440b9f27059156503f6
2021-06-18 03:53:45 +00:00
Badhri Jagan Sridharan
d9876fd266 Merge "Add file context for /dev/logbuffer_tcpm" into sc-dev 2021-06-18 03:38:35 +00:00
Badhri Jagan Sridharan
eb3881dbe7 Add file context for /dev/logbuffer_tcpm
/dev/logbuffer_tcpm gets accessed by dumpstate while bugreport
generation.

Bug: 189792358
Signed-off-by: Badhri Jagan Sridharan <badhri@google.com>
Change-Id: Ica0f3557ad9c41844f8411b0bdf68d66fbba00e5
2021-06-17 16:11:28 -07:00
Craig Dooley
dfdc21e14f Merge "Allow hal_dumpstate to collect AoC statistics" into sc-dev am: 7fe9d053e8
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15000356

Change-Id: I77b03e12df36cdf81bddd1d51d64ea50800d9102
2021-06-17 16:48:35 +00:00
Craig Dooley
7fe9d053e8 Merge "Allow hal_dumpstate to collect AoC statistics" into sc-dev 2021-06-17 16:32:38 +00:00
Franklin He
c53c03b843 Add new sepolicy to allow Power Hint
SELinux policy changes to work with https://googleplex-android-review.git.corp.google.com/c/device/google/gs101/+/14997393
This allows the NNAPI HAL to make IPC calls to the Power HAL in order to request power hints

Bug: 191241561
Test: Pushed new SEPolicy to device, verified no AVC problems when making IPC calls
Change-Id: I8209b3677bedf908901389c07304f4478d0431b0
2021-06-17 07:59:11 +00:00
Yuriy Romanenko
14786d9b40 Allow rlsservice/camera HAL to read /apex/apex-info-list.xml
To detect apex updates

Bug: 188246923
Test: See topic
Change-Id: I28a27741c1c285f8b49a2aa50bc0665143c1b7cb
2021-06-16 20:55:38 -07:00
TreeHugger Robot
a62f3266fc Merge "vendor_telephony_app.te: add selinuxfs:file" into sc-dev am: 502b653380
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14963703

Change-Id: Id09fec7d2642bf8e67bd9425240408bc40728164
2021-06-17 01:43:19 +00:00
TreeHugger Robot
502b653380 Merge "vendor_telephony_app.te: add selinuxfs:file" into sc-dev 2021-06-17 01:14:20 +00:00
Yu-Chi Cheng
067e314a35 Allowed EdgeTPU compilation services (tflite and nnapi) to access am: 643e5a7123
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/15004632

Change-Id: I1c51e2b2c1d0afb0f3660ccc30cf1db51888d644
2021-06-17 01:08:59 +00:00
Yu-Chi Cheng
643e5a7123 Allowed EdgeTPU compilation services (tflite and nnapi) to access
overcommit_memory info.

This is required as part of the compilation process, likely part of
the jemalloc which was added recently.

Bug: 190790251
Test: verified on local P21 device.
Change-Id: I4d90ea92afd7beaa4c4efa6ed509d703764932a1
2021-06-16 16:17:14 -07:00
Craig Dooley
3031b077a3 Allow hal_dumpstate to collect AoC statistics
Bug: 188114650
Signed-off-by: Craig Dooley <dooleyc@google.com>
Change-Id: Iba5525af2c651070b9a5f7769c0439ef320d666b
2021-06-16 17:18:55 +00:00
TreeHugger Robot
41e4576f08 Merge "Add sepolicy for hwcomposer to access lhbm sysfs" into sc-dev am: 11ebd6122e
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14234767

Change-Id: I68363c30b1d6c3668434d277c542ef31a0d2419b
2021-06-16 14:04:36 +00:00
TreeHugger Robot
11ebd6122e Merge "Add sepolicy for hwcomposer to access lhbm sysfs" into sc-dev 2021-06-16 13:51:37 +00:00
Adam Shih
f6940b0869 Merge "remove vcd from user ROM" into sc-dev am: 2cdde93f15
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14934449

Change-Id: Ieb5700288ed53a6d904fe01d790567b1d1704b55
2021-06-16 06:53:24 +00:00
Adam Shih
2cdde93f15 Merge "remove vcd from user ROM" into sc-dev 2021-06-16 06:40:28 +00:00
TreeHugger Robot
a0e1a8e2e4 Merge "Use label persist_ss_file" into sc-dev am: 6550281b13
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14987305

Change-Id: I7cfd671dd52f5422b317a6cd2f12847f65ee9a13
2021-06-16 06:04:10 +00:00
TreeHugger Robot
6550281b13 Merge "Use label persist_ss_file" into sc-dev 2021-06-16 05:45:04 +00:00
SHUCHI LILU
994d1f49da Merge "Update avc error on ROM 7457955" into sc-dev am: 5624d07640
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14980573

Change-Id: If63ce2fb708833204108e529a8b9962cceff5d4c
2021-06-16 01:48:37 +00:00
SHUCHI LILU
5624d07640 Merge "Update avc error on ROM 7457955" into sc-dev 2021-06-16 01:25:10 +00:00
Wenhao Wang
dc0cdc36f3 Use label persist_ss_file
The label "persist_ss_file" was created for "/mnt/vendor/persist/ss(/.*)?".
But we erroneously didn't assign the label to the path.
This patch fixes the error.

Bug: 173971240
Bug: 173032298
Test: Trusty storage tests
Change-Id: I8e891ebd90ae47ab8a4aad1c2b0a3bbb734174d8
2021-06-15 17:24:01 -07:00
sukiliu
673b8f1014 Update avc error on ROM 7457955
Bug: 191132545
Bug: 191133059
Test: PtsSELinuxTestCases
Change-Id: I6a8e7924819734e38c2b6f761eb738f3e4d21c32
2021-06-15 23:23:43 +08:00
Armelle Laine
6e23660e3d Merge "add se-policy to /dev/trusty-log0 so it can be accessed by dumpstate hal" into sc-dev am: 10e8126e2d
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14961880

Change-Id: Icc35b74bb0ac43562583282d2d39dc1eb9646642
2021-06-15 14:51:51 +00:00
Armelle Laine
10e8126e2d Merge "add se-policy to /dev/trusty-log0 so it can be accessed by dumpstate hal" into sc-dev 2021-06-15 14:35:43 +00:00
linpeter
81aaf6cda3 Add sepolicy for hwcomposer to access lhbm sysfs
avc: denied { read write } for comm="android.hardwar" name="local_hbm_mode" dev="sysfs" ino=70189 scontext=u:r:hal_graphics_composer_default:s0 tcontext=u:object_r:sysfs_lhbm:s0 tclass=file permissive=0

Bug: 190563896
test: check avc denied
Change-Id: I0f6abc1244d24781ff3318908b524a889490993d
2021-06-15 19:37:14 +08:00
Jiyoung
02ada4f463 vendor_telephony_app.te: add selinuxfs:file
- add selinuxfs:file for AP TCP dump
- allow userdebug or eng

Bug: 188422036

Signed-off-by: Jiyoung <ji_young.bae@samsung.com>
Change-Id: I9502f9f7320ca4ee298b38e40da0ccf11adfba7f
2021-06-15 15:06:39 +08:00
sukiliu
c8a74f7fce Move oriole bug map to whitechapel folder am: 90ae782e26
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14963698

Change-Id: I20a6b1f291236b26224ca0fe94196b2ca91bd548
2021-06-15 06:16:50 +00:00
sukiliu
90ae782e26 Move oriole bug map to whitechapel folder
Bug: 190563896
Bug: 190671898
Test: PtsSELinuxTestCases
Change-Id: I15f1a6d2ebab9c5794a79abccf3530eb4bfc8307
2021-06-15 04:39:50 +00:00
TreeHugger Robot
d8aa5c7972 Merge "remove obsolete entries" into sc-dev am: 441bae6d1a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14934444

Change-Id: I31f6c2733c5cb977a8625ba473d506bfa50dbcc9
2021-06-15 01:54:09 +00:00
TreeHugger Robot
441bae6d1a Merge "remove obsolete entries" into sc-dev 2021-06-15 01:39:02 +00:00
Rick Yiu
6976531ebe Merge "gs101-sepolicy: Fix avc denial for permissioncontroller_app" into sc-dev am: aa315a6082
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14943962

Change-Id: Ie3aebe5d9b8e6bae0f8e0df65f0bd6a5b8d0d178
2021-06-15 00:40:39 +00:00
Rick Yiu
aa315a6082 Merge "gs101-sepolicy: Fix avc denial for permissioncontroller_app" into sc-dev 2021-06-15 00:28:52 +00:00
Armelle Laine
5bb07db1de add se-policy to /dev/trusty-log0 so it can be accessed by dumpstate hal
reuse logbuffer_device group as dumpstate hal already has read perms
on this group.

Bug: 188285071
Test: adb bugreport to include a trusty section in dumpstate_board.txt
Change-Id: I623a5d450bdbe2ceef4fe460bf31bfe740d847b2
2021-06-13 23:59:37 +00:00
Richard Hsu
4eb4b8c73c Merge "[BugFix] SEPolicy for libedgetpu_darwinn2.so logging to stats service" into sc-dev am: 753e62f39c
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14555068

Change-Id: If0cd3732513d21503d31cd8f9f10756305c33c5c
2021-06-13 06:23:48 +00:00
Richard Hsu
753e62f39c Merge "[BugFix] SEPolicy for libedgetpu_darwinn2.so logging to stats service" into sc-dev 2021-06-13 06:11:41 +00:00
Jayachandran Chinnakkannu
26bcc88a9b Merge "Allow telephony to access the file descriptor of the priv_apps tcp_socket" into sc-dev am: 1c130a7e1d
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14950196

Change-Id: Id9b9f74bf5caf34af4aad329e0ea3b4ee544146f
2021-06-12 17:30:37 +00:00
Jayachandran Chinnakkannu
1c130a7e1d Merge "Allow telephony to access the file descriptor of the priv_apps tcp_socket" into sc-dev 2021-06-12 17:19:33 +00:00
TreeHugger Robot
c5d2eaeccb Merge "qllow priv-app to access Pixel power HAL extension." into sc-dev am: 694694857a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14692156

Change-Id: Idc40fc74a562912a8ee35b8db966c88421778949
2021-06-12 10:27:15 +00:00
Kris Chen
5991ab5ba7 Add sepolicy to let fingerprint access power service am: 7db400b679
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14665430

Change-Id: Id2d4cb0874a39145561fc6deb825a25ec40162d8
2021-06-12 10:27:04 +00:00
TreeHugger Robot
694694857a Merge "qllow priv-app to access Pixel power HAL extension." into sc-dev 2021-06-12 10:22:24 +00:00
Jayachandran C
5492a92a39 Allow telephony to access the file descriptor of the priv_apps tcp_socket
The priv_apps could register for QOS notifications for its tcp_socket.
This change allows telephony to access the file descriptor for the
tcp_socket so it could double check the source and destination address
of the socket when the QOS indication is received from modem.

This addresses the following SE policy denial
auditd  : type=1400 audit(0.0:219): avc: denied { read write } for
comm="ConnectivitySer" path="socket:[98511]" dev="sockfs" ino=98511
scontext=u:r:radio:s0 tcontext=u:r:priv_app:s0:c512,c768 tclass=tcp_socket
permissive=0

Bug: 190580419
Test: Manual
Change-Id: I35d4e1fb06242eb5fcbcb36439a55c11166b149b
2021-06-12 05:18:15 +00:00
Rick Yiu
ad47112c59 gs101-sepolicy: Fix avc denial for permissioncontroller_app
Bug: 190671898
Test: build pass
Change-Id: I3ccfe958892cd27ebbcacc651847d4277d39855b
2021-06-11 18:41:10 +08:00
Adam Shih
d0bb828434 remove vcd from user ROM
Bug: 190331325
Test: build all ROM variants with only user ROM without vcd
Change-Id: If9dc555ee8582b605ccdf9d60c3a9c89cd6634d8
2021-06-11 11:46:22 +08:00
Richard Hsu
8c979899cc [BugFix] SEPolicy for libedgetpu_darwinn2.so logging to stats service
In order to access the darwinn metrics library from the google camera
app (product partition), we need to create an SELinux exception for
the related shared library (in vendor) it uses. This CL adds the same_process_hal_file tag to allow this exception.

Bug: 190661153, 151063663

Test: App can load the .so and not crash after this change.
Before: No permission to access namespace.
(https://paste.googleplex.com/6602755121610752)
After: GCA doesn't crash on load.

Change-Id: I8671732184bbbe283c94d1acd3bb1ff397fe651c
2021-06-10 19:36:35 -07:00
Adam Shih
d00aafac75 remove obsolete entries
Bug: 190672147
Bug: 173969091
Bug: 171760921
Bug: 178331773
Bug: 178752616
Bug: 188752940
Bug: 184005231
Bug: 182086688
Bug: 177176899
Bug: 182953825
Bug: 176528557
Bug: 183935382
Test: boot and do bugreport with no relevant error showed up
Change-Id: I869db698e96d2d6cfd533b7fd24c8c88d39fd0eb
2021-06-11 10:35:59 +08:00
Denny cy Lee
25373353a7 Sepolicy: Remove permission for fuel gauge
Bug: 189811224
Test: manually, read success in enforcing mode
Change-Id: Ie56179980a9946010fb25683e3819cddbfb93cfb
Signed-off-by: Denny cy Lee <dennycylee@google.com>
2021-06-11 09:39:53 +08:00
Kris Chen
7db400b679 Add sepolicy to let fingerprint access power service
Fix the following avc denial:
SELinux : avc:  denied  { find } for pid=1055 uid=1000 name=android.hardware.power.IPower/default scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:hal_power_service:s0 tclass=service_manager permissive=0

Bug: 185893477
Test: Observe from systrace that the CPU frequency is boosted when
      running fingerprint algorithm.
Change-Id: I245058b912ec2af3555154934dbe722b445181a9
2021-06-10 21:31:06 +00:00
Sung-fang Tsai
985aa698c7 qllow priv-app to access Pixel power HAL extension.
SELinux issues to solve:

native  : aion.cc:780 Error loading lib_aion_buffer.so dlopen failed: library "pixel-power-ext-V1-ndk_platform.so" not found: needed by /vendor/lib64/lib_aion_buffer.so in namespace sphal

05-23 10:11:32.055   420   420 E SELinux : avc:  denied  { find } for pid=6630 uid=10089 name=android.hardware.power.IPower/default scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:hal_power_service:s0 tclass=service_manager permissive=0

Bug: 187373665
Test: Passed, procedure listed in b/187373665#comment8 with forrest.
Change-Id: Ice7c69bca4a029a61ca1ccb7087ea01948ae5f24
2021-06-10 17:56:17 +00:00
SHUCHI LILU
7d1fa8b9ce Merge "Update avc error on ROM 7444346" into sc-dev am: 61843906c0
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14928573

Change-Id: I4cfc4f0fb97b796a3a118859ac30399ab15a2446
2021-06-10 11:21:07 +00:00