Adam Shih
c58780d645
Merge "fix reset problem caused by ims" into sc-dev
2021-03-24 08:13:23 +00:00
Adam Shih
692faeedaf
fix reset problem caused by ims
...
Bug: 183209764
Test: unplug device, reboot, enter sim code and survived
Change-Id: I23c39290731a76ec4a364e4f92d3994254d70eae
2021-03-24 14:31:31 +08:00
TreeHugger Robot
e8ac32ef2e
Merge "Remove tracking_denials/bootanim.te" into sc-dev
2021-03-24 05:06:44 +00:00
TreeHugger Robot
9e41379b9e
Merge "work around for uwb" into sc-dev
2021-03-24 05:01:12 +00:00
SalmaxChang
14d068b640
vendor_init: Update tracking denials
...
Bug: 176528556
Change-Id: I1ad621c14a1705420f63aeb63b0c68452d991f93
2021-03-24 03:49:03 +00:00
Jesse Hall
6efd563361
Remove tracking_denials/bootanim.te
...
The action that was being denied no longer occurs.
Bug: 180567480
Test: boot past bootanim, check audit log
Change-Id: I58a1b307538a1198d69120c0797a9e0542f30bdf
2021-03-23 20:43:59 -07:00
TreeHugger Robot
1bc06a6de6
Merge "update error on ROM 7230950" into sc-dev
2021-03-24 03:28:03 +00:00
TreeHugger Robot
fb3fe04feb
Merge "Add se-policy for new GRIL service and RadioExt hal APIs" into sc-dev
2021-03-24 02:39:23 +00:00
TreeHugger Robot
40df476219
Merge "Add the sepolicy for UWB hal" into sc-dev
2021-03-24 02:13:43 +00:00
Adam Shih
d28724fdb1
update error on ROM 7230950
...
Bug: 183560076
Bug: 183560282
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: I329cd3f1e4c5eed986c21724bf42730bed46ab3b
2021-03-24 10:03:35 +08:00
Adam Shih
77f6de6ea6
work around for uwb
...
Bug: 171943668
Test: dw3000 kthread and uwb service came up fine
Change-Id: I4288e07b9b9a2741bfe64b35bd4681ffe4a66039
2021-03-24 00:41:27 +00:00
TreeHugger Robot
835a255138
Merge "Fix denials for ril_config_service_app" into sc-dev
2021-03-24 00:41:22 +00:00
TreeHugger Robot
d70813575b
Merge "Allow Exoplayer access to the vstream-secure heap for secure playback" into sc-dev
2021-03-24 00:26:19 +00:00
labib
a0c5ec2305
Add se-policy for new GRIL service and RadioExt hal APIs
...
Bug: 172294179
Change-Id: Ief4c7ec7959676126f35037006016e1454a34f5e
2021-03-24 06:16:03 +08:00
Christine Franks
28ab0ae8c3
Merge "Add uhid access for exo" into sc-dev
2021-03-23 21:57:15 +00:00
Hridya Valsaraju
fb862c0888
Allow Exoplayer access to the vstream-secure heap for secure playback
...
Fixes the following denials:
avc: denied { read } for name="vstream-secure" dev="tmpfs"
ino=736 scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0 tclass=chr_file permissive=0
app=com.google.android.exoplayer.demo
avc: denied { read } for name="vstream-secure" dev="tmpfs" ino=736
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0
tclass=chr_file permissive=0 app=com.google.android.exoplayer.demo
avc: denied { read } for name="vstream-secure" dev="tmpfs" ino=736
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0
tclass=chr_file permissive=0 app=com.google.android.exoplayer.demo
Bug: 178865267
Test: no more denials
Change-Id: I6612bd56c49558b13e2ae72cfbf3552715729e7a
Signed-off-by: Hridya Valsaraju <hridya@google.com>
2021-03-23 14:37:01 -07:00
Greg Kaiser
9ec1be4eb9
Merge "Revert "Add se-policy for new GRIL service and RadioExt hal APIs"" into sc-dev
2021-03-23 19:12:13 +00:00
LABIB MD RASHID
97bfa35d4f
Revert "Add se-policy for new GRIL service and RadioExt hal APIs"
...
Revert "BT SAR client implementation for GRIL"
Revert submission 13944227-gril-bt-sar
Reason for revert: TreeHugger builds failing due to changes requiring se-linux permissions for GRIL. Need to add permissions for more devices before attempting this change again.
Reverted Changes:
I556657928:Add se-policy for new GRIL service and RadioExt ha...
I96cf9176a:BT SAR client implementation for GRIL
Change-Id: Ib800962d07d305a5a42ee40f019535f663beacd1
2021-03-23 19:00:57 +00:00
TreeHugger Robot
25e39f7d37
Merge "Add se-policy for new GRIL service and RadioExt hal APIs" into sc-dev
2021-03-23 16:02:35 +00:00
TreeHugger Robot
3bf9cddeb7
Merge "modem_svc_sit: Fix avc errors" into sc-dev
2021-03-23 11:16:25 +00:00
TreeHugger Robot
1cf98386f6
Merge "update error on ROM 7228492" into sc-dev
2021-03-23 11:16:22 +00:00
Hongbo Zeng
4211025746
Fix denials for ril_config_service_app
...
- RilConfigService is a common google project in vendor/google/tools,
sync related rules from the previous project(ag/6697240, ag/7153946)
to allow it to:
(1) receive intents
(2) update database files under /data/vendor/radio
(3) update RIL properties
- Two new denials found in this project only:
avc: denied { search } for name="data" dev="dm-7" ino=93
scontext=u:r:ril_config_service_app:s0
tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=1
avc: denied { search } for name="0" dev="dm-7" ino=192
scontext=u:r:ril_config_service_app:s0
tcontext=u:object_r:user_profile_root_file:s0:c512,c768 tclass=dir permissive=1
Bug: 182715439
Test: apply these rules and check there is no denial for
RilConfigService finally
Change-Id: Icfb0e121d0d11600bda900dff0511187518105ab
2021-03-23 17:22:33 +08:00
labib
6516f369ff
Add se-policy for new GRIL service and RadioExt hal APIs
...
Bug: 172294179
Change-Id: I556657928caa441b3530bb371902d5f4ce0be257
2021-03-23 09:20:18 +00:00
SalmaxChang
b4fbecb9fb
modem_svc_sit: Fix avc errors
...
avc: denied { search } for comm="modem_svc_sit" name="vendor" dev="tmpfs" ino=2 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir
avc: denied { write open } for path="/mnt/vendor/modem_userdata/replay/dds.bin" dev="sda7" ino=14 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file
avc: denied { remove_name } for name="dds.bin" dev="sda7" ino=14 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir
Bug: 183467321
Change-Id: Ic5b8fcf324bb0a8b0f6312b3ae755d73a53f0e9c
2021-03-23 15:11:38 +08:00
Adam Shih
01376cbe06
update error on ROM 7228492
...
Bug: 183467306
Bug: 183467321
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: Ia8473c1a4e1f56cc52bc765dea56e3bc497c7cc9
2021-03-23 15:11:24 +08:00
Adam Shih
fd45b5ef27
permission required for adb sideload to work
...
Bug: 183174452
Test: do adb sideload under enforcing mode
Change-Id: I2ba05b22729894d2677859fd33a6370f2ff9d409
2021-03-23 14:23:44 +08:00
TreeHugger Robot
9c46632091
Merge "permissions required for OTA" into sc-dev
2021-03-23 04:45:37 +00:00
Adam Shih
7314a7b522
permissions required for OTA
...
Bug: 183174452
Test: do OTA under enforcing mode
Change-Id: I0edf7703713e24351f57ef0e68096ca03c59e6f8
2021-03-23 09:49:02 +08:00
Krzysztof Kosiński
61e515e4ce
Merge "Add lazy service binary to hal_camera_default domain." into sc-dev
2021-03-23 01:31:50 +00:00
Krzysztof Kosiński
d02e73b966
Add lazy service binary to hal_camera_default domain.
...
Avoids denial logs from init on service (re)start. See bug for
details.
Bug: 183441948
Test: Restarted the service
Change-Id: I9ee9b8099d2ffae4d6a115552800fa844c192132
2021-03-22 16:25:57 -07:00
TreeHugger Robot
8d9094345e
Merge "allow bootctl to read devinfo" into sc-dev
2021-03-22 09:16:23 +00:00
Adam Shih
f05cdba220
allow bootctl to read devinfo
...
Bug: 182705986
Test: boot with no relevant log found
Change-Id: I6d4c699fe1492f8fbcd5b8a9ba98da2fade57bd7
2021-03-22 16:10:22 +08:00
TreeHugger Robot
df64c08266
Merge "update error on ROM 7225160" into sc-dev
2021-03-22 02:52:56 +00:00
David Li
6dce033807
Merge "audio: add /dev/acd-audio_dcdoff_ref for audio effect visualizer" into sc-dev
2021-03-22 02:07:33 +00:00
Adam Shih
38e55f2331
update error on ROM 7225160
...
Bug: 183338483
Bug: 183338543
Bug: 183338421
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: I16548c00f2a2c38b190664a5cc20ae67d04a8454
2021-03-22 09:52:45 +08:00
Christine Franks
a334f079cc
Add uhid access for exo
...
This is required to write input events to /dev/uinput.
Bug: 182854143
Test: n/a
Change-Id: Icd9714a61be62d40d1b3e5e9d7dcb33ce5f0bf6b
2021-03-19 23:31:08 +00:00
Alex Hong
b640326154
Add the sepolicy for UWB hal
...
Bug: 182727934
Test: $ make selinux_policy
Push SELinux modules and check the denials during boot
Change-Id: I630e6e353897a85d1b90c7d8a4250703a4c3a245
2021-03-19 21:42:07 +08:00
TreeHugger Robot
9225f4e5d0
Merge "remove workaround as vendor_init is ready" into sc-dev
2021-03-19 06:43:54 +00:00
Adam Shih
3f6e2bba41
Merge "label missing vibrator sys nodes" into sc-dev
2021-03-19 05:32:27 +00:00
TreeHugger Robot
fc6b81d188
Merge "Add sepolicy rules for fingerprint hal" into sc-dev
2021-03-19 04:37:58 +00:00
Adam Shih
ac6b1273e4
remove workaround as vendor_init is ready
...
Bug: 171942789
Test: boot under enforcing ROM
Change-Id: If4bb070ecf2272dd927ceaeda1882d2fad62b4c3
2021-03-19 11:58:39 +08:00
TreeHugger Robot
4eba688673
Merge "update error on ROM 7219510" into sc-dev
2021-03-19 03:51:31 +00:00
Kris Chen
09996bc810
Add sepolicy rules for fingerprint hal
...
Fixes the following avc denials:
03-18 11:23:15.692 956 956 I android.hardwar: type=1400 audit(0.0:7): avc: denied { read write } for name="trusty-ipc-dev0" dev="tmpfs" ino=691 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:23:15.692 956 956 I android.hardwar: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/trusty-ipc-dev0" dev="tmpfs" ino=691 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:23:15.692 956 956 I android.hardwar: type=1400 audit(0.0:9): avc: denied { ioctl } for path="/dev/trusty-ipc-dev0" dev="tmpfs" ino=691 ioctlcmd=0x7280 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:40:56.072 973 973 I fingerprint@2.1: type=1400 audit(0.0:39): avc: denied { search } for name="battery" dev="sysfs" ino=66502 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
03-18 11:40:56.072 973 973 I fingerprint@2.1: type=1400 audit(0.0:40): avc: denied { read } for name="temp" dev="sysfs" ino=66520 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
03-18 11:40:56.072 973 973 I fingerprint@2.1: type=1400 audit(0.0:41): avc: denied { open } for path="/sys/devices/platform/google,battery/power_supply/battery/temp" dev="sysfs" ino=66520 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
03-18 14:11:23.476 979 979 I fingerprint@2.1: type=1400 audit(0.0:13): avc: denied { search } for name="battery" dev="sysfs" ino=66502 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:9): avc: denied { create } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:10): avc: denied { bind } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:11): avc: denied { write } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:12): avc: denied { read } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:56:30.446 404 404 E SELinux : avc: denied { add } for interface=vendor.goodix.hardware.biometrics.fingerprint::IGoodixFingerprintDaemon sid=u:r:hal_fingerprint_default:s0 pid=967 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager permissive=1
Bug: 171943101
Test: No above avc denials in logcat.
Change-Id: I67b397f86c39625b77ebe6d32d37e42cd87b3f93
2021-03-19 03:41:18 +00:00
TreeHugger Robot
46b51cd204
Merge "power: Add policy to access sysfs_bcl" into sc-dev
2021-03-19 03:39:32 +00:00
Adam Shih
8d2feed7ed
label missing vibrator sys nodes
...
Bug: 182954060
Test: boot with no avc error found
Change-Id: I1ffd97c6646d106c88efe36bfb4483ae44415eaa
2021-03-19 11:14:36 +08:00
George Lee
9c3d77d088
power: Add policy to access sysfs_bcl
...
Bug: 180620276
Test: adb bugreport
dumpstate_board.txt shows:
------ BCL (/sys/devices/virtual/pmic/mitigation/triggered_stats) ------
Source Count Last Triggered Last SOC Last Voltage
smpl_warn 0 0 0 0
ocp_cpu1 0 0 0 0
ocp_cpu2 0 0 0 0
soft_ocp_cpu1 0 0 0 0
soft_ocp_cpu2 0 0 0 0
ocp_tpu 0 0 0 0
soft_ocp_tpu 0 0 0 0
pmic_120c 0 0 0 0
pmic_140c 0 0 0 0
pmic_overheat 0 0 0 0
ocp_gpu 0 0 0 0
soft_ocp_gpu 0 0 0 0
------ IF PMIC (/sys/devices/virtual/pmic/max77759-mitigation/triggered_stats) ------
Source Count Last Triggered Last SOC Last Voltage
VDROOP1 0 0 0 0
VDROOP2 0 0 0 0
BATOILO 0 0 0 0
Signed-off-by: George Lee <geolee@google.com>
Change-Id: If7874e19b8202175071d474502e77748168565ce
2021-03-19 02:56:32 +00:00
Adam Shih
857ea2e064
update error on ROM 7219510
...
Bug: 183161715
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: Id5c7856e7b77600f47df652a95ac342f11c924f5
2021-03-19 10:52:09 +08:00
TreeHugger Robot
9a865e84c7
Merge "Allow fingerprint hal to access fingerprint device" into sc-dev
2021-03-19 02:19:59 +00:00
David Li
fa11af6a07
audio: add /dev/acd-audio_dcdoff_ref for audio effect visualizer
...
Set /dev/acd-audio_dcdoff_ref as u:object_r:aoc_device:s0
crw-rw---- 1 system audio u:object_r:aoc_device:s0 500, 29 2021-03-18 22:19 /dev/acd-audio_dcdoff_ref
Bug: 180984363
Bug: 165719427
Test: make -j128
Test: ls -alZ /dev/acd-audio_dcdoff_ref
Change-Id: If7cd3ef99885730287648afebb222d4f925d325e
2021-03-19 10:10:49 +08:00
Kris Chen
10fda56cd1
Allow fingerprint hal to access fingerprint device
...
Fixes the following avc denials:
03-18 10:57:10.612 947 947 I android.hardwar: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/goodix_fp" dev="tmpfs" ino=482 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:10.632 947 947 I android.hardwar: type=1400 audit(0.0:9): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6707 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:13.672 947 947 I android.hardwar: type=1400 audit(0.0:14): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6706 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:32.704 947 947 I HwBinder:947_1: type=1400 audit(0.0:26): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6705 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
Bug: 171943101
Test: No above avc denials in logcat.
Change-Id: I254a01a2c11fcaba9ad3f387862a8d0ddafffd38
2021-03-18 19:23:54 +08:00