Commit graph

637 commits

Author SHA1 Message Date
Max Kogan
5374497df5 Add AoC wakeup stats to dump state
Need add support for wakeup stats to track AoC to AP messages
resulting in frequent wake-ups.

Bug: 192668026
Change-Id: I073406cc101e114135c863b0e0b86357e93c0415
2021-07-26 22:45:16 +00:00
Jack Wu
d6c1a50bba sepolicy: gs101: allows pixelstat to access pca file nodes
07-23 14:24:45.512  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:10): avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:45.512  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:11): avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:12): avc: denied { read } for name="chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:13): avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:14): avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0057/chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
07-23 14:24:57.536  1000  3001  3001 I pixelstats-vend: type=1400 audit(0.0:15): avc: denied { write } for name="chg_stats" dev="sysfs" ino=72245 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1

Bug: 194386750
Test: manually test, no avc: denied
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I1a16edb5bb7820f62b3ce598aa50eba2d9455927
2021-07-24 06:42:39 +00:00
TreeHugger Robot
b3225f0f6c Merge "Add SE policies for memtrack HAL" into sc-dev 2021-07-23 20:52:52 +00:00
Ankit Goyal
0f9820830c Add SE policies for memtrack HAL
Bug: 191966412
Test: adb shell dumpsys meminfo
Change-Id: Ia7ec64840d2bb7c3ae0d61304e109d2ceb9e5f78
2021-07-24 02:18:36 +08:00
Badhri Jagan Sridharan
49804d8d6f Merge "Update Usb hal permissions to allow pushing overheat suez events" into sc-dev 2021-07-22 20:31:13 +00:00
George Lee
79a15eed2a Merge "pixelstats: add bcl directory permission" into sc-dev 2021-07-22 17:03:33 +00:00
Gary Jian
9b5a97d65e Merge "Allow to set vendor_rild_prop for oemrilservice_app" into sc-dev 2021-07-22 08:16:42 +00:00
chened
561ce13d59 gs101: Allow camera hal to create file in persist camera folder
Test: build pass, no cts regression
Bug: 189844464
Change-Id: If150a94f184424f21c509a44001192e36b6ee24a
2021-07-22 07:11:05 +00:00
Badhri Jagan Sridharan
1ebd84703b Update Usb hal permissions to allow pushing overheat suez events
Usb hal now pushes the Usb port overheat event through statsd.
Usb hal also accesses usbc-throttling stats to gather info.

Bug: 193615568
Signed-off-by: Badhri Jagan Sridharan <badhri@google.com>
Change-Id: I4918458bc7a8a25d7655b66d1fe40eafc7ccb070
2021-07-21 14:38:55 -07:00
Sungwoo choi
b47cdf282a Allow to set vendor_rild_prop for oemrilservice_app
Bug: 193367138
Test: make sure no denied logs in oemrilservice_app when access the
radio property

Signed-off-by: Sungwoo choi <sungwoo48.choi@samsung.com>
Change-Id: I9014002476df7b4e650f7a5a2f153e4eca47d23d
2021-07-21 08:01:44 +00:00
Petri Gynther
d12714ccc0 Add vbmeta_vendor_[ab] to file_contexts
Bug: 181909612
Test: build + install + boot to home
Change-Id: Ibb7bd8e5a61d86de1b51a3780a5bfa8cf4caf59b
2021-07-20 23:41:31 -07:00
TreeHugger Robot
b3cc71258b Merge "ims: allow finding mediametrics_service for vendor_ims_app" into sc-dev 2021-07-20 13:00:25 +00:00
Sungjun Park
0612b5aa85 ims: allow finding mediametrics_service for vendor_ims_app
For generate dtmf tone, ImsService find mediametrics_service.
So, added the seplicy rule for finding mediametrics_service.

<Related log>
07-14 15:37:21.391   411   411 E SELinux : avc:  denied  { find } for
pid=2263 uid=10217 name=media.metrics scontext=u:r:vendor_ims_app:s0:
c217,c256,c512,c768 tcontext=u:object_r:mediametrics_service:s0 tclass
=service_manager permissive=0

Bug: 192543653
Signed-off-by: Sungjun Park <sj19385.park@samsung.com>
Change-Id: Ia0f6610ecc454533d9584367694228245afe46e4
2021-07-20 09:35:23 +00:00
Alex Hong
f0589d11df Allow suspend_control to access the AOC wakeup node
Test: Check avc denials during boot
      $ adb shell su 0 dumpsys suspend_control
Bug: 194164089

Change-Id: I9edcf6398f61daec6fdde0f7ac69ddd5d275f753
2021-07-20 09:29:15 +00:00
TreeHugger Robot
fa62e602fc Merge "ssr_detector_app: Add additional vendor dir and crgroup allow for debug" into sc-dev 2021-07-20 06:09:35 +00:00
TreeHugger Robot
f8b8e0cb53 Merge "Add cpm/pca9468 logbuffer directories so that bugreports can take a snapshot" into sc-dev 2021-07-19 20:54:38 +00:00
Andrew LeCain
ff13d1adee Merge "sepolicy allow fingerprint hal to read mfg_data" into sc-dev 2021-07-19 17:46:18 +00:00
Stephane Lee
022b61751e Add cpm/pca9468 logbuffer directories so that bugreports can take a snapshot
Test: adb bugreport; check "dumpstate_board.txt"
Bug: 193894298
Change-Id: I222405ab6d78bd4367a91cc0f13b8d8a0f1ca578
2021-07-16 16:27:42 -07:00
Wenhao Wang
5305955a86 Merge "Add wakelock access for storageproxyd" into sc-dev 2021-07-16 17:12:01 +00:00
Alex Hong
ea6934fda9 Merge "sepolicy: gs101: support tetheroffload hal version 1.y" into sc-dev 2021-07-16 06:28:32 +00:00
Namkyu Kim
4055c31faf sepolicy: gs101: support tetheroffload hal version 1.y
Support both 1.0 and 1.1.

Bug: 186539538
Test: run vts -m VtsHalTetheroffloadControlV1_0TargetTest
      run vts -m VtsHalTetheroffloadControlV1_1TargetTest

Signed-off-by: Namkyu Kim <namkyu78.kim@samsung.com>
Change-Id: I76a26dcd22e1c8985d470a39b9aeae618f459d00
2021-07-16 04:05:21 +00:00
Stephane Lee
ea6996bc52 Merge "odpm: Rename the odpm_config sepolicies to be more consistent" into sc-dev 2021-07-16 01:55:33 +00:00
Wenhao Wang
5c009fb96f Add wakelock access for storageproxyd
The storageproxyd needs a wakelock around the sequence of UFS commands

Bug: 193456223
Test: Trusty storage tests
Change-Id: I1efe3144c8bcc17c056fc3b9b796e080f77991d5
2021-07-15 17:10:31 -07:00
Andrew LeCain
d8d8580281 sepolicy allow fingerprint hal to read mfg_data
declares new device context for mfg_data_block_device
give fp HAL permission to read/write/open
give fp HAL permission to search block_device dir

Bug: 189135413
Test: sideload calibration in enforcing mode.
Change-Id: I19e0cd13fc452b42c3f35772c4bafd433dbcc8b1
2021-07-15 10:58:53 -07:00
TreeHugger Robot
f0dd8e2957 Merge "Set sepolicy for shell script of disabling contaminant detection" into sc-dev 2021-07-15 16:17:40 +00:00
Darren Hsu
3050ed8ed9 Set sepolicy for shell script of disabling contaminant detection
The avc denials are listed in b/192208389#comment10.

Bug: 192208389
Test: Manually tested
Change-Id: Ib2e3cf498851c0c9e5e74aacc9bf391549c0ad1a
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2021-07-15 11:11:11 +08:00
Stephane Lee
c7342a7824 odpm: Rename the odpm_config sepolicies to be more consistent
Test: Ensure that there are no sepolicy errors on odpm_config
Bug: 192674986
Change-Id: I3043a544511c8c3051e1bd10e9f6b668b251cf5f
2021-07-14 16:11:51 -07:00
TreeHugger Robot
e7aab2cbdd Merge "Add create perm for tee" into sc-dev 2021-07-14 01:01:53 +00:00
Wenhao Wang
c60e44c29e Add create perm for tee
The storageproxyd needs to create persist/ss from scratch.
So we add the create perm.

Bug: 193489307
Test: Trusty storage tests
Change-Id: Ida1c07acac26494ae6bba0392fb2da0425803608
2021-07-13 16:26:17 -07:00
Stephane Lee
2046513eb7 Add DC Charging to server configurable parameters; ensure the sysfs node is writable
hal_googlebattery will be writing to:
/sys/devices/platform/google,cpm/dc_ctl

Test: Ensure there are no errors on logcat | grep google_battery@
Bug: 183772980

Change-Id: Id4490d6de161eefe63c36c01d497696b16c6292d
2021-07-12 13:27:54 -07:00
SalmaxChang
12370586c9 init: change overlayfs_file rule to dontaudit
Workaround for modem_img being unlabeled after disable-verity.

Bug: 193113005

Change-Id: I64b528d9952849ff73bcd583211d33c3b220438d
2021-07-09 23:27:30 +08:00
Meng Wang
1c6e5c01eb Merge "[RCS] Update sepolicy for RCS" into sc-dev 2021-07-08 17:14:51 +00:00
Bo-Yuan Ye
20dd1ef66c [3A Coordinator] Enable to property_set for log.tag. prefix
major changes:
        1. add log_tag_prop for hal_camera_default

Test: go/p21-camera-test-checklist
Bug: 191923902
Change-Id: I767c235666c6761af6d21178d829a0f7cb8d42c8
2021-07-08 10:15:23 +08:00
KRIS CHEN
ba9051de47 Merge "Add sepolicy rules for fingerprint hal" into sc-dev 2021-07-08 02:05:03 +00:00
Myung-jong Kim
99e75b6ab9 [RCS] Update sepolicy for RCS
Fix seapp_contexts sepolicy for shannon-rcs, where
:shannonrcsservice process exceptions are not handled

Bug: 190581528
Signed-off-by: Myung-jong Kim <mj610.kim@samsung.com>
Change-Id: I15cbf103cea70f6db878305a8fca6b35aa521f9b
2021-07-07 10:57:12 -07:00
Kris Chen
a5c9028ced Add sepolicy rules for fingerprint hal
Fix following avc denial:
servicemanager: type=1400 audit(0.0:8): avc: denied { call } for scontext=u:r:servicemanager:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=binder permissive=0

Bug: 192040144
Test: No above avc denial in logcat.
Change-Id: I1b93474cac4ccb24736bc97665a7ca533ef0a7d3
2021-07-08 00:59:49 +08:00
Maciej Zenczykowski
9b270f0fc5 Merge "add sepolicy for set_usb_irq.sh" into sc-dev 2021-07-07 16:23:13 +00:00
Maciej Żenczykowski
714075eba7 add sepolicy for set_usb_irq.sh
Bug: 185092876
Test: TreeHugger, booted on oriole, enabled/disabled tethering
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I7361a4390197e04b27eaf153a696e3f800f79b55
2021-07-07 16:22:33 +00:00
Randall Huang
d328008234 Fix overlayfs avc denied
avc: denied { rename } for comm="init" name="#b" dev="dm-6" ino=52
scontext=u:r:init:s0 tcontext=u:object_r:overlayfs_file:s0
tclass=file permissive=1

avc: denied { unlink } for comm="init" name="#b" dev="dm-6" ino=53
scontext=u:r:init:s0 tcontext=u:object_r:overlayfs_file:s0
tclass=chr_file permissive=1

Bug: 192617244
Test: boot & adb remount
Signed-off-by: Randall Huang <huangrandall@google.com>
Change-Id: I740ff317520439034d2bf6e0659b1418bf6dac5c
2021-07-06 18:19:04 +08:00
TreeHugger Robot
8318f84aef Merge "Add system file of INT clock to sysfs_fabric group" into sc-dev 2021-07-06 01:12:21 +00:00
Yu(Swim) Chih Ren
3aa97b5012 Add system file of INT clock to sysfs_fabric group
It is for power hal can access system file of INT clock

Bug: 168654554

Test: 1. Check file group of INT clock system file
      2. P21 Camera Test Checklist done

Change-Id: I1952c5d2ae39c338c9d2ccb8db49d1d119943c06
2021-07-06 00:33:55 +00:00
Miller Liang
a21c6081c9 Merge "Fix AAudio avc denied" into sc-dev 2021-07-05 02:32:11 +00:00
millerliang
1e748ab270 Fix AAudio avc denied
E SELinux : avc:  denied  { find } for pid=765 uid=1041 name=audio
scontext=u:r:audioserver:s0 tcontext=u:object_r:audio_service:s0
tclass=service_manager permissive=0

Bug: 191103346
Test: build and run CtsNativeMediaAAudioTestCases
Change-Id: I8e9a41360a382ba5f461818b9f8d6658dd53c62a
2021-07-03 05:40:22 +00:00
TreeHugger Robot
846cba7286 Merge "Fix hal_uwb_default dumpstate SELinux errors" into sc-dev 2021-07-01 08:07:05 +00:00
Michael Ayoubi
56beb62f69 Fix hal_uwb_default dumpstate SELinux errors
Fixes: b/192026913
Test: Run dumpstate and confirm no avc denials

Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: I3d818fb066a834663dc63b8757bd16c08a1a0e9e
2021-07-01 06:55:42 +00:00
Krzysztof Kosiński
6d6a7c96ab Allow Power Stats HAL to access EdgeTPU sysfs files.
Should fix intermittent failures of SELinuxUncheckedDenialBootTest.

Bug: 192485697
Test: build, checked for denials in logcat
Change-Id: I3b9cafd99f9ff343e5ab5c67f5f268e5eb4382d6
2021-06-30 14:02:27 -07:00
Michael Ayoubi
075ba05575 Merge "allow recovery and fastboot to access secure elment" into sc-dev 2021-06-30 17:39:40 +00:00
Jeffrey Carlyle
14fcd5ffaf allow recovery and fastboot to access secure elment
This is to enable clearing of secure element during a master reset.

Bug: 182508814
Test: master reset on device with keys; verified no keys after reset
Signed-off-by: Jeffrey Carlyle <jcarlyle@google.com>
Change-Id: I9bb569e09f8cd6f5640757bd0d10a14ef32946ff
2021-06-30 15:19:22 +09:00
Gazi Yamin Iqbal
2e1cafdfd8 Merge "gs101-sepolicy: allow rlsservice to read display status files" into sc-dev 2021-06-30 05:41:19 +00:00
George Lee
4aa936d63b pixelstats: add bcl directory permission
Bug: 186806028
Test: Local test
$>cmd stats print-logs
$>logcat | grep <atom id>

Signed-off-by: George Lee <geolee@google.com>
Change-Id: I7288a9ab44e2387d37c5442297cf80f5b5428c8f
2021-06-29 16:08:38 -07:00