Commit graph

392 commits

Author SHA1 Message Date
TreeHugger Robot
835a255138 Merge "Fix denials for ril_config_service_app" into sc-dev 2021-03-24 00:41:22 +00:00
TreeHugger Robot
d70813575b Merge "Allow Exoplayer access to the vstream-secure heap for secure playback" into sc-dev 2021-03-24 00:26:19 +00:00
labib
a0c5ec2305 Add se-policy for new GRIL service and RadioExt hal APIs
Bug: 172294179
Change-Id: Ief4c7ec7959676126f35037006016e1454a34f5e
2021-03-24 06:16:03 +08:00
Christine Franks
28ab0ae8c3 Merge "Add uhid access for exo" into sc-dev 2021-03-23 21:57:15 +00:00
Hridya Valsaraju
fb862c0888 Allow Exoplayer access to the vstream-secure heap for secure playback
Fixes the following denials:

avc: denied { read } for name="vstream-secure" dev="tmpfs"
ino=736 scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0 tclass=chr_file permissive=0
app=com.google.android.exoplayer.demo
avc: denied { read } for name="vstream-secure" dev="tmpfs" ino=736
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0
tclass=chr_file permissive=0 app=com.google.android.exoplayer.demo
avc: denied { read } for name="vstream-secure" dev="tmpfs" ino=736
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0
tclass=chr_file permissive=0 app=com.google.android.exoplayer.demo

Bug: 178865267
Test: no more denials
Change-Id: I6612bd56c49558b13e2ae72cfbf3552715729e7a
Signed-off-by: Hridya Valsaraju <hridya@google.com>
2021-03-23 14:37:01 -07:00
Greg Kaiser
9ec1be4eb9 Merge "Revert "Add se-policy for new GRIL service and RadioExt hal APIs"" into sc-dev 2021-03-23 19:12:13 +00:00
LABIB MD RASHID
97bfa35d4f Revert "Add se-policy for new GRIL service and RadioExt hal APIs"
Revert "BT SAR client implementation for GRIL"

Revert submission 13944227-gril-bt-sar

Reason for revert: TreeHugger builds failing due to changes requiring se-linux permissions for GRIL. Need to add permissions for more devices before attempting this change again.

Reverted Changes:
I556657928:Add se-policy for new GRIL service and RadioExt ha...
I96cf9176a:BT SAR client implementation for GRIL

Change-Id: Ib800962d07d305a5a42ee40f019535f663beacd1
2021-03-23 19:00:57 +00:00
TreeHugger Robot
25e39f7d37 Merge "Add se-policy for new GRIL service and RadioExt hal APIs" into sc-dev 2021-03-23 16:02:35 +00:00
TreeHugger Robot
3bf9cddeb7 Merge "modem_svc_sit: Fix avc errors" into sc-dev 2021-03-23 11:16:25 +00:00
TreeHugger Robot
1cf98386f6 Merge "update error on ROM 7228492" into sc-dev 2021-03-23 11:16:22 +00:00
Hongbo Zeng
4211025746 Fix denials for ril_config_service_app
- RilConfigService is a common google project in vendor/google/tools,
  sync related rules from the previous project(ag/6697240, ag/7153946)
  to allow it to:
  (1) receive intents
  (2) update database files under /data/vendor/radio
  (3) update RIL properties
- Two new denials found in this project only:
  avc: denied { search } for name="data" dev="dm-7" ino=93
      scontext=u:r:ril_config_service_app:s0
      tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=1
  avc: denied { search } for name="0" dev="dm-7" ino=192
      scontext=u:r:ril_config_service_app:s0
      tcontext=u:object_r:user_profile_root_file:s0:c512,c768 tclass=dir permissive=1

Bug: 182715439
Test: apply these rules and check there is no denial for
      RilConfigService finally
Change-Id: Icfb0e121d0d11600bda900dff0511187518105ab
2021-03-23 17:22:33 +08:00
labib
6516f369ff Add se-policy for new GRIL service and RadioExt hal APIs
Bug: 172294179
Change-Id: I556657928caa441b3530bb371902d5f4ce0be257
2021-03-23 09:20:18 +00:00
SalmaxChang
b4fbecb9fb modem_svc_sit: Fix avc errors
avc: denied { search } for comm="modem_svc_sit" name="vendor" dev="tmpfs" ino=2 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir
avc: denied { write open } for path="/mnt/vendor/modem_userdata/replay/dds.bin" dev="sda7" ino=14 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file
avc: denied { remove_name } for name="dds.bin" dev="sda7" ino=14 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir

Bug: 183467321
Change-Id: Ic5b8fcf324bb0a8b0f6312b3ae755d73a53f0e9c
2021-03-23 15:11:38 +08:00
Adam Shih
01376cbe06 update error on ROM 7228492
Bug: 183467306
Bug: 183467321
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: Ia8473c1a4e1f56cc52bc765dea56e3bc497c7cc9
2021-03-23 15:11:24 +08:00
Adam Shih
fd45b5ef27 permission required for adb sideload to work
Bug: 183174452
Test: do adb sideload under enforcing mode
Change-Id: I2ba05b22729894d2677859fd33a6370f2ff9d409
2021-03-23 14:23:44 +08:00
TreeHugger Robot
9c46632091 Merge "permissions required for OTA" into sc-dev 2021-03-23 04:45:37 +00:00
Adam Shih
7314a7b522 permissions required for OTA
Bug: 183174452
Test: do OTA under enforcing mode
Change-Id: I0edf7703713e24351f57ef0e68096ca03c59e6f8
2021-03-23 09:49:02 +08:00
Krzysztof Kosiński
61e515e4ce Merge "Add lazy service binary to hal_camera_default domain." into sc-dev 2021-03-23 01:31:50 +00:00
Krzysztof Kosiński
d02e73b966 Add lazy service binary to hal_camera_default domain.
Avoids denial logs from init on service (re)start. See bug for
details.

Bug: 183441948
Test: Restarted the service
Change-Id: I9ee9b8099d2ffae4d6a115552800fa844c192132
2021-03-22 16:25:57 -07:00
TreeHugger Robot
8d9094345e Merge "allow bootctl to read devinfo" into sc-dev 2021-03-22 09:16:23 +00:00
Adam Shih
f05cdba220 allow bootctl to read devinfo
Bug: 182705986
Test: boot with no relevant log found
Change-Id: I6d4c699fe1492f8fbcd5b8a9ba98da2fade57bd7
2021-03-22 16:10:22 +08:00
TreeHugger Robot
df64c08266 Merge "update error on ROM 7225160" into sc-dev 2021-03-22 02:52:56 +00:00
David Li
6dce033807 Merge "audio: add /dev/acd-audio_dcdoff_ref for audio effect visualizer" into sc-dev 2021-03-22 02:07:33 +00:00
Adam Shih
38e55f2331 update error on ROM 7225160
Bug: 183338483
Bug: 183338543
Bug: 183338421
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: I16548c00f2a2c38b190664a5cc20ae67d04a8454
2021-03-22 09:52:45 +08:00
Christine Franks
a334f079cc Add uhid access for exo
This is required to write input events to /dev/uinput.

Bug: 182854143
Test: n/a
Change-Id: Icd9714a61be62d40d1b3e5e9d7dcb33ce5f0bf6b
2021-03-19 23:31:08 +00:00
Alex Hong
b640326154 Add the sepolicy for UWB hal
Bug: 182727934
Test: $ make selinux_policy
      Push SELinux modules and check the denials during boot
Change-Id: I630e6e353897a85d1b90c7d8a4250703a4c3a245
2021-03-19 21:42:07 +08:00
TreeHugger Robot
9225f4e5d0 Merge "remove workaround as vendor_init is ready" into sc-dev 2021-03-19 06:43:54 +00:00
Adam Shih
3f6e2bba41 Merge "label missing vibrator sys nodes" into sc-dev 2021-03-19 05:32:27 +00:00
TreeHugger Robot
fc6b81d188 Merge "Add sepolicy rules for fingerprint hal" into sc-dev 2021-03-19 04:37:58 +00:00
Adam Shih
ac6b1273e4 remove workaround as vendor_init is ready
Bug: 171942789
Test: boot under enforcing ROM
Change-Id: If4bb070ecf2272dd927ceaeda1882d2fad62b4c3
2021-03-19 11:58:39 +08:00
TreeHugger Robot
4eba688673 Merge "update error on ROM 7219510" into sc-dev 2021-03-19 03:51:31 +00:00
Kris Chen
09996bc810 Add sepolicy rules for fingerprint hal
Fixes the following avc denials:
03-18 11:23:15.692   956   956 I android.hardwar: type=1400 audit(0.0:7): avc: denied { read write } for name="trusty-ipc-dev0" dev="tmpfs" ino=691 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:23:15.692   956   956 I android.hardwar: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/trusty-ipc-dev0" dev="tmpfs" ino=691 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:23:15.692   956   956 I android.hardwar: type=1400 audit(0.0:9): avc: denied { ioctl } for path="/dev/trusty-ipc-dev0" dev="tmpfs" ino=691 ioctlcmd=0x7280 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:40:56.072   973   973 I fingerprint@2.1: type=1400 audit(0.0:39): avc: denied { search } for name="battery" dev="sysfs" ino=66502 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
03-18 11:40:56.072   973   973 I fingerprint@2.1: type=1400 audit(0.0:40): avc: denied { read } for name="temp" dev="sysfs" ino=66520 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
03-18 11:40:56.072   973   973 I fingerprint@2.1: type=1400 audit(0.0:41): avc: denied { open } for path="/sys/devices/platform/google,battery/power_supply/battery/temp" dev="sysfs" ino=66520 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
03-18 14:11:23.476   979   979 I fingerprint@2.1: type=1400 audit(0.0:13): avc: denied { search } for name="battery" dev="sysfs" ino=66502 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
03-18 12:03:08.248   978   978 I android.hardwar: type=1400 audit(0.0:9): avc: denied { create } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248   978   978 I android.hardwar: type=1400 audit(0.0:10): avc: denied { bind } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248   978   978 I android.hardwar: type=1400 audit(0.0:11): avc: denied { write } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248   978   978 I android.hardwar: type=1400 audit(0.0:12): avc: denied { read } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:56:30.446   404   404 E SELinux : avc:  denied  { add } for interface=vendor.goodix.hardware.biometrics.fingerprint::IGoodixFingerprintDaemon sid=u:r:hal_fingerprint_default:s0 pid=967 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager permissive=1

Bug: 171943101
Test: No above avc denials in logcat.
Change-Id: I67b397f86c39625b77ebe6d32d37e42cd87b3f93
2021-03-19 03:41:18 +00:00
TreeHugger Robot
46b51cd204 Merge "power: Add policy to access sysfs_bcl" into sc-dev 2021-03-19 03:39:32 +00:00
Adam Shih
8d2feed7ed label missing vibrator sys nodes
Bug: 182954060
Test: boot with no avc error found
Change-Id: I1ffd97c6646d106c88efe36bfb4483ae44415eaa
2021-03-19 11:14:36 +08:00
George Lee
9c3d77d088 power: Add policy to access sysfs_bcl
Bug: 180620276
Test: adb bugreport
dumpstate_board.txt shows:
------ BCL (/sys/devices/virtual/pmic/mitigation/triggered_stats) ------
Source    	Count	Last Triggered	Last SOC	Last Voltage
smpl_warn      	0	0		0		0
ocp_cpu1       	0	0		0		0
ocp_cpu2       	0	0		0		0
soft_ocp_cpu1  	0	0		0		0
soft_ocp_cpu2  	0	0		0		0
ocp_tpu        	0	0		0		0
soft_ocp_tpu   	0	0		0		0
pmic_120c      	0	0		0		0
pmic_140c      	0	0		0		0
pmic_overheat  	0	0		0		0
ocp_gpu        	0	0		0		0
soft_ocp_gpu   	0	0		0		0

------ IF PMIC (/sys/devices/virtual/pmic/max77759-mitigation/triggered_stats) ------
Source    	Count	Last Triggered	Last SOC	Last Voltage
VDROOP1        	0	0		0		0
VDROOP2        	0	0		0		0
BATOILO        	0	0		0		0

Signed-off-by: George Lee <geolee@google.com>
Change-Id: If7874e19b8202175071d474502e77748168565ce
2021-03-19 02:56:32 +00:00
Adam Shih
857ea2e064 update error on ROM 7219510
Bug: 183161715
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: Id5c7856e7b77600f47df652a95ac342f11c924f5
2021-03-19 10:52:09 +08:00
TreeHugger Robot
9a865e84c7 Merge "Allow fingerprint hal to access fingerprint device" into sc-dev 2021-03-19 02:19:59 +00:00
David Li
fa11af6a07 audio: add /dev/acd-audio_dcdoff_ref for audio effect visualizer
Set /dev/acd-audio_dcdoff_ref as u:object_r:aoc_device:s0
crw-rw---- 1 system audio u:object_r:aoc_device:s0  500,  29 2021-03-18 22:19 /dev/acd-audio_dcdoff_ref

Bug: 180984363
Bug: 165719427
Test: make -j128
Test: ls -alZ /dev/acd-audio_dcdoff_ref
Change-Id: If7cd3ef99885730287648afebb222d4f925d325e
2021-03-19 10:10:49 +08:00
Kris Chen
10fda56cd1 Allow fingerprint hal to access fingerprint device
Fixes the following avc denials:
03-18 10:57:10.612   947   947 I android.hardwar: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/goodix_fp" dev="tmpfs" ino=482 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:10.632   947   947 I android.hardwar: type=1400 audit(0.0:9): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6707 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:13.672   947   947 I android.hardwar: type=1400 audit(0.0:14): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6706 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:32.704   947   947 I HwBinder:947_1: type=1400 audit(0.0:26): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6705 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1

Bug: 171943101
Test: No above avc denials in logcat.
Change-Id: I254a01a2c11fcaba9ad3f387862a8d0ddafffd38
2021-03-18 19:23:54 +08:00
TreeHugger Robot
2433a82427 Merge "sepolicy: fix usb hal selinux permission" into sc-dev 2021-03-18 05:47:52 +00:00
SalmaxChang
2797490192 Update vendor_modem_prop and add rules for mds
Bug: 181185131
Change-Id: Ie709e08152d23428a687c949359316206843b9fa
2021-03-18 04:48:19 +00:00
TreeHugger Robot
8a191daf92 Merge changes I15473321,Id60bb2e8 into sc-dev
* changes:
  remove obsolete entries
  update error on ROM 7216638
2021-03-18 04:02:01 +00:00
Ines Ayara
338d324e5a Merge "Add "libedgetpu_darwinn2.so" library duplicate to be used for external launch." into sc-dev 2021-03-18 02:54:19 +00:00
Adam Shih
c36661eb0b remove obsolete entries
Bug: 177389198
Bug: 177860960
Bug: 178752576
Bug: 178753472
Bug: 179310892
Bug: 179437292
Bug: 179437988
Bug: 180656125
Bug: 180960879
Bug: 182705863
Test: boot and grab bugreport with no gmscore error found
Change-Id: I154733215aeca58a76add8d346cc0016a5f0dff7
2021-03-18 10:15:43 +08:00
Adam Shih
15a0c61432 update error on ROM 7216638
Bug: 183055762
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: Id60bb2e822734e23803b8f937b71dc59a325c27b
2021-03-18 10:03:37 +08:00
Albert Wang
beb4f82d32 sepolicy: fix usb hal selinux permission
avc: denied { read } for name="port0-partner" dev="sysfs" ino=98412 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-6/6-0025/typec/port0/port0-partner" dev="sysfs" ino=98412 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0025/typec/port0/power_role" dev="sysfs" ino=67861 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0025/typec/port0/power_role" dev="sysfs" ino=67861 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
avc: denied { write } for name="port_type" dev="sysfs" ino=71778 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1

Bug: 182122983
Test: atest VtsHalUsbV1_0TargetTest
      atest HalUsbGadgetV1_0HostTest
Signed-off-by: Albert Wang <albertccwang@google.com>
Change-Id: Ia2cf9061dd5eaa7af582331477afd34db56531e8
2021-03-18 09:51:14 +08:00
TreeHugger Robot
57ec723c5e Merge "Fix selinux error for vendor_init" into sc-dev 2021-03-18 00:49:15 +00:00
iayara
adeaaead76 Add "libedgetpu_darwinn2.so" library duplicate to be used for external
launch.

This change is intended to keep naming consistency with previous
Darwinn external launch. In the future, all "libedgetpu_darwinn2.so"
instances should be replaced by "libedgetpu_util.so".

Bug: 182303547
Change-Id: I99e83f5f2e317b195b2061c781cb23544e547c55
2021-03-17 23:47:07 +00:00
Hridya Valsaraju
2f772dd166 Merge "Add a label for Pixel DMA-BUF heap tracepoints" into sc-dev 2021-03-17 21:58:55 +00:00
Yu-Chi Cheng
a802ac3b05 Merge "Allowed Camera hal to access EdgeTPU service for on-device compilation." into sc-dev 2021-03-17 20:37:44 +00:00