Commit graph

1256 commits

Author SHA1 Message Date
Anthony Stange
0cfdc0266c Merge "Update SELinux to allow CHRE to talk to the Wifi HAL" into tm-dev 2022-04-14 15:23:23 +00:00
chungkai
953583844f genfs_contexts: fix path for i2c peripheral device
paths are changed when we enable parallel module loading and
reorder the initializtaion of devices.

Test: without avc denial on R4/O6 when booting
Bug: 22754176
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: Ibcd5138170449e24115a0de5c3beda79914d1dc1
2022-04-14 04:45:41 +00:00
Anthony Stange
613bdcdec8 Update SELinux to allow CHRE to talk to the Wifi HAL
Bug: 206614765
Test: Run locally
Change-Id: I73bcf96ed1cab0a101e5f84852a1d82258b9c690
2022-04-12 20:58:12 +00:00
TreeHugger Robot
4e91f5530e Merge "sepolicy: Add policy for persist.vendor.udfps" into tm-dev 2022-04-12 10:56:32 +00:00
Darren Hsu
acb5cc9e03 sepolicy: label charger wakeups for system suspend am: 3c11d8d1c5 am: 4df95c6d08 am: 9b9e2b4f3c
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2060630

Change-Id: Ib0aa15719df8e4e0e7eb673b389d4e0b6be99640
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-12 04:19:48 +00:00
Darren Hsu
4df95c6d08 sepolicy: label charger wakeups for system suspend am: 3c11d8d1c5
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2060630

Change-Id: I058cb3909d972cc5784e507fcb26b46196c33aa4
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-12 03:39:39 +00:00
Badhri Jagan Sridharan
93b8189c2b Merge "Allow usb hal to read contaminantdisable property" into tm-dev 2022-04-11 22:22:28 +00:00
Darren Hsu
3c11d8d1c5 sepolicy: label charger wakeups for system suspend
Bug: 226887726
Test: do bugreport without avc denials
Change-Id: I779b646846da90cdc710145e959644efc4733b3b
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-04-11 10:56:33 +08:00
Badhri Jagan Sridharan
8606aa8a51 Allow usb hal to read contaminantdisable property
avc: denied { read } for comm="android.hardwar" name="u:object_r:vendor_usb_config_prop:s0"
dev="tmpfs" ino=367 scontext=u:r:hal_usb_impl:s0
tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=0

Bug: 227792357
Change-Id: Id4d5ef7c214f0c0f672db28991b9fbe0152530b7
2022-04-07 17:21:15 -07:00
Chung-Kai (Michael) Mei
9a909d4058 Merge changes from topic "gs101_parallel_load_sepolicy" into tm-dev
* changes:
  sepolicy: ignore avc denial
  genfs_contexts: fix path for i2c peripheral devices
2022-04-07 09:33:26 +00:00
Siddharth Kapoor
9d3a25fb29 Merge "Revert "Move ODPM file rule to pixel sepolicy"" into tm-dev 2022-04-07 04:06:31 +00:00
Siddharth Kapoor
13f85a37f3 Revert "Move ODPM file rule to pixel sepolicy"
Revert "Move ODPM file rule to pixel sepolicy"

Revert submission 17215583-odpm_sepolicy_refactor-tm-dev

Reason for revert: build failure tracked in b/228261711
Reverted Changes:
Ic9a89950a:Move ODPM file rule to pixel sepolicy
I24105669b:Move ODPM file rule to pixel sepolicy
I044a285ff:Move ODPM file rule to pixel sepolicy

Change-Id: I36abfddaa5903739f9c5bf65d3c1cd506db9e604
2022-04-07 03:29:56 +00:00
chungkai
8a19d8be9c genfs_contexts: fix path for i2c peripheral devices
paths are changed when we enable parallel module loading and
reorder the initializtaion of devices.

Test: without avc denial on Raven
Bug: 227541760
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: I7d835205696fd727e9be24fcf010ed44bcd5d6ae
2022-04-06 09:15:46 +00:00
Albert Wang
7839be7474 Add more xHCI wakeup path for suspend_control am: e60773b926 am: 092298b579 am: aed8848fb0
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2052478

Change-Id: I251a791b13d863de275ceffc3ba926db9a458c07
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-06 08:42:39 +00:00
Albert Wang
092298b579 Add more xHCI wakeup path for suspend_control am: e60773b926
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2052478

Change-Id: Ib07b92bf159c8b69dcdc7bc17e7f19a44aab20f9
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-06 08:00:41 +00:00
Sam Ou
de81154964 Merge "Move ODPM file rule to pixel sepolicy" into tm-dev 2022-04-06 02:09:38 +00:00
Albert Wang
e60773b926 Add more xHCI wakeup path for suspend_control
To addressdd the xHCI wakeup nodes permission problem, add new nodes:
/devices/platform/11110000.usb/11110000.dwc3/xhci-hcd-exynos.5.auto/usb2/wakeup
/devices/platform/11110000.usb/11110000.dwc3/xhci-hcd-exynos.5.auto/usb3/wakeup

avc: denied { read } for name="wakeup175" dev="sysfs" ino=162091
scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup175
(../../devices/platform/11110000.usb/11110000.dwc3/xhci-hcd-exynos.5.auto/usb2/wakeup/
wakeup175): Permission denied
avc: denied { read } for name="wakeup176" dev="sysfs" ino=162107
scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup176
(../../devices/platform/11110000.usb/11110000.dwc3/xhci-hcd-exynos.5.auto/usb3/wakeup/
wakeup176): Permission denied

Bug: 226056256
Test: test build to verify sepolicy log
Signed-off-by: Albert Wang <albertccwang@google.com>
Change-Id: I7f65597f91db5a16d4f9de4f6bb018bd5b50a965
2022-04-01 09:43:40 +08:00
chungkai
de44d766e4 sched: move sysfs to procfs
Modify name from sysfs_vendor_sched to proc_vendor_sched

Test: without avc denial
Bug: 216207007
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: Ic113b2d8ee1d3ae1ced9985636b17ef1e7657a84
2022-03-29 09:43:32 +00:00
KRIS CHEN
572a8a3372 Merge "Allow hal_fingerprint_default to access sysfs_display" into tm-dev 2022-03-29 01:39:34 +00:00
Badhri Jagan Sridharan
a4b9ad439b android.hardware.usb.IUsb AIDL migration
android.hardware.usb.IUsb is migrated to AIDL and runs in
its own process. android.hardware.usb.gadget.IUsbGadget
is now published in its own exclusive process
(android.hardware.usb.gadget-service). Creating
file_context and moving the selinux linux rules
for IUsbGadget implementation.

Bug: 200993386
Change-Id: Ia8c24610244856490c8271433710afb57d3da157
Merged-In: Ia8c24610244856490c8271433710afb57d3da157
(cherry picked from commit 51735ba3ab)
2022-03-28 17:01:45 +08:00
Darren Hsu
24b4d1b601 Allow hal_power_stats to read sysfs_aoc_dumpstate am: f11f53a3ae am: a0592e36d2
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2044864

Change-Id: I1ae4b99a9fa4fc95f96ee1f36dc500f453653ca7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-03-28 08:17:33 +00:00
Kris Chen
3df0d7812b Allow hal_fingerprint_default to access sysfs_display
Fix the following avc denial:
avc: denied { read } for name="panel_name" dev="sysfs" ino=71133 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=0

Bug: 223687187
Test: build and test fingerprint on device.
Change-Id: Ic2b2cadb97f36643b79de6a8ebfe2232093fe7d7
2022-03-25 14:53:53 +08:00
Darren Hsu
f11f53a3ae Allow hal_power_stats to read sysfs_aoc_dumpstate
avc: denied { read } for comm="android.hardwar" name="restart_count"
dev="sysfs" ino=72823 scontext=u:r:hal_power_stats_default:s0
tcontext=u:object_r:sysfs_aoc_dumpstate:s0 tclass=file permissive=0

Bug: 226173008
Test: check bugreport without avc denials
Change-Id: Ife3a7e00a1ffbcbed7fd8b744f2ac8910931a5fb
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-03-25 11:19:20 +08:00
Darren Hsu
22def09e8a Allow hal_power_stats to read sysfs_aoc_dumpstate
avc: denied { read } for comm="android.hardwar" name="restart_count"
dev="sysfs" ino=72823 scontext=u:r:hal_power_stats_default:s0
tcontext=u:object_r:sysfs_aoc_dumpstate:s0 tclass=file permissive=0

Bug: 226173008
Test: check bugreport without avc denials
Change-Id: Iccd8e4475ba6055d07aedc43de72bd39e6674469
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-03-24 14:53:24 +08:00
Stephane Lee
282c77a88f Fix off-mode (charger) sepolicy for the health interface am: 84a06151a3 am: c35357078d am: 620e6038e2
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2039624

Change-Id: I1da177501cfa887962e7a8133e4b568db9624025
2022-03-24 05:14:06 +00:00
Stephane Lee
620e6038e2 Fix off-mode (charger) sepolicy for the health interface am: 84a06151a3 am: c35357078d
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2039624

Change-Id: Ia59f2cdb6b014a802edad3b76f135a69c21002e9
2022-03-24 04:37:58 +00:00
Jack Wu
d43cfef11c sepolicy: gs101: fix charger_vendor permission denied am: b67138e8ae am: 28efee70de
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2039623

Change-Id: I1802a01e50797f41a63ba0073f5f032a8d49939b
2022-03-24 04:37:57 +00:00
Stephane Lee
84a06151a3 Fix off-mode (charger) sepolicy for the health interface
Bug: 223537397
Test: Ensure that there are no selinux errors for sysfs_batteryinfo in
   off-mode charging

Change-Id: I46fa1b7552eb0655d0545538142131465a337f23
Merged-In: I46fa1b7552eb0655d0545538142131465a337f23
2022-03-23 11:30:31 -07:00
Jack Wu
b67138e8ae sepolicy: gs101: fix charger_vendor permission denied
[   27.025458][  T443] type=1400 audit(1644391560.640:11): avc: denied { search } for comm="android.hardwar" name="vendor" dev="tmpfs" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0
[   26.563658][  T447] type=1400 audit(1644397622.588:5): avc: denied { search } for comm="android.hardwar" name="/" dev="sda1" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=0
[   27.198144][  T442] type=1400 audit(1644398156.152:5): avc: denied { search } for comm="android.hardwar" name="battery" dev="sda1" ino=12 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=0
[   27.327035][  T443] type=1400 audit(1644398785.276:5): avc: denied { read } for comm="android.hardwar" name="defender_active_time" dev="sda1" ino=17 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=0
[   27.355009][  T443] type=1400 audit(1644398785.276:6): avc: denied { write } for comm="android.hardwar" name="defender_charger_time" dev="sda1" ino=16 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=0
[   26.771705][  T444] type=1400 audit(1644379988.804:4): avc: denied { read } for comm="android.hardwar" name="specification_version" dev="sysfs" ino=56257 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=0
[   27.898684][  T445] type=1400 audit(1644392754.928:8): avc: denied { read } for comm="android.hardwar" name="thermal_zone6" dev="sysfs" ino=15901 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=lnk_file permissive=0
[   29.180076][  T447] type=1400 audit(1644397625.200:9): avc: denied { write } for comm="android.hardwar" name="mode" dev="sysfs" ino=15915 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
[   27.043845][  T444] type=1400 audit(1644379988.808:9): avc: denied { search } for comm="android.hardwar" name="thermal" dev="tmpfs" ino=899 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:thermal_link_device:s0 tclass=dir permissive=0
[   27.064916][  T444] type=1400 audit(1644379988.808:10): avc: denied { read } for comm="android.hardwar" name="u:object_r:vendor_battery_defender_prop:s0" dev="tmpfs" ino=306 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=file permissive=0
[   27.356266][  T444] type=1107 audit(1644404450.376:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.battery.defender.state pid=457 uid=1000 gid=1000 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=property_service permissive=0'

Bug: 218485039
Test: manually test, no avc: denied
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I091dbbca35fb833e59fdbc234d74b90bfe74014c
Merged-In: I091dbbca35fb833e59fdbc234d74b90bfe74014c
2022-03-23 11:27:45 -07:00
Roshan Pius
3ffd8035a2 gs-policy: Remove obsolete uwb vendor service rules
This service no longer exists in the UCI stack.

Bug: 186585880
Test: Manual UWB tests
Change-Id: I198a20f85cb24f9e38035fa037609d6541640d9e
2022-03-21 09:19:16 -07:00
Darren Hsu
186f2306d7 sepolicy: reorder genfs labels for system suspend am: 2018f942a7 am: 83e88065fc
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2026063

Change-Id: I732b1d982c15846e2b9ae1365894b4d0ea0f424f
2022-03-17 03:55:26 +00:00
samou
753edef5f6 Move ODPM file rule to pixel sepolicy
Bug: 213257759
Change-Id: Ic9a89950a609efe5434dfedc0aa023312c4192d9
2022-03-16 06:05:52 +00:00
Darren Hsu
2018f942a7 sepolicy: reorder genfs labels for system suspend
Bug: 223683748
Test: check bugreport without relevant avc denials
Change-Id: I66ede69d94bb3cb1a446e1cd5f3250b6f9b7f7e9
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-03-15 11:48:39 +08:00
TreeHugger Robot
e4dfe23d99 Merge "sepolicy: reorder genfs labels for system suspend" into tm-dev 2022-03-15 02:52:34 +00:00
TreeHugger Robot
85f293ab62 Merge "gs-sepolicy(uwb): Changes for new UCI stack" into tm-dev 2022-03-14 16:09:09 +00:00
TeYuan Wang
6052118e99 Move libperfmgr thermal rules to pixel-sepolicy am: f7aba10674 am: fe826745b3 am: faec59da79
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2020535

Change-Id: I44c643184de6294c407c9fc1670b0631faac3e45
2022-03-14 06:22:59 +00:00
TeYuan Wang
faec59da79 Move libperfmgr thermal rules to pixel-sepolicy am: f7aba10674 am: fe826745b3
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2020535

Change-Id: I919c688388bcd8cc320068f6139432b58b3f0ea4
2022-03-14 06:02:51 +00:00
eddielan
17f6a0a1ba sepolicy: Add policy for persist.vendor.udfps
Bug: 222175797
Test: Build Pass
Change-Id: I978325adb5cf25a590b307a38ce2deac4034e656
2022-03-14 10:57:53 +08:00
TeYuan Wang
f7aba10674 Move libperfmgr thermal rules to pixel-sepolicy
Bug: 213257759
Bug: 188579571
Test: build
Change-Id: I9893d53055594bfb4e4dba3d68b53f0fe132617d
2022-03-10 21:28:33 +08:00
Kris Chen
9b54bf3665 Allow hal_fingerprint_default to access fwk_sensor_hwservice
Fix the following avc denial:
avc:  denied  { find } for interface=android.frameworks.sensorservice::ISensorManager sid=u:r:hal_fingerprint_default:s0 pid=1258 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fwk_sensor_hwservice:s0 tclass=hwservice_manager permissive=0

Bug: 197789721
Test: build and test fingerprint on device.
Change-Id: I7494f28e69e5a1b660dc7fbaa528b1088048723b
2022-03-10 16:53:22 +08:00
Darren Hsu
44fcba7efd sepolicy: reorder genfs labels for system suspend
Bug: 223683748
Test: check bugreport without relevant avc denials
Change-Id: I66ede69d94bb3cb1a446e1cd5f3250b6f9b7f7e9
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-03-10 09:19:31 +08:00
Michael Eastwood
ecb7a69d78 Merge "Update SELinux policy to allow camera HAL to send Perfetto trace packets" am: 82a110ba3b am: a45d075fd0 am: ada03db5e0
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2016899

Change-Id: Ic6e51b5ea87b5d682f406a9711d39d80c4b29a9c
2022-03-09 18:55:19 +00:00
Michael Eastwood
ada03db5e0 Merge "Update SELinux policy to allow camera HAL to send Perfetto trace packets" am: 82a110ba3b am: a45d075fd0
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2016899

Change-Id: I2b73c3f4576a4f42f76afbf7b8e75fd3be838107
2022-03-09 18:32:59 +00:00
Michael Eastwood
82a110ba3b Merge "Update SELinux policy to allow camera HAL to send Perfetto trace packets" 2022-03-09 17:31:28 +00:00
Michael Eastwood
f648f3c989 Update SELinux policy to allow camera HAL to send Perfetto trace packets
Example denials:

03-04 04:25:37.524   823   823 I TracingMuxer: type=1400 audit(0.0:31): avc: denied { use } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext=u:r:tr
aced:s0 tclass=fd permissive=1
03-04 04:25:37.524   823   823 I TracingMuxer: type=1400 audit(0.0:32): avc: denied { read write } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext
=u:object_r:traced_tmpfs:s0 tclass=file permissive=1
03-04 04:25:37.524   823   823 I TracingMuxer: type=1400 audit(0.0:33): avc: denied { getattr } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext=u:
object_r:traced_tmpfs:s0 tclass=file permissive=1
03-04 04:25:37.524   823   823 I TracingMuxer: type=1400 audit(0.0:34): avc: denied { map } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:traced_tmpfs:s0 tclass=file permissive=1

Bug: 222684359
Test: Build and push new SELinux policy. Verify that trace packets are received by Perfetto.
Change-Id: I0180c6bccf8cb65f444b8fb687ab48422c211bac
2022-03-08 13:54:34 -08:00
Darren Hsu
c3d3c574f4 sepolicy: fix VTS failure for SuspendSepolicyTests
Label the common parent wakeup path instead of each
individual wakeup source to avoid bloating the genfs
contexts.

Bug: 221174227
Test: run vts -m SuspendSepolicyTests
Change-Id: I83a074840198aba323805fd455ee78a0e57174ac
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-03-08 20:57:42 +08:00
Roshan Pius
34c5b9b239 gs-sepolicy(uwb): Changes for new UCI stack
1. Rename uwb vendor app.
2. Rename uwb vendor HAL binary name & service name.
3. Allow vendor HAL to host the AOSP UWB HAL service.
4. Allow NFC HAL to access uwb calibration files.

Bug: 186585880
Test: Manual Tests
Change-Id: I2c7c2466f42317d643634e24b1efb1855e673d09
2022-03-06 18:15:16 -08:00
Tri Vo
56b17a34c8 Merge "Don't audit storageproxyd unlabeled access" am: fbf92e2ada am: 22f2ffcbee am: a5ccc7efa8
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2007441

Change-Id: I58998bc0820db2eeb6f2362a604aaff81159594e
2022-03-04 18:50:56 +00:00
Tri Vo
a5ccc7efa8 Merge "Don't audit storageproxyd unlabeled access" am: fbf92e2ada am: 22f2ffcbee
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2007441

Change-Id: Ie2af054a900f32cbde1352ba9f708e163f76d86c
2022-03-04 18:29:27 +00:00
Tri Vo
22f2ffcbee Merge "Don't audit storageproxyd unlabeled access" am: fbf92e2ada
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2007441

Change-Id: I7b9186af0cb135241e23504fa9d6f7c3d6718c7c
2022-03-04 18:06:53 +00:00