Commit graph

546 commits

Author SHA1 Message Date
Zhijun He
a8ceb3a751 Grant dumpstate hal read permission of camera hal dump files
Test: Build and capture bugreport
Bug: 178737594
Change-Id: Iae9792a75dec574ff9fe0d246a7c166221565b16
2021-05-17 14:23:46 -07:00
Minchan Kim
304a32c17e sepolicy: gs101: allow duump page_pinner
Provide necessary sepolicy for dumpreport to access page_pinner
information in /sys/kernel/debug/page_pinner/{longterm_pinner,
alloc_contig_failed}

Bug: 187552095
Test: Run "adb bugreport <zip>" and verify it contains the output
      from page_pinner.
Signed-off-by: Minchan Kim <minchan@google.com>
Change-Id: I2abc48f2a156718fd4bed3b51bdd285c6bf9f175
2021-05-17 09:18:50 -07:00
Sidath Senanayake
828114d410 genfs_contexts: Specify correct GPU clock hint node
Bug: 188404581
Bug: 188034128
Signed-off-by: Sidath Senanayake <sidaths@google.com>
Change-Id: Id69f5cf8c95081fea7784520838a3f85aa58589c
2021-05-17 15:44:19 +01:00
qinyiyan
bfbf29c18c Allows the edgetpu_logging service to write to the edgetpu sysfs.
Test: make selinux_policy -j128
Bug: 151063663
Change-Id: I5ac619b34bb6fb17caa4c00ac62ac6802c776d84
2021-05-14 13:54:04 -07:00
Quinn Yan
d2558a05b3 Merge "Add the TPU AIDL NNAPI HAL to the sepolicy." into sc-dev 2021-05-14 20:15:37 +00:00
Kevin DuBois
82408c931b sepolicy: update gpu nnhal file
GPU nnhal needed a file update when update upgrading to 1.3 revision,
modify this so the device uses all the 1.2 rules.

Fixes: 187981206
Test: make sure hal starts
Change-Id: Ie1054fc092f1aa459cd36b6eb0f0a1a5cc032dbc
2021-05-14 10:55:25 -07:00
SHUCHI LILU
60bf6343be Merge "Update avc error on ROM 7358093" into sc-dev 2021-05-14 08:31:59 +00:00
sukiliu
53c9a79002 Update avc error on ROM 7358093
Bug: 188114822
Bug: 188114896
Test: PtsSELinuxTestCases
Change-Id: Ic5e865a921d0db981acfd936e1599a0ab220b975
2021-05-14 14:23:22 +08:00
Midas Chien
b610fd307e Merge "Allowed PowerHAL service access Display node" into sc-dev 2021-05-14 05:47:32 +00:00
qinyiyan
989855def7 Add the TPU AIDL NNAPI HAL to the sepolicy.
Test: Created Forrest build and flashed to phone.
Bug: 187846367
Change-Id: I3ada9ecf3f94a594185049ddb95f13a6853841ba
2021-05-13 22:23:48 -07:00
SalmaxChang
30b9f8f277 rfsd: fix permission error
[RfsService::File] Failed to open file (4) (reason:Permission denied)

Bug: 187148595
Change-Id: Ia553bbc1e1c86b7740b3925679a2da65d3314714
2021-05-14 04:19:50 +00:00
Manish Varma
705ecbe0ab genfs_contexts: fix path for st21nfc i2c devices
Due to recent changes which modifies the device name for i2c devices,
st21nfc device names are now changed from ?-0008 to "i2c-st21nfc"

Bug: 188078957
Test: Verified haptic works and no avc denials when running following command:
$ dmesg | grep avc | grep sysfs
Signed-off-by: Manish Varma <varmam@google.com>
Change-Id: I17464d2d01fb64447dd8828eb8f91e38717fac4c
2021-05-13 17:43:26 -07:00
Manish Varma
fd2a6b9a74 genfs_contexts: fix path for s2mpg1X i2c devices
Due to recent changes which modifies the device name for i2c devices,
s2mpg1xmfd device names are now changed from ?-00?f to "i2c-s2mpg10mfd" or
"i2c-s2mpg11mfd"

Bug: 188078957
Test: Verified no avc denials when running following command:
$ dmesg | grep avc | grep sysfs

Signed-off-by: Manish Varma <varmam@google.com>
Change-Id: I2c58773613071147336b4f338e4c4034ce90e9bd
2021-05-13 17:42:08 -07:00
Manish Varma
194fef8b5a genfs_contexts: fix path for cs40l25a i2c devices
Due to recent changes which modifies the device name for i2c devices,
cs40l25a device names are now changed from ?-0043 to "i2c-cs40l25a"

Bug: 188078957
Test: Verified haptic works and no avc denials when running following command:
$ dmesg | grep avc | grep sysfs

Signed-off-by: Manish Varma <varmam@google.com>
Change-Id: I47c423661d788c467d4cd1602fbc145bd715c67a
2021-05-13 17:37:32 -07:00
Manish Varma
3868f8aa88 genfs_contexts: fix path for max77759tcpc i2c devices
Due to recent changes which modifies the device name for i2c devices,
max77759tcpc device names are now changed from ?-0025 to "i2c-max77759tcpc"

Bug: 188078957
Test: Verified charging works and no avc denials when running
$ dmesg | grep avc | grep sysfs

Signed-off-by: Manish Varma <varmam@google.com>
Change-Id: Ic1f6d018ce74348b4faa937720b50c7924bf9b7a
2021-05-13 17:36:59 -07:00
Manish Varma
b08c98c2b4 genfs_contexts: fix path for p9412 i2c devices
Due to recent changes which modifies the device name for i2c devices,
p9412 device names are now changed from ?-003c to "i2c-p9412"

Bug: 188078957
Test: Verified wlc works and no avc denials when running following command:
$ dmesg | grep avc | grep sysfs

Signed-off-by: Manish Varma <varmam@google.com>
Change-Id: Id0af1122f7182a866ab28c5317db139d8083a45d
2021-05-13 17:36:24 -07:00
Maurice Lam
a1bf959f13 DO NOT MERGE. Revert Exo selinux policies for S
Bug: 188074060
Test: Forrest
Change-Id: I3465d10c3731ae49fec6e6fb7f2873cf2e5b9c23
2021-05-13 19:32:57 +00:00
TreeHugger Robot
775771b811 Merge changes from topic "186500818-set1" into sc-dev
* changes:
  Let debugfs be accessed only for non-user builds
  Label debugfs files correctly
2021-05-13 07:07:13 +00:00
Vineeta Srivastava
14a07e230a Merge "Add sepolicy for the UDFPS antispoof property" into sc-dev 2021-05-12 21:45:44 +00:00
TreeHugger Robot
d4f9ef4303 Merge "Grant vendor_sched sysfs nodes access" into sc-dev 2021-05-12 18:28:51 +00:00
Grace Chen
4b59c5b98e Add selinux permissions for NFC/eSIM firmware upgrade and recovery
Bug: 181246088
Test: Confirm selinux permissions.
Change-Id: I71c59d1afc50e273b840cd2df7600b4e806c0661
2021-05-12 10:07:55 -07:00
TreeHugger Robot
1f594ec562 Merge "Add SELinux policy for allowing dumping GSC info" into sc-dev 2021-05-12 10:02:28 +00:00
TreeHugger Robot
7fd939fdd7 Merge "correctly label networking gadgets" into sc-dev 2021-05-12 07:38:42 +00:00
TreeHugger Robot
9b8e2b7ba8 Merge "bthal: allow bthal to access bluetooth kernel driver logbuffer_btlpm and logbuffer_btuart device node" into sc-dev 2021-05-12 07:06:45 +00:00
TreeHugger Robot
e2a0158fdf Merge "com.qorvo.uwb: signed with dedicated key and running as android.uid.uwb uid" into sc-dev 2021-05-12 06:22:21 +00:00
jonerlin
cb3f59b89e bthal: allow bthal to access bluetooth kernel driver logbuffer_btlpm
and logbuffer_btuart device node

* add sepolicy rules to let bthal can access bluetooth kernel device
  nodes dev/logbuffer_btlpm and dev/logbuffer_tty16 in engineer
  or user debug build

Bug: 177794127
Test: Manually
Change-Id: I5253719df82ca7ef8e64cbd3f2b0ff6d3f088edc
2021-05-12 13:27:40 +08:00
Thierry Strudel
03f4884884 com.qorvo.uwb: signed with dedicated key and running as android.uid.uwb uid
Test:
05-11 21:05:48.077   786   786 I qorvo.uwb.main: UWB HAL start
05-11 21:05:48.078   412   412 I servicemanager: Found hardware.qorvo.uwb.IUwb/default in device VINTF manifest.
05-11 21:05:50.960  1639  1639 W PackageSettings: Missing permission state for package: com.qorvo.uwbtestapp.system
05-11 21:05:53.530  1639  1639 V StorageManagerService: Package com.qorvo.uwb does not have legacy storage
05-11 21:05:53.548  1639  1639 V StorageManagerService: Package com.qorvo.uwbtestapp.system does not have legacy storage
05-11 21:05:56.571  1639  1902 I am_proc_start: [0,3055,1083,com.qorvo.uwb,added application,com.qorvo.uwb]
05-11 21:05:56.571  1639  1902 I ActivityManager: Start proc 3055:com.qorvo.uwb/1083 for added application com.qorvo.uwb
05-11 21:05:56.653  1639  2264 I am_proc_bound: [0,3055,com.qorvo.uwb]
05-11 21:05:56.709  3055  3055 I TetheringManager: registerTetheringEventCallback:com.qorvo.uwb
05-11 21:05:56.710  3055  3055 V GraphicsEnvironment: ANGLE Developer option for 'com.qorvo.uwb' set to: 'default'
05-11 21:06:05.045  1639  1900 I am_pss  : [3055,1083,com.qorvo.uwb,5719040,4239360,0,88702976,2,0,6]
05-11 21:06:07.233  1639  1981 I am_compact: [3055,com.qorvo.uwb,all,84816,39052,44628,0,-816,0,-816,816,26,0,0,-800,0,1921532,-768]
05-11 21:06:38.442   786   786 I qorvo.Uwb: open
05-11 21:06:38.443   786   786 I qorvo.uwb.McpsUtils: ListHardware
05-11 21:06:38.443   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.443   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.443   786   786 I qorvo.uwb.IeeeUtils: ListDevices
05-11 21:06:38.443   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.443   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.443   786   786 I qorvo.uwb.UwbIface: Load calibration on wpan0, hw index: 0
05-11 21:06:38.445   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.445   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.445   786   786 I qorvo.uwb.UwbIface: Load properties on wpan0, hw index: 0
05-11 21:06:38.446   786   786 I qorvo.Uwb: getIface
05-11 21:06:38.449   786   786 I qorvo.uwb.UwbIface: firaController
05-11 21:06:38.449   786   786 I qorvo.Uwb: listHardwareIndex
05-11 21:06:38.449   786   786 I qorvo.uwb.McpsUtils: ListHardware
05-11 21:06:38.449   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.450   786   786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.450   786   786 I qorvo.Uwb: getIface
05-11 21:06:38.450   786   786 I qorvo.uwb.UwbIface: cccController

Bug: 187766150
Signed-off-by: Thierry Strudel <tstrudel@google.com>
Change-Id: Ie667a666a445e907aa99542f1c52046522b5dd02
2021-05-12 04:07:58 +00:00
Taeju Park
1d0e8106f3 Grant vendor_sched sysfs nodes access
Bug: 182509410
Signed-off-by: Taeju Park <taeju@google.com>
Change-Id: I68bf0c6e4f7b53a871a3393cb317bf6c79ace5e3
2021-05-11 21:03:30 -07:00
Wei Wang
53ae55618a Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev 2021-05-12 03:56:58 +00:00
Wei Wang
73b65a0f8b Revert "Grant vendor_sched sysfs nodes access"
This reverts commit 638778c654.

Reason for revert: b/187884708
Bug: 187884708
Change-Id: I60e80246345ca3e827d7b4749f25e2d5c4dddf9d
2021-05-12 03:56:42 +00:00
Kris Chen
00e1b9a704 Add sepolicy for the UDFPS antispoof property
Fixes the following avc denial:
/system/bin/init: type=1107 audit(0.0:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=fingerprint.disable.fake pid=364 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=0'
android.hardwar: type=1400 audit(0.0:7): avc: denied { read } for name="u:object_r:vendor_fingerprint_fake_prop:s0" dev="tmpfs" ino=307 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:vendor_fingerprint_fake_prop:s0 tclass=file permissive=0

Bug: 187394838
Bug: 187562932
Test: Antispoof is disabled by default.
Test: Use the following adb command to manully turn on antispoof.
      "setprop persist.vendor.fingerprint.disable.fake.override 0"
Change-Id: I90d6ea70d5e0e1a125efb902f1fd61ff4b51baa2
2021-05-12 09:48:48 +08:00
TreeHugger Robot
004c299011 Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev 2021-05-12 01:32:03 +00:00
Hridya Valsaraju
70551d2bc9 Let debugfs be accessed only for non-user builds
Since production devices(with user builds) must not mount debugfs,
provide dumpstate HAL permission to access debugfs only in userdebug/eng
builds.

Also, delete dumpstate domain's access to
vendor_dmabuf_debugfs(/d/dma_buf/bufinfo) since dumpstate now obtains
the same information from /sys/kernel/dmabuf.

Test: build
Bug: 186500818
Change-Id: I17007d495fba6332bbf17dc7d030e5c6e4d5248b
2021-05-11 17:35:20 -07:00
Hridya Valsaraju
9e6528da08 Label debugfs files correctly
A few debugfs files are labelled as belonging to both debugfs_type and
sysfs_type. Hence, any client that is provided access to sysfs_type will
automatically be provided access to these files. This patch corrects the
labelling for these files to prevent this.

Test: build
Bug: 186500818
Change-Id: I364a73a960824cc9051610032179fd5caeca09de
2021-05-11 17:35:17 -07:00
Qinchen Gu
ab6df9cc18 Add SELinux policy for allowing dumping GSC info
Bug: 185939493
Test: adb bugreport. Look for GSC-related info.

Change-Id: I30dbb51781526d763205594283ca3b808f45d28f
2021-05-11 17:27:14 -07:00
Wei Wang
3a2d20a1a2 Merge "Grant vendor_sched sysfs nodes access" into sc-dev 2021-05-11 17:24:38 +00:00
Midas Chien
873511167c Allowed PowerHAL service access Display node
Bug: 164411401
Test: boot
Change-Id: Idcc1338bc66a7479aed9efd4d1ebc82efd1b7c4d
2021-05-11 10:23:58 +00:00
sukiliu
99853e483b Update avc error on ROM 7349999
avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:twoshay:s0 tclass=binder permissive=0

Bug: 187795940
Test: PtsSELinuxTestCases
Change-Id: Ib85ee1d52915b292295b21df8df48c18761c088e
2021-05-11 17:24:08 +08:00
Maciej Żenczykowski
60e0a18e2a correctly label networking gadgets
This is to pass system/netd/tests/netd_test.cpp:

TEST(NetdSELinuxTest, CheckProperMTULabels) {
    // Since we expect the egrep regexp to filter everything out,
    // we thus expect no matches and thus a return code of 1
    ASSERT_EQ(W_EXITCODE(1, 0), system("ls -Z /sys/class/net/*/mtu | egrep -q -v "
                                       "'^u:object_r:sysfs_net:s0 /sys/class/net/'"));
}

Test: atest, TreeHugger, manual observation of labeling
Bug: 185962988
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ib4f8aa6cc2e0f5a5bd432bcfe473e550f5c68132
2021-05-11 07:40:38 +00:00
Taeju Park
638778c654 Grant vendor_sched sysfs nodes access
Bug: 182509410
Signed-off-by: Taeju Park <taeju@google.com>
Change-Id: I53a879e904bef3c5b13127404f4f5c422abd46b4
2021-05-11 04:27:23 +00:00
Peter Csaszar
bc525e1a49 pixel-selinux: add SJTAG policies
These are the SELinux policies for the DebugFS files of the SJTAG
kernel interface.

Bug: 184768605
Signed-off-by: Peter Csaszar <pcsaszar@google.com>
Change-Id: I36996d6fd5fe09adb7a36be573cf57f15ea35756
2021-05-10 17:58:04 -07:00
Wei Wang
551505ae05 Merge "Add policy for memlat governor needs create/delete perf events" into sc-dev 2021-05-10 23:59:50 +00:00
Jia-yi Chen
06a0792bf1 Merge "Add high_capacity_start_cpu to u:object_r:sysfs_vendor_sched:s0" into sc-dev 2021-05-10 18:29:41 +00:00
Kyle Lin
1124aeaf32 Add policy for memlat governor needs create/delete perf events
[   31.756984] type=1400 audit(1620144320.436:11): avc: denied { perfmon } for comm="cpuhp/4" capability=38 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability2 permissive=0
[   31.757246] type=1400 audit(1620144320.436:12): avc: denied { sys_admin } for comm="cpuhp/4" capability=21 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
[   31.757352] type=1400 audit(1620144320.436:13): avc: denied { perfmon } for comm="cpuhp/4" capability=38 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability2 permissive=0
[   31.757450] type=1400 audit(1620144320.436:14): avc: denied { sys_admin } for comm="cpuhp/4" capability=21 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
...
...
[  215.584932] type=1400 audit(1620634018.936:191): avc: denied { cpu } for comm="cpuhp/4" scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=perf_event permissive=0

Bug: 187437491
Bug: 170479743
Test: build, boot and suspend/resume test 200 times.

Change-Id: I4fd3d3fb915ca518ffa226f25298c94faaf867f1
2021-05-10 16:18:58 +08:00
chenpaul
6297e8a5a7 Sniffer Logger: Add dontaudit getattr for sysfs_wifi
05-10 15:04:37.376 12958 12958 I auditd  : type=1400 audit(0.0:14): avc: denied { getattr } for comm="wifi_sniffer" path="/sys/wifi/firmware_path" dev="sysfs" ino=81201 scontext=u:r:wifi_sniffer:s0 tcontext=u:object_r:sysfs_wifi:s0 tclass=file permissive=0

Bug: 187583019
Test: Sniffer Logger is workable
Change-Id: I6bce0bb58d951b6be39f58340b6418b328ffe386
2021-05-10 15:28:47 +08:00
JJ Lee
df02b6ef77 Merge "sepolicy: gs101: allow audio hal to use wakelock" into sc-dev 2021-05-10 02:14:07 +00:00
TreeHugger Robot
ec3144742f Merge "vibrator: Remove temporary method" into sc-dev 2021-05-10 01:13:47 +00:00
TreeHugger Robot
a2d2ebd508 Merge changes Ic697ffe8,Idcf38e09 into sc-dev
* changes:
  Remove dumpstate AVC denials dontaudit for twoshay
  Allow dumpstate to access twoshay
2021-05-10 01:11:46 +00:00
TreeHugger Robot
c03c055812 Merge "Allow radioext to communicate with bt hal" into sc-dev 2021-05-08 18:59:51 +00:00
TreeHugger Robot
296f8ddc5d Merge "iwlan: update sepolicy for qualifiednetworksservice" into sc-dev 2021-05-07 23:29:31 +00:00