Chia-Ching Yu
3f91d6417a
Add sepolicy for sensor HAL to read lhbm
...
04-23 08:54:18.000 742 742 I /vendor/bin/hw/android.hardware.sensors@2.0-service.multihal: type=1400 audit(0.0:23): avc: denied { read } for comm=504F5349582074696D6572203430 name="local_hbm_mode" dev="sysfs" ino=70515 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs_lhbm:s0 tclass=file permissive=1
Bug: 181617640
Test: Forrest build with this patch(ab/P22167685).
No local_hbm_mode related avc deined log.
Change-Id: Ibac3317cbca8652885310b1f5af8f4ea4d44a5c4
2021-04-29 03:00:19 +00:00
TreeHugger Robot
7ecd67743c
Merge "Fix android.hardware.drm@1.4-service.clearkey label" into sc-dev
2021-04-28 22:26:38 +00:00
Victor Liu
247097a000
Merge "uwb: allow uwb service to access nfc service" into sc-dev
2021-04-28 20:49:50 +00:00
Chris Fries
2d2adb3e56
Fix android.hardware.drm@1.4-service.clearkey label
...
Bug: 186617617
Change-Id: Icad8008686ef57d4b6c3fca27af41e2b2991f74f
2021-04-28 14:40:02 -05:00
Roger Fang
66634d4d20
sepolicy: gs101: allows pixelstat to access audio metrics nodes
...
audio.service: type=1400 audit(0.0:30): avc: denied { read write } for name="amcs" dev="tmpfs" ino=739 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:amcs_device:s0 tclass=chr_file permissive=0
pixelstats-vend: type=1400 audit(0.0:9): avc: denied { read } for name="speaker_impedance" dev="sysfs" ino=67611 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
HwBinder:696_2: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/amcs" dev="tmpfs" ino=766 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:amcs_device:s0 tclass=chr_file permissive=0
Bug: 171854614
Test: manually test, no avc: denied.
Change-Id: I82ebd22f167200ab3cf59e6525ef43c0be8f722a
2021-04-28 10:52:06 +08:00
TreeHugger Robot
d60ae7dfed
Merge "Add sepolicy for wlan logger and sniffer logger" into sc-dev
2021-04-28 02:12:26 +00:00
TreeHugger Robot
68bbf709c2
Merge "Grant powerhal access to sysfs_devfreq_dir" into sc-dev
2021-04-28 02:03:58 +00:00
Jia-yi Chen
09d5fc647d
Grant powerhal access to sysfs_devfreq_dir
...
Bug: 186576303
Test: Boot & check logcat
Change-Id: Ia07991c3a8a7dfd8388a228fbdec1f28d2f5b4c3
2021-04-27 16:16:02 -07:00
chiayupei
3fefc8a57b
Add sepolicy for sensor HAL accessing AOC sysfs node.
...
Bug: 177943509
Test: make selinux_policy -j128 and push to device.
No hal_sensors_default related avc deined log while suez polling.
Signed-off-by: chiayupei <chiayupei@google.com>
Change-Id: Ie32eaccf551fcb9f2d7bc763c801891f637ccc1a
2021-04-28 03:50:26 +08:00
chenpaul
920b0e11a9
Add sepolicy for wlan logger and sniffer logger
...
Bug: 186069127
Test: Sniffer logger can be start by Pixel Logger app
wlan logger is workable.
Change-Id: I1e7a75a08de37668316b06e066c080e837d7896b
2021-04-27 19:37:28 +08:00
TreeHugger Robot
27c30c1cc6
Merge "update wakeup node" into sc-dev
2021-04-27 08:47:38 +00:00
Adam Shih
72ca81757a
update wakeup node
...
Bug: 186492032
Test: pts-tradefed run pts -m PtsSELinuxTest
-t com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Change-Id: I9bac40334001d4073dae1846a2cd0310d59ebfe7
2021-04-27 15:30:55 +08:00
Adam Shih
ab9437c069
Merge "move vendor_executes_system_violators to userdebug" into sc-dev
2021-04-27 01:01:21 +00:00
TreeHugger Robot
6f18d69b86
Merge "logger_app: Grant access to control usb debug port" into sc-dev
2021-04-26 18:19:35 +00:00
TreeHugger Robot
a18b6c2e99
Merge "usb: Add sepolicy for extcon access" into sc-dev
2021-04-26 10:00:15 +00:00
Nicole Lee
b3dfc87e03
logger_app: Grant access to control usb debug port
...
avc: denied { read } for comm="oid.pixellogger" name="u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=325 scontext=u:r:logger_app:s0:c22,c257,c512,c768 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1 app=com.android.pixellogger
avc: denied { open } for comm="oid.pixellogger" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=325 scontext=u:r:logger_app:s0:c22,c257,c512,c768 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1 app=com.android.pixellogger
avc: denied { set } for property=vendor.usb.config pid=8892 uid=10278 gid=10278 scontext=u:r:logger_app:s0:c22,c257,c512,c768 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=property_service permissive=1
Bug: 186365435
Change-Id: Ie7aef49eee1dd66a6ca6ca9a1a4f8d31cc793551
2021-04-26 11:50:51 +08:00
David Massoud
e03291c6af
Add gs101 specific sysfs_devfreq_cur entries
...
Device specific implementation for go/oag/1676945
Bug: 181850306
Test: See go/oag/1676945
Change-Id: I8a973f400c89ada880edb5566ec31fc6ee7b97c1
2021-04-26 00:56:42 +00:00
Adam Shih
22f18adb26
move vendor_executes_system_violators to userdebug
...
Bug: 186189967
Test: com.google.android.security.gts.SELinuxHostTest#testNoExemptionsForVendorExecutingCore
Change-Id: I277cec72377b647c9af40e32b5582e30e9e3730e
2021-04-26 08:41:02 +08:00
TreeHugger Robot
707d297dd8
Merge "allow RilConfigService to call oemrilhook api" into sc-dev
2021-04-23 17:48:32 +00:00
TreeHugger Robot
16730f3087
Merge "Mark GS101 camera HAL as using Binder." into sc-dev
2021-04-23 00:52:20 +00:00
TreeHugger Robot
0f87f26134
Merge "Allow access to NFC power stats" into sc-dev
2021-04-22 23:38:44 +00:00
TreeHugger Robot
9573fc21a0
Merge "gs101-sepolicy: Allow platform_app to call uwb" into sc-dev
2021-04-22 22:12:28 +00:00
Krzysztof Kosiński
de973d797a
Mark GS101 camera HAL as using Binder.
...
The service implements a public API, so it will communicate over
Binder in both the framework domain and the vendor domain.
Bug: 186067463
Test: boot on oriole & check logs
Change-Id: If5bee474f79b7d14f65351580544c0dcb701d604
2021-04-22 13:50:42 -07:00
Victor Liu
4605f4b82c
uwb: allow uwb service to access nfc service
...
04-22 00:47:16.771 9777 9777 V UwbService: Service: Getting Nfc
adapter 04-22 00:47:16.771 412 412 E SELinux : avc: denied
{ find } for pid=9777 uid=1000 name=nfc scontext=u:r:uwb_vendor_app:
s0:c232,c259,c512,c768 tcontext=u:object_r:nfc_service:s0
tclass=service_manager permissive=1
Bug: 185389669
Test: on device, no avc: denied message
Change-Id: Ib31385d88a68878eaca5e53b4ddeddc5a6e7c87d
2021-04-22 08:51:21 -07:00
Michael Ayoubi
134a3882cc
Merge "gs101: Remove kernel.te after UWB fixes" into sc-dev
2021-04-22 15:11:23 +00:00
eddielan
09e529d78c
Add sepolicy for fpc AIDL HAL
...
Bug: 185464439
Test: Build Pass
Change-Id: I7ac26b2bf50fdfc1d32fb88efc2bee07f0525b0c
2021-04-22 22:01:32 +08:00
Michael Ayoubi
d17f3bad0f
gs101: Remove kernel.te after UWB fixes
...
tracking_denials/kernel.te is no longer needed after fixes from b/182954062.
Bug: 171943668
Test: Add dw3000 module back into build
Compile and test image on Raven
Confirm no avc denial logs are seen and that the dw3000 driver
loads successfully.
Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: I9a8510ed3852c053319a3395871728048a57ecb5
2021-04-22 05:38:21 +00:00
sukiliu
89e016d436
Update avc error on ROM 7302474
...
avc: denied { call } for scontext=u:r:servicemanager:s0 tcontext=u:r:hal_camera_default:s0 tclass=binder permissive=0
Bug: 186067463
Test: PTS SELinuxTest
Change-Id: I2792875a195fa3ca75d6fa57537f81e7dbeb5bac
2021-04-22 11:21:10 +08:00
Benjamin Schwartz
5293925c65
Allow access to NFC power stats
...
Bug: 184722506
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: Ie4b5a6823aacf5e5a84760b1d4872fbb4cc2826d
2021-04-21 11:30:55 -07:00
Wei Wang
aa3d3a3adb
Merge "thermal: add sepolicy rule to access ODPM sysfs" into sc-dev
2021-04-21 15:44:40 +00:00
TreeHugger Robot
11871825f3
Merge "fingerprint: fps hal can connect Stats service" into sc-dev
2021-04-21 09:46:56 +00:00
eddielan
97b2c469fa
fingerprint: fps hal can connect Stats service
...
04-16 23:23:42.746 402 402 E
SELinux : avc: denied { find } for pid=4314 uid=1000
name=android.frameworks.stats.IStats/default
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:fwk_stats_service:s0
tclass=service_manager permissive=0
Bug: 183486186
Test: Build Pass
Change-Id: Ie685db6ffd27bb2ad7936f55b70c3e2e5189b0ed
2021-04-21 09:45:52 +00:00
Aaron Tsai
90ead0f9cb
Update tracking error for Silent Logging tool
...
04-06 20:16:59.772 1000 5754 5754 W RenderThread: type=1400 audit(0.0:17): avc: denied { write } for name="code_cache" dev="dm-7" ino=4477 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
[ 65.233590] type=1400 audit(1618796326.840:4): avc: denied { getattr } for comm="y.silentlogging" path="/data/user/0/com.samsung.slsi.telephony.silentlogging" dev="dm-11" ino=6338 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
[ 65.280798] type=1400 audit(1618796326.888:6): avc: denied { search } for comm="y.silentlogging" name="com.samsung.slsi.telephony.silentlogging" dev="dm-11" ino=6338 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
04-06 21:07:23.576 7458 7458 I auditd : type=1400 audit(0.0:64): avc: denied { create } for comm="RenderThread" name="com.android.skia.shaders_cache" scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=0
04-13 14:14:38.572 1000 8875 8875 I SharedPreferenc: type=1400 audit(0.0:524): avc: denied { read } for name="SHARED_PREF.xml" dev="dm-7" ino=16734 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
04-13 14:14:38.572 1000 8875 8875 I SharedPreferenc: type=1400 audit(0.0:525): avc: denied { read } for name="com.samsung.slsi.telephony.silentlogging_preferences.xml" dev="dm-7" ino=17227 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
04-13 14:14:38.572 1000 8875 8875 I SharedPreferenc: type=1400 audit(0.0:526): avc: denied { getattr } for path="/data/user/0/com.samsung.slsi.telephony.silentlogging/shared_prefs/com.samsung.slsi.telephony.silentlogging_preferences.xml" dev="dm-7" ino=17227 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
04-13 14:14:38.572 1000 8875 8875 I SharedPreferenc: type=1400 audit(0.0:527): avc: denied { getattr } for path="/data/user/0/com.samsung.slsi.telephony.silentlogging/shared_prefs/SHARED_PREF.xml" dev="dm-7" ino=16734 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
04-06 12:02:03.460 1000 9117 9117 W si.sysdebugmode: type=1400 audit(0.0:35): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
04-06 12:02:03.465 1000 9117 9117 W libc : Access denied finding property "persist.input.velocitytracker.strategy"
04-13 15:01:12.636 1000 8718 8718 W y.silentlogging: type=1400 audit(0.0:60): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=131 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
04-13 15:01:12.638 1000 8718 8718 W libc : Access denied finding property "ro.input.resampling"
04-13 15:01:12.724 1000 8718 8718 W y.silentlogging: type=1400 audit(0.0:61): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=131 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
04-13 15:01:12.726 1000 8718 8718 W libc : Access denied finding property "viewroot.profile_rendering"
Bug: 184921478
Test: manual
Change-Id: Ia842b3dcfd8ec2ad30acc065f9caceafdc0458cd
2021-04-21 06:59:01 +00:00
Yu-Chi Cheng
e08f769244
Merge "Allowed EdgeTPU service to generate Perfetto trace." into sc-dev
2021-04-21 01:15:33 +00:00
Yu-Chi Cheng
f5bb17ab49
Allowed EdgeTPU service to generate Perfetto trace.
...
Bug: 185238493
Test: tested on local Oriole
Change-Id: I2973ccedd05d5f6dd06c3044adeb983ffb4628aa
2021-04-20 12:08:42 -07:00
Wenhao Wang
a16b1668be
Merge "Fix selinux for RPMB daemon" into sc-dev
2021-04-20 17:20:50 +00:00
TreeHugger Robot
77725ac5f8
Merge "sepolicy: add cs40l26 haptics modules" into sc-dev
2021-04-20 11:49:51 +00:00
Tai Kuo
0e9abb4ef2
sepolicy: add cs40l26 haptics modules
...
Fix the following avc denial:
avc: denied { module_load } for comm="insmod" path="/vendor_dlkm/lib/modules/cl_dsp.ko" dev="overlay" ino=41 scontext=u:r:init-insmod-sh:s0 tcontext=u:object_r:vendor_file:s0 tclass=system permissive=1
Bug: 184610991
Test: Full built. Check if the avc denial was gone.
Signed-off-by: Tai Kuo <taikuo@google.com>
Change-Id: Ic41ea6a6add818bfdf95e71e20df77b9e06db6c1
2021-04-20 11:43:03 +00:00
TreeHugger Robot
a0fbe1508d
Merge "remove obsolete entry" into sc-dev
2021-04-20 07:52:18 +00:00
Adam Shih
93b498ea78
remove obsolete entry
...
Bug: 182531832
Test: do bugreport with no dumpstate related error
Change-Id: I3f19f82f37b11221f4816d958797336da23b14b4
2021-04-20 14:42:55 +08:00
Ted Wang
4233336296
Grant sepolicy for Bluetooth Ccc Timesync feature
...
Add sepolicy rules for Bluetooth Ccc Timessync
Bug: 175836015
Test: make
Change-Id: If2d3f953a5899cd5ea0695a57132dd69a2a29675
2021-04-20 06:32:49 +00:00
Adam Shih
a2f8a45c46
suppress logs created by userdebug-only features
...
Bug: 185439604
Test: cts-tradefed run commandAndExit cts -m CtsSecurityHostTestCases
Change-Id: I8d993154e8e6c3205e1e83c6b81d4d9064dc3171
2021-04-20 06:17:20 +00:00
Wenhao Wang
f5277482c1
Fix selinux for RPMB daemon
...
Secure persistent storage has been moved to persist root.
The corresponding pathes on SELinux policy has to be updated.
Bug: 173971240
Bug: 173032298
Test: Trusty storage tests
Change-Id: I0e7756f3b4d5c6be705a87e1d7d80247df1ec4bb
2021-04-20 13:01:23 +08:00
Wei Wang
0ae24df58d
Merge "Grant Fabric node access for memory min frequency setting" into sc-dev
2021-04-20 02:14:18 +00:00
Taeju Park
3e824702f2
Grant Fabric node access for memory min frequency setting
...
Bug: 170510392
Signed-off-by: Taeju Park <taeju@google.com>
Change-Id: Ia96c8d9e890251a4f82bf8c8bb042ae6ce57182b
2021-04-20 00:46:32 +00:00
Salmax Chang
854e4dfd60
Merge "dumpstate/incident: Fix avc errors" into sc-dev
2021-04-19 10:00:10 +00:00
SalmaxChang
1b17b0fbaa
dumpstate/incident: Fix avc errors
...
avc: denied { append } for path="/storage/emulated/0/Android/data/com.android.pixellogger/files/bugreport-oriole-MASTER-2021-04-19-14-57-22.zip" dev="dm-7" ino=35424 scontext=u:r:dumpstate:s0 tcontext=u:object_r:media_rw_data_file:s0:c28,c257,c512,c768 tclass=file
avc: denied { use } for path="/storage/emulated/0/Android/data/com.android.pixellogger/files/bugreport-oriole-MASTER-2021-04-19-14-57-22.zip" dev="dm-7" ino=35424 scontext=u:r:incident:s0 tcontext=u:r:logger_app:s0:c28,c257,c512,c768 tclass=fd
avc: denied { append } for path="/storage/emulated/0/Android/data/com.android.pixellogger/files/bugreport-oriole-MASTER-2021-04-19-16-30-05.zip" dev="dm-7" ino=12639 scontext=u:r:incident:s0 tcontext=u:object_r:media_rw_data_file:s0:c30,c257,c512,c768 tclass=file
Bug: 178744858
Change-Id: I07eb1f4abf6cb9b399c773854ca6f47fcd5e2f37
2021-04-19 08:34:57 +00:00
Hongbo Zeng
8b9e2b3834
allow RilConfigService to call oemrilhook api
...
04-15 21:19:42.312 373 373 E SELinux : avc: denied { find } for pid=10245 uid=1001 name=telephony.oem.oemrilhook scontext=u:r:ril_config_service_app:s0 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=0
Bug: 185747692
Test: after apply the rule, the denial log is gone
Change-Id: I447c9c695f48ee3b528190ff33261ca3e9cd69df
2021-04-19 16:26:59 +08:00
TreeHugger Robot
8c30e63758
Merge "Add sepolicy rules when PowerAnomalyDataDetection service enabled" into sc-dev
2021-04-19 06:03:11 +00:00
TreeHugger Robot
07121f1245
Merge "remove obsolete domains" into sc-dev
2021-04-19 05:56:38 +00:00