Commit graph

546 commits

Author SHA1 Message Date
Erik Staats
1082e886c0 Add policy for USF low latency transport gralloc usage.
Bug: 183233052
Test: Verified regular and direct report sampling on Raven with shared
 memory transport enabled.
Test: See details in testing done comment in
 https://googleplex-android-review.git.corp.google.com/14144079 .
Change-Id: Ia852a4a9ca6e8eacb0fb465884d17f95445a6822
2021-04-12 01:33:52 +00:00
millerliang
b4bab832f9 Fix avc denied in MMAP audio exclusive mode
04-01 15:26:30.936 16390 16390 I auditd  : type=1400 audit(0.0:55): avc:
denied { read } for comm="HwBinder:16390_" name="aaudio_playback_heap"
dev="tmpfs" ino=400 scontext=u:r:hal_audio_default:s0
tcontext=u:object_r:dmabuf_heap_device:s0 tclass=chr_file permissive=1

Bug: 165737390
Test: Build and use OboeTester to run MMAP audio
Change-Id: I22201dfd4a3f579b52d4cfbc86fc6148dc481cb0
2021-04-09 20:43:54 +08:00
Jenny Ho
b94e7586ce Fix avc denied for maxfg_base/flip and wireless dump
Bug: 184780667
Signed-off-by: Jenny Ho <hsiufangho@google.com>
Change-Id: Ice4102cf541dc80c85beb05ad5c523a4306a77bc
2021-04-09 18:24:32 +08:00
andychou
b370d9d2c3 Remove sepolicy of Wirecutter
Bug: 184886787
Test: build pass
Change-Id: Ibe539d31dc70cc4ea478f074ef4bf75d918bcb67
2021-04-09 17:06:51 +08:00
TreeHugger Robot
60a2a6c09b Merge "Fix avc denied for Silent Logging" into sc-dev 2021-04-09 06:20:41 +00:00
TreeHugger Robot
5c9b9d882f Merge "cbd: Grant to access slog file" into sc-dev 2021-04-09 05:15:34 +00:00
Aaron Tsai
06b410dc4a Fix avc denied for Silent Logging
04-06 15:18:31.513  root     1     1 E init    : Do not have permissions to set 'persist.vendor.sys.silentlog.tcp' to 'On' in property file '/vendor/build.prop': SELinux permission check failed
04-06 15:20:17.988  root     1     1 W /system/bin/init: type=1107 audit(0.0:33): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.sys.silentlog.ap pid=8917 uid=1000 gid=1000 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=property_service permissive=0'
04-06 15:20:23.256  root     1     1 W /system/bin/init: type=1107 audit(0.0:38): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.sys.silentlog.cp pid=9025 uid=1000 gid=1000 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=property_service permissive=0'
04-06 15:20:51.340  root     1     1 W /system/bin/init: type=1107 audit(0.0:43): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.sys.silentlog pid=9291 uid=1000 gid=1000 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=property_service permissive=0'
04-06 15:21:03.608  root     1     1 W /system/bin/init: type=1107 audit(0.0:54): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.sys.silentlog.tcp pid=9473 uid=1000 gid=1000 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=property_service permissive=0'

04-06 20:17:08.060  1000  5754  5754 W Thread-3: type=1400 audit(0.0:21): avc: denied { write } for name="slog" dev="dm-7" ino=245 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=0
04-06 20:17:09.194  1000   398   398 E SELinux : avc:  denied  { find } for interface=vendor.samsung_slsi.telephony.hardware.oemservice::IOemService sid=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 pid=5754 scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:hal_vendor_oem_hwservice:s0 tclass=hwservice_manager permissive=0
04-06 21:07:18.376  7458  7458 I auditd  : type=1400 audit(0.0:20): avc: denied { call } for comm="y.silentlogging" scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:r:dmd:s0 tclass=binder permissive=0

04-06 21:16:53.200  8873  8873 W Thread-4: type=1400 audit(0.0:85): avc: denied { create } for name="NNEXT_PROFILE.nprf" scontext=u:r:vendor_telephony_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_slog_file:s0:c232,c259,c512,c768 tclass=file permissive=0


Bug: 184608648
Test: verified with the forrest ROM and error log gone
Change-Id: Id9cdf15478c751de92a9a84bcfdc8233d6e9d294
2021-04-09 04:33:13 +00:00
TreeHugger Robot
83d6ee82fb Merge "init: allow to set tcpdump property" into sc-dev 2021-04-09 03:54:18 +00:00
SalmaxChang
6dd6d9872e cbd: Grant to access slog file
Bug: 184646743
Change-Id: I06ecfbc8b9276b3801725f0965b03b849eddbdfc
2021-04-09 03:11:25 +00:00
Speth Chang
6c4d851d28 Merge "allow camera to connect stats service" into sc-dev 2021-04-09 03:01:14 +00:00
jimsun
17f08b3cba gs101: fix grilservice context
The app is no longer signed with the platform key.

Bug: 162313924
Test: verify gril service function works normally
Change-Id: I9bf0494e65cafca9432665be199c30508d36417e
2021-04-09 02:48:30 +00:00
SalmaxChang
5feb916e47 init: allow to set tcpdump property
init: Unable to set property 'persist.vendor.tcpdump.log.alwayson' from uid:10273 gid:10273 pid:7074: SELinux permission check failed

Bug: 184411489

Change-Id: If449e0d883fa4cbf8dd5ac3a6a84d205e7ac1f31
2021-04-09 10:47:56 +08:00
Nick Sanders
d59ea41ac8 gs101-sepolicy: Allow platform_app to call uwb
This is to fix below avc denial:
  SELinux : avc: denied { find } for pid=10783 uid=10294 name=uwb
  scontext=u:r:platform_app:s0:c512,c768
  tcontext=u:object_r:uwb_service:s0 tclass=service_manager permissive=0

Bug: 184286788
Test: Run Qorvo app without failure
Change-Id: I9673a3eef3f0b0bedb50ef2a5c336d8bfe7620e7
2021-04-09 02:21:20 +00:00
TreeHugger Robot
4a3f3550f5 Merge "Create sepolicy for the fingerprint GHBM sysprop" into sc-dev 2021-04-09 02:11:57 +00:00
Ilya Matyukhin
b9e10feefb Create sepolicy for the fingerprint GHBM sysprop
Bug: 184761756
Bug: 183728349
Test: adb logcat | grep "avc: denied"
Change-Id: I5209bdf859e86a83ac3fa29ecf8bfd8d5b6d88ce
2021-04-08 23:21:22 +00:00
TreeHugger Robot
f15b8edbd1 Merge "Give hal_dumpstate_default read access to slog files" into sc-dev 2021-04-08 21:40:31 +00:00
Eddie Tashjian
5bbdd82a4e Merge "Add TCP dump permissions." into sc-dev 2021-04-08 18:25:30 +00:00
Craig Dooley
cd888e847f Merge "Fix SELinux errors with aocd" into sc-dev 2021-04-08 17:27:56 +00:00
Chris Fries
1d379dfbc9 Give hal_dumpstate_default read access to slog files
Bug: 184821900

Bugreports require access to "silent log" files.

cp      : type=1400 audit(0.0:20): avc: denied { getattr } for path="/data/vendor/radio/logs/always-on/sbuff_20210408191538.sdm" dev="dm-11" ino=9075 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=file permissive=0

Change-Id: Iacc4778d1242f304e9519180437ceb0f0e9d350d
2021-04-08 16:27:29 +00:00
Cliff Wu
ec6bd9449b Merge "[Bug] Change the sepolicy name for exo_camera_injection" into sc-dev 2021-04-08 14:09:47 +00:00
Craig Dooley
3d4d9159c9 Fix SELinux errors with aocd
Add inotify support for /dev
Fix the aoc vendor property

Bug: 184173298
Change-Id: I40a71edd56b2d51f848085c43ae1d10a4c2c0c4b
2021-04-08 03:59:23 +00:00
Speth Chang
1c64cd89a2 allow camera to connect stats service
Bug: 177076189
Test: build pass
Change-Id: I1132e8a6794d09306b70fe902fc82fbdb7bf9bb4
2021-04-08 11:48:08 +08:00
Eddie Tashjian
b2fb9cdace Add TCP dump permissions.
Copy selinux policy for tcp dump binary from previous Pixel to support
TCP logging on P21 through PixelLogger.

Bug: 184777243
Test: Check PixelLogger TCP dump works.
Change-Id: Id958c8a3e6375a7aae569d6fc94deb9f8072b57b
2021-04-08 03:13:55 +00:00
Chase Wu
682e3a348f Merge "update label missing vibrator sys nodes for dual part" into sc-dev 2021-04-08 02:24:28 +00:00
Mat Bevilacqua
b58243632d Merge "Fix selinux permissions errors for UwbService" into sc-dev 2021-04-08 02:09:57 +00:00
TreeHugger Robot
34e0106672 Merge "whitechapel: add permission for pixellogger set audio property" into sc-dev 2021-04-08 01:31:35 +00:00
Adam Shih
bf832c3b49 Merge "remove wildcard on kernel modules" into sc-dev 2021-04-08 01:10:56 +00:00
Mat Bevilacqua
82d7164b5c Fix selinux permissions errors for UwbService
Fixes gmscore access to UwbManager APIs, fixes UwbService access to UWB
HAL APIs, and fixes CTS UwbService presence test.

Bug: 184402100
Test: atest CtsUwbTestCases
Change-Id: I7450242f8b35570c3d5a676c5835b01f74995202
2021-04-07 11:39:31 -07:00
Eddie Tashjian
aa9ecdc436 Merge "Fix modem logging configuration." into sc-dev 2021-04-07 16:56:47 +00:00
Yabin Cui
a4af5bb39c Merge "Move vendor_kernel_modules to public." into sc-dev 2021-04-07 16:14:32 +00:00
Cliff Wu
c0b806fd2d [Bug] Change the sepolicy name for exo_camera_injection
- Change the sepolicy name from platfrom_app to exo_app.
- Selinux avc log:
E/SELinux: avc:  denied  { find } for interface=vendor.google.exo_camera_injection::IExoCameraInjection sid=u:r:exo_app:s0:c248,c256,c512,c768 pid=11479 scontext=u:r:exo_app:s0:c248,c256,c512,c768 tcontext=u:object_r:hal_exo_camera_injection_hwservice:s0 tclass=hwservice_manager permissive=0

Bug: 184736718
Test: Verified exo_camera_injection provider service use cases function as expected; no denials.
Change-Id: I08887b8b6020cb7b3fb3da77cea9a1f453655bea
2021-04-07 15:17:44 +00:00
chenpaul
7376656ff4 logger_app: Remove Pixelize rule
In original design, pixellogger was included in Pixelize mk file,
but the sepolicy are defined by the product specific te file.
These are not aligned and have dependency concern if add new sepolicy rule
in Pixelize te file.

This change remove the Pixelize rule from the device specifc te file.
And the Pixelize rule will be defined by
hardware/google/pixel-sepolicy/logger_app/logger_app.te

Bug: 159650456
Test: Pixel Logger is workable
Change-Id: If13e05b7979f7be02a728b40f8032b81f7c53e06
2021-04-07 21:31:32 +08:00
chasewu
d57865ec05 update label missing vibrator sys nodes for dual part
Bug: 184026143
Test: no Permission denied logs
Signed-off-by: chasewu <chasewu@google.com>
Change-Id: Id75f89f5d0f1568942ef787be295b2fa5b0ca2a2
2021-04-07 09:35:32 +00:00
TreeHugger Robot
dce254b11d Merge "audio: add support for aocdump to aceess audio state" into sc-dev 2021-04-07 08:39:49 +00:00
yixuanjiang
7e8fca8041 whitechapel: add permission for pixellogger set audio property
Bug: 184708066
Test: local test
Signed-off-by: yixuanjiang <yixuanjiang@google.com>
Change-Id: I6a43959fc3565db8d2a1679ce722c11f58398794
2021-04-07 07:06:53 +00:00
Adam Shih
a346a7fa34 remove wildcard on kernel modules
Bug: 170786122
Test: Boot with all kernal modules loaded
Change-Id: I0d1d861af290181231223630497788c051c83ecb
2021-04-07 14:10:00 +08:00
Sriram Kashyap M S
dcd42938da Allow EdgeTPU NNAPI HAL to access socket files for IPC.
Bug: 182524105
Test: ./scripts/run_tests.sh on Oriole.
Change-Id: I85106f004fcee2cccc44609584165a0e2ce654e3
2021-04-07 05:58:58 +00:00
Adam Shih
59ba0f97aa grant debugfs access to insmod under userdebug
Bug: 182086611
Test: boot with the error gone
Change-Id: I555c12b4ccbb61266dc289aac577d0240bde4d28
2021-04-07 11:56:49 +08:00
Adam Shih
58b693aff0 Merge "remove obsolete mobicore operations" into sc-dev 2021-04-07 00:48:11 +00:00
Eddie Tashjian
8066a9f471 Fix modem logging configuration.
Missing binder configuration for dmd to return responses to modem
logging control binary, for cases when it needs to get log mask
configuration information.

Bug: 184605350
Test: Check logging works with selinux enabled.
Change-Id: Ia9a80870927fd890266f702b091343b4b4018673
2021-04-06 16:42:03 -07:00
Yabin Cui
05825886f4 Move vendor_kernel_modules to public.
Bug: 166559473
Bug: 183135316
Test: build
Change-Id: Ib62080d3d12aa197571a0697c17f6fd5d981d653
2021-04-06 21:46:27 +00:00
Krzysztof Kosiński
2a96bc108c Merge "camera: allow the camera hal to set fatp prop" into sc-dev 2021-04-06 06:23:53 +00:00
Adam Shih
f2d78c7d14 Merge "update error on ROM 7260355" into sc-dev 2021-04-06 05:42:40 +00:00
Yu-Chi Cheng
26cc7d6499 Merge "Allowed EdgeTPU service to read system properties related to vendor." into sc-dev 2021-04-06 05:40:44 +00:00
yixuanjiang
1a25f34051 audio: add support for aocdump to aceess audio state
check audio state for SSR usage

Test: local with enforcing mode
Bug: 184239981
Signed-off-by: yixuanjiang <yixuanjiang@google.com>
Change-Id: I45db556434251576a1d691f1aebf2940fff283fe
2021-04-06 12:41:24 +08:00
Adam Shih
fc69c665ee update error on ROM 7260355
Bug: 184593993
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: I49fb702a81f2fcd17e395954f24cd69ab2d272fc
2021-04-06 11:08:59 +08:00
Adam Shih
91c7813ea8 remove obsolete mobicore operations
Bug: 183935443
Test: boot to home with no related avc error
Change-Id: Ief907a7a77f721e58820670e9f37570fd640b473
2021-04-06 10:31:16 +08:00
Grace Chen
404937b03b Merge "Add selinux permissions for NFC/eSIM fw upgrade" into sc-dev 2021-04-06 00:28:22 +00:00
Vova Sharaienko
25f19371aa Merge "exo: updated sepolicy" into sc-dev 2021-04-06 00:27:04 +00:00
Zhijun He
60872ac2e9 camera: allow the camera hal to set fatp prop
Test: camera tests
Bug: 184572956
Change-Id: Ie8bc386aa60cf2e46732f2f68c8cb7e86733cb53
2021-04-05 16:37:20 -07:00