Wei Wang
6883250a44
Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev am: 53ae55618a
am: c515c8345d
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14509955
Change-Id: I7f52c6c8fe5f6eac81410f10c4db73f13eaf46dc
2021-05-12 04:49:43 +00:00
Wei Wang
c515c8345d
Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev am: 53ae55618a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14509955
Change-Id: I9a79e69ca43827358937aebcab730471715acb4c
2021-05-12 04:28:06 +00:00
Wei Wang
1e378dbfa3
Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev am: 53ae55618a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14509955
Change-Id: Ib6ade70fbfd568b17f9ca1ff49b8dc0c78590bb0
2021-05-12 04:26:57 +00:00
Wei Wang
edf3463646
Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev am: 53ae55618a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14509955
Change-Id: I680bd82ec4b05f197db3f520e0416fa12204d1e2
2021-05-12 04:26:40 +00:00
Thierry Strudel
03f4884884
com.qorvo.uwb: signed with dedicated key and running as android.uid.uwb uid
...
Test:
05-11 21:05:48.077 786 786 I qorvo.uwb.main: UWB HAL start
05-11 21:05:48.078 412 412 I servicemanager: Found hardware.qorvo.uwb.IUwb/default in device VINTF manifest.
05-11 21:05:50.960 1639 1639 W PackageSettings: Missing permission state for package: com.qorvo.uwbtestapp.system
05-11 21:05:53.530 1639 1639 V StorageManagerService: Package com.qorvo.uwb does not have legacy storage
05-11 21:05:53.548 1639 1639 V StorageManagerService: Package com.qorvo.uwbtestapp.system does not have legacy storage
05-11 21:05:56.571 1639 1902 I am_proc_start: [0,3055,1083,com.qorvo.uwb,added application,com.qorvo.uwb]
05-11 21:05:56.571 1639 1902 I ActivityManager: Start proc 3055:com.qorvo.uwb/1083 for added application com.qorvo.uwb
05-11 21:05:56.653 1639 2264 I am_proc_bound: [0,3055,com.qorvo.uwb]
05-11 21:05:56.709 3055 3055 I TetheringManager: registerTetheringEventCallback:com.qorvo.uwb
05-11 21:05:56.710 3055 3055 V GraphicsEnvironment: ANGLE Developer option for 'com.qorvo.uwb' set to: 'default'
05-11 21:06:05.045 1639 1900 I am_pss : [3055,1083,com.qorvo.uwb,5719040,4239360,0,88702976,2,0,6]
05-11 21:06:07.233 1639 1981 I am_compact: [3055,com.qorvo.uwb,all,84816,39052,44628,0,-816,0,-816,816,26,0,0,-800,0,1921532,-768]
05-11 21:06:38.442 786 786 I qorvo.Uwb: open
05-11 21:06:38.443 786 786 I qorvo.uwb.McpsUtils: ListHardware
05-11 21:06:38.443 786 786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.443 786 786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.443 786 786 I qorvo.uwb.IeeeUtils: ListDevices
05-11 21:06:38.443 786 786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.443 786 786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.443 786 786 I qorvo.uwb.UwbIface: Load calibration on wpan0, hw index: 0
05-11 21:06:38.445 786 786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.445 786 786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.445 786 786 I qorvo.uwb.UwbIface: Load properties on wpan0, hw index: 0
05-11 21:06:38.446 786 786 I qorvo.Uwb: getIface
05-11 21:06:38.449 786 786 I qorvo.uwb.UwbIface: firaController
05-11 21:06:38.449 786 786 I qorvo.Uwb: listHardwareIndex
05-11 21:06:38.449 786 786 I qorvo.uwb.McpsUtils: ListHardware
05-11 21:06:38.449 786 786 I qorvo.uwb.NlSocket: SendAndAwaitResponse
05-11 21:06:38.450 786 786 I qorvo.uwb.NlSocket: SendAndAwaitResponse: Read message
05-11 21:06:38.450 786 786 I qorvo.Uwb: getIface
05-11 21:06:38.450 786 786 I qorvo.uwb.UwbIface: cccController
Bug: 187766150
Signed-off-by: Thierry Strudel <tstrudel@google.com>
Change-Id: Ie667a666a445e907aa99542f1c52046522b5dd02
2021-05-12 04:07:58 +00:00
Taeju Park
1d0e8106f3
Grant vendor_sched sysfs nodes access
...
Bug: 182509410
Signed-off-by: Taeju Park <taeju@google.com>
Change-Id: I68bf0c6e4f7b53a871a3393cb317bf6c79ace5e3
2021-05-11 21:03:30 -07:00
Wei Wang
53ae55618a
Merge "Revert "Grant vendor_sched sysfs nodes access"" into sc-dev
2021-05-12 03:56:58 +00:00
Wei Wang
73b65a0f8b
Revert "Grant vendor_sched sysfs nodes access"
...
This reverts commit 638778c654
.
Reason for revert: b/187884708
Bug: 187884708
Change-Id: I60e80246345ca3e827d7b4749f25e2d5c4dddf9d
2021-05-12 03:56:42 +00:00
TreeHugger Robot
8966b0738f
Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev am: 004c299011
am: 223f9da106
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14485438
Change-Id: Id7fa2e92ca7ec7ef0cf92bca58d54bcd3bd3428f
2021-05-12 02:43:53 +00:00
TreeHugger Robot
223f9da106
Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev am: 004c299011
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14485438
Change-Id: Ib9d1708d8e53619827b81850d6e5e97729754825
2021-05-12 02:16:15 +00:00
TreeHugger Robot
0c07533adc
Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev am: 004c299011
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14485438
Change-Id: Ia25ada37e66cdb62f56b3e97b6a43d53fee711a8
2021-05-12 02:14:29 +00:00
TreeHugger Robot
a4e1f1a4fb
Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev am: 004c299011
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14485438
Change-Id: If42fcd5d12b79c15b9bb69a602a8c36007939a10
2021-05-12 02:14:08 +00:00
Kris Chen
00e1b9a704
Add sepolicy for the UDFPS antispoof property
...
Fixes the following avc denial:
/system/bin/init: type=1107 audit(0.0:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=fingerprint.disable.fake pid=364 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=0'
android.hardwar: type=1400 audit(0.0:7): avc: denied { read } for name="u:object_r:vendor_fingerprint_fake_prop:s0" dev="tmpfs" ino=307 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:vendor_fingerprint_fake_prop:s0 tclass=file permissive=0
Bug: 187394838
Bug: 187562932
Test: Antispoof is disabled by default.
Test: Use the following adb command to manully turn on antispoof.
"setprop persist.vendor.fingerprint.disable.fake.override 0"
Change-Id: I90d6ea70d5e0e1a125efb902f1fd61ff4b51baa2
2021-05-12 09:48:48 +08:00
TreeHugger Robot
004c299011
Merge "Sniffer Logger: Add dontaudit getattr for sysfs_wifi" into sc-dev
2021-05-12 01:32:03 +00:00
Hridya Valsaraju
70551d2bc9
Let debugfs be accessed only for non-user builds
...
Since production devices(with user builds) must not mount debugfs,
provide dumpstate HAL permission to access debugfs only in userdebug/eng
builds.
Also, delete dumpstate domain's access to
vendor_dmabuf_debugfs(/d/dma_buf/bufinfo) since dumpstate now obtains
the same information from /sys/kernel/dmabuf.
Test: build
Bug: 186500818
Change-Id: I17007d495fba6332bbf17dc7d030e5c6e4d5248b
2021-05-11 17:35:20 -07:00
Hridya Valsaraju
9e6528da08
Label debugfs files correctly
...
A few debugfs files are labelled as belonging to both debugfs_type and
sysfs_type. Hence, any client that is provided access to sysfs_type will
automatically be provided access to these files. This patch corrects the
labelling for these files to prevent this.
Test: build
Bug: 186500818
Change-Id: I364a73a960824cc9051610032179fd5caeca09de
2021-05-11 17:35:17 -07:00
Qinchen Gu
ab6df9cc18
Add SELinux policy for allowing dumping GSC info
...
Bug: 185939493
Test: adb bugreport. Look for GSC-related info.
Change-Id: I30dbb51781526d763205594283ca3b808f45d28f
2021-05-11 17:27:14 -07:00
Wei Wang
82e3d3146f
Merge "Grant vendor_sched sysfs nodes access" into sc-dev am: 3a2d20a1a2
am: a04548a17c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14462495
Change-Id: Ia8f8af31038a6fe8a872e1632c750a0e693a8f60
2021-05-11 18:10:48 +00:00
Wei Wang
a04548a17c
Merge "Grant vendor_sched sysfs nodes access" into sc-dev am: 3a2d20a1a2
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14462495
Change-Id: I957522e3cdb7c45401b50601e2a92cd617d3473a
2021-05-11 17:42:16 +00:00
Wei Wang
776b6040fa
Merge "Grant vendor_sched sysfs nodes access" into sc-dev am: 3a2d20a1a2
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14462495
Change-Id: Ib9103633531cc02bed37acfd53fa314d6d47394e
2021-05-11 17:41:51 +00:00
Wei Wang
e529fc3cfb
Merge "Grant vendor_sched sysfs nodes access" into sc-dev am: 3a2d20a1a2
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14462495
Change-Id: I7a96d0859bd09ebb961af6b18a7d5687aa01b391
2021-05-11 17:40:29 +00:00
Wei Wang
3a2d20a1a2
Merge "Grant vendor_sched sysfs nodes access" into sc-dev
2021-05-11 17:24:38 +00:00
sukiliu
7a1938e846
Update avc error on ROM 7349999 am: 99853e483b
am: d5d461cc4e
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14500956
Change-Id: I3e39d50fcfcf238866363c2ea927286dddb3eb55
2021-05-11 11:34:06 +00:00
sukiliu
d5d461cc4e
Update avc error on ROM 7349999 am: 99853e483b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14500956
Change-Id: If71f414f52934e892475a040684dd91a2a75dfee
2021-05-11 11:04:31 +00:00
sukiliu
fd763f3ee9
Update avc error on ROM 7349999 am: 99853e483b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14500956
Change-Id: Icc17da37ec14a7834091bd1ace72dda52dbdf842
2021-05-11 11:02:46 +00:00
sukiliu
0d483277cf
Update avc error on ROM 7349999 am: 99853e483b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14500956
Change-Id: Ieaa2460666b2d154333bbed9833abcaee833477f
2021-05-11 11:02:14 +00:00
Midas Chien
873511167c
Allowed PowerHAL service access Display node
...
Bug: 164411401
Test: boot
Change-Id: Idcc1338bc66a7479aed9efd4d1ebc82efd1b7c4d
2021-05-11 10:23:58 +00:00
sukiliu
99853e483b
Update avc error on ROM 7349999
...
avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:twoshay:s0 tclass=binder permissive=0
Bug: 187795940
Test: PtsSELinuxTestCases
Change-Id: Ib85ee1d52915b292295b21df8df48c18761c088e
2021-05-11 17:24:08 +08:00
Peter Csaszar
d39d9e517f
pixel-selinux: add SJTAG policies am: bc525e1a49
am: 6ff24d2a06
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14489636
Change-Id: Icab05e0fb309a6eaa0befd3d3960e84569957005
2021-05-11 07:47:11 +00:00
Maciej Żenczykowski
60e0a18e2a
correctly label networking gadgets
...
This is to pass system/netd/tests/netd_test.cpp:
TEST(NetdSELinuxTest, CheckProperMTULabels) {
// Since we expect the egrep regexp to filter everything out,
// we thus expect no matches and thus a return code of 1
ASSERT_EQ(W_EXITCODE(1, 0), system("ls -Z /sys/class/net/*/mtu | egrep -q -v "
"'^u:object_r:sysfs_net:s0 /sys/class/net/'"));
}
Test: atest, TreeHugger, manual observation of labeling
Bug: 185962988
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ib4f8aa6cc2e0f5a5bd432bcfe473e550f5c68132
2021-05-11 07:40:38 +00:00
Peter Csaszar
6ff24d2a06
pixel-selinux: add SJTAG policies am: bc525e1a49
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14489636
Change-Id: I19e3462634d1e299ca6bfb8e8e01bd3e689bd903
2021-05-11 07:24:12 +00:00
Peter Csaszar
c8e24207eb
pixel-selinux: add SJTAG policies am: bc525e1a49
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14489636
Change-Id: I007fd343a1cea81e73989bd3aa097341fe0e8d6c
2021-05-11 07:21:52 +00:00
Peter Csaszar
6a9f52b022
pixel-selinux: add SJTAG policies am: bc525e1a49
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14489636
Change-Id: I15f0713b466b5717e66cea151ac618eb0dfc21e1
2021-05-11 07:19:46 +00:00
Taeju Park
638778c654
Grant vendor_sched sysfs nodes access
...
Bug: 182509410
Signed-off-by: Taeju Park <taeju@google.com>
Change-Id: I53a879e904bef3c5b13127404f4f5c422abd46b4
2021-05-11 04:27:23 +00:00
Peter Csaszar
bc525e1a49
pixel-selinux: add SJTAG policies
...
These are the SELinux policies for the DebugFS files of the SJTAG
kernel interface.
Bug: 184768605
Signed-off-by: Peter Csaszar <pcsaszar@google.com>
Change-Id: I36996d6fd5fe09adb7a36be573cf57f15ea35756
2021-05-10 17:58:04 -07:00
Wei Wang
ff1bb37173
Merge "Add policy for memlat governor needs create/delete perf events" into sc-dev am: 551505ae05
am: 8181bbaaac
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14486216
Change-Id: I616fa1b699d2b2fee93496cf06b24786f7e4e74b
2021-05-11 00:34:34 +00:00
Wei Wang
8181bbaaac
Merge "Add policy for memlat governor needs create/delete perf events" into sc-dev am: 551505ae05
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14486216
Change-Id: I28349709c6a549e25ed8dffd490c84af777b83e9
2021-05-11 00:18:41 +00:00
Wei Wang
8c19aec1ee
Merge "Add policy for memlat governor needs create/delete perf events" into sc-dev am: 551505ae05
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14486216
Change-Id: I18294c64c2dc118e1af978614d5feaec92ac0445
2021-05-11 00:16:50 +00:00
Wei Wang
b7b6bd8736
Merge "Add policy for memlat governor needs create/delete perf events" into sc-dev am: 551505ae05
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14486216
Change-Id: I04832fd37ac2d60fe7b9f969a606501274d29789
2021-05-11 00:14:18 +00:00
Wei Wang
551505ae05
Merge "Add policy for memlat governor needs create/delete perf events" into sc-dev
2021-05-10 23:59:50 +00:00
Jia-yi Chen
344b354f8b
Merge "Add high_capacity_start_cpu to u:object_r:sysfs_vendor_sched:s0" into sc-dev am: 06a0792bf1
am: 1912dc976e
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14460156
Change-Id: I7d847033afc8548522bac80ad657bcbae806dbd7
2021-05-10 19:07:21 +00:00
Jia-yi Chen
1912dc976e
Merge "Add high_capacity_start_cpu to u:object_r:sysfs_vendor_sched:s0" into sc-dev am: 06a0792bf1
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14460156
Change-Id: I1ddc002e6e20ca3dec0db9f018260ec0e56db574
2021-05-10 18:52:15 +00:00
Jia-yi Chen
d723c9dc53
Merge "Add high_capacity_start_cpu to u:object_r:sysfs_vendor_sched:s0" into sc-dev am: 06a0792bf1
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14460156
Change-Id: I68e32fbfbb738a36a53f18e96a5f7ca072828102
2021-05-10 18:48:49 +00:00
Jia-yi Chen
9894e8e202
Merge "Add high_capacity_start_cpu to u:object_r:sysfs_vendor_sched:s0" into sc-dev am: 06a0792bf1
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14460156
Change-Id: I206c35135cf16ff9956d1d7b5080697c9ea566b6
2021-05-10 18:48:39 +00:00
Jia-yi Chen
06a0792bf1
Merge "Add high_capacity_start_cpu to u:object_r:sysfs_vendor_sched:s0" into sc-dev
2021-05-10 18:29:41 +00:00
Kyle Lin
1124aeaf32
Add policy for memlat governor needs create/delete perf events
...
[ 31.756984] type=1400 audit(1620144320.436:11): avc: denied { perfmon } for comm="cpuhp/4" capability=38 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability2 permissive=0
[ 31.757246] type=1400 audit(1620144320.436:12): avc: denied { sys_admin } for comm="cpuhp/4" capability=21 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
[ 31.757352] type=1400 audit(1620144320.436:13): avc: denied { perfmon } for comm="cpuhp/4" capability=38 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability2 permissive=0
[ 31.757450] type=1400 audit(1620144320.436:14): avc: denied { sys_admin } for comm="cpuhp/4" capability=21 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
...
...
[ 215.584932] type=1400 audit(1620634018.936:191): avc: denied { cpu } for comm="cpuhp/4" scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=perf_event permissive=0
Bug: 187437491
Bug: 170479743
Test: build, boot and suspend/resume test 200 times.
Change-Id: I4fd3d3fb915ca518ffa226f25298c94faaf867f1
2021-05-10 16:18:58 +08:00
chenpaul
6297e8a5a7
Sniffer Logger: Add dontaudit getattr for sysfs_wifi
...
05-10 15:04:37.376 12958 12958 I auditd : type=1400 audit(0.0:14): avc: denied { getattr } for comm="wifi_sniffer" path="/sys/wifi/firmware_path" dev="sysfs" ino=81201 scontext=u:r:wifi_sniffer:s0 tcontext=u:object_r:sysfs_wifi:s0 tclass=file permissive=0
Bug: 187583019
Test: Sniffer Logger is workable
Change-Id: I6bce0bb58d951b6be39f58340b6418b328ffe386
2021-05-10 15:28:47 +08:00
JJ Lee
2a2ce4a0ae
Merge "sepolicy: gs101: allow audio hal to use wakelock" into sc-dev am: df02b6ef77
am: 51c75a291e
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14452416
Change-Id: I085a5e10dc22ac41c84c98614dbe3133c5971d40
2021-05-10 02:58:04 +00:00
JJ Lee
51c75a291e
Merge "sepolicy: gs101: allow audio hal to use wakelock" into sc-dev am: df02b6ef77
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14452416
Change-Id: I9da7211554c5f2fdce509051caa4f3b2e381f9c1
2021-05-10 02:34:31 +00:00
JJ Lee
4be4faa1dc
Merge "sepolicy: gs101: allow audio hal to use wakelock" into sc-dev am: df02b6ef77
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14452416
Change-Id: I51e769688205bbb6ea24e4afe736f22876e7b104
2021-05-10 02:31:46 +00:00