SalmaxChang
ebf55ff9f1
logger_app: Fix avc errors am: ab97657410
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14439439
Change-Id: Ia96374b57725305faa7c900ee4702bc2167fde7c
2021-05-06 04:16:28 +00:00
SalmaxChang
ab97657410
logger_app: Fix avc errors
...
avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=141 scontext=u:r:logger_app:s0:c21,c257,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 app=com.android.pixellogger
Access denied finding property "viewroot.profile_rendering"
Access denied finding property "ro.input.resampling"
Access denied finding property "persist.input.velocitytracker.strategy"
avc: denied { read } for comm="oid.pixellogger" name="u:object_r:usb_control_prop:s0" dev="tmpfs" ino=281 scontext=u:r:logger_app:s0:c21,c257,c512,c768 tcontext=u:object_r:usb_control_prop:s0 tclass=file permissive=0 app=com.android.pixellogger
Bug: 186612284
Change-Id: I15f00d9ed3cc0c0657c854292caad60e3f7a3011
2021-05-06 03:57:01 +00:00
Jack Wu
388860a7ba
sepolicy: gs101: Fix hal_health_default avc denials am: 2c1ecf3a54
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14439451
Change-Id: I9c4332385e1a22043938a022c2074d34b490adbf
2021-05-05 22:16:08 +00:00
Jack Wu
2c1ecf3a54
sepolicy: gs101: Fix hal_health_default avc denials
...
01-01 12:00:08.752 1000 682 682 I android.hardwar: type=1400 audit(0.0:3): avc: denied { read } for name="type" dev="sysfs" ino=68812 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
01-01 12:00:08.752 1000 682 682 I android.hardwar: type=1400 audit(0.0:4): avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-7/7-0069/power_supply/dc/type" dev="sysfs" ino=68812 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
01-01 12:00:08.752 1000 682 682 I android.hardwar: type=1400 audit(0.0:5): avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-7/7-0069/power_supply/dc/type" dev="sysfs" ino=68812 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
Bug: 184429394
Test: Verify pass by checking device log are w/o above errors after
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: If1253c902af1723ca80d31223f51ebf439404527
2021-05-06 00:26:14 +08:00
Alex Hong
a0e4da3cb4
Merge "sepolicy: Update dumpstate HAL to V1.1" into sc-dev am: be17ec14cc
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14424440
Change-Id: I381c9f63d18cd7568f3ea912e5a77010909a1fbf
2021-05-05 06:31:55 +00:00
Alex Hong
be17ec14cc
Merge "sepolicy: Update dumpstate HAL to V1.1" into sc-dev
2021-05-05 06:09:11 +00:00
TreeHugger Robot
fed9fee663
Merge "add sepolicy for dump TRICKLE/TEMP/DWELL defend config" into sc-dev am: 6978cd7220
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14419455
Change-Id: Ib650be96e3439600b2975ab0d20fad5710eebc8a
2021-05-05 03:24:10 +00:00
TreeHugger Robot
6978cd7220
Merge "add sepolicy for dump TRICKLE/TEMP/DWELL defend config" into sc-dev
2021-05-05 02:55:28 +00:00
qinyiyan
ac59670250
[SEPolicy] Allow EdgeTPU related service to log to stats service am: 9eeae92ade
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14431799
Change-Id: Ie3341d449912158725a1d5292db97278b13605f7
2021-05-05 02:28:49 +00:00
qinyiyan
9eeae92ade
[SEPolicy] Allow EdgeTPU related service to log to stats service
...
We are collecting Suez metrics from TPU related services. This includes
NNAPI HAL, edgetput logging service, and edgetpu service.
This change allows them all to find stats_service.
Bug: 151063663
Test: Pushed selinx module to device and successfully logged Stats
service.
Change-Id: I80774485ae7c2a5f994d48a71b6406fac753a9f8
2021-05-04 17:08:56 -07:00
Chris Kuiper
adb83f2a07
Merge "sepolicy: gs101: allow usf_reg_edit to run" into sc-dev am: d0d0304443
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14415568
Change-Id: I7eba5b27a274180a9bbf3389018549b7e1188a98
2021-05-04 22:56:31 +00:00
Chris Kuiper
d0d0304443
Merge "sepolicy: gs101: allow usf_reg_edit to run" into sc-dev
2021-05-04 22:33:57 +00:00
Yu-Chi Cheng
b989b6c2d5
Merge "Added the SELinux rule for the EdgeTPU vendor service." into sc-dev am: 7eef8643a3
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14299125
Change-Id: I7413d1da70dc4e5a5895296f7dde4be3dde45291
2021-05-04 20:11:24 +00:00
Yu-Chi Cheng
7eef8643a3
Merge "Added the SELinux rule for the EdgeTPU vendor service." into sc-dev
2021-05-04 19:39:32 +00:00
Yu-Chi Cheng
b844190a34
Added the SELinux rule for the EdgeTPU vendor service.
...
To comply with the GSI compliance test, this change
splits the compiler part of the edgetpu_service into a
separate edgetpu_vendor_service under vendor.
The edgetpu_service locates under /system_ext/ and used
to be connected by both applications and vendor clients.
With this change, vendor clients could talk to the vendor
part of this service directly without having to cross
the system and vendor boundary.
Applications will still talk to the system_ext one, which
will forward the requests to the vendor service.
Bug: 185432427
Test: tested on Oriole + GCA.
Change-Id: I1ee47946f1fc3694d5f8b5325c192d6bd720a76e
2021-05-04 10:36:21 -07:00
Alex Hong
ea5b597e3d
sepolicy: Update dumpstate HAL to V1.1
...
Test: $ make selinux_policy
Check the label after boot completed
Bug: 186539439
Change-Id: I6690e2bc485aceb53dc607b8a7656a4f57edf70e
2021-05-04 17:11:07 +08:00
Jenny Ho
f5b47095be
add sepolicy for dump TRICKLE/TEMP/DWELL defend config
...
type=1400 audit(0.0:12): avc: denied { read } for name="google,charger" dev="sysfs" ino=25880 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
Bug: 186872139
Signed-off-by: Jenny Ho <hsiufangho@google.com>
Change-Id: Id8868d2b12408d4a39ba42c8b0faf801923f73f3
2021-05-04 15:24:38 +08:00
Daniel Mentz
dfd70f5140
Merge "Remove /vendor/lib/modules from file_contexts" into sc-dev am: 48e3555770
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14416770
Change-Id: Id338f87631bcd0dac2a8f98cf85c3372b0b5fe84
2021-05-04 04:49:30 +00:00
Daniel Mentz
48e3555770
Merge "Remove /vendor/lib/modules from file_contexts" into sc-dev
2021-05-04 04:28:49 +00:00
Daniel Mentz
3d63e648fa
Merge "Revert "remove wildcard on kernel modules"" into sc-dev am: 1473b1d155
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14393364
Change-Id: I108e79936a1bf016b84e3442eca15d559b5b09d0
2021-05-04 04:15:30 +00:00
TreeHugger Robot
869798380a
Merge changes from topic "tcpdump_logger" into sc-dev am: 3186a0f24c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14048497
Change-Id: I4ac7202553d43883b405b68b9342e056bcfadfe3
2021-05-04 04:15:25 +00:00
lucaslin
a068c23698
Add sepolicy for tcpdump_logger to access wlan_logs folder am: 4099f60681
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14410096
Change-Id: Ib593cb56d978978d6a2dce2649ce7eb83dbcc565
2021-05-04 04:15:24 +00:00
Daniel Mentz
1473b1d155
Merge "Revert "remove wildcard on kernel modules"" into sc-dev
2021-05-04 03:50:16 +00:00
TreeHugger Robot
3186a0f24c
Merge changes from topic "tcpdump_logger" into sc-dev
...
* changes:
Add sepolicy for dumpstate to access logs of tcpdump_logger
Add sepolicy for tcpdump_logger to access wlan_logs folder
2021-05-04 03:48:04 +00:00
Jenny Ho
e6334ffd7c
Merge "set sepolicy for testing_battery_profile" into sc-dev am: 93e25c878a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14409676
Change-Id: Id42c10ec5258075cea310766db6e72c75e602820
2021-05-04 03:06:09 +00:00
Jenny Ho
93e25c878a
Merge "set sepolicy for testing_battery_profile" into sc-dev
2021-05-04 02:48:41 +00:00
lucaslin
34278f05a0
Add sepolicy for dumpstate to access logs of tcpdump_logger
...
Bug: 183467815
Test: 1. Enable tcpdump_logger always-on function
2. Dump bugreport
3. Pull dumpstate_board.bin and chagne it to zip
4. Unzip dumpstate_board.zip and check if tcpdump files
are there.
Change-Id: I178aca40d94602994eef619f05a26ceb78eeff1f
2021-05-04 10:30:22 +08:00
Daniel Mentz
2fb432f08c
Remove /vendor/lib/modules from file_contexts
...
Vendor kernel modules were moved to /vendor_dlkm/lib/modules. Let's
remove the old directory /vendor/lib/modules from file_contexts.
Bug: 185184472
Bug: 186777291
Change-Id: I38f1b25cb2d73a804f1cdb113edc9b11f8e516f7
2021-05-03 18:16:05 -07:00
Chris Kuiper
db03875ebe
sepolicy: gs101: allow usf_reg_edit to run
...
Provide necessary permissions to run usf_reg_edit from bugreport.
Bug: 187081112
Test: Run "adb bugreport <zip>" and verify it contains the output
from "usf_reg_edit save -".
Change-Id: Iade132d93105d461d51273d19fe570d48cce46fe
2021-05-03 16:34:58 -07:00
Daniel Mentz
a3c0b2ba9e
Revert "remove wildcard on kernel modules"
...
This reverts commit a346a7fa34
.
Let's move back to wildcards for kernel modules. This better supports
kernel pre-submit testing and local kernel development where the script
build.sh from the kernel repo is used to create the vendor_dlkm parition
image. With build.sh, the path to a .ko file includes the kernel
version as well as additional directory components like "extra/" that
describe where in the kernel source key the module is located. Example:
/vendor_dlkm/lib/modules/5.10.33-g2f01cf4c7282-dirty/extra/ftm5.ko
Bug: 185184472
Bug: 186777291
Change-Id: I32f85dae7ca60d9063ad6c63f21ffdaecbb66039
2021-05-03 15:38:56 -07:00
SHUCHI LILU
1ed37f06e9
Merge "Update avc error on ROM 7330059" into sc-dev am: 1d6ffc2305
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14408671
Change-Id: I80d6669d7fc3c072d41469754fa4ba238925948e
2021-05-03 09:51:00 +00:00
SHUCHI LILU
1d6ffc2305
Merge "Update avc error on ROM 7330059" into sc-dev
2021-05-03 09:34:35 +00:00
TreeHugger Robot
76c9592ec4
Merge "update error on ROM 7331131" into sc-dev am: 4ae391d780
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14409678
Change-Id: I352882dc64ceff300d4a69cc3cf1b9f77bdd7c84
2021-05-03 09:11:39 +00:00
TreeHugger Robot
4ae391d780
Merge "update error on ROM 7331131" into sc-dev
2021-05-03 08:56:20 +00:00
lucaslin
4099f60681
Add sepolicy for tcpdump_logger to access wlan_logs folder
...
tcpdump cannot be zipped into wlan logs when using tcpdump_logger
on-demand function is because tcpdump_logger doesn't have access
of wlan_logs folder.
Add related sepolicies to fix it.
Bug: 183467815
Test: 1. Set logger to wlan
2. Enable tcpdump_logger on-demand
3. Start logging
4. Stop logging
5. Pull wlan_logs
6. Check if tcpdump.pcap is zipped into the zip file
Change-Id: Ib1b6c8cbd4512acdbe756d11bfe6f540e16c8db6
2021-05-03 16:29:18 +08:00
TreeHugger Robot
d51f97bd33
Merge "Add sepolicy for sensor HAL accessing AOC sysfs node." into sc-dev am: 2391c852bd
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14327406
Change-Id: I5757a039510386f588b934debeb279312f3f3f8d
2021-05-03 07:57:01 +00:00
Adam Shih
722b181dd3
update error on ROM 7331131
...
Bug: 187016929
Bug: 187016930
Bug: 187016910
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: I294a27fd272f73cc371a4a8dc9783ba5f60203ff
2021-05-03 15:48:46 +08:00
Jenny Ho
4510c55091
set sepolicy for testing_battery_profile
...
need run /vendor/bin/sh before setprop
Bug: 180511460
Signed-off-by: Jenny Ho <hsiufangho@google.com>
Change-Id: I3dbaa984407c82662dea537da671745851035fa2
2021-05-03 15:47:14 +08:00
TreeHugger Robot
2391c852bd
Merge "Add sepolicy for sensor HAL accessing AOC sysfs node." into sc-dev
2021-05-03 07:42:00 +00:00
sukiliu
58238158ab
Update avc error on ROM 7330059
...
Bug: 187014717
Bug: 187015705
Bug: 187015816
Test: PtsSELinuxTestCases
Change-Id: I2d79fee24d18865090cd350485daea4e66bb5184
2021-05-03 15:25:20 +08:00
Eddie Lan
94500a15a8
Merge "Add sepolicy for fpc AIDL HAL" into sc-dev am: 2d4071ca8c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14282485
Change-Id: I6803cbc12ccf7eb331ceb98eeae12a23e7d0b77d
2021-05-03 04:06:44 +00:00
Eddie Lan
2d4071ca8c
Merge "Add sepolicy for fpc AIDL HAL" into sc-dev
2021-05-03 03:48:40 +00:00
TreeHugger Robot
e72dd4fc97
Merge "Provide fastbootd permissions to invoke the set_active command" into sc-dev am: 1256869c5c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14391698
Change-Id: I7c45dee73fa499b2188126ec642c64e6921a6999
2021-05-03 03:36:00 +00:00
TreeHugger Robot
1256869c5c
Merge "Provide fastbootd permissions to invoke the set_active command" into sc-dev
2021-05-03 03:19:23 +00:00
Hridya Valsaraju
1711a2d5c7
Provide fastbootd permissions to invoke the set_active command
...
These permissions fix the following denials:
[ 66.641731][ T59] audit: type=1400 audit(1619815760.952:17): avc:
denied { open } for pid=360 comm="fastbootd" path="/dev/block/sdd1"
dev="tmpfs" ino=416 scontext=u:r:fastbootd:s0
tcontext=u:object_r:devinfo_block_device:s0 tclass=blk_file permissive=1
[ 66.664509][ T59] audit: type=1400 audit(1619815760.952:18): avc:
denied { write } for pid=360 comm="fastbootd" name="sdd1" dev="tmpfs"
ino=416 scontext=u:r:fastbootd:s0
tcontext=u:object_r:devinfo_block_device:s0 tclass=blk_file permissive=1
[ 66.686431][ T59] audit: type=1400 audit(1619815760.952:19): avc:
denied { read write } for pid=360 comm="fastbootd"
name="boot_lun_enabled" dev="sysfs" ino=57569 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
[ 66.708623][ T59] audit: type=1400 audit(1619815760.952:20): avc:
denied { open } for pid=360 comm="fastbootd"
path="/sys/devices/platform/14700000.ufs/pixel/boot_lun_enabled"
dev="sysfs" ino=57569 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
[ 56.680861][ T59] audit: type=1400 audit(1619806507.020:10): avc:
denied { read write } for pid=357 comm="fastbootd" name="sda"
dev="tmpfs" ino=476 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sda_block_device:s0 tclass=blk_file permissive=0
Test: fastboot set_active
Bug: 185955438
Change-Id: I9339b2a5f2a00c9e1768f479fdeac2e1f27f04bc
2021-04-30 14:37:58 -07:00
TreeHugger Robot
0adcb526f5
Merge "Remove platform certification from imsservice" into sc-dev am: 6a5cfd86f5
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14343989
Change-Id: I6c66e6103c284a46e57efb5760226139e8e2a965
2021-04-30 17:01:41 +00:00
TreeHugger Robot
6a5cfd86f5
Merge "Remove platform certification from imsservice" into sc-dev
2021-04-30 16:55:56 +00:00
TreeHugger Robot
5c14296690
Merge "Update gs101 sepolicy for contexthub HAL" into sc-dev am: ff7948fc48
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14354723
Change-Id: Ibba6e73ddecc5a7984dc59900f256ad9a1ff114f
2021-04-30 16:54:08 +00:00
TreeHugger Robot
ff7948fc48
Merge "Update gs101 sepolicy for contexthub HAL" into sc-dev
2021-04-30 16:34:37 +00:00
TreeHugger Robot
521d0635f1
Merge "sepolicy:gs101: allow init-insmod-sh to access sysfs_leds nodes" into sc-dev am: c134ed985a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14357213
Change-Id: Idd9f94fa544f5a2248cc68f8bb93e1bd155fb8f0
2021-04-29 23:14:57 +00:00