Commit graph

490 commits

Author SHA1 Message Date
sukiliu
fd763f3ee9 Update avc error on ROM 7349999 am: 99853e483b
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14500956

Change-Id: Icc17da37ec14a7834091bd1ace72dda52dbdf842
2021-05-11 11:02:46 +00:00
sukiliu
99853e483b Update avc error on ROM 7349999
avc: denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:twoshay:s0 tclass=binder permissive=0

Bug: 187795940
Test: PtsSELinuxTestCases
Change-Id: Ib85ee1d52915b292295b21df8df48c18761c088e
2021-05-11 17:24:08 +08:00
Peter Csaszar
6a9f52b022 pixel-selinux: add SJTAG policies am: bc525e1a49
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14489636

Change-Id: I15f0713b466b5717e66cea151ac618eb0dfc21e1
2021-05-11 07:19:46 +00:00
Peter Csaszar
bc525e1a49 pixel-selinux: add SJTAG policies
These are the SELinux policies for the DebugFS files of the SJTAG
kernel interface.

Bug: 184768605
Signed-off-by: Peter Csaszar <pcsaszar@google.com>
Change-Id: I36996d6fd5fe09adb7a36be573cf57f15ea35756
2021-05-10 17:58:04 -07:00
Wei Wang
b7b6bd8736 Merge "Add policy for memlat governor needs create/delete perf events" into sc-dev am: 551505ae05
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14486216

Change-Id: I04832fd37ac2d60fe7b9f969a606501274d29789
2021-05-11 00:14:18 +00:00
Wei Wang
551505ae05 Merge "Add policy for memlat governor needs create/delete perf events" into sc-dev 2021-05-10 23:59:50 +00:00
Jia-yi Chen
d723c9dc53 Merge "Add high_capacity_start_cpu to u:object_r:sysfs_vendor_sched:s0" into sc-dev am: 06a0792bf1
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14460156

Change-Id: I68e32fbfbb738a36a53f18e96a5f7ca072828102
2021-05-10 18:48:49 +00:00
Jia-yi Chen
06a0792bf1 Merge "Add high_capacity_start_cpu to u:object_r:sysfs_vendor_sched:s0" into sc-dev 2021-05-10 18:29:41 +00:00
Kyle Lin
1124aeaf32 Add policy for memlat governor needs create/delete perf events
[   31.756984] type=1400 audit(1620144320.436:11): avc: denied { perfmon } for comm="cpuhp/4" capability=38 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability2 permissive=0
[   31.757246] type=1400 audit(1620144320.436:12): avc: denied { sys_admin } for comm="cpuhp/4" capability=21 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
[   31.757352] type=1400 audit(1620144320.436:13): avc: denied { perfmon } for comm="cpuhp/4" capability=38 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability2 permissive=0
[   31.757450] type=1400 audit(1620144320.436:14): avc: denied { sys_admin } for comm="cpuhp/4" capability=21 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
...
...
[  215.584932] type=1400 audit(1620634018.936:191): avc: denied { cpu } for comm="cpuhp/4" scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=perf_event permissive=0

Bug: 187437491
Bug: 170479743
Test: build, boot and suspend/resume test 200 times.

Change-Id: I4fd3d3fb915ca518ffa226f25298c94faaf867f1
2021-05-10 16:18:58 +08:00
JJ Lee
7a46007222 Merge "sepolicy: gs101: allow audio hal to use wakelock" into sc-dev am: df02b6ef77
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14452416

Change-Id: I662932d3b069766e8c915578610b2524e8c8d396
2021-05-10 02:31:37 +00:00
JJ Lee
df02b6ef77 Merge "sepolicy: gs101: allow audio hal to use wakelock" into sc-dev 2021-05-10 02:14:07 +00:00
TreeHugger Robot
11accc9f2f Merge "vibrator: Remove temporary method" into sc-dev am: ec3144742f
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14467421

Change-Id: I4a0d4f360b28e6a0496f8887488f76824d867808
2021-05-10 01:40:05 +00:00
TreeHugger Robot
26cf3f59ac Merge changes Ic697ffe8,Idcf38e09 into sc-dev am: a2d2ebd508
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14456725

Change-Id: Ia366cfb74424fe2d8dbba868c92649fbc738fc47
2021-05-10 01:39:57 +00:00
TreeHugger Robot
ec3144742f Merge "vibrator: Remove temporary method" into sc-dev 2021-05-10 01:13:47 +00:00
TreeHugger Robot
a2d2ebd508 Merge changes Ic697ffe8,Idcf38e09 into sc-dev
* changes:
  Remove dumpstate AVC denials dontaudit for twoshay
  Allow dumpstate to access twoshay
2021-05-10 01:11:46 +00:00
TreeHugger Robot
c3c5ca4ddb Merge "Allow radioext to communicate with bt hal" into sc-dev am: c03c055812
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14456718

Change-Id: Ie6e2ad1c7f522db72d1376aae37c5501f85e29be
2021-05-08 19:10:01 +00:00
TreeHugger Robot
c03c055812 Merge "Allow radioext to communicate with bt hal" into sc-dev 2021-05-08 18:59:51 +00:00
TreeHugger Robot
776d3de596 Merge "iwlan: update sepolicy for qualifiednetworksservice" into sc-dev am: 296f8ddc5d
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14440528

Change-Id: I99208ec0b4e5af7ae08b16e7bc4dc2e1c1a9894d
2021-05-07 23:43:49 +00:00
TreeHugger Robot
296f8ddc5d Merge "iwlan: update sepolicy for qualifiednetworksservice" into sc-dev 2021-05-07 23:29:31 +00:00
chasewu
59161a5745 vibrator: Remove temporary method
Bug: 177176811
Test: no avc denied logs
Signed-off-by: chasewu <chasewu@google.com>
Change-Id: I424e15037b3e20824f5e072d88bdf71a50cfdabf
2021-05-07 18:33:15 +08:00
Seungah Lim
72e6339123 iwlan: update sepolicy for qualifiednetworksservice
Bug: 185942456
Test: VoLTE/VoWifi

Change-Id: I352bb933e577b11bb052a297d17776ff0a5f3a75
Signed-off-by: Seungah Lim <sss.lim@samsung.com>
2021-05-07 17:14:00 +08:00
Tai Kuo
8e3aaa30ff Remove dumpstate AVC denials dontaudit for twoshay
Bug: 187014717
Test: pts-tradefed run pts -m PtsSELinuxTest -t \
  com.google.android.selinux.pts.SELinuxTest#scanBugreport
Signed-off-by: Tai Kuo <taikuo@google.com>
Change-Id: Ic697ffe8f6ee15fb9d9330173a3c92aeca61de67
2021-05-07 14:56:22 +08:00
Tai Kuo
0e68aed154 Allow dumpstate to access twoshay
Bug: 173330981
Bug: 187014717
Test: no avc denials for twoshay was found.
Signed-off-by: Tai Kuo <taikuo@google.com>
Change-Id: Idcf38e0921fb4d6d617e7cd443425193aea3fe91
2021-05-07 14:55:43 +08:00
Jia-yi Chen
15c046878b Add high_capacity_start_cpu to u:object_r:sysfs_vendor_sched:s0
Bug: 186564130
Test: Boot & check powerhal log
Change-Id: I1a828f113266d4b3386b2f6fa74df050255113a9
2021-05-06 21:00:08 -07:00
Labib
a27f8c4480 Allow radioext to communicate with bt hal
Bug: 187447420
Change-Id: I1a1626502a6c3913846b957c3c0a31fdd99feb31
2021-05-07 09:20:02 +08:00
Tri Vo
7c585329ec Merge "trusty: sepolicy for metrics reporter" into sc-dev am: f7bec8b3c6
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14286451

Change-Id: I65819ea555dafbd575e26c1f9e45fbb1ce8617ff
2021-05-06 16:08:19 +00:00
Tri Vo
f7bec8b3c6 Merge "trusty: sepolicy for metrics reporter" into sc-dev 2021-05-06 15:52:51 +00:00
JJ Lee
43735f0fc3 sepolicy: gs101: allow audio hal to use wakelock
Bug: 178789331
Test: build pass
Signed-off-by: JJ Lee <leejj@google.com>
Change-Id: I1d5c9ea8726f2e53bc05e0ecd5dedddede274794
2021-05-06 19:43:24 +08:00
Aaron Tsai
2cea3621b0 Fix avc denied for shannon-ims am: 6a9a85cd07
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14410097

Change-Id: I5289bf698f1bfad5074d446beff9aeeace50e27d
2021-05-06 10:49:37 +00:00
Aaron Tsai
6a9a85cd07 Fix avc denied for shannon-ims
04-01 19:10:22.956 10272  2327  2327 W Binder:2327_4: type=1400 audit(0.0:8): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:vendor_ims_app:s0:c16,c257,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 app=com.shannon.imsservice
04-01 19:10:22.960 10272  2327  4608 E libc    : Access denied finding property "persist.dbg.wfc_avail_ovr0"
04-01 19:10:22.981 10272  2327  4608 E libc    : Access denied finding property "persist.dbg.vt_avail_ovr0"
04-01 19:10:22.982 10272  2327  4980 E libc    : Access denied finding property "persist.dbg.volte_avail_ovr0"

Bug: 183935382
Bug: 184858478
Test: verified with the forrest ROM and error log goneFix
Change-Id: I0754c6be7f74ed73533e9570c7d1916320ab2897
2021-05-06 09:04:03 +00:00
TreeHugger Robot
5f2f2a672b Merge "HardwareInfo: Add sepolicy for display" into sc-dev am: 6978eeaea4
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13824666

Change-Id: I79da8abcc3cdaab61fe2932fa8da8ab9f6400eef
2021-05-06 06:13:04 +00:00
TreeHugger Robot
6978eeaea4 Merge "HardwareInfo: Add sepolicy for display" into sc-dev 2021-05-06 06:03:18 +00:00
TreeHugger Robot
4a6a02638b Merge "wlc fwupdate implementation" into sc-dev am: 577f562727
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14063269

Change-Id: I62224845358e55795a969607313d0e69215b4e36
2021-05-06 05:57:43 +00:00
TreeHugger Robot
577f562727 Merge "wlc fwupdate implementation" into sc-dev 2021-05-06 05:41:01 +00:00
SalmaxChang
48327b8da1 logger_app: Fix avc errors am: ab97657410
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14439439

Change-Id: I53a9905e749c8b6647b42e70f87a221751fb0432
2021-05-06 04:14:28 +00:00
SalmaxChang
ab97657410 logger_app: Fix avc errors
avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=141 scontext=u:r:logger_app:s0:c21,c257,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 app=com.android.pixellogger
Access denied finding property "viewroot.profile_rendering"
Access denied finding property "ro.input.resampling"
Access denied finding property "persist.input.velocitytracker.strategy"

avc: denied { read } for comm="oid.pixellogger" name="u:object_r:usb_control_prop:s0" dev="tmpfs" ino=281 scontext=u:r:logger_app:s0:c21,c257,c512,c768 tcontext=u:object_r:usb_control_prop:s0 tclass=file permissive=0 app=com.android.pixellogger

Bug: 186612284
Change-Id: I15f00d9ed3cc0c0657c854292caad60e3f7a3011
2021-05-06 03:57:01 +00:00
Jack Wu
9ac90fc4c1 sepolicy: gs101: Fix hal_health_default avc denials am: 2c1ecf3a54
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14439451

Change-Id: I3a8dfac579c6d631faa4b11a0a2dc2f2669647d5
2021-05-05 22:13:35 +00:00
Jack Wu
2c1ecf3a54 sepolicy: gs101: Fix hal_health_default avc denials
01-01 12:00:08.752  1000   682   682 I android.hardwar: type=1400 audit(0.0:3): avc: denied { read } for name="type" dev="sysfs" ino=68812 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
01-01 12:00:08.752  1000   682   682 I android.hardwar: type=1400 audit(0.0:4): avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-7/7-0069/power_supply/dc/type" dev="sysfs" ino=68812 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
01-01 12:00:08.752  1000   682   682 I android.hardwar: type=1400 audit(0.0:5): avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-7/7-0069/power_supply/dc/type" dev="sysfs" ino=68812 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1

Bug: 184429394
Test: Verify pass by checking device log are w/o above errors after
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: If1253c902af1723ca80d31223f51ebf439404527
2021-05-06 00:26:14 +08:00
Alex Hong
00279692ff Merge "sepolicy: Update dumpstate HAL to V1.1" into sc-dev am: be17ec14cc
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14424440

Change-Id: I70997d234403030cb0e06d51dad4bad965e39758
2021-05-05 06:30:01 +00:00
Alex Hong
be17ec14cc Merge "sepolicy: Update dumpstate HAL to V1.1" into sc-dev 2021-05-05 06:09:11 +00:00
Tri Vo
1dac39e833 trusty: sepolicy for metrics reporter
Bug: 173423860
Test: m
Change-Id: I42d646c6c9453662e670e7c22712f2bde2368bba
2021-05-05 05:38:34 +00:00
TreeHugger Robot
5853581df5 Merge "add sepolicy for dump TRICKLE/TEMP/DWELL defend config" into sc-dev am: 6978cd7220
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14419455

Change-Id: Iae2b95ad4cb344b3783d00b8a9f003226f4bbdc4
2021-05-05 03:22:22 +00:00
TreeHugger Robot
6978cd7220 Merge "add sepolicy for dump TRICKLE/TEMP/DWELL defend config" into sc-dev 2021-05-05 02:55:28 +00:00
qinyiyan
d781335da0 [SEPolicy] Allow EdgeTPU related service to log to stats service am: 9eeae92ade
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14431799

Change-Id: I9ea7c9a787fc7e74b9e934c029ca0d4a4d7cb2d9
2021-05-05 02:26:55 +00:00
qinyiyan
9eeae92ade [SEPolicy] Allow EdgeTPU related service to log to stats service
We are collecting Suez metrics from TPU related services. This includes
NNAPI HAL, edgetput logging service, and edgetpu service.

This change allows them all to find stats_service.

Bug: 151063663
Test: Pushed selinx module to device and successfully logged Stats
service.

Change-Id: I80774485ae7c2a5f994d48a71b6406fac753a9f8
2021-05-04 17:08:56 -07:00
Chris Kuiper
0b3635fb29 Merge "sepolicy: gs101: allow usf_reg_edit to run" into sc-dev am: d0d0304443
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14415568

Change-Id: Ifd5885646dbfac42f16fc867296717e173f6ff18
2021-05-04 22:54:13 +00:00
Chris Kuiper
d0d0304443 Merge "sepolicy: gs101: allow usf_reg_edit to run" into sc-dev 2021-05-04 22:33:57 +00:00
Yu-Chi Cheng
c454ab19c0 Merge "Added the SELinux rule for the EdgeTPU vendor service." into sc-dev am: 7eef8643a3
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14299125

Change-Id: Ia605bdd86e266c6487d591ddc30d64101365e929
2021-05-04 20:09:19 +00:00
Yu-Chi Cheng
7eef8643a3 Merge "Added the SELinux rule for the EdgeTPU vendor service." into sc-dev 2021-05-04 19:39:32 +00:00
Yu-Chi Cheng
b844190a34 Added the SELinux rule for the EdgeTPU vendor service.
To comply with the GSI compliance test, this change
splits the compiler part of the edgetpu_service into a
separate edgetpu_vendor_service under vendor.

The edgetpu_service locates under /system_ext/ and used
to be connected by both applications and vendor clients.
With this change, vendor clients could talk to the vendor
part of this service directly without having to cross
the system and vendor boundary.

Applications will still talk to the system_ext one, which
will forward the requests to the vendor service.

Bug: 185432427
Test: tested on Oriole + GCA.
Change-Id: I1ee47946f1fc3694d5f8b5325c192d6bd720a76e
2021-05-04 10:36:21 -07:00