Mason Wang
882527f08b
hal_dumpstate_default: Fix avc denial of focaltech_touch.
...
Fixed following avc denial:
avc: denied { read } for name="focaltech_touch" dev="proc" ino=4026535419 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:proc_touch:s0 tclass=dir permissive=0
Bug: 199105131
Test: Verify pass by checking device log are w/o above errors when
trigger bugreport.
Change-Id: Id2af1f59cd397f0332fba94f68d9940f612a8e81
2022-04-06 10:03:14 +00:00
samou
ece8953942
Move ODPM file rule to pixel sepolicy
...
Bug: 213257759
Change-Id: I24105669b076061780addf5b038607f4d1957ee5
2022-04-06 02:09:38 +00:00
Anthony Stange
ede5e0944a
Add BT HAL SELinux policy
...
Bug: 193474802
Test: presubmits
Change-Id: I0ce730c119b60fdfec6e31dea88f5edbf69048ed
2022-04-04 15:55:43 +00:00
sukiliu
97326bf38b
Update avc error on ROM 8388849
...
Bug: 221384939
Bug: 227694693
Bug: 227695036
Test: PtsSELinuxTestCases
Change-Id: I0768e29a0a162c6f568a5186602b01f1375a1ca5
2022-04-01 11:55:09 +08:00
Taesoon Park
9211922e70
Add permission to access vendor.ims property to vendor ims app
...
Vendor IMS Service read a SystemProperty starts with
persist.vendor.ims prefix, but it does not have a permission to
access it.
This change create a permission to access the SystemProperties start
with 'persist.vendor.ims.' prefix from vendor ims service.
Bug: 204714230
Test: Test results in b/225430461#comment40 enabling the property
Signed-off-by: Taesoon Park <ts89.park@samsung.com>
Change-Id: Ied50f377a3069eac65836ea999dfe021f4e4ed5d
2022-04-01 01:19:26 +00:00
chungkai
2dc6f70afc
sched: move sysfs to procfs
...
Modify name from sysfs_vendor_sched to proc_vendor_sched
Test: without avc denial
Bug: 216207007
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: Ieb829e96ac1db2a1aa28fc416182450d128cac5c
2022-03-31 07:00:20 +00:00
Ocean Chen
b36cf348d0
sepolicy: add smart_idle_maint_enabled_prop for pixelstats
...
pixelstats get this sysprop hit the avc denied
persist.device_config.storage_native_boot.smart_idle_maint_enabled
pixelstats-vend: type=1400 audit(0.0:22): avc: denied { read }
for name="u:object_r:device_config_storage_native_boot_prop:s0"
dev="tmpfs" ino=171 scontext=u:r:pixelstats_vendor:s0
tcontext=u:object_r:device_config_storage_native_boot_prop:s0
tclass=file permissive=0
Bug: 215443809
Test: local build and run pixelstats
Signed-off-by: Ocean Chen <oceanchen@google.com>
Change-Id: Iedb4fa00c5e18cda6c799c3461bf8298bcf357eb
2022-03-31 03:02:47 +00:00
SalmaxChang
8e9be24a81
hal_dumpstate_default: fix avc error
...
avc: denied { search } for comm="dumpstate@1.1-s" name="modem_stat" dev="dm-42" ino=328 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:modem_stat_data_file:s0 tclass=dir
Bug: 227424943
Change-Id: I44e2337129e814ed176ac270ae6c35e34089aa74
2022-03-31 02:15:19 +00:00
sukiliu
6379865b9d
Update avc error on ROM 8374246
...
Bug: 227286343
Test: forrest with boot test
Change-Id: I44e32ac8d141dcb14c79ea4d8e78df3f88485dab
2022-03-31 02:14:40 +00:00
sukiliu
3d3ae38c43
Update avc error on ROM 8378382
...
Bug: 226850644
Test: PtsSELinuxTestCases
Change-Id: Ie6c6d8979dc63ebda7c699f10c2abb369a048ab0
2022-03-31 02:14:00 +00:00
Ray Chi
3fdb24bdc1
Revert "add sepolicy for set_usb_irq.sh"
...
This reverts commit 6733f9667d
.
Bug: 225789036
Test: build pass
Change-Id: If43c8db71c737d509b1dfd098503f564a06bf046
2022-03-29 15:45:30 +08:00
Kris Chen
32f2e4b0e7
Allow hal_fingerprint_default to access sysfs_display
...
Fix the following avc denial:
avc: denied { read } for name="panel_name" dev="sysfs" ino=71133 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=0
Bug: 223687187
Test: build and test fingerprint on device.
Change-Id: Ief1ccc7e2fa6b8b4dc1ecbd6d446cc49ee3936ce
2022-03-29 01:39:32 +00:00
Minchan Kim
3496931400
sepolicy: allow dump page_pinner
...
Provide necessary sepolicy for dumpreport to access page_pinner
information in /sys/kernel/debug/page_pinner/{longterm_pinner,
alloc_contig_failed}
Bug: 226956571
Test: Run "adb bugreport <zip>" and verify it contains the output
from page_pinner.
Signed-off-by: Minchan Kim <minchan@google.com>
Change-Id: I7b00d4930fbaa2061537cd8c84616c1053c829cf
2022-03-28 16:35:02 +00:00
Adam Shih
5cc8837eb6
update error on ROM 8365560
...
Bug: 227121550
Bug: 227122249
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: Iab96c7644e6c99d700a5f7b42fba30032d3624b7
2022-03-28 10:59:04 +08:00
Omer Osman
e5cc5f7937
Add hidraw device and Dynamic Sensor SE Linux policy
...
Test: Incoming HID data from Pixel Buds
Change-Id: I77489100e13d892fb7d3a7cee9734de044795dec
2022-03-27 23:26:29 +00:00
Lucas Wei
ab9ec22267
Label vendor_kernel_boot with boot_block_device for OTA updating
...
Label with boot_block_device to allow further operations on
vendor_kernel_boot including OTA updating.
This is required for update_engine to be able to write to
vendor_kernel_boot on builds that are enforcing sepolicy.
Bug: 214409109
Signed-off-by: Lucas Wei <lucaswei@google.com>
Change-Id: If239690ee168ecfd5c5b755451e389a4523c79b8
2022-03-25 08:55:00 +00:00
Darren Hsu
85710448f3
Allow hal_power_stats to read sysfs_aoc_dumpstate
...
avc: denied { read } for comm="android.hardwar" name="restart_count"
dev="sysfs" ino=72823 scontext=u:r:hal_power_stats_default:s0
tcontext=u:object_r:sysfs_aoc_dumpstate:s0 tclass=file permissive=0
Bug: 226173008
Test: check bugreport without avc denials
Change-Id: I35d886dd05fdad821e38810fd848c7f451893e3f
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-03-25 06:59:34 +00:00
Ted Lin
4b75aab4b8
Remove the tracking for vendor_battery_defender
...
The function is disabled.
Bug: 221384939
Test: adb bugreport
Change-Id: If8e8b8165329eb9ede86cb62f419a8cf06abb536
Signed-off-by: Ted Lin <tedlin@google.com>
2022-03-25 01:37:03 +00:00
Chris Kuiper
967571ee60
Add rules to allow Sensor HAL write access to als_table
...
Sensor HAL needs write access to
/sys/class/backlight/panel0-backlight/als_table.
Bug: 226435017
Test: Observing logs
Change-Id: Idb592d601b92c6814493e0d28384e1013935b72f
2022-03-25 00:00:19 +00:00
chungkai
4fa67857c3
sched: move sysfs to procfs
...
Modify name from sysfs_vendor_sched to proc_vendor_sched
Test: without avc denial
Bug: 216207007
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: I96dc6eb76dd533ff6fd54c27be7e4bc32bf5dbc7
2022-03-24 17:44:37 +00:00
Holmes Chou
e0b06b9cbd
camera: use codename for camera modules
...
use codename for camera modules
Bug: 209866857
Test: GCA, adb logcat
Change-Id: I55f6998d18a904c83ecdf328d1b0e5ca6a01427f
2022-03-24 13:11:16 +00:00
Ted Lin
0adad90ab6
hal_health_default: Fix avc denials
...
12-02 11:15:45.224 756 756 I health@2.1-serv: type=1400 audit(0.0:2270): avc: denied { search } for name="thermal" dev="tmpfs" ino=1028 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:thermal_link_device:s0 tclass=dir permissive=1
12-02 11:15:45.224 756 756 I health@2.1-serv: type=1400 audit(0.0:2271): avc: denied { search } for name="thermal" dev="sysfs" ino=16790 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=1
12-02 11:15:45.224 756 756 I health@2.1-serv: type=1400 audit(0.0:2273): avc: denied { open } for path="/sys/devices/virtual/thermal/thermal_zone13/mode" dev="sysfs" ino=17285 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1
12-02 11:15:45.224 756 756 I health@2.1-serv: type=1400 audit(0.0:2272): avc: denied { write } for name="mode" dev="sysfs" ino=17285 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1
Bug:208721638
Test: adb bugreport
Change-Id: I4d9491862ff1bcc88f89b1478497ac569e3d1df1
Signed-off-by: Ted Lin <tedlin@google.com>
(cherry picked from commit 5b6a5292c3
)
2022-03-24 05:26:09 +00:00
Adam Shih
de2696eb72
enforce debugfs constraint on userdebug build
...
Bug: 225815474
Test: build pass
Change-Id: If9e32d4b67c342b56eea39701518a520a62df199
2022-03-24 01:05:18 +00:00
Yabin Cui
02c1ef8b85
Add SOC specific ETM sysfs paths
...
Bug: 225403280
Test: run profcollectd on c10
Change-Id: I10c8d250cf88b371ee573561d6678fc24f4e440c
Merged-In: I10c8d250cf88b371ee573561d6678fc24f4e440c
2022-03-23 19:45:48 +00:00
George Lee
17981f9fc0
health: Grant sysfs_thermal access to health
...
health-service has trouble accessing /dev/thermal. This change fixes
this.
Bug: 226009696
Test: dev/thermal/tz-by-name/soc/mode error:Permission denied no longer
exist
Signed-off-by: George Lee <geolee@google.com>
Change-Id: I8d112cb12f3aeb1c8d5433ca69415d0413f070a2
Merged-In: I4d9491862ff1bcc88f89b1478497ac569e3d1df1
2022-03-23 05:30:33 +00:00
SalmaxChang
ae6f085676
modem_svc_sit: fix avc error
...
avc: denied { write } for comm="modem_svc_sit" name="modem_stat" dev="dm-46" ino=333 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:vendor_data_file:s0 tclass=dir permissive=0
Bug: 225149029
Change-Id: Id1045d9488a200b6c64abbe02cf5e65926ba0203
2022-03-23 05:13:29 +00:00
SalmaxChang
6dd3de7813
vendor_init: fix avc error
...
avc: denied { getattr } for comm="init" name="/" dev="sda19" ino=2 scontext=u:r:vendor_init:s0 tcontext=u:object_r:modem_img_file:s0 tclass=filesystem permissive=0
Bug: 225151104
Change-Id: I508aa6b85039edc4b5a8746aaa602f1131768630
2022-03-22 07:57:59 +00:00
Kris Chen
997b8974ef
Allow hal_fingerprint_default to access fwk_sensor_hwservice
...
Fix the following avc denial:
avc: denied { find } for interface=android.frameworks.sensorservice::ISensorManager sid=u:r:hal_fingerprint_default:s0 pid=1258 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:fwk_sensor_hwservice:s0 tclass=hwservice_manager permissive=0
Bug: 197789721
Test: build and test fingerprint on device.
Change-Id: I7494f28e69e5a1b660dc7fbaa528b1088048723b
(cherry picked from commit 9b54bf3665abce7a6f5f5df22069a8ef081ad80e)
2022-03-22 03:39:35 +00:00
Peter Csaszar
466adbb2da
pixel-selinux: Port PRO SJTAG policies to tm-dev
...
These are the SELinux policies for the sysfs files of the SJTAG
kernel interface for WHI-PRO-based devices, now migrated to the
tm-dev branch. The files are in the following directories:
/sys/devices/platform/sjtag_ap/interface/
/sys/devices/platform/sjtag_gsa/interface/
Bug: 207571417
Bug: 224022297
Signed-off-by: Peter Csaszar <pcsaszar@google.com>
Merged-in: I5ec50d9ff7cd0e08ade7acce21e73751e93a0aff
Change-Id: I56da5763c31ab098859cbc633660897646fe7f3e
2022-03-22 03:17:40 +00:00
Roshan Pius
046601d414
gs-policy: Remove obsolete uwb vendor service rules
...
This service no longer exists in the UCI stack.
Bug: 186585880
Test: Manual UWB tests
Change-Id: I279824be6f51470364ad61833b797aa23cbea859
2022-03-21 09:18:28 -07:00
Sam Dubey
b92095e322
Temporarily don't audit init for modem_img_file
...
Change-Id: I2c9c788119b20b8a37e71a971997f16a7fe6165b
Fix: 225279974
2022-03-21 04:42:13 +00:00
yixuanjiang
9206ceb227
audio: sync aocdump setting from gs101
...
Bug: 225309469
Test: local
Signed-off-by: yixuanjiang <yixuanjiang@google.com>
Change-Id: Ia9be16c74de666c945d76ca514423b030c0f90d0
2022-03-21 02:08:55 +00:00
Mason Wang
296823785d
vendor_init: Fix touch avc denial of high_sensitivity.[DO NOT MERGE]
...
Fixed following avc denial:
avc: denied { write } for name="high_sensitivity" dev="proc" ino=4026534550 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1
//The file node is proc/focaltech_touch/high_sensitivity
Bug: 199105136
Test: Verify pass by checking device log are w/o above errors while
switching setting/display/increase touch sensitivity.
Change-Id: I8dbe4190056767407413082580320593292725fe
2022-03-17 10:01:37 +00:00
George Lee
2cc598cc9b
health: Add sysfs_thermal access
...
health-service has trouble accessing /dev/thermal. This change fixes
this.
Bug: 223928339
Test: dev/thermal/tz-by-name/soc/mode error:Permission denied no longer
exist
Signed-off-by: George Lee <geolee@google.com>
Change-Id: I6077e841d179b6cda50d578e584dd249ce970db0
2022-03-17 04:55:59 +00:00
Adam Shih
bedd866505
reject mnt_vendor_file access in user ROM
...
Bug: 224429437
Test: android.security.cts.SELinuxHostTest#testNoBugreportDenials
Change-Id: I318f11866f7b9c6cc0b7ecf151f789f35ab290cd
2022-03-16 14:08:09 +08:00
Denny cy Lee
38c2803c54
Sepolicy: add pixelstats/HardwareInfo sepolicy
...
avc denials to fix (after apply ag/17120763)
[ 50.171564] type=1400 audit(1647222380.884:28): avc: denied { read } for comm="pixelstats-vend" name="battery_history" dev="tmpfs" ino=639 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0
[ 54.519375] type=1400 audit(1647222385.228:29): avc: denied { read } for comm="id.hardwareinfo" name="battery_history" dev="tmpfs" ino=639 scontext=u:r:hardware_info_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0 app=com.google.android.hardwareinfo
Bug: 222019890
Test: manually check debug logcat
Change-Id: I0e4f3f3a66783383b0d1327cec4dcd145ae9a7af
2022-03-15 03:09:18 +00:00
Darren Hsu
6d25430600
sepolicy: reorder genfs labels for system suspend
...
Bug: 223683748
Test: check bugreport without relevant avc denials
Change-Id: I295d3dfb96cc87e8faaf16f949918445cc3a0d44
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-03-15 02:52:48 +00:00
Roshan Pius
c5710ad18e
gs-sepolicy(uwb): Changes for new UCI stack
...
1. Rename uwb vendor app.
2. Rename uwb vendor HAL binary name & service name.
3. Allow vendor HAL to host the AOSP UWB HAL service.
4. Allow NFC HAL to access uwb calibration files.
Bug: 186585880
Bug: 204718220
Bug: 206045367
Test: Manual Tests
Change-Id: Ib0456617d0f5cf116d11a9412f47f36e2b8df570
2022-03-14 16:09:02 +00:00
Roshan Pius
5ddc8be4f4
gs-sepolicy(uwb): Allow uwb hal permission to net_admin
...
This was alloed under gs101-sepolicy. There is an ongoing discussion on
how to resolve this for the long term in b/190461440. But, without this
uwb functionality is broken on new devices.
Bug: 206045367
Bug: 222194886
Change-Id: I6729352f2b7bb93b01990a790e62aa69f60342fe
2022-03-14 16:09:02 +00:00
Tim Lin
e42c7120dd
ril: dump radio hal from user build.
...
To get radio hal debug info on user build as we do on previous Pixels.
Bug: 221391981
Test: Trigger bugreport on USERDEBUG with dumpstate.unroot set
to true and check IRadio log
Change-Id: I354d5770272b518761db4aab8da726de97e472bb
2022-03-14 10:49:07 +00:00
Chungjui Fan
e02f501377
sepolicy: allow fastbootd to access gsc device node
...
audit: type=1400 audit(1646614793.912:8): avc: denied { getattr }
for pid=347 comm="fastbootd" path="/dev/gsc0" dev="tmpfs" ino=469
scontext=u:r:fastbootd:s0 tcontext=u:object_r:citadel_device:s0
tclass=chr_file permissive=0
Bug: 221410358
Test: fastboot -w in fastbootd mode
Change-Id: I5680515865c2656ffa91dfe593459aab1ade81cb
Signed-off-by: Chungjui Fan <chungjuifan@google.com>
2022-03-14 04:47:31 +00:00
Ramji Jiyani
cec1d2a769
dumpstate: Remove do not audit for /system_dlkm
...
FixedBy: http://aosp/2022375
Bug: 223332748
Test: atest SELinuxHostTest#testNoBugreportDenials
Signed-off-by: Ramji Jiyani <ramjiyani@google.com>
Change-Id: I46e427cccec27118fad4440dc6822196d26f4a1b
2022-03-13 18:32:07 -07:00
Taeju Park
dc99069f1e
Allow accessing power_policy sysfs node for GPU
...
Bug: 223440487
Signed-off-by: Taeju Park <taeju@google.com>
Change-Id: Iae2e4a0dc8d474d04200e79b4b4014010eedb147
2022-03-10 10:03:59 +00:00
Darren Hsu
ab8e1fdc58
sepolicy: label wakeup source for usbc port
...
Bug: 223475365
Test: run vts -m SuspendSepolicyTests
Change-Id: I2116c5f4fd19c5995f1612d593532cc7e065a560
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-03-10 11:29:15 +08:00
Adam Shih
e989d0087a
Remove obsolete sepolicy
...
Bug: 207300335
Test: do bugreport without relevant error log showing up
Change-Id: I38e4544c59c49543e746775ec686874ee8ae2473
2022-03-09 08:14:24 +00:00
Darren Hsu
284b775f21
sepolicy: fix VTS failure for SuspendSepolicyTests
...
Label the common parent wakeup path instead of each
individual wakeup source to avoid bloating the genfs
contexts.
Bug: 221174227
Test: run vts -m SuspendSepolicyTests
Change-Id: I38e3a349af04f83e63735ea7ca010cf634c2f1ab
2022-03-09 05:29:09 +00:00
SalmaxChang
1f72ffdec6
incident: Fix avc errors
...
avc: denied { use } for comm="incident" dev="dm-47" ino=10911 scontext=u:r:incident:s0 tcontext=u:r:logger_app:s0:c239,c256,c512,c768 tclass=fd
avc: denied { append } for dev="dm-7" ino=12639 scontext=u:r:incident:s0 tcontext=u:object_r:media_rw_data_file:s0:c30,c257,c512,c768 tclass=file
Bug: 222209243
Change-Id: I9e622e2af1a036eab818cd2b66c07b137fe9cc99
2022-03-09 04:55:08 +00:00
sukiliu
b82a5ab98b
Update avc error on ROM 8268341
...
Bug: 223332748
Bug: 208721808
Test: PtsSELinuxTestCases
Change-Id: Ie3c6fdb9c8f29cac41db2750e71d3163132d4951
2022-03-09 04:25:38 +00:00
Michael Eastwood
07bf62c387
Update SELinux policy to allow camera HAL to send Perfetto trace packets
...
Example denials:
03-04 04:25:37.524 823 823 I TracingMuxer: type=1400 audit(0.0:31): avc: denied { use } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext=u:r:tr
aced:s0 tclass=fd permissive=1
03-04 04:25:37.524 823 823 I TracingMuxer: type=1400 audit(0.0:32): avc: denied { read write } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext
=u:object_r:traced_tmpfs:s0 tclass=file permissive=1
03-04 04:25:37.524 823 823 I TracingMuxer: type=1400 audit(0.0:33): avc: denied { getattr } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext=u:
object_r:traced_tmpfs:s0 tclass=file permissive=1
03-04 04:25:37.524 823 823 I TracingMuxer: type=1400 audit(0.0:34): avc: denied { map } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:traced_tmpfs:s0 tclass=file permissive=1
Bug: 222684359
Test: Build and push new SELinux policy. Verify that trace packets are received by Perfetto.
Change-Id: I443e84c5bcc701c1c983db19280719655ff02080
2022-03-09 01:29:20 +00:00
SalmaxChang
db1196932e
dumpstate: Grant to access media_rw_data_file
...
avc: denied { append } for comm="binder:1426_9" dev="dm-43" ino=15392 scontext=u:r:dumpstate:s0 tcontext=u:object_r:media_rw_data_file:s0:c232,c256,c512,c768 tclass=file permissive=0
Bug: 222209243
Change-Id: I38efe11117c15f99ad1bce54cafbd0f3b038eff2
2022-03-08 04:57:26 +00:00