Commit graph

21 commits

Author SHA1 Message Date
Dinesh Yadav
1278d8fc59 [Cleanup]: Move gxp sepolicies to gs-common for P23
These policies are moved to gs-common as part of ag/24002524

Bug: 288368306
Change-Id: Iaa15e497eafd54b1b702192a3c8f7fe0c908f8a1
Signed-off-by: Dinesh Yadav <dkyadav@google.com>
2023-07-10 05:13:16 +00:00
Treehugger Robot
8733772e74 Merge "Add sepolicies for gcma_camera heaps" into udc-d1-dev 2023-06-08 06:25:44 +00:00
Mark su
51c91e5bdf Add video12 as hw_jpg_device and enable it for debug_camera_app
Test: 05-05 05:07:06.652  4616  4616 W FinishThread: type=1400 audit(0.0:24): avc:  denied  { read write } for  name="video12" dev="tmpfs" ino=646 scontext=u:r:debug_camera_app:s0:c32,c257,c512,c768 tcontext=u:object_r:video_device:s0 tclass=chr_file permissive=0 app=com.google.android.GoogleCameraEng
05-08 22:00:59.000  7323  7323 I FinishThread: type=1400 audit(0.0:36): avc:  denied  { read } for  name="lib_jpg_encoder.so"
 dev="dm-45" ino=25639 scontext=u:r:debug_camera_app:s0:c32,c257,c512,c768 tcontext=u:object_r:vendor_camera_data_file:s0 tcl
ass=file permissive=1 app=com.google.android.GoogleCameraEng

05-08 22:00:59.000  7323  7323 I FinishThread: type=1400 audit(0.0:37): avc:  denied  { open } for  path="/vendor/lib64/lib_j
pg_encoder.so" dev="dm-45" ino=25639 scontext=u:r:debug_camera_app:s0:c32,c257,c512,c768 tcontext=u:object_r:vendor_camera_da
ta_file:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng

05-08 22:46:00.260  4784  4784 I FinishThread: type=1400 audit(0.0:29): avc:  denied  { execute } for  path="/vendor/lib64/
libhwjpeg.so" dev="dm-50" ino=55596 scontext=u:r:debug_camera_app:s0:c32,c257,c512,c768 tcontext=u:object_r:vendor_camera_d
ata_file:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng

05-08 22:33:30.504  7436  7436 I FinishThread: type=1400 audit(0.0:36): avc:  denied  { getattr } for  path="/vendor/lib64/
lib_jpg_encoder.so" dev="dm-50" ino=53765 scontext=u:r:debug_camera_app:s0:c32,c257,c512,c768 tcontext=u:object_r:vendor_ca
mera_data_file:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng

05-08 22:33:30.504  7436  7436 I FinishThread: type=1400 audit(0.0:37): avc:  denied  { map } for  path="/vendor/lib64/lib_
jpg_encoder.so" dev="dm-50" ino=53765 scontext=u:r:debug_camera_app:s0:c32,c257,c512,c768 tcontext=u:object_r:vendor_camera
_data_file:s0 tclass=file permissive=1 app=com.google.android.GoogleCameraEng

binder:7312_2: type=1400 audit(0.0:18): avc:  denied  { read write } for  name="video12" dev="tmpfs" ino=680 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:hw_jpg_device:s0 tclass=chr_file permissive=1
05-08 22:28:37.692  7312  7312 I binder:7312_2: type=1400 audit(0.0:19): avc:  denied  { open } for  path="/dev/video12" dev="tmpfs" ino=680 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:hw_jpg_device:s0 tclass=chr_file permissive=1

05-08 22:28:37.692  7312  7312 I binder:7312_2: type=1400 audit(0.0:20): avc:  denied  { ioctl } for  path="/dev/video12" dev="tmpfs" ino=680 ioctlcmd=0x5600 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:hw_jpg_device:s0 tclass=chr_file permissive=1

05-08 22:28:37.700  7312  7312 I binder:7312_2: type=1400 audit(0.0:21): avc:  denied  { read } for  name="u:object_r:default_prop:s0" dev="tmpfs" ino=167 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1

Bug: 267820687
Change-Id: I69f502d721f683d3532038d618f5fafc83f38b6b
2023-05-31 06:08:46 +00:00
Martin Liu
e4e930185a Add sepolicies for gcma_camera heaps
Bug: 275481134
Test: launch camera
Change-Id: I2efe897826d3c32bb85c815207865c0db557ea9f
Signed-off-by: Martin Liu <liumartin@google.com>
2023-05-08 23:54:55 +08:00
kuanyuhuang
477d58d695 Add hidraw device sepolicy for headtracking
Test: make and incoming HID data from Pixel Buds Pro
Bug: 276163506
Change-Id: I10833e215962ad007ad32a0d713e9b37ae888fdb
2023-04-26 09:20:11 +00:00
Ankit Goyal
ded9266dd4 Mark video secure devices as default dmabuf heaps
Mali driver (and codec HAL as well) require direct access to video
secure dmabuf devices. Mali driver being an SP-HAL cannot explicitly
write blanket rules for all the scontext. So, we piggyback on
dmabuf_system_secure_heap_device to allow all scontext to be able to use
these device nodes.

This is just as secure as dmabuf_system_secure_heap_device in that case.
There is no additional security impact. An app can still use gralloc to
allocate buffers from these heaps and disallowing access to these heaps
to the intended users.

Fix: 278823239
Fix: 278513588
Fix: 275646321
Test: dEQP-VK.memory.allocation
Change-Id: I01a2730fc222efe94d4e48e7ee4c317aa65f0064
2023-04-19 19:48:38 +00:00
Wilson Sung
c2eedff70c Add recovery related policy
Fix: 275143841
Fix: 264490092
Test: adb sideload and no avc error
Change-Id: I52003c9417560a6c5dab815a6929681710f0b0a4
2023-04-12 03:46:54 +08:00
Rex Lin
e7616e3934 [SELinux] Fix hal_uwb_default dev access errors
Allow hal_uwb_default to access /dev/uci

Bug: 263048994
Test: http://ab/I86600010139623509
Change-Id: I6324044822f74d1f0d14cc9c6d057dce0dfcc9ee
Signed-off-by: Rex Lin <rexcylin@google.com>
2023-03-13 05:16:30 +00:00
Dinesh Yadav
01c5409eb8 Make gxp_device an mlstrustedobject
This is needed as google_camera_app needs write access to gxp.

Test: Tested with private build "P51261040" with Tot google3 gca-dogfood app & found no selinux violations.

Bug: 264139000
Change-Id: Ic1a262cc40578ebd2305efe851e54cf857bd02c1
2023-03-02 15:41:37 +00:00
Armelle Laine
d27961dc1b Define selinux properties for /dev/block/by-name/trusty_persist
Bug: 247013568
Test: - Verify that this change is a NOP for devices with TDP already
        created on top of the legacy f2fs partition /mnt/vendor/persist/ss
      - Verify that this change creates a valid symlink on a manually
        migrated block device
Change-Id: I226f365c6afbb5fa91ec1c9c1943f8dddac8183a
2023-02-27 22:42:08 +00:00
Leo Liou
30f3c17252 zuma: add sepolicy for ufs_firmware_update process
Allow the script to access the specified partition and sysfs.

Bug: 224464892
Test: full build and test ffu flow
Change-Id: I27f0d4d97f15a7c108e6ae1b8c12fda2c69c303a
Signed-off-by: Leo Liou <leoliou@google.com>
2023-01-13 08:19:27 +08:00
Ankit Goyal
344fb91207 Allow dmabuf heap access to graphics allocator
There is no change in dmabuf heaps from pro, so these use the exact same
SEpolicy rules

Fix: 264489636
Test: Boots to home (with SELinux enforced)
Test: VtsHalGraphicsMapperV4_0TargetTest
Change-Id: I58ec8d9558fa76b805c0882cbbb20bfd08aead13
2023-01-09 16:16:28 -08:00
Kris Chen
4963317cad zuma: fingerprint: fix SELinux denails
Bug: 261105164
Test: boot with no relevant error on p23 device
Change-Id: I8d897693685591a042c5febfeca0121375749b8e
2022-12-23 17:43:50 +08:00
timmyli
8d061f7ebc Add hal_camera_default se linux file for zuma
Add hal_camera_default.te for zuma. Move referenced contexts and
settings to new zuma-sepolicy folders. Add hal_camera_default type declaration
to file.te

Bug: 261651093, 260366029, 263185135
Test: Build and test for hal_camera_default denials
Change-Id: Id0246f9ca8fd399853894e9e41548976ab44ccd0
2022-12-22 21:41:11 +00:00
George Chang
b5887a9853 Update permissions for st54spi and st33spi
Remove st33spi and update st54spi rules

Bug: 261519145
Bug: 261519169
Test: m atest && atest-dev com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Change-Id: I37736275204ad7bea98ce225121e71545260187c
2022-12-08 15:08:17 +00:00
Jenny Ho
ed45434f01 add permission for dump logbuffer
Bug: 260756283
Change-Id: If4d885cc53bbb2a4796d638c5f23fbf17a494436
Signed-off-by: Jenny Ho <hsiufangho@google.com>
2022-12-06 10:50:21 +08:00
Adam Shih
8cc9ed0404 review partitions
Bug: 254378739
Test: boot with relevant files labled correctly
Change-Id: Ic5954b5de7976e1864dc77254b547d6c97f9e564
2022-11-21 10:31:06 +08:00
Adam Shih
c37b0484af review fsck and relevant partitions
Bug: 254378739
Test: boot with no relevant error
Change-Id: Ibdcea873e830c534101aaea0f12a1717748dcb48
2022-11-21 10:16:19 +08:00
Adam Shih
d55543c288 isolate samsung modem related sepolicy
Bug: 254378739
Test: boot with relevant binary launched
Change-Id: Ia18fce855bee17b93d97d1aa29a40d834a81fe09
2022-11-09 10:41:21 +08:00
Adam Shih
81a354fc88 move brcm gps solution to gs-common
Bug: 254758553
Test: google map can locate on pixel
Change-Id: I0ffbf5da277d71e04cd3aec1e8ef366b00309a83
2022-10-28 14:00:27 +08:00
Adam Shih
cbbbe57599 review rfsd
Bug: 254378739
Test: boot with rfsd launched
Change-Id: I15446c8fb84de588ba09325414a1cbabbdaa9c58
2022-10-24 11:54:10 +08:00