martinwu
da1f9ffa79
Add sepolicy for dumpstate to zip tcpdump into bugreport
...
Bug: 264490014
Test: 1. Enable tcpdump_logger always-on function
2. Dump bugreport
3. Pull dumpstate_board.bin and chagne it to zip
4. Unzip dumpstate_board.zip and check if tcpdump files
are there.
Change-Id: I04ca96860c78baf24afd7deecff7dd4d470d9539
2023-04-26 14:17:56 +00:00
Treehugger Robot
d90ebc1fdb
Merge "Add Ims process label" into udc-d1-dev
2023-04-21 04:40:24 +00:00
Treehugger Robot
c84559a813
Merge changes from topic "260522202" into udc-d1-dev
...
* changes:
Remove untraceable rules
Enforce installd
2023-04-21 03:45:54 +00:00
Wilson Sung
e4e854fcd9
Add Ims process label
...
Bug: 260522282
Test: boot-to-home, no avc error
Change-Id: I8f3c7c64ecace4ca7ddd69275a093606a8492204
2023-04-21 03:38:17 +00:00
Treehugger Robot
a8fe91bc3c
Merge "Remove hal_uwb_default bug from bug_map" into udc-d1-dev
2023-04-21 03:08:00 +00:00
Treehugger Robot
c3a5e6769c
Merge "zuma: Allow GRIL Service to access radio_vendor_data_file" into udc-d1-dev
2023-04-21 02:43:46 +00:00
Treehugger Robot
0f96c2225e
Merge "ril: dump radio hal from user build." into udc-d1-dev
2023-04-21 01:49:54 +00:00
Ankit Goyal
2f30e8ca85
Merge "Mark video secure devices as default dmabuf heaps" into udc-d1-dev
2023-04-20 17:03:32 +00:00
Wilson Sung
40c682640f
Merge "Enforce odrefresh" into udc-d1-dev
2023-04-20 04:06:05 +00:00
Tim Lin
54bb68984a
ril: dump radio hal from user build.
...
Sync from ag/17155484
To get radio hal debug info on user build as we do on previous Pixels.
Bug: 278477468
Test: Trigger bugreport on USERDEBUG with dumpstate.unroot set
to true and check IRadio log
Change-Id: Ic9dd8357eb326d5c5f03b16408b7ba0a5e5f5818
(cherry picked from commit e08be6ab76327511002ebd343bda13a2fcc1434d)
2023-04-20 03:40:59 +00:00
kadirpili
92636953cf
zuma: Allow GRIL Service to access radio_vendor_data_file
...
Bug: 274737512
Change-Id: I90c008172af7bd0d8b7bf2b214f422c4165f3769
(cherry picked from commit 5c31a6f55ac18dd941e50b455c38a37efa12354f)
2023-04-20 03:37:22 +00:00
Wilson Sung
f4a5867e2a
Merge changes from topic "260522282" into udc-d1-dev
...
* changes:
Revert^2 "Enforce priv_app"
Label ims_remote_app and rcs_service_app
2023-04-20 02:46:06 +00:00
Treehugger Robot
b51385226b
Merge "Camera: Allow rw access to TEE devices" into udc-d1-dev
2023-04-19 20:02:33 +00:00
Ankit Goyal
ded9266dd4
Mark video secure devices as default dmabuf heaps
...
Mali driver (and codec HAL as well) require direct access to video
secure dmabuf devices. Mali driver being an SP-HAL cannot explicitly
write blanket rules for all the scontext. So, we piggyback on
dmabuf_system_secure_heap_device to allow all scontext to be able to use
these device nodes.
This is just as secure as dmabuf_system_secure_heap_device in that case.
There is no additional security impact. An app can still use gralloc to
allocate buffers from these heaps and disallowing access to these heaps
to the intended users.
Fix: 278823239
Fix: 278513588
Fix: 275646321
Test: dEQP-VK.memory.allocation
Change-Id: I01a2730fc222efe94d4e48e7ee4c317aa65f0064
2023-04-19 19:48:38 +00:00
Edmond Chung
57d920f582
Camera: Allow rw access to TEE devices
...
This is to enable face authentication on P23 devices.
Bug: 278898746
Test: Build, face authentication
Change-Id: I75311770a9780e0d97a9240b589e4e4cd9e2dc56
2023-04-19 11:18:14 -07:00
Wilson Sung
dc75da30a1
Revert^2 "Enforce priv_app"
...
This reverts commit 61a95fc71a
.
Fix: 260522282
Change-Id: I0d5dd994d3acacfee854ae27669358cfc2c249fc
2023-04-20 00:14:18 +08:00
Wilson Sung
ab9b7f7609
Label ims_remote_app and rcs_service_app
...
Bug: 260522282
Change-Id: I4bf27e30eda51794d2047da9ca17044632ec3786
2023-04-20 00:13:52 +08:00
Wilson Sung
5394ad595e
Remove untraceable rules
...
avc: denied { quotaget } for comm="binder:1312_1" scontext=u:r:installd:s0 tcontext=u:object_r:modem_img_file:s0 tclass=filesystem permissive=0
Test: boot to home
Bug: 196916111
Bug: 264490035
Change-Id: Iec3dd7161bb788d81fe8034f3471ece0dfde7e0d
2023-04-19 23:53:54 +08:00
Rex Lin
814652dc6d
Remove hal_uwb_default bug from bug_map
...
SELinux errors are fixed and hence removing from bug map
Bug: 273639365
Test: Build and boot on device
Change-Id: I3a1ad3066840b507553b9365239673f6126b8ec6
Signed-off-by: Rex Lin <rexcylin@google.com>
2023-04-19 14:54:11 +08:00
Wilson Sung
7ebc1ab0d5
Enforce installd
...
Fix: 260522202
Fix: 264490035
Test: Boot-to-home, no avc error
Change-Id: I2ec5a2771c53dcc520a2ea229f093d354b5c80fd
2023-04-19 12:41:35 +08:00
Alan Chen
c1f8b7a872
Merge "Remove dontaudit for hal_radioext_default to service_manager." into udc-d1-dev
2023-04-19 03:04:57 +00:00
Treehugger Robot
16f461a2cf
Merge "Enforce sepolicy for camera HAL." into udc-d1-dev
2023-04-18 23:18:00 +00:00
Dave Mankoff
633f19376e
Merge "Give SystemUI access to necessary selinux properties." into udc-d1-dev
2023-04-18 17:50:42 +00:00
Jonglin Lee
8da235e022
Merge "Revert "Enforce priv_app"" into udc-d1-dev
2023-04-18 17:50:13 +00:00
Jonglin Lee
61a95fc71a
Revert "Enforce priv_app"
...
This reverts commit af0ad04c3c
.
Reason for revert: RescueParty crash due to com.shannon.rcsservice crash
Bug: 278735899
Change-Id: I5bf91b077c23c63de728657bd9adb5623b708d95
2023-04-18 17:41:27 +00:00
Alan Chen
63f54f0a3a
Remove dontaudit for hal_radioext_default to service_manager.
...
The fix has been merged in the topic of ag/21956466 so this dontaudit line can be removed.
Test: manual
Bug: b/275646098
Change-Id: I95c25ffc926e48e589b7636beca1bef9583861d0
2023-04-18 17:47:09 +08:00
Krzysztof Kosiński
3f0d2fc09d
Enforce sepolicy for camera HAL.
...
Bug: 264489778
Test: GCA smoke test on Zuma device
Change-Id: Icaa7c94ab264d496840d33d970e5a87123b31c36
2023-04-18 09:02:32 +00:00
Wilson Sung
c7104d20ea
Enforce odrefresh
...
Bug: 254378739
Test: boot-to-home, no avc error
Change-Id: I2bd8af071a7296d77f9c1d85647124cdc9835709
2023-04-18 16:30:35 +08:00
Kah Xuan Lim
6c2b1f2590
Merge "Modem ML: Grant access to modem ML data dir" into udc-d1-dev
2023-04-18 05:15:21 +00:00
Treehugger Robot
4d7b687f9d
Merge "Enforce priv_app" into udc-d1-dev
2023-04-17 16:56:56 +00:00
Dave Mankoff
78b9dcdb69
Give SystemUI access to necessary selinux properties.
...
Other errors mentioned in the bugs are already absent.
Fixes: 269964574
Fixes: 272628396
Fixes: 272628174
Test: built and flash device. No selinux errors printed.
Change-Id: Ic285b1f5a2ce6973899011a7c6a596e807c3e933
2023-04-17 14:28:59 +00:00
Bruno BELANYI
ac239dd97d
Merge "Move ARM runtime option SELinux rules out of 'legacy/'" into udc-d1-dev
2023-04-17 11:00:08 +00:00
Bruno BELANYI
d217ae19cb
Merge "Use restricted vendor property for ARM runtime options" into udc-d1-dev
2023-04-17 10:59:23 +00:00
Jenny Ho
2e3228660e
Merge "sepolicy: fix charger_vendor permission denied" into udc-d1-dev
2023-04-17 10:56:58 +00:00
Dinesh Yadav
39b4b20545
Merge "Add se-policies for google_camera_app from pro" into udc-d1-dev
2023-04-17 08:32:26 +00:00
Jenny Ho
6f201db16a
sepolicy: fix charger_vendor permission denied
...
type=1400 audit(1679973171.472:14): avc: denied { search } for comm="android.hardwar" name="vendor" dev="tmpfs" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0
type=1400 audit(1679973171.256:10): avc: denied { read } for comm="android.hardwar" name="stat" dev="sysfs" ino=67924 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=0␍␊
type=1107 audit(1679973171.472:20): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.battery.defender.state pid=414 uid=1000 gid=1000 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=property_service permissive=0
type=1400 audit(1679973171.476:23): avc: denied { read } for comm="android.hardwar" name="u:object_r:vendor_battery_defender_prop:s0" dev="tmpfs" ino=356 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=file permissive=0
type=1400 audit(1679973171.472:21): avc: denied { write } for comm="android.hardwar" name="capacity" dev="sysfs" ino=74690 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=0
type=1400 audit(1679973171.476:32): avc: denied { read } for comm="android.hardwar" name="u:object_r:default_prop:s0" dev="tmpfs" ino=164 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
type=1400 audit(1681358719.792:6): avc: denied { search } for comm="android.hardwar" name="/" dev="sda1" ino=3 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=0
Bug: 277898259
Change-Id: I055eaab6df7c4549cc3817aaec80b0f85ec3b475
Signed-off-by: Jenny Ho <hsiufangho@google.com>
2023-04-17 07:24:32 +00:00
Treehugger Robot
cccb610bb4
Merge "allow vendor_init to acces watermark_scale_factor" into udc-d1-dev
2023-04-17 03:05:35 +00:00
Martin Liu
fe24903d2c
allow vendor_init to acces watermark_scale_factor
...
Bug: 278075546
Test: boot
Change-Id: Ib5fc92b4f21ca9b1ff6fdd3a32c97117cc12aac0
Merged-in: Ib5fc92b4f21ca9b1ff6fdd3a32c97117cc12aac0
Signed-off-by: Martin Liu <liumartin@google.com>
2023-04-16 03:59:57 +00:00
Bruno BELANYI
cd905228d1
Move ARM runtime option SELinux rules out of 'legacy/'
...
Addressing some review feedback on ag/22381542 about this folder being
removed in the future.
Bug: b/272740524
Test: CtsDeqpTestCases (dEQP-VK.protected_memory.stack.stacksize_*)
Change-Id: I8506da9b80fe060cd5093acafd58594e4db3341b
2023-04-14 09:20:40 +00:00
Bruno BELANYI
1337c54005
Use restricted vendor property for ARM runtime options
...
They need to be read by everything that links with libmali, but we don't
expect anybody to actually write to them.
Bug: b/272740524
Test: CtsDeqpTestCases (dEQP-VK.protected_memory.stack.stacksize_*)
Change-Id: I7f6f021378467484544cc3dbbe71a8e9e037cf98
2023-04-14 08:33:48 +00:00
Dinesh Yadav
b8b2445251
Add se-policies for google_camera_app from pro
...
- Found selinux violations on google_camera_app for these services which are fixed after these changes are included.
Bug: 264490031
Change-Id: Ib6f4a8a548425b0b98ed9b69edff6c973b9cbe3e
Signed-off-by: Dinesh Yadav <dkyadav@google.com>
2023-04-14 03:59:03 +00:00
Treehugger Robot
9ea22dde19
Merge "Enforce servicemanager" into udc-d1-dev
2023-04-14 03:53:11 +00:00
Wilson Sung
af0ad04c3c
Enforce priv_app
...
Fix: 260366281
Fix: 260522282
Fix: 260768358
Fix: 260922442
Fix: 263185432
Fix: 264490074
Fix: 268572216
Change-Id: I2efbb1971c09506a7b1e0e5e0e3d22eda91018c1
2023-04-14 03:34:46 +00:00
TreeHugger Robot
89d4a4df13
Merge "Suppress bootanim behavior meant for Android Wear devices" into udc-d1-dev
2023-04-14 03:19:53 +00:00
Treehugger Robot
2ac0374b22
Merge changes Ie20be0af,Id9a80c47 into udc-d1-dev
...
* changes:
Enforce rebalance_interrupts_vendor
Enforce hwservicemanager
2023-04-14 03:18:10 +00:00
Treehugger Robot
224eebae32
Merge "Remove ofl_app selinux policy" into udc-d1-dev
2023-04-14 02:11:22 +00:00
Treehugger Robot
fde5823b6f
Merge "Update rules for android.hardware.secure_element-service.thales" into udc-d1-dev
2023-04-14 01:21:56 +00:00
Ankit Goyal
9576cfaca7
Add sepolicy for framebuffer-secure heap
...
Bug: 245053092
Test: Secure video playback
Change-Id: I715ea5a4e9ee70ec2a022351b9e722a25bfb9f93
2023-04-13 13:47:11 -07:00
Sayanna Chandula
34ff37262f
Merge "thermal: enable pixelstats access to thermal metrics" into udc-d1-dev
2023-04-13 20:26:31 +00:00
Yixuan Wang
2c0e44805a
Merge "Add hal_contexthub_default to zuma sepolicy; Remove dontaudit rules for chre" into udc-d1-dev
2023-04-13 19:38:38 +00:00