Max Bires
8bfe8965a2
Adding allow rules and contexts to handle the following denials
...
denied { getattr } for pid=580 comm="ueventd" name="sda20" dev="tmpfs"
ino=19514 scontext=u:r:ueventd:s0 tcontext=u:object_r:tmpfs:s0
tclass=blk_file
denied { write } for pid=580 comm="ueventd" name="uevent" dev="sysfs"
ino=44062 scontext=u:r:ueventd:s0
tcontext=u:object_r:sysfs_bluetooth_writable:s0 tclass=file
denied { search } for pid=826 comm="time_daemon" name="msm_subsys"
dev="sysfs" ino=16858 scontext=u:r:time_daemon:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir
denied { write } for pid=2934 comm="Binder:1189_4" name="timerslack_ns"
dev="proc" ino=38677 scontext=u:r:system_server:s0
tcontext=u:r:untrusted_app_25:s0:c512,c768 tclass=file
denied { write } for pid=3936 comm="Binder:1189_C" name="timerslack_ns"
dev="proc" ino=85544 scontext=u:r:system_server:s0
tcontext=u:r:platform_app:s0:c512,c768 tclass=file
denied { write } for pid=1201 comm="Binder:1189_2" name="timerslack_ns"
dev="proc" ino=83223 scontext=u:r:system_server:s0
tcontext=u:r:system_app:s0 tclass=file
denied { write } for pid=1584 comm="Binder:1189_3" name="timerslack_ns"
dev="proc" ino=81248 scontext=u:r:system_server:s0
tcontext=u:r:audioserver:s0 tclass=file
denied { write } for pid=1201 comm="Binder:1189_2" name="timerslack_ns"
dev="proc" ino=38795 scontext=u:r:system_server:s0
tcontext=u:r:priv_app:s0:c512,c768 tclass=file
denied { write } for pid=1584 comm="Binder:1189_3" name="timerslack_ns"
dev="proc" ino=86229 scontext=u:r:system_server:s0
tcontext=u:r:untrusted_app:s0:c512,c768 tclass=file
denied { write } for pid=4624 comm="Binder:1189_E" name="timerslack_ns"
dev="proc" ino=105556 scontext=u:r:system_server:s0
tcontext=u:r:radio:s0 tclass=file
denied { write } for pid=1201 comm="Binder:1189_2" name="timerslack_ns"
dev="proc" ino=26256 scontext=u:r:system_server:s0
tcontext=u:r:hal_audio_default:s0 tclass=file
denied { create } for pid=836 comm="perfd" name="default_values"
scontext=u:r:perfd:s0 tcontext=u:object_r:system_data_file:s0
tclass=file
denied { find } for service=qti.ims.ext pid=3750 uid=1001
scontext=u:r:radio:s0 tcontext=u:object_r:imscm_service:s0
tclass=service_manager
denied { lock } for comm="ip6tables" path="/system/etc/xtables.lock"
dev="sda22" ino=968 scontext=u:r:netmgrd:s0
tcontext=u:object_r:system_file:s0 tclass=file
denied { getattr } for comm="android.hardwar"
path="/sys/devices/soc/c17a000.i2c/i2c-6/6-005a/leds/vibrator/duration"
dev="sysfs" ino=46884 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file
denied { open } for comm="android.hardwar"
path="/sys/devices/soc/c17a000.i2c/i2c-6/6-005a/leds/vibrator/activate"
dev="sysfs" ino=46883 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file
denied { read } for comm="android.hardwar" name="vibrator" dev="sysfs"
ino=41304 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=lnk_file
denied { search } for comm="android.hardwar" name="leds" dev="sysfs"
ino=27814 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=dir
denied { add } for
service=com.fingerprints.extension.IFingerprintNavigation pid=884
uid=1000 scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:fingerprint_service:s0 tclass=service_manager
denied { open } for pid=9391 comm="cat"
path="/sys/devices/virtual/thermal/cooling_device0/type" dev="sysfs"
ino=44002 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file
denied { read } for pid=9391 comm="cat" name="type" dev="sysfs"
ino=44002 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file
denied { search } for pid=9391 comm="cat" name="thermal" dev="sysfs"
ino=28795 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=dir
denied { getattr } for pid=9381 comm="ls"
path="/sys/kernel/debug/ion/heaps/secure_heap" dev="debugfs" ino=10246
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs:s0
tclass=file
denied { open } for pid=9381 comm="ls"
path="/sys/kernel/debug/ion/heaps" dev="debugfs" ino=9218
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs:s0
tclass=dir
denied { read } for pid=9381 comm="ls" name="heaps" dev="debugfs"
ino=9218 scontext=u:r:hal_dumpstate_impl:s0
tcontext=u:object_r:debugfs:s0 tclass=dir
denied { search } for pid=5401 comm="surfaceflinger" name="clients"
dev="debugfs" ino=8429 scontext=u:r:surfaceflinger:s0
tcontext=u:object_r:debugfs_ion:s0 tclass=dir
denied { search } for pid=5294 comm="android.hardwar" name="clients"
dev="debugfs" ino=8429 scontext=u:r:hal_audio_default:s0
tcontext=u:object_r:debugfs_ion:s0 tclass=dir
denied { write } for comm="android.hardwar" name="activate" dev="sysfs"
ino=46883 scontext=u:r:hal_vibrator_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=file
denied { lock execute_no_trans } for comm="rild" path="/vendor/qcril.db"
dev="sda20" ino=1019 scontext=u:r:rild:s0
tcontext=u:object_r:vendor_file:s0 tclass=file
Bug: 34784662
Test: The above denials are no longer occuring
Change-Id: I7931a8c3ed8bdfb7190d6c5c14a11525dca5be3a
2017-04-07 19:57:13 +00:00
Ed Tam
bfe6ab006c
Merge "thermal: specify location to load thermal config"
2017-04-07 03:13:31 +00:00
TreeHugger Robot
2bcd23683f
Merge "power: Fix power hal compiler warnings"
2017-04-06 22:19:26 +00:00
John Dias
ce2a1baf2a
thermal: specify location to load thermal config
...
Bug: 35700896
Test: boot, check for thermal-engine messages
Change-Id: I48c296f2751b8a5150dd7d37f89f29a688a6f949
2017-04-06 13:45:21 -07:00
Adrian Salido
4b51c52e7f
power: Fix power hal compiler warnings
...
Bug: 30432975
Test: compile power hal for walleye without warnings
Change-Id: I0d90c26462c662690f8a179250000b9a449a109f
2017-04-06 13:41:04 -07:00
Connor O'Brien
3c7822edf1
Merge "wahoo: use binderized boot HAL"
2017-04-06 20:24:11 +00:00
Yifan Hong
a7e7e26eba
Merge "Add type to device manifest."
2017-04-06 06:23:19 +00:00
TreeHugger Robot
265e0dd79a
Merge "Add new type and domain for vendor radio"
2017-04-06 04:29:44 +00:00
Ecco Park
8450042263
Merge "Add permissions to access wlan device node"
2017-04-06 03:53:48 +00:00
TreeHugger Robot
f622c29a28
Merge "Add drm hal to wahoo"
2017-04-05 23:19:16 +00:00
Max Bires
db7d8111a2
Merge "Adding file_contexts to fix hal_bluetooth"
2017-04-05 22:35:50 +00:00
Jeff Tinker
ea51adeb28
Add drm hal to wahoo
...
bug:35808472
Test: compiles, I don't have a device to test
Change-Id: I3839a5335f4fd976a6d668f037756bca00676bb8
2017-04-05 14:56:50 -07:00
Srinivas Girigowda
9f28ebd426
Add permissions to access wlan device node
...
This changes are added to give permissions to wlan device
node this includes providing required file context and
permissions to device created and control access only to required
systemserver.
Change-Id: I64554c3d4a2543eefc5ec809eaef407502081cf5
CRs-Fixed: 2010702
Bug: 36494467
Signed-off-by: Srinivas Girigowda <sgirigow@codeaurora.org >
2017-04-05 14:56:12 -07:00
TreeHugger Robot
4de588158d
Merge "wahoo: Create PDX socket dirs and cpusets for VR services"
2017-04-05 21:27:01 +00:00
Alex Vakulenko
4633df33ed
wahoo: Create PDX socket dirs and cpusets for VR services
...
Recent CL make VR services hard-fail (crash) on failed attempt to
create PDX sockets. Wahoo-based devices don't have socket directories
under /dev/socket/pdx/... to create those sockets, so they now crash
at boot (which includes surfaceflinger). This prevents the device from
even booting. Add init script to create those socket directories.
Also, create necessary cpusets used by VR services, similar to what
was done for marlin/sailfish (see this commit in device/google/marlin:
1cc612c4ee646e8fc6ae69e8837b9b0d0b2119ce).
Bug: 36977281
Test: `lunch walleye-eng && m -j32 && flash` - build succeeds, device boots
Change-Id: Ic458ceabb16917bcf574f6d8e2de864d41a44d96
2017-04-05 14:23:04 -07:00
Badhri Jagan Sridharan
8a8b465970
Merge "USB: HIDL: check the status of registerAsService"
2017-04-05 21:16:06 +00:00
David Lin
971ea5d074
vibrator hal: add support for drv2624 haptics driver on wahoo
...
This adds the vibrator HAL that implements the new setAmplitude and
perform(Effect) API.
Test done: vibrator_hidl_hal_test
Bug: 36782452
Change-Id: If9988434277790becb469d4dd928e75f7e6af41a
Signed-off-by: David Lin <dtwlin@google.com >
2017-04-05 12:44:20 -07:00
Jie Song
21ec03152e
Add new type and domain for vendor radio
...
1. Add radio_vendor_data_file type
2. Add logger_app domain
Bug: 36859102
Test: Verify no security denial
Change-Id: I6c9236a3b2e0b459bf16b2861e7ddfebca3ed9c6
2017-04-05 10:49:30 -07:00
Max Bires
eb252fd433
Adding file_contexts to fix hal_bluetooth
...
Handles denials of the following sort where hal_bluetooth didn't have
access to the directories in sysfs that it needed
denied { write } for comm="android.hardwar" name="extldo" dev="sysfs"
ino=44059 scontext=u:r:hal_bluetooth_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file
Bug: 34784662
Test: hal_bluetooth denials are cleaned up
Change-Id: I7cc01fbc1c6414a871e6b0a3b3c95e17a3cd1d99
2017-04-05 09:50:22 -07:00
Wei Wang
df8b9af4a5
Merge "wahoo: improve boot time and pull in bootanim display time"
2017-04-05 14:33:42 +00:00
Yifan Hong
4e21b916bd
Add type to device manifest.
...
Test: pass
Change-Id: I829f074ed3bd5987817fe48138bd365199be58ca
2017-04-04 20:00:49 -07:00
TreeHugger Robot
aa4df693c7
Merge "Add usb service"
2017-04-05 02:45:58 +00:00
Wei Wang
e0fc600245
wahoo: improve boot time and pull in bootanim display time
...
1) separate fstab mount
2) launch bootanim early
3) boottime cpuset/io tune
4) parallel slow init operations: write sysfs and insmod
After CL:
Boot time saved 330ms, bootanim triggered early before data/ mounted
Bug: 36780513
Test: walleye boots
Change-Id: I02803179746710413f4b1e2372f3550cd95d1581
2017-04-04 19:11:21 -07:00
TreeHugger Robot
b1a2a67cf8
Merge "Adding service_context's and allows to handle the following denials"
2017-04-04 23:49:46 +00:00
Connor O'Brien
2deebd4cb8
wahoo: use binderized boot HAL
...
Add the binderized boot HAL service to the manifest and grant
necessary SELinux permissions to access block devices.
Bug: 35810130
Test: Device boots & passes boot VTS test
Change-Id: I4df5ec0ff2f170da31e0748e376cda309802b554
Signed-off-by: Connor O'Brien <connoro@google.com >
2017-04-04 16:48:20 -07:00
TreeHugger Robot
5cb55c5e82
Merge "Wifi Offload HAL implementation for V1.0 interface"
2017-04-04 23:10:35 +00:00
Wei Wang
86ca1da571
Merge "wahoo: include missing libwpa_client"
2017-04-04 22:12:49 +00:00
Max Bires
26fe3e3a66
Adding service_context's and allows to handle the following denials
...
denied { add } for service=rcs pid=3849 uid=1001 scontext=u:r:radio:s0
tcontext=u:object_r:default_android_service:s0 tclass=service_manager
denied { add } for service=qti.ims.ext pid=5885 uid=1001
scontext=u:r:radio:s0 tcontext=u:object_r:default_android_service:s0
tclass=service_manager
denied { add } for service=cneservice pid=3134 uid=1000
scontext=u:r:system_app:s0
tcontext=u:object_r:default_android_service:s0 tclass=service_manager
denied { find } for service=permission pid=839 uid=0
scontext=u:r:folio_daemon:s0 tcontext=u:object_r:permission_service:s0
tclass=service_manager
denied { find } for service=sensorservice pid=839 uid=0
scontext=u:r:folio_daemon:s0
tcontext=u:object_r:sensorservice_service:s0 tclass=service_manager
denied { add } for
service=com.fingerprints.extension.IFingerprintNavigation pid=847
uid=1000 scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:default_android_service:s0 tclass=service_manager
denied { set } for property=radio.traffic.stats.tx pid=830 uid=1001
gid=1001 scontext=u:r:rild:s0 tcontext=u:object_r:default_prop:s0
tclass=property_service
denied { getattr } for pid=708 comm="servicemanager"
scontext=u:r:servicemanager:s0 tcontext=u:r:folio_daemon:s0
tclass=process
denied { open } for pid=708 comm="servicemanager"
path="/proc/832/attr/current" dev="proc" ino=33917
scontext=u:r:servicemanager:s0 tcontext=u:r:folio_daemon:s0 tclass=file
denied { read } for pid=708 comm="servicemanager" name="current"
dev="proc" ino=33917 scontext=u:r:servicemanager:s0
tcontext=u:r:folio_daemon:s0 tclass=file
denied { search } for pid=708 comm="servicemanager" name="832"
dev="proc" ino=21805 scontext=u:r:servicemanager:s0
tcontext=u:r:folio_daemon:s0 tclass=dir
denied { call } for pid=743 comm="Binder:698_2" scontext=u:r:per_mgr:s0
tcontext=u:r:system_server:s0 tclass=binder
denied { call } for pid=743 comm="Binder:698_2" scontext=u:r:per_mgr:s0
tcontext=u:r:rild:s0 tclass=binder
Bug: 34784662
Test: The above denials are no longer present
Change-Id: I0b09503680bb8e11d5e4ae63033a441e4c03a2cd
2017-04-04 21:53:50 +00:00
Sohani Rao
a25b59e448
Wifi Offload HAL implementation for V1.0 interface
...
Implements Offload HAL HIDL service for Wifi Offload v1.0 interface
Bug: 32842314
Test: Unit tests and Mannual test to ensure service is running
Change-Id: I9612ec28b9b042be10b7e022362124de906649ab
2017-04-04 14:29:20 -07:00
Trevor Bunker
8a611aeffe
sepolicy: fix build
...
duplicate file type chre_socket
Test: manual build
Change-Id: Ic608570c6a86a7ef8bdbda9449c6123e4372d3bb
2017-04-04 13:34:32 -07:00
Wei Wang
0db68e8fe3
wahoo: include missing libwpa_client
...
Bug: 36893555
Test: build and boot muskie
Change-Id: I6cde962cebdfc15f377ca0d9f36aadeafedade06
2017-04-04 11:49:01 -07:00
TreeHugger Robot
778d0e0bc6
Merge "Adding allows to handle the following denials."
2017-04-04 18:10:40 +00:00
Badhri Jagan Sridharan
49e7f44507
USB: HIDL: check the status of registerAsService
...
registerAsService call could fail. Hence check the return value.
Bug: 36704362
Change-Id: I46dcd74dbee6aba72cf344f10854e5d4b1b6de18
2017-04-04 10:38:37 -07:00
Max Bires
275bad3194
Adding allows to handle the following denials.
...
denied { add find } for service=rcs pid=8083 uid=1001
scontext=u:r:radio:s0 tcontext=u:object_r:default_android_service:s0
tclass=service_manager
denied { find } for service=vendor.qcom.PeripheralManager pid=850
uid=1000 scontext=u:r:wcnss_service:s0
tcontext=u:object_r:per_mgr_service:s0 tclass=service_manager
denied { find } for service=vendor.qcom.PeripheralManager pid=846
uid=1001 scontext=u:r:rild:s0 tcontext=u:object_r:per_mgr_service:s0
tclass=service_manager
denied { find } for service=vendor.qcom.PeripheralManager pid=1365
uid=1000 scontext=u:r:system_server:s0
tcontext=u:object_r:per_mgr_service:s0 tclass=service_manager
denied { relabelto } for name="sda20" dev="tmpfs" ino=18344
scontext=u:r:init:s0 tcontext=u:object_r:sda_block_device:s0
tclass=blk_file
denied { getattr } for pid=2911 comm="droid.bluetooth"
path="/storage/emulated" dev="tmpfs" ino=80994 scontext=u:r:bluetooth:s0
tcontext=u:object_r:storage_stub_file:s0 tclass=dir
denied { write } for pid=841 comm="chre" name="socket" dev="tmpfs"
ino=20101 scontext=u:r:chre:s0 tcontext=u:object_r:socket_device:s0
tclass=dir
denied { ioctl } for pid=837 comm="folio_daemon" path="/dev/binder"
dev="tmpfs" ino=20922 ioctlcmd=6201 scontext=u:r:folio_daemon:s0
tcontext=u:object_r:binder_device:s0 tclass=chr_file
denied { create read getattr } for pid=700 comm="android.hardwar"
name="WCD9340_Bluetooth_cal.acdbdelta" scontext=u:r:hal_audio_default:s0
tcontext=u:object_r:audio_data_file:s0 tclass=file
denied { search write add_name } for pid=700 comm="android.hardwar"
name="audio" dev="sda45" ino=639037 scontext=u:r:hal_audio_default:s0
tcontext=u:object_r:audio_data_file:s0 tclass=dir
denied { connectto } for pid=935 comm="HwBinder:823_2"
path="/dev/socket/perfd" scontext=u:r:mediacodec:s0
tcontext=u:r:perfd:s0 tclass=unix_stream_socket
denied { connectto } for pid=1276 comm="writer" path="/dev/socket/perfd"
scontext=u:r:hal_audio_default:s0 tcontext=u:r:perfd:s0
tclass=unix_stream_socket
denied { write } for pid=1276 comm="writer" name="perfd" dev="tmpfs"
ino=24997 scontext=u:r:hal_audio_default:s0
tcontext=u:object_r:perfd_socket:s0 tclass=sock_file
denied { create read getattr } for pid=841 comm="perfd"
name="default_values" scontext=u:r:perfd:s0
tcontext=u:object_r:system_data_file:s0 tclass=file
denied { write add_name } for pid=841 comm="perfd" name="perfd"
dev="sda45" ino=3407877 scontext=u:r:perfd:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir
denied { read } for pid=841 comm="perfd" name="cpus" dev="cgroup" ino=99
scontext=u:r:perfd:s0 tcontext=u:object_r:cgroup:s0 tclass=file
denied { read open getattr } for pid=803 comm="perfd"
name="u:object_r:post_boot_prop:s0" dev="tmpfs" ino=18264
scontext=u:r:perfd:s0 tcontext=u:object_r:post_boot_prop:s0 tclass=file
denied { read open ioctl } for pid=702 comm="android.hardwar"
path="/dev/block/sdb" dev="tmpfs" ino=10114 ioctlcmd=1268
scontext=u:r:hal_bootctl_default:s0 tcontext=u:object_r:block_device:s0
tclass=blk_file
denied { write } for pid=703 comm="android.hardwar" name="sdb"
dev="tmpfs" ino=18208 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:sdb_block_device:s0 tclass=blk_file
denied { connectto } for pid=704 comm="android.hardwar"
path="/dev/socket/perfd" scontext=u:r:hal_power_default:s0
tcontext=u:r:perfd:s0 tclass=unix_stream_socket
denied { search } for pid=714 comm="android.hardwar"
name="800f000.qcom,spmi" dev="sysfs" ino=17602
scontext=u:r:hal_usb_default:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
tclass=dir
denied { read open getattr } for pid=714 comm="android.hardwar"
name="current_power_role" dev="sysfs" ino=49071
scontext=u:r:hal_usb_default:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
tclass=file
denied { search } for pid=1062 comm="imsdatadaemon" name="netmgr"
dev="tmpfs" ino=22946 scontext=u:r:ims:s0
tcontext=u:object_r:netmgrd_socket:s0 tclass=dir
denied { create setattr unlink } for pid=818 comm="init" name="chre"
dev="tmpfs" ino=21770 scontext=u:r:init:s0
tcontext=u:object_r:socket_device:s0 tclass=sock_file
denied { connectto } for pid=696 comm="setprop"
path="/dev/socket/property_service" scontext=u:r:init_power:s0
tcontext=u:r:init:s0 tclass=unix_stream_socket
denied { set } for property=sys.post_boot.parsed pid=696 uid=0 gid=0
scontext=u:r:init_power:s0 tcontext=u:object_r:system_prop:s0
tclass=property_service
denied { write } for pid=696 comm="setprop" name="property_service"
dev="tmpfs" ino=21108 scontext=u:r:init_power:s0
tcontext=u:object_r:property_socket:s0 tclass=sock_file
denied { read open write } for pid=836 comm="perfd" name="swap_ratio"
dev="proc" ino=25638 scontext=u:r:perfd:s0 tcontext=u:object_r:proc:s0
tclass=file
denied { read open } for pid=827 comm="perfd"
name="available_frequencies" dev="sysfs" ino=33342 scontext=u:r:perfd:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file
denied { search } for pid=827 comm="perfd" name="5000000.qcom,kgsl-3d0"
dev="sysfs" ino=21521 scontext=u:r:perfd:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir
denied { read } for pid=827 comm="perfd" name="devfreq" dev="sysfs"
ino=33377 scontext=u:r:perfd:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
tclass=lnk_file
denied { write } for pid=881 comm="perfd" name="perfd" dev="sda45"
ino=3407877 scontext=u:r:perfd:s0
tcontext=u:object_r:system_data_file:s0 tclass=dir
denied { read } for pid=827 comm="perfd" name="soc_id" dev="sysfs"
ino=49301 scontext=u:r:perfd:s0 tcontext=u:object_r:sysfs_soc:s0
tclass=file
denied { write } for pid=3830 comm=504F5349582074696D65722032
name="perfd" dev="tmpfs" ino=8971 scontext=u:r:perfd:s0
tcontext=u:object_r:perfd_socket:s0 tclass=sock_file
denied { search } for pid=827 comm="perfd" name="soc0" dev="sysfs"
ino=49297 scontext=u:r:perfd:s0 tcontext=u:object_r:sysfs_soc:s0
tclass=dir
denied { kill } for pid=858 comm="perfd" capability=5
scontext=u:r:perfd:s0 tcontext=u:r:perfd:s0 tclass=capability
denied { signull } for pid=858 comm="perfd" scontext=u:r:perfd:s0
tcontext=u:r:mediacodec:s0 tclass=process
denied { call } for pid=924 comm="Binder:732_1" scontext=u:r:per_mgr:s0
tcontext=u:r:wcnss_service:s0 tclass=binder
denied { search } for pid=3670 comm="IFMsg_Rxr" name="qmux_radio"
dev="tmpfs" ino=22942 scontext=u:r:radio:s0
tcontext=u:object_r:qmuxd_socket:s0 tclass=dir
denied { write } for pid=3789 comm="IFMsg_Rxr" name="rild_ims0"
dev="tmpfs" ino=28087 scontext=u:r:radio:s0
tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file
denied { search } for pid=1405 comm="rild" name="netmgr" dev="tmpfs"
ino=22946 scontext=u:r:rild:s0 tcontext=u:object_r:netmgrd_socket:s0
tclass=dir
denied { open } for pid=3138 comm=".dataservices"
path="/dev/__properties__/u:object_r:cnd_prop:s0" dev="tmpfs" ino=18241
scontext=u:r:system_app:s0 tcontext=u:object_r:cnd_prop:s0 tclass=file
denied { create read getattr lock unlink } for pid=3134 comm="Thread-5"
name="xtra.sqlite" scontext=u:r:system_server:s0
tcontext=u:object_r:location_data_file:s0 tclass=file
denied { search } for pid=3594 comm="Thread-5" name="netmgr" dev="tmpfs"
ino=22946 scontext=u:r:system_server:s0
tcontext=u:object_r:netmgrd_socket:s0 tclass=dir
denied { search } for pid=1578 comm="system-server-i" name="/"
dev="sdd3" ino=2 scontext=u:r:system_server:s0
tcontext=u:object_r:persist_file:s0 tclass=dir
denied { call } for pid=3134 comm="Thread-5"
scontext=u:r:system_server:s0 tcontext=u:r:per_mgr:s0 tclass=binder
denied { search write add_name create read open remove_name } for
pid=3134 comm="Thread-5" name="location" dev="sda45" ino=639046
scontext=u:r:system_server:s0 tcontext=u:object_r:location_data_file:s0
tclass=dir
denied { transfer } for pid=1445 comm="Binder:1425_1"
scontext=u:r:system_server:s0 tcontext=u:r:folio_daemon:s0 tclass=binder
denied { read create write } for pid=929 comm="time_daemon"
scontext=u:r:time_daemon:s0 tcontext=u:r:time_daemon:s0 tclass=socket
denied { ioctl } for pid=925 comm="time_daemon" path="socket:[18992]"
dev="sockfs" ino=18992 ioctlcmd=c302 scontext=u:r:time_daemon:s0
tcontext=u:r:time_daemon:s0 tclass=socket
denied { ioctl } for pid=859 comm="time_daemon" path="socket:[19003]"
dev="sockfs" ino=19003 ioctlcmd=c304 scontext=u:r:time_daemon:s0
tcontext=u:r:time_daemon:s0 tclass=socket
denied { read open } for pid=827 comm="time_daemon" name="rtc0"
dev="tmpfs" ino=22580 scontext=u:r:time_daemon:s0
tcontext=u:object_r:rtc_device:s0 tclass=chr_file
denied { read open getattr } for pid=860 comm="time_daemon"
name="soc_id" dev="sysfs" ino=49301 scontext=u:r:time_daemon:s0
tcontext=u:object_r:sysfs_soc:s0 tclass=file
denied { read open } for pid=827 comm="time_daemon" name="name"
dev="sysfs" ino=32499 scontext=u:r:time_daemon:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file
denied { setgid setuid sys_time } for pid=827 comm="time_daemon"
capability=6 scontext=u:r:time_daemon:s0 tcontext=u:r:time_daemon:s0
tclass=capability
denied { search read open } for pid=827 comm="time_daemon"
name="msm_subsys" dev="sysfs" ino=16858 scontext=u:r:time_daemon:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir
denied { read } for pid=827 comm="time_daemon" name="subsys0"
dev="sysfs" ino=32507 scontext=u:r:time_daemon:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=lnk_file
denied { search } for pid=860 comm="time_daemon" name="soc0" dev="sysfs"
ino=49297 scontext=u:r:time_daemon:s0 tcontext=u:object_r:sysfs_soc:s0
tclass=dir
denied { getattr setattr } for pid=589 comm="ueventd" name="sda20"
dev="tmpfs" ino=9908 scontext=u:r:ueventd:s0
tcontext=u:object_r:tmpfs:s0 tclass=blk_file
denied { ioctl } for pid=828 comm="cnss_diag" path="socket:[100666]"
dev="sockfs" ino=100666 ioctlcmd=8be5 scontext=u:r:wcnss_service:s0
tcontext=u:r:wcnss_service:s0 tclass=udp_socket
Bug: 34784662
Test: The above denials are no longer present
Change-Id: Iedf0a829a8e9629961104bb350e53224a179d5dd
2017-04-04 16:37:57 +00:00
Vineeta Srivastava
d2559c428d
Merge "Split fstab from wahoo"
2017-04-04 05:14:17 +00:00
Vineeta Srivastava
6391a9f523
Split fstab from wahoo
...
Change-Id: I37ae0d2b5d1a12a513744b8f59cdc71aaf26dba1
2017-04-03 18:11:10 -07:00
Vineeta Srivastava
93e84f9caf
Start port-bridge service when serial_cdev is enabled
...
Change-Id: I3113c45483893629ea417579b8b04446d2f52808
2017-04-04 00:33:36 +00:00
Brian Duddie
ac4cb203d6
Merge "Add binderized context hub HAL"
2017-04-04 00:28:27 +00:00
TreeHugger Robot
8c6ba4b3ab
Merge "Do not assume default names for VINTF."
2017-04-03 22:54:37 +00:00
TreeHugger Robot
e95cc6d94f
Merge "Adding dirs to genfscon for sysfs to fix labeling issue."
2017-04-03 19:38:56 +00:00
Brian Duddie
dfdaceabf2
Add binderized context hub HAL
...
Add context hub HAL implementation to the build, with new sepolicy files
that resolve these denials:
type=1400 audit(4779207.059:418): avc: denied { write } for pid=809
comm="android.hardwar" name="chre" dev="tmpfs" ino=32491
scontext=u:r:hal_contexthub_default:s0
tcontext=u:object_r:socket_device:s0 tclass=sock_file permissive=1
type=1400 audit(5568590.159:45): avc: denied { connectto } for pid=734
comm="android.hardwar" path="/dev/socket/chre"
scontext=u:r:hal_contexthub_default:s0 tcontext=u:r:chre:s0
tclass=unix_stream_socket permissive=1
Bug: 35808469
Test: confirm HAL gets loaded, VTS passes, no denials from
hal_contexthub_default
Change-Id: I1882571c0541de78242755cd4b3b1548365a388b
2017-04-03 11:49:09 -07:00
matt_huang
2f747de0cd
Change permissions of led driver
...
Change-Id: Ia9a8dd8d401d274a37820bdb30727eec8b1f54b3
Signed-off-by: matt_huang <matt_huang@htc.com >
2017-04-03 10:00:43 -07:00
Max Bires
73a599a65d
Adding dirs to genfscon for sysfs to fix labeling issue.
...
This fixes the following denials:
denied { open } for pid=669 comm="init.power.sh"
path="/sys/class/devfreq" dev="sysfs" ino=28322
scontext=u:r:init_power:s0 tcontext=u:object_r:sysfs:s0 tclass=dir
denied { search } for pid=669 comm="init.power.sh" name="soc:qcom,cpubw"
dev="sysfs" ino=18242 scontext=u:r:init_power:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir
denied { write } for pid=669 comm="init.power.sh" name="governor"
dev="sysfs" ino=44449 scontext=u:r:init_power:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file
denied { open } for pid=669 comm="init.power.sh"
path="/sys/devices/soc/soc:qcom,cpubw/devfreq/soc:qcom,cpubw/governor"
dev="sysfs" ino=44449 scontext=u:r:init_power:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file
Bug: 35154684
Test: The above denials are cleared out and the tcontext is correct
Change-Id: Ida40036c18427ab9a3116b7b855a8418f11137e7
2017-04-03 09:33:38 -07:00
Max Bires
f41ff958d8
Fixing the following run and boot time denials
...
denied { getattr read open } for pid=716 comm="android.hardwar"
path="/dev/block/sdc1" dev="tmpfs" ino=21762
scontext=u:r:hal_bootctl_default:s0 tcontext=u:object_r:block_device:s0
tclass=blk_file
denied { set } for property=htc.camera.sensor.inf pid=717 uid=1047
gid=1005 scontext=u:r:hal_camera_default:s0
tcontext=u:object_r:default_prop:s0 tclass=property_service
denied { read open } for pid=642 comm="qseecomd" name="/" dev="sda45"
ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0
tclass=dir
denied { read open search write add_name } for pid=642 comm="qseecomd"
name="fpdata" dev="sda45" ino=3408055 scontext=u:r:tee:s0
tcontext=u:object_r:fingerprintd_data_file:s0 tclass=dir
denied { create read } for pid=642 comm="qseecomd" name="user.db.bak"
scontext=u:r:tee:s0 tcontext=u:object_r:fingerprintd_data_file:s0
tclass=file
denied { read write } for pid=7567 comm="secdiscard" name="sda45"
dev="tmpfs" ino=21749 scontext=u:r:vold:s0
tcontext=u:object_r:sda_block_device:s0 tclass=blk_file
Bug: 34784662
Test: The above denials are no longer present
Change-Id: If5d8fffd2c50e85e22c7bcbbb429bd80bbf1f0fa
2017-04-02 19:07:17 -07:00
Max Bires
3669fffc1f
Adding allows to fix following denials during run/boot time
...
denied { write } for pid=808 comm="cnd" name="property_service"
dev="tmpfs" ino=19844 scontext=u:r:cnd:s0
tcontext=u:object_r:property_socket:s0 tclass=sock_file
denied { connectto } for pid=808 comm="cnd"
path="/dev/socket/property_service" scontext=u:r:cnd:s0
tcontext=u:r:init:s0 tclass=unix_stream_socket
denied { set } for property=persist.sys.cnd.iwlan pid=808 uid=1000
gid=1000 scontext=u:r:cnd:s0 tcontext=u:object_r:system_prop:s0
tclass=property_service
denied { sendto } for pid=808 comm="cnd" path="/dev/socket/wpa_wlan0"
scontext=u:r:cnd:s0 tcontext=u:r:hal_wifi_supplicant_default:s0
tclass=unix_dgram_socket
denied { connectto } for pid=687 comm="android.hardwar"
path=0062745F736F636B scontext=u:r:hal_bluetooth_default:s0
tcontext=u:r:wcnss_filter:s0 tclass=unix_stream_socket
denied { getattr } for pid=688 comm="android.hardwar"
path="/dev/block/sdb1" dev="tmpfs" ino=21693
scontext=u:r:hal_bootctl_default:s0 tcontext=u:object_r:block_device:s0
tclass=blk_file
denied { read } for pid=688 comm="android.hardwar" name="by-name"
dev="tmpfs" ino=19833 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:block_device:s0 tclass=dir
denied { sendto } for pid=4906 comm="wpa_supplicant"
path="/data/misc/wifi/sockets/wpa_ctrl_808-2"
scontext=u:r:hal_wifi_supplicant_default:s0 tcontext=u:r:cnd:s0
tclass=unix_dgram_socket
denied { connectto } for pid=1071 comm="imsdatadaemon"
path="/dev/socket/netmgr/netmgr_connect_socket" scontext=u:r:ims:s0
tcontext=u:r:netmgrd:s0 tclass=unix_stream_socket
denied { open getattr } for pid=7689 comm="Thread-2"
path="/dev/__properties__/u:object_r:ramdump_prop:s0" dev="tmpfs"
ino=20494 scontext=u:r:platform_app:s0:c512,c768
tcontext=u:object_r:ramdump_prop:s0 tclass=file
denied { write } for pid=3588 comm="IFMsg_Rxr" name="rild_ims0"
dev="tmpfs" ino=30159 scontext=u:r:radio:s0
tcontext=u:object_r:qmuxd_socket:s0 tclass=sock_file
denied { read open } for pid=672 comm="ramdump" name="fstab" dev="sysfs"
ino=16483 scontext=u:r:ramdump:s0 tcontext=u:object_r:sysfs:s0
tclass=dir
denied { read open getattr } for pid=672 comm="ramdump" name="cmdline"
dev="proc" ino=4026532068 scontext=u:r:ramdump:s0
tcontext=u:object_r:proc:s0 tclass=file
denied { connectto } for pid=3249 comm="Thread-4"
path="/dev/socket/netmgr/netmgr_connect_socket"
scontext=u:r:system_server:s0 tcontext=u:r:netmgrd:s0
tclass=unix_stream_socket
denied { call transfer } for pid=3148 comm="Thread-4"
scontext=u:r:system_server:s0 tcontext=u:r:per_mgr:s0 tclass=binder
denied { write } for pid=3249 comm="Thread-4"
name="netmgr_connect_socket" dev="tmpfs" ino=25191
scontext=u:r:system_server:s0 tcontext=u:object_r:netmgrd_socket:s0
tclass=sock_file
denied { read write open } for pid=3337 comm="wcnss_filter"
name="ttyHS0" dev="tmpfs" ino=21812 scontext=u:r:wcnss_filter:s0
tcontext=u:object_r:device:s0 tclass=chr_file
denied { getattr } for pid=826 comm="cnss-daemon"
path="/proc/sys/net/ipv4/tcp_adv_win_scale" dev="proc" ino=106652
scontext=u:r:wcnss_service:s0 tcontext=u:object_r:proc_net:s0
tclass=file
denied { ioctl } for pid=7237 comm="ifconfig" path="socket:[108096]"
dev="sockfs" ino=108096 ioctlcmd=8914 scontext=u:r:wcnss_service:s0
tcontext=u:r:wcnss_service:s0 tclass=udp_socket
Bug: 34784662
Test: The above denials are no longer present
Change-Id: I1adafb8205c8d2a662921b42af9b580bc1d63bb8
2017-04-03 00:23:03 +00:00
TreeHugger Robot
609f422c4d
Merge "wahoo: Add libbt-vendor in device.mk"
2017-04-01 19:39:06 +00:00
TreeHugger Robot
ec45cdc146
Merge "Annotate core components that access vendor data types"
2017-04-01 04:43:18 +00:00
TreeHugger Robot
077214c030
Merge "sepolicy: add time_daemon domain to allow service to boot"
2017-04-01 01:56:06 +00:00
TreeHugger Robot
ddcd856200
Merge "nfc: Enable Binderized NFC HAL"
2017-04-01 01:49:06 +00:00
TreeHugger Robot
9614e64032
Merge "Start CHRE daemon on boot"
2017-04-01 01:41:26 +00:00