From 1f83bb110e61799fdd0e00ff0d79957569eed848 Mon Sep 17 00:00:00 2001 From: Kai Hsieh Date: Sat, 21 Sep 2024 13:38:00 +0800 Subject: [PATCH 1/4] Add GIA (Google Input interface Abstraction layer) related SEPolicy rules and AIDL compatibility matrices. AVC evidences: 10-29 16:53:50.756 1305 1305 I binder:1305_2: type=1400 audit(0.0:24): avc: denied { search } for name="goog_touch_interface" dev="sysfs" ino=110634 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=dir permissive=1 10-29 16:53:50.756 1305 1305 I binder:1305_2: type=1400 audit(0.0:25): avc: denied { read } for name="interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1 10-29 16:53:50.756 1305 1305 I binder:1305_2: type=1400 audit(0.0:26): avc: denied { open } for path="/sys/devices/virtual/goog_touch_interface/gti.0/interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1 10-29 16:53:50.756 1305 1305 I binder:1305_2: type=1400 audit(0.0:27): avc: denied { getattr } for path="/sys/devices/virtual/goog_touch_interface/gti.0/interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1 10-29 16:53:50.756 1305 1305 I binder:1305_2: type=1400 audit(0.0:28): avc: denied { write } for name="interactive_calibrate" dev="sysfs" ino=110738 scontext=u:r:gia:s0 tcontext=u:object_r:sysfs_touch_gti:s0 tclass=file permissive=1 Test: Build succeed. Test: Manually, checked whether GIA service is started successfully via command `service list`. Bug: 367881686 Flag: build.RELEASE_PIXEL_GIA_ENABLED Change-Id: I8069521425ff1e830d759252bf8bf460f4dc6f32 Signed-off-by: Kai Hsieh --- input/gia/aidl/compatibility_matrix.xml | 10 ++++++++++ input/gia/aidl/manifest.xml | 10 ++++++++++ input/gia/gia.mk | 11 +++++++++++ input/gia/sepolicy/attributes | 2 ++ input/gia/sepolicy/file_contexts | 2 ++ input/gia/sepolicy/gia.te | 18 ++++++++++++++++++ input/gia/sepolicy/hal_gia.te | 8 ++++++++ input/gia/sepolicy/service.te | 2 ++ input/gia/sepolicy/service_contexts | 2 ++ 9 files changed, 65 insertions(+) create mode 100644 input/gia/aidl/compatibility_matrix.xml create mode 100644 input/gia/aidl/manifest.xml create mode 100644 input/gia/gia.mk create mode 100644 input/gia/sepolicy/attributes create mode 100644 input/gia/sepolicy/file_contexts create mode 100644 input/gia/sepolicy/gia.te create mode 100644 input/gia/sepolicy/hal_gia.te create mode 100644 input/gia/sepolicy/service.te create mode 100644 input/gia/sepolicy/service_contexts diff --git a/input/gia/aidl/compatibility_matrix.xml b/input/gia/aidl/compatibility_matrix.xml new file mode 100644 index 0000000..1a348ea --- /dev/null +++ b/input/gia/aidl/compatibility_matrix.xml @@ -0,0 +1,10 @@ + + + com.google.input.gia.core + + IGiaService + default + + 1 + + \ No newline at end of file diff --git a/input/gia/aidl/manifest.xml b/input/gia/aidl/manifest.xml new file mode 100644 index 0000000..98303c8 --- /dev/null +++ b/input/gia/aidl/manifest.xml @@ -0,0 +1,10 @@ + + + com.google.input.gia.core + + IGiaService + default + + 1 + + \ No newline at end of file diff --git a/input/gia/gia.mk b/input/gia/gia.mk new file mode 100644 index 0000000..ea079ca --- /dev/null +++ b/input/gia/gia.mk @@ -0,0 +1,11 @@ +BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/input/gia/sepolicy + +PRODUCT_PACKAGES += gia +PRODUCT_PACKAGES += com.google.input.gia.giaservicemanager + +PRODUCT_SOONG_NAMESPACES += vendor/google/interfaces +PRODUCT_SOONG_NAMESPACES += vendor/google/input/gia/core +PRODUCT_SOONG_NAMESPACES += vendor/google/input/gia/core-servicemanager + +DEVICE_MANIFEST_FILE += device/google/gs-common/input/gia/aidl/manifest.xml +DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs-common/input/gia/aidl/compatibility_matrix.xml diff --git a/input/gia/sepolicy/attributes b/input/gia/sepolicy/attributes new file mode 100644 index 0000000..1d61ad3 --- /dev/null +++ b/input/gia/sepolicy/attributes @@ -0,0 +1,2 @@ +# This macro produces: define hal_gia, hal_gia_client, hal_gia_server +hal_attribute(gia) diff --git a/input/gia/sepolicy/file_contexts b/input/gia/sepolicy/file_contexts new file mode 100644 index 0000000..99d6857 --- /dev/null +++ b/input/gia/sepolicy/file_contexts @@ -0,0 +1,2 @@ +# chmod +x in SEPolicy language +/vendor/bin/gia u:object_r:gia_exec:s0 diff --git a/input/gia/sepolicy/gia.te b/input/gia/sepolicy/gia.te new file mode 100644 index 0000000..2c84e7c --- /dev/null +++ b/input/gia/sepolicy/gia.te @@ -0,0 +1,18 @@ +# SEPolicies for GIA (Google Input interface Abstraction layer) +type gia, domain; +type gia_exec, exec_type, vendor_file_type, file_type; + +# Macro transferring gia_exec to the gia domain +init_daemon_domain(gia) + +# let this domain use the hal service +hal_client_domain(gia, hal_gia) +# allow binder communication with service_manager +binder_use(gia) + +# let this domain serve the hal service +hal_server_domain(gia, hal_gia) + +# allow gia for accessing touch related system file-nodes +allow gia sysfs_touch_gti:dir r_dir_perms; +allow gia sysfs_touch_gti:file rw_file_perms; diff --git a/input/gia/sepolicy/hal_gia.te b/input/gia/sepolicy/hal_gia.te new file mode 100644 index 0000000..b75c9fb --- /dev/null +++ b/input/gia/sepolicy/hal_gia.te @@ -0,0 +1,8 @@ +# allow binder connection from client to server +binder_call(hal_gia_client, hal_gia_server) + +# allow client to find the service & allow server to register the service +hal_attribute_service(hal_gia, hal_gia_service) + +# allow binder communication from server to service_manager +binder_use(hal_gia_server) diff --git a/input/gia/sepolicy/service.te b/input/gia/sepolicy/service.te new file mode 100644 index 0000000..aed1135 --- /dev/null +++ b/input/gia/sepolicy/service.te @@ -0,0 +1,2 @@ +# Declares GIA related services +type hal_gia_service, hal_service_type, protected_service, service_manager_type; diff --git a/input/gia/sepolicy/service_contexts b/input/gia/sepolicy/service_contexts new file mode 100644 index 0000000..b1773ec --- /dev/null +++ b/input/gia/sepolicy/service_contexts @@ -0,0 +1,2 @@ +# Attaches GIA services to the cooresponding SEPolicy group +com.google.input.gia.core.IGiaService/default u:object_r:hal_gia_service:s0 From cfedcac7d7ba9acfd0e2edb9c16d7c8e5913f1fb Mon Sep 17 00:00:00 2001 From: timmyli Date: Fri, 8 Nov 2024 06:08:27 +0000 Subject: [PATCH 2/4] Remove bug comment Bug: 363018500 Test: comment only Flag: EXEMPT remove comment Change-Id: I86ed9f0e7ed5b3741b23afffb2d7440683f34eb0 --- gcam_app/sepolicy/product/private/debug_camera_app.te | 1 - 1 file changed, 1 deletion(-) diff --git a/gcam_app/sepolicy/product/private/debug_camera_app.te b/gcam_app/sepolicy/product/private/debug_camera_app.te index 0449bc0..9d4643d 100644 --- a/gcam_app/sepolicy/product/private/debug_camera_app.te +++ b/gcam_app/sepolicy/product/private/debug_camera_app.te @@ -1,5 +1,4 @@ # GCANext and GCAEng. -# b/363018500 typeattribute debug_camera_app coredomain; userdebug_or_eng(` From f39a955d95f76da1838f63b6968540bbdc9ae025 Mon Sep 17 00:00:00 2001 From: Lucas Wei Date: Tue, 29 Oct 2024 07:10:23 +0000 Subject: [PATCH 3/4] Introduce Pixel mailbox module Introduce Pixel mailbox module to dump debugging messages and integrate with bugreport. This patch also create sepolicy files to avoid avc denied. avc: denied { search } for comm="dump_mailbox" name="radio" dev="dm-57" ino=375 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 avc: denied { search } for comm="dump_mailbox" name="instances" dev="tracefs" ino=4203 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir permissive=1 avc: denied { read } for comm="dump_mailbox" name="trace" dev="tracefs" ino=7250 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=file permissive=1 avc: denied { open } for comm="dump_mailbox" path="/sys/kernel/tracing/instances/goog_cpm_mailbox/trace" dev="tracefs" ino=7187 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_traci avc: denied { create } for comm="dump_mailbox" name="goog_cpm_mailbox_trace" scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1 avc: denied { write open } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=29097 scontext=u:r:dump_mailbox:s0 tcontex=1 avc: denied { getattr } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=29097 scontext=u:r:dump_mailbox:s0 tcontext=ut=5 audit_backlog_limit=64 =1 avc: denied { read } for comm="dump_mailbox" name="trace" dev="tracefs" ino=5239 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances_mailbox:s0 tclass=file permissive=1 avc: denied { open } for comm="dump_mailbox" path="/sys/kernel/tracing/instances/goog_cpm_mailbox/trace" dev="tracefs" ino=5239 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances_mailbox:s0 tclass=file permissive=1 avc: denied { create } for comm="dump_mailbox" name="goog_cpm_mailbox_trace" scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1 avc: denied { write open } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=30937 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1 avc: denied { getattr } for comm="dump_mailbox" path="/sys/kernel/tracing/instances/goog_cpm_mailbox/trace" dev="tracefs" ino=5239 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:debugfs_tracing_instances_mailbox:s0 tclass=file permissive=1 avc: denied { getattr } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=30937 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1 avc: denied { create } for comm="dump_mailbox" name="goog_cpm_mailbox_trace" scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclas(6 results) 15:39:41 [4796/19306] avc: denied { write open } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=32864 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1 avc: denied { getattr } for comm="dump_mailbox" path="/data/vendor/radio/logs/always-on/all_logs/mailbox/goog_cpm_mailbox_trace" dev="dm-52" ino=32864 scontext=u:r:dump_mailbox:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=file permissive=1 Flag: EXEMPT, add mailbox dump program to bugreport Bug: 363168077 Change-Id: I622f37bf8f913df8d9b242ab206fc267d446753d --- mailbox/Android.bp | 21 ++++++++++++++++++ mailbox/dump/dump_mailbox.cpp | 32 +++++++++++++++++++++++++++ mailbox/dump/sepolicy/dump_mailbox.te | 7 ++++++ mailbox/dump/sepolicy/file.te | 2 ++ mailbox/dump/sepolicy/file_contexts | 1 + mailbox/dump/sepolicy/genfs_contexts | 2 ++ mailbox/init.mailbox.rc | 8 +++++++ mailbox/mailbox.mk | 3 +++ 8 files changed, 76 insertions(+) create mode 100644 mailbox/Android.bp create mode 100644 mailbox/dump/dump_mailbox.cpp create mode 100644 mailbox/dump/sepolicy/dump_mailbox.te create mode 100644 mailbox/dump/sepolicy/file.te create mode 100644 mailbox/dump/sepolicy/file_contexts create mode 100644 mailbox/dump/sepolicy/genfs_contexts create mode 100644 mailbox/init.mailbox.rc create mode 100644 mailbox/mailbox.mk diff --git a/mailbox/Android.bp b/mailbox/Android.bp new file mode 100644 index 0000000..6969685 --- /dev/null +++ b/mailbox/Android.bp @@ -0,0 +1,21 @@ +package { + default_applicable_licenses: ["Android-Apache-2.0"], +} + +cc_binary { + name: "dump_mailbox", + srcs: ["dump/dump_mailbox.cpp"], + init_rc: ["init.mailbox.rc"], + cflags: [ + "-Wall", + "-Wextra", + "-Werror", + ], + shared_libs: [ + "libbase", + "libdump", + "liblog", + ], + vendor: true, + relative_install_path: "dump", +} diff --git a/mailbox/dump/dump_mailbox.cpp b/mailbox/dump/dump_mailbox.cpp new file mode 100644 index 0000000..8f63b30 --- /dev/null +++ b/mailbox/dump/dump_mailbox.cpp @@ -0,0 +1,32 @@ +/* + * Copyright 2024 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +#include +#include + +int main() { + std::string outputDir = concatenatePath(BUGREPORT_PACKING_DIR, "mailbox"); + if (mkdir(outputDir.c_str(), 0777) == -1) { + printf("Unable to create folder: %s\n", outputDir.c_str()); + return 0; + } + + copyFile("/sys/kernel/tracing/instances/goog_cpm_mailbox/trace", + concatenatePath(outputDir.c_str(), "goog_cpm_mailbox_trace").c_str()); + copyFile("/sys/kernel/tracing/instances/goog_nq_mailbox/trace", + concatenatePath(outputDir.c_str(), "goog_nq_mailbox_trace").c_str()); + + return 0; +} diff --git a/mailbox/dump/sepolicy/dump_mailbox.te b/mailbox/dump/sepolicy/dump_mailbox.te new file mode 100644 index 0000000..64f184c --- /dev/null +++ b/mailbox/dump/sepolicy/dump_mailbox.te @@ -0,0 +1,7 @@ +# +pixel_bugreport(dump_mailbox) +allow dump_mailbox radio_vendor_data_file:dir create_dir_perms; +allow dump_mailbox radio_vendor_data_file:file create_file_perms; +allow dump_mailbox debugfs_tracing_instances:file r_file_perms; +allow dump_mailbox debugfs_tracing_instances:dir search; +allow dump_mailbox debugfs_tracing_instances_mailbox:file r_file_perms; diff --git a/mailbox/dump/sepolicy/file.te b/mailbox/dump/sepolicy/file.te new file mode 100644 index 0000000..5bb7bc4 --- /dev/null +++ b/mailbox/dump/sepolicy/file.te @@ -0,0 +1,2 @@ +# +type debugfs_tracing_instances_mailbox, sysfs_type, fs_type; diff --git a/mailbox/dump/sepolicy/file_contexts b/mailbox/dump/sepolicy/file_contexts new file mode 100644 index 0000000..b9bea15 --- /dev/null +++ b/mailbox/dump/sepolicy/file_contexts @@ -0,0 +1 @@ +/vendor/bin/dump/dump_mailbox u:object_r:dump_mailbox_exec:s0 diff --git a/mailbox/dump/sepolicy/genfs_contexts b/mailbox/dump/sepolicy/genfs_contexts new file mode 100644 index 0000000..0bac5e8 --- /dev/null +++ b/mailbox/dump/sepolicy/genfs_contexts @@ -0,0 +1,2 @@ +genfscon tracefs /instances/goog_cpm_mailbox/trace u:object_r:debugfs_tracing_instances_mailbox:s0 +genfscon tracefs /instances/goog_nq_mailbox/trace u:object_r:debugfs_tracing_instances_mailbox:s0 diff --git a/mailbox/init.mailbox.rc b/mailbox/init.mailbox.rc new file mode 100644 index 0000000..7659290 --- /dev/null +++ b/mailbox/init.mailbox.rc @@ -0,0 +1,8 @@ +on property:sys.boot_completed=1 + chown system system /sys/kernel/tracing/instances/goog_cpm_mailbox + chown system system /sys/kernel/tracing/instances/goog_cpm_mailbox/trace + write /sys/kernel/tracing/instances/goog_cpm_mailbox/buffer_size_kb 512 + + chown system system /sys/kernel/tracing/instances/goog_nq_mailbox + chown system system /sys/kernel/tracing/instances/goog_nq_mailbox/trace + write /sys/kernel/tracing/instances/goog_nq_mailbox/buffer_size_kb 512 diff --git a/mailbox/mailbox.mk b/mailbox/mailbox.mk new file mode 100644 index 0000000..aeefb9a --- /dev/null +++ b/mailbox/mailbox.mk @@ -0,0 +1,3 @@ +BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/mailbox/dump/sepolicy + +PRODUCT_PACKAGES += dump_mailbox From c68ac049e183628a60f85652607c7a66aa367bbc Mon Sep 17 00:00:00 2001 From: "ELIYAZ MOMIN (xWF)" Date: Wed, 13 Nov 2024 14:06:06 +0000 Subject: [PATCH 4/4] Revert "Add GIA (Google Input interface Abstraction layer) relat..." Revert submission 29512389-gia Reason for revert: Reverted changes: /q/submissionid:29512389-gia Change-Id: Ia4fd036130e54a5573efbd02a044631232561ea1 --- input/gia/aidl/compatibility_matrix.xml | 10 ---------- input/gia/aidl/manifest.xml | 10 ---------- input/gia/gia.mk | 11 ----------- input/gia/sepolicy/attributes | 2 -- input/gia/sepolicy/file_contexts | 2 -- input/gia/sepolicy/gia.te | 18 ------------------ input/gia/sepolicy/hal_gia.te | 8 -------- input/gia/sepolicy/service.te | 2 -- input/gia/sepolicy/service_contexts | 2 -- 9 files changed, 65 deletions(-) delete mode 100644 input/gia/aidl/compatibility_matrix.xml delete mode 100644 input/gia/aidl/manifest.xml delete mode 100644 input/gia/gia.mk delete mode 100644 input/gia/sepolicy/attributes delete mode 100644 input/gia/sepolicy/file_contexts delete mode 100644 input/gia/sepolicy/gia.te delete mode 100644 input/gia/sepolicy/hal_gia.te delete mode 100644 input/gia/sepolicy/service.te delete mode 100644 input/gia/sepolicy/service_contexts diff --git a/input/gia/aidl/compatibility_matrix.xml b/input/gia/aidl/compatibility_matrix.xml deleted file mode 100644 index 1a348ea..0000000 --- a/input/gia/aidl/compatibility_matrix.xml +++ /dev/null @@ -1,10 +0,0 @@ - - - com.google.input.gia.core - - IGiaService - default - - 1 - - \ No newline at end of file diff --git a/input/gia/aidl/manifest.xml b/input/gia/aidl/manifest.xml deleted file mode 100644 index 98303c8..0000000 --- a/input/gia/aidl/manifest.xml +++ /dev/null @@ -1,10 +0,0 @@ - - - com.google.input.gia.core - - IGiaService - default - - 1 - - \ No newline at end of file diff --git a/input/gia/gia.mk b/input/gia/gia.mk deleted file mode 100644 index ea079ca..0000000 --- a/input/gia/gia.mk +++ /dev/null @@ -1,11 +0,0 @@ -BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/input/gia/sepolicy - -PRODUCT_PACKAGES += gia -PRODUCT_PACKAGES += com.google.input.gia.giaservicemanager - -PRODUCT_SOONG_NAMESPACES += vendor/google/interfaces -PRODUCT_SOONG_NAMESPACES += vendor/google/input/gia/core -PRODUCT_SOONG_NAMESPACES += vendor/google/input/gia/core-servicemanager - -DEVICE_MANIFEST_FILE += device/google/gs-common/input/gia/aidl/manifest.xml -DEVICE_PRODUCT_COMPATIBILITY_MATRIX_FILE += device/google/gs-common/input/gia/aidl/compatibility_matrix.xml diff --git a/input/gia/sepolicy/attributes b/input/gia/sepolicy/attributes deleted file mode 100644 index 1d61ad3..0000000 --- a/input/gia/sepolicy/attributes +++ /dev/null @@ -1,2 +0,0 @@ -# This macro produces: define hal_gia, hal_gia_client, hal_gia_server -hal_attribute(gia) diff --git a/input/gia/sepolicy/file_contexts b/input/gia/sepolicy/file_contexts deleted file mode 100644 index 99d6857..0000000 --- a/input/gia/sepolicy/file_contexts +++ /dev/null @@ -1,2 +0,0 @@ -# chmod +x in SEPolicy language -/vendor/bin/gia u:object_r:gia_exec:s0 diff --git a/input/gia/sepolicy/gia.te b/input/gia/sepolicy/gia.te deleted file mode 100644 index 2c84e7c..0000000 --- a/input/gia/sepolicy/gia.te +++ /dev/null @@ -1,18 +0,0 @@ -# SEPolicies for GIA (Google Input interface Abstraction layer) -type gia, domain; -type gia_exec, exec_type, vendor_file_type, file_type; - -# Macro transferring gia_exec to the gia domain -init_daemon_domain(gia) - -# let this domain use the hal service -hal_client_domain(gia, hal_gia) -# allow binder communication with service_manager -binder_use(gia) - -# let this domain serve the hal service -hal_server_domain(gia, hal_gia) - -# allow gia for accessing touch related system file-nodes -allow gia sysfs_touch_gti:dir r_dir_perms; -allow gia sysfs_touch_gti:file rw_file_perms; diff --git a/input/gia/sepolicy/hal_gia.te b/input/gia/sepolicy/hal_gia.te deleted file mode 100644 index b75c9fb..0000000 --- a/input/gia/sepolicy/hal_gia.te +++ /dev/null @@ -1,8 +0,0 @@ -# allow binder connection from client to server -binder_call(hal_gia_client, hal_gia_server) - -# allow client to find the service & allow server to register the service -hal_attribute_service(hal_gia, hal_gia_service) - -# allow binder communication from server to service_manager -binder_use(hal_gia_server) diff --git a/input/gia/sepolicy/service.te b/input/gia/sepolicy/service.te deleted file mode 100644 index aed1135..0000000 --- a/input/gia/sepolicy/service.te +++ /dev/null @@ -1,2 +0,0 @@ -# Declares GIA related services -type hal_gia_service, hal_service_type, protected_service, service_manager_type; diff --git a/input/gia/sepolicy/service_contexts b/input/gia/sepolicy/service_contexts deleted file mode 100644 index b1773ec..0000000 --- a/input/gia/sepolicy/service_contexts +++ /dev/null @@ -1,2 +0,0 @@ -# Attaches GIA services to the cooresponding SEPolicy group -com.google.input.gia.core.IGiaService/default u:object_r:hal_gia_service:s0