TreeHugger Robot
f77f159364
Merge "Fix avc denied issue when accessing to IStats service" into sc-dev am: 6657774b4c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13806168
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I64600db02c76e2bfaa3ddf03373585817d33daab
2021-03-10 17:31:10 +00:00
TreeHugger Robot
6657774b4c
Merge "Fix avc denied issue when accessing to IStats service" into sc-dev
2021-03-10 16:57:56 +00:00
TreeHugger Robot
72cfb31ebe
Merge "Fix avc denied in OMA DM" into sc-dev am: d2cee097f8
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13816043
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I4c471c8e3d6d29082744dc044fb22af6849411b2
2021-03-10 16:37:32 +00:00
TreeHugger Robot
d2cee097f8
Merge "Fix avc denied in OMA DM" into sc-dev
2021-03-10 15:52:45 +00:00
Tai Kuo
8cac55487b
gs101-sepolicy: Add twoshay permissions
...
Add twoshay and touch input context library permissions
Bug: 173330899
Bug: 173330981
Test: check boot-time twoshay startup and no denials.
Signed-off-by: Steve Pfetsch <spfetsch@google.com>
Change-Id: I68aace66f49c2af1ebfd4bde7082039f9caf3f64
Signed-off-by: Tai Kuo <taikuo@google.com>
2021-03-10 22:23:49 +08:00
SalmaxChang
2b90406669
cbd: Fix avc errors am: 6247ff69b2
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13816040
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Ibf0d222fc8bafcdaa0b7b8c5fe861749a6192bc6
2021-03-10 14:03:20 +00:00
SalmaxChang
eb4f865434
init: Remove unused log path am: 31ab19d5e7
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13818919
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I452a2c99b7aa6d83b360701aa3ada482c5693674
2021-03-10 14:03:14 +00:00
SalmaxChang
ebab404edb
vendor_init: Update tracking denials am: 7edb7e30c4
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13816041
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I9e928515b554984b84d853608d6ecd9351b2a39f
2021-03-10 14:03:14 +00:00
SalmaxChang
6247ff69b2
cbd: Fix avc errors
...
avc: denied { setuid } for comm="cbd" capability=7 scontext=u:r:cbd:s0 tcontext=u:r:cbd:s0 tclass=capability permissive=1
avc: denied { search } for comm="cbd" name="vendor" dev="tmpfs" ino=2 scontext=u:r:cbd:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=1
Bug: 178331928
Bug: 171267363
Change-Id: Icf28f494f05ee386ce94213929926369f2775173
2021-03-10 13:33:43 +00:00
SalmaxChang
7edb7e30c4
vendor_init: Update tracking denials
...
Removed the path creation from init rc.
Bug: 177186257
Change-Id: I5a8e99ae273d0c8370255bcdb4b9e802fa9895ca
2021-03-10 13:33:19 +00:00
Jack Wu
b10c77244b
hal_health_default: Fix avc denials am: 522a8aefcf
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13816038
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I543f53ff53fd1db6d12c66683c956ff21a7f5da8
2021-03-10 12:46:33 +00:00
George Chang
ef7df93001
Remove libnfc-nci from common part
...
Bug: 182243379
Bug: 182351569
Test: build pass
Change-Id: Ib853fb48ace452aa4fcb22398e026af433eaec0b
2021-03-10 19:48:20 +08:00
audreyhung
4b7a3c8f6c
Add variables in google3a_config for camera tuning
...
Add target_device into SOONG_CONFIG_NAMESPACES += google3a_config
for saperating projects (raven, oriole, slider)
Bug: 177041310
Test: build pass, manually test on O6
Change-Id: I605e0327a816fb7d04f57e679f287352e17abee0
2021-03-10 18:30:47 +08:00
Tai Kuo
4dd3e1e99e
Add touch procfs and sysfs sepolicy
...
Touch palm sepolicies are not included.
Bug: 173330981
Test: No avc denied log for touch sysfs, procfs access.
Signed-off-by: Tai Kuo <taikuo@google.com>
Change-Id: Idf510e4a9c65e5af0885159353ef85d6b6ec553f
2021-03-10 17:00:16 +08:00
Calvin Pan
47bf48c03b
Fix avc denied in OMA DM
...
03-10 11:30:05.640 30617 30617 I auditd : type=1400 audit(0.0:493): avc: denied { search } for comm="IntentService[D" name="radio" dev="dm-6" ino=242 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I IntentService[D: type=1400 audit(0.0:493): avc: denied { search } for name="radio" dev="dm-6" ino=242 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I auditd : type=1400 audit(0.0:494): avc: denied { getattr } for comm="IntentService[D" path="/data/vendor/radio/omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I IntentService[D: type=1400 audit(0.0:494): avc: denied { getattr } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I auditd : type=1400 audit(0.0:495): avc: denied { setattr } for comm="IntentService[D" name="omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I IntentService[D: type=1400 audit(0.0:495): avc: denied { setattr } for name="omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I auditd : type=1400 audit(0.0:496): avc: denied { append } for comm="IntentService[D" name="omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I IntentService[D: type=1400 audit(0.0:496): avc: denied { append } for name="omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I auditd : type=1400 audit(0.0:497): avc: denied { open } for comm="IntentService[D" path="/data/vendor/radio/omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I IntentService[D: type=1400 audit(0.0:497): avc: denied { open } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:57:07.155 386 386 E SELinux : avc: denied { find } for pid=8406 uid=10141 name=autofill scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
03-10 11:57:07.155 386 386 I auditd : avc: denied { find } for pid=8406 uid=10141 name=autofill scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.904 388 388 E SELinux : avc: denied { find } for pid=12124 uid=10141 name=activity scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.904 388 388 I auditd : avc: denied { find } for pid=12124 uid=10141 name=activity scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.931 388 388 E SELinux : avc: denied { find } for pid=12124 uid=10141 name=activity_task scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.931 388 388 I auditd : avc: denied { find } for pid=12124 uid=10141 name=activity_task scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.960 388 388 E SELinux : avc: denied { find } for pid=12124 uid=10141 name=SurfaceFlinger scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.960 388 388 I auditd : avc: denied { find } for pid=12124 uid=10141 name=SurfaceFlinger scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.960 388 388 E SELinux : avc: denied { find } for pid=12124 uid=10141 name=gpu scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.960 388 388 I auditd : avc: denied { find } for pid=12124 uid=10141 name=gpu scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
03-10 12:26:06.041 388 388 E SELinux : avc: denied { find } for pid=12124 uid=10141 name=audio scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
03-10 12:26:06.041 388 388 I auditd : avc: denied { find } for pid=12124 uid=10141 name=audio scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
03-10 12:35:40.653 387 387 E SELinux : avc: denied { find } for pid=8328 uid=10141 name=tethering scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:tethering_service:s0 tclass=service_manager permissive=1
03-10 12:35:40.654 387 387 I auditd : avc: denied { find } for pid=8328 uid=10141 name=tethering scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:tethering_service:s0 tclass=service_manager permissive=1
03-10 12:35:40.658 387 387 E SELinux : avc: denied { find } for pid=8328 uid=10141 name=isub scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=1
03-10 12:35:40.658 387 387 I auditd : avc: denied { find } for pid=8328 uid=10141 name=isub scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=1
Bug: 173990082
Test: Trigger OMA DM
Change-Id: Ie66ecd1c9d80f7b12a4545f3651dd2c5f02b119b
2021-03-10 15:54:08 +08:00
Benjamin Schwartz
9618ebcc52
Merge "powerstats: Add core stats" into sc-dev am: caa1b96fc6
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13819686
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Id523bcba64b56e18ab639025104114ba93f1be9d
2021-03-10 06:49:19 +00:00
SalmaxChang
31ab19d5e7
init: Remove unused log path
...
The path "/data/log/abox" violates Android treble rule. Pixel uses
google audio HAL but not vendor one. Remove the path.
Bug: 177186257
Change-Id: Ie53be71f31e0d673592457b88304136d4d616780
2021-03-10 06:41:31 +00:00
allenwtsu
0e0ad439a7
[Slider] Add pre-grant permission for mvs
...
Bug: 181915646
Test: manual
Change-Id: Ia9521d560435baac0483b3fb413787e1cb41ef54
2021-03-10 14:40:42 +08:00
Benjamin Schwartz
caa1b96fc6
Merge "powerstats: Add core stats" into sc-dev
2021-03-10 06:19:43 +00:00
Jack Wu
522a8aefcf
hal_health_default: Fix avc denials
...
[ 5.146740] type=1400 audit(1611123521.796:23): avc: denied { search } for comm="android.hardwar" name="4-003c" dev="sysfs" ino=56632 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
[ 5.425436] type=1400 audit(1611123522.076:24): avc: denied { search } for comm="health@2.1-serv" name="4-003c" dev="sysfs" ino=56632 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
[ 29.943710] type=1400 audit(1611123546.592:483): avc: denied { write } for comm="health@2.1-serv" name="mode" dev="sysfs" ino=14741 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1
01-20 14:18:41.796 656 656 I android.hardwar: type=1400 audit(0.0:23): avc: denied { search } for name="4-003c" dev="sysfs" ino=56632 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
Bug: 177966434
Test: Verify pass by checking device log are w/o above errors after
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I576547e27dceb55fd768de2834e3bb0155857f56
2021-03-10 14:13:38 +08:00
TreeHugger Robot
552849b103
Merge "hal_power_stats_default: Fix avc denials" into sc-dev am: c625222492
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13806171
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Ie4d9a36afac8785c4b0a3a5855ce5e62d92195fa
2021-03-10 02:50:50 +00:00
Adam Shih
58b3344c7a
label kernel modules and grant bt permission
...
Bug: 182320300
Bug: 182320258
Test: boot to home and connect to bluetooth headset under enforcing mode
Change-Id: I6f6e8359d03eb4205268d56a1fcd50ce1445f442
2021-03-10 10:36:45 +08:00
Adam Shih
487f66f754
update error on ROM 7196668
...
Bug: 182320300
Bug: 182320246
Bug: 182320258
Bug: 182320172
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: Ib7bf40299374061526a87714cfd8982544a1698f
2021-03-10 10:34:03 +08:00
TreeHugger Robot
c625222492
Merge "hal_power_stats_default: Fix avc denials" into sc-dev
2021-03-10 02:11:04 +00:00
Adam Shih
84bb9a87b8
Merge "remove obsolete entries and put crucial domains to permissive" into sc-dev am: 48113ddced
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13805052
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: If914068d4fb3369486f1dbef8af614245b9dfa0b
2021-03-10 01:46:48 +00:00
TreeHugger Robot
4926c30d09
Merge "dumpstate: allow dumpstate to access displaycolor" into sc-dev am: c8e903d1c8
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13806024
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: If0f57e685973290e3323cd954367cb60864bd654
2021-03-10 01:46:19 +00:00
Cody Schuffelen
815b951c33
Revert "Add vendor_dlkm partition"
...
Revert "Add vendor_dlkm to AB_OTA_PARTITIONS"
Revert submission 13804535-slider_vendor_dlkm
Reason for revert: Evaluating whether a revert fixes b/182319837
Reverted Changes:
I50887cb75:Add vendor_dlkm to AB_OTA_PARTITIONS
I6e3b20ada:Add vendor_dlkm partition
Change-Id: I71817d8ff65dfb63978dc775178947e12bd1982a
2021-03-10 01:37:58 +00:00
andychou
ce711fd18e
Fix avc denied issue when accessing to IStats service
...
Originally we use isPriv=true but Exo APP is not located in priv-app
folder.
So has to remove isPriv=true and add into net_domain in order to network
accessing.
This is a clone cl updated from ag/13794482
Bug: 180594376
Test: manual test if there is avc denied
Change-Id: Icb5009248d10c23e772040aad8ac2fed849bafa0
2021-03-10 09:27:04 +08:00
Benjamin Schwartz
27b42a6f12
Merge "powerstats: acpm_stats driver has moved" into sc-dev am: b5527ad721
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13817608
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I4fe23f61a53ea6ce5c2c37deba84aa65ccd59a0a
2021-03-10 01:25:42 +00:00
Adam Shih
48113ddced
Merge "remove obsolete entries and put crucial domains to permissive" into sc-dev
2021-03-10 01:24:44 +00:00
TreeHugger Robot
c8e903d1c8
Merge "dumpstate: allow dumpstate to access displaycolor" into sc-dev
2021-03-10 01:15:42 +00:00
Benjamin Schwartz
b5527ad721
Merge "powerstats: acpm_stats driver has moved" into sc-dev
2021-03-10 01:13:33 +00:00
TreeHugger Robot
ab49a21562
Merge "Remove power stats HAL 1.0 service" into sc-dev am: 01e7f56135
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13817746
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I3f72f42d6e471cd6337f4625ccf278fd4fe71583
2021-03-10 01:08:25 +00:00
TreeHugger Robot
01e7f56135
Merge "Remove power stats HAL 1.0 service" into sc-dev
2021-03-10 00:45:33 +00:00
Petri Gynther
e951022d5b
Remove extra copy of fstab.gs101
...
vendor_ramdisk.img is assembled from two directories:
$(PRODUCT_OUT)/vendor_ramdisk
$(PRODUCT_OUT)/recovery/root
Eliminate extra copy of fstab.gs101, so that there are no duplicate
files in vendor_ramdisk.img. This is a must-have for toybox cpio,
which is used to extract the archive in kernel build (build/build.sh).
Bug: 182309216
Test: build + inspect vendor_ramdisk.img
Test: prebuilts/build-tools/path/linux-x86/cpio -id
Test: verify install + boot to home + boot to recovery
Change-Id: Ib7c5e9d2535e97945fb90b1e749e2bb33b75329b
2021-03-09 16:09:13 -08:00
Benjamin Schwartz
da983cb5c2
powerstats: Add core stats
...
Bug: 182273949
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: I4151f57ebd68102a58fd7035356279e68805a0f9
2021-03-09 16:05:58 -08:00
Daniel Mentz
23bd42fd38
Add vendor_dlkm partition am: 1adeec60ba
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13804535
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Ic555242d0550c98e359dc5657fd0aeb2df044a4c
2021-03-09 23:23:22 +00:00
Daniel Mentz
1adeec60ba
Add vendor_dlkm partition
...
Certain vendor kernel modules were previously stored in the vendor
partition. With this change, we create a new separate partition named
vendor_dlkm for these vendor modules.
Bug: 173653839
Change-Id: I6e3b20ada58ffea05de3df8e7eae9fc59a6019e0
2021-03-09 22:48:49 +00:00
Benjamin Schwartz
82a0c52a12
powerstats: acpm_stats driver has moved
...
Bug: 182255966
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: I667fb71f6f2c7aade2d56dc8ec8d4462dcc97594
2021-03-09 11:20:04 -08:00
Benjamin Schwartz
0d6392efa6
Remove power stats HAL 1.0 service
...
Bug: 179527556
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Test: device boot and examined logs to make sure no errors related to
missing power stats 1.0
Change-Id: Ib8cc394f9968edaf948a2d9700e9f7fcaa5b9dc0
2021-03-09 10:27:55 -08:00
TreeHugger Robot
ae5a58c44e
Merge "gs101: Use FUSE passthrough by default" into sc-dev am: d287e223f4
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13774554
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I8758d1c34b6e9b109e0ebb6991136a7abecf5c39
2021-03-09 15:38:33 +00:00
Yu-Chi Cheng
9ba0f29835
Merge "Allowed the EdgeTPU service to access Package Manager binder service." into sc-dev am: 02ecfdcc0d
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13809458
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Iad3c70644d6dce4045a9cac95315d7b60d1721b8
2021-03-09 15:38:26 +00:00
Yu-Chi Cheng
02ecfdcc0d
Merge "Allowed the EdgeTPU service to access Package Manager binder service." into sc-dev
2021-03-09 15:00:12 +00:00
TreeHugger Robot
d287e223f4
Merge "gs101: Use FUSE passthrough by default" into sc-dev
2021-03-09 14:55:44 +00:00
Jack Wu
a3678d9487
hal_power_stats_default: Fix avc denials
...
[ 351.298850] type=1400 audit(1614041245.976:13): avc: denied { read } for comm="android.hardwar" name="hf1_wfi" dev="sysfs" ino=78155 scontext=u:r:hal_power_stats_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
[ 698.658433] type=1400 audit(1614041593.336:1733): avc: denied { open } for comm="stats@1.0-servi" path="/sys/devices/platform/19000000.aoc/control/monitor_mode" dev="sysfs" ino=78158 scontext=u:r:hal_power_stats_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
02-23 08:53:13.336 673 673 I stats@1.0-servi: type=1400 audit(0.0:1734): avc: denied { getattr } for path="/sys/devices/platform/19000000.aoc/control/monitor_mode" dev="sysfs" ino=78158 scontext=u:r:hal_power_stats_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
02-23 08:52:26.228 670 670 I android.hardwar: type=1400 audit(0.0:724): avc: denied { search } for name="19000000.aoc" dev="sysfs" ino=18343 scontext=u:r:hal_power_stats_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=dir permissive=1
Bug: 180963514
Test: Verify pass by checking device log are w/o above errors after
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: Iab245b320c1f6e75407f1fafb5ad20a087b1a707
2021-03-09 14:21:20 +00:00
TreeHugger Robot
03d89d1b13
Merge "[P21]Phase in FactoryOta" into sc-dev am: 46663e2a5d
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13805529
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I0a1062adef4449836d8521879392b7492c81140b
2021-03-09 12:27:17 +00:00
TreeHugger Robot
46663e2a5d
Merge "[P21]Phase in FactoryOta" into sc-dev
2021-03-09 11:57:38 +00:00
raylinhsu
43fb32d300
dumpstate: allow dumpstate to access displaycolor
...
In bugreport, we need to dump libdisplaycolor information.
Hence, we should add corresponding sepolicy.
Bug: 181915591
Test: There is no avc denied regarding to displaycolor when we
capture the bugreport.
Change-Id: I9f7f8f451fab24b4d0c49305d96b8db6b4d0eed4
2021-03-09 19:06:24 +08:00
David Chen
2cd5ec394e
Merge "dumpstate: dump more touch information" into sc-dev am: 8721f832dc
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13782433
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I2f98a4d1a4bf6972b229ea801cc3bc91f4649fe6
2021-03-09 06:30:50 +00:00
David Chen
8721f832dc
Merge "dumpstate: dump more touch information" into sc-dev
2021-03-09 06:01:28 +00:00