Adam Shih
a5cbf912ce
Move dauntless settings to gs-common
...
Bug: 242479757
Test: build pass on all Gchip devices
Change-Id: I9751e59b751f867d4cf734ffe7497a2e22c0c6f9
2022-08-30 12:29:54 +08:00
Yifan Hong
5521fb530c
Implement health AIDL HAL.
...
Test: VTS
Test: manual charger mode
Test: recovery
Bug: 213273090
Change-Id: Iabaf31644f4406092a881841fb4084499fb4de89
2022-01-05 23:08:07 -08:00
chenpaul
d7947930ec
Remove wifi_logger related sepolicy settings
...
Due to the fact that /vendor/bin/wifi_logger no longer exists
on the P21 master branch any more, we remove obsolete sepolicy.
Bug: 201599426
Test: wlan_logger in Pixel Logger is workable
Change-Id: I22d99c3577f3cceb786e2ffd01c327a67d420202
2021-11-17 17:24:59 +08:00
David Brazdil
a03f3b1a50
Assign pkvm_enabler to vendor_misc_writer domain
...
Builds of gs101 targets with pKVM force-enabled have an init service
which checks that /dev/kvm exists and if not, runs misc_writer to
instruct the bootloader to enable pKVM, and forces a reboot.
Assign the binary to the existing vendor_misc_writer domain and add
permission to execute the /vendor/bin/misc_writer binary. Since this is
for tests only, the rules are only added to targets that define
TARGET_PKVM_ENABLED.
Bug: 192819132
Test: flash a _pkvm build, observe double-reboot, check /dev/kvm exists
Change-Id: I5f9962e4cdd3ec267ab19ea4485e4e94a3ec15cd
2021-10-08 09:34:22 +00:00
Adam Shih
d61f60e882
centralize wifi_ext config
...
Bug: 201599426
Test: boot with wifi_ext started
Change-Id: I0638216a7100b26415a79e87cdb1a5a260f05baa
2021-09-30 14:25:57 +08:00
Adam Shih
f97138a6bb
organize wifi_sniffer
...
Bug: 196916111
Test: boot with wifi_sniffer started
Change-Id: If12fb0499c749e4e8379a5c2095fbf9cd2ca624e
2021-09-14 13:35:31 +08:00
Rick Yiu
797b646234
gs101-sepolicy: Fix avc denial for sysfs_vendor_sched
...
Fix mediaprovider_app and bluetooth
Bug: 190563839
Bug: 190563916
Test: build pass
Change-Id: I477325ee812d1362db4d5005e999cba989a44216
2021-06-10 04:10:24 +00:00
chenpaul
920b0e11a9
Add sepolicy for wlan logger and sniffer logger
...
Bug: 186069127
Test: Sniffer logger can be start by Pixel Logger app
wlan logger is workable.
Change-Id: I1e7a75a08de37668316b06e066c080e837d7896b
2021-04-27 19:37:28 +08:00
Ilya Matyukhin
b9e10feefb
Create sepolicy for the fingerprint GHBM sysprop
...
Bug: 184761756
Bug: 183728349
Test: adb logcat | grep "avc: denied"
Change-Id: I5209bdf859e86a83ac3fa29ecf8bfd8d5b6d88ce
2021-04-08 23:21:22 +00:00
Oleg Matcovschi
de30c53177
gs101-sepolicy: add sscoredump
...
Bug: 183995288
Change-Id: I5363d0c45c183d809c03fe755835c1fc95a33159
2021-03-30 15:31:10 +00:00
matthuang
04275485f7
sepolicy: add usf folder to BOARD_SEPOLICY_DIRS.
...
03-08 09:26:34.320 701 701 I MonitorFdThread: type=1400
audit(0.0:5): avc: denied { read } for name="/" dev="tmpfs" ino=1
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:device:s0
tclass=dir permissive=1
03-08 09:26:34.320 701 701 I MonitorFdThread: type=1400
audit(0.0:6): avc: denied { watch } for path="/dev" dev="tmpfs" ino=1
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:device:s0
tclass=dir permissive=1
03-08 09:26:36.344 701 701 I android.hardwar: type=1400
audit(0.0:11): avc: denied { read write } for name="acd-com.google.usf"
dev="tmpfs" ino=932 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:aoc_device:s0 tclass=chr_file permissive=1
03-08 09:26:36.344 701 701 I android.hardwar: type=1400
audit(0.0:12): avc: denied { open } for path="/dev/acd-com.google.usf"
dev="tmpfs" ino=932 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:aoc_device:s0 tclass=chr_file permissive=1
03-08 09:26:36.948 701 701 I android.hardwar: type=1400
audit(0.0:13): avc: denied { search } for name="vendor" dev="tmpfs"
ino=2 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=1
03-08 09:26:36.948 701 701 I android.hardwar: type=1400
audit(0.0:14): avc: denied { search } for name="/" dev="sda1" ino=2
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:persist_file:s0
tclass=dir permissive=1
03-08 09:26:36.952 701 701 I android.hardwar: type=1400
audit(0.0:15): avc: denied { getattr } for
path="/mnt/vendor/persist/sensors/registry" dev="sda1" ino=24
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:persist_file:s0
tclass=dir permissive=1
03-08 09:26:36.952 701 701 I android.hardwar: type=1400
audit(0.0:16): avc: denied { read } for name="registry" dev="sda1"
ino=24
Bug:182086633
Test: make selinux_policy -j128 and push to device.
Test: avc denials are disappeared in boot log.
Change-Id: Id7ad6dcb63c880a4b7b07dbe4588ec231e9e00b5
2021-03-08 14:08:19 +08:00
Robin Peng
5009efa776
Move slider-sepolicy into gs101-sepolicy
...
from: 71e609c24c97fc8d44843af30527cbeb90d5dcdf
Bug: 167996145
Change-Id: Ie00e7e0983a3ca695bbd5140c929d07a80144301
2021-03-06 16:15:39 +08:00