Midas Chien
32307ac30d
Allow composer to read panel_idle sysfs node
...
Change panel_idle selinux type to sysfs_display to allow composer can
read it.
Bug: 198808492
Bug: 219857957
Test: ls -Z to check selinux type
Test: make sure init(write) and composer(read) can access it
Change-Id: I77ae701a73a047b26b4ebb3c9d482c8cb9220999
2022-02-16 16:28:06 +08:00
Xin Li
78a2d63a45
[automerger skipped] Merge sc-v2-dev-plus-aosp-without-vendor@8084891 am: 81caef24ad
-s ours am: 14abf01391
-s ours
...
am skip reason: Merged-In Icecca9f69ee9b57d43aa2864864951bf66c4905f with SHA-1 ca06222472
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16844142
Change-Id: I1d3f3dc99e04d19b61696677a4bf1fd87a168fe4
2022-02-14 18:21:12 +00:00
Xin Li
14abf01391
[automerger skipped] Merge sc-v2-dev-plus-aosp-without-vendor@8084891 am: 81caef24ad
-s ours
...
am skip reason: Merged-In Icecca9f69ee9b57d43aa2864864951bf66c4905f with SHA-1 ca06222472
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16844142
Change-Id: I12d27f867dd598e669aa86e1bec26c3aafbef4a3
2022-02-14 18:03:48 +00:00
Xin Li
81caef24ad
Merge sc-v2-dev-plus-aosp-without-vendor@8084891
...
Bug: 214455710
Merged-In: Icecca9f69ee9b57d43aa2864864951bf66c4905f
Change-Id: Ibf8d551c16f8f941cfc8072a29ef5c57e8bef170
2022-02-11 07:12:06 +00:00
Ankit Goyal
9e7ecb5fae
Merge "Rename vulkan library to be platform agnostic"
2022-02-11 00:52:58 +00:00
Jack Wu
dcb05d1377
sepolicy: gs101: fix charger_vendor permission denied
...
[ 27.025458][ T443] type=1400 audit(1644391560.640:11): avc: denied { search } for comm="android.hardwar" name="vendor" dev="tmpfs" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0
[ 26.563658][ T447] type=1400 audit(1644397622.588:5): avc: denied { search } for comm="android.hardwar" name="/" dev="sda1" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=0
[ 27.198144][ T442] type=1400 audit(1644398156.152:5): avc: denied { search } for comm="android.hardwar" name="battery" dev="sda1" ino=12 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=0
[ 27.327035][ T443] type=1400 audit(1644398785.276:5): avc: denied { read } for comm="android.hardwar" name="defender_active_time" dev="sda1" ino=17 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=0
[ 27.355009][ T443] type=1400 audit(1644398785.276:6): avc: denied { write } for comm="android.hardwar" name="defender_charger_time" dev="sda1" ino=16 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=0
[ 26.771705][ T444] type=1400 audit(1644379988.804:4): avc: denied { read } for comm="android.hardwar" name="specification_version" dev="sysfs" ino=56257 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=0
[ 27.898684][ T445] type=1400 audit(1644392754.928:8): avc: denied { read } for comm="android.hardwar" name="thermal_zone6" dev="sysfs" ino=15901 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=lnk_file permissive=0
[ 29.180076][ T447] type=1400 audit(1644397625.200:9): avc: denied { write } for comm="android.hardwar" name="mode" dev="sysfs" ino=15915 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
[ 27.043845][ T444] type=1400 audit(1644379988.808:9): avc: denied { search } for comm="android.hardwar" name="thermal" dev="tmpfs" ino=899 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:thermal_link_device:s0 tclass=dir permissive=0
[ 27.064916][ T444] type=1400 audit(1644379988.808:10): avc: denied { read } for comm="android.hardwar" name="u:object_r:vendor_battery_defender_prop:s0" dev="tmpfs" ino=306 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=file permissive=0
[ 27.356266][ T444] type=1107 audit(1644404450.376:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.battery.defender.state pid=457 uid=1000 gid=1000 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=property_service permissive=0'
Bug: 218485039
Test: manually test, no avc: denied
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I091dbbca35fb833e59fdbc234d74b90bfe74014c
2022-02-09 19:16:22 +08:00
TeYuan Wang
2d02b11311
move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba
am: aeebc898cb
am: 912673f8ce
am: 9ad50b3952
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120
Change-Id: I8c46cd1a01c86d453886e246e000d90974cd8806
2022-02-08 12:07:35 +00:00
TeYuan Wang
9ad50b3952
move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba
am: aeebc898cb
am: 912673f8ce
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120
Change-Id: Iaf7721a2b7a2f4def1a302c71d6f293b371b7661
2022-02-08 11:51:56 +00:00
TeYuan Wang
912673f8ce
move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba
am: aeebc898cb
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120
Change-Id: Ib49a0a78843456c9b170dd968259e9e1d51e6317
2022-02-08 11:40:52 +00:00
TeYuan Wang
aeebc898cb
move vendor_thermal_prop rules to pixel-sepolicy am: c292dd65ba
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960120
Change-Id: Id7692611610e82be8489a0c73e2040d15101e09b
2022-02-08 10:04:37 +00:00
TeYuan Wang
c292dd65ba
move vendor_thermal_prop rules to pixel-sepolicy
...
Bug: 213257759
Test: no denied log after "setprop persist.vendor.disable.thermal.control 1"
Change-Id: Ic150959bc6084034d9afcc70bf446692fbe22d11
2022-02-08 08:10:32 +00:00
Treehugger Robot
91dcb418e2
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537
am: 02e7ad9fb5
am: d70a957518
am: 674aa657fb
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966
Change-Id: I796f41b8ac07406a747dde6cd77c9878339e2de7
2022-02-08 02:12:46 +00:00
Treehugger Robot
674aa657fb
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537
am: 02e7ad9fb5
am: d70a957518
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966
Change-Id: I109245e668ffa38851ced506270ec6d6d1d29fd1
2022-02-08 01:49:40 +00:00
Treehugger Robot
d70a957518
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537
am: 02e7ad9fb5
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966
Change-Id: I1da16035bcc4af82e8c671398b76daf7cc8efd28
2022-02-08 01:26:58 +00:00
Treehugger Robot
02e7ad9fb5
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices" am: 2c1750e537
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1972966
Change-Id: I2807e116f14305f0e829eec6907db6c817f000c3
2022-02-08 01:08:56 +00:00
Treehugger Robot
2c1750e537
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices"
2022-02-08 00:53:08 +00:00
Will McVicker
5a88ee6af1
genfs_contexts: add paths for unnamed cs40l25a i2c devices
...
In the 5.10 kernel, the i2c paths are named using an out-of-tree patch
[1]. For kernels that don't support that, let's add the unnamed sysfs
paths as well to the selinux policy.
[1] https://android-review.googlesource.com/c/kernel/common/+/1646148
Bug: 217774013
Change-Id: I3a1f279270d22bf82144ce60a08c215308764be3
2022-02-04 11:54:06 -08:00
Marco Nelissen
126a85b4ec
Allow logd to read the Trusty log am: 7df1fa1574
am: 983f5f2d96
am: 6072583f8a
am: a9004241c2
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381
Change-Id: Ie626aaa3652cb8aa47062f32c38d658d5f1ce251
2022-02-04 02:34:39 +00:00
Marco Nelissen
a9004241c2
Allow logd to read the Trusty log am: 7df1fa1574
am: 983f5f2d96
am: 6072583f8a
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381
Change-Id: I599f4256ea82b4917eceafeced56aef1214de588
2022-02-04 02:15:43 +00:00
Marco Nelissen
6072583f8a
Allow logd to read the Trusty log am: 7df1fa1574
am: 983f5f2d96
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381
Change-Id: I3ef810bd7a3ecddf60a0b13f1262abce14a5ece1
2022-02-04 01:59:53 +00:00
Marco Nelissen
983f5f2d96
Allow logd to read the Trusty log am: 7df1fa1574
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1971381
Change-Id: Ic66382bd03df28287fc3817c6f66a414d69637b3
2022-02-04 01:43:42 +00:00
Marco Nelissen
7df1fa1574
Allow logd to read the Trusty log
...
Bug: 190050919
Test: build
Change-Id: I8a42cd90b1581272f4dafc37d6eb29a98e1fa2e3
2022-02-03 10:37:13 -08:00
Marco Nelissen
64fe59aba5
Merge "Allow logd to read the Trusty log"
2022-02-01 21:37:54 +00:00
Marco Nelissen
a2d6a19bcd
Allow logd to read the Trusty log
...
Bug: 190050919
Test: build
Change-Id: I8a42cd90b1581272f4dafc37d6eb29a98e1fa2e3
2022-02-01 21:37:36 +00:00
Ankit Goyal
ec2a9fb8fc
Rename vulkan library to be platform agnostic
...
Bug: 174232579
Test: Boots to home
Change-Id: I39d633e79896d7196ca7011dd7e017950248e2d8
2022-01-26 20:36:29 -08:00
Treehugger Robot
2fa102876a
Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b
am: 0e4789159c
am: 26f020fc70
am: 35d7efaf11
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462
Change-Id: I1e789353fb2ce05e05f097ab48b2bb2054887efe
2022-01-26 21:49:48 +00:00
Treehugger Robot
35d7efaf11
Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b
am: 0e4789159c
am: 26f020fc70
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462
Change-Id: I91b0e8f0033c4736516f9341a5b6166f14f7894f
2022-01-26 21:26:26 +00:00
Treehugger Robot
26f020fc70
Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b
am: 0e4789159c
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462
Change-Id: Ie20d1e1d6037a42acba87ab92007657f4f6be83d
2022-01-26 21:07:28 +00:00
Treehugger Robot
0e4789159c
Merge "Allow storageproxyd to create directories in its data location" am: 423a9a467b
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1960462
Change-Id: I021cffca681495143a279470e73e194cd5faf635
2022-01-26 20:44:17 +00:00
Treehugger Robot
423a9a467b
Merge "Allow storageproxyd to create directories in its data location"
2022-01-26 20:29:27 +00:00
Stephen Crane
45850f812e
Allow storageproxyd to create directories in its data location
...
storageproxyd already has rw_dir_perms for tee_data_file from
vendor/tee.te in platform. We need create_dir_perms to make the
"alternate/" directory for handling DSU correctly.
Test: m dist, flash, and test DSU
Bug: 203719297
Change-Id: Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a
2022-01-25 17:54:22 -08:00
TeYuan Wang
9afdb48a85
Move thermal netlink socket sepolicy rules to pixel sepolicy am: 66f1d74123
am: 8cb5857dac
am: 0fe33df6c0
am: e925f85169
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1958926
Change-Id: I77230680556c9029ca702c6b73c56119221689e8
2022-01-25 12:22:55 +00:00
TeYuan Wang
e925f85169
Move thermal netlink socket sepolicy rules to pixel sepolicy am: 66f1d74123
am: 8cb5857dac
am: 0fe33df6c0
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1958926
Change-Id: I86642d387feb6f99939ffb52341e26ba4faef082
2022-01-25 12:05:36 +00:00
TeYuan Wang
0fe33df6c0
Move thermal netlink socket sepolicy rules to pixel sepolicy am: 66f1d74123
am: 8cb5857dac
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1958926
Change-Id: I08f70c5940c8d7f8d40fb97791b762a935ac5dfa
2022-01-25 11:47:21 +00:00
TeYuan Wang
8cb5857dac
Move thermal netlink socket sepolicy rules to pixel sepolicy am: 66f1d74123
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1958926
Change-Id: I5b35f6bb9f7a5ff6ab3abaeac370384125c60abf
2022-01-25 10:39:06 +00:00
TeYuan Wang
66f1d74123
Move thermal netlink socket sepolicy rules to pixel sepolicy
...
Bug: 213257759
Test: verified genlink function with emul_temp under enforcing mode
Change-Id: I8f5518e5f866ed0813be1e6630c6a9aefaf06e63
2022-01-25 11:59:06 +08:00
linpeter
da28bad8c4
atc context change am: 85d5a9a60a
am: af647ece2f
am: 39363f3e1a
am: 7931384a9d
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1951025
Change-Id: I45ea9c111e1a512ca7efc88e22bb06b888f67464
2022-01-24 05:05:59 +00:00
Treehugger Robot
2bb6f148c1
Merge "Allow TEE storageproxyd permissions needed for DSU handling" am: 05ca30173e
am: 3cde81c794
am: 5dd5b0dd29
am: b0ecddbd4e
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1923363
Change-Id: Ic0087e6e3aef8a61f2c0b44fd48a8953e66e1868
2022-01-24 05:05:48 +00:00
Kame(TeYuan) Wang
1be9b0a5de
Merge "Label TMU as sysfs_thermal am: 32458cdc49
am: a76533f48b
am: 27eae23a3f
am: 5c9ca15d60
"
2022-01-24 05:04:06 +00:00
TreeHugger Robot
b41839bdf3
Merge "camera_hal: allow changing kthread priority"
2022-01-24 03:17:11 +00:00
TeYuan Wang
287cad81ea
Label TMU as sysfs_thermal am: 32458cdc49
am: a76533f48b
am: 27eae23a3f
am: 5c9ca15d60
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1937119
Change-Id: Ie7426fcefe1ba3bf7fd53af5454811724e6d1a90
2022-01-24 02:45:55 +00:00
TreeHugger Robot
8b1083c037
Merge "Merge "Add SOC specific ETM sysfs paths" am: 9ee70a3d7f
am: 1a59c0625f
am: c581535e5c
am: b48e33f29f
"
2022-01-22 23:29:11 +00:00
TreeHugger Robot
1b02510fce
Merge "Remove redundant rule in system_server.te"
2022-01-22 08:01:05 +00:00
Yabin Cui
826a3540e7
Merge "Add SOC specific ETM sysfs paths" am: 9ee70a3d7f
am: 1a59c0625f
am: c581535e5c
am: b48e33f29f
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1943866
Change-Id: I75cfc6940977bf431c9a8fee12497caf865ce3ff
2022-01-22 04:25:25 +00:00
Jasmine Cha
eec7d4b172
audio: add sepolicy for getting thermal event am: 2abecb1519
am: 54e84e9978
am: d57668f3cc
am: 0bfc811257
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1944690
Change-Id: I83d62090ef9a78a3bac0c0cdccd550eb56b82dc5
2022-01-22 03:41:43 +00:00
Jasmine Cha
1d2ef17567
[automerger skipped] audio: add permission to request health/sensor data am: a21b7f8800
am: cdcccbbd02
am: 8b5831f247
-s ours am: 6a1155a468
-s ours
...
am skip reason: Merged-In I8e8a512cfbd6be814c98bac75ff6c0e5db028db2 with SHA-1 27a4afc1a9
is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1944689
Change-Id: I6f6bad706ef467b367b2bb5f35c5a57e3b567ba6
2022-01-22 03:41:34 +00:00
David Anderson
91a8be13ab
Fix sepolicy denial in update_engine. am: 2fe229352b
am: e999b85d07
am: b7b8477e12
am: 9e40c2e027
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1934897
Change-Id: I4594ba648036aebef661cf047f0e2d9502b8bb7e
2022-01-22 03:41:26 +00:00
Matt Buckley
a383da1ca5
Allow HWC to get device_config_surface_flinger_native_boot_prop for adpf flags am: 317166636f
am: 8670a782de
am: 773506d408
am: 69b607c877
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1934617
Change-Id: I709b6089cb2b8a241c4989e979deb6457cedee17
2022-01-22 03:41:05 +00:00
Joel Galenson
bc2cfc98d1
Include core policy OWNERS. am: b287da183e
am: 453006460d
am: 047d2a31ed
am: 651a6b8631
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1931017
Change-Id: I27340143806bbbbda06dbc6b85d153ad4e0226b8
2022-01-22 03:40:58 +00:00
Xin Li
907d844300
[automerger skipped] Merge Android 12 QPR1 am: 0d05632eb8
-s ours am: 01d5ec6d2a
-s ours am: 4f9be8d5b2
-s ours am: 1a9568121f
-s ours
...
am skip reason: Merged-In Ie31b278a639fd5a9e249ca934d543de770fb3217 with SHA-1 856fe3d040
is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1921233
Change-Id: Ibc384627f45f9806fdb442fad4bf0d77fc7af634
2022-01-22 03:40:44 +00:00