Commit graph

247 commits

Author SHA1 Message Date
Terry Huang
e1977e8287 Remove sced sepolicy rule
Bug: 381778782
Test: gts pass
Flag: EXEMPT bugfix

Change-Id: I2c75c28ddf2ded0c8902acc2b2ded845da5e4464
2025-01-09 09:04:10 +08:00
chenkris
276946c265 whi: Add selinux permission for fth
Fix the following avc denials:
avc:  denied  { open } for  path="/dev/fth_fd" dev="tmpfs" ino=1575 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
avc:  denied  { read } for  name="wakeup96" dev="sysfs" ino=101698 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0

Bug: 383048849
Test: ls -lZ /sys/devices/platform/odm//odm:fps_touch_handler/wakeup
Test: authenticate fingerprint
Flag: EXEMPT NDK
Change-Id: I97305f6ac077e114624674e18b5d0718771a5e3a
2025-01-03 04:29:02 +00:00
Eileen Lai
f20c8a9072 modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955

Change-Id: I10410974041146ad508ca6748549507183cc1239
Flag: NONE local testing only
2024-12-08 06:51:47 +00:00
Liana Kazanova (xWF)
9d43b259d2 Revert "modem_svc: move shared_modem_platform related sepolicy t..."
Revert submission 30519089-move_modem_sepolicy

Reason for revert: DroidMonitor: Potential culprit for http://b/380274930 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.

Reverted changes: /q/submissionid:30519089-move_modem_sepolicy

Change-Id: Iadc8ec2e01336d746a7b34c8b05bd51df440c422
2024-11-21 17:54:01 +00:00
Eileen Lai
94e8fa7a6a modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955

Change-Id: I52d2a6dacb59dd796d008c4a48cdea218fd11a27
Flag: NONE local testing only
2024-11-21 05:50:44 +00:00
Boon Jun
1df8457f5e Update ldaf sensor device filename
LDAF sensor device filename changed after kernel upgrade
from v5.10 to v6.1 in some of our in-market devices.
We need to update the device filename to access the LDAF
with this new kernel version.

Bug: 378045567
Test: Open camera, and observe available LDAF sensor in logs
Flag: EXEMPT bugfix
Change-Id: I1d366ea6a104fcf2cb1393ad26d3c6c6d39ff910
2024-11-11 07:08:09 +00:00
Eileen Lai
34b85728f7 Merge "modem_svc: use shared_modem_platform to replace all modem_svc_sit" into main 2024-10-14 07:27:51 +00:00
Eileen Lai
af68091abc modem_svc: use shared_modem_platform to replace all modem_svc_sit
Bug: 368257019

Flag: NONE local testing only
Change-Id: I657afb4a6271865d62f63c67d3096714e525a689
2024-10-09 08:25:55 +00:00
samou
e746382d78 sepolicy: allow dumpstate to execute dump_power
10-04 19:36:47.308  7141  7141 I android.hardwar: type=1400 audit(0.0:6974): avc:  denied  { execute_no_trans } for  path="/vendor/bin/dump/dump_power" dev="overlay" ino=91 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6975): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6976): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6977): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6978): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6979): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6980): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.336  7141  7141 I dump_power: type=1400 audit(0.0:6981): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=50604 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:25): avc:  denied  { read } for  name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:26): avc:  denied  { read } for  name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:27): avc:  denied  { read } for  name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:28): avc:  denied  { read } for  name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:29): avc:  denied  { read } for  name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:30): avc:  denied  { read } for  name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:29): avc:  denied  { search } for  name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:30): avc:  denied  { search } for  name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:31): avc:  denied  { search } for  name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:32): avc:  denied  { search } for  name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:33): avc:  denied  { search } for  name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18792): avc:  denied  { search } for  name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18793): avc:  denied  { read } for  name="uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18794): avc:  denied  { open } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18795): avc:  denied  { getattr } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18796): avc:  denied  { search } for  name="8-003c" dev="sysfs" ino=55942 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18797): avc:  denied  { read } for  name="maxfg" dev="sysfs" ino=62568 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18798): avc:  denied  { read } for  name="logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18799): avc:  denied  { open } for  path="/dev/logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6191): avc:  denied  { search } for  name="mitigation" dev="dm-50" ino=3758 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6192): avc:  denied  { read } for  name="thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6193): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6194): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6195): avc:  denied  { search } for  name="mitigation" dev="sysfs" ino=85222 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6196): avc:  denied  { read } for  name="last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6197): avc:  denied  { open } for  path="/sys/devices/virtual/pmic/mitigation/last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6198): avc:  denied  { read } for  name="batoilo_count" dev="sysfs" ino=85287 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:875): avc:  denied  { read } for  name="thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:876): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:877): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:878): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:879): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:880): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:881): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:882): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:883): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:884): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:885): avc:  denied  { open } for  path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1

Flag: EXEMPT refactor
Bug: 364989823
Change-Id: I195f779cc6588c37ccdbe4bb8b29ee8f2edd861a
Signed-off-by: samou <samou@google.com>
2024-10-04 16:06:47 +00:00
Tej Singh
9e9fa88ba6 Make android.framework.stats-v2-ndk app reachable
For libedgetpu

Test: TH
Bug: 354763040
Flag: EXEMPT bugfix
Change-Id: I8a46aae725a9e912681068df9c219e5a91784305
2024-09-20 21:27:23 -07:00
samou
a6390dc3ea sepolicy: remove dump_gs101.sh
Flag: EXEMPT refactor
Bug: 349935208
Change-Id: I4f2d5ef40dc328237f62aac7e4116a1f1410516a
Signed-off-by: samou <samou@google.com>
2024-08-14 12:32:30 +00:00
chenkris
44f0166eb6 Allow fingerprint to access the folder /data/vendor/fingerprint
Fix the following avc denial:
android.hardwar: type=1400 audit(0.0:20): avc:  denied  { write } for  name="fingerprint" dev="dm-56" ino=36703 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:vendor_data_file:s0 tclass=dir permissive=0

Bug: 267766859
Test: Tested fingerprint under enforcing mode
Change-Id: Id3f00d526dbe044f60aad2198fa65fbe3b6b2c60
2024-05-08 06:48:55 +00:00
Lei Ju
40465c1988 [gs101] Use common settings for Contexthub HAL
The change also labeled files under /data/vendor/chre/ to grant
required access.

Test: compilation
Bug: 248615564
Change-Id: I4db158853764987cf04dc7963ff79c680613f028
2024-02-18 11:41:51 -08:00
Mahesh Kallelil
dc869395ad Merge "Fix SELinux error in dump_modem" into main 2024-01-12 06:36:51 +00:00
Mahesh Kallelil
ea7ccea15c Fix SELinux error in dump_modem
The cpif logbuffer did not have the right context and was
missing as part of the bugreport.

Test: Tested bugreport on device
Bug: 305600375
Change-Id: I2101037d0044e706969f2582e29f923ae029458b
Signed-off-by: Mahesh Kallelil <kallelil@google.com>
2024-01-11 09:24:22 -08:00
wenchangliu
da91eed387 gs101: move mediacodec_samsung sepolicy to gs-common
remove mediacodec_samsung sepolicy in legacy path since we will include it from gs-common.

Bug: 318793681
Test: build pass, camera record, youtube
Change-Id: Idc0e19348d1e113e95305279aebbbaf82c79d730
2024-01-05 10:14:32 +00:00
David Drysdale
422638059a Merge "Add Secretkeeper HAL" into main 2023-12-06 10:21:03 +00:00
David Drysdale
03785012ed Add Secretkeeper HAL
Test: VtsAidlAuthGraphSessionTest
Bug: 306364873
Change-Id: I72d9d9afd57d265bd2a019a02d6aa364deb4acb4
2023-12-05 10:38:01 +00:00
Jason Chiu
3f3bfddaff gs101: move common sepolicy related to bootctrl hal to gs-common
Bug: 265063384
Change-Id: I2e7bee9c6be4a6802a759bf52fb412dd73f868bd
Signed-off-by: Jason Chiu <jasoncschiu@google.com>
2023-12-05 01:24:03 +08:00
Randall Huang
ec6ba5806d Move sg_device related policy
Bug: 312582937
Test: make selinux_policy
Change-Id: I27a86d47777a6d769b93fc1c40ae27dacf83ab10
Signed-off-by: Randall Huang <huangrandall@google.com>
2023-11-22 14:01:33 +08:00
Devika Krishnadas
4ed070d0aa Merge "Add Pixel Mapper as a sp-HAL" into main 2023-11-20 18:17:28 +00:00
Devika Krishnadas
1f9e3a93e1 Add Pixel Mapper as a sp-HAL
Bug: 267352318

Change-Id: I77b064c3eae2b47677ee83df8483e6f7aba08e6e
Signed-off-by: Devika Krishnadas <kdevika@google.com>
2023-11-16 01:17:05 +00:00
Daniel Norman
e948bb326a Removes duplicate hidraw_device type definition.
This type is now defined by the platform.

Bug: 303522222
Change-Id: I3e1fc7cb102fa9e9a80b8751eb0da505e3b3d69f
Test: ls -z /dev/hidraw0
2023-11-10 22:53:15 +00:00
Kiyoung Kim
6062907c94 Move file context on vendor libdmabufheap to system/sepolicy am: e2aaff8d5e am: 3ed876e3d8 am: dd034df5b0 am: 8b2a99dadb
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2666615

Change-Id: I86ee4490ad1ddd3d8fdd8404d3d39b4f11c0298f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-07-20 04:30:11 +00:00
Kiyoung Kim
dd034df5b0 Move file context on vendor libdmabufheap to system/sepolicy am: e2aaff8d5e am: 3ed876e3d8
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2666615

Change-Id: I5b05d5a3855f153d54e5d0bb929003dad4e021cc
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-07-20 03:00:55 +00:00
Kiyoung Kim
e2aaff8d5e Move file context on vendor libdmabufheap to system/sepolicy
libdmabufheap is former VNDK-SP library, and will be marked as sp-hal
sepolicy label by default. Current definition on gs-101 creates conflict
with generic sepolicy update. This change removes label on libdmabufheap
from gs101 and move it to generic sepolicy.

Bug: 291673098
Test: N/A
Change-Id: Ida23dc71e9794aa86e8b50ed927dc6b5fa57ea91
2023-07-20 09:53:15 +09:00
Patty Huang
73a74266f9 Allow bthal to access vendor bluetooth folder
Bug: 289055382
Test: enable vendor debug log and check the vendor snoop log contain the
vendor log

Change-Id: I25d7080f89ef1ca5836315097eab3c2916c9f4c0
2023-07-03 12:28:00 +08:00
martinwu
3785b0d271 [TSV2] Remove tcpdump sepolicy from gs101 and move sepolicy to gs-common
Bug: 264490014
Test: 1. Enable tcpdump_logger always-on function
      2. Dump bugreport
      3. Pull dumpstate_board.bin and chagne it to zip
      4. Unzip dumpstate_board.zip and check if tcpdump files
         are there.
Change-Id: Iea67de1e645592c6993a3ee6f2ca8e6bf3c6c949
Merged-In: Iea67de1e645592c6993a3ee6f2ca8e6bf3c6c949
2023-04-29 13:03:01 +00:00
martinwu
3055e06f0a [TSV2] Remove tcpdump sepolicy from gs101 and move sepolicy to gs-common
Bug: 264490014
Test: 1. Enable tcpdump_logger always-on function
      2. Dump bugreport
      3. Pull dumpstate_board.bin and chagne it to zip
      4. Unzip dumpstate_board.zip and check if tcpdump files
         are there.
Change-Id: Iea67de1e645592c6993a3ee6f2ca8e6bf3c6c949
2023-04-27 13:46:23 +00:00
Martin Wu
e30ee618d6 Revert "Remove tcpdump sepolicy from gs101 and move sepolicy to ..."
Revert submission 22814097-Fix-tcpdump-sepolicy

Reason for revert: build break

Reverted changes: /q/submissionid:22814097-Fix-tcpdump-sepolicy

Change-Id: I3d47d22250b435416c4ca44ff1956569662591ee
2023-04-27 02:20:55 +00:00
martinwu
6be45972bb Remove tcpdump sepolicy from gs101 and move sepolicy to gs-common
Bug: 264490014
Test: 1. Enable tcpdump_logger always-on function
      2. Dump bugreport
      3. Pull dumpstate_board.bin and chagne it to zip
      4. Unzip dumpstate_board.zip and check if tcpdump files
         are there.
Change-Id: I3d0cb388cf9b7c96d2856f46c0440b4017477480
2023-04-27 01:38:04 +00:00
Adam Shih
240c435174 use dumpsate from gs-common
Bug: 273380985
Test: adb bugreport
Change-Id: I9092e2e004e3ad0b3667b948ed4d633cd50d088c
2023-04-07 13:02:21 +08:00
Adam Shih
e7ea94d8e1 Move cma dump to itself
Bug: 273380985
Test: adb bugreport
Change-Id: I40ecb631c7fbbea216f5c56857b92152c997e466
2023-03-24 13:56:31 +08:00
Adam Shih
7d3f25d95b Move display dump to gs-common
Bug: 269212897
Test: adb bugreport
Change-Id: Id40661687bbd04d7eba4790dc5fe17ca5c79e47d
2023-03-07 13:01:05 +08:00
Treehugger Robot
580fb1061d Merge "Map AIDL Gatekeeper to same policy as HIDL version" am: b72bb4c53f am: 114e2a377f am: 60fc07a2f5
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2424201

Change-Id: I269fe35ddd8dc13df7b275a84f86955e2853563a
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-02-14 20:44:30 +00:00
Treehugger Robot
114e2a377f Merge "Map AIDL Gatekeeper to same policy as HIDL version" am: b72bb4c53f
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2424201

Change-Id: Ib469bb013d0c7335e2da4f429cde4c5df9395ed5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-02-14 18:56:35 +00:00
Subrahmanyaman
b4ec2efe4b Map AIDL Gatekeeper to same policy as HIDL version
Bug: 268342724
Test: VtsHalGatekeeperTargetTest
Change-Id: I050860bfeb0e87830e554ed19bc1efe54e7db0a5
2023-02-08 18:37:15 +00:00
Victor Barr
5eea830c6e Move Support for DBA HAL in common edgetpu packages
Previously supported in some cases. Now extend it to all common cases.

Bug: 263394888
Test: Built and ran DBA HAL on Android Device
Change-Id: I70db1fae6b9f5787c635bb2fcbabc7ee0e064a9f
2023-01-17 18:42:26 +00:00
Kyle Zhang
902db3961f Add hal_drm_widevine for Widevine exec sepolicy
Bug: 243699259
Test: atp v2/widevine-eng/drm_compliance
Change-Id: Ifede19e690cb7b7333016df08fb146a0ec8f7409
2023-01-06 03:14:20 +00:00
Adam Shih
36dc4e181d move thermal dump to gs-common
Bug: 257880034
Test: adb bugreport
Change-Id: Ib3efb17fcc3f69fac565599cffb06eff83e7cc8e
2022-11-15 14:02:15 +08:00
Adam Shih
ea632b0eb1 move sensors dump to gs-common
Bug: 250475720
Test: adb bugreport
Change-Id: I1cadc20635358c72c9571a2abaa7055efcc50adc
2022-11-10 15:02:08 +08:00
Adam Shih
84b32a700f move edgetpu to gs-common
Bug: 258114806
Test: build pass
Change-Id: Ie576f6511dc60db59bc44567ff0a929506224203
2022-11-08 13:15:28 +08:00
Jenny Ho
898da02fa5 Add permission for logbuffer_bd am: 632c5dba75 am: 393e0efb9b
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/20307975

Change-Id: I96e4d3891e64f670effd8ae227659b86f3867508
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-11-03 01:31:36 +00:00
Jenny Ho
393e0efb9b Add permission for logbuffer_bd am: 632c5dba75
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/20307975

Change-Id: I148592298e9f5a15406bd95418b228385e412ae7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-11-03 00:59:41 +00:00
Jenny Ho
632c5dba75 Add permission for logbuffer_bd
Bug: 242679204
Change-Id: I134bf8611441274e8438fa06b5ca6c186efb331a
Signed-off-by: Jenny Ho <hsiufangho@google.com>
2022-10-28 22:22:24 +08:00
Adam Shih
07a5f33a8d move brcm gps solution to gs-common
Bug: 254758553
Test: google map can locate on pixel
Change-Id: Iaf954f3af043dc5080b0be473ed8b78b1c6d0e22
2022-10-27 09:37:46 +08:00
Adam Shih
72aa5a98fc move aoc settings to gs-common
Bug: 248426917
Test: boot with aoc launched
Change-Id: I891767f10dfac7528b76e27fd2756b77ed46e45c
2022-10-20 11:41:19 +08:00
Krzysztof Kosiński
20e9a691cf Use generic wildcard for vendor libprotobuf. am: 2118dfb684 am: f9f745da33 am: a110b52215
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2255496

Change-Id: I5e1311cd4ca7ed0cc1f436a9ccb3a5b6c7d9da0a
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-10-14 16:54:29 +00:00
Krzysztof Kosiński
f9f745da33 Use generic wildcard for vendor libprotobuf. am: 2118dfb684
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2255496

Change-Id: I3788ebba42c38f754c183eb518e2d3a9ad31bba7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-10-14 15:51:58 +00:00
Krzysztof Kosiński
2118dfb684 Use generic wildcard for vendor libprotobuf.
The suffix changes on each upgrade and the newest release uses
a two-part version number instead of a three-part one. Use a regex
that will match any suffix.

Bug: 203713560
Test: presubmit, log check
Change-Id: I27d7bd10e469b794226fe0c77b02c57d876729b1
2022-10-14 14:06:56 +00:00