Eileen Lai
94e8fa7a6a
modem_svc: move shared_modem_platform related sepolicy to gs-common
...
Bug: 372400955
Change-Id: I52d2a6dacb59dd796d008c4a48cdea218fd11a27
Flag: NONE local testing only
2024-11-21 05:50:44 +00:00
Nina Chen
c8cc2683b5
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 379591559
Bug: 379591519
Flag: EXEMPT NDK
Change-Id: Ia18661bf52755dec67b0551b217124b0485bdd6e
2024-11-18 14:43:52 +08:00
Treehugger Robot
db4385e02d
Merge "Update ldaf sensor device filename" into main
2024-11-18 03:36:23 +00:00
Nina Chen
a6019b0cb0
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 379246143
Bug: 379245675
Bug: 379246066
Bug: 379246340
Bug: 379248992
Bug: 379249291
Flag: EXEMPT NDK
Change-Id: Ibc136376c0a0734a2cdac3e543b90f1932e6e4c3
2024-11-15 11:06:33 +00:00
Nina Chen
4e105e14dc
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 379226761
Bug: 379226710
Bug: 379227275
Bug: 379226644
Flag: EXEMPT NDK
Change-Id: I8ef5317b2e63571ea6437014e4ae5cc281a1a5b9
2024-11-15 07:18:25 +00:00
Xin Li
b524a1802a
[automerger skipped] Merge 24Q4 (ab/12406339) into aosp-main-future am: 86288119b4
-s ours
...
am skip reason: Merged-In I8a46aae725a9e912681068df9c219e5a91784305 with SHA-1 9e9fa88ba6
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/30284974
Change-Id: I3d1436c45eac59b6cc98f27b2000d837fc110d8d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-11-14 01:22:19 +00:00
Boon Jun
1df8457f5e
Update ldaf sensor device filename
...
LDAF sensor device filename changed after kernel upgrade
from v5.10 to v6.1 in some of our in-market devices.
We need to update the device filename to access the LDAF
with this new kernel version.
Bug: 378045567
Test: Open camera, and observe available LDAF sensor in logs
Flag: EXEMPT bugfix
Change-Id: I1d366ea6a104fcf2cb1393ad26d3c6c6d39ff910
2024-11-11 07:08:09 +00:00
Xin Li
86288119b4
Merge 24Q4 (ab/12406339) into aosp-main-future
...
Bug: 370570306
Merged-In: I8a46aae725a9e912681068df9c219e5a91784305
Change-Id: I9639177ef81917e51470e586aa4c3144fbb4f3be
2024-11-06 10:31:19 -08:00
Spade Lee
c025f4915b
sepolicy: allow dump_power to read debugfs
...
11-01 11:59:42.836 11781 11781 W dump_power: type=1400 audit(0.0:46): avc: denied { search } for name="usb" dev="debugfs" ino=2059 scontext=u:r:dump_power:s0 tcontext=u:object_r:vendor_usb_debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:47): avc: denied { search } for name="google_battery" dev="debugfs" ino=18509 scontext=u:r:dump_power:s0 tcontext=u:object_r:vendor_battery_debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:48): avc: denied { read } for name="maxfg" dev="debugfs" ino=16428 scontext=u:r:dump_power:s0 tcontext=u:object_r:vendor_maxfg_debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:49): avc: denied { read } for name="/" dev="debugfs" ino=1 scontext=u:r:dump_power:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:50): avc: denied { read } for name="/" dev="debugfs" ino=1 scontext=u:r:dump_power:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:51): avc: denied { read } for name="/" dev="debugfs" ino=1 scontext=u:r:dump_power:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
Bug: 376080915
Test: adb bugreport without audit
Flag: EXEMPT bugfix
Change-Id: I7ae11300cd45f7e8c05c0dcf46d5dfda5c777400
Signed-off-by: Spade Lee <spadelee@google.com>
2024-11-01 18:05:40 +00:00
Thiébaud Weksteen
541b51e17b
Merge "Remove duplicate service entries" into main
2024-10-18 00:56:10 +00:00
Treehugger Robot
172a703bbf
Merge "Remove cgroup_desc_file bugs." into main
2024-10-16 11:02:04 +00:00
Krzysztof Kosiński
c8f947bea6
Remove cgroup_desc_file bugs.
...
These denials were caused by b/372273614. The culprit CL
has been reverted and the denials do not reproduce on HEAD.
Fix: 372347927
Test: presubmit
Flag: EXEMPT sepolicy bug map update
Change-Id: Ic83101b2b64a96f7e37349f30a902789f05bb26e
2024-10-15 06:26:15 +00:00
Eileen Lai
34b85728f7
Merge "modem_svc: use shared_modem_platform to replace all modem_svc_sit" into main
2024-10-14 07:27:51 +00:00
Eileen Lai
af68091abc
modem_svc: use shared_modem_platform to replace all modem_svc_sit
...
Bug: 368257019
Flag: NONE local testing only
Change-Id: I657afb4a6271865d62f63c67d3096714e525a689
2024-10-09 08:25:55 +00:00
Nina Chen
d338373cfd
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 372347927
Bug: 372348503
Bug: 372348558
Test: scanBugreport
Bug: 369735133
Bug: 372348545
Test: scanAvcDeniedLogRightAfterReboot
Bug: 372348067
Bug: 369735133
Flag: EXEMPT NDK
Change-Id: I578b04408d24c8a32079728673ea3b7af5fe0b3b
2024-10-09 03:24:17 +00:00
Nina Chen
a5766d4202
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 372122654
Test: scanBugreport
Bug: 369735133
Test: scanAvcDeniedLogRightAfterReboot
Bug: 369735133
Flag: EXEMPT NDK
Change-Id: I9ca82172decbb61a4582aab33d498e67ff048e12
2024-10-08 03:30:57 +00:00
samou
e746382d78
sepolicy: allow dumpstate to execute dump_power
...
10-04 19:36:47.308 7141 7141 I android.hardwar: type=1400 audit(0.0:6974): avc: denied { execute_no_trans } for path="/vendor/bin/dump/dump_power" dev="overlay" ino=91 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6975): avc: denied { read } for name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6976): avc: denied { open } for path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6977): avc: denied { search } for name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6978): avc: denied { read } for name="core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6979): avc: denied { open } for path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332 7141 7141 I dump_power: type=1400 audit(0.0:6980): avc: denied { getattr } for path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.336 7141 7141 I dump_power: type=1400 audit(0.0:6981): avc: denied { read } for name="time_in_state" dev="sysfs" ino=50604 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:25): avc: denied { read } for name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:26): avc: denied { read } for name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:27): avc: denied { read } for name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:28): avc: denied { read } for name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:29): avc: denied { read } for name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:30): avc: denied { read } for name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:46:57.664 7194 7194 W dump_power: type=1400 audit(0.0:29): avc: denied { search } for name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664 7194 7194 W dump_power: type=1400 audit(0.0:30): avc: denied { search } for name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664 7194 7194 W dump_power: type=1400 audit(0.0:31): avc: denied { search } for name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664 7194 7194 W dump_power: type=1400 audit(0.0:32): avc: denied { search } for name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664 7194 7194 W dump_power: type=1400 audit(0.0:33): avc: denied { search } for name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18792): avc: denied { search } for name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18793): avc: denied { read } for name="uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18794): avc: denied { open } for path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18795): avc: denied { getattr } for path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18796): avc: denied { search } for name="8-003c" dev="sysfs" ino=55942 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18797): avc: denied { read } for name="maxfg" dev="sysfs" ino=62568 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18798): avc: denied { read } for name="logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18799): avc: denied { open } for path="/dev/logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6191): avc: denied { search } for name="mitigation" dev="dm-50" ino=3758 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=dir permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6192): avc: denied { read } for name="thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6193): avc: denied { open } for path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6194): avc: denied { getattr } for path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6195): avc: denied { search } for name="mitigation" dev="sysfs" ino=85222 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6196): avc: denied { read } for name="last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6197): avc: denied { open } for path="/sys/devices/virtual/pmic/mitigation/last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400 7074 7074 I dump_power: type=1400 audit(0.0:6198): avc: denied { read } for name="batoilo_count" dev="sysfs" ino=85287 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
10-04 23:49:14.616 6976 6976 I dump_power: type=1400 audit(0.0:875): avc: denied { read } for name="thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616 6976 6976 I dump_power: type=1400 audit(0.0:876): avc: denied { open } for path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616 6976 6976 I dump_power: type=1400 audit(0.0:877): avc: denied { getattr } for path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-05 00:00:44.540 7085 7085 I dump_power: type=1400 audit(0.0:878): avc: denied { read } for name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540 7085 7085 I dump_power: type=1400 audit(0.0:879): avc: denied { open } for path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540 7085 7085 I dump_power: type=1400 audit(0.0:880): avc: denied { search } for name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.544 7085 7085 I dump_power: type=1400 audit(0.0:881): avc: denied { read } for name="core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544 7085 7085 I dump_power: type=1400 audit(0.0:882): avc: denied { open } for path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544 7085 7085 I dump_power: type=1400 audit(0.0:883): avc: denied { getattr } for path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544 7085 7085 I dump_power: type=1400 audit(0.0:884): avc: denied { read } for name="time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-05 00:00:44.544 7085 7085 I dump_power: type=1400 audit(0.0:885): avc: denied { open } for path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
Flag: EXEMPT refactor
Bug: 364989823
Change-Id: I195f779cc6588c37ccdbe4bb8b29ee8f2edd861a
Signed-off-by: samou <samou@google.com>
2024-10-04 16:06:47 +00:00
Thiébaud Weksteen
7561dcc936
Remove duplicate service entries
...
These entries are defined in the platform policy.
Flag: EXEMPT bugfix
Bug: 367832910
Test: TH
Change-Id: I89db26ce49f83dff7536df66bbb85eed39d7e883
2024-10-01 14:45:08 +10:00
Nina Chen
57c566b298
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 369735407
Test: scanBugreport
Bug: 369735133
Test: scanAvcDeniedLogRightAfterReboot
Bug: 369735170
Change-Id: I574ee785ee63bccaca15fa33879f8728d567e1d9
2024-09-26 13:24:24 +08:00
Wilson Sung
f5714487a6
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 369537606
Bug: 369538457
Flag: EXEMPT NDK
Change-Id: I01699bc42821ab8eabc7ed545119ba306e8a8e87
2024-09-25 12:23:48 +00:00
Tej Singh
9e9fa88ba6
Make android.framework.stats-v2-ndk app reachable
...
For libedgetpu
Test: TH
Bug: 354763040
Flag: EXEMPT bugfix
Change-Id: I8a46aae725a9e912681068df9c219e5a91784305
2024-09-20 21:27:23 -07:00
Prochin Wang
cc79320f9a
Change vendor_fingerprint_prop to vendor_restricted_prop
...
This is to allow the fingerprint HAL to access the property.
Bug: 366105474
Flag: build.RELEASE_PIXEL_BOOST_DATALAYER_PSA_ENABLED
Test: mm
Change-Id: Id15a6014d553bf91fd9ffe34c7c1000973ad5860
2024-09-16 01:46:00 +00:00
Nina Chen
9a63842938
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 366116587
Test: scanBugreport
Bug: 366115873
Bug: 366116435
Bug: 366116214
Test: scanAvcDeniedLogRightAfterReboot
Bug: 366115457
Bug: 366115458
Flag: EXEMPT NDK
Change-Id: I5f9c4f722ebcfc8fe14c9324d37106d9431accc4
2024-09-13 06:45:28 +00:00
Xin Li
8211a60d80
[automerger skipped] Merge 24Q3 to AOSP main am: 51f0b993b0
-s ours am: f74c765659
-s ours
...
am skip reason: Merged-In I91df897d8ae7d8e4b1b49a7eb20f6bb5fe99755c with SHA-1 855cd95dce
is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/3257961
Change-Id: I6a625d82b030104366c2380f2d8b3b2726976bb8
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-07 04:03:15 +00:00
Xin Li
f74c765659
[automerger skipped] Merge 24Q3 to AOSP main am: 51f0b993b0
-s ours
...
am skip reason: Merged-In I91df897d8ae7d8e4b1b49a7eb20f6bb5fe99755c with SHA-1 855cd95dce
is already in history
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/3257961
Change-Id: I76119471c70db0083446d9a9b0d8bd59ff1a400d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-07 02:44:00 +00:00
Xin Li
51f0b993b0
Merge 24Q3 to AOSP main
...
Bug: 357762254
Merged-In: I91df897d8ae7d8e4b1b49a7eb20f6bb5fe99755c
Change-Id: Ifc0e5917fd9599c10bce7c5b99031b845bc2f95b
2024-09-05 17:02:37 -07:00
Treehugger Robot
a13c7187bb
Merge "Update SELinux error" into main
2024-09-04 09:50:15 +00:00
Wilson Sung
d3d5235b50
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 364446534
Flag: EXEMPT sepolicy bugFix
Change-Id: I694b656e436ef9365ee1bbbac81f155dbf70ce60
2024-09-04 08:54:01 +00:00
Randall Huang
edf14e100e
storage: move storage related device type to common folder
...
Bug: 364225000
Test: forrest build
Change-Id: I779edca2e5cecfb34ede65dccf93f207a3dbcf2f
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-04 10:44:05 +08:00
Randall Huang
f323bc8dc7
Storage: label ufs firmware upgrade script
...
Bug: 361093041
Test: local build
Change-Id: I0f1c9222f16351bde2ef9dd478a5e0c143e49e5a
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-02 14:55:28 +08:00
Attis Chen
afbc02068d
Merge "Label sysfs node power_mode as sysfs_display." into main
2024-09-02 04:54:18 +00:00
attis
e0d8d912ec
Label sysfs node power_mode as sysfs_display.
...
Label power_mode to sysfs_panel to let it be allowed in dumpstate.
avc log:
08-26 11:59:55.044 14700 14700 W dump_display: type=1400 audit(0.0:25): avc: denied { read } for name="power_mode" dev="sysfs" ino=83218 scontext=u:r:dump_display:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 bug=b/340722772
Test: ls -Z, adb bugreport.
Flag: EXEMPT bugfix
Bug: 358505990
Change-Id: Ia31964903b62f72237ae18cf07a2cef0138adeea
Signed-off-by: attis <attis@google.com>
2024-08-26 12:13:52 +00:00
Sam Ou
cf99531470
Merge changes from topic "kernel5_revision" into main
...
* changes:
sepolicy: gs101: fix bm selinux
sepolicy: remove dump_gs101.sh
sepolicy: remove duplicate policy
2024-08-23 10:58:35 +00:00
Xiaofan Jiang
181183a4f5
Merge "Revert "Revert "gs101: update shared_modem_platform sepolicy for..."" into main
2024-08-15 20:44:28 +00:00
Xiaofan Jiang
4b26ef2e43
Revert "Revert "gs101: update shared_modem_platform sepolicy for..."
...
Revert submission 28822848-revert-28762313-SAYUORWKVG
Reason for revert: issue identify and fix is ready
Reverted changes: /q/submissionid:28822848-revert-28762313-SAYUORWKVG
Change-Id: I17fd2b246fc95eac9a5e953c7c7889ecb2c91d1d
2024-08-15 19:25:33 +00:00
Priyanka Advani (xWF)
7a34ff247b
Merge "Revert "gs101: update shared_modem_platform sepolicy for UMI"" into main
2024-08-15 18:30:35 +00:00
Priyanka Advani (xWF)
4c48ef2770
Revert "gs101: update shared_modem_platform sepolicy for UMI"
...
Revert submission 28762313
Reason for revert: Droidmonitor created revert due to b/360059249.
Reverted changes: /q/submissionid:28762313
Change-Id: I4ffb476a64b32a4e725c894f8014070121848cc0
2024-08-15 16:14:52 +00:00
Xiaofan Jiang
9c590907f6
Merge "gs101: update shared_modem_platform sepolicy for UMI" into main
2024-08-15 04:01:13 +00:00
samou
b8f3e01274
sepolicy: gs101: fix bm selinux
...
- add odpm scale value path
- add gpu cur_freq
Flag: EXEMPT refactor
Bug: 349935208
Change-Id: Ib5f4baf57c181f3ca2470514d256f307b7761403
Signed-off-by: samou <samou@google.com>
2024-08-14 12:32:56 +00:00
samou
a6390dc3ea
sepolicy: remove dump_gs101.sh
...
Flag: EXEMPT refactor
Bug: 349935208
Change-Id: I4f2d5ef40dc328237f62aac7e4116a1f1410516a
Signed-off-by: samou <samou@google.com>
2024-08-14 12:32:30 +00:00
samou
50ee17cede
sepolicy: remove duplicate policy
...
Flag: EXEMPT refactor
Bug: 349935208
Change-Id: Ib20bc0cc9af38ed481697420bb92ea12a917d594
Signed-off-by: samou <samou@google.com>
2024-08-14 12:32:05 +00:00
Xiaofan Jiang
bf7161db56
gs101: update shared_modem_platform sepolicy for UMI
...
Bug: 357139752
Flag: EXEMPT sepolicy
[ 68.189198] type=1400 audit(1722986580.568:59): avc: denied { unlink } for comm="binder:892_2" name="modem_svc_socket" dev="dm-52" ino=20239 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=1
[ 68.189448] type=1400 audit(1722986580.568:60): avc: denied { create } for comm="binder:892_2" name="modem_svc_socket" scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=1
Change-Id: I7e28f5a8c7f8a6909fccdc813e7c94ce8c7f8831
2024-08-14 01:42:37 +00:00
Kevin Ying
774949828e
Allow camera HAL to access power_state sysfs
...
08-03 01:36:52.108 791 791 W TaskPool: type=1400 audit(0.0:125): avc: denied { read } for name="power_state" dev="sysfs" ino=86770 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
Bug: 339690296
Test: Open camera, no display avc error
Flag: EXEMPT resource update only
Change-Id: I407c31e0898b07bef0df1b090dbc570f61c49272
Signed-off-by: Kevin Ying <kevinying@google.com>
2024-08-08 23:17:18 +00:00
Daniel Chapin
2327a5c0f5
Merge "Revert "trusty: storageproxy: add fs_ready_rw property context"" into main
2024-07-24 21:48:57 +00:00
Daniel Chapin
7bc5a6b183
Revert "trusty: storageproxy: add fs_ready_rw property context"
...
Revert submission 28318041-rw_storage
Reason for revert: Droidfood blocking bug b/355163562
Reverted changes: /q/submissionid:28318041-rw_storage
Change-Id: I3846d284bb6810ed3adea0070ac663babf6bb966
2024-07-24 20:17:27 +00:00
Mike McTernan
f9d21e23c3
Merge "trusty: storageproxy: add fs_ready_rw property context" into main
2024-07-23 10:02:28 +00:00
Mike McTernan
63a927b837
trusty: storageproxy: add fs_ready_rw property context
...
Flag: EXEMPT bug fix
Bug: 350362101
Test: ABTD
Change-Id: I6876593d904ce7223b91f30d31edcd3e60fac82b
2024-07-15 10:32:27 +01:00
Aaron Tsai
eb11b78314
Add permission for setting gril property
...
05-22 17:52:28.190 936 936 I auditd : type=1400 audit(0.0:784): avc: denied { write } for comm="radioext@1.0-se" name="property_service" dev="tmpfs" ino=842 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
Bug: 343012301
Bug: 203824024
Test: manual test
Flag: EXEMPT bugfix
Change-Id: I8048a67b59beac0d2ce8c7331eb0e1ea21881f9b
2024-07-05 08:05:03 +00:00
Wilson Sung
8c9a2875ab
Update SELinux error
...
Test: SELinuxUncheckedDenialBootTest
Bug: 350831964
Change-Id: Iec0a5b8418d95a83cc989681f8bc5b42e03b032f
2024-07-03 02:05:23 +00:00
Xin Li
7d1765c2de
[automerger skipped] Merge 24Q3 (ab/11976889) to aosp-main-future am: dbe46101b1
-s ours
...
am skip reason: Merged-In I91df897d8ae7d8e4b1b49a7eb20f6bb5fe99755c with SHA-1 855cd95dce
is already in history
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/27908657
Change-Id: If3b6af5094732d33963d309308b9cca1fb0219c6
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-20 20:50:49 +00:00