Commit graph

4606 commits

Author SHA1 Message Date
Eileen Lai
94e8fa7a6a modem_svc: move shared_modem_platform related sepolicy to gs-common
Bug: 372400955

Change-Id: I52d2a6dacb59dd796d008c4a48cdea218fd11a27
Flag: NONE local testing only
2024-11-21 05:50:44 +00:00
Nina Chen
c8cc2683b5 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 379591559
Bug: 379591519
Flag: EXEMPT NDK
Change-Id: Ia18661bf52755dec67b0551b217124b0485bdd6e
2024-11-18 14:43:52 +08:00
Treehugger Robot
db4385e02d Merge "Update ldaf sensor device filename" into main 2024-11-18 03:36:23 +00:00
Nina Chen
a6019b0cb0 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 379246143
Bug: 379245675
Bug: 379246066
Bug: 379246340

Bug: 379248992
Bug: 379249291
Flag: EXEMPT NDK
Change-Id: Ibc136376c0a0734a2cdac3e543b90f1932e6e4c3
2024-11-15 11:06:33 +00:00
Nina Chen
4e105e14dc Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 379226761
Bug: 379226710
Bug: 379227275
Bug: 379226644
Flag: EXEMPT NDK
Change-Id: I8ef5317b2e63571ea6437014e4ae5cc281a1a5b9
2024-11-15 07:18:25 +00:00
Xin Li
b524a1802a [automerger skipped] Merge 24Q4 (ab/12406339) into aosp-main-future am: 86288119b4 -s ours
am skip reason: Merged-In I8a46aae725a9e912681068df9c219e5a91784305 with SHA-1 9e9fa88ba6 is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/30284974

Change-Id: I3d1436c45eac59b6cc98f27b2000d837fc110d8d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-11-14 01:22:19 +00:00
Boon Jun
1df8457f5e Update ldaf sensor device filename
LDAF sensor device filename changed after kernel upgrade
from v5.10 to v6.1 in some of our in-market devices.
We need to update the device filename to access the LDAF
with this new kernel version.

Bug: 378045567
Test: Open camera, and observe available LDAF sensor in logs
Flag: EXEMPT bugfix
Change-Id: I1d366ea6a104fcf2cb1393ad26d3c6c6d39ff910
2024-11-11 07:08:09 +00:00
Xin Li
86288119b4 Merge 24Q4 (ab/12406339) into aosp-main-future
Bug: 370570306
Merged-In: I8a46aae725a9e912681068df9c219e5a91784305
Change-Id: I9639177ef81917e51470e586aa4c3144fbb4f3be
2024-11-06 10:31:19 -08:00
Spade Lee
c025f4915b sepolicy: allow dump_power to read debugfs
11-01 11:59:42.836 11781 11781 W dump_power: type=1400 audit(0.0:46): avc:  denied  { search } for  name="usb" dev="debugfs" ino=2059 scontext=u:r:dump_power:s0 tcontext=u:object_r:vendor_usb_debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:47): avc:  denied  { search } for  name="google_battery" dev="debugfs" ino=18509 scontext=u:r:dump_power:s0 tcontext=u:object_r:vendor_battery_debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:48): avc:  denied  { read } for  name="maxfg" dev="debugfs" ino=16428 scontext=u:r:dump_power:s0 tcontext=u:object_r:vendor_maxfg_debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:49): avc:  denied  { read } for  name="/" dev="debugfs" ino=1 scontext=u:r:dump_power:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:50): avc:  denied  { read } for  name="/" dev="debugfs" ino=1 scontext=u:r:dump_power:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
11-01 11:59:42.844 11781 11781 W dump_power: type=1400 audit(0.0:51): avc:  denied  { read } for  name="/" dev="debugfs" ino=1 scontext=u:r:dump_power:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0

Bug: 376080915
Test: adb bugreport without audit
Flag: EXEMPT bugfix
Change-Id: I7ae11300cd45f7e8c05c0dcf46d5dfda5c777400
Signed-off-by: Spade Lee <spadelee@google.com>
2024-11-01 18:05:40 +00:00
Thiébaud Weksteen
541b51e17b Merge "Remove duplicate service entries" into main 2024-10-18 00:56:10 +00:00
Treehugger Robot
172a703bbf Merge "Remove cgroup_desc_file bugs." into main 2024-10-16 11:02:04 +00:00
Krzysztof Kosiński
c8f947bea6 Remove cgroup_desc_file bugs.
These denials were caused by b/372273614. The culprit CL
has been reverted and the denials do not reproduce on HEAD.

Fix: 372347927
Test: presubmit
Flag: EXEMPT sepolicy bug map update
Change-Id: Ic83101b2b64a96f7e37349f30a902789f05bb26e
2024-10-15 06:26:15 +00:00
Eileen Lai
34b85728f7 Merge "modem_svc: use shared_modem_platform to replace all modem_svc_sit" into main 2024-10-14 07:27:51 +00:00
Eileen Lai
af68091abc modem_svc: use shared_modem_platform to replace all modem_svc_sit
Bug: 368257019

Flag: NONE local testing only
Change-Id: I657afb4a6271865d62f63c67d3096714e525a689
2024-10-09 08:25:55 +00:00
Nina Chen
d338373cfd Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 372347927
Bug: 372348503
Bug: 372348558
Test: scanBugreport
Bug: 369735133
Bug: 372348545
Test: scanAvcDeniedLogRightAfterReboot
Bug: 372348067
Bug: 369735133
Flag: EXEMPT NDK
Change-Id: I578b04408d24c8a32079728673ea3b7af5fe0b3b
2024-10-09 03:24:17 +00:00
Nina Chen
a5766d4202 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 372122654
Test: scanBugreport
Bug: 369735133
Test: scanAvcDeniedLogRightAfterReboot
Bug: 369735133
Flag: EXEMPT NDK
Change-Id: I9ca82172decbb61a4582aab33d498e67ff048e12
2024-10-08 03:30:57 +00:00
samou
e746382d78 sepolicy: allow dumpstate to execute dump_power
10-04 19:36:47.308  7141  7141 I android.hardwar: type=1400 audit(0.0:6974): avc:  denied  { execute_no_trans } for  path="/vendor/bin/dump/dump_power" dev="overlay" ino=91 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6975): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6976): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6977): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=29227 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6978): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6979): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.332  7141  7141 I dump_power: type=1400 audit(0.0:6980): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=57472 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-04 19:36:47.336  7141  7141 I dump_power: type=1400 audit(0.0:6981): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=50604 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:25): avc:  denied  { read } for  name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:26): avc:  denied  { read } for  name="version" dev="sysfs" ino=62887 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:27): avc:  denied  { read } for  name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:28): avc:  denied  { read } for  name="status" dev="sysfs" ino=62888 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:29): avc:  denied  { read } for  name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:24:19.640 15006 15006 W dump_power: type=1400 audit(0.0:30): avc:  denied  { read } for  name="fw_rev" dev="sysfs" ino=62915 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=file permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:29): avc:  denied  { search } for  name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:30): avc:  denied  { search } for  name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:31): avc:  denied  { search } for  name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:32): avc:  denied  { search } for  name="power_supply" dev="sysfs" ino=79013 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:46:57.664  7194  7194 W dump_power: type=1400 audit(0.0:33): avc:  denied  { search } for  name="10d50000.hsi2c" dev="sysfs" ino=21301 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18792): avc:  denied  { search } for  name="battery" dev="sysfs" ino=63428 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18793): avc:  denied  { read } for  name="uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18794): avc:  denied  { open } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.168 14936 14936 I dump_power: type=1400 audit(0.0:18795): avc:  denied  { getattr } for  path="/sys/devices/platform/google,battery/power_supply/battery/uevent" dev="sysfs" ino=63429 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18796): avc:  denied  { search } for  name="8-003c" dev="sysfs" ino=55942 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18797): avc:  denied  { read } for  name="maxfg" dev="sysfs" ino=62568 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18798): avc:  denied  { read } for  name="logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 21:51:18.184 14936 14936 I dump_power: type=1400 audit(0.0:18799): avc:  denied  { open } for  path="/dev/logbuffer_tcpm" dev="tmpfs" ino=1285 scontext=u:r:dump_power:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6191): avc:  denied  { search } for  name="mitigation" dev="dm-50" ino=3758 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6192): avc:  denied  { read } for  name="thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6193): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6194): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-50" ino=28765 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6195): avc:  denied  { search } for  name="mitigation" dev="sysfs" ino=85222 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6196): avc:  denied  { read } for  name="last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6197): avc:  denied  { open } for  path="/sys/devices/virtual/pmic/mitigation/last_triggered_count" dev="sysfs" ino=85275 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=dir permissive=1
10-04 22:01:08.400  7074  7074 I dump_power: type=1400 audit(0.0:6198): avc:  denied  { read } for  name="batoilo_count" dev="sysfs" ino=85287 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_bcl:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:875): avc:  denied  { read } for  name="thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:876): avc:  denied  { open } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-04 23:49:14.616  6976  6976 I dump_power: type=1400 audit(0.0:877): avc:  denied  { getattr } for  path="/data/vendor/mitigation/thismeal.txt" dev="dm-57" ino=15028 scontext=u:r:dump_power:s0 tcontext=u:object_r:mitigation_vendor_data_file:s0 tclass=file permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:878): avc:  denied  { read } for  name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:879): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.540  7085  7085 I dump_power: type=1400 audit(0.0:880): avc:  denied  { search } for  name="acpm_stats" dev="sysfs" ino=25439 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=dir permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:881): avc:  denied  { read } for  name="core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:882): avc:  denied  { open } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:883): avc:  denied  { getattr } for  path="/sys/devices/platform/acpm_stats/core_stats" dev="sysfs" ino=53039 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_acpm_stats:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:884): avc:  denied  { read } for  name="time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1
10-05 00:00:44.544  7085  7085 I dump_power: type=1400 audit(0.0:885): avc:  denied  { open } for  path="/sys/devices/platform/cpupm/cpupm/time_in_state" dev="sysfs" ino=45585 scontext=u:r:dump_power:s0 tcontext=u:object_r:sysfs_cpu:s0 tclass=file permissive=1

Flag: EXEMPT refactor
Bug: 364989823
Change-Id: I195f779cc6588c37ccdbe4bb8b29ee8f2edd861a
Signed-off-by: samou <samou@google.com>
2024-10-04 16:06:47 +00:00
Thiébaud Weksteen
7561dcc936 Remove duplicate service entries
These entries are defined in the platform policy.

Flag: EXEMPT bugfix
Bug: 367832910
Test: TH
Change-Id: I89db26ce49f83dff7536df66bbb85eed39d7e883
2024-10-01 14:45:08 +10:00
Nina Chen
57c566b298 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 369735407
Test: scanBugreport
Bug: 369735133
Test: scanAvcDeniedLogRightAfterReboot
Bug: 369735170
Change-Id: I574ee785ee63bccaca15fa33879f8728d567e1d9
2024-09-26 13:24:24 +08:00
Wilson Sung
f5714487a6 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 369537606
Bug: 369538457
Flag: EXEMPT NDK
Change-Id: I01699bc42821ab8eabc7ed545119ba306e8a8e87
2024-09-25 12:23:48 +00:00
Tej Singh
9e9fa88ba6 Make android.framework.stats-v2-ndk app reachable
For libedgetpu

Test: TH
Bug: 354763040
Flag: EXEMPT bugfix
Change-Id: I8a46aae725a9e912681068df9c219e5a91784305
2024-09-20 21:27:23 -07:00
Prochin Wang
cc79320f9a Change vendor_fingerprint_prop to vendor_restricted_prop
This is to allow the fingerprint HAL to access the property.

Bug: 366105474
Flag: build.RELEASE_PIXEL_BOOST_DATALAYER_PSA_ENABLED
Test: mm
Change-Id: Id15a6014d553bf91fd9ffe34c7c1000973ad5860
2024-09-16 01:46:00 +00:00
Nina Chen
9a63842938 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 366116587
Test: scanBugreport
Bug: 366115873
Bug: 366116435
Bug: 366116214
Test: scanAvcDeniedLogRightAfterReboot
Bug: 366115457
Bug: 366115458
Flag: EXEMPT NDK
Change-Id: I5f9c4f722ebcfc8fe14c9324d37106d9431accc4
2024-09-13 06:45:28 +00:00
Xin Li
8211a60d80 [automerger skipped] Merge 24Q3 to AOSP main am: 51f0b993b0 -s ours am: f74c765659 -s ours
am skip reason: Merged-In I91df897d8ae7d8e4b1b49a7eb20f6bb5fe99755c with SHA-1 855cd95dce is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/3257961

Change-Id: I6a625d82b030104366c2380f2d8b3b2726976bb8
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-07 04:03:15 +00:00
Xin Li
f74c765659 [automerger skipped] Merge 24Q3 to AOSP main am: 51f0b993b0 -s ours
am skip reason: Merged-In I91df897d8ae7d8e4b1b49a7eb20f6bb5fe99755c with SHA-1 855cd95dce is already in history

Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/3257961

Change-Id: I76119471c70db0083446d9a9b0d8bd59ff1a400d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-07 02:44:00 +00:00
Xin Li
51f0b993b0 Merge 24Q3 to AOSP main
Bug: 357762254
Merged-In: I91df897d8ae7d8e4b1b49a7eb20f6bb5fe99755c
Change-Id: Ifc0e5917fd9599c10bce7c5b99031b845bc2f95b
2024-09-05 17:02:37 -07:00
Treehugger Robot
a13c7187bb Merge "Update SELinux error" into main 2024-09-04 09:50:15 +00:00
Wilson Sung
d3d5235b50 Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 364446534
Flag: EXEMPT sepolicy bugFix
Change-Id: I694b656e436ef9365ee1bbbac81f155dbf70ce60
2024-09-04 08:54:01 +00:00
Randall Huang
edf14e100e storage: move storage related device type to common folder
Bug: 364225000
Test: forrest build
Change-Id: I779edca2e5cecfb34ede65dccf93f207a3dbcf2f
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-04 10:44:05 +08:00
Randall Huang
f323bc8dc7 Storage: label ufs firmware upgrade script
Bug: 361093041
Test: local build
Change-Id: I0f1c9222f16351bde2ef9dd478a5e0c143e49e5a
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-02 14:55:28 +08:00
Attis Chen
afbc02068d Merge "Label sysfs node power_mode as sysfs_display." into main 2024-09-02 04:54:18 +00:00
attis
e0d8d912ec Label sysfs node power_mode as sysfs_display.
Label power_mode to sysfs_panel to let it be allowed in dumpstate.

avc log:
08-26 11:59:55.044 14700 14700 W dump_display: type=1400 audit(0.0:25): avc:  denied  { read } for  name="power_mode" dev="sysfs" ino=83218 scontext=u:r:dump_display:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 bug=b/340722772

Test: ls -Z, adb bugreport.
Flag: EXEMPT bugfix
Bug: 358505990
Change-Id: Ia31964903b62f72237ae18cf07a2cef0138adeea
Signed-off-by: attis <attis@google.com>
2024-08-26 12:13:52 +00:00
Sam Ou
cf99531470 Merge changes from topic "kernel5_revision" into main
* changes:
  sepolicy: gs101: fix bm selinux
  sepolicy: remove dump_gs101.sh
  sepolicy: remove duplicate policy
2024-08-23 10:58:35 +00:00
Xiaofan Jiang
181183a4f5 Merge "Revert "Revert "gs101: update shared_modem_platform sepolicy for..."" into main 2024-08-15 20:44:28 +00:00
Xiaofan Jiang
4b26ef2e43 Revert "Revert "gs101: update shared_modem_platform sepolicy for..."
Revert submission 28822848-revert-28762313-SAYUORWKVG

Reason for revert: issue identify and fix is ready

Reverted changes: /q/submissionid:28822848-revert-28762313-SAYUORWKVG

Change-Id: I17fd2b246fc95eac9a5e953c7c7889ecb2c91d1d
2024-08-15 19:25:33 +00:00
Priyanka Advani (xWF)
7a34ff247b Merge "Revert "gs101: update shared_modem_platform sepolicy for UMI"" into main 2024-08-15 18:30:35 +00:00
Priyanka Advani (xWF)
4c48ef2770 Revert "gs101: update shared_modem_platform sepolicy for UMI"
Revert submission 28762313

Reason for revert: Droidmonitor created revert due to b/360059249.

Reverted changes: /q/submissionid:28762313

Change-Id: I4ffb476a64b32a4e725c894f8014070121848cc0
2024-08-15 16:14:52 +00:00
Xiaofan Jiang
9c590907f6 Merge "gs101: update shared_modem_platform sepolicy for UMI" into main 2024-08-15 04:01:13 +00:00
samou
b8f3e01274 sepolicy: gs101: fix bm selinux
- add odpm scale value path
- add gpu cur_freq

Flag: EXEMPT refactor
Bug: 349935208
Change-Id: Ib5f4baf57c181f3ca2470514d256f307b7761403
Signed-off-by: samou <samou@google.com>
2024-08-14 12:32:56 +00:00
samou
a6390dc3ea sepolicy: remove dump_gs101.sh
Flag: EXEMPT refactor
Bug: 349935208
Change-Id: I4f2d5ef40dc328237f62aac7e4116a1f1410516a
Signed-off-by: samou <samou@google.com>
2024-08-14 12:32:30 +00:00
samou
50ee17cede sepolicy: remove duplicate policy
Flag: EXEMPT refactor
Bug: 349935208
Change-Id: Ib20bc0cc9af38ed481697420bb92ea12a917d594
Signed-off-by: samou <samou@google.com>
2024-08-14 12:32:05 +00:00
Xiaofan Jiang
bf7161db56 gs101: update shared_modem_platform sepolicy for UMI
Bug: 357139752

Flag: EXEMPT sepolicy

[   68.189198] type=1400 audit(1722986580.568:59): avc:  denied  { unlink } for  comm="binder:892_2" name="modem_svc_socket" dev="dm-52" ino=20239 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=1
[   68.189448] type=1400 audit(1722986580.568:60): avc:  denied  { create } for  comm="binder:892_2" name="modem_svc_socket" scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=1

Change-Id: I7e28f5a8c7f8a6909fccdc813e7c94ce8c7f8831
2024-08-14 01:42:37 +00:00
Kevin Ying
774949828e Allow camera HAL to access power_state sysfs
08-03 01:36:52.108   791   791 W TaskPool: type=1400 audit(0.0:125): avc:  denied  { read } for  name="power_state" dev="sysfs" ino=86770 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

Bug: 339690296
Test: Open camera, no display avc error
Flag: EXEMPT resource update only
Change-Id: I407c31e0898b07bef0df1b090dbc570f61c49272
Signed-off-by: Kevin Ying <kevinying@google.com>
2024-08-08 23:17:18 +00:00
Daniel Chapin
2327a5c0f5 Merge "Revert "trusty: storageproxy: add fs_ready_rw property context"" into main 2024-07-24 21:48:57 +00:00
Daniel Chapin
7bc5a6b183 Revert "trusty: storageproxy: add fs_ready_rw property context"
Revert submission 28318041-rw_storage

Reason for revert: Droidfood blocking bug b/355163562

Reverted changes: /q/submissionid:28318041-rw_storage

Change-Id: I3846d284bb6810ed3adea0070ac663babf6bb966
2024-07-24 20:17:27 +00:00
Mike McTernan
f9d21e23c3 Merge "trusty: storageproxy: add fs_ready_rw property context" into main 2024-07-23 10:02:28 +00:00
Mike McTernan
63a927b837 trusty: storageproxy: add fs_ready_rw property context
Flag: EXEMPT bug fix
Bug: 350362101
Test: ABTD
Change-Id: I6876593d904ce7223b91f30d31edcd3e60fac82b
2024-07-15 10:32:27 +01:00
Aaron Tsai
eb11b78314 Add permission for setting gril property
05-22 17:52:28.190   936   936 I auditd  : type=1400 audit(0.0:784): avc:  denied  { write } for  comm="radioext@1.0-se" name="property_service" dev="tmpfs" ino=842 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0

Bug: 343012301
Bug: 203824024
Test: manual test
Flag: EXEMPT bugfix
Change-Id: I8048a67b59beac0d2ce8c7331eb0e1ea21881f9b
2024-07-05 08:05:03 +00:00
Wilson Sung
8c9a2875ab Update SELinux error
Test: SELinuxUncheckedDenialBootTest
Bug: 350831964
Change-Id: Iec0a5b8418d95a83cc989681f8bc5b42e03b032f
2024-07-03 02:05:23 +00:00
Xin Li
7d1765c2de [automerger skipped] Merge 24Q3 (ab/11976889) to aosp-main-future am: dbe46101b1 -s ours
am skip reason: Merged-In I91df897d8ae7d8e4b1b49a7eb20f6bb5fe99755c with SHA-1 855cd95dce is already in history

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/27908657

Change-Id: If3b6af5094732d33963d309308b9cca1fb0219c6
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-20 20:50:49 +00:00