TreeHugger Robot
fdbbf28fa0
Merge "Provide fastbootd permissions to invoke the set_active command" into sc-dev am: 1256869c5c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14391698
Change-Id: I496ba2c956296cc09ef3115fafe5d6c1af589b5e
2021-05-03 03:31:35 +00:00
TreeHugger Robot
1256869c5c
Merge "Provide fastbootd permissions to invoke the set_active command" into sc-dev
2021-05-03 03:19:23 +00:00
Hridya Valsaraju
1711a2d5c7
Provide fastbootd permissions to invoke the set_active command
...
These permissions fix the following denials:
[ 66.641731][ T59] audit: type=1400 audit(1619815760.952:17): avc:
denied { open } for pid=360 comm="fastbootd" path="/dev/block/sdd1"
dev="tmpfs" ino=416 scontext=u:r:fastbootd:s0
tcontext=u:object_r:devinfo_block_device:s0 tclass=blk_file permissive=1
[ 66.664509][ T59] audit: type=1400 audit(1619815760.952:18): avc:
denied { write } for pid=360 comm="fastbootd" name="sdd1" dev="tmpfs"
ino=416 scontext=u:r:fastbootd:s0
tcontext=u:object_r:devinfo_block_device:s0 tclass=blk_file permissive=1
[ 66.686431][ T59] audit: type=1400 audit(1619815760.952:19): avc:
denied { read write } for pid=360 comm="fastbootd"
name="boot_lun_enabled" dev="sysfs" ino=57569 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
[ 66.708623][ T59] audit: type=1400 audit(1619815760.952:20): avc:
denied { open } for pid=360 comm="fastbootd"
path="/sys/devices/platform/14700000.ufs/pixel/boot_lun_enabled"
dev="sysfs" ino=57569 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
[ 56.680861][ T59] audit: type=1400 audit(1619806507.020:10): avc:
denied { read write } for pid=357 comm="fastbootd" name="sda"
dev="tmpfs" ino=476 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sda_block_device:s0 tclass=blk_file permissive=0
Test: fastboot set_active
Bug: 185955438
Change-Id: I9339b2a5f2a00c9e1768f479fdeac2e1f27f04bc
2021-04-30 14:37:58 -07:00
TreeHugger Robot
0d8edba50f
Merge "Remove platform certification from imsservice" into sc-dev am: 6a5cfd86f5
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14343989
Change-Id: Ib5bd0d2f54aa7d4133bdfe5ab2ffaf16936716f4
2021-04-30 17:14:29 +00:00
TreeHugger Robot
6a5cfd86f5
Merge "Remove platform certification from imsservice" into sc-dev
2021-04-30 16:55:56 +00:00
TreeHugger Robot
2d1988d06d
Merge "Update gs101 sepolicy for contexthub HAL" into sc-dev am: ff7948fc48
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14354723
Change-Id: I5d18bfc7ec389676856b19c0d78b88bafb185f85
2021-04-30 16:52:14 +00:00
TreeHugger Robot
ff7948fc48
Merge "Update gs101 sepolicy for contexthub HAL" into sc-dev
2021-04-30 16:34:37 +00:00
TreeHugger Robot
61f2e4ad4a
Merge "sepolicy:gs101: allow init-insmod-sh to access sysfs_leds nodes" into sc-dev am: c134ed985a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14357213
Change-Id: Ie77154a8220419986654f288ece820c1edc56606
2021-04-29 23:07:37 +00:00
TreeHugger Robot
c134ed985a
Merge "sepolicy:gs101: allow init-insmod-sh to access sysfs_leds nodes" into sc-dev
2021-04-29 22:48:22 +00:00
TreeHugger Robot
43c5bf6ed6
Merge "change persist.camera to persit.vendor.camera" into sc-dev am: 2c4b0fd96a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14356785
Change-Id: I8ece2241cea3bf27a1fa7294b29703f56030f27f
2021-04-29 21:42:50 +00:00
Oleg Matcovschi
963848fdaa
sepolicy:gs101: allow init-insmod-sh to access sysfs_leds nodes
...
Bug: 186788772
Signed-off-by: Oleg Matcovschi <omatcovschi@google.com>
Change-Id: I9cc44571eb5c8f52d6307bff9cb77f08712c5404
2021-04-29 14:34:55 -07:00
TreeHugger Robot
2c4b0fd96a
Merge "change persist.camera to persit.vendor.camera" into sc-dev
2021-04-29 21:26:12 +00:00
Lida Wang
bb7ae85a0d
change persist.camera to persit.vendor.camera
...
Bug: 186670529
Change-Id: I3a6d4202ec2b90cc0ce9cc9ba62d2cf2ce3a5c29
2021-04-29 13:18:01 -07:00
Anthony Stange
836f25d64b
Update gs101 sepolicy for contexthub HAL
...
Bug: 168941570
Test: Load nanoapp via HAL
Change-Id: If133a3290e4fc02677523d737980ee5944885c36
2021-04-29 16:59:36 +00:00
TreeHugger Robot
0071fe0bc0
Merge "Add sepolicy for sensor HAL to read lhbm" into sc-dev am: 7a4cd3a6e0
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14299201
Change-Id: I9bb9d0d61ba1cf7525c0231e5177318501c5d0ae
2021-04-29 16:31:59 +00:00
TreeHugger Robot
7a4cd3a6e0
Merge "Add sepolicy for sensor HAL to read lhbm" into sc-dev
2021-04-29 15:48:15 +00:00
Taesoon Park
b6f2b0bad9
Remove platform certification from imsservice
...
The platform certification is removed form com.shannon.imsservice.
So, remove seinfo from com.shannon.imsservice item.
Bug: 186135657
Test: VoLTE and VoWiFi
Signed-off-by: Taesoon Park <ts89.park@samsung.com>
Change-Id: Ie493abfd7a146766ad819bb7a5240d9f1e2f1d0e
2021-04-29 11:28:08 +08:00
Chia-Ching Yu
3f91d6417a
Add sepolicy for sensor HAL to read lhbm
...
04-23 08:54:18.000 742 742 I /vendor/bin/hw/android.hardware.sensors@2.0-service.multihal: type=1400 audit(0.0:23): avc: denied { read } for comm=504F5349582074696D6572203430 name="local_hbm_mode" dev="sysfs" ino=70515 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs_lhbm:s0 tclass=file permissive=1
Bug: 181617640
Test: Forrest build with this patch(ab/P22167685).
No local_hbm_mode related avc deined log.
Change-Id: Ibac3317cbca8652885310b1f5af8f4ea4d44a5c4
2021-04-29 03:00:19 +00:00
TreeHugger Robot
c17392b08c
Merge "Fix android.hardware.drm@1.4-service.clearkey label" into sc-dev am: 7ecd67743c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14340676
Change-Id: I968ae5379dbe36e54eb931712083f969ead85522
2021-04-28 23:10:56 +00:00
TreeHugger Robot
7ecd67743c
Merge "Fix android.hardware.drm@1.4-service.clearkey label" into sc-dev
2021-04-28 22:26:38 +00:00
Victor Liu
e8b972be35
Merge "uwb: allow uwb service to access nfc service" into sc-dev am: 247097a000
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14281933
Change-Id: Ie088c98ae196ebc9982808b0140494c30618eb03
2021-04-28 21:19:21 +00:00
Victor Liu
247097a000
Merge "uwb: allow uwb service to access nfc service" into sc-dev
2021-04-28 20:49:50 +00:00
Chris Fries
2d2adb3e56
Fix android.hardware.drm@1.4-service.clearkey label
...
Bug: 186617617
Change-Id: Icad8008686ef57d4b6c3fca27af41e2b2991f74f
2021-04-28 14:40:02 -05:00
Roger Fang
5ef9766dc6
sepolicy: gs101: allows pixelstat to access audio metrics nodes am: 66634d4d20
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14255523
Change-Id: Ic367dfd6c1e4e43a43dd4327337faa4ca124685b
2021-04-28 08:54:23 +00:00
Roger Fang
66634d4d20
sepolicy: gs101: allows pixelstat to access audio metrics nodes
...
audio.service: type=1400 audit(0.0:30): avc: denied { read write } for name="amcs" dev="tmpfs" ino=739 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:amcs_device:s0 tclass=chr_file permissive=0
pixelstats-vend: type=1400 audit(0.0:9): avc: denied { read } for name="speaker_impedance" dev="sysfs" ino=67611 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
HwBinder:696_2: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/amcs" dev="tmpfs" ino=766 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:amcs_device:s0 tclass=chr_file permissive=0
Bug: 171854614
Test: manually test, no avc: denied.
Change-Id: I82ebd22f167200ab3cf59e6525ef43c0be8f722a
2021-04-28 10:52:06 +08:00
TreeHugger Robot
0df634be79
Merge "Add sepolicy for wlan logger and sniffer logger" into sc-dev am: d60ae7dfed
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14299186
Change-Id: Ifbb5f94a5658a0a61b2d16411752f7975ae63ef1
2021-04-28 02:23:38 +00:00
TreeHugger Robot
7cef5be775
Merge "Grant powerhal access to sysfs_devfreq_dir" into sc-dev am: 68bbf709c2
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14329748
Change-Id: I195b2997f64f968f79306241a94b57c4d68b1b84
2021-04-28 02:21:53 +00:00
TreeHugger Robot
d60ae7dfed
Merge "Add sepolicy for wlan logger and sniffer logger" into sc-dev
2021-04-28 02:12:26 +00:00
TreeHugger Robot
68bbf709c2
Merge "Grant powerhal access to sysfs_devfreq_dir" into sc-dev
2021-04-28 02:03:58 +00:00
Jia-yi Chen
09d5fc647d
Grant powerhal access to sysfs_devfreq_dir
...
Bug: 186576303
Test: Boot & check logcat
Change-Id: Ia07991c3a8a7dfd8388a228fbdec1f28d2f5b4c3
2021-04-27 16:16:02 -07:00
chenpaul
920b0e11a9
Add sepolicy for wlan logger and sniffer logger
...
Bug: 186069127
Test: Sniffer logger can be start by Pixel Logger app
wlan logger is workable.
Change-Id: I1e7a75a08de37668316b06e066c080e837d7896b
2021-04-27 19:37:28 +08:00
TreeHugger Robot
5c94d31dc9
Merge "update wakeup node" into sc-dev am: 27c30c1cc6
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14319145
Change-Id: Ife4d984e68a5f6b29cd28d6c0a07c0f57e5d0205
2021-04-27 10:13:09 +00:00
TreeHugger Robot
27c30c1cc6
Merge "update wakeup node" into sc-dev
2021-04-27 08:47:38 +00:00
Adam Shih
72ca81757a
update wakeup node
...
Bug: 186492032
Test: pts-tradefed run pts -m PtsSELinuxTest
-t com.google.android.selinux.pts.SELinuxTest#scanAvcDeniedLogRightAfterReboot
Change-Id: I9bac40334001d4073dae1846a2cd0310d59ebfe7
2021-04-27 15:30:55 +08:00
Adam Shih
53a9f71190
Merge "move vendor_executes_system_violators to userdebug" into sc-dev am: ab9437c069
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14299203
Change-Id: I8a407dfe4bc3d2c03f8e66c689c12c162a87026e
2021-04-27 01:36:11 +00:00
Adam Shih
ab9437c069
Merge "move vendor_executes_system_violators to userdebug" into sc-dev
2021-04-27 01:01:21 +00:00
TreeHugger Robot
3dbe7f02c2
Merge "logger_app: Grant access to control usb debug port" into sc-dev am: 6f18d69b86
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14308745
Change-Id: Ief16ac8bc40f65f04ca9cea9ec9fc1822901b18c
2021-04-26 19:00:20 +00:00
TreeHugger Robot
6f18d69b86
Merge "logger_app: Grant access to control usb debug port" into sc-dev
2021-04-26 18:19:35 +00:00
TreeHugger Robot
8036588f9d
Merge "usb: Add sepolicy for extcon access" into sc-dev am: a18b6c2e99
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14182157
Change-Id: I75002cf2eaab353efb1ceb4eaf77cd83b9370dd7
2021-04-26 10:25:33 +00:00
TreeHugger Robot
a18b6c2e99
Merge "usb: Add sepolicy for extcon access" into sc-dev
2021-04-26 10:00:15 +00:00
David Massoud
1d03a77dd2
Add gs101 specific sysfs_devfreq_cur entries am: e03291c6af
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14187061
Change-Id: I84e32ee0fec61b99658b9e283a5a6bf3155dbcb1
2021-04-26 05:26:22 +00:00
Nicole Lee
b3dfc87e03
logger_app: Grant access to control usb debug port
...
avc: denied { read } for comm="oid.pixellogger" name="u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=325 scontext=u:r:logger_app:s0:c22,c257,c512,c768 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1 app=com.android.pixellogger
avc: denied { open } for comm="oid.pixellogger" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=325 scontext=u:r:logger_app:s0:c22,c257,c512,c768 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1 app=com.android.pixellogger
avc: denied { set } for property=vendor.usb.config pid=8892 uid=10278 gid=10278 scontext=u:r:logger_app:s0:c22,c257,c512,c768 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=property_service permissive=1
Bug: 186365435
Change-Id: Ie7aef49eee1dd66a6ca6ca9a1a4f8d31cc793551
2021-04-26 11:50:51 +08:00
David Massoud
e03291c6af
Add gs101 specific sysfs_devfreq_cur entries
...
Device specific implementation for go/oag/1676945
Bug: 181850306
Test: See go/oag/1676945
Change-Id: I8a973f400c89ada880edb5566ec31fc6ee7b97c1
2021-04-26 00:56:42 +00:00
Adam Shih
22f18adb26
move vendor_executes_system_violators to userdebug
...
Bug: 186189967
Test: com.google.android.security.gts.SELinuxHostTest#testNoExemptionsForVendorExecutingCore
Change-Id: I277cec72377b647c9af40e32b5582e30e9e3730e
2021-04-26 08:41:02 +08:00
TreeHugger Robot
9ad9197a2a
Merge "allow RilConfigService to call oemrilhook api" into sc-dev am: 707d297dd8
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14232872
Change-Id: Ib1614e1d5e69520186828521821070738e035be6
2021-04-23 18:04:35 +00:00
TreeHugger Robot
707d297dd8
Merge "allow RilConfigService to call oemrilhook api" into sc-dev
2021-04-23 17:48:32 +00:00
TreeHugger Robot
c56a543145
Merge "Mark GS101 camera HAL as using Binder." into sc-dev am: 16730f3087
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14285352
Change-Id: Ib4d077f259a95fbcdedbd55ad39a91039d702e11
2021-04-23 01:17:47 +00:00
TreeHugger Robot
16730f3087
Merge "Mark GS101 camera HAL as using Binder." into sc-dev
2021-04-23 00:52:20 +00:00
TreeHugger Robot
81385411d7
Merge "Allow access to NFC power stats" into sc-dev am: 0f87f26134
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/14268788
Change-Id: Iaa3c444692b7d7ba39c7f57e7830ff110ba82657
2021-04-22 23:59:39 +00:00
TreeHugger Robot
0f87f26134
Merge "Allow access to NFC power stats" into sc-dev
2021-04-22 23:38:44 +00:00