Board tree for Google Tensor G1 devices
Find a file
Hridya Valsaraju 1711a2d5c7 Provide fastbootd permissions to invoke the set_active command
These permissions fix the following denials:
[   66.641731][   T59] audit: type=1400 audit(1619815760.952:17): avc:
denied  { open } for  pid=360 comm="fastbootd" path="/dev/block/sdd1"
dev="tmpfs" ino=416 scontext=u:r:fastbootd:s0
tcontext=u:object_r:devinfo_block_device:s0 tclass=blk_file permissive=1
[   66.664509][   T59] audit: type=1400 audit(1619815760.952:18): avc:
denied  { write } for  pid=360 comm="fastbootd" name="sdd1" dev="tmpfs"
ino=416 scontext=u:r:fastbootd:s0
tcontext=u:object_r:devinfo_block_device:s0 tclass=blk_file permissive=1
[   66.686431][   T59] audit: type=1400 audit(1619815760.952:19): avc:
denied  { read write } for  pid=360 comm="fastbootd"
name="boot_lun_enabled" dev="sysfs" ino=57569 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
[   66.708623][   T59] audit: type=1400 audit(1619815760.952:20): avc:
denied  { open } for  pid=360 comm="fastbootd"
path="/sys/devices/platform/14700000.ufs/pixel/boot_lun_enabled"
dev="sysfs" ino=57569 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sysfs_ota:s0 tclass=file permissive=1
[   56.680861][   T59] audit: type=1400 audit(1619806507.020:10): avc:
denied  { read write } for  pid=357 comm="fastbootd" name="sda"
dev="tmpfs" ino=476 scontext=u:r:fastbootd:s0
tcontext=u:object_r:sda_block_device:s0 tclass=blk_file permissive=0

Test: fastboot set_active
Bug: 185955438
Change-Id: I9339b2a5f2a00c9e1768f479fdeac2e1f27f04bc
2021-04-30 14:37:58 -07:00
ambient Stats: removed obsolete IStats HIDL sepolicies 2021-04-15 01:42:45 +00:00
display Merge "display: add sepolicy for hal_graphics_composer" into sc-dev 2021-03-16 12:05:50 +00:00
private Move slider-sepolicy into gs101-sepolicy 2021-03-06 16:15:39 +08:00
system_ext Create sepolicy for the fingerprint GHBM sysprop 2021-04-08 23:21:22 +00:00
tracking_denials Mark GS101 camera HAL as using Binder. 2021-04-22 13:50:42 -07:00
usf Add sepolicy for sensor HAL to read lhbm 2021-04-29 03:00:19 +00:00
whitechapel/vendor/google Provide fastbootd permissions to invoke the set_active command 2021-04-30 14:37:58 -07:00
gs101-sepolicy.mk Add sepolicy for wlan logger and sniffer logger 2021-04-27 19:37:28 +08:00
OWNERS Move slider-sepolicy into gs101-sepolicy 2021-03-06 16:15:39 +08:00