To addressdd the xHCI wakeup nodes permission problem, add new nodes:
/devices/platform/11210000.usb/11210000.dwc3/xhci-hcd-exynos.4.auto/wakeup
/devices/platform/11210000.usb/11210000.dwc3/xhci-hcd-exynos.4.auto/usb2
/devices/platform/11210000.usb/11210000.dwc3/xhci-hcd-exynos.4.auto/usb3
/devices/platform/11210000.usb/11210000.dwc3/xhci-hcd-exynos.5.auto/wakeup
/devices/platform/11210000.usb/11210000.dwc3/xhci-hcd-exynos.5.auto/usb2
/devices/platform/11210000.usb/11210000.dwc3/xhci-hcd-exynos.5.auto/usb3
/devices/platform/11210000.usb/wakeup
Bug: 228791172
Test: verified with forrest test build
Signed-off-by: Albert Wang <albertccwang@google.com>
Change-Id: I457e64c252ec3573ab15923898c469472fc3b9b6
Bug: 226887726
Test: do bugreport without avc denials
Change-Id: I0b57cfdddb81c1685f6a054944c064e02c099637
Signed-off-by: Darren Hsu <darrenhsu@google.com>
Bug: 227531769
Test: do bugreport without avc denials
Change-Id: Ie3efd407ff629b583e37c0b5af430c9a9daf8691
Signed-off-by: Darren Hsu <darrenhsu@google.com>
Bug: 223537397
Test: Ensure that there are no selinux errors for charger_vendor in
off-mode charging
Change-Id: I9074079a7ba67813da6b6ad7b110d964b9b7db6d
Test: Ensure that there are no sepolicy errors when
/data/vendor/powerstats/odpm_config exists
Bug: 228112997
Change-Id: I094c29c4d1a82bccfabde7a5511f4aa833c2cd35
dont audit since it's debugfs
Bug: 228181404
Test: forrest with boot test
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: I77a385b73b5a9edafefa8e7d34a351594cd5cd06
paths are changed when we enable parallel module loading and
reorder the initializtaion of devices.
Test: without avc denial
Bug: 227541760
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: Icd74392e0684ac5614a83d14b936be880148f919
Two new sysfs nodes were added to sysfs_display type and permission to
access sysfs_display nodes was added for the dumpstate service. This
allows display information to be captured during bug report generation.
Bug: 225376485
Test: Manual - ran 'adb bugreport'
Change-Id: Ib121b0b21aa326e791e67c5bd24b3e70979a554c
Vendor IMS Service read a SystemProperty starts with
persist.vendor.ims prefix, but it does not have a permission to
access it.
This change create a permission to access the SystemProperties start
with 'persist.vendor.ims.' prefix from vendor ims service.
Bug: 204714230
Test: Test results in b/225430461#comment40 enabling the property
Signed-off-by: Taesoon Park <ts89.park@samsung.com>
Change-Id: Ied50f377a3069eac65836ea999dfe021f4e4ed5d
Modify name from sysfs_vendor_sched to proc_vendor_sched
Test: without avc denial
Bug: 216207007
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: Ieb829e96ac1db2a1aa28fc416182450d128cac5c
pixelstats get this sysprop hit the avc denied
persist.device_config.storage_native_boot.smart_idle_maint_enabled
pixelstats-vend: type=1400 audit(0.0:22): avc: denied { read }
for name="u:object_r:device_config_storage_native_boot_prop:s0"
dev="tmpfs" ino=171 scontext=u:r:pixelstats_vendor:s0
tcontext=u:object_r:device_config_storage_native_boot_prop:s0
tclass=file permissive=0
Bug: 215443809
Test: local build and run pixelstats
Signed-off-by: Ocean Chen <oceanchen@google.com>
Change-Id: Iedb4fa00c5e18cda6c799c3461bf8298bcf357eb
Fix the following avc denial:
avc: denied { read } for name="panel_name" dev="sysfs" ino=71133 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=0
Bug: 223687187
Test: build and test fingerprint on device.
Change-Id: Ief1ccc7e2fa6b8b4dc1ecbd6d446cc49ee3936ce
Provide necessary sepolicy for dumpreport to access page_pinner
information in /sys/kernel/debug/page_pinner/{longterm_pinner,
alloc_contig_failed}
Bug: 226956571
Test: Run "adb bugreport <zip>" and verify it contains the output
from page_pinner.
Signed-off-by: Minchan Kim <minchan@google.com>
Change-Id: I7b00d4930fbaa2061537cd8c84616c1053c829cf
Label with boot_block_device to allow further operations on
vendor_kernel_boot including OTA updating.
This is required for update_engine to be able to write to
vendor_kernel_boot on builds that are enforcing sepolicy.
Bug: 214409109
Signed-off-by: Lucas Wei <lucaswei@google.com>
Change-Id: If239690ee168ecfd5c5b755451e389a4523c79b8
The function is disabled.
Bug: 221384939
Test: adb bugreport
Change-Id: If8e8b8165329eb9ede86cb62f419a8cf06abb536
Signed-off-by: Ted Lin <tedlin@google.com>
Modify name from sysfs_vendor_sched to proc_vendor_sched
Test: without avc denial
Bug: 216207007
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: I96dc6eb76dd533ff6fd54c27be7e4bc32bf5dbc7