millerliang
68e9f1eda3
Fix AAudio avc denied am: 801b87fe71
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17052084
Change-Id: If2469a66fe436e6183912d7a43a005f4900accdf
2022-03-04 06:19:06 +00:00
Adam Shih
32040ce078
grant bugreport access to camera debug system property am: 1616b97465
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17071447
Change-Id: Ie1362e9f46201122818b21355022368d3d383799
2022-03-04 06:18:39 +00:00
millerliang
801b87fe71
Fix AAudio avc denied
...
I auditd : type=1400 audit(0.0:35): avc:
denied { map } for comm="binder:896_4" path="/dev/snd/pcmC0D0p"
dev="tmpfs" ino=1138 scontext=u:r:audioserver:s0
tcontext=u:object_r:audio_device:s0 tclass=chr_file permissive=0
E SELinux : avc: denied { find } for pid=887 uid=1041 name=audio
scontext=u:r:audioserver:s0 tcontext=u:object_r:audio_service:s0
tclass=service_manager permissive=0
Bug: 222191260
Test: Flash TH ROM and test it by the following command
Test: test_steal_exclusive -c0
Signed-off-by: millerliang <millerliang@google.com>
Change-Id: I8ea6741f3682b568de089d040d511b68938374ab
2022-03-04 06:14:55 +00:00
Adam Shih
1616b97465
grant bugreport access to camera debug system property
...
Bug: 221384770
Test: do bugreport without seeing relevant error
Change-Id: Ie27ac5f2c6e13ec31ccec2adb11762dacab1fbdf
2022-03-04 05:58:20 +00:00
Jack Yu
0a4921d8ea
Allow platform_app to access Nfc service am: 450f61d51b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17049976
Change-Id: I444b7cd68f067ad4490f975884d05bd7fab81189
2022-03-04 03:11:59 +00:00
Jack Yu
450f61d51b
Allow platform_app to access Nfc service
...
Fix selinux denial below.
avc: denied { find } for pid=11183 uid=10224 name=nfc
scontext=u:r:platform_app:s0:c512,c768
tcontext=u:object_r:nfc_service:s0 tclass=service_manager
permissive=0
Bug: 222387662
Test: build pass
Change-Id: If97d8141acab23b4e13ea65ce28589195ef7ad9e
2022-03-04 02:46:29 +00:00
Jinting Lin
b95ad92096
Allow modem diagnostic app to access default prop am: c3612c7097
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17072663
Change-Id: Iba2f39b55334d40dc8339433b0b955dc29f1be80
2022-03-04 01:54:47 +00:00
Jinting Lin
c3612c7097
Allow modem diagnostic app to access default prop
...
log:
avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=154 scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 app=com.google.mds
Bug: 222509956
Change-Id: I50302b38f074e3f1a078ee48896154353e0937b6
2022-03-04 01:35:39 +00:00
Devin Moore
6ce3b8a590
Add the init_boot partition sepolicy am: ac44b340d3
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17070163
Change-Id: If8db325971ac8ecd1d3ae318ab942df98bc847d8
2022-03-03 20:30:36 +00:00
Devin Moore
ac44b340d3
Add the init_boot partition sepolicy
...
Tagging the partition as a boot_block_device so everything that had
permission to read/write to the boot partition now also has permissions
for this new init_boot partition.
This is required for update_engine to be able to write to init_boot on
builds that are enforcing sepolicy.
Bug: 222052598
Test: adb shell setenforce 1 && update_device.py ota.zip
Merged-In: Ic991fa314c8a6fdb848199a626852a68a57d1df5
Change-Id: Ic991fa314c8a6fdb848199a626852a68a57d1df5
2022-03-03 20:01:09 +00:00
Robb Glasser
3bd74d90b2
Add hal_graphics_composer_default to sensors sepolicy. am: 990294708f
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17051308
Change-Id: I692867ec79753dbd0c4f3909d26549d51c5e8f7d
2022-03-03 19:11:41 +00:00
Robb Glasser
990294708f
Add hal_graphics_composer_default to sensors sepolicy.
...
Bug: 221396170
Test: No avc denial.
Change-Id: I23299524dec50d8c589c6acc9da8b3c8c3399f97
2022-03-03 18:42:58 +00:00
Nishok Kumar S
dd3de4d24e
Allow camera HAL and GCA to access Aurora GXP device. am: e95f5edafe
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17035623
Change-Id: If5cbce0c7a2489272853813e915a58560e1cfe86
2022-03-03 04:30:16 +00:00
Nishok Kumar S
e95f5edafe
Allow camera HAL and GCA to access Aurora GXP device.
...
The camera HAL and Google Camera App
need selinux permission to run workloads on Aurora DSP. This
change adds the selinux rules too allow these clients to
access the GXP device and load firmware onto DSP cores
in order to execute workloads on DSP.
Bug: 220086991
Test: Verified that the camera HAL service and GCA app is able to access the GXP device and load GXP firmware.
Change-Id: I1bd327cfbe5b37c88154acda54bf6c396e939289
2022-03-03 04:02:33 +00:00
Robert Lee
fd043e784a
Fix selinux error for aocd am: 129ef29bc8
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17050631
Change-Id: I12907f22900800c745b69d263208dae82f0b4d4d
2022-03-03 02:52:11 +00:00
Robert Lee
129ef29bc8
Fix selinux error for aocd
...
allow write permission to fix following error
auditd : type=1400 audit(0.0:4): avc: denied { write } for comm="aocd" name="aoc" dev="tmpfs" ino=497 scontext=u:r:aocd:s0 tcontext=u:object_r:aoc_device:s0 tclass=chr_file permissive=0
Bug: 198490099
Test: no avc deny when enable no_ap_restart
Change-Id: I06dc99f1a5859589b33f89ce435745d15e2e5749
Signed-off-by: Robert Lee <lerobert@google.com>
2022-03-03 02:22:53 +00:00
Siddharth Kapoor
dbefffd54b
Add libgpudataproducer as sphal am: 2d43200489
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17052905
Change-Id: I92c4b3a7dee9578980ca4850e744921782ea16f8
2022-03-03 01:24:36 +00:00
Jinting Lin
b0cb6083a9
Fix avc denied for slsi engineermode app am: 94d7f6cce6
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17041066
Change-Id: I300f01cc8f98c7b740f327ef655dfcd5648b13ca
2022-03-03 01:24:31 +00:00
Siddharth Kapoor
2d43200489
Add libgpudataproducer as sphal
...
Bug: 222042714
Test: CtsGpuProfilingDataTestCases passes on User build
Signed-off-by: Siddharth Kapoor <ksiddharth@google.com>
Change-Id: I1997f3e66327486f15b1aa742aa8e82855b07e05
2022-03-03 01:08:52 +00:00
Jinting Lin
94d7f6cce6
Fix avc denied for slsi engineermode app
...
log:
avc: denied { find } for interface=vendor.samsung_slsi.telephony.hardware.radioExternal::IOemSlsiRadioExternal sid=u:r:platform_app:s0:c512,c768 pid=5111 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:hal_exynos_rild_hwservice:s0 tclass=hwservice_manager permissive=0
avc: denied { call } for comm="si.engineermode" scontext=u:r:platform_app:s0:c512,c768 tcontext=u:r:rild:s0 tclass=binder permissive=0 app=com.samsung.slsi.engineermode
avc: denied { call } for comm="HwBinder:1016_1" scontext=u:r:rild:s0 tcontext=u:r:platform_app:s0:c512,c768 tclass=binder permissive=0
avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=154 scontext=u:r:vendor_engineermode_app:s0:c225,c256,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 app=com.samsung.slsi.engineermode
Test: side load the trail build sepolicy, then check the app
Bug: 221482792
Change-Id: I84768ed128a2b8c57d6a3e0a0f0aa8c4d4b91857
2022-03-03 01:01:08 +00:00
sukiliu
d0afc4ccf5
update error on ROM 8223177 am: b1c5fcff3d
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17005595
Change-Id: I43a4d7d92ba5bb868d0e9167afbb5af5dac852c9
2022-03-02 06:49:10 +00:00
sukiliu
b1c5fcff3d
update error on ROM 8223177
...
Bug: 221384981
Bug: 221384939
Bug: 221384996
Bug: 221384768
Bug: 221384770
Bug: 221384860
Test: PtsSELinuxTestCases
Change-Id: I50916dca7548bce0e77d90a36ad8f9ba1ca7c711
2022-03-02 06:30:05 +00:00
Roshan Pius
a492dff7cc
gs-sepolicy: Fix legacy UWB stack sepolicy rules am: a1f0d2aa9a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17045928
Change-Id: I4e5377239bc0ebddb388ae4de486e2e87ccea0d1
2022-03-01 18:52:42 +00:00
Roshan Pius
a1f0d2aa9a
gs-sepolicy: Fix legacy UWB stack sepolicy rules
...
This rule was present on previous devices.
Denial logs:
02-24 09:22:08.214 427 427 E SELinux : avc: denied { find } for
pid=1479 uid=1000 name=uwb_vendor scontext=u:r:system_server:s0
tcontext=u:object_r:uwb_vendor_service:s0 tclass=service_manager permissive=0
Bug: 221292100
Test: Compiles
Change-Id: I6de4000a9cebf46a0d94032aade7b2d40b94ca16
2022-03-01 18:25:00 +00:00
Tommy Chiu
c94ef875af
RKP: Add IRemotelyProvisionedComponent service am: b7790aa7a8
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17034406
Change-Id: I19740f1d8d82c0ff1227709aa639bd8c2b0938db
2022-03-01 06:39:43 +00:00
Tommy Chiu
b7790aa7a8
RKP: Add IRemotelyProvisionedComponent service
...
Bug: 212643050
Bug: 221503025
Change-Id: I7932ba96d0d7dd603d360cd7319997a7c108500a
2022-03-01 06:10:23 +00:00
Badhri Jagan Sridharan
b68d5b153c
android.hardware.usb.IUsb AIDL migration am: fc08341bd6
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17009127
Change-Id: Ib469d2785c355195621edc4a509f3db07d11ea54
2022-03-01 03:55:10 +00:00
Badhri Jagan Sridharan
fc08341bd6
android.hardware.usb.IUsb AIDL migration
...
Cherry-pick of <775523d1eb
>
android.hardware.usb.IUsb is migrated to AIDL and runs in
its own process. android.hardware.usb.gadget.IUsbGadget
is now published in its own exclusive process
(android.hardware.usb.gadget-service). Creating
file_context and moving the selinux linux rules
for IUsbGadget implementation.
[ 37.177042] type=1400 audit(1645536157.528:3): avc: denied { wake_alarm } for comm="android.hardwar" capability=35 scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_usb_impl:s0 tclass=capability2 permissive=1
[ 37.177139] type=1400 audit(1645536157.528:4): avc: denied { block_suspend } for comm="android.hardwar" capability=36 scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_usb_impl:s0 tclass=capability2 permissive=1
[ 39.936357] type=1400 audit(1645536160.292:5): avc: denied { call } for comm="HwBinder:875_1" scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1
[ 39.936403] type=1400 audit(1645536160.292:6): avc: denied { transfer } for comm="HwBinder:875_1" scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1
...
[ 42.845054] type=1400 audit(1645550991.268:8): avc: denied { read } for comm="HwBinder:860_1" name="u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 42.877781] type=1400 audit(1645550991.268:9): avc: denied { open } for comm="HwBinder:860_1" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 42.915532] type=1400 audit(1645550991.268:10): avc: denied { getattr } for comm="HwBinder:860_1" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 42.962130] type=1400 audit(1645550991.268:11): avc: denied { map } for comm="HwBinder:860_1" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 43.003097] type=1400 audit(1645550991.268:12): avc: denied { watch watch_reads } for comm="HwBinder:860_1" path="/dev/usb-ffs/adb" dev="functionfs" ino=40814 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:functionfs:s0 tclass=dir permissive=1
[ 43.024529] type=1400 audit(1645550991.268:13): avc: denied { write } for comm="HwBinder:860_1" name="property_service" dev="tmpfs" ino=376 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=1
[ 43.057605] type=1400 audit(1645550991.268:14): avc: denied { connectto } for comm="HwBinder:860_1" path="/dev/socket/property_service" scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1
[ 43.084549] type=1107 audit(1645550991.268:15): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.usb.dwc3_irq pid=860 uid=0 gid=0 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=property_service permissive=1'
Bug: 200993386
Change-Id: Ia8c24610244856490c8271433710afb57d3da157
Merged-In: Ia8c24610244856490c8271433710afb57d3da157
2022-03-01 03:32:23 +00:00
YiHo Cheng
3a13f5708b
thermal: Label tmu register dump sysfs am: be92764669
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17005600
Change-Id: I3b54fe773cedef0087cd9f3733b23b0dcdeb1da9
2022-03-01 01:50:45 +00:00
YiHo Cheng
be92764669
thermal: Label tmu register dump sysfs
...
Allow dumpstate to access tmu register dump sysfs
[ 174.114566] type=1400 audit(1645790696.920:13): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_reg_dump_state" dev="sysfs"
ino=65178
scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs:s0
tclass=file permissive=0
[ 174.115092] type=1400 audit(1645790696.920:14): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_reg_dump_current_temp" dev="sysfs"
in
o=65179 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 174.115208] type=1400 audit(1645790696.920:15): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_top_reg_dump_rise_thres"
dev="sysfs"
ino=65180 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 174.115398] type=1400 audit(1645790696.920:16): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_top_reg_dump_fall_thres"
dev="sysfs"
ino=65182 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 174.115498] type=1400 audit(1645790696.920:17): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_sub_reg_dump_rise_thres"
dev="sysfs"
ino=65181 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
Bug: 215040856
Test: check tmu register dump sysfs output in dumpstate
Change-Id: Ica48e37344a69264d4b4367af7856ec20b566a9e
2022-03-01 01:24:00 +00:00
Yu-Chi Cheng
e398726310
Allowed GCA to access EdgeTPU for P22 devices. am: 172271fdbc
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17016803
Change-Id: I75df18545ece29becfff7c4eb1624c07c12eefd7
2022-02-26 00:01:27 +00:00
Yu-Chi Cheng
172271fdbc
Allowed GCA to access EdgeTPU for P22 devices.
...
This change includes the google_camera_app domain
into the EdgeTPU selinux rules. With it the GCA
is now able to access EdgeTPU.
Bug: 221020793
Test: verified GCA to work on P22.
Change-Id: I69010e2a8cca1429df402ae587b939d38e20a287
2022-02-25 23:36:01 +00:00
Jinting Lin
45fcc5f934
Fix avc denied for vendor silent logging app am: e44f3c867c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16986448
Change-Id: I4a4019c4c847dbfabf4bcc985b7dba56591dc6e9
2022-02-25 06:05:41 +00:00
Jinting Lin
e44f3c867c
Fix avc denied for vendor silent logging app
...
log:
avc: denied { getattr } for comm="y.silentlogging" path="/data/user/0/com.samsung.slsi.telephony.silentlogging" dev="dm-42" ino=6793 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
avc: denied { search } for comm="y.silentlogging" name="com.samsung.slsi.telephony.silentlogging" dev="dm-42" ino=6793 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
denied { read } for comm="y.silentlogging" name="u:object_r:vendor_slog_prop:s0" dev="tmpfs" ino=338 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_slog_prop:s0 tclass=file permissive=0
avc: denied { search } for comm="y.silentlogging" name="slog" dev="dm-42" ino=314 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=0
avc: denied { read } for comm="y.silentlogging" name="u:object_r:default_prop:s0" dev="tmpfs" ino=150 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
avc: denied { find } for interface=vendor.samsung_slsi.telephony.hardware.oemservice::IOemService sid=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 pid=7322 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:hal_vendor_oem_hwservice:s0 tclass=hwservice_manager permissive=0
avc: denied { call } for comm="y.silentlogging" scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:r:dmd:s0 tclass=binder permissive=0
avc: denied { call } for comm="y.silentlogging" scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:r:sced:s0 tclass=binder permissive=0
avc: denied { read } for comm="getenforce" name="enforce" dev="selinuxfs" ino=4 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=0
avc: denied { set } for property=persist.vendor.modem.logging.shannon_app pid=7279 uid=1000 gid=1000 scontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_modem_prop:s0 tclass=property_service permissive=0'
avc: denied { call } for comm="HwBinder:1001_1" scontext=u:r:sced:s0 tcontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tclass=binder permissive=0
avc: denied { call } for scontext=u:r:dmd:s0 tcontext=u:r:vendor_telephony_silentlogging_app:s0:c232,c259,c512,c768 tclass=binder permissive=0
avc: denied { getattr } for comm="tlogging:remote" path="/data/user/0/com.samsung.slsi.telephony.silentlogging" dev="dm-42" ino=6793 scontext=u:r:vendor_silentlogging_remote_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0
avc: denied { read } for name="slog" dev="dm-42" ino=314 scontext=u:r:vendor_silentlogging_remote_app:s0:c232,c259,c512,c768 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=0
Test: flash TH build then run basic test of silent logging app
Bug: 220847487
Change-Id: Ib5ac1e796e8e816d024cebc584b5699ab8ed1162
2022-02-25 05:35:06 +00:00
SalmaxChang
711eb4d39e
Add missing vendor_logger_prop rule am: 7cb9cc182b
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16996081
Change-Id: If4364de5ee9fd24dcdbbd881550596456907f4eb
2022-02-24 13:06:15 +00:00
SalmaxChang
7cb9cc182b
Add missing vendor_logger_prop rule
...
init : Do not have permissions to set 'persist.vendor.verbose_logging_enabled' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
Bug: 221173724
Bug: 221154649
Change-Id: Ic35e6f1d40f15efefead4530f8d320b72d7366e4
2022-02-24 07:45:39 +00:00
Zachary Iqbal
0dca35958b
Give gralloc access to the faceauth_heap_device. am: 4bbc6969e5
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16995763
Change-Id: I68667c239af8739e332082286f6004bacc0f328d
2022-02-24 05:45:18 +00:00
Zachary Iqbal
4bbc6969e5
Give gralloc access to the faceauth_heap_device.
...
Notes:
- This is required for face authentication.
Fixes: 221098313
Test: Built locally.
Change-Id: I6292c76c0809f091108ac73bef2d9e2db430a680
2022-02-24 05:20:30 +00:00
Alex Hong
1ca456915b
Remove the sepolicy for tetheroffload service am: 4443c79bbb
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16972946
Change-Id: I8ef64c6cfeb59e985cdff44fc31bd8d7f20a62d7
2022-02-24 04:13:56 +00:00
Alex Hong
4443c79bbb
Remove the sepolicy for tetheroffload service
...
Test: m checkvintf
run vts -m VtsHalTetheroffloadControlV1_0TargetTest
Bug: 207076973
Bug: 214494717
Change-Id: I5ecec46512ff4e1ae6c52147cfa0179e5fc93420
Merged-In: I5ecec46512ff4e1ae6c52147cfa0179e5fc93420
2022-02-24 04:03:32 +00:00
Joseph Jang
5523e01f2c
identity: Add sepolicy permission for hal_identity_citadel to find hal_remotelyprovisionedcomponent_service am: 5fb066e143
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16984428
Change-Id: I7e43e5ece9d6f552a69905ceeb271a6e0d319a5e
2022-02-24 02:52:40 +00:00
Joseph Jang
5fb066e143
identity: Add sepolicy permission for hal_identity_citadel to find hal_remotelyprovisionedcomponent_service
...
log:
SELinux : avc: denied { find } for pid=885 uid=9999
name=android.hardware.security.keymint.IRemotelyProvisionedComponent/strongbox
scontext=u:r:hal_identity_citadel:s0
tcontext=u:object_r:hal_remotelyprovisionedcomponent_service:s0
tclass=service_manager permissive=0
Bug: 218613398
Change-Id: I124ea5898609a3f68bee13b6db931878252d4081
2022-02-24 02:20:37 +00:00
Jack Yu
769645d0c1
uwb: permissions for factory uwb calibration file am: 97a25bf259
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16986452
Change-Id: Ie1aba2e1a2bb3c9d79caa04f454df271a531a9b0
2022-02-24 01:34:13 +00:00
Darren Hsu
7306a159f7
Allow hal_power_stats to read UWB sysfs nodes am: 8f90cf5408
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16986443
Change-Id: If507662ac99de839314da9d03df7f3b7eb44bafb
2022-02-24 01:33:49 +00:00
Jinting Lin
b9b03f61f8
Adds mnt file and batt info permissions for modem app am: e6af74a6c4
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16984429
Change-Id: Ie7d2cfab67eaf4ec2477f4dbaccc056b42b9df3a
2022-02-24 01:32:56 +00:00
Jack Yu
97a25bf259
uwb: permissions for factory uwb calibration file
...
Allow nfc hal accessing /data/vendor/uwb.
Bug: 220167093
Test: build pass
Merged-In: I33093231577b71c24d5bf6f980c7021cc546fa98
Change-Id: I33093231577b71c24d5bf6f980c7021cc546fa98
2022-02-24 01:02:52 +00:00
Darren Hsu
8f90cf5408
Allow hal_power_stats to read UWB sysfs nodes
...
Bug: 219369324
Test: Dump power stats and see no avc denials
Change-Id: Ib1ac15867f51069bef3f68e91bf65b842b7c0734
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-02-24 01:02:11 +00:00
Jinting Lin
43dd982131
Adds logging related properties for logger app am: 7ba8b12bb8
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16983456
Change-Id: I4de5106dddc7252b298fd12496afae00f2464ca3
2022-02-23 17:29:05 +00:00
Krzysztof Kosiński
084defd392
Camera: re-add TEE access. am: 3884738538
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16980638
Change-Id: I6f455d8b6bb2d558ce9fbf5a1aaea66674fc43be
2022-02-23 17:24:31 +00:00
Adam Shih
79481cc1b3
avoid pixellogger from crashing am: b158d7b088
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/16983453
Change-Id: I15f04a00b6e2ac537bf565423f3b190b1869e3ab
2022-02-23 17:18:06 +00:00