gilliu
22c17673b0
add hal_graphics_composer to access thermal temperature
...
type=1400 audit(0.0:77): avc: denied { search } for name="thermal"
dev="tmpfs" ino=1618 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:thermal_link_device:s0 tclass=dir permissive=0
type=1400 audit(0.0:74): avc: denied { search } for name="thermal"
dev="sysfs" ino=21594 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=0
type=1400 audit(0.0:74): avc: denied { read } for name="temp"
dev="sysfs" ino=73536 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
type=1400 audit(0.0:74): avc: denied { getattr } for
path="/sys/devices/virtual/thermal/thermal_zone12/temp" dev="sysfs"
ino=73537 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
Bug: 343141590
Test: check no avc pattern on logcat from test image
Flag: NONE add permission
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1dde3ea2ff33bdf253fbbfb609ec21eaccffeaf4 )
Cherry-pick temp_rr_regamma to 24Q3
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:c0fa5fcc6da5545982c8293c644aa1adccbc270f )
Merged-In: I87fce47644b07342d756e7594685eea0dded1926
Change-Id: I87fce47644b07342d756e7594685eea0dded1926
2024-09-20 18:35:27 +00:00
Cheng Chang
7969077e3b
gps: Move hal_gnss_pixel declaration to device folder am: 5ff76196c8
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zuma-sepolicy/+/27576137
Change-Id: Ic16f628926a47350f0e0caf7293e1cfa4521a7fe
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-12 07:27:17 +00:00
Cheng Chang
5ff76196c8
gps: Move hal_gnss_pixel declaration to device folder
...
Bug: 343280252
Test: b/343280252 compile and abtd test
Change-Id: Ief591d28aaea4223f05917d29bc896edec065613
2024-06-11 06:23:21 +00:00
chenkris
090928722e
Add sepolicy for fingerprint HAL to check NSP file
...
Fix the following avc denials:
avc: denied { search } for name="copied" dev="dm-58" ino=428
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir
avc: denied { search } for name="persist" dev="dm-58" ino=443
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:persist_file:s0 tclass=dir
avc: denied { search } for name="ss" dev="dm-58" ino=445
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:persist_ss_file:s0 tclass=dir
avc: denied { read } for name="nsp" dev="dm-58" ino=15500
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:persist_ss_file:s0 tclass=file
avc: denied { open } for path="/data/vendor/copied/persist/ss/nsp"
dev="dm-58" ino=15500
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:persist_ss_file:s0 tclass=file
Bug: 335525798
Test: Use UDFPS repair tool to update calibration files
Change-Id: Ic233a07ced8fd828c0e4b4ae1cffa93763a83b42
2024-05-29 04:39:37 +00:00
Shiyong Li
0455a656b7
Merge "Add sepolicy for power_state node" into 24D1-dev am: 7107af6af0
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zuma-sepolicy/+/27057168
Change-Id: Iebbdf2275b4d0460ac58100db1ab1b865ed63d04
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-09 05:21:38 +00:00
Shiyong Li
7107af6af0
Merge "Add sepolicy for power_state node" into 24D1-dev
2024-05-09 05:16:16 +00:00
KRIS CHEN
3cbe2de42c
Merge "Allow fingerprint to access the folder /data/vendor/fingerprint" into main
2024-05-08 08:46:30 +00:00
chenkris
4035d467ad
Allow fingerprint to access the folder /data/vendor/fingerprint
...
Fix the following avc denial:
android.hardwar: type=1400 audit(0.0:20): avc: denied { write } for name="fingerprint" dev="dm-56" ino=36703 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:vendor_data_file:s0 tclass=dir permissive=0
Bug: 267766859
Test: Tested fingerprint under enforcing mode
Change-Id: Iadd058432b7db8c20a949aeda1df5f8309663004
2024-05-08 06:48:41 +00:00
Pechetty Sravani
2bf59857da
Revert "Add necessary sepolicy for convert_modem_to_ext4"
...
Revert submission 26822004
Reason for revert: <Potential culprit for b/339099720- verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.>
Reverted changes: /q/submissionid:26822004
Change-Id: I90e3bf5ecbdf6c058c56293cfba59c628ccc7aba
2024-05-07 08:50:45 +00:00
Enzo Liao
c3c5b0fb90
Merge "Move SELinux policies of RamdumpService and SSRestartDetector to /gs-common." into 24D1-dev
2024-04-25 08:22:06 +00:00
Spade Lee
52df1a478b
pixelstats_vendor: add logbuffer_device r_file_perms
...
avc: denied { read } for name="logbuffer_maxfg_monitor" dev="tmpfs" ino=1034 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=0
Bug: 329174074
Test: no denied log, and able to read logbuffer in pixelstats_vendor
Signed-off-by: Spade Lee <spadelee@google.com>
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:3f707d13c29300fab31a1ba6a8657771ba4946a8 )
Merged-In: Ieca53f3092355c72784d4216c138cbb7cc9c7fa4
Change-Id: Ieca53f3092355c72784d4216c138cbb7cc9c7fa4
2024-04-25 06:11:20 +00:00
Kevin Ying
a78ae51ef1
Add sepolicy for power_state node
...
Bug: 329703995
Test: manual - used camera
Change-Id: I1f156fe7f10210b933f360fef771cb37ff3cbedb
Signed-off-by: Kevin Ying <kevinying@google.com>
2024-04-24 19:10:19 +00:00
Kelvin Zhang
276b386b6f
Add necessary sepolicy for convert_modem_to_ext4
...
Test: reformat data as ext4, reboot
Bug: 293313353
Change-Id: Iede84b1827166f1581d80077fe1c4d93d01a815b
2024-04-22 10:14:13 -07:00
Kelvin Zhang
c1341de4c3
Add necessary sepolicy for ro.vendor.persist.status
...
This prop will be set to "mounted" after /mnt/vendor/persist mounts.
Need this prop to synchronize different actions in init.rc script.
Test: th
Bug: 319335586
Change-Id: I9e8bd5e875956393d610b7def6be713565543d05
2024-04-22 10:14:12 -07:00
Enzo Liao
7c420c0703
Move SELinux policies of RamdumpService and SSRestartDetector to /gs-common.
...
New paths (ag/26620507):
RamdumpService: device/google/gs-common/ramdump_app
SSRestartDetector: device/google/gs-common/ssr_detector_app
Bug: 298102808
Design: go/sys-software-logging
Test: Manual
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:df85139d173644b7ec44cb7151845026872a1648 )
Merged-In: Id42c4de6c29d4a95f8a68a5732c4732edfb71da8
Change-Id: Id42c4de6c29d4a95f8a68a5732c4732edfb71da8
2024-04-22 03:02:53 +00:00
Martin Liu
e028d802db
move common MM policy to gs common folder
...
Bug: 332916849
Bug: 309409009
Test: boot
Change-Id: I05803943752f7b021c9d4f97b475b493f6ceadcb
Signed-off-by: Martin Liu <liumartin@google.com>
2024-04-18 01:59:46 +00:00
Krzysztof Kosiński
d4f04d19cc
Remove rlsservice sepolicy. am: 41c22587a2
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zuma-sepolicy/+/26948256
Change-Id: I60d0c43786dc869f9d69ce7c95e2199652efda3a
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-04-15 21:58:31 +00:00
Krzysztof Kosiński
41c22587a2
Remove rlsservice sepolicy.
...
rlsservice is not included on zuma and later, only gs101/gs201.
Relevant code search link:
https://source.corp.google.com/h/googleplex-android/platform/superproject/main/+/main:vendor/google/services/LyricCameraHAL/src/apex/Android.bp;l=26;drc=e4b49a6d945df6d5210c35251de8046b162d799d
Bug: 278627483
Test: presubmit
Change-Id: I15398ddeea8c0a10920c987e55789ba4a8322774
2024-04-12 22:03:22 +00:00
Treehugger Robot
32ce8f9878
Merge "allow vendor init to access compaction_proactiveness" into main
2024-04-12 15:03:00 +00:00
Martin Liu
fb44539d8d
allow vendor init to access compaction_proactiveness
...
Bug: 332916849
Test: boot
Change-Id: If1930fe0f174f2794296ded69d29420f2e59f6c2
Signed-off-by: Martin Liu <liumartin@google.com>
2024-04-10 23:34:49 +00:00
Enzo Liao
df85139d17
Move SELinux policies of RamdumpService and SSRestartDetector to /gs-common.
...
New paths (ag/26620507):
RamdumpService: device/google/gs-common/ramdump_app
SSRestartDetector: device/google/gs-common/ssr_detector_app
Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Change-Id: Id42c4de6c29d4a95f8a68a5732c4732edfb71da8
2024-04-08 19:21:13 +08:00
Treehugger Robot
0a3562a15c
Merge "display: low-light blocking zone support" into 24D1-dev
2024-04-04 02:46:42 +00:00
cweichun
495b0120ea
display: low-light blocking zone support
...
Bug: 315876417
Test: verify the functionality works
Change-Id: Id8972d4c9057aa76f72dd32d47a5d07c0822645b
2024-04-02 15:25:43 +00:00
Spade Lee
0ac2d9f7bc
sepolicy: allow kernel to search vendor debugfs
...
audit: type=1400 audit(1710259012.824:4): avc: denied { search } for pid=128 comm="kworker/3:1" name="max77779fg" dev="debugfs" ino=24204 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_maxfg_debugfs:s0 tclass=dir permissive=0
audit: type=1400 audit(1710427790.680:2): avc: denied { search } for pid=10 comm="kworker/u16:1" name="gvotables" dev="debugfs" ino=10582 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_votable_debugfs:s0 tclass=dir permissive=1
audit: type=1400 audit(1710427790.680:3): avc: denied { search } for pid=211 comm="kworker/u16:4" name="google_charger" dev="debugfs" ino=16673 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_charger_debugfs:s0 tclass=dir permissive=1
Bug: 328016570
Bug: 329317898
Test: check all debugfs folders are correctly mounted
Change-Id: I0e0c2fee4d508cc4e76714df0efbe5eca7ca5966
Signed-off-by: Spade Lee <spadelee@google.com>
2024-04-02 07:35:39 +00:00
Treehugger Robot
2a01ceedb9
Merge "display: low-light blocking zone support" into main
2024-04-02 04:21:29 +00:00
cweichun
e9c8f2af69
display: low-light blocking zone support
...
Bug: 315876417
Test: verify the functionality works
Change-Id: Id8972d4c9057aa76f72dd32d47a5d07c0822645b
2024-04-01 22:31:48 +00:00
Albert Wang
c24ead7ce9
usb: correct the xhci wakeup path
...
Error log:
Error opening kernel wakelock stats for: wakeup177 (...xhci-hcd-exynos.5.auto/usb1/1-1/wakeup/wakeup177): Permission denied
bug: 311087938
Test: boot to home and host mode works well
Change-Id: I8bdd38499dec3852ba33510f40e58cebd3a4560f
2024-03-27 10:26:45 +00:00
Spade Lee
dbc39c622b
Merge "pixelstats_vendor: add logbuffer_device r_file_perms" into main
2024-03-22 07:30:31 +00:00
Spade Lee
6ad6fb5edb
sepolicy: allow kernel to search vendor debugfs
...
audit: type=1400 audit(1710259012.824:4): avc: denied { search } for pid=128 comm="kworker/3:1" name="max77779fg" dev="debugfs" ino=24204 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_maxfg_debugfs:s0 tclass=dir permissive=0
audit: type=1400 audit(1710427790.680:2): avc: denied { search } for pid=10 comm="kworker/u16:1" name="gvotables" dev="debugfs" ino=10582 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_votable_debugfs:s0 tclass=dir permissive=1
audit: type=1400 audit(1710427790.680:3): avc: denied { search } for pid=211 comm="kworker/u16:4" name="google_charger" dev="debugfs" ino=16673 scontext=u:r:kernel:s0 tcontext=u:object_r:vendor_charger_debugfs:s0 tclass=dir permissive=1
Bug: 328016570
Bug: 329317898
Test: check all debugfs folders are correctly mounted
Change-Id: I0e0c2fee4d508cc4e76714df0efbe5eca7ca5966
Signed-off-by: Spade Lee <spadelee@google.com>
2024-03-20 18:16:41 +00:00
Spade Lee
3f707d13c2
pixelstats_vendor: add logbuffer_device r_file_perms
...
avc: denied { read } for name="logbuffer_maxfg_monitor" dev="tmpfs" ino=1034 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:logbuffer_device:s0 tclass=chr_file permissive=0
Bug: 329174074
Test: no denied log, and able to read logbuffer in pixelstats_vendor
Change-Id: Ieca53f3092355c72784d4216c138cbb7cc9c7fa4
Signed-off-by: Spade Lee <spadelee@google.com>
2024-03-14 03:31:14 +00:00
John Chang
28e6526f84
display: change vrr.enabled to xrr.version
...
Bug: 328001545
Test: Test MRR Version 2 is properly configured
Change-Id: Ide6493d77a6047023f20fbd9c5723a36033e3691
2024-03-07 22:19:51 +00:00
John Chang
7baab4b7e7
display: change vrr.enabled to xrr.version
...
Bug: 328001545
Test: Test MRR Version 2 is properly configured
Change-Id: Ide6493d77a6047023f20fbd9c5723a36033e3691
2024-03-06 16:13:39 +00:00
Treehugger Robot
10dcc53e99
Merge "Add AIDL media.c2 into service_contexts" into main
2024-03-05 06:17:02 +00:00
Sungtak Lee
84531ff361
Add AIDL media.c2 into service_contexts
...
Bug: 321808716
Change-Id: I7c79bc46112b8330c6d2a62db030ecc13d1cece4
2024-02-27 18:05:41 +00:00
Treehugger Robot
48a81fa140
Merge "add dsim wakeup labels" into main
2024-02-27 13:14:49 +00:00
Peter Lin
161bbcd1e6
add dsim wakeup labels
...
Bug: 320693841
Bug: 321733124
test: ls sys/devices/platform/19440000.drmdsim/19440000.drmdsim.0/wakeup -Z
Change-Id: Ie99007455ef3879c8ee0aa1fa20801e4baf5e978
2024-02-17 08:11:13 +00:00
Will McVicker
1d8864cdee
Update tcpm i2c sepolicy with new device name
...
The new names fix uninformative kernel wakelock names.
Bug: 315190967
Bug: 323447554
Change-Id: I5e0a4e13484c9886be398782e580313892987e2f
2024-02-16 15:15:55 -08:00
Weizhung Ding
15fda1a501
Add HWC permission to access IStats AIDL
...
avc: denied { call } for scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:r:system_server:s0 tclass=binder permissive=0
Bug: 266898132
Test: Build and check log
Change-Id: I7e5ec165df0d397250b09f5981c1f45aea27bd4c
2024-02-10 02:18:16 +00:00
Treehugger Robot
4e66878b19
Merge "[displayport-stats] add sysfs access permission on Zuma devices." into main
2024-02-09 09:17:34 +00:00
Roy Luo
6c5b44f1bb
hal_usb_impl: Grant read permission to usb overheat files
...
Carried over from WHI PRO setting.
Bug: 307583011
Test: no audit logs
Change-Id: I45bb396f2597a4a8c150ad2975ecfa427d44f2a9
2024-02-07 05:18:41 +00:00
Hongbo Zeng
cfe12763f2
Allow con_monitor_app to read/write the folder /data/vendor/radio
...
Bug: 322266425
Test: after apply the patch, we can see the adum_log/adum_log_old files
are included in dumpstate_board.bin successfully without denial
Change-Id: Ic488a84a1942fbc424b08aa0cbd4d526014152cd
2024-02-02 15:42:31 +00:00
Kyle Tso
98972beada
Allow dump_power to read sysfs directories
...
dump_power needs to read the directories under /sys/class/power_supply.
Bug: 320613177
Bug: 322294676
Change-Id: I7bc55b90d67a1d05bb097955ed632d62535e0f40
Signed-off-by: Kyle Tso <kyletso@google.com>
2024-01-31 07:01:55 +00:00
Daniel Chapin
6a6f65b5e5
Merge "Revert "Allow dump_power to read directories under "/sys/class/p..."" into main
2024-01-25 22:59:25 +00:00
Daniel Chapin
a5df4f07bf
Revert "Allow dump_power to read directories under "/sys/class/p..."
...
Revert submission 25915320-320613177
Reason for revert: Droidfood blocking bug: 322294676
Reverted changes: /q/submissionid:25915320-320613177
Change-Id: I5545dcd73cdce5ae029444c313bf5dc3f642a5c0
2024-01-25 21:44:18 +00:00
Treehugger Robot
ab46db5fef
Merge "Add capacity_headroom
to gpu sysfs" into main
2024-01-24 23:30:45 +00:00
Sean Callanan
d7decd5eee
Add capacity_headroom
to gpu sysfs
...
This allows userspace (notably the power HAL) to apply a boost to GPU
frequency independent of previously measured load.
Bug: 290625326
Test: boot, run modified Power HAL
Change-Id: Ia71266ee751a36a960706ac8aacc7fdefdf8a0f0
2024-01-24 21:46:23 +00:00
Weizhung Ding
3d156c0ad6
[displayport-stats] add sysfs access permission on Zuma devices.
...
Bug: 266898132
Test: Build
Change-Id: I4c5bd4729f837c843668c447abbbe4c34beb3fce
2024-01-24 08:28:40 +00:00
Kyle Tso
4e48a45727
Allow dump_power to read directories under "/sys/class/power_supply"
...
Bug: 320613177
Change-Id: I1a39ddb5fbbf4c62fa5b96e3562b34f2f2091c13
Signed-off-by: Kyle Tso <kyletso@google.com>
2024-01-22 08:52:59 +00:00
Angela Wu
0d32d1c172
Change the type of hw_jpg_device for selinux policy so that the GCA release flavor could access hw_jpg_device
...
Bug: 320410642
Test:m
Change-Id: If77a097b4ca823322ef41b13d6283390dac69d6c
2024-01-16 08:51:05 +00:00
Midas Chien
d6e79769c1
Allow Powerstats service to access refresh rate residency node
...
Bug: 315424658
Test: dumpsys android.hardware.power.stats.IPowerStats/default
Change-Id: I86288b4f523b4463a46d710a6556fa6852d4bea0
2024-01-12 13:01:17 +00:00