Board tree for Google Tensor G3 devices
Find a file
Woody Lin 9687d162bc Add vendor_sjtag_lock_state_prop and init-check_ap_pd_auth-sh
1. Add init-check_ap_pd_auth-sh for the vendor daemon script
   `/vendor/bin/init.check_ap_pd_auth.sh`.
2. Add policy for properties `ro.vendor.sjtag_{ap,gsa}_is_unlocked` for
   init, init-check_ap_pd_auth-sh and ssr_detector to access them.

SjtagService: type=1400 audit(0.0:1005): avc:  denied  { open } for  path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=379 scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
SjtagService: type=1400 audit(0.0:1006): avc:  denied  { getattr } for  path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=379 scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
SjtagService: type=1400 audit(0.0:1007): avc:  denied  { map } for  path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=379 scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
SjtagService: type=1400 audit(0.0:1008): avc:  denied  { write } for  name="property_service" dev="tmpfs" ino=446 scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=1
SjtagService: type=1400 audit(0.0:1009): avc:  denied  { connectto } for  path="/dev/socket/property_service" scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1

Bug: 299043634
Change-Id: I6b2abf69fca9b4765f2dfb7ed82e6546159e96e9
2023-09-14 10:48:08 +08:00
legacy Allow regmap debugfs for drivers probed by insmod 2023-09-12 16:45:09 +08:00
private Move coredomain seapp contexts to system_ext 2023-08-08 21:05:21 +09:00
public Move coredomain seapp contexts to system_ext 2023-08-08 21:05:21 +09:00
radio Add vendor_sjtag_lock_state_prop and init-check_ap_pd_auth-sh 2023-09-14 10:48:08 +08:00
system_ext Move coredomain seapp contexts to system_ext 2023-08-08 21:05:21 +09:00
tracking_denials Allow regmap debugfs for drivers probed by insmod 2023-09-12 16:45:09 +08:00
vendor Allow regmap debugfs for drivers probed by insmod am: 1a65e5d5e4 am: 8cf4f20ca3 2023-09-13 00:32:10 +00:00
widevine Branch zuma from gs201 2022-04-19 14:10:58 +08:00
OWNERS introduce a new sepolicy owner 2023-05-12 02:27:18 +00:00
zuma-sepolicy.mk Move coredomain seapp contexts to system_ext 2023-08-08 21:05:21 +09:00