Board tree for Google Tensor G3 devices
Find a file
Mike Wang ef8937f64c Add the selinux policy to allow the gril get/set vendor log properties.
avc logs:
2024-07-17 06:00:41.024 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:96): avc: denied { read } for name="u:object_r:vendor_logger_prop:s0" dev="tmpfs" ino=416 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_logger_prop:s0 tclass=file permissive=0 app=com.google.android.grilservice
2024-07-17 06:00:41.024 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:97): avc: denied { read } for name="u:object_r:vendor_modem_prop:s0" dev="tmpfs" ino=418 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_modem_prop:s0 tclass=file permissive=0 app=com.google.android.grilservice
2024-07-17 06:00:49.592 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:99): avc: denied { write } for name="property_service" dev="tmpfs" ino=861 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0 app=com.google.android.grilservice

2024-07-17 16:46:54.748 1-1 /system/bin/init init I type=1107 audit(0.0:103): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.verbose_logging_enabled pid=2152 uid=10238 gid=10238 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_logger_prop:s0 tclass=property_service permissive=1'
2024-07-17 16:49:33.256 1-1 /system/bin/init init I type=1107 audit(0.0:116): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.modem.extensive_logging_enabled pid=2152 uid=10238 gid=10238 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_modem_prop:s0 tclass=property_service permissive=1'


Bug: 293947661
Change-Id: Iec1cc221a543543da28416a5bc7d7ddacde959c5
2024-07-17 20:23:43 +00:00
legacy Move sg_device related policy 2023-11-22 14:21:06 +08:00
private Move coredomain seapp contexts to system_ext 2023-08-08 15:11:08 +00:00
public Move coredomain seapp contexts to system_ext 2023-08-08 15:11:08 +00:00
radio Add the selinux policy to allow the gril get/set vendor log properties. 2024-07-17 20:23:43 +00:00
system_ext Allow SysUI to write protolog file 2023-12-27 11:01:12 +08:00
tracking_denials Update SELinux error 2024-01-31 02:58:43 +00:00
vendor Allow dump_power to read sysfs directories 2024-01-31 07:01:55 +00:00
widevine Branch zuma from gs201 2022-04-19 14:10:58 +08:00
OWNERS introduce a new sepolicy owner 2023-05-12 02:27:18 +00:00
zuma-sepolicy.mk Move coredomain seapp contexts to system_ext 2023-08-08 15:11:08 +00:00