Neo Yu
d5626145f3
Move sepolicy about hal_radioext_default to gs-common
...
Bug: 363665676
Test: verify with test roms
Flag: EXEMPT sepolicy refactor
Change-Id: I618742012138123329ae47c05c958e77f5573956
2024-09-01 14:25:00 +08:00
Mike Wang
4bd4705847
Merge "Add the selinux policy to allow the gril get/set vendor log properties." into main
2024-07-26 01:15:34 +00:00
mikeyuewang
27b55923fb
Add the selinux policy to allow the gril get/set vendor log properties.
...
avc logs:
2024-07-17 06:00:41.024 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:96): avc: denied { read } for name="u:object_r:vendor_logger_prop:s0" dev="tmpfs" ino=416 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_logger_prop:s0 tclass=file permissive=0 app=com.google.android.grilservice
2024-07-17 06:00:41.024 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:97): avc: denied { read } for name="u:object_r:vendor_modem_prop:s0" dev="tmpfs" ino=418 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_modem_prop:s0 tclass=file permissive=0 app=com.google.android.grilservice
2024-07-17 06:00:49.592 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:99): avc: denied { write } for name="property_service" dev="tmpfs" ino=861 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0 app=com.google.android.grilservice
2024-07-17 16:46:54.748 1-1 /system/bin/init init I type=1107 audit(0.0:103): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.verbose_logging_enabled pid=2152 uid=10238 gid=10238 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_logger_prop:s0 tclass=property_service permissive=1'
2024-07-17 16:49:33.256 1-1 /system/bin/init init I type=1107 audit(0.0:116): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.modem.extensive_logging_enabled pid=2152 uid=10238 gid=10238 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_modem_prop:s0 tclass=property_service permissive=1'
Bug: 293947661
Change-Id: I4c7076c9b948c8bf99a71445b4632dcd0bcb3b0b
2024-07-17 20:24:56 +00:00
Munikrishna
5ca93e9b6c
sepolicy: add rules for using aidl from GRIL Service
...
allow to find hal_vendor_radio_external_service
Enable AIDL for V requirement
AVC log in b/352465089#comment1
Flag: EXEMPT HAL interface change
Bug: 341750446
Test: Physical device with atest GoogleRilServiceUnitTests
Test: Physical device VoLTE,VoWiFi Call with handover verification on HIDL and AIDL.
Test: Physical device RIL crash, modem crash HIDL/AIDL VoLTE,VoWiFi verification.
Change-Id: I800a69d9fed026c340c2b3b935feac0e0eb38c1d
2024-07-17 05:54:45 +00:00
Frank Yu
3ef50e762f
Update sepolicy for all device that use radioext 1.7 interface.
...
Bug: 340791912
Test: v2/pixel-health-guard/device-boot-health-check-extra
Change-Id: Icd7b482d88f52fbde6b281ef58857bfa6a9edea8
2024-05-20 03:17:49 +00:00
Aswin Sankar
aa139f50d2
Add telephony_modemtype_prop to GRIL service
...
Bug:315993263
Test: Manual test with GRIL changes to read out
SystemProperty("telephony.ril.modem_bin_status").
Change-Id: I67303f1410e5dfb4472185210f41437be01d473b
2024-04-09 13:28:42 -07:00
Chi Zhang
8fb2332864
Allow GRIL to get IRQ counts.
...
auditd : type=1400 audit(0.0:94): avc: denied { read } for comm="TestableLooper" name="irq" dev="sysfs" ino=20470 scontext=u:r:grilservice_app:s0:c241,c256,c512,c768 tcontext=u:object_r:sysfs_irq:s0 tclass=dir permissive=0 app=com.google.android.grilservice
Bug: 322548372
Test: build and boot
Change-Id: Iffc7f49d28ccd1960e6f939375a8e42958eff8bb
2024-02-20 10:46:37 -08:00
Ted Wang
4f5d6c7812
Allow GrilService to access bluetooth extension HAL
...
Bug: 320403892
Test: Manual
Change-Id: I83834154563f9e77aaaf5ed786259a331497a378
2024-01-19 08:11:41 +00:00
Chi Zhang
62184e7953
Allow GRIL to get power stats.
...
SELinux : avc: denied { find } for pid=3147 uid=10219 name=android.hardware.power.stats.IPowerStats/default scontext=u:r:grilservice_app:s0:c219,c256,c512,c768 tcontext=u:object_r:hal_power_stats_service:s0 tclass=service_manager permissive=1
Bug: 286187143
Test: build and boot
Change-Id: I42c78a68a145c4f390e43c457a241b7c8db577bf
2023-12-19 12:22:22 -08:00
Vania Januar
dbe23f1ab5
Revert "Revert^2 commit 2c99c990d3
""
...
This reverts commit 9bd666007d
.
Reason for revert: build break b/297170337
Change-Id: I2459b680bb3153d3d7e0f17761b4a825da942bcc
2023-08-23 12:58:42 +00:00
Wilson Sung
9bd666007d
Revert^2 commit 2c99c990d3
"
...
This reverts commit 5d2c755531
.
Bug: 297129706
Change-Id: Ia8301a139559e8abf119a0964d7a06914aacf55e
2023-08-23 17:57:57 +08:00
Chiachang Wang
5d2c755531
Revert commit 2c99c990d3
...
This reverts commit 2c99c990d3
.
Reason for revert: <Build break>
Change-Id: I030b4f5c59383478355ac2cee8363f45c8101041
2023-08-23 04:16:56 +00:00
Wilson Sung
355f0df8fd
Sync zuma-sepolicy to legacy folder
...
Duplicate from zuma-sepolicy 7f3e2b9
Test: make selinux_policy
Bug: 296187211
Change-Id: If686fbdcf058849479019e8b37bb1d57a0215ed6
Signed-off-by: Wilson Sung <wilsonsung@google.com>
2023-08-22 15:37:56 +08:00
Robin Peng
30ab759177
Sync with device/google/zuma-sepolicy a89fbcc4aa1ae
...
fix build breakage:
device/google/zumapro-sepolicy/legacy/whitechapel_pro/file.te:4:ERROR 'Duplicate declaration of type' at token ';' on line 104436:
type tcpdump_vendor_data_file, file_type, data_file_type;
type updated_wifi_firmware_data_file, file_type, data_file_type;
Bug: 272725898
Change-Id: Ic17d18409c28760d172a4ee7a5beb6c90016a381
2023-05-01 10:04:38 +00:00
Robin Peng
bff99af2da
init zumapro from zuma sha 43d5907677d0f
...
Bug: 272725898
Change-Id: If35d9efdda9dd3b8d8b24008f0738a0cbbe5bd9b
2023-03-31 14:16:57 +00:00