Wei Sheng Shih
89029142df
Merge "Revert "Add variables in google3a_config for camera tuning"" into sc-dev am: 0b19a17b11
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13824459
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Iedd6f164511a29a27edb81b67140f072e0572b01
2021-03-11 09:25:54 +00:00
labib
8f28e8ff01
Sysfs node permission for modem
...
- write display MIPI frequency
Bug: 171729515
Change-Id: I0e2a6b22d9a77ae224660b64e0ff74b693c15dfd
2021-03-11 17:21:55 +08:00
TreeHugger Robot
ef6e91692a
Merge changes I68aace66,Idf510e4a into sc-dev
...
* changes:
gs101-sepolicy: Add twoshay permissions
Add touch procfs and sysfs sepolicy
2021-03-11 09:16:51 +00:00
Wei Sheng Shih
0b19a17b11
Merge "Revert "Add variables in google3a_config for camera tuning"" into sc-dev
2021-03-11 09:02:17 +00:00
Lopy Cheng
5019452cbb
HardwareInfo: Add sepolicy for display
...
hardwareinfo: type=1400 audit(0.0:17): avc: denied { read } for name="serial_number" dev="sysfs" ino=68309 scontext=u:r:hardware_info_app:s0:c512,c768 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1 app=com.google.android.hardwareinfo
hardwareinfo: type=1400 audit(0.0:18): avc: denied { open } for path="/sys/devices/platform/1c2c0000.drmdsim/1c2c0000.drmdsim.0/serial_number" dev="sysfs" ino=68309 scontext=u:r:hardware_info_app:s0:c512,c768 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1 app=com.google.android.hardwareinfo
hardwareinfo: type=1400 audit(0.0:19): avc: denied { getattr } for path="/sys/devices/platform/1c2c0000.drmdsim/1c2c0000.drmdsim.0/serial_number" dev="sysfs" ino=68309 scontext=u:r:hardware_info_app:s0:c512,c768 tcontext=u:object_r:sysfs_display:s0 tclass=file permissive=1 app=com.google.android.hardwareinfo
Bug: 161943795
Test:
1. Remove hardwareinfo app
rm -r /data/data/com.google.android.hardwareinfo/
2. Connect wifi and reboot
3. Check the HardwareInfoService status.
4. There is no AVC denied log.
Change-Id: I4d1c83a1c5b0f2f3bdd64ab79ab45fb69470b25b
2021-03-11 08:38:43 +00:00
Wei Sheng Shih
7e76a03890
Revert "Add variables in google3a_config for camera tuning"
...
Revert "Separate project-wise tuning folders for 3A"
Revert submission 13706458-Separate target device for tuning
Reason for revert: suspect build break b/182443731
Reverted Changes:
If91bb99b8:Separate project-wise tuning folders for 3A
I605e0327a:Add variables in google3a_config for camera tuning...
Change-Id: Ia4f5a5a6162d2ebe61500b513510555326d8ebb2
2021-03-11 08:35:25 +00:00
Audrey Hung
2724fcdd65
Merge "Add variables in google3a_config for camera tuning" into sc-dev am: 3fc9518695
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13824409
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I1a4ad6968b3bc233501be7e73fcf1b955de68237
2021-03-11 08:25:42 +00:00
Audrey Hung
3fc9518695
Merge "Add variables in google3a_config for camera tuning" into sc-dev
2021-03-11 07:51:46 +00:00
yihsiangpeng
cc8429cc0d
Move wireless charger HAL to 1.3
...
Bug: 179464598
Signed-off-by: yihsiangpeng <yihsiangpeng@google.com>
Change-Id: I73d1d811f2483bbe80e7d4aea1f6e9f143bc2836
2021-03-11 14:47:49 +08:00
yihsiangpeng
a8ae2173a0
Move wireless charger HAL to 1.3
...
Bug: 179464598
Signed-off-by: yihsiangpeng <yihsiangpeng@google.com>
Change-Id: I6f2b94f6aae46cf598ae2303bb37269ba2443706
2021-03-11 14:46:50 +08:00
Edwin Tung
b197596149
gps: update gps driver 125.20.23.491687
...
Implemented A-GNSS capability in the US and Outside US.
Fix on-chip mode TTFF issue
Fix CMAS concurrency issue
Bug: 169307779
Bug: 179691042
Bug: 181001401
Bug: 171887253
Bug: 178079823
Sanity Test: 182243021
Test: build pass
Change-Id: I927095ac504cc613e506e39dfc42b3f84269f567
2021-03-11 14:39:34 +08:00
TreeHugger Robot
03b0c3af35
Merge "Don't create /data/camera on init." into sc-dev am: 6c30423a50
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13832520
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I9d3b335f7aba1b889e13d316749fe52fe8cca005
2021-03-11 06:26:07 +00:00
TreeHugger Robot
6c30423a50
Merge "Don't create /data/camera on init." into sc-dev
2021-03-11 05:59:37 +00:00
TreeHugger Robot
408372394a
Merge "display: set atc node permission" into sc-dev am: cc1bc811ac
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13782437
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I5e0d0b635a920b4315e4fe7d45950ddbac0d8da2
2021-03-11 04:54:48 +00:00
Petri Gynther
50fa2524d5
Merge "Remove extra copy of fstab.gs101" into sc-dev am: ed3354f4c6
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13819809
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Iebd78b65bb3ddc463aa9df0f1e2f6b6f6e301d0a
2021-03-11 04:54:31 +00:00
TreeHugger Robot
152dcc1b4d
Merge changes I6f6e8359,Ib7bf4029 into sc-dev am: db0ca5a3b2
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13816037
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I4817667db5897b8eac0e12f45d9d8c630128b1cb
2021-03-11 04:35:25 +00:00
TreeHugger Robot
cc1bc811ac
Merge "display: set atc node permission" into sc-dev
2021-03-11 04:15:29 +00:00
Petri Gynther
ed3354f4c6
Merge "Remove extra copy of fstab.gs101" into sc-dev
2021-03-11 04:15:03 +00:00
TreeHugger Robot
db0ca5a3b2
Merge changes I6f6e8359,Ib7bf4029 into sc-dev
...
* changes:
label kernel modules and grant bt permission
update error on ROM 7196668
2021-03-11 03:53:57 +00:00
TreeHugger Robot
f1b1d18df5
Merge "Revert "Add vendor_dlkm partition"" into sc-dev am: fd2d2ae8d2
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13820165
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Ia43a0d94a390515b34db64055fb64d762b71645b
2021-03-11 02:47:48 +00:00
Sunil Ravi
9cbd94a6f0
Merge "WiFi: Enable radio stats aggregation" into sc-dev am: 6ff80b0d18
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13817957
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I32435563f714065527731d775dfa533bd841c8b7
2021-03-11 02:47:05 +00:00
TreeHugger Robot
fd2d2ae8d2
Merge "Revert "Add vendor_dlkm partition"" into sc-dev
2021-03-11 01:51:21 +00:00
Krzysztof Kosiński
a99bd1eecf
Don't create /data/camera on init.
...
This path cannot be used by camera HAL because it would be a
Treble violation.
Bug: 181300165
Test: build, boot, camera preview on a gs101 device
Change-Id: I90f81b5c50e61c501c5f509814368189562a4256
2021-03-10 17:48:38 -08:00
Sunil Ravi
6ff80b0d18
Merge "WiFi: Enable radio stats aggregation" into sc-dev
2021-03-11 00:31:16 +00:00
Erick Reyes
e879e1d264
gs101: add edgetpu firmware package
...
Firmware is now migrated to Android.bp instead of PRODUCT_COPY_FILES
Bug: 182336890
Tested: Builds
Signed-off-by: Erick Reyes <erickreyes@google.com>
Change-Id: I1ccf6462c907fe23821c041592dc07a715d3de1c
2021-03-10 16:00:44 -08:00
Jaegeuk Kim
8842628548
fstab: enable checkpoint_merge for f2fs am: a871c2ed5f
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13824319
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Iedc32d8557249761405fc0a32ac360c4102f38e1
2021-03-10 23:13:32 +00:00
Jaegeuk Kim
a871c2ed5f
fstab: enable checkpoint_merge for f2fs
...
To improve checkpoint speed by blk-cgroup.
Bug: 171739280
Bug: 172521158
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
Change-Id: Ica6eba1e7cdbce48c948931c1153c5fa78ba6e18
2021-03-10 22:31:42 +00:00
TreeHugger Robot
b43d7004fd
Merge "gs101: use wrapped keys for storage encryption" into sc-dev am: 61da2b3d52
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13806623
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I7ed1f13a2081d8d0fc08e039a817b838d005d997
2021-03-10 19:51:07 +00:00
Sunil Ravi
faae2ecb3b
WiFi: Enable radio stats aggregation
...
set config_wifiLinkLayerRadioStatsAggregationEnabled to true
to enable radio stats aggregation logic.
Bug: 180513621
Test: atest com.android.server.wifi.WifiVendorHalTest
Change-Id: I62512c678886b16339333c423c3e738ad626c85a
2021-03-10 11:39:38 -08:00
TreeHugger Robot
61da2b3d52
Merge "gs101: use wrapped keys for storage encryption" into sc-dev
2021-03-10 19:22:49 +00:00
TreeHugger Robot
f77f159364
Merge "Fix avc denied issue when accessing to IStats service" into sc-dev am: 6657774b4c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13806168
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I64600db02c76e2bfaa3ddf03373585817d33daab
2021-03-10 17:31:10 +00:00
TreeHugger Robot
6657774b4c
Merge "Fix avc denied issue when accessing to IStats service" into sc-dev
2021-03-10 16:57:56 +00:00
TreeHugger Robot
72cfb31ebe
Merge "Fix avc denied in OMA DM" into sc-dev am: d2cee097f8
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13816043
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I4c471c8e3d6d29082744dc044fb22af6849411b2
2021-03-10 16:37:32 +00:00
TreeHugger Robot
d2cee097f8
Merge "Fix avc denied in OMA DM" into sc-dev
2021-03-10 15:52:45 +00:00
Tai Kuo
8cac55487b
gs101-sepolicy: Add twoshay permissions
...
Add twoshay and touch input context library permissions
Bug: 173330899
Bug: 173330981
Test: check boot-time twoshay startup and no denials.
Signed-off-by: Steve Pfetsch <spfetsch@google.com>
Change-Id: I68aace66f49c2af1ebfd4bde7082039f9caf3f64
Signed-off-by: Tai Kuo <taikuo@google.com>
2021-03-10 22:23:49 +08:00
SalmaxChang
2b90406669
cbd: Fix avc errors am: 6247ff69b2
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13816040
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Ibf0d222fc8bafcdaa0b7b8c5fe861749a6192bc6
2021-03-10 14:03:20 +00:00
SalmaxChang
eb4f865434
init: Remove unused log path am: 31ab19d5e7
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13818919
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I452a2c99b7aa6d83b360701aa3ada482c5693674
2021-03-10 14:03:14 +00:00
SalmaxChang
ebab404edb
vendor_init: Update tracking denials am: 7edb7e30c4
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13816041
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I9e928515b554984b84d853608d6ecd9351b2a39f
2021-03-10 14:03:14 +00:00
SalmaxChang
6247ff69b2
cbd: Fix avc errors
...
avc: denied { setuid } for comm="cbd" capability=7 scontext=u:r:cbd:s0 tcontext=u:r:cbd:s0 tclass=capability permissive=1
avc: denied { search } for comm="cbd" name="vendor" dev="tmpfs" ino=2 scontext=u:r:cbd:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=1
Bug: 178331928
Bug: 171267363
Change-Id: Icf28f494f05ee386ce94213929926369f2775173
2021-03-10 13:33:43 +00:00
SalmaxChang
7edb7e30c4
vendor_init: Update tracking denials
...
Removed the path creation from init rc.
Bug: 177186257
Change-Id: I5a8e99ae273d0c8370255bcdb4b9e802fa9895ca
2021-03-10 13:33:19 +00:00
Jack Wu
b10c77244b
hal_health_default: Fix avc denials am: 522a8aefcf
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13816038
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I543f53ff53fd1db6d12c66683c956ff21a7f5da8
2021-03-10 12:46:33 +00:00
George Chang
ef7df93001
Remove libnfc-nci from common part
...
Bug: 182243379
Bug: 182351569
Test: build pass
Change-Id: Ib853fb48ace452aa4fcb22398e026af433eaec0b
2021-03-10 19:48:20 +08:00
audreyhung
4b7a3c8f6c
Add variables in google3a_config for camera tuning
...
Add target_device into SOONG_CONFIG_NAMESPACES += google3a_config
for saperating projects (raven, oriole, slider)
Bug: 177041310
Test: build pass, manually test on O6
Change-Id: I605e0327a816fb7d04f57e679f287352e17abee0
2021-03-10 18:30:47 +08:00
Tai Kuo
4dd3e1e99e
Add touch procfs and sysfs sepolicy
...
Touch palm sepolicies are not included.
Bug: 173330981
Test: No avc denied log for touch sysfs, procfs access.
Signed-off-by: Tai Kuo <taikuo@google.com>
Change-Id: Idf510e4a9c65e5af0885159353ef85d6b6ec553f
2021-03-10 17:00:16 +08:00
Calvin Pan
47bf48c03b
Fix avc denied in OMA DM
...
03-10 11:30:05.640 30617 30617 I auditd : type=1400 audit(0.0:493): avc: denied { search } for comm="IntentService[D" name="radio" dev="dm-6" ino=242 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I IntentService[D: type=1400 audit(0.0:493): avc: denied { search } for name="radio" dev="dm-6" ino=242 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I auditd : type=1400 audit(0.0:494): avc: denied { getattr } for comm="IntentService[D" path="/data/vendor/radio/omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I IntentService[D: type=1400 audit(0.0:494): avc: denied { getattr } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I auditd : type=1400 audit(0.0:495): avc: denied { setattr } for comm="IntentService[D" name="omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I IntentService[D: type=1400 audit(0.0:495): avc: denied { setattr } for name="omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I auditd : type=1400 audit(0.0:496): avc: denied { append } for comm="IntentService[D" name="omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I IntentService[D: type=1400 audit(0.0:496): avc: denied { append } for name="omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I auditd : type=1400 audit(0.0:497): avc: denied { open } for comm="IntentService[D" path="/data/vendor/radio/omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:30:05.640 30617 30617 I IntentService[D: type=1400 audit(0.0:497): avc: denied { open } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-6" ino=17137 scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
03-10 11:57:07.155 386 386 E SELinux : avc: denied { find } for pid=8406 uid=10141 name=autofill scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
03-10 11:57:07.155 386 386 I auditd : avc: denied { find } for pid=8406 uid=10141 name=autofill scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.904 388 388 E SELinux : avc: denied { find } for pid=12124 uid=10141 name=activity scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.904 388 388 I auditd : avc: denied { find } for pid=12124 uid=10141 name=activity scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.931 388 388 E SELinux : avc: denied { find } for pid=12124 uid=10141 name=activity_task scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.931 388 388 I auditd : avc: denied { find } for pid=12124 uid=10141 name=activity_task scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.960 388 388 E SELinux : avc: denied { find } for pid=12124 uid=10141 name=SurfaceFlinger scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.960 388 388 I auditd : avc: denied { find } for pid=12124 uid=10141 name=SurfaceFlinger scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:surfaceflinger_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.960 388 388 E SELinux : avc: denied { find } for pid=12124 uid=10141 name=gpu scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
03-10 12:26:05.960 388 388 I auditd : avc: denied { find } for pid=12124 uid=10141 name=gpu scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
03-10 12:26:06.041 388 388 E SELinux : avc: denied { find } for pid=12124 uid=10141 name=audio scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
03-10 12:26:06.041 388 388 I auditd : avc: denied { find } for pid=12124 uid=10141 name=audio scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
03-10 12:35:40.653 387 387 E SELinux : avc: denied { find } for pid=8328 uid=10141 name=tethering scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:tethering_service:s0 tclass=service_manager permissive=1
03-10 12:35:40.654 387 387 I auditd : avc: denied { find } for pid=8328 uid=10141 name=tethering scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:tethering_service:s0 tclass=service_manager permissive=1
03-10 12:35:40.658 387 387 E SELinux : avc: denied { find } for pid=8328 uid=10141 name=isub scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=1
03-10 12:35:40.658 387 387 I auditd : avc: denied { find } for pid=8328 uid=10141 name=isub scontext=u:r:omadm_app:s0:c141,c256,c512,c768 tcontext=u:object_r:radio_service:s0 tclass=service_manager permissive=1
Bug: 173990082
Test: Trigger OMA DM
Change-Id: Ie66ecd1c9d80f7b12a4545f3651dd2c5f02b119b
2021-03-10 15:54:08 +08:00
Benjamin Schwartz
9618ebcc52
Merge "powerstats: Add core stats" into sc-dev am: caa1b96fc6
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13819686
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Id523bcba64b56e18ab639025104114ba93f1be9d
2021-03-10 06:49:19 +00:00
SalmaxChang
31ab19d5e7
init: Remove unused log path
...
The path "/data/log/abox" violates Android treble rule. Pixel uses
google audio HAL but not vendor one. Remove the path.
Bug: 177186257
Change-Id: Ie53be71f31e0d673592457b88304136d4d616780
2021-03-10 06:41:31 +00:00
allenwtsu
0e0ad439a7
[Slider] Add pre-grant permission for mvs
...
Bug: 181915646
Test: manual
Change-Id: Ia9521d560435baac0483b3fb413787e1cb41ef54
2021-03-10 14:40:42 +08:00
Benjamin Schwartz
caa1b96fc6
Merge "powerstats: Add core stats" into sc-dev
2021-03-10 06:19:43 +00:00
Jack Wu
522a8aefcf
hal_health_default: Fix avc denials
...
[ 5.146740] type=1400 audit(1611123521.796:23): avc: denied { search } for comm="android.hardwar" name="4-003c" dev="sysfs" ino=56632 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
[ 5.425436] type=1400 audit(1611123522.076:24): avc: denied { search } for comm="health@2.1-serv" name="4-003c" dev="sysfs" ino=56632 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
[ 29.943710] type=1400 audit(1611123546.592:483): avc: denied { write } for comm="health@2.1-serv" name="mode" dev="sysfs" ino=14741 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=1
01-20 14:18:41.796 656 656 I android.hardwar: type=1400 audit(0.0:23): avc: denied { search } for name="4-003c" dev="sysfs" ino=56632 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs_wlc:s0 tclass=dir permissive=1
Bug: 177966434
Test: Verify pass by checking device log are w/o above errors after
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I576547e27dceb55fd768de2834e3bb0155857f56
2021-03-10 14:13:38 +08:00