Commit graph

11403 commits

Author SHA1 Message Date
Benjamin Schwartz
5b34563d88 Revert^2 "powerstats: Add PixelStateResidencyDataProvider"
05a79631f7

Change-Id: If088251400b80a8f47b09d6f2806a3f386ea3161
2021-03-09 01:24:49 +00:00
TreeHugger Robot
9185f0aafd Merge "Fix selinux error for vendor_telephony_app" into sc-dev 2021-03-09 01:01:45 +00:00
Benjamin Schwartz
3cde50fe34 Merge "Revert "powerstats: Add PixelStateResidencyDataProvider"" into sc-dev 2021-03-09 00:58:56 +00:00
TreeHugger Robot
c5c7a85a0d Merge "trusty_apploader: Fix avc errors" into sc-dev 2021-03-09 00:55:06 +00:00
Benjamin Schwartz
05a79631f7 Revert "powerstats: Add PixelStateResidencyDataProvider"
Revert "powerstats: Create vendor state residency provider"

Revert submission 13807923-pixel provider

Reason for revert: caused build breakage

Reverted Changes:
I6b0c1d350:bthal/1.1: Use PixelStateResidencyProvider
Ia028e589b:powerstats: Create vendor state residency provider...
Id99e6d2a9:powerstats: Add PixelStateResidencyDataProvider

Change-Id: Ib1b18b5984af6b665c4ad0c9e9217a314a64e6ed
2021-03-09 00:54:23 +00:00
TreeHugger Robot
2bcc37f5cc Merge "powerstats: Add PixelStateResidencyDataProvider" into sc-dev am: 26856c61a8
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13807923

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I22cfbb3c5bb87bc77619a8196ac810d9b0d7aaa4
2021-03-09 00:38:10 +00:00
TreeHugger Robot
26856c61a8 Merge "powerstats: Add PixelStateResidencyDataProvider" into sc-dev 2021-03-09 00:18:42 +00:00
Yu-Chi Cheng
d18a92b0ef Allowed the EdgeTPU service to access Package Manager binder service.
EdgeTPU service will connect to the Package Manager service
to verify applicatoin signatures.
This change added the corresponding SELinux rules to allow such
connection.

Bug: 181821398
Test: Verified using Google Camera App on local device.
Change-Id: Ia32b3de102c162e28710e0aa917831e8de784183
2021-03-08 16:02:14 -08:00
Fernando Lugo
2b75765719 bootctrl: run clang-format
Bug: 156694052
Signed-off-by: Fernando Lugo <flugo@google.com>
Change-Id: I003fb99e96bcee2d745365992b3c8d4a3816f818
2021-03-08 15:36:55 -08:00
Eric Biggers
fe9ab8c5a4 Merge changes Ia94682ee,I4da3ce85 into sc-dev am: fa50bf6c7c
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13807420

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Id81d5936a8272cd1c8ff9f0d5cebfa8dbc4a4271
2021-03-08 21:58:08 +00:00
Petri Gynther
e0852fb739 gs101: build vendor_ramdisk.img am: 3c5da8c48b
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13807513

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Iff808da075e4e7b212c17aa0167838c57f2a1fa1
2021-03-08 21:54:19 +00:00
Eric Biggers
c27e9e5ff9 gs101: use wrapped keys for storage encryption
Make better use of the new hardware by using wrapped keys via the KDN
(Key Distribution Network), rather than standard keys.  Wrapped keys are
slightly better protected against being compromised.

When this change is submitted, a factory reset will be required.

Bug: 149360056
Test: Booted Android and verified via the kernel log and
      'dmctl table userdata' that both FBE and metadata encryption are
      using wrapped keys.  Also ran vts_kernel_encryption_test.
      Also storage-qa and reboot stress testing (b/178650615).
Change-Id: Iab6f4199306de02b5846062e7499783b7aedf901
2021-03-08 21:23:20 +00:00
Eric Biggers
fa50bf6c7c Merge changes Ia94682ee,I4da3ce85 into sc-dev
* changes:
  gs101: remove unused fstabs for eMMC storage
  gs101: remove unneeded crypto properties
2021-03-08 21:22:50 +00:00
Benjamin Schwartz
9c9f563bd6 powerstats: Add PixelStateResidencyDataProvider
This data provider will be used to produce state residency data from
other native services that have registered callbacks.

Bug: 179277258
Test: adb shell dumpsys android.hardware.power.stats.IPowerStats/default
Test: killed power.stats and bluetooth services and verified that
providers are re-registered.

Change-Id: Id99e6d2a9300f7c7483e3fb7a6a9604a46fbbc6f
2021-03-08 11:54:56 -08:00
Petri Gynther
3c5da8c48b gs101: build vendor_ramdisk.img
aosp/1619809 has landed, so let's start building:
out/target/product/<name>/vendor_ramdisk.img

We can then easily grab ramdisk.img + vendor_ramdisk.img
from any go/ab build to our kernel dev environment.

Bug: 170687803
Change-Id: I1469fd9e545353029ceea6251dad631eab2ae1d9
2021-03-08 10:57:28 -08:00
Eric Biggers
93b740b0b0 gs101: remove unused fstabs for eMMC storage
These devices will only use UFS, so remove the emmc and sdboot fstab
files which are unused and outdated.

Bug: 181883233
Change-Id: Ia94682eecca4d792c2a50d2336cd6a542ed282db
2021-03-08 10:17:55 -08:00
Eric Biggers
3014832d9a gs101: remove unneeded crypto properties
It is unnessary to set ro.crypto.dm_default_key.options_format.version=2
or ro.crypto.volume.filenames_mode=aes-256-cts on devices with
PRODUCT_SHIPPING_API_LEVEL >= 30, since in that case these settings are
already the default.

Bug: 181883233
Change-Id: I4da3ce857a45c479e5efcee481f74031093234d8
2021-03-08 10:17:55 -08:00
Beverly
de4b2af870 Move udfps-specific config to device config.xml
Test: manual
Bug: 176550666
Change-Id: Ibaab1a4328e3559b0d0b4d7afd043a5668746ae9
2021-03-08 09:31:33 -05:00
Alessio Balsini
eb39490266 gs101: Use FUSE passthrough by default
Enable the persist.sys.fuse.passthrough.enable flag for the P21 device
configuration to enable the FUSE passthrough feature.
This feature has been enabled on Cuttlefish, Wembley and Redbull devices for
months and no issues have been detected yet.

Bug: 168023149
Test: 'adb shell getprop | grep persist.sys.fuse.passthrough.enable',
    ScopedStorageTest
Signed-off-by: Alessio Balsini <balsini@google.com>
Change-Id: I3f39b02af436f7e508bb70efc702565a667a051c
2021-03-08 12:05:36 +00:00
Isaac Chiou
73ce34397a Wifi: Add sepolicy files for wifi_ext service
This commit adds the sepolicy related files for wifi_ext service.

Bug: 171944352
Bug: 177966433
Bug: 177673356
Test: Manual
Change-Id: I1613e396fd4c904ed563dfd533fb4b8f807f9657
2021-03-08 19:36:29 +08:00
Ocean Chen
91262dd631 pixelstats: add ufs host reset count
Add path for new atom, UFS_RESET_COUNT

bug: 176740886
Change-Id: Icae0b5b104674be078854193048c3fc49f7bf527
2021-03-08 17:49:36 +08:00
joeshih
21f5312309 [P21]Phase in FactoryOta
- Phase in FactoryOta to P21

Bug: 182117971
Test: Forrest build
Change-Id: Ibd33c0c1295c420add15c708b43db2913fc55f36
2021-03-08 17:22:29 +08:00
TreeHugger Robot
a065e95101 Merge "sepolicy: add usf folder to BOARD_SEPOLICY_DIRS." into sc-dev am: cd3a13deaf
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13805047

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I1c4d2d007c2aed0b04d33b9c6963361eda847d06
2021-03-08 09:11:36 +00:00
TreeHugger Robot
81e4375464 Merge "Allow vendor_init to set USB properties" into sc-dev am: 433719c74f
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13805049

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ib28bddd965e4644c09ece13ec1cabd338097b581
2021-03-08 09:11:29 +00:00
TreeHugger Robot
cd3a13deaf Merge "sepolicy: add usf folder to BOARD_SEPOLICY_DIRS." into sc-dev 2021-03-08 09:02:32 +00:00
matthuang
94095e1fd3 sepolicy: add sensor related rules for AIDL APIs
SELinux : avc:  denied  { find } for pid=703 uid=1000name=android.frameworks.stats.IStats/default
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:fwk_stats_service:s0 tclass=service_manager permissive=1
android.hardwar: type=1400 audit(0.0:24): avc: denied { transfer } for scontext=u:r:hal_sensors_default:s0
tcontext=u:r:servicemanager:s0 tclass=binder permissive=1

Bug: 182086688
Test: make selinux_policy -j128 and push to device.
Test: avc denials are disappeared in boot log.
Change-Id: I13e658c1cef3bd24ae25cc1c22dd9336b4e45b0f
2021-03-08 09:00:36 +00:00
Kris Chen
5c76e0c1f3 trusty_apploader: Fix avc errors
Fix the following avc denials:
trusty_apploade: type=1400 audit(0.0:3): avc: denied { read } for name="system" dev="tmpfs" ino=713 scontext=u:r:trusty_apploader:s0 tcontext=u:object_r:dmabuf_system_heap_device:s0 tclass=chr_file permissive=1
trusty_apploade: type=1400 audit(0.0:4): avc: denied { open } for path="/dev/dma_heap/system" dev="tmpfs" ino=713 scontext=u:r:trusty_apploader:s0 tcontext=u:object_r:dmabuf_system_heap_device:s0 tclass=chr_file permissive=1
trusty_apploade: type=1400 audit(0.0:5): avc: denied { ioctl } for path="/dev/dma_heap/system" dev="tmpfs" ino=713 ioctlcmd=0x4800 scontext=u:r:trusty_apploader:s0 tcontext=u:object_r:dmabuf_system_heap_device:s0 tclass=chr_file permissive=1

Bug: 180874342
Test: Verify no avc denied when trusty app is loaded.
Change-Id: Idbd850580220a1cb85a221d769d741f63cd8751f
2021-03-08 16:42:27 +08:00
TreeHugger Robot
433719c74f Merge "Allow vendor_init to set USB properties" into sc-dev 2021-03-08 08:38:01 +00:00
davidycchen
175299a568 dumpstate: dump more touch information
Dump more touch information for P21 projects.

Bug: 174191180
Test: trigger bugreport and check dumpstate.

Signed-off-by: davidycchen <davidycchen@google.com>
Change-Id: Ibdae06b29d8781bcc7973cb8a0ecfd0078ecde96
2021-03-08 16:24:00 +08:00
SalmaxChang
e0e29b3505 cbd: Fix avc errors am: 4d87bc0f2a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13805045

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I088a4f7fec8e864e44f8bcb2066b21d523a60cff
2021-03-08 08:04:19 +00:00
Aaron Tsai
5e63caa568 Fix selinux error for vendor_telephony_app
// b/174961423
[   43.295540] type=1400 audit(1607136492.652:21): avc: denied { open } for comm="y.silentlogging" path="/dev/__properties__/u:object_r:vendor_persist_sys_default_prop:s0" dev="tmpfs" ino=261 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=file permissive=1
[   43.295445] type=1400 audit(1607136492.652:20): avc: denied { read } for comm="y.silentlogging" name="u:object_r:vendor_persist_sys_default_prop:s0" dev="tmpfs" ino=261 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=file permissive=1
[   43.290494] type=1400 audit(1607136492.648:19): avc: denied { search } for comm="y.silentlogging" name="com.samsung.slsi.telephony.silentlogging" dev="dm-6" ino=3751 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=1
[   43.267396] type=1400 audit(1607136492.624:18): avc: denied { getattr } for comm="y.silentlogging" path="/data/user/0/com.samsung.slsi.telephony.silentlogging" dev="dm-6" ino=3751 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=1
[   43.267076] type=1400 audit(1607136492.624:17): avc: denied { search } for comm="y.silentlogging" name="data" dev="dm-6" ino=87 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=1

// b/176868380
[   44.640326] type=1400 audit(1609377760.052:32): avc: denied { search } for comm="y.silentlogging" name="0" dev="dm-6" ino=181 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:user_profile_root_file:s0:c512,c768 tclass=dir permissive=1
[   44.705763] type=1400 audit(1609377760.120:36): avc: denied { search } for comm="ephony.testmode" name="0" dev="dm-6" ino=181 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:user_profile_root_file:s0:c512,c768 tclass=dir permissive=1
[   44.649879] type=1400 audit(1609377760.064:33): avc: denied { getattr } for comm="y.silentlogging" path="/dev/__properties__/u:object_r:vendor_persist_sys_default_prop:s0" dev="tmpfs" ino=261 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=file permissive=1
[   44.649981] type=1400 audit(1609377760.064:34): avc: denied { map } for comm="y.silentlogging" path="/dev/__properties__/u:object_r:vendor_persist_sys_default_prop:s0" dev="tmpfs" ino=261 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:vendor_persist_sys_default_prop:s0 tclass=file permissive=1
[   44.650286] type=1400 audit(1609377760.064:35): avc: denied { search } for comm="y.silentlogging" name="slog" dev="dm-6" ino=228 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:vendor_slog_file:s0 tclass=dir permissive=1

// b/177176900
[   46.609809] type=1400 audit(1610075109.964:21): avc: denied { getattr } for comm="ephony.testmode" path="/dev/__properties__/u:object_r:vendor_rild_prop:s0" dev="tmpfs" ino=266 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:vendor_rild_prop:s0 tclass=file permissive=1
[   46.609747] type=1400 audit(1610075109.964:20): avc: denied { open } for comm="ephony.testmode" path="/dev/__properties__/u:object_r:vendor_rild_prop:s0" dev="tmpfs" ino=266 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:vendor_rild_prop:s0 tclass=file permissive=1
[   46.609580] type=1400 audit(1610075109.960:19): avc: denied { read } for comm="ephony.testmode" name="u:object_r:vendor_rild_prop:s0" dev="tmpfs" ino=266 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:vendor_rild_prop:s0 tclass=file permissive=1
[   46.609867] type=1400 audit(1610075109.964:22): avc: denied { map } for comm="ephony.testmode" path="/dev/__properties__/u:object_r:vendor_rild_prop:s0" dev="tmpfs" ino=266 scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:vendor_rild_prop:s0 tclass=file permissive=1

// b/179437464
02-05 09:46:38.796   376   376 E SELinux : avc:  denied  { find } for pid=9609 uid=1000 name=activity scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
02-05 09:46:38.894   376   376 E SELinux : avc:  denied  { find } for pid=9631 uid=1000 name=thermalservice scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:thermal_service:s0 tclass=service_manager permissive=1
02-05 09:46:38.825   376   376 E SELinux : avc:  denied  { find } for pid=9609 uid=1000 name=tethering scontext=u:r:vendor_telephony_app:s0 tcontext=u:object_r:tethering_service:s0 tclass=service_manager permissive=1


Bug: 174961423
Bug: 176868380
Bug: 177176900
Bug: 179437464

Test: verified with the forrest ROM and error log gone
Change-Id: Ibd2dfb61eb58b381504ac43595e99695a5e21b7e
2021-03-08 15:48:34 +08:00
Alex Hong
6bfbfc3c3a Allow vendor_init to set USB properties
Bug: 181925042
Test: $ make selinux_policy
      Push SELinux modules, switch to Enforcing mode
      Ensure the vendor_init denials are gone
Change-Id: I4007cbc2396fa1fc22f1d18a977beb11c57e3b12
2021-03-08 14:59:13 +08:00
Edwin Tung
36a0fce6c7 Make Psds server configurable from carrier config am: 75657e2f0e
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13782435

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I08d347c453d5c5cc7a8bde0f39a8e93468e4c723
2021-03-08 06:47:56 +00:00
linpeter
728cda9ade display: set atc node permission
Give atc nodes sutiable permission to allow hwcomposer to set
atc config to display driver.

Bug: 168848203
test: check file node permission
Change-Id: I6b1b90d0951aa844d19bd68b9020e501d0e359de
2021-03-08 14:31:35 +08:00
matthuang
04275485f7 sepolicy: add usf folder to BOARD_SEPOLICY_DIRS.
03-08 09:26:34.320   701   701 I MonitorFdThread: type=1400
audit(0.0:5): avc: denied { read } for name="/" dev="tmpfs" ino=1
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:device:s0
tclass=dir permissive=1
03-08 09:26:34.320   701   701 I MonitorFdThread: type=1400
audit(0.0:6): avc: denied { watch } for path="/dev" dev="tmpfs" ino=1
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:device:s0
tclass=dir permissive=1
03-08 09:26:36.344   701   701 I android.hardwar: type=1400
audit(0.0:11): avc: denied { read write } for name="acd-com.google.usf"
dev="tmpfs" ino=932 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:aoc_device:s0 tclass=chr_file permissive=1
03-08 09:26:36.344   701   701 I android.hardwar: type=1400
audit(0.0:12): avc: denied { open } for path="/dev/acd-com.google.usf"
dev="tmpfs" ino=932 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:aoc_device:s0 tclass=chr_file permissive=1
03-08 09:26:36.948   701   701 I android.hardwar: type=1400
audit(0.0:13): avc: denied { search } for name="vendor" dev="tmpfs"
ino=2 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=1
03-08 09:26:36.948   701   701 I android.hardwar: type=1400
audit(0.0:14): avc: denied { search } for name="/" dev="sda1" ino=2
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:persist_file:s0
tclass=dir permissive=1
03-08 09:26:36.952   701   701 I android.hardwar: type=1400
audit(0.0:15): avc: denied { getattr } for
path="/mnt/vendor/persist/sensors/registry" dev="sda1" ino=24
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:persist_file:s0
tclass=dir permissive=1
03-08 09:26:36.952   701   701 I android.hardwar: type=1400
audit(0.0:16): avc: denied { read } for name="registry" dev="sda1"
ino=24

Bug:182086633
Test: make selinux_policy -j128 and push to device.
Test: avc denials are disappeared in boot log.

Change-Id: Id7ad6dcb63c880a4b7b07dbe4588ec231e9e00b5
2021-03-08 14:08:19 +08:00
SalmaxChang
4d87bc0f2a cbd: Fix avc errors
avc: denied { write } for comm="cbd" name="ssrdump" dev="dm-9" ino=284 scontext=u:r:cbd:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir
avc: denied { add_name } for comm="cbd" name="crashinfo_modem_2021-03-02_10-57-06.txt" scontext=u:r:cbd:s0 tcontext=u:object_r:sscoredump_vendor_data_crashinfo_file:s0 tclass=dir
avc: denied { write } for comm="sh" name="image" dev="dm-9" ino=231 scontext=u:r:cbd:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir
avc: denied { read } for comm="cbd" name="u:object_r:radio_prop:s0" dev="tmpfs" ino=206 scontext=u:r:cbd:s0 tcontext=u:object_r:radio_prop:s0 tclass=file
avc: denied { search } for comm="cbd" name="/" dev="sda15" ino=2 scontext=u:r:cbd:s0 tcontext=u:object_r:persist_file:s0 tclass=dir
avc: denied { syslog_read } for comm="cbd" scontext=u:r:cbd:s0 tcontext=u:r:kernel:s0 tclass=system

Bug: 179198083
Bug: 178331928
Bug: 171267363
Change-Id: I8a89e360e6d614ad76ed2eb78467fcbedf1ea0ce
2021-03-08 06:00:45 +00:00
Edwin Tung
75657e2f0e Make Psds server configurable from carrier config
Support loading carrier config with no SIM case
Bug: 167499651

Test: manual
Change-Id: I2bc5bfdca83e79b21de8b660a6f8519e402b7caf
2021-03-08 12:14:45 +08:00
Adam Shih
5507bcec80 update error on ROM 7191013 am: fc5a6a88db
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13774535

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I72fd905ee651ecd95613d9ae001edc1a95830323
2021-03-08 03:51:27 +00:00
Zhijun He
dd6b7bc70d camera: add more camera permissions am: b14c4e1920
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13800759

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I41fbda2c21c61e308c743821cabec50fc4a38ca5
2021-03-08 01:52:33 +00:00
Adam Shih
fc5a6a88db update error on ROM 7191013
Bug: 182086633
Bug: 182086611
Bug: 182086552
Bug: 182086686
Bug: 182086550
Bug: 182086551
Bug: 182086482
Bug: 182086688
Bug: 182086481
Test: pts-tradefed run pts -m PtsSELinuxTest
Change-Id: I3c8c411d985a4a3c9210a39aa30ea0c3626f65e0
2021-03-08 09:42:05 +08:00
Zhijun He
b14c4e1920 camera: add more camera permissions
Bug: 182043664
Test: CTS
Change-Id: Ibc4d7300c81e9826ccaf6900d8a847a8192d1823
2021-03-07 23:44:26 +00:00
Robin Peng
ef579ab3d6 Move slider into gs101 and <device> am: c2b5ca99e3
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13674427

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I2a148a34ee631cae0ae186c852fed36a06a812de
2021-03-07 09:15:12 +00:00
Robin Peng
02fc65a8b4 Revert "Add owners file" am: 0ef3a89b93
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13769338

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ie35a7536a6adbf1e7c84add9be00a50392cb5bf5
2021-03-07 09:15:07 +00:00
Robin Peng
a735e7cdca Move slider-sepolicy into gs101-sepolicy am: 5009efa776
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13621329

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Icaa962713fdc9bec23c02354912586f57c7d99d3
2021-03-07 09:15:06 +00:00
Robin Peng
c2b5ca99e3 Move slider into gs101 and <device>
from: 026342771c6642980cb4653b1ec4d857a5d8be54

Bug: 167996145
Change-Id: I2ebf7f019afed1cbe9b60dcd82581bd3a52fe109
2021-03-06 16:31:12 +08:00
Robin Peng
5009efa776 Move slider-sepolicy into gs101-sepolicy
from: 71e609c24c97fc8d44843af30527cbeb90d5dcdf

Bug: 167996145
Change-Id: Ie00e7e0983a3ca695bbd5140c929d07a80144301
2021-03-06 16:15:39 +08:00
Robin Peng
7f0a352736 Add owners file am: a03b8e0a3a
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101/+/13769331

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I58946b200d24201d861b65ac4d0a4565cc9f1963
2021-03-04 18:57:28 +00:00
Robin Peng
02ec626eb7 Add owners file am: ed6fcdbdc1
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/13768969

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: Ia1ae271ee6508588ec8496fb1428fe8b1a2aa992
2021-03-04 18:57:27 +00:00
Robin Peng
0ef3a89b93 Revert "Add owners file"
This reverts commit a03b8e0a3a.

Change-Id: I1f9fd5e832f1b2104ad23539d1d5b46dc1aba4e8
2021-03-04 16:59:12 +08:00
Robin Peng
a03b8e0a3a Add owners file
Bug: 167996145
Change-Id: I806e345328fcc3c4000a77eaca59511d73744be6
2021-03-04 16:35:22 +08:00