Ilya Matyukhin
3233492f78
Add sepolicy for Goodix AIDL HAL
...
Bug: 183054007
Test: adb logcat | grep "avc: denied"
Change-Id: Iea9a652dbc78c488a72600b4226140ccf123b004
2021-03-24 21:00:41 -07:00
terrycrhuang
9778af3cef
Fix avc denied for vendor_ims_app
...
03-25 09:24:16.810 E SELinux : avc: denied { find } for pid=3681
uid=10272 name=media.audio_flinger
scontext=u:r:vendor_ims_app:s0:c16,c257,c512,c768
tcontext=u:object_r:audioserver_service:s0 tclass=service_manager
permissive=0
Bug: 183593669
Test: Manual
Change-Id: I9d659b475d5d19ae5dd1642974f9064c152ee4b0
2021-03-25 10:57:57 +08:00
Aaron Tsai
d135bde241
Fix selinux errors for rild
...
03-10 09:33:20.380 849 849 I rild_exynos: type=1400 audit(0.0:11): avc: denied { map } for path="/dev/__properties__/u:object_r:sota_prop:s0" dev="tmpfs" ino=241 scontext=u:r:rild:s0 tcontext=u:object_r:sota_prop:s0 tclass=file permissive=1
03-10 09:33:20.380 849 849 I rild_exynos: type=1400 audit(0.0:10): avc: denied { getattr } for path="/dev/__properties__/u:object_r:sota_prop:s0" dev="tmpfs" ino=241 scontext=u:r:rild:s0 tcontext=u:object_r:sota_prop:s0 tclass=file permissive=1
03-10 09:33:20.380 849 849 I rild_exynos: type=1400 audit(0.0:9): avc: denied { open } for path="/dev/__properties__/u:object_r:sota_prop:s0" dev="tmpfs" ino=241 scontext=u:r:rild:s0 tcontext=u:object_r:sota_prop:s0 tclass=file permissive=1
03-10 09:33:20.380 849 849 I rild_exynos: type=1400 audit(0.0:8): avc: denied { read } for name="u:object_r:sota_prop:s0" dev="tmpfs" ino=241 scontext=u:r:rild:s0 tcontext=u:object_r:sota_prop:s0 tclass=file permissive=1
[ 16.814981] type=1400 audit(1615340000.380:8): avc: denied { read } for comm="rild_exynos" name="u:object_r:sota_prop:s0" dev="tmpfs" ino=241 scontext=u:r:rild:s0 tcontext=u:object_r:sota_prop:s0 tclass=file permissive=1
[ 16.815057] type=1400 audit(1615340000.380:9): avc: denied { open } for comm="rild_exynos" path="/dev/__properties__/u:object_r:sota_prop:s0" dev="tmpfs" ino=241 scontext=u:r:rild:s0 tcontext=u:object_r:sota_prop:s0 tclass=file permissive=1
[ 16.815089] type=1400 audit(1615340000.380:10): avc: denied { getattr } for comm="rild_exynos" path="/dev/__properties__/u:object_r:sota_prop:s0" dev="tmpfs" ino=241 scontext=u:r:rild:s0 tcontext=u:object_r:sota_prop:s0 tclass=file permissive=1
[ 16.815108] type=1400 audit(1615340000.380:11): avc: denied { map } for comm="rild_exynos" path="/dev/__properties__/u:object_r:sota_prop:s0" dev="tmpfs" ino=241 scontext=u:r:rild:s0 tcontext=u:object_r:sota_prop:s0 tclass=file permissive=1
Bug: 182320172
Test: verified with the forrest ROM and error log gone
Change-Id: Ib0300629de5a0186c4f9fd2f603be52aefd085bc
2021-03-25 02:47:16 +00:00
TreeHugger Robot
14ff0e6ac5
Merge "Fix hangup Volte call fail" into sc-dev
2021-03-25 02:19:49 +00:00
Eddie Tashjian
5dbe586a1d
Merge "Allow init to set RIL properties." into sc-dev
2021-03-25 01:51:20 +00:00
terrycrhuang
8b3601f87d
Fix hangup Volte call fail
...
03-24 19:45:59.920 I auditd : type=1107 audit(0.0:35): uid=0
auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set }
for property=persist.radio.call.audio.output pid=2328 uid=10260
gid=10260 scontext=u:r:vendor_ims_app:s0:c4,c257,c512,c768
tcontext=u:object_r:radio_prop:s0 tclass=property_service permissive=0'
03-24 19:45:59.923 W libc : Unable to set property
"persist.radio.call.audio.output" to "0": error code: 0x18
Bug: 183593669
Bug: 182978936
Test: Manual
Change-Id: I7f4491348ca6d97e0997f51359f1c42d98d61c75
2021-03-25 05:33:56 +08:00
Krzysztof Kosiński
1314a15cb9
Merge "Revert "Add lazy service binary to hal_camera_default domain."" into sc-dev
2021-03-24 20:57:35 +00:00
Eddie Tashjian
d3579bb3ec
Allow init to set RIL properties.
...
Init sequence needs to set several properties under *vendor.ril*. Change
permission to set instead of get.
Bug: 183633407
Test: Check selinux denials.
Change-Id: Id7ecff48f36ee87f251ee6121f1782fa57b39844
2021-03-24 13:35:11 -07:00
Krzysztof Kosiński
9818e25500
Revert "Add lazy service binary to hal_camera_default domain."
...
This reverts commit d02e73b966
.
Reason for revert: This HAL is actually not intended to be present
on GS101 devices. The denial logs come from people who did "adb sync"
after building binaries that are not included in the device image.
SELinux should not allow access to this HAL.
Change-Id: Id179023eeb79d749a0bde13e1d83af41fc42780e
2021-03-24 15:59:55 +00:00
Steven Liu
c6eca53b9e
Add sepolicy for the wifi firmware config OTA feature
...
Bug: 177083009
Test: the OTA updated files can be updated and applied.
Change-Id: I2f269dbc146aae41cab57abd568af7e26fd23876
2021-03-24 06:59:08 -07:00
Krzysztof Kosiński
7e469b9941
Mark libGrallocWrapper.so as same-process HAL.
...
This library is indirectly loaded by lib_aion_buffer.so, which
is an ABI-stable wrapper for some vendor-specific APIs used by
GCA (the Pixel camera app)
Bug: 182962346
Test: ran GCA on oriole
Change-Id: Ida5171110081cac0ac13ea769f9d434499faebe6
2021-03-24 06:42:05 -07:00
Adam Shih
5b5a004593
allow bootctl to access devinfo
...
[ 22.798274] type=1400 audit(1616580486.404:10): avc:
denied { write } for comm="boot@1.2-servic" name="sdd1"
dev="tmpfs" ino=705 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:devinfo_block_device:s0 tclass=blk_file
permissive=1
Bug: 177882574
Test: boot to home after factory reset
Change-Id: I6774ffd46a74c75b2fee962757901ea97e9033fe
2021-03-24 10:32:37 +00:00
SalmaxChang
3a27f85dc8
mds: Update radio_vendor_data_file permission
...
Bug: 181174034
Change-Id: Ie22e19b179d41a97198c07cb922dd5c60f095ad4
2021-03-24 09:23:18 +00:00
Adam Shih
c58780d645
Merge "fix reset problem caused by ims" into sc-dev
2021-03-24 08:13:23 +00:00
Adam Shih
692faeedaf
fix reset problem caused by ims
...
Bug: 183209764
Test: unplug device, reboot, enter sim code and survived
Change-Id: I23c39290731a76ec4a364e4f92d3994254d70eae
2021-03-24 14:31:31 +08:00
TreeHugger Robot
fb3fe04feb
Merge "Add se-policy for new GRIL service and RadioExt hal APIs" into sc-dev
2021-03-24 02:39:23 +00:00
TreeHugger Robot
40df476219
Merge "Add the sepolicy for UWB hal" into sc-dev
2021-03-24 02:13:43 +00:00
TreeHugger Robot
835a255138
Merge "Fix denials for ril_config_service_app" into sc-dev
2021-03-24 00:41:22 +00:00
labib
a0c5ec2305
Add se-policy for new GRIL service and RadioExt hal APIs
...
Bug: 172294179
Change-Id: Ief4c7ec7959676126f35037006016e1454a34f5e
2021-03-24 06:16:03 +08:00
Hridya Valsaraju
fb862c0888
Allow Exoplayer access to the vstream-secure heap for secure playback
...
Fixes the following denials:
avc: denied { read } for name="vstream-secure" dev="tmpfs"
ino=736 scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0 tclass=chr_file permissive=0
app=com.google.android.exoplayer.demo
avc: denied { read } for name="vstream-secure" dev="tmpfs" ino=736
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0
tclass=chr_file permissive=0 app=com.google.android.exoplayer.demo
avc: denied { read } for name="vstream-secure" dev="tmpfs" ino=736
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:dmabuf_heap_device:s0
tclass=chr_file permissive=0 app=com.google.android.exoplayer.demo
Bug: 178865267
Test: no more denials
Change-Id: I6612bd56c49558b13e2ae72cfbf3552715729e7a
Signed-off-by: Hridya Valsaraju <hridya@google.com>
2021-03-23 14:37:01 -07:00
Greg Kaiser
9ec1be4eb9
Merge "Revert "Add se-policy for new GRIL service and RadioExt hal APIs"" into sc-dev
2021-03-23 19:12:13 +00:00
LABIB MD RASHID
97bfa35d4f
Revert "Add se-policy for new GRIL service and RadioExt hal APIs"
...
Revert "BT SAR client implementation for GRIL"
Revert submission 13944227-gril-bt-sar
Reason for revert: TreeHugger builds failing due to changes requiring se-linux permissions for GRIL. Need to add permissions for more devices before attempting this change again.
Reverted Changes:
I556657928:Add se-policy for new GRIL service and RadioExt ha...
I96cf9176a:BT SAR client implementation for GRIL
Change-Id: Ib800962d07d305a5a42ee40f019535f663beacd1
2021-03-23 19:00:57 +00:00
TreeHugger Robot
25e39f7d37
Merge "Add se-policy for new GRIL service and RadioExt hal APIs" into sc-dev
2021-03-23 16:02:35 +00:00
TreeHugger Robot
3bf9cddeb7
Merge "modem_svc_sit: Fix avc errors" into sc-dev
2021-03-23 11:16:25 +00:00
Hongbo Zeng
4211025746
Fix denials for ril_config_service_app
...
- RilConfigService is a common google project in vendor/google/tools,
sync related rules from the previous project(ag/6697240, ag/7153946)
to allow it to:
(1) receive intents
(2) update database files under /data/vendor/radio
(3) update RIL properties
- Two new denials found in this project only:
avc: denied { search } for name="data" dev="dm-7" ino=93
scontext=u:r:ril_config_service_app:s0
tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=1
avc: denied { search } for name="0" dev="dm-7" ino=192
scontext=u:r:ril_config_service_app:s0
tcontext=u:object_r:user_profile_root_file:s0:c512,c768 tclass=dir permissive=1
Bug: 182715439
Test: apply these rules and check there is no denial for
RilConfigService finally
Change-Id: Icfb0e121d0d11600bda900dff0511187518105ab
2021-03-23 17:22:33 +08:00
labib
6516f369ff
Add se-policy for new GRIL service and RadioExt hal APIs
...
Bug: 172294179
Change-Id: I556657928caa441b3530bb371902d5f4ce0be257
2021-03-23 09:20:18 +00:00
SalmaxChang
b4fbecb9fb
modem_svc_sit: Fix avc errors
...
avc: denied { search } for comm="modem_svc_sit" name="vendor" dev="tmpfs" ino=2 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir
avc: denied { write open } for path="/mnt/vendor/modem_userdata/replay/dds.bin" dev="sda7" ino=14 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file
avc: denied { remove_name } for name="dds.bin" dev="sda7" ino=14 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir
Bug: 183467321
Change-Id: Ic5b8fcf324bb0a8b0f6312b3ae755d73a53f0e9c
2021-03-23 15:11:38 +08:00
Adam Shih
fd45b5ef27
permission required for adb sideload to work
...
Bug: 183174452
Test: do adb sideload under enforcing mode
Change-Id: I2ba05b22729894d2677859fd33a6370f2ff9d409
2021-03-23 14:23:44 +08:00
TreeHugger Robot
9c46632091
Merge "permissions required for OTA" into sc-dev
2021-03-23 04:45:37 +00:00
Adam Shih
7314a7b522
permissions required for OTA
...
Bug: 183174452
Test: do OTA under enforcing mode
Change-Id: I0edf7703713e24351f57ef0e68096ca03c59e6f8
2021-03-23 09:49:02 +08:00
Krzysztof Kosiński
61e515e4ce
Merge "Add lazy service binary to hal_camera_default domain." into sc-dev
2021-03-23 01:31:50 +00:00
Krzysztof Kosiński
d02e73b966
Add lazy service binary to hal_camera_default domain.
...
Avoids denial logs from init on service (re)start. See bug for
details.
Bug: 183441948
Test: Restarted the service
Change-Id: I9ee9b8099d2ffae4d6a115552800fa844c192132
2021-03-22 16:25:57 -07:00
TreeHugger Robot
8d9094345e
Merge "allow bootctl to read devinfo" into sc-dev
2021-03-22 09:16:23 +00:00
Adam Shih
f05cdba220
allow bootctl to read devinfo
...
Bug: 182705986
Test: boot with no relevant log found
Change-Id: I6d4c699fe1492f8fbcd5b8a9ba98da2fade57bd7
2021-03-22 16:10:22 +08:00
David Li
6dce033807
Merge "audio: add /dev/acd-audio_dcdoff_ref for audio effect visualizer" into sc-dev
2021-03-22 02:07:33 +00:00
Alex Hong
b640326154
Add the sepolicy for UWB hal
...
Bug: 182727934
Test: $ make selinux_policy
Push SELinux modules and check the denials during boot
Change-Id: I630e6e353897a85d1b90c7d8a4250703a4c3a245
2021-03-19 21:42:07 +08:00
Adam Shih
3f6e2bba41
Merge "label missing vibrator sys nodes" into sc-dev
2021-03-19 05:32:27 +00:00
TreeHugger Robot
fc6b81d188
Merge "Add sepolicy rules for fingerprint hal" into sc-dev
2021-03-19 04:37:58 +00:00
Kris Chen
09996bc810
Add sepolicy rules for fingerprint hal
...
Fixes the following avc denials:
03-18 11:23:15.692 956 956 I android.hardwar: type=1400 audit(0.0:7): avc: denied { read write } for name="trusty-ipc-dev0" dev="tmpfs" ino=691 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:23:15.692 956 956 I android.hardwar: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/trusty-ipc-dev0" dev="tmpfs" ino=691 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:23:15.692 956 956 I android.hardwar: type=1400 audit(0.0:9): avc: denied { ioctl } for path="/dev/trusty-ipc-dev0" dev="tmpfs" ino=691 ioctlcmd=0x7280 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:tee_device:s0 tclass=chr_file permissive=1
03-18 11:40:56.072 973 973 I fingerprint@2.1: type=1400 audit(0.0:39): avc: denied { search } for name="battery" dev="sysfs" ino=66502 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
03-18 11:40:56.072 973 973 I fingerprint@2.1: type=1400 audit(0.0:40): avc: denied { read } for name="temp" dev="sysfs" ino=66520 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
03-18 11:40:56.072 973 973 I fingerprint@2.1: type=1400 audit(0.0:41): avc: denied { open } for path="/sys/devices/platform/google,battery/power_supply/battery/temp" dev="sysfs" ino=66520 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
03-18 14:11:23.476 979 979 I fingerprint@2.1: type=1400 audit(0.0:13): avc: denied { search } for name="battery" dev="sysfs" ino=66502 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:9): avc: denied { create } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:10): avc: denied { bind } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:11): avc: denied { write } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:03:08.248 978 978 I android.hardwar: type=1400 audit(0.0:12): avc: denied { read } for scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=netlink_socket permissive=1
03-18 12:56:30.446 404 404 E SELinux : avc: denied { add } for interface=vendor.goodix.hardware.biometrics.fingerprint::IGoodixFingerprintDaemon sid=u:r:hal_fingerprint_default:s0 pid=967 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager permissive=1
Bug: 171943101
Test: No above avc denials in logcat.
Change-Id: I67b397f86c39625b77ebe6d32d37e42cd87b3f93
2021-03-19 03:41:18 +00:00
TreeHugger Robot
46b51cd204
Merge "power: Add policy to access sysfs_bcl" into sc-dev
2021-03-19 03:39:32 +00:00
Adam Shih
8d2feed7ed
label missing vibrator sys nodes
...
Bug: 182954060
Test: boot with no avc error found
Change-Id: I1ffd97c6646d106c88efe36bfb4483ae44415eaa
2021-03-19 11:14:36 +08:00
George Lee
9c3d77d088
power: Add policy to access sysfs_bcl
...
Bug: 180620276
Test: adb bugreport
dumpstate_board.txt shows:
------ BCL (/sys/devices/virtual/pmic/mitigation/triggered_stats) ------
Source Count Last Triggered Last SOC Last Voltage
smpl_warn 0 0 0 0
ocp_cpu1 0 0 0 0
ocp_cpu2 0 0 0 0
soft_ocp_cpu1 0 0 0 0
soft_ocp_cpu2 0 0 0 0
ocp_tpu 0 0 0 0
soft_ocp_tpu 0 0 0 0
pmic_120c 0 0 0 0
pmic_140c 0 0 0 0
pmic_overheat 0 0 0 0
ocp_gpu 0 0 0 0
soft_ocp_gpu 0 0 0 0
------ IF PMIC (/sys/devices/virtual/pmic/max77759-mitigation/triggered_stats) ------
Source Count Last Triggered Last SOC Last Voltage
VDROOP1 0 0 0 0
VDROOP2 0 0 0 0
BATOILO 0 0 0 0
Signed-off-by: George Lee <geolee@google.com>
Change-Id: If7874e19b8202175071d474502e77748168565ce
2021-03-19 02:56:32 +00:00
TreeHugger Robot
9a865e84c7
Merge "Allow fingerprint hal to access fingerprint device" into sc-dev
2021-03-19 02:19:59 +00:00
David Li
fa11af6a07
audio: add /dev/acd-audio_dcdoff_ref for audio effect visualizer
...
Set /dev/acd-audio_dcdoff_ref as u:object_r:aoc_device:s0
crw-rw---- 1 system audio u:object_r:aoc_device:s0 500, 29 2021-03-18 22:19 /dev/acd-audio_dcdoff_ref
Bug: 180984363
Bug: 165719427
Test: make -j128
Test: ls -alZ /dev/acd-audio_dcdoff_ref
Change-Id: If7cd3ef99885730287648afebb222d4f925d325e
2021-03-19 10:10:49 +08:00
Kris Chen
10fda56cd1
Allow fingerprint hal to access fingerprint device
...
Fixes the following avc denials:
03-18 10:57:10.612 947 947 I android.hardwar: type=1400 audit(0.0:8): avc: denied { open } for path="/dev/goodix_fp" dev="tmpfs" ino=482 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:10.632 947 947 I android.hardwar: type=1400 audit(0.0:9): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6707 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:13.672 947 947 I android.hardwar: type=1400 audit(0.0:14): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6706 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
03-18 10:57:32.704 947 947 I HwBinder:947_1: type=1400 audit(0.0:26): avc: denied { ioctl } for path="/dev/goodix_fp" dev="tmpfs" ino=482 ioctlcmd=0x6705 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
Bug: 171943101
Test: No above avc denials in logcat.
Change-Id: I254a01a2c11fcaba9ad3f387862a8d0ddafffd38
2021-03-18 19:23:54 +08:00
TreeHugger Robot
2433a82427
Merge "sepolicy: fix usb hal selinux permission" into sc-dev
2021-03-18 05:47:52 +00:00
SalmaxChang
2797490192
Update vendor_modem_prop and add rules for mds
...
Bug: 181185131
Change-Id: Ie709e08152d23428a687c949359316206843b9fa
2021-03-18 04:48:19 +00:00
Ines Ayara
338d324e5a
Merge "Add "libedgetpu_darwinn2.so" library duplicate to be used for external launch." into sc-dev
2021-03-18 02:54:19 +00:00
Albert Wang
beb4f82d32
sepolicy: fix usb hal selinux permission
...
avc: denied { read } for name="port0-partner" dev="sysfs" ino=98412 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-6/6-0025/typec/port0/port0-partner" dev="sysfs" ino=98412 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
avc: denied { getattr } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0025/typec/port0/power_role" dev="sysfs" ino=67861 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
avc: denied { open } for path="/sys/devices/platform/10d50000.hsi2c/i2c-5/5-0025/typec/port0/power_role" dev="sysfs" ino=67861 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
avc: denied { write } for name="port_type" dev="sysfs" ino=71778 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
Bug: 182122983
Test: atest VtsHalUsbV1_0TargetTest
atest HalUsbGadgetV1_0HostTest
Signed-off-by: Albert Wang <albertccwang@google.com>
Change-Id: Ia2cf9061dd5eaa7af582331477afd34db56531e8
2021-03-18 09:51:14 +08:00
TreeHugger Robot
57ec723c5e
Merge "Fix selinux error for vendor_init" into sc-dev
2021-03-18 00:49:15 +00:00