Darren Hsu
f11f53a3ae
Allow hal_power_stats to read sysfs_aoc_dumpstate
...
avc: denied { read } for comm="android.hardwar" name="restart_count"
dev="sysfs" ino=72823 scontext=u:r:hal_power_stats_default:s0
tcontext=u:object_r:sysfs_aoc_dumpstate:s0 tclass=file permissive=0
Bug: 226173008
Test: check bugreport without avc denials
Change-Id: Ife3a7e00a1ffbcbed7fd8b744f2ac8910931a5fb
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-03-25 11:19:20 +08:00
Stephane Lee
84a06151a3
Fix off-mode (charger) sepolicy for the health interface
...
Bug: 223537397
Test: Ensure that there are no selinux errors for sysfs_batteryinfo in
off-mode charging
Change-Id: I46fa1b7552eb0655d0545538142131465a337f23
Merged-In: I46fa1b7552eb0655d0545538142131465a337f23
2022-03-23 11:30:31 -07:00
Jack Wu
b67138e8ae
sepolicy: gs101: fix charger_vendor permission denied
...
[ 27.025458][ T443] type=1400 audit(1644391560.640:11): avc: denied { search } for comm="android.hardwar" name="vendor" dev="tmpfs" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0
[ 26.563658][ T447] type=1400 audit(1644397622.588:5): avc: denied { search } for comm="android.hardwar" name="/" dev="sda1" ino=2 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=0
[ 27.198144][ T442] type=1400 audit(1644398156.152:5): avc: denied { search } for comm="android.hardwar" name="battery" dev="sda1" ino=12 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=0
[ 27.327035][ T443] type=1400 audit(1644398785.276:5): avc: denied { read } for comm="android.hardwar" name="defender_active_time" dev="sda1" ino=17 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=0
[ 27.355009][ T443] type=1400 audit(1644398785.276:6): avc: denied { write } for comm="android.hardwar" name="defender_charger_time" dev="sda1" ino=16 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=0
[ 26.771705][ T444] type=1400 audit(1644379988.804:4): avc: denied { read } for comm="android.hardwar" name="specification_version" dev="sysfs" ino=56257 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=0
[ 27.898684][ T445] type=1400 audit(1644392754.928:8): avc: denied { read } for comm="android.hardwar" name="thermal_zone6" dev="sysfs" ino=15901 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=lnk_file permissive=0
[ 29.180076][ T447] type=1400 audit(1644397625.200:9): avc: denied { write } for comm="android.hardwar" name="mode" dev="sysfs" ino=15915 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
[ 27.043845][ T444] type=1400 audit(1644379988.808:9): avc: denied { search } for comm="android.hardwar" name="thermal" dev="tmpfs" ino=899 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:thermal_link_device:s0 tclass=dir permissive=0
[ 27.064916][ T444] type=1400 audit(1644379988.808:10): avc: denied { read } for comm="android.hardwar" name="u:object_r:vendor_battery_defender_prop:s0" dev="tmpfs" ino=306 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=file permissive=0
[ 27.356266][ T444] type=1107 audit(1644404450.376:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.battery.defender.state pid=457 uid=1000 gid=1000 scontext=u:r:charger_vendor:s0 tcontext=u:object_r:vendor_battery_defender_prop:s0 tclass=property_service permissive=0'
Bug: 218485039
Test: manually test, no avc: denied
Signed-off-by: Jack Wu <wjack@google.com>
Change-Id: I091dbbca35fb833e59fdbc234d74b90bfe74014c
Merged-In: I091dbbca35fb833e59fdbc234d74b90bfe74014c
2022-03-23 11:27:45 -07:00
Darren Hsu
2018f942a7
sepolicy: reorder genfs labels for system suspend
...
Bug: 223683748
Test: check bugreport without relevant avc denials
Change-Id: I66ede69d94bb3cb1a446e1cd5f3250b6f9b7f7e9
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-03-15 11:48:39 +08:00
TeYuan Wang
f7aba10674
Move libperfmgr thermal rules to pixel-sepolicy
...
Bug: 213257759
Bug: 188579571
Test: build
Change-Id: I9893d53055594bfb4e4dba3d68b53f0fe132617d
2022-03-10 21:28:33 +08:00
Michael Eastwood
82a110ba3b
Merge "Update SELinux policy to allow camera HAL to send Perfetto trace packets"
2022-03-09 17:31:28 +00:00
Michael Eastwood
f648f3c989
Update SELinux policy to allow camera HAL to send Perfetto trace packets
...
Example denials:
03-04 04:25:37.524 823 823 I TracingMuxer: type=1400 audit(0.0:31): avc: denied { use } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext=u:r:tr
aced:s0 tclass=fd permissive=1
03-04 04:25:37.524 823 823 I TracingMuxer: type=1400 audit(0.0:32): avc: denied { read write } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext
=u:object_r:traced_tmpfs:s0 tclass=file permissive=1
03-04 04:25:37.524 823 823 I TracingMuxer: type=1400 audit(0.0:33): avc: denied { getattr } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext=u:
object_r:traced_tmpfs:s0 tclass=file permissive=1
03-04 04:25:37.524 823 823 I TracingMuxer: type=1400 audit(0.0:34): avc: denied { map } for path=2F6D656D66643A706572666574746F5F73686D656D202864656C6574656429 dev="tmpfs" ino=20229 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:traced_tmpfs:s0 tclass=file permissive=1
Bug: 222684359
Test: Build and push new SELinux policy. Verify that trace packets are received by Perfetto.
Change-Id: I0180c6bccf8cb65f444b8fb687ab48422c211bac
2022-03-08 13:54:34 -08:00
Tri Vo
22f2ffcbee
Merge "Don't audit storageproxyd unlabeled access" am: fbf92e2ada
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/2007441
Change-Id: I7b9186af0cb135241e23504fa9d6f7c3d6718c7c
2022-03-04 18:06:53 +00:00
Tri Vo
fbf92e2ada
Merge "Don't audit storageproxyd unlabeled access"
2022-03-04 17:45:37 +00:00
Midas Chien
0e1e0e2830
[Do Not Merge] Allow composer to read panel_idle_handle_exit sysfs node
...
Change panel_idle_exit_handle selinux type to sysfs_display to allow
composer to access it.
Bug: 202182467
Test: ls -Z to check selinux type
Test: composer can access it in enforce mode
Merged-In: I5ca811f9500dc452fe6832dd772376da51f675a8
Change-Id: I5ca811f9500dc452fe6832dd772376da51f675a8
2022-03-04 10:48:08 +00:00
Tri Vo
03fef48542
Don't audit storageproxyd unlabeled access
...
Test: m sepolicy
Bug: 197502330
Change-Id: I794dac85e475434aaf024027c43c98dde60bee27
2022-03-03 13:12:17 -08:00
Aaron Tsai
d2d83c8e2d
Fix selinux error for system_app am: 05565c1f14
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1992670
Change-Id: Ia3c6c0aae82c19a5d1c019cce2700c5e64c8bb11
2022-02-22 01:35:41 +00:00
Aaron Tsai
05565c1f14
Fix selinux error for system_app
...
01-26 05:04:53.364 440 440 I auditd : avc: denied { find } for interface=vendor.samsung_slsi.telephony.hardware.radioExternal::IOemSlsiRadioExternal sid=u:r:system_app:s0 pid=3063 scontext=u:r:system_app:s0 tcontext=u:object_r:hal_exynos_rild_hwservice:s0 tclass=hwservice_manager permissive=0
Bug: 216531913
Test: verified with the forrest ROM and error log gone
Change-Id: I73d45f3cf1fe0bd918bb4856ce554e81702e4ff9
Merged-In: I73d45f3cf1fe0bd918bb4856ce554e81702e4ff9
2022-02-21 12:16:45 +08:00
Junkyu Kang
a5b052c132
Add persist.vendor.gps to sepolicy am: 9244051b35
...
Original change: https://android-review.googlesource.com/c/device/google/gs101-sepolicy/+/1989989
Change-Id: Ibb1a3b4cca8fa3549eeef548d0939829413e8af1
2022-02-18 06:50:19 +00:00
Junkyu Kang
9244051b35
Add persist.vendor.gps to sepolicy
...
Bug: 196002632
Test: PixelLogger can modify persist.vendor.gps.*
Change-Id: I3fdaf564eacec340003eed0b5845a2c08922362c
Merged-In: I3fdaf564eacec340003eed0b5845a2c08922362c
2022-02-17 08:55:49 +00:00
Xin Li
81caef24ad
Merge sc-v2-dev-plus-aosp-without-vendor@8084891
...
Bug: 214455710
Merged-In: Icecca9f69ee9b57d43aa2864864951bf66c4905f
Change-Id: Ibf8d551c16f8f941cfc8072a29ef5c57e8bef170
2022-02-11 07:12:06 +00:00
TeYuan Wang
c292dd65ba
move vendor_thermal_prop rules to pixel-sepolicy
...
Bug: 213257759
Test: no denied log after "setprop persist.vendor.disable.thermal.control 1"
Change-Id: Ic150959bc6084034d9afcc70bf446692fbe22d11
2022-02-08 08:10:32 +00:00
Treehugger Robot
2c1750e537
Merge "genfs_contexts: add paths for unnamed cs40l25a i2c devices"
2022-02-08 00:53:08 +00:00
Will McVicker
5a88ee6af1
genfs_contexts: add paths for unnamed cs40l25a i2c devices
...
In the 5.10 kernel, the i2c paths are named using an out-of-tree patch
[1]. For kernels that don't support that, let's add the unnamed sysfs
paths as well to the selinux policy.
[1] https://android-review.googlesource.com/c/kernel/common/+/1646148
Bug: 217774013
Change-Id: I3a1f279270d22bf82144ce60a08c215308764be3
2022-02-04 11:54:06 -08:00
Marco Nelissen
7df1fa1574
Allow logd to read the Trusty log
...
Bug: 190050919
Test: build
Change-Id: I8a42cd90b1581272f4dafc37d6eb29a98e1fa2e3
2022-02-03 10:37:13 -08:00
Treehugger Robot
423a9a467b
Merge "Allow storageproxyd to create directories in its data location"
2022-01-26 20:29:27 +00:00
Stephen Crane
45850f812e
Allow storageproxyd to create directories in its data location
...
storageproxyd already has rw_dir_perms for tee_data_file from
vendor/tee.te in platform. We need create_dir_perms to make the
"alternate/" directory for handling DSU correctly.
Test: m dist, flash, and test DSU
Bug: 203719297
Change-Id: Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a
2022-01-25 17:54:22 -08:00
TeYuan Wang
66f1d74123
Move thermal netlink socket sepolicy rules to pixel sepolicy
...
Bug: 213257759
Test: verified genlink function with emul_temp under enforcing mode
Change-Id: I8f5518e5f866ed0813be1e6630c6a9aefaf06e63
2022-01-25 11:59:06 +08:00
Treehugger Robot
05ca30173e
Merge "Allow TEE storageproxyd permissions needed for DSU handling"
2022-01-12 23:34:32 +00:00
YiHo Cheng
b4024884f1
Merge "thermal: Label tmu register dump sysfs" into sc-v2-dev am: e400db11ba
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16569088
Change-Id: I3c9929f0ec857786766b892e415d4b58163797be
2022-01-12 23:14:55 +00:00
YiHo Cheng
e400db11ba
Merge "thermal: Label tmu register dump sysfs" into sc-v2-dev
2022-01-12 23:03:42 +00:00
TeYuan Wang
32458cdc49
Label TMU as sysfs_thermal
...
Bug: 202805103
Test: switch thermal tj property and check thermal threshold
Change-Id: Id113b80f856e26412e2e07b9c9b4a61d519b194f
2022-01-12 10:16:49 +08:00
Yabin Cui
9ee70a3d7f
Merge "Add SOC specific ETM sysfs paths"
2022-01-11 19:40:23 +00:00
Jasmine Cha
2abecb1519
audio: add sepolicy for getting thermal event
...
type=1400 audit(0.0:15): avc: denied { call } for scontext=u:r:hal_audio_default:s0
tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1
type=1400 audit(0.0:16): avc: denied { transfer } for scontext=u:r:hal_audio_default:s0
tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1
Bug: 204271308
Test: build pass
Signed-off-by: Jasmine Cha <chajasmine@google.com>
Change-Id: I900de2a2d8bf0753543ef4428374e782908e7aee
2022-01-11 13:42:58 +08:00
Jasmine Cha
a21b7f8800
audio: add permission to request health/sensor data
...
- Add audio hal into hal_health clients
- Allow audio hal to find fwk_sensor_hwservice
SELinux : avc: denied { find } for interface=android.frameworks.sensorservice::ISensorManager sid=u:r:hal_audio_default:s0 pid=5907 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:fwk_sensor_hwservice:s0 tclass=hwservice_manager permissive=1
SELinux : avc: denied { find } for interface=android.hardware.health::IHealth sid=u:r:hal_audio_default:s0 pid=9875 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:hal_health_hwservice:s0 tclass=hwservice_manager permissive=1
audio.service: type=1400 audit(0.0:14): avc: denied { call } for scontext=u:r:hal_audio_default:s0 tcontext=u:r:hal_health_default:s0 tclass=binder permissive=1
audio.service: type=1400 audit(0.0:15): avc: denied { transfer } for scontext=u:r:hal_audio_default:s0 tcontext=u:r:hal_health_default:s0 tclass=binder permissive=1
Bug: 199382564
Bug: 199801586
Test: build pass
Signed-off-by: Jasmine Cha <chajasmine@google.com>
Change-Id: I8e8a512cfbd6be814c98bac75ff6c0e5db028db2
Merged-In: I8e8a512cfbd6be814c98bac75ff6c0e5db028db2
2022-01-11 13:42:55 +08:00
YiHo Cheng
ca06222472
thermal: Label tmu register dump sysfs
...
Allow dumpstate to access tmu register dump sysfs
[ 1155.422181] type=1400 audit(1641335196.892:8): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_reg_dump_state" dev="sysfs"
ino=68561
scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:sysfs:s0
tclass=file permissive=0
[ 1155.423398] type=1400 audit(1641335196.892:9): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_reg_dump_current_temp" dev="sysfs"
ino
=68562 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 1155.443740] type=1400 audit(1641335196.896:10): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_top_reg_dump_rise_thres"
dev="sysfs"
ino=68563 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 1155.466064] type=1400 audit(1641335196.896:11): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_top_reg_dump_fall_thres"
dev="sysfs"
ino=68565 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 1155.488251] type=1400 audit(1641335196.916:12): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_sub_reg_dump_rise_thres"
dev="sysfs" ino=68564 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
[ 1155.510614] type=1400 audit(1641335196.960:13): avc: denied { read }
for comm="dumpstate@1.1-s" name="tmu_sub_reg_dump_fall_thres"
dev="sysfs"
ino=68566 scontext=u:r:hal_dumpstate_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
o
Bug: 202736838
Test: check thermal section in dumpstate
Change-Id: Icecca9f69ee9b57d43aa2864864951bf66c4905f
2022-01-11 08:42:45 +08:00
Yabin Cui
1459e9734a
Add SOC specific ETM sysfs paths
...
Bug: 213519191
Test: run profcollectd on oriole
Change-Id: Ib1ae7466c76362b8242f2bb8560bb8b1d80c4253
2022-01-10 11:25:25 -08:00
Vinay Kalia
97addf8500
[DO NOT MERGE] Allow media codec to access power HAL am: 8337626f4a
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16483773
Change-Id: I4ce0bb633c8d27e798c7a8e80e1d23eb06b3a2a0
2022-01-10 06:13:59 +00:00
Vinay Kalia
8337626f4a
[DO NOT MERGE] Allow media codec to access power HAL
...
This commit fixes the following denials:
W /vendor/bin/hw/google.hardware.media.c2@1.0-service: type=1400 audit(0.0:276): avc: denied
{ call } for comm=436F646563322E30204C6F6F706572 scontext=u:r:mediacodec:s0
tcontext=u:r:servicemanager:s0 tclass=binder permissive=0
bug: 206687836
Test: Secure HFR AV1 video playback with resolution change.
Signed-off-by: Vinay Kalia <vinaykalia@google.com>
Change-Id: I79c20bda87af6066ae667a5176747378718a3a62
2022-01-06 20:18:34 +00:00
David Anderson
2fe229352b
Fix sepolicy denial in update_engine.
...
pvmfw is an A/B partition but is not properly labeled and update_engine
gets a denial trying to write to it.
Bug: N/A
Test: m otapackage, apply OTA, check for denials
Change-Id: I55f41a8937384d3bcda5797b5df3f34257f7a114
2021-12-28 21:52:12 -08:00
Stephen Crane
3f9a11fa0b
Allow TEE storageproxyd permissions needed for DSU handling
...
Allows the vendor TEE access to GSI metadata files (which are publicly
readable). Storageproxyd needs access to this metadata to determine if a
GSI image is currently booted. Also allows the TEE domain to make new
directories in its data path.
Test: access /metadata/gsi/dsu/booted from storageproxyd
Bug: 203719297
Change-Id: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b
2021-12-14 14:33:56 -08:00
TreeHugger Robot
f7db23e139
Merge "Label min_vrefresh and idle_delay_ms as sysfs_display" into sc-v2-dev
2021-12-08 01:40:06 +00:00
joenchen
8d4e8a65d6
Label min_vrefresh and idle_delay_ms as sysfs_display
...
Bug: 202567084
Test: Check the files label by "adb shell ls -Z"
Change-Id: I29243751ab5f38eca5d8e4221122764f79c75e04
Merged-In: I29243751ab5f38eca5d8e4221122764f79c75e04
2021-12-07 03:42:52 +00:00
joenchen
bef2d7397c
Label min_vrefresh and idle_delay_ms as sysfs_display
...
Bug: 202567084
Test: Check the files label by "adb shell ls -Z"
Change-Id: I29243751ab5f38eca5d8e4221122764f79c75e04
Merged-In: I29243751ab5f38eca5d8e4221122764f79c75e04
2021-12-06 02:45:51 +00:00
Albert Wang
43bde53275
Allow suspend_control to access xHCI wakeup node am: a506ed1e06
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16370946
Change-Id: I17198ed93403abe1b6526b385218847616b52c5b
2021-12-02 01:53:59 +00:00
Albert Wang
a506ed1e06
Allow suspend_control to access xHCI wakeup node
...
This is a WORKAROUND to avoid the xHCI wakeup node permission problem,
since system will automatically allocated device ID.
Bug: 205138535
Test: n/a
Signed-off-by: Albert Wang <albertccwang@google.com>
Change-Id: Ia2ca04618f950bdded4aea76c897579eb4b92daf
2021-12-01 23:45:19 +08:00
Albert Wang
8bdcb60170
[RESTRICT AUTOMERGE] Allow suspend_control to access xHCI wakeup node am: e6fb90425d
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16246250
Change-Id: If82693c02020cc701953dcb12412fa0fe132f16b
2021-11-17 08:51:05 +00:00
Albert Wang
e6fb90425d
[RESTRICT AUTOMERGE] Allow suspend_control to access xHCI wakeup node
...
Bug: 205138535
Test: n/a
Signed-off-by: Albert Wang <albertccwang@google.com>
Change-Id: I6e012fea56c50656c8f26216199459092dcfc0f9
Merged-In: I6e012fea56c50656c8f26216199459092dcfc0f9
2021-11-17 07:18:29 +00:00
Michael Ayoubi
11bb305754
Merge "Allow uwb_vendor_app to get SE properties" into sc-v2-dev am: e7a17433a0
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16233414
Change-Id: Ibac4fbebf2f14157e1ac32585e4da68b61acea19
2021-11-12 01:48:47 +00:00
Michael Ayoubi
e7a17433a0
Merge "Allow uwb_vendor_app to get SE properties" into sc-v2-dev
2021-11-12 01:24:43 +00:00
Oleg Matcovschi
2eced57692
gs101:ssr_detector: Allow access to aoc properties in user builds am: 63d04e1e02
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16236498
Change-Id: I80dc34c15c60f80ddde869c6895d1afe53e8bf3e
2021-11-11 23:14:23 +00:00
Oleg Matcovschi
63d04e1e02
gs101:ssr_detector: Allow access to aoc properties in user builds
...
Bug: 205755422
Signed-off-by: Oleg Matcovschi <omatcovschi@google.com>
Change-Id: I684590a2ee91cf6d1edfc8a606f3a9e6672ca46f
2021-11-11 06:13:44 +00:00
Michael Ayoubi
a8e745039f
Allow uwb_vendor_app to get SE properties
...
Bug: 205770401
Test: Build and flash on device.
Change-Id: Ic98f394434fad12e7d8ef804ecfd694a55ee8190
Merged-In: Ic98f394434fad12e7d8ef804ecfd694a55ee8190
2021-11-11 00:50:08 +00:00
Xin Li
856fe3d040
Merge sc-qpr1-dev-plus-aosp-without-vendor@7810918
...
Bug: 205056467
Merged-In: I8f9932ad8885aaefde9548f87c6d2c6cc148cd4c
Change-Id: Ie31b278a639fd5a9e249ca934d543de770fb3217
2021-11-10 08:06:11 +00:00
Ted Lin
ee9b913bb7
Using dontaudit to fix the avc on boot test am: 3d463050a2
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs101-sepolicy/+/16175460
Change-Id: I00cfd7b47b7e2c6718e8211809e1ddb20e19656b
2021-11-04 16:46:45 +00:00