Board tree for Google Tensor G1 devices
Find a file
Jenny Ho 17e518038e sepolicy: add rule for new debug file node
W dumpstate@1.1-s: type=1400 audit(0.0:7): avc: denied { read } for name="logbuffer_maxfg_monitor" dev="tmpfs" ino=500 scontext=u:r:hal_dumpstate_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=0

Bug: 196755019
Signed-off-by: Jenny Ho <hsiufangho@google.com>
Change-Id: I0ddf68d5e15fe8d77d8d61287f65621c14024f46
2021-09-06 06:21:34 +00:00
confirmationui organize confirmationui settings 2021-06-18 12:56:05 +08:00
display Allowed HWC HAL access TUI status node 2021-07-01 12:08:34 -07:00
edgetpu Allow HAL to access sysfs. 2021-07-16 16:27:34 -07:00
modem modularize dmd 2021-06-24 14:17:29 +08:00
neuralnetworks modulize hal_neuralnetwork_armnn 2021-06-08 11:17:22 +08:00
private gs101-sepolicy: Remove private/mediaprovider_app.te 2021-08-17 21:09:20 +08:00
system_ext Allow boot color propagation 2021-08-17 21:06:23 +00:00
telephony Avoid VTS testDataTypeViolators failure 2021-06-29 07:58:57 +08:00
tracking_denials Revert the unnecessary sepolicy rules for hal_neuralnetworks_darwinn. 2021-07-30 23:36:06 +00:00
trusty_metricsd reorganize trusty_metricsd settings 2021-06-10 02:54:00 +00:00
usf Allow sensor HAL to read AoC dumpstate. 2021-08-02 15:56:57 -07:00
whitechapel/vendor/google sepolicy: add rule for new debug file node 2021-09-06 06:21:34 +00:00
gs101-sepolicy.mk gs101-sepolicy: Fix avc denial for sysfs_vendor_sched 2021-06-10 04:10:24 +00:00
OWNERS Move slider-sepolicy into gs101-sepolicy 2021-03-06 16:15:39 +08:00