Grace Chen
15579c38ef
Add selinux permissions to r/w sysfs st33spi_state am: 2a8ed004f6
am: f38a4e9217
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17653782
Change-Id: I6095204aa4ffe5bd68115f963440e5f3255d1074
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-11 21:46:23 +00:00
Grace Chen
2a8ed004f6
Add selinux permissions to r/w sysfs st33spi_state
...
Bug: 228508704
Test: Confirm can r/w to sysfs file
Change-Id: If96f15f53ee510bf361a2bec5f006d67b178981e
2022-04-11 21:00:50 +00:00
Stephane Lee
e868202588
ODPM: Add ODPM config file to be read by powerstats 2.0 am: 5ce2f99f38
am: 04f71ae091
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17621550
Change-Id: Ic3b96fe3e55b2ff58581b50e4320d52186224180
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-08 03:38:15 +00:00
Stephane Lee
5ce2f99f38
ODPM: Add ODPM config file to be read by powerstats 2.0
...
Test: Ensure that there are no sepolicy errors when
/data/vendor/powerstats/odpm_config exists
Bug: 228112997
Change-Id: I094c29c4d1a82bccfabde7a5511f4aa833c2cd35
2022-04-08 02:49:40 +00:00
Siddharth Kapoor
4e2778858c
Revert "Move ODPM file rule to pixel sepolicy" am: 15f80f57bf
am: 23c89da785
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17609199
Change-Id: I4f4636065496d6d015266b420e59da6f19009e0b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-07 04:46:05 +00:00
Siddharth Kapoor
15f80f57bf
Revert "Move ODPM file rule to pixel sepolicy"
...
Revert "Move ODPM file rule to pixel sepolicy"
Revert "Move ODPM file rule to pixel sepolicy"
Revert submission 17215583-odpm_sepolicy_refactor-tm-dev
Reason for revert: build failure tracked in b/228261711
Reverted Changes:
Ic9a89950a:Move ODPM file rule to pixel sepolicy
I24105669b:Move ODPM file rule to pixel sepolicy
I044a285ff:Move ODPM file rule to pixel sepolicy
Change-Id: Idbf5cd106f229c8a72b2ecbc6e5ffd20d9e06805
2022-04-07 04:06:29 +00:00
samou
837e598a78
Move ODPM file rule to pixel sepolicy am: ece8953942
am: df3f4565cd
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17213985
Change-Id: I3ded387684ddeda364f8c721e95b664ad3a8da38
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-04-06 02:59:24 +00:00
samou
ece8953942
Move ODPM file rule to pixel sepolicy
...
Bug: 213257759
Change-Id: I24105669b076061780addf5b038607f4d1957ee5
2022-04-06 02:09:38 +00:00
chungkai
ec14f07ee1
sched: move sysfs to procfs am: 2dc6f70afc
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17500884
Change-Id: I4910c36d52b42bd2e800890c34b19136587b4191
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-03-31 07:23:28 +00:00
chungkai
2dc6f70afc
sched: move sysfs to procfs
...
Modify name from sysfs_vendor_sched to proc_vendor_sched
Test: without avc denial
Bug: 216207007
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: Ieb829e96ac1db2a1aa28fc416182450d128cac5c
2022-03-31 07:00:20 +00:00
Minchan Kim
56fb8cb807
sepolicy: allow dump page_pinner am: 3496931400
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17410608
Change-Id: Id4385572ff9f2fc059d351c817a764f5a4f0574d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-03-28 16:53:16 +00:00
Minchan Kim
3496931400
sepolicy: allow dump page_pinner
...
Provide necessary sepolicy for dumpreport to access page_pinner
information in /sys/kernel/debug/page_pinner/{longterm_pinner,
alloc_contig_failed}
Bug: 226956571
Test: Run "adb bugreport <zip>" and verify it contains the output
from page_pinner.
Signed-off-by: Minchan Kim <minchan@google.com>
Change-Id: I7b00d4930fbaa2061537cd8c84616c1053c829cf
2022-03-28 16:35:02 +00:00
Chris Kuiper
ffebbdcd34
Add rules to allow Sensor HAL write access to als_table am: 967571ee60
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17368888
Change-Id: Id038f0254f2c69e917c88cb2da0aa8f47b6861f5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-03-25 00:20:47 +00:00
Chris Kuiper
967571ee60
Add rules to allow Sensor HAL write access to als_table
...
Sensor HAL needs write access to
/sys/class/backlight/panel0-backlight/als_table.
Bug: 226435017
Test: Observing logs
Change-Id: Idb592d601b92c6814493e0d28384e1013935b72f
2022-03-25 00:00:19 +00:00
Peter Csaszar
466adbb2da
pixel-selinux: Port PRO SJTAG policies to tm-dev
...
These are the SELinux policies for the sysfs files of the SJTAG
kernel interface for WHI-PRO-based devices, now migrated to the
tm-dev branch. The files are in the following directories:
/sys/devices/platform/sjtag_ap/interface/
/sys/devices/platform/sjtag_gsa/interface/
Bug: 207571417
Bug: 224022297
Signed-off-by: Peter Csaszar <pcsaszar@google.com>
Merged-in: I5ec50d9ff7cd0e08ade7acce21e73751e93a0aff
Change-Id: I56da5763c31ab098859cbc633660897646fe7f3e
2022-03-22 03:17:40 +00:00
Mason Wang
500e7624e9
vendor_init: Fix touch avc denial of high_sensitivity.
...
Fixed following avc denial:
avc: denied { write } for name="high_sensitivity" dev="proc" ino=4026534550 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1
//The file node is proc/focaltech_touch/high_sensitivity
Bug: 199105136
Test: Verify pass by checking device log are w/o above errors while
switching setting/display/increase touch sensitivity.
Change-Id: I8dbe4190056767407413082580320593292725fe
2022-03-21 07:32:49 +00:00
Mason Wang
296823785d
vendor_init: Fix touch avc denial of high_sensitivity.[DO NOT MERGE]
...
Fixed following avc denial:
avc: denied { write } for name="high_sensitivity" dev="proc" ino=4026534550 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1
//The file node is proc/focaltech_touch/high_sensitivity
Bug: 199105136
Test: Verify pass by checking device log are w/o above errors while
switching setting/display/increase touch sensitivity.
Change-Id: I8dbe4190056767407413082580320593292725fe
2022-03-17 10:01:37 +00:00
Badhri Jagan Sridharan
fc08341bd6
android.hardware.usb.IUsb AIDL migration
...
Cherry-pick of <775523d1eb
>
android.hardware.usb.IUsb is migrated to AIDL and runs in
its own process. android.hardware.usb.gadget.IUsbGadget
is now published in its own exclusive process
(android.hardware.usb.gadget-service). Creating
file_context and moving the selinux linux rules
for IUsbGadget implementation.
[ 37.177042] type=1400 audit(1645536157.528:3): avc: denied { wake_alarm } for comm="android.hardwar" capability=35 scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_usb_impl:s0 tclass=capability2 permissive=1
[ 37.177139] type=1400 audit(1645536157.528:4): avc: denied { block_suspend } for comm="android.hardwar" capability=36 scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_usb_impl:s0 tclass=capability2 permissive=1
[ 39.936357] type=1400 audit(1645536160.292:5): avc: denied { call } for comm="HwBinder:875_1" scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1
[ 39.936403] type=1400 audit(1645536160.292:6): avc: denied { transfer } for comm="HwBinder:875_1" scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1
...
[ 42.845054] type=1400 audit(1645550991.268:8): avc: denied { read } for comm="HwBinder:860_1" name="u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 42.877781] type=1400 audit(1645550991.268:9): avc: denied { open } for comm="HwBinder:860_1" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 42.915532] type=1400 audit(1645550991.268:10): avc: denied { getattr } for comm="HwBinder:860_1" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 42.962130] type=1400 audit(1645550991.268:11): avc: denied { map } for comm="HwBinder:860_1" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 43.003097] type=1400 audit(1645550991.268:12): avc: denied { watch watch_reads } for comm="HwBinder:860_1" path="/dev/usb-ffs/adb" dev="functionfs" ino=40814 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:functionfs:s0 tclass=dir permissive=1
[ 43.024529] type=1400 audit(1645550991.268:13): avc: denied { write } for comm="HwBinder:860_1" name="property_service" dev="tmpfs" ino=376 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=1
[ 43.057605] type=1400 audit(1645550991.268:14): avc: denied { connectto } for comm="HwBinder:860_1" path="/dev/socket/property_service" scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1
[ 43.084549] type=1107 audit(1645550991.268:15): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.usb.dwc3_irq pid=860 uid=0 gid=0 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=property_service permissive=1'
Bug: 200993386
Change-Id: Ia8c24610244856490c8271433710afb57d3da157
Merged-In: Ia8c24610244856490c8271433710afb57d3da157
2022-03-01 03:32:23 +00:00
Badhri Jagan Sridharan
775523d1eb
android.hardware.usb.IUsb AIDL migration
...
android.hardware.usb.IUsb is migrated to AIDL and runs in
its own process. android.hardware.usb.gadget.IUsbGadget
is now published in its own exclusive process
(android.hardware.usb.gadget-service). Creating
file_context and moving the selinux linux rules
for IUsbGadget implementation.
[ 37.177042] type=1400 audit(1645536157.528:3): avc: denied { wake_alarm } for comm="android.hardwar" capability=35 scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_usb_impl:s0 tclass=capability2 permissive=1
[ 37.177139] type=1400 audit(1645536157.528:4): avc: denied { block_suspend } for comm="android.hardwar" capability=36 scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_usb_impl:s0 tclass=capability2 permissive=1
[ 39.936357] type=1400 audit(1645536160.292:5): avc: denied { call } for comm="HwBinder:875_1" scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1
[ 39.936403] type=1400 audit(1645536160.292:6): avc: denied { transfer } for comm="HwBinder:875_1" scontext=u:r:hal_usb_impl:s0 tcontext=u:r:hal_thermal_default:s0 tclass=binder permissive=1
...
[ 42.845054] type=1400 audit(1645550991.268:8): avc: denied { read } for comm="HwBinder:860_1" name="u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 42.877781] type=1400 audit(1645550991.268:9): avc: denied { open } for comm="HwBinder:860_1" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 42.915532] type=1400 audit(1645550991.268:10): avc: denied { getattr } for comm="HwBinder:860_1" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 42.962130] type=1400 audit(1645550991.268:11): avc: denied { map } for comm="HwBinder:860_1" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=351 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1
[ 43.003097] type=1400 audit(1645550991.268:12): avc: denied { watch watch_reads } for comm="HwBinder:860_1" path="/dev/usb-ffs/adb" dev="functionfs" ino=40814 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:functionfs:s0 tclass=dir permissive=1
[ 43.024529] type=1400 audit(1645550991.268:13): avc: denied { write } for comm="HwBinder:860_1" name="property_service" dev="tmpfs" ino=376 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=1
[ 43.057605] type=1400 audit(1645550991.268:14): avc: denied { connectto } for comm="HwBinder:860_1" path="/dev/socket/property_service" scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1
[ 43.084549] type=1107 audit(1645550991.268:15): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.usb.dwc3_irq pid=860 uid=0 gid=0 scontext=u:r:hal_usb_gadget_impl:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=property_service permissive=1'
Bug: 200993386
Change-Id: Ia8c24610244856490c8271433710afb57d3da157
2022-02-25 00:51:26 +00:00
Peter Csaszar
4041f814be
pixel-selinux: add SJTAG policies
...
These are the SELinux policies for the sysfs files of the SJTAG
kernel interface. The files are in the following directories:
/sys/devices/platform/sjtag_ap/interface/
/sys/devices/platform/sjtag_gsa/interface/
Bug: 207571417
Signed-off-by: Peter Csaszar <pcsaszar@google.com>
Change-Id: I5ec50d9ff7cd0e08ade7acce21e73751e93a0aff
2022-02-17 12:31:09 -08:00
Alex Hong
9cc70410c5
Add required sepolicy rules for Camera function
...
Bug: 218499972
Test: Switch to Enforcing mode
Take a picture, camera recording
Change-Id: I57f3e8454ece6906624f028b7a3771ffddcaa963
2022-02-11 03:26:56 +00:00
Denny cy Lee
92d0030e6a
hardwareinfo: add sepolicy for SoC
...
Bug: 208721710
Test: search avc in logcat
Change-Id: I3828d39981666db98e6a34aa70ae39b7f126e495
Signed-off-by: Denny cy Lee <dennycylee@google.com>
2022-02-08 03:33:06 +00:00
Darren Hsu
89f14a9496
sepolicy: allow PowerStats HAL to access below sysfs
...
aoc, acpm_stats, cpu, edgetpu, iio_devices, odpm, wifi and ufs
(All avc logs are listed in b/207598247#comment2)
Bug: 207062210
Bug: 207571335
Bug: 207720720
Bug: 207598247
Test: dump power stats with no relevant avc error
Change-Id: I9c99af2d06461a2f86ef02d76b3aa8ea669e58e9
Signed-off-by: Darren Hsu <darrenhsu@google.com>
2022-01-24 02:05:11 +00:00
Adam Shih
f56dba1b24
be able to dump CPU info
...
Bug: 208721677
Bug: 208909124
Test: do adb bugreport with no relevant error log
Change-Id: I14abe138b6ad4a842edb143318cc5d867d575ec3
2022-01-20 14:11:25 +08:00
Adam Shih
36dc06e08a
be able to dump debugfs info
...
Bug: 208721677
Bug: 208909124
Test: do adb bugreport with no relevant error log
Change-Id: I4f7fc7a8f0029f1c1f398403d938bd6b7b96a43e
2022-01-20 11:12:06 +08:00
linpeter
72dc78222f
update display sepolicy
...
Bug: 205073165
Bug: 205656937
Bug: 205779906
Bug: 205904436
Bug: 207062172
Bug: 208721526
Bug: 204718757
Bug: 205904380
Bug: 213133646
test: check avc denied with hal_graphics_composer_default, hbmsvmanager_app
Change-Id: I964a62fa6570fd9056b420efae7bf2fcbbe9fc9f
2022-01-12 08:10:50 +00:00
Shiyong Li
a781d5020b
consolidate display sysfs nodes into one context
...
Bug: 209890345
Bug: 209705194
Test: check selinux denial info
Signed-off-by: Shiyong Li <shiyongli@google.com>
Change-Id: I208f84caf0cbcd18bb3da8004362e6f996cbaba5
2022-01-05 01:31:58 +00:00
chungkai
7fe7e43582
Fix avc denials for powerhal
...
Test: build pass
Bug: 208909174
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: I565df75c22d66199e6966dfac4af2e19b88606a0
2022-01-03 03:32:01 +00:00
Krzysztof Kosiński
deb9d361cd
Add sepolicy for camera persist files.
...
Bug: 208866457
Test: Verified label for /mnt/vendor/persist/camera on P10
Change-Id: Id4af051ea2e783bed7cabfd2be80bdac994a11ab
2021-12-10 01:39:26 +00:00
Robb Glasser
3dad021ae8
Fix sensors hal selinux denials on C10.
...
Bug: 205657063
Bug: 205780093
Bug: 204718449
Bug: 205904379
Bug: 207721033
Bug: 207062541
Bug: 208909175
Test: SELinuxTest#scanAvcDeniedLogRightAfterReboot on C10
Change-Id: I678ac355fc09da56bc7718c4d70fb40d4cd79de0
2021-12-08 00:53:52 +00:00
wenchangliu
81fb5ecc31
Allow mediacodec_samsung to access mfc sysfs file
...
avc: denied { read } for name="name" dev="sysfs" \
ino=61284 scontext=u:r:mediacodec_samsung:s0 \
tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
avc: denied { open } for \
path="/sys/devices/platform/mfc/video4linux/video6/name" \
dev="sysfs" ino=61284 scontext=u:r:mediacodec_samsung:s0 \
tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
avc: denied { getattr } for \
path="/sys/devices/platform/mfc/video4linux/video6/name" \
dev="sysfs" ino=61284 scontext=u:r:mediacodec_samsung:s0 \
tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
Bug: 204718809
Test: video playback / camera recording
Change-Id: I95c937375aa7ae19aef61af6b0f1aef73bd8957d
2021-11-25 02:29:04 +00:00
George Chang
3dc2515efe
Update SecureElement sysfs_st33spi Sepolicy
...
Add rules for sysfs_st33spi
Bug: 205250948
Test: check avc without secure_element
Change-Id: I1ccf39ca09c6b19a597114f04803800d38fdf774
2021-11-23 11:40:16 +00:00
Rex Lin
d6f5c71db9
Uwb: Create a new Uwb system service
...
inherit from gs101-sepolicy
Signed-off-by: Rex Lin <rexcylin@google.com>
Bug: 201232020
Test: ranging works
Change-Id: I0567e6bda78a94c12da3401444faffb36586f331
2021-10-29 12:43:07 +08:00
Adam Shih
503d402cb2
review the rest of file declaration
...
Bug: 203025336
Test: build pass
Change-Id: I330a8dd46bdf6b731d4f7f61544e1d1f1e59876c
2021-10-18 12:01:13 +08:00
Adam Shih
37e4973df6
review file declaration
...
Bug: 203025336
Test: build pass
Change-Id: I8cfec54ac035f41ccafc58f1ec0b125613e0742b
2021-10-18 10:31:31 +08:00
Adam Shih
e5b1c96b00
review genfs_contexts besides bluetooth
...
Bug: 203025336
Test: check each path's existence
Change-Id: I0b45434f544fb243bd2810ea7abdb896056aed0e
2021-10-15 03:45:59 +00:00
Adam Shih
37a0cb7547
review sys file nodes
...
Bug: 203025336
Test: check if the paths exist
Change-Id: I5141545211e19d3c18b2c3bb315c10d33d5e3774
2021-10-15 03:45:59 +00:00
Adam Shih
cf06f9ccbf
review proc, tracefs, and system_suspend nodes
...
Bug: 203025336
Test: check if each file path exists
Change-Id: I980742978599c162a6c0d09fa2a3a07d97434981
2021-10-15 03:45:59 +00:00
Adam Shih
0b4e85afe7
review debugfs
...
Bug: 203025336
Test: Boot to home with those files labeled
Change-Id: Ibe758555512417953eb9726bdba05c4ac2ff2ccf
2021-10-14 13:57:18 +08:00
Adam Shih
0b42f3ba82
review file_contexts
...
Bug: 203025336
Test: boot to home and check if the files are there
Change-Id: I2b748b18cca389d7fdd8b1b472dcb1605e0ddaaa
2021-10-14 13:34:33 +08:00
Adam Shih
618ea304d4
review tcpdump_logger
...
Bug: 201599426
Test: boot with tcpdump_logger started
Change-Id: I023f48ea45b8d5a2180c91577241e9d9410469a4
2021-09-30 14:40:10 +08:00
Adam Shih
5ec277bf7c
review hal_wifi
...
Bug: 201599426
Test: boot to home
Change-Id: I05538169275a7e8dc7638e075114440abda8c11b
2021-09-30 11:13:35 +08:00
Adam Shih
7ac4d6ae8c
review hal_power_stats_default
...
Bug: 201230944
Test: make sure all file contexts took effect
Change-Id: Ifefb09f69b722747ccbb1c8cfbd423b27204e4e4
2021-09-28 14:42:35 +08:00
Adam Shih
758dd9c309
review hal_power_default related contexts
...
Bug: 201230944
Test: make sure all contexts setting take effect
Change-Id: I1e3be99700560583153e70efdd21de5356b97c74
2021-09-28 13:54:03 +08:00
Adam Shih
ad68e7dc96
remove hal_health_default
...
It will be easier to review it through boot test
Bug: 201230944
Test: boot to home
Change-Id: I5008c4054ce04f062a8ca01a1e2bfd4cfe8daf70
2021-09-28 08:04:38 +08:00
Adam Shih
948098bcd6
review hal_radioext_default
...
Bug: 198532074
Test: boot with hal_radioext_default started
Change-Id: I083fd55749f0d82cabe527e7fa611ad2633d0ecd
2021-09-08 10:54:34 +08:00
Adam Shih
98ebd6e7f1
review tee
...
Bug: 198723116
Test: boot with tee started
Change-Id: Ib50698834d16887fa00bdbbaf81801f1067909ba
2021-09-03 15:26:51 +08:00
Adam Shih
18fb79d460
review rild
...
Bug: 198532074
Test: boot with rild started
Change-Id: Ic29d2cbbb9691f1386c024d1438fdd050ef14b8f
2021-09-03 15:25:10 +08:00
Adam Shih
ff91ffd98a
review rfsd
...
Bug: 198532074
Test: boot with rfsd started
Change-Id: I183c75b5fad35eec56fbca693896c94f7a1ca410
2021-09-02 14:48:13 +08:00
Adam Shih
a90c8fe1b5
review bootdevice_sysdev
...
Bug: 196916111
Test: boot with bootdevice_sysdev labeled
Change-Id: I938fe18718356bf4156bb55937528a1ca3e072fb
2021-09-02 13:24:46 +08:00