Eileen Lai
c2660d9ba4
modem_svc: use shared_modem_platform to replace all modem_svc_sit
...
Bug: 368257019
Flag: NONE local testing only
Change-Id: I9a9ff83d2bf3cf55b4c8806d808efde03ca2de70
2024-10-09 08:34:45 +00:00
Randall Huang
a73414799e
storage: move storage related device type to common folder
...
Bug: 364225000
Test: forrest build
Change-Id: I60597a3ad6f674b93267f41b3a27fdee6e923e59
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-04 10:44:21 +08:00
Xiaofan Jiang
390674b749
Merge "Revert^2 "zuma: update modem_svc sepolicy for UMI"" into main
2024-08-15 20:44:27 +00:00
Xiaofan Jiang
515a102ac8
Revert^2 "zuma: update modem_svc sepolicy for UMI"
...
c653101290
Change-Id: Ib1d18e33b87f03ee52bcbdff129c6d56b8a63a61
2024-08-15 19:25:35 +00:00
Priyanka Advani (xWF)
61ddb69d2c
Merge "Revert "zuma: update modem_svc sepolicy for UMI"" into main
2024-08-15 18:30:35 +00:00
Priyanka Advani (xWF)
c653101290
Revert "zuma: update modem_svc sepolicy for UMI"
...
Revert submission 28762313
Reason for revert: Droidmonitor created revert due to b/360059249.
Reverted changes: /q/submissionid:28762313
Change-Id: I88cd8603351f5c5e1a546872f4f3aa1cae75dcd5
2024-08-15 16:14:57 +00:00
Xiaofan Jiang
dac2c5438b
Merge "zuma: update modem_svc sepolicy for UMI" into main
2024-08-15 04:01:13 +00:00
Xiaofan Jiang
08b3cf20a7
zuma: update modem_svc sepolicy for UMI
...
Bug: 357139752
Flag: EXEMPT sepolicy
[ 68.189198] type=1400 audit(1722986580.568:59): avc: denied { unlink } for comm="binder:892_2" name="modem_svc_socket" dev="dm-52" ino=20239 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=1
[ 68.189448] type=1400 audit(1722986580.568:60): avc: denied { create } for comm="binder:892_2" name="modem_svc_socket" scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=sock_file permissive=1
Change-Id: I7cccb22ef31e88eebae664dcd937553c7ed9428f
2024-08-15 03:53:07 +00:00
Mike Wang
a689f70d3c
Merge "Add the selinux policy to allow the gril get/set vendor log properties." into main
2024-07-26 01:15:34 +00:00
Mike Wang
ef8937f64c
Add the selinux policy to allow the gril get/set vendor log properties.
...
avc logs:
2024-07-17 06:00:41.024 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:96): avc: denied { read } for name="u:object_r:vendor_logger_prop:s0" dev="tmpfs" ino=416 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_logger_prop:s0 tclass=file permissive=0 app=com.google.android.grilservice
2024-07-17 06:00:41.024 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:97): avc: denied { read } for name="u:object_r:vendor_modem_prop:s0" dev="tmpfs" ino=418 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_modem_prop:s0 tclass=file permissive=0 app=com.google.android.grilservice
2024-07-17 06:00:49.592 8674-8674 binder:8674_1 com.google.android.grilservice W type=1400 audit(0.0:99): avc: denied { write } for name="property_service" dev="tmpfs" ino=861 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0 app=com.google.android.grilservice
2024-07-17 16:46:54.748 1-1 /system/bin/init init I type=1107 audit(0.0:103): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.verbose_logging_enabled pid=2152 uid=10238 gid=10238 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_logger_prop:s0 tclass=property_service permissive=1'
2024-07-17 16:49:33.256 1-1 /system/bin/init init I type=1107 audit(0.0:116): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.modem.extensive_logging_enabled pid=2152 uid=10238 gid=10238 scontext=u:r:grilservice_app:s0:c238,c256,c512,c768 tcontext=u:object_r:vendor_modem_prop:s0 tclass=property_service permissive=1'
Bug: 293947661
Change-Id: Iec1cc221a543543da28416a5bc7d7ddacde959c5
2024-07-17 20:23:43 +00:00
Aaron Tsai
489a6e7843
Add permission for setting gril property
...
05-22 18:20:50.608 914 914 I auditd : type=1400 audit(0.0:97): avc: denied { write } for comm="radioext@1.0-se" name="property_service" dev="tmpfs" ino=849 scontext=u:r:hal_radioext_default:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
Bug: 343012301
Bug: 203824024
Test: manual test
Flag: EXEMPT bugfix
Change-Id: Ic08a1e1c6a0db29e329f121c813bebadbee5a5e9
2024-07-12 03:17:06 +00:00
Kelvin Zhang
667f2a4670
Allow copy_efs_files_to_data to read efs block devices
...
Previously, we rely on mount points to copy files out of
efs partitions. Switch over to dump.f2fs to read directly
from block device without mounting. This allows us to copy
files out of efs partition in both 4K and 16K mode.
Test: Boot ext4 device with dev option enabled
Bug: 340965747
Change-Id: Ie3108319cfdb5d922a18863de7431c3cfcc4cf16
2024-06-04 16:49:42 -07:00
Kelvin Zhang
be41aa688e
Reland: Add necessary sepolicy for convert_modem_to_ext4
...
The original CL was reverted because it references
enable_16k_pages_prop, which is only available on board API level >
202504.
This reland removes enable_16k_pages_prop usage, and worked around it by
reading PRODUCT_16K_DEVELOPER_OPTION at build time.
Test: reformat data as ext4, reboot
Bug: 293313353
Change-Id: Ibd8f57d1ef4fd2b0fd8b4170153d57fe9a9cefc2
2024-05-07 13:24:15 -07:00
Kadi Narmamatov
99c5c3dc9e
Merge "rsfd: add get_prop for cbd property" into main
2024-04-15 07:36:23 +00:00
kadirpili
22844d59ca
rsfd: add get_prop for cbd property
...
Bug: 323086582
Test: flash ROM and check for rfsd sepolicy logs
Change-Id: I6f8c555614386fda784b4532a4b004d5fe857bc6
2024-04-10 05:52:54 +00:00
Enzo Liao
df85139d17
Move SELinux policies of RamdumpService and SSRestartDetector to /gs-common.
...
New paths (ag/26620507):
RamdumpService: device/google/gs-common/ramdump_app
SSRestartDetector: device/google/gs-common/ssr_detector_app
Bug: 298102808
Design: go/sys-software-logging
Test: Manual
Change-Id: Id42c4de6c29d4a95f8a68a5732c4732edfb71da8
2024-04-08 19:21:13 +08:00
Mike Wang
aa7749fb7b
Merge "Add the selinux policy for MDS to access modem_state file" into main
2024-03-29 15:16:19 +00:00
mikeyuewang
6546398c27
Add the selinux policy for MDS to access modem_state file
...
Add the selinux policy for MDS to access modem_state file
avc deny:
2024-03-25 16:05:58.244 9667-9667 DiagnosticServi com.google.mds I type=1400 audit(0.0:14): avc: denied { read } for name="modem_state" dev="sysfs" ino=76870 scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.mds
2024-03-25 16:05:58.244 9667-9667 DiagnosticServi com.google.mds I type=1400 audit(0.0:15): avc: denied { open } for path="/sys/devices/platform/cpif/modem_state" dev="sysfs" ino=76870 scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.mds
2024-03-25 16:05:58.244 9667-9667 DiagnosticServi com.google.mds I type=1400 audit(0.0:16): avc: denied { getattr } for path="/sys/devices/platform/cpif/modem_state" dev="sysfs" ino=76870 scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.mds
Bug: 331202327
Change-Id: I5e0088d274bc4f45010a19631ecbaece7cc3cc42
2024-03-28 20:28:10 +00:00
Megha Patil
c8c92bd593
Sepolicy for the new property to switch Modem Binary
...
Sepolicy Rules added for telephony.TnNtn.image_switch
BUG: b/298322438
Bug: 323087490
Test: Test Binding sequence of Service
Change-Id: Ie79aff94159d79a573ec92546a5d3e390b802b22
2024-03-26 08:44:51 +00:00
Hungyen Weng
1db18cf4b3
Allow modem_svc to access modem files and perfetto
...
Bug: 330730987
Test: Confirmed that modem_svc is able to access token db files in modem partition
Test: Confiemed that modem_svc can send traces to perfetto
Change-Id: Ic8b724e0e8d72f5ead83e75ab85471bcbdaf8749
2024-03-22 00:29:41 +00:00
Kadi Narmamatov
0d82eda10f
Merge "Revert "rfsd: add new property to sepolicy"" into main
2024-01-30 08:36:00 +00:00
Kadi Narmamatov
aef38ed6a7
Revert "rfsd: add new property to sepolicy"
...
Revert submission 25709311-rfsd-efs-erase
Reason for revert: we don't need it for this repo, only for pro
Reverted changes: /q/submissionid:25709311-rfsd-efs-erase
Bug: 315104803
Change-Id: I54e24ae99087b102c1a2f677ce4a7b2cad670992
2024-01-30 07:02:22 +00:00
kierancyphus
0cdeda46b2
liboemservice_proxy: Update sepolicy to hal
...
This was wrongly configured originally, and has instead been modified to
follow the advice from
https://source.android.com/docs/core/architecture/aidl/aidl-hals#sepolicy .
Test: atest vts_treble_vintf_vendor_test:DeviceManifest/SingleAidlTest
Bug: 321867236
Change-Id: I75df4696660b2c052324313785b244c263ebd75b
2024-01-25 17:51:51 +08:00
Nicole Lee
728e6baa64
Allows modem_svc to read the logging related properties
...
avc: denied { read } for comm="modem_svc_sit" name="u:object_r:vendor_logger_prop:s0" dev="tmpfs" ino=387 scontext=u:r:modem_svc_sit:s0 tcontext=u:object_r:vendor_logger_prop:s0 tclass=file permissive=0
Bug: 316250607
Change-Id: If1942986a0804e24b13c021740f7df8f406e53c2
2024-01-02 08:50:36 +00:00
Chi Zhang
f965c0b222
Merge "Allow GRIL to get power stats." into main
2023-12-22 19:29:06 +00:00
kadirpili
5c28db1f6b
rfsd: add new property to sepolicy
...
Bug: 307481296
Change-Id: Icd287f863fd6d309297ce984f4ce387fb5d3ae24
2023-12-20 07:27:32 +00:00
Chi Zhang
a2e8969139
Allow GRIL to get power stats.
...
SELinux : avc: denied { find } for pid=3147 uid=10219 name=android.hardware.power.stats.IPowerStats/default scontext=u:r:grilservice_app:s0:c219,c256,c512,c768 tcontext=u:object_r:hal_power_stats_service:s0 tclass=service_manager permissive=1
Bug: 286187143
Test: build and boot
Change-Id: I6df25e78ba8fa8efaa7f51aed8e981ac382dcd29
2023-12-19 12:22:08 -08:00
Mike Wang
96bac14cb1
Change the MDS to platform app in selinux ap context.
...
The MDS will be signed with platform key and become a platform app. To
make the selinux rules for modem_diagnostic_app work, need to set it to
platform app in app context.
Bug: 287683516
Test: Tested with both dev key or platform key signed MDS apps and the selinux rules works.
Change-Id: I375f57537a81514d3a6230ca042a4407accd6c15
2023-11-08 04:01:26 +00:00
mikeyuewang
b066861a22
Add selinux policy change to allow MDS access Samsung OemRil hal.
...
Bug: 301641283
selinux log:
11-03 15:32:38.850 2643 2643 I auditd : type=1400 audit(0.0:1616): avc: denied { call } for comm="binder:2643_3" scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:r:rild:s0 tclass=binder permissive=1 app=com.google.mds
11-03 15:32:38.850 2643 2643 I binder:2643_3: type=1400 audit(0.0:1616): avc: denied { call } for scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:r:rild:s0 tclass=binder permissive=1 app=com.google.mds
11-03 15:32:38.854 2643 2643 I auditd : type=1400 audit(0.0:1617): avc: denied { transfer } for comm="binder:2643_3" scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:r:rild:s0 tclass=binder permissive=1 app=com.google.mds
11-03 15:32:38.854 2643 2643 I binder:2643_3: type=1400 audit(0.0:1617): avc: denied { transfer } for scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:r:rild:s0 tclass=binder permissive=1 app=com.google.mds
11-03 15:32:38.854 1095 1095 I auditd : type=1400 audit(0.0:1618): avc: denied { call } for comm="HwBinder:1095_1" scontext=u:r:rild:s0 tcontext=u:r:modem_diagnostic_app:s0:c512,c768 tclass=binder permissive=1
11-03 15:32:38.854 1095 1095 I HwBinder:1095_1: type=1400 audit(0.0:1618): avc: denied { call } for scontext=u:r:rild:s0 tcontext=u:r:modem_diagnostic_app:s0:c512,c768 tclass=binder permissive=1
Change-Id: Ia71844db230302fd3120b28b3ade2e55443ec078
2023-11-03 07:42:38 +00:00
Mike Wang
bb474d5e68
Merge "Grant the MDS access to the IPowerStats hal service." into udc-qpr-dev am: fd78823dfa
am: 7eafbc0be0
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zuma-sepolicy/+/24610375
Change-Id: Ic1bc4799d21df9a120946241f5bf278a1be6e12c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-10-05 17:13:10 +00:00
Jing Wang
e853c1919d
Revert "Add vendor_sjtag_lock_state_prop and init-check_ap_pd_au..."
...
Test: Revert submission 24754347-zuma-etm2dram
Reason for revert: b/302352974
Reverted changes: /q/submissionid:24754347-zuma-etm2dram
Bug: 302352974
Change-Id: I251c3a62c79722a9050bdbce85dc758fc4b6fda9
2023-09-29 01:25:27 +00:00
mikeyuewang
1ee598d5d2
Grant the MDS access to the IPowerStats hal service.
...
ref logs:
09-06 10:07:18.006 536 536 I auditd : avc: denied { find } for pid=22543 uid=10225 name=android.hardware.power.stats.IPowerStats/default scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:object_r:hal_power_stats_service:s0 tclass=service_manager permissive=1
09-06 10:07:18.010 22543 22543 I auditd : type=1400 audit(0.0:65): avc: denied { call } for comm="pool-4-thread-1" scontext=u:r:modem_diagnostic_app:s0:c512,c768 tcontext=u:r:hal_power_stats_default:s0 tclass=binder permissive=1 app=com.google.mds
Test: Tested with MDS app and the MDS can get IPowerStats binder and
call the interface.
Bug: 297250368
Change-Id: I7b0eeabdafb49eb33d8016666f9c02f2616f898d
2023-09-28 15:22:00 +00:00
Woody Lin
9687d162bc
Add vendor_sjtag_lock_state_prop and init-check_ap_pd_auth-sh
...
1. Add init-check_ap_pd_auth-sh for the vendor daemon script
`/vendor/bin/init.check_ap_pd_auth.sh`.
2. Add policy for properties `ro.vendor.sjtag_{ap,gsa}_is_unlocked` for
init, init-check_ap_pd_auth-sh and ssr_detector to access them.
SjtagService: type=1400 audit(0.0:1005): avc: denied { open } for path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=379 scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
SjtagService: type=1400 audit(0.0:1006): avc: denied { getattr } for path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=379 scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
SjtagService: type=1400 audit(0.0:1007): avc: denied { map } for path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=379 scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
SjtagService: type=1400 audit(0.0:1008): avc: denied { write } for name="property_service" dev="tmpfs" ino=446 scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=1
SjtagService: type=1400 audit(0.0:1009): avc: denied { connectto } for path="/dev/socket/property_service" scontext=u:r:ssr_detector_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1
Bug: 299043634
Change-Id: I6b2abf69fca9b4765f2dfb7ed82e6546159e96e9
2023-09-14 10:48:08 +08:00
Treehugger Robot
216f86b0c2
Merge "audio: move related sepolicy of audio to gs-common" into udc-qpr-dev am: 4bb847b815
am: 207188241d
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zuma-sepolicy/+/24585767
Change-Id: Ia622fbf9e355e3e04e4dd732776d30657b02ff2d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-08-30 18:24:30 +00:00
Jasmine Cha
8fb992eacb
audio: move related sepolicy of audio to gs-common
...
Bug: 297482504
Test: build pass
Change-Id: I9444b9e63f32bf898c845e42edbf682798bce300
Signed-off-by: Jasmine Cha <chajasmine@google.com>
2023-08-29 16:45:47 +08:00
Kieran Cyphus
68fae0f171
Merge "DMD MDS: register proxy service and update MDS policy." into main
2023-08-28 01:42:43 +00:00
kierancyphus
9c6ec7fdd9
DMD MDS: register proxy service and update MDS policy.
...
MDS is a privileged app which get its permissions from `privapp-permissions-google-product.xml`, however, part of this work requires custom SEPolicy and so those permissions have been translated in SEPolicy.
This is a copy of 022dd13252865e131127da6596f5ada71fbf104f (ag/23056498) which can't be cherry picked because it was previously merged and reverted on main.
Test: Manually flash device
Bug: 270279779
Change-Id: If93515aa6b37bcbe8ec34241da1fa144d61e3d5d
2023-08-22 06:41:36 +00:00
Nicole Lee
3c5d001e7d
Add rules for letting logger app send the command to ril
...
avc: denied { find } for interface=vendor.samsung_slsi.telephony.hardware.radioExternal::IOemSlsiRadioExternal sid=u:r:logger_app:s0:c3,c257,c512,c768 pid=3217 scontext=u:r:logger_app:s0:c3,c257,c512,c768 tcontext=u:object_r:hal_exynos_rild_hwservice:s0 tclass=hwservice_manager permissive=0
Bug: 293351399
Test: Verify SetDebugTrace funciton on p23
Change-Id: I1e51954886a7ea8bf5d31213634d4df34619eb33
2023-08-18 07:59:11 +00:00
Hsin-Yi Chen
f4b5074d48
Revert "DMD MDS: register proxy service and update MDS policy."
...
This reverts commit 2f5496582d
.
Bug: 296329753
Reason for revert: broken build
Change-Id: I9336cebf8d4947450f5d3e2f0ec4df839aca3574
2023-08-18 07:40:37 +00:00
kierancyphus
2f5496582d
DMD MDS: register proxy service and update MDS policy.
...
MDS is a privileged app which get its permissions from `privapp-permissions-google-product.xml`, however, part of this work requires custom SEPolicy and so those permissions have been translated in SEPolicy.
Test: Manually flash device
Bug: 270279779
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:022dd13252865e131127da6596f5ada71fbf104f )
Merged-In: I47c1a1163a7d40089d36960ed11822505a7a0a7a
Change-Id: I47c1a1163a7d40089d36960ed11822505a7a0a7a
2023-08-14 02:10:34 +00:00
Cheng Chang
cd3d87535f
gps: maintain one solution
...
Bug: 288813677
Test: compile for different devices and check binary.
Test: verification test at b/288813677.
Change-Id: I7ee13ab2641aee0256d4ddb5ba27070b51dbc5e5
2023-07-31 02:26:40 +00:00
Samuel Huang
0166c5fe0a
Revert "Revert "Create telephony.ril.silent_reset system_ext pro..."
...
Revert submission 23817868-revert-23736941-tpsr-ril-property-WQVGKEVBKX
Reason for revert: The root cause is missing property definition in gs101-sepolicy. This CL can be merged safely. Verified by abtd run: https://android-build.googleplex.com/builds/abtd/run/L48900000961646046
Reverted changes: /q/submissionid:23817868-revert-23736941-tpsr-ril-property-WQVGKEVBKX
Bug: 286476107
Change-Id: I6dde24447cb7caae0bf35d8b0342985e8c2f434a
2023-06-28 10:28:24 +00:00
Sebastian Pickl
a14eb4e6b5
Revert "Create telephony.ril.silent_reset system_ext property fo..."
...
Revert submission 23736941-tpsr-ril-property
Reason for revert: culprit for b/289014054 verified by abtd run: https://android-build.googleplex.com/builds/abtd/run/L54800000961620143
Bug: 289014054
Reverted changes: /q/submissionid:23736941-tpsr-ril-property
Change-Id: I6bd6b1e890fa77140d2d0e33ce6ae8a8a03e16f6
2023-06-27 10:05:32 +00:00
Samuel Huang
1f2933970f
Create telephony.ril.silent_reset system_ext property for RILD restart
...
RILD listens for changes to this property. If the value changes to 1, RILD will restart itself and set this property back to 0.
The TelephonyGoogle app will set this property to 1 when it receives a request from the SCONE app. Since TelephonyGoogle runs in the com.android.phone process, we also need to give the radio domain permission to set the telephony.ril.silent_reset property.
Bug: 286476107
Test: manual
Change-Id: I5ee72c7ab8e0bce75bbb23b676f515cabe40ed23
2023-06-21 06:34:55 +00:00
Mahesh Kallelil
1f885d0bcd
Allow dump_modem to read logbuffer and wakeup events
...
Updating sepolicy for dump_modem to read /dev/logbuffer_cpif. This is
required as part of bugreport.
Test: Tested bugreport on P23
Bug: 278501642
Change-Id: I102583e37ec2e3852fd901a75bbb06de9ac6f77c
Signed-off-by: Mahesh Kallelil <kallelil@google.com>
2023-05-09 00:20:07 -07:00
Ted Wang
8831352474
Add sepolicy for aidl bt extension hal
...
Bug: 274906319
Test: build pass and manual test
Change-Id: Id54796fec22e790a197255f2db4ba23b4a58212d
2023-04-28 04:48:33 +00:00
Wilson Sung
e4e854fcd9
Add Ims process label
...
Bug: 260522282
Test: boot-to-home, no avc error
Change-Id: I8f3c7c64ecace4ca7ddd69275a093606a8492204
2023-04-21 03:38:17 +00:00
kadirpili
92636953cf
zuma: Allow GRIL Service to access radio_vendor_data_file
...
Bug: 274737512
Change-Id: I90c008172af7bd0d8b7bf2b214f422c4165f3769
(cherry picked from commit 5c31a6f55ac18dd941e50b455c38a37efa12354f)
2023-04-20 03:37:22 +00:00
Wilson Sung
ab9b7f7609
Label ims_remote_app and rcs_service_app
...
Bug: 260522282
Change-Id: I4bf27e30eda51794d2047da9ca17044632ec3786
2023-04-20 00:13:52 +08:00
Kah Xuan Lim
6e8c79e7db
Modem ML: Grant access to modem ML data dir
...
Bug: 229801544
Change-Id: Ia2e9c5a48ad935a49f3b8a9c6bceae3f4f833b4e
2023-04-12 08:48:57 +00:00