Board tree for Google Tensor G3 devices
Find a file
Cody Heiner dc0b4fc9e9 Allow twoshay → systemui_app binder call for zuma devices (2)
Splitting system_app (b/264266705) caused the avc denial below,
causing b/269981541. This change allows the denied binder call
and fixes the bug.

Denial message:
avc: denied { call } for scontext=u:r:twoshay:s0 tcontext=u:r:systemui_app:s0:c230,c256,c512,c768 tclass=binder permissive=0

Note: this is a re-submit of ag/21529713, after sorting out the
SEPolicy issues described in b/270444888.

Test: flash P23 and Bluejay devices with this change plus ag/21591673,
  run `adb shell device_config put twoshay_native test_flag_name test_flag_value`,
  → TouchContextService.java logs corresponding property changed message.

Bug: 270444888

Change-Id: I40d70cf19930eb334ba3250d58a0cbc39b50764b
2023-02-24 18:19:09 -08:00
legacy Move HWC dump to gs-common 2023-02-22 13:55:50 +08:00
private sepolicy: label required wakeup nodes for system suspend 2023-02-07 10:12:30 +08:00
radio modem_svc_sit: grant modem property access 2023-02-20 11:04:11 +00:00
system_ext/private zuma: fingerprint: fix SELinux denails 2022-12-23 17:43:50 +08:00
tracking_denials Add SSR property access and remove obsolete denials 2023-02-24 10:33:45 +00:00
vendor Allow twoshay → systemui_app binder call for zuma devices (2) 2023-02-24 18:19:09 -08:00
widevine Branch zuma from gs201 2022-04-19 14:10:58 +08:00
bug_map Update error on ROM 9558720 2023-02-07 11:29:45 +08:00
OWNERS Branch zuma from gs201 2022-04-19 14:10:58 +08:00
zuma-sepolicy.mk sepolicy: Allow hal_power_stats to access required sysfs 2022-12-29 14:33:17 +08:00