Jeremy Nei
1cc3b8e59b
display/hwc: Add write access to persist display file.
...
12-06 21:50:44.540 466 466 W vndbinder:466_2: type=1400 audit(0.0:186): avc: denied { write } for name="factory_c
al0.pb" dev="sda1" ino=40 scontext=u:r:hal_graphics_composer_default:s0 tcontext=u:object_r:persist_display_file:s0 tcla
ss=file permissive=0
Bug: 369456857
Test: adb shell displaycolor_service 20000
Flag: EXEMPT not applicable
Change-Id: I97a1d8e701d02d37e7d3be80a92d311948863536
2024-12-16 06:11:35 +00:00
Roy Luo
20707fd77f
Add udc sysfs to udc_sysfs fs context
...
Meeded for system server to monitor usb gadget state.
Grant hal_usb_impl read access as it's needed by UsbDataSessionMonitor.
Starting at board level api 202504 due to its dependency on aosp/3337514
10956 10956 W android.hardwar: type=1400 audit(0.0:327): avc: denied { read } for name="state" dev="sysfs" ino=84394 scontext=u:r:hal_usb_impl:s0 tcontext=u:object_r:sysfs_udc:s0 tclass=file permissive=0
Bug: 339241080
Test: tested on Tokay
Flag: android.hardware.usb.flags.enable_udc_sysfs_usb_state_update
Change-Id: Iab79eec9a836d70792dfaa64eb24a5c013dc85aa
2024-12-09 13:21:14 +00:00
Jeremy Nei
1f96101a5e
Merge "port display sysfs access" into main
2024-12-09 07:40:27 +00:00
Dinesh Yadav
4814233812
Merge "Allow tachyon service to make binder calls to GCA" into main
2024-12-06 16:20:42 +00:00
Dinesh Yadav
1e5b6fb9eb
Allow tachyon service to make binder calls to GCA
...
This permission is needed for tachyon service to call callbacks.
AVC Error seen when tachyon tries accessing GCA:
12-02 11:40:03.212 6987 6987 W com.google.edge: type=1400 audit(0.0:17): avc: denied { call } for scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:google_camera_app:s0:c145,c256,c512,c768 tclass=binder permissive=0
12-03 07:12:26.424 4166 4166 W com.google.edge: type=1400 audit(0.0:254): avc: denied { call } for scontext=u:r:edgetpu_tachyon_server:s0 tcontext=u:r:debug_camera_app:s0:c67,c257,c512,c768 tclass=binder permissive=0
Bug: 381787911
Flag: EXEMPT updates device sepolicy only
Change-Id: Iaa61d70cdffb75024c497482f4c0a6cab493bec3
2024-12-06 04:07:23 +00:00
Joner Lin
07c6dcc88f
Merge "allow hal_bluetooth_btlinux write sysfs file" into main
2024-12-05 05:12:18 +00:00
jonerlin
a9b6884b3a
allow hal_bluetooth_btlinux write sysfs file
...
12-04 19:32:23.040000 1002 784 784 I auditd : type=1400 audit(0.0:30): avc: denied { write } for comm="binder:784_2" name="uart_dbg" dev="sysfs" ino=60136 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sysfs_bt_uart:s0 tclass=file permissive=0
12-04 19:32:23.040000 1002 784 784 W binder:784_2: type=1400 audit(0.0:30): avc: denied { write } for name="uart_dbg" dev="sysfs" ino=60136 scontext=u:r:hal_bluetooth_btlinux:s0 tcontext=u:object_r:sysfs_bt_uart:s0 tclass=file permissive=0
Bug: 376774204
Test: v2/pixel-pts/release/bootstress/1200counts/suspend-resume
Flag: EXEMPT project configuration patch
Change-Id: I6c1a28d0e5e22b03b088d64d550fd475d796ae67
2024-12-05 02:41:13 +00:00
Jeremy Nei
c22f870169
port display sysfs access
...
Adds color_data access to sysfs_display
Bug: 369456857
Test: adb shell displaycolor_service 20000
Flag: EXEMPT N/A
Change-Id: Id2a00d138daad44d7135d5bd5652b128c1c63e46
2024-12-04 09:26:21 +00:00
Jack Wu
57bf47fc5c
add permission for hl7132 sysfs
...
Bug: 381457533
Test: adb bugreport
Flag: EXEMPT bugfix
Change-Id: I640957b4834e35f0c3aa9d3cd789865eff019dd3
Signed-off-by: Jack Wu <wjack@google.com>
2024-11-29 12:41:11 +08:00
Boon Jun
78eaa18cf3
Support access to radioext service over AIDL
...
11-13 17:08:24.418 396 396 E SELinux : avc: denied { find } for pid=15273 uid=1000 name=vendor.google.radio_ext.IRadioExt/default scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:hal_radio_ext_service:s0 tclass=service_manager permissive=0
Bug: 377991853
Bug: 371878208
Test: Open camera & observe connection to radio
Flag: EXEMPT bugfix
Change-Id: I1c53381f2aef1def44f7a717a9998acc826fe6aa
2024-11-20 10:30:05 +00:00
Joen Chen
233610e6a4
correct frame_interval_ns and expected_present_time_ns naming
...
Bug: 378992900
Flag: EXEMPT bugfix
Test: scrolling/rotate phone and check if there is error log
Change-Id: I927a490cb25b3d3f69bed4d62da80b66de1ad430
2024-11-14 06:13:26 +00:00
Spade Lee
f8891af46e
sepolicy: add label for logbuffer
...
- Add logbuffer_device label for ln8411, dc_mains, dual_batt
- Remove from tracking_deniel
Bug: 377895720
Flag: EXEMPT bugfix
Change-Id: Ia542c089bcf0eb6bb4ea3e026d43937390720b22
Signed-off-by: Spade Lee <spadelee@google.com>
2024-11-12 01:46:58 +00:00
cwkao
f1471f5d65
Share same seinfo between propsetter app and GCA.
...
Bug: 375117470
Test: locally on komodo, the app functions as expected.
Flag: EXEMPT NDK
Change-Id: I60a6047835b23137391e3bd6edcfd1fb418a3e19
2024-10-23 16:58:52 +00:00
Thiébaud Weksteen
8b8ae291d4
Merge "Remove duplicate service entries" into main
2024-10-17 06:30:19 +00:00
Juan Yescas
c6c4da00d4
Merge "Copy 16KB developer option sepolicy to zumapro" into main
2024-10-17 01:38:36 +00:00
KRIS CHEN
ecc30e501a
Merge "Allow fingerprint HAL to access IGoodixFingerprintDaemon" into main
2024-10-16 08:39:00 +00:00
chenkris
0e859b87a1
Allow fingerprint HAL to access IGoodixFingerprintDaemon
...
Fix the following avc denial:
E SELinux : avc: denied { add } for pid=6578 uid=1000 name=vendor.goodix.hardware.biometrics.fingerprint.IGoodixFingerprintDaemon/default scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0
Flag: EXEMPT NDK
Bug: 368993793
Test: Tested fingerprint under enforcing mode
Change-Id: Iafed80d22d40e98cb0811ca84051066360f3dff8
2024-10-16 07:50:44 +00:00
Pawan Wagh
7c85388222
Copy 16KB developer option sepolicy to zumapro
...
avc denials from logs:
[ 51.554757][ T453] type=1400 audit(1728080571.804:3): avc: denied { write } for comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 51.582401][ T453] type=1400 audit(1728080571.808:4): avc: denied { ioctl } for comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 ioctlcmd=0x5401 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 51.618078][ T453] type=1400 audit(1728080571.808:5): avc: denied { execute_no_trans } for comm="copy_efs_files_" path="/vendor/bin/toybox_vendor" dev="dm-10" ino=382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1
[ 51.642465][ T453] type=1400 audit(1728080571.812:6): avc: denied { getattr } for comm="mkdir" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 51.664388][ T453] type=1400 audit(1728080571.812:7): avc: denied { getattr } for comm="mkdir" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.664405][ T453] type=1400 audit(1728080571.820:8): avc: denied { search } for comm="copy_efs_files_" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.664429][ T453] type=1400 audit(1728080571.832:9): avc: denied { write } for comm="mkdir" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.664448][ T453] type=1400 audit(1728080571.832:10): avc: denied { add_name } for comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.717024][ T453] type=1400 audit(1728080571.832:11): avc: denied { create } for comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 51.786594][ T453] type=1400 audit(1728080571.836:12): avc: denied { execute_no_trans } for comm="copy_efs_files_" path="/vendor/bin/fsck.f2fs" dev="dm-10" ino=134 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
[ 51.819515][ T453] type=1400 audit(1728080571.840:13): avc: denied { search } for comm="dump.f2fs" name="bootstrap" dev="dm-6" ino=1828 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=dir permissive=1
[ 51.841747][ T453] type=1400 audit(1728080571.840:14): avc: denied { read } for comm="dump.f2fs" name="libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.863729][ T453] type=1400 audit(1728080571.840:15): avc: denied { open } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.887882][ T453] type=1400 audit(1728080571.840:16): avc: denied { getattr } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.912170][ T453] type=1400 audit(1728080571.840:17): avc: denied { map } for comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.944437][ T453] type=1400 audit(1728080571.840:18): avc: denied { execute } for comm="dump.f2fs" path="/system/lib64/bootstrap/libdl.so" dev="dm-6" ino=1833 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[ 51.979656][ T453] type=1400 audit(1728080571.848:19): avc: denied { search } for comm="dump.f2fs" name="block" dev="tmpfs" ino=12 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
[ 52.009905][ T453] type=1400 audit(1728080571.848:20): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.039894][ T453] type=1400 audit(1728080571.848:21): avc: denied { search } for comm="dump.f2fs" name="0:0:0:0" dev="sysfs" ino=64449 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
[ 52.075681][ T453] type=1400 audit(1728080571.848:22): avc: denied { getattr } for comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda5/partition" dev="sysfs" ino=66405 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[ 52.110042][ T453] type=1400 audit(1728080571.848:23): avc: denied { read } for comm="dump.f2fs" name="zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[ 52.151878][ T453] type=1400 audit(1728080571.848:24): avc: denied { open } for comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[ 52.185339][ T453] type=1400 audit(1728080571.848:25): avc: denied { read write } for comm="dump.f2fs" name="sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.225138][ T453] type=1400 audit(1728080571.848:26): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.225150][ T453] type=1400 audit(1728080571.848:27): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[ 52.225160][ T453] type=1400 audit(1728080571.848:28): avc: denied { create } for comm="dump.f2fs" name="nv_normal.bin" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 52.225170][ T453] type=1400 audit(1728080571.848:29): avc: denied { read write open } for comm="dump.f2fs" path="/data/vendor/copied/efs.img/nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 52.225184][ T453] type=1400 audit(1728080571.852:30): avc: denied { relabelfrom } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 52.225198][ T453] type=1400 audit(1728080571.852:31): avc: denied { relabelto } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[ 52.225213][ T453] type=1400 audit(1728080571.852:32): avc: denied { write } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[ 52.225227][ T453] type=1400 audit(1728080571.852:33): avc: denied { setattr } for comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[ 52.225240][ T453] type=1400 audit(1728080571.852:34): avc: denied { chown } for comm="dump.f2fs" capability=0 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 52.264424][ T453] type=1400 audit(1728080571.852:35): avc: denied { relabelfrom } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.310613][ T453] type=1400 audit(1728080571.852:36): avc: denied { relabelto } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.356910][ T453] type=1400 audit(1728080571.852:37): avc: denied { search } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.402344][ T453] type=1400 audit(1728080571.852:38): avc: denied { setattr } for comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.446523][ T453] type=1400 audit(1728080571.868:39): avc: denied { write } for comm="dump.f2fs" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[ 52.481694][ T453] type=1400 audit(1728080571.876:40): avc: denied { remove_name } for comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.534169][ T453] type=1400 audit(1728080571.876:41): avc: denied { rename } for comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[ 52.552872][ T453] type=1400 audit(1728080571.892:42): avc: denied { read } for comm="fsync" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.586267][ T453] type=1400 audit(1728080571.892:43): avc: denied { fowner } for comm="fsync" capability=3 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 52.586291][ T453] type=1400 audit(1728080571.892:44): avc: denied { open } for comm="fsync" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[ 52.636388][ T453] type=1400 audit(1728080572.012:45): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.657184][ T453] type=1400 audit(1728080572.012:46): avc: denied { read write } for comm="dump.f2fs" name="sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.676513][ T453] type=1400 audit(1728080572.012:47): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.704304][ T453] type=1400 audit(1728080572.012:48): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[ 52.732919][ T453] type=1400 audit(1728080572.016:49): avc: denied { relabelto } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[ 52.767434][ T453] type=1400 audit(1728080572.016:50): avc: denied { write } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[ 52.805716][ T453] type=1400 audit(1728080572.016:51): avc: denied { setattr } for comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[ 53.034704][ T453] type=1400 audit(1728080572.016:52): avc: denied { relabelto } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066603][ T453] type=1400 audit(1728080572.016:53): avc: denied { search } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066613][ T453] type=1400 audit(1728080572.016:54): avc: denied { setattr } for comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066624][ T453] type=1400 audit(1728080572.020:55): avc: denied { rename } for comm="mv" name="modem_userdata.img" dev="dm-57" ino=7569686 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[ 53.066649][ T453] type=1400 audit(1728080572.088:56): avc: denied { getattr } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.100566][ T453] type=1400 audit(1728080572.088:57): avc: denied { read write } for comm="dump.f2fs" name="sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.100577][ T453] type=1400 audit(1728080572.088:58): avc: denied { open } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.170745][ T453] type=1400 audit(1728080572.088:59): avc: denied { ioctl } for comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[ 53.170754][ T453] type=1400 audit(1728080572.092:60): avc: denied { relabelto } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[ 53.170765][ T453] type=1400 audit(1728080572.092:61): avc: denied { write } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[ 53.170775][ T453] type=1400 audit(1728080572.092:62): avc: denied { setattr } for comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[ 53.170785][ T453] type=1400 audit(1728080572.092:63): avc: denied { relabelto } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[ 53.170797][ T453] type=1400 audit(1728080572.092:64): avc: denied { search } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[ 53.170811][ T453] type=1400 audit(1728080572.092:65): avc: denied { setattr } for comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[ 53.170825][ T453] type=1400 audit(1728080572.092:66): avc: denied { relabelto } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 53.170839][ T453] type=1400 audit(1728080572.092:67): avc: denied { search } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 53.207440][ T453] type=1400 audit(1728080572.092:68): avc: denied { setattr } for comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 53.262539][ T453] type=1400 audit(1728080572.092:69): avc: denied { create } for comm="dump.f2fs" name="0" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[ 53.291111][ T453] type=1400 audit(1728080572.092:70): avc: denied { relabelfrom } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[ 53.314133][ T453] type=1400 audit(1728080572.092:71): avc: denied { relabelto } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[ 53.351258][ T453] type=1400 audit(1728080572.092:72): avc: denied { setattr } for comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[ 53.418367][ T453] type=1400 audit(1728080572.092:73): avc: denied { chown } for comm="dump.f2fs" capability=0 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 53.461321][ T453] type=1400 audit(1728080572.092:74): avc: denied { relabelto } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[ 53.467294][ T453] type=1400 audit(1728080572.092:75): avc: denied { write } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[ 53.484014][ T453] type=1400 audit(1728080572.092:76): avc: denied { setattr } for comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[ 53.510185][ T453] type=1400 audit(1728080572.092:77): avc: denied { relabelto } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[ 53.527739][ T453] type=1400 audit(1728080572.092:78): avc: denied { search } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[ 53.544592][ T453] type=1400 audit(1728080572.092:79): avc: denied { sys_admin } for comm="dump.f2fs" capability=21 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 53.589553][ T453] type=1400 audit(1728080572.092:80): avc: denied { setattr } for comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[ 53.660501][ T453] type=1400 audit(1728080572.092:81): avc: denied { relabelto } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[ 53.706160][ T453] type=1400 audit(1728080572.092:82): avc: denied { search } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[ 53.750214][ T453] type=1400 audit(1728080572.092:83): avc: denied { setattr } for comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[ 53.792724][ T453] type=1400 audit(1728080572.092:84): avc: denied { relabelto } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[ 53.833755][ T453] type=1400 audit(1728080572.092:85): avc: denied { write } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[ 53.866130][ T453] type=1400 audit(1728080572.092:86): avc: denied { setattr } for comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[ 53.933950][ T453] type=1400 audit(1728080572.092:87): avc: denied { relabelto } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[ 53.977389][ T453] type=1400 audit(1728080572.092:88): avc: denied { search } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[ 54.007088][ T453] type=1400 audit(1728080572.092:89): avc: denied { setattr } for comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[ 54.049913][ T453] type=1400 audit(1728080572.092:90): avc: denied { relabelto } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[ 54.102692][ T453] type=1400 audit(1728080572.092:91): avc: denied { write } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[ 54.144176][ T453] type=1400 audit(1728080572.092:92): avc: denied { setattr } for comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[ 54.187937][ T453] type=1400 audit(1728080572.092:93): avc: denied { relabelto } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[ 54.219942][ T453] type=1400 audit(1728080572.092:94): avc: denied { write } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[ 54.287284][ T453] type=1400 audit(1728080572.092:95): avc: denied { setattr } for comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[ 54.332099][ T453] type=1400 audit(1728080572.092:96): avc: denied { relabelto } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[ 54.364108][ T453] type=1400 audit(1728080572.092:97): avc: denied { search } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[ 54.411041][ T453] type=1400 audit(1728080572.092:98): avc: denied { setattr } for comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[ 54.411050][ T453] type=1400 audit(1728080572.096:99): avc: denied { relabelto } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[ 54.411061][ T453] type=1400 audit(1728080572.096:100): avc: denied { write } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[ 54.411075][ T453] type=1400 audit(1728080572.096:101): avc: denied { setattr } for comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[ 54.411089][ T453] type=1400 audit(1728080572.096:102): avc: denied { create } for comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 54.411103][ T453] type=1400 audit(1728080572.096:103): avc: denied { read write open } for comm="dump.f2fs" path="/data/vendor/copied/persist.img/camera/OTP_calibration/djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 54.411118][ T453] type=1400 audit(1728080572.096:104): avc: denied { relabelfrom } for comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[ 54.411130][ T453] type=1400 audit(1728080572.096:105): avc: denied { relabelto } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[ 54.411139][ T453] type=1400 audit(1728080572.096:106): avc: denied { search } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[ 54.411148][ T453] type=1400 audit(1728080572.096:107): avc: denied { setattr } for comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[ 54.411157][ T453] type=1400 audit(1728080572.100:108): avc: denied { relabelto } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[ 54.411171][ T453] type=1400 audit(1728080572.100:109): avc: denied { write } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[ 54.411180][ T453] type=1400 audit(1728080572.100:110): avc: denied { setattr } for comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[ 54.411189][ T453] type=1400 audit(1728080572.100:111): avc: denied { relabelto } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[ 54.411198][ T453] type=1400 audit(1728080572.100:112): avc: denied { search } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[ 54.411207][ T453] type=1400 audit(1728080572.100:113): avc: denied { setattr } for comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[ 54.411216][ T453] type=1400 audit(1728080572.100:114): avc: denied { relabelto } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[ 54.411225][ T453] type=1400 audit(1728080572.100:115): avc: denied { write } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[ 54.411234][ T453] type=1400 audit(1728080572.100:116): avc: denied { setattr } for comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[ 54.411243][ T453] type=1400 audit(1728080572.100:117): avc: denied { relabelto } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[ 54.411252][ T453] type=1400 audit(1728080572.100:118): avc: denied { search } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[ 54.411262][ T453] type=1400 audit(1728080572.100:119): avc: denied { setattr } for comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[ 54.411274][ T453] type=1400 audit(1728080572.120:120): avc: denied { rename } for comm="mv" name="persist.img" dev="dm-57" ino=7569690 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[ 54.411286][ T453] type=1400 audit(1728080572.132:121): avc: denied { fowner } for comm="fsync" capability=3 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[ 58.572689][ T453] type=1400 audit(1728080578.820:122): avc: denied { signull } for comm="shared_modem_pl" scontext=u:r:modem_svc_sit:s0 tcontext=u:r:hal_radioext_default:s0 tclass=process permissive=1 bug=b/368187536
[ 58.735984][ T453] type=1400 audit(1728080578.984:123): avc: denied { sendto } for comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[ 58.844813][ T453] type=1400 audit(1728080579.092:124): avc: denied { sendto } for comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[ 86.597962][ T453] type=1400 audit(1728080606.848:455): avc: granted { read } for comm="rkstack.process" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 86.616310][ T453] type=1400 audit(1728080606.848:456): avc: granted { read open } for comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 86.645641][ T453] type=1400 audit(1728080606.848:457): avc: granted { getattr } for comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 91.030419][ T453] type=1400 audit(1728080611.268:458): avc: denied { open } for comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[ 91.171034][ T453] type=1400 audit(1728080611.268:459): avc: denied { getattr } for comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[ 91.348507][ T453] type=1400 audit(1728080611.368:460): avc: denied { create } for comm="init" name="iostats" scontext=u:r:vendor_init:s0 tcontext=u:object_r:rootdisk_sysdev:s0 tclass=file permissive=1
[ 91.556216][ T453] type=1400 audit(1728080611.784:461): avc: denied { create } for comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[ 91.591920][ T453] type=1400 audit(1728080611.784:462): avc: denied { open } for comm="HeapTaskDaemon" path="/data/user/0/com.google.pixel.camera.services/cache/oat_primary/arm64/PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[ 91.610505][ T453] type=1400 audit(1728080611.824:463): avc: denied { add_name } for comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=dir permissive=1
[ 91.615399][ T453] type=1400 audit(1728080611.824:464): avc: denied { create } for comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[ 91.668729][ T453] type=1400 audit(1728080611.824:465): avc: denied { write open } for comm="HeapTaskDaemon" path="/data/user/0/com.android.se/cache/oat_primary/arm64/SecureElement.2505.tmp" dev="dm-57" ino=11961765 scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[ 91.668788][ T453] type=1400 audit(1728080611.836:466): avc: denied { rename } for comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[ 92.928109][ T453] type=1400 audit(1728080613.172:471): avc: granted { execute } for comm="id.apps.tachyon" path="/data/data/com.google.android.apps.tachyon/app_lib/libjingle_peerconnection_so.so" dev="dm-57" ino=11976916 scontext=u:r:untrusted_app:s0:c201,c256,c512,c768 tcontext=u:object_r:app_data_file:s0:c201,c256,c512,c768 tclass=file app=com.google.android.apps.tachyon
[ 98.286553][ T453] type=1400 audit(1728080618.536:472): avc: granted { read } for comm="NetworkMonitor/" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 98.288073][ T453] type=1400 audit(1728080618.536:473): avc: granted { read open } for comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 98.817428][ T453] type=1400 audit(1728080618.536:474): avc: granted { getattr } for comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 98.821639][ T453] type=1400 audit(1728080619.040:475): avc: denied { read } for comm=424720546872656164202332 name="/" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[ 99.279860][ T453] type=1400 audit(1728080619.040:476): avc: denied { open } for comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[ 99.285144][ T453] type=1400 audit(1728080619.040:477): avc: denied { getattr } for comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1275): avc: denied { setattr } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1276): avc: denied { append } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880 5118 5118 I IntentService[D: type=1400 audit(0.0:1277): avc: denied { open } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
10-04 15:23:55.096 5118 5118 I IntentService[D: type=1400 audit(0.0:1291): avc: denied { search } for name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
10-04 15:23:55.096 5118 5118 I IntentService[D: type=1400 audit(0.0:1292): avc: denied { getattr } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1297): avc: denied { getattr } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1298): avc: denied { setattr } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1299): avc: denied { append } for name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620 5118 5118 I IntentService[D: type=1400 audit(0.0:1300): avc: denied { open } for path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.956 5118 5118 I IntentService[D: type=1400 audit(0.0:1301): avc: denied { search } for name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
Test: atest Enable16KbTest
Flag: build.RELEASE_GOOGLE_CAIMAN_16K_DEVELOPER_OPTION
Bug: 347108593
Change-Id: I67929732c9b23081f3608ac5da413adda81b6c44
2024-10-15 22:53:30 +00:00
Chi-Wei Kao
e0c7545cd1
Merge "Add SELiunx for camera debug app (propsetter)" into main
2024-10-09 02:10:37 +00:00
cwkao
c5a7f8cc0d
Add SELiunx for camera debug app (propsetter)
...
Add the following avc denial:
```
10-02 19:55:46.156 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=activity scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.258 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=netstats scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.263 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=content_capture scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.267 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=gpu scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.267 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=activity_task scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.416 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=voiceinteraction scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.417 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=autofill scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.425 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=sensitive_content_protection_service scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.427 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=performance_hint scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
10-02 19:55:48.156 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=audio scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
10-02 19:55:53.869 402 402 E SELinux : avc: denied { find } for pid=6934 uid=10311 name=textservices scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:textservices_service:s0 tclass=service_manager permissive=1
```
Bug: 370472903
Test: locally on komodo
Flag: EXEMPT NDK
Change-Id: Ia1a8b42697e790f27a5da9aaa1f7c83fddf2a365
2024-10-09 02:09:57 +00:00
chenkris
537bf14fe6
add selinux permission for fps_touch_handler wakeup
...
Fix the following avc denial:
avc: denied { read } for name="wakeup96" dev="sysfs" ino=101698 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
Bug: 371877715
Test: ls -lZ /sys/devices/platform/odm//odm:fps_touch_handler/wakeup
Flag: EXEMPT NDK
Change-Id: I9aff36eaaec914c7a9b4939353fe88f5c0565799
2024-10-07 06:36:52 +00:00
Thiébaud Weksteen
f39431c3c8
Remove duplicate service entries
...
These entries are defined in the platform policy.
Flag: EXEMPT bugfix
Bug: 367832910
Test: TH
Change-Id: I113222c692b971c698684f762294565b96f8d0cb
2024-10-01 14:48:40 +10:00
Leo Hsieh
ac26d97317
Allow hal_fingerprint_default to access sysfs_aoc_udfps
...
Fix the following avc denial:
avc: denied { search } for name="17000000.aoc" dev="sysfs" ino=26962 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=dir permissive=1
avc: denied { write } for name="udfps_set_clock_source" dev="sysfs" ino=110484 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
avc: denied { read } for name="udfps_get_disp_freq" dev="sysfs" ino=110486 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
avc: denied { write } for name="udfps_set_clock_source" dev="sysfs" ino=109423 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc_udfps:s0 tclass=file permissive=0
Bug: 357976286
Test: Verify fingerprint HAL process can read/write to the sysfs node.
Flag: EXEMPT NDK
Change-Id: Ia8d6288812ef47dad2018d384f43374da7005a4a
2024-09-30 08:44:07 +00:00
Tej Singh
0507349a4b
Make android.framework.stats-v2-ndk app reachable
...
For libedgetpu
Test: TH
Bug: 354763040
Flag: EXEMPT bugfix
Change-Id: Id4f43ba150bd476426ace22c7d866ee87d5777a0
2024-09-20 21:41:23 -07:00
chenkris
ab3bd433f8
Allow fingerprint to access /dev/fth_fd
...
Fix the following avc denial:
avc: denied { open } for path="/dev/fth_fd" dev="tmpfs" ino=1575 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
Bug: 368517769
Test: enroll and authenticate fingerprint.
Change-Id: I46e59d0fb4526586ce6e95e1d715b22e08b4347d
2024-09-20 09:15:44 +00:00
Prochin Wang
90453768c7
Change vendor_fingerprint_prop to vendor_restricted_prop
...
This is to allow the fingerprint HAL to access the property.
Bug: 366105474
Flag: build.RELEASE_PIXEL_BOOST_DATALAYER_PSA_ENABLED
Test: mm
Change-Id: Iba81a714af741edabdb587d8e5f9d6060dd133c5
2024-09-16 02:12:26 +00:00
Neo Yu
696b8a5777
Merge "Move sepolicy about hal_radioext_default to gs-common" into main
2024-09-06 01:41:13 +00:00
Wilson Sung
42fee8809a
Move euiccpixel_app to vendor
...
Bug: 312143882
Test: make selinux_policy
Flag: EXEMPT sepolicy refactor
Change-Id: I0f6ac76860c90b8022a85cafb80350a708d278c1
2024-09-04 15:10:03 +00:00
Randall Huang
21194d2dc3
storage: move storage related device type to common folder
...
Bug: 364225000
Test: forrest build
Change-Id: I3fb2a9a46d00ac27931ee8c1ad7b3ceef0920cdb
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-04 10:44:29 +08:00
Attis Chen
2f8ab31157
Merge "Label sysfs node power_mode as sysfs_display." into main
2024-09-02 04:54:18 +00:00
Neo Yu
d5626145f3
Move sepolicy about hal_radioext_default to gs-common
...
Bug: 363665676
Test: verify with test roms
Flag: EXEMPT sepolicy refactor
Change-Id: I618742012138123329ae47c05c958e77f5573956
2024-09-01 14:25:00 +08:00
Nattharat Jariyanuntanaet
11c0bf5839
Merge "Update sepolicy for nfc antenna selftest values" into main
2024-08-30 05:06:06 +00:00
chenkris
dbc540c147
Allow fingerprint to access sysfs_lhbm
...
Fix following avc denail:
android.hardwar: type=1400 audit(0.0:17): avc: denied { write } for name="local_hbm_delay_frames" dev="sysfs" ino=83619 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_lhbm:s0 tclass=file permissive=0
Bug: 362149568
Test: enroll and authenticate fingerprint
Change-Id: I8c4b18b39fa5c391e9773c7780afe9e0de16e2a9
2024-08-29 05:08:49 +00:00
Nattharat Jariyanuntanaet
4599e2be44
Update sepolicy for nfc antenna selftest values
...
Allow persist.vendor.nfc.antenna. to be vendor public values for the NFC
companion app to access
avc: denied { read } for name="u:object_r:vendor_nfc_antenna_prop:s0" dev="tmpfs" ino=414 scontext=u:r:untrusted_app:s0:c79,c257,c512,c768 tcontext=u:object_r:vendor_nfc_antenna_prop:s0 tclass=file permissive=0 app=com.google.android.apps.internal.nfcassistancetool
Bug: 361050657
Test: m selinux_policy
Flag: NONE add permission
Change-Id: I0e7c3580e4df332fa3d14c939eb5e588f7600601
2024-08-23 02:42:23 +00:00
Joen Chen
e584e43da5
Merge "Label frame_interval and expected_present_time as sysfs_display" into main
2024-08-19 04:53:58 +00:00
attis
99c09bbbba
Label sysfs node power_mode as sysfs_display.
...
Label power_mode to sysfs_panel to let it be allowed in dumpstate.
avc log:
08-07 18:44:42.192 21635 21635 W dump_display: type=1400 audit(0.0:30): avc: denied { read } for name="power_mode" dev="sysfs" ino=83607 scontext=u:r:dump_display:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 bug=b/322917055
Test: ls -Z, adb bugreport.
Flag: EXEMPT bugfix
Bug: 358505990
Change-Id: I4aa8c13e7fb875e67457a15ea32caaf2ce422039
Signed-off-by: attis <attis@google.com>
2024-08-12 10:53:54 +00:00
Joen Chen
e8d646b5e6
Label frame_interval and expected_present_time as sysfs_display
...
Bug: 330392550
Flag: EXEMPT bugfix
Test: Check the files label by "adb shell ls -Z"
Change-Id: Iaf8a32671bce035f5c82bd1b34b81c433638ac39
2024-08-12 06:37:33 +00:00
Donnie Pollitz
cb18bb48d5
trusty: Allow linking/read tdp and td
...
Background:
* storageproxyd needs to be able to create and read symlinks associated
with TDP and TD.
08-07 08:13:44.868 750 750 W binder:750_2: type=1400 audit(0.0:18): avc: denied { create } for name="0" scontext=u:r:tee:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=lnk_file permissive=0
08-07 07:35:19.396 755 755 W binder:755_2: type=1400 audit(0.0:7): avc: denied { read } for name="0" dev="sda1" ino=15 scontext=u:r:tee:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=lnk_file permissive=0
08-07 08:34:24.956 742 742 W binder:742_2: type=1400 audit(0.0:8): avc: denied { read } for name="persist" dev="dm-52" ino=406 scontext=u:r:tee:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=0
Flag: EXEMPT resource only update
Bug: 357815590
Test: Tested by purging device and verifying fresh device
Change-Id: Ib239534bfb28d05de14095e84961ff0f84cde68d
Signed-off-by: Donnie Pollitz <donpollitz@google.com>
2024-08-07 08:41:32 +00:00
Gil Liu
b356ac167e
Merge "add hal_graphics_composer to access thermal temperature" into main
2024-07-29 06:10:28 +00:00
Carlos Rodriguez
dd5b70f378
DisplayPort Stats: add sysfs access permission on Zumapro devices
...
07-25 14:13:16.736 5784 5784 W pixelstats-vend: type=1400 audit(0.0:21): avc: denied { read } for name="fec_dsc_supported" dev="sysfs" ino=82516 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
07-25 14:13:16.736 5784 5784 W pixelstats-vend: type=1400 audit(0.0:22): avc: denied { read } for name="fec_dsc_not_supported" dev="sysfs" ino=82517 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
07-25 14:13:16.736 5784 5784 W pixelstats-vend: type=1400 audit(0.0:23): avc: denied { read } for name="max_res_other" dev="sysfs" ino=82515 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
07-25 14:13:16.736 5784 5784 W pixelstats-vend: type=1400 audit(0.0:24): avc: denied { read } for name="max_res_1366_768" dev="sysfs" ino=82505 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
Bug: 343602691
Bug: 317486088
Flag: EXEMPT bugfix
Test: Android built and flashed and error is gone
Change-Id: I594536581ea468d40c9153bdc1bdd6b1ab7282fd
2024-07-25 21:14:55 +00:00
gilliu
4c189644a9
add hal_graphics_composer to access thermal temperature
...
type=1400 audit(0.0:77): avc: denied { search } for name="thermal"
dev="tmpfs" ino=1618 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:thermal_link_device:s0 tclass=dir permissive=0
type=1400 audit(0.0:74): avc: denied { search } for name="thermal"
dev="sysfs" ino=21594 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=0
type=1400 audit(0.0:74): avc: denied { read } for name="temp"
dev="sysfs" ino=73536 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
type=1400 audit(0.0:74): avc: denied { getattr } for
path="/sys/devices/virtual/thermal/thermal_zone12/temp" dev="sysfs"
ino=73537 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0
Bug: 340846691
Test: check no avc pattern on logcat from test image
Flag: NONE add permission
Change-Id: I0f327b98e32627e00be4cc0d0a99be39d1ec3bf2
2024-07-22 12:18:58 +00:00
Roy Luo
71d51ce40a
Merge "Add xhci-hcd-exynos.7 wakeup paths for suspend service" into main
2024-07-17 01:23:23 +00:00
Roy Luo
d1ad140faf
Add xhci-hcd-exynos.7 wakeup paths for suspend service
...
Bug: 334189230
Test: verified on device
Change-Id: I0adcbe0bb1aff8ff4442c16bb733603ad8c012cf
Signed-off-by: Roy Luo <royluo@google.com>
2024-07-16 19:49:52 +00:00
Vishvam Mazumdar
88e0059ef0
Merge "Add SELinux policy to allow CPU Idle Histogram Stats in dumpstate." into main
2024-07-10 21:41:10 +00:00
Vishvam Mazumdar
d6b8239e73
Add SELinux policy to allow CPU Idle Histogram Stats in dumpstate.
...
This change is to allow the CPU Idle Histogram Stats to be dumped in
bugreports so that there is more insight into the idle behavior of
devices in the field.
Test: build/flash
Test: adb bugreport
Bug: 344908619
Flag: EXEMPT bugfix
Change-Id: If19b9471cf91ddc6e16347e7a4ea18d3298783d5
Signed-off-by: Vishvam Mazumdar <vmazumdar@google.com>
2024-07-10 21:39:23 +00:00
Jeremy DeHaan
b3d863d552
Allow HWC to access frame_rate node
...
Flag: EXEMPT bugfix
Bug: 346461765
Change-Id: Id7b3195e76cdce3e612eb9c9d177af24145e70a2
Signed-off-by: Jeremy DeHaan <jdehaan@google.com>
2024-07-04 19:47:10 +00:00
Jack Wu
ee58427ea3
add permission for rt9471 sysfs
...
Bug: 347914940
Test: adb bugreport
Flag: EXEMPT bugfix
Change-Id: I155c58d857f676fc3a2ff6c2fe9be6262405c7b9
Signed-off-by: Jack Wu <wjack@google.com>
2024-06-19 16:13:33 +08:00
Kiwon Park
4e6cd49893
Merge "Revert "Add setupwizard_feature_prop as one of properties allowed to be read"" into main
2024-06-14 00:06:27 +00:00
Kiwon Park
33de53de68
Revert "Add setupwizard_feature_prop as one of properties allowed to be read"
...
This reverts commit 26efc37a3d
.
Reason for revert: Doesn't fix the issues in factory testing
Change-Id: I8c8473f5a9c0cf9c53a95943101976d4b7103580
2024-06-13 17:24:30 +00:00
Cheng Chang
92c5aff54d
gps: Move type declaration to device folder am: 8fa884d01c
...
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/27574819
Change-Id: I8d7cd44249f8912b9fab64d24ff53381e20fc05b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-12 07:27:17 +00:00