Commit graph

329 commits

Author SHA1 Message Date
cwkao
f1471f5d65 Share same seinfo between propsetter app and GCA.
Bug: 375117470
Test: locally on komodo, the app functions as expected.
Flag: EXEMPT NDK
Change-Id: I60a6047835b23137391e3bd6edcfd1fb418a3e19
2024-10-23 16:58:52 +00:00
Thiébaud Weksteen
8b8ae291d4 Merge "Remove duplicate service entries" into main 2024-10-17 06:30:19 +00:00
Juan Yescas
c6c4da00d4 Merge "Copy 16KB developer option sepolicy to zumapro" into main 2024-10-17 01:38:36 +00:00
KRIS CHEN
ecc30e501a Merge "Allow fingerprint HAL to access IGoodixFingerprintDaemon" into main 2024-10-16 08:39:00 +00:00
chenkris
0e859b87a1 Allow fingerprint HAL to access IGoodixFingerprintDaemon
Fix the following avc denial:
E SELinux : avc:  denied  { add } for pid=6578 uid=1000 name=vendor.goodix.hardware.biometrics.fingerprint.IGoodixFingerprintDaemon/default scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_android_service:s0 tclass=service_manager permissive=0

Flag: EXEMPT NDK
Bug: 368993793
Test: Tested fingerprint under enforcing mode
Change-Id: Iafed80d22d40e98cb0811ca84051066360f3dff8
2024-10-16 07:50:44 +00:00
Pawan Wagh
7c85388222 Copy 16KB developer option sepolicy to zumapro
avc denials from logs:

[   51.554757][  T453] type=1400 audit(1728080571.804:3): avc:  denied  { write } for  comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   51.582401][  T453] type=1400 audit(1728080571.808:4): avc:  denied  { ioctl } for  comm="copy_efs_files_" path="/dev/kmsg_debug" dev="tmpfs" ino=6 ioctlcmd=0x5401 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   51.618078][  T453] type=1400 audit(1728080571.808:5): avc:  denied  { execute_no_trans } for  comm="copy_efs_files_" path="/vendor/bin/toybox_vendor" dev="dm-10" ino=382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1
[   51.642465][  T453] type=1400 audit(1728080571.812:6): avc:  denied  { getattr } for  comm="mkdir" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   51.664388][  T453] type=1400 audit(1728080571.812:7): avc:  denied  { getattr } for  comm="mkdir" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.664405][  T453] type=1400 audit(1728080571.820:8): avc:  denied  { search } for  comm="copy_efs_files_" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.664429][  T453] type=1400 audit(1728080571.832:9): avc:  denied  { write } for  comm="mkdir" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.664448][  T453] type=1400 audit(1728080571.832:10): avc:  denied  { add_name } for  comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.717024][  T453] type=1400 audit(1728080571.832:11): avc:  denied  { create } for  comm="mkdir" name="efs.img" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   51.786594][  T453] type=1400 audit(1728080571.836:12): avc:  denied  { execute_no_trans } for  comm="copy_efs_files_" path="/vendor/bin/fsck.f2fs" dev="dm-10" ino=134 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=1
[   51.819515][  T453] type=1400 audit(1728080571.840:13): avc:  denied  { search } for  comm="dump.f2fs" name="bootstrap" dev="dm-6" ino=1828 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=dir permissive=1
[   51.841747][  T453] type=1400 audit(1728080571.840:14): avc:  denied  { read } for  comm="dump.f2fs" name="libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.863729][  T453] type=1400 audit(1728080571.840:15): avc:  denied  { open } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.887882][  T453] type=1400 audit(1728080571.840:16): avc:  denied  { getattr } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.912170][  T453] type=1400 audit(1728080571.840:17): avc:  denied  { map } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libc.so" dev="dm-6" ino=1831 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.944437][  T453] type=1400 audit(1728080571.840:18): avc:  denied  { execute } for  comm="dump.f2fs" path="/system/lib64/bootstrap/libdl.so" dev="dm-6" ino=1833 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:system_bootstrap_lib_file:s0 tclass=file permissive=1
[   51.979656][  T453] type=1400 audit(1728080571.848:19): avc:  denied  { search } for  comm="dump.f2fs" name="block" dev="tmpfs" ino=12 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
[   52.009905][  T453] type=1400 audit(1728080571.848:20): avc:  denied  { getattr } for  comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.039894][  T453] type=1400 audit(1728080571.848:21): avc:  denied  { search } for  comm="dump.f2fs" name="0:0:0:0" dev="sysfs" ino=64449 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=dir permissive=1
[   52.075681][  T453] type=1400 audit(1728080571.848:22): avc:  denied  { getattr } for  comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/sda5/partition" dev="sysfs" ino=66405 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[   52.110042][  T453] type=1400 audit(1728080571.848:23): avc:  denied  { read } for  comm="dump.f2fs" name="zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[   52.151878][  T453] type=1400 audit(1728080571.848:24): avc:  denied  { open } for  comm="dump.f2fs" path="/sys/devices/platform/13200000.ufs/host0/target0:0:0/0:0:0:0/block/sda/queue/zoned" dev="sysfs" ino=66240 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
[   52.185339][  T453] type=1400 audit(1728080571.848:25): avc:  denied  { read write } for  comm="dump.f2fs" name="sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.225138][  T453] type=1400 audit(1728080571.848:26): avc:  denied  { open } for  comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.225150][  T453] type=1400 audit(1728080571.848:27): avc:  denied  { ioctl } for  comm="dump.f2fs" path="/dev/block/sda5" dev="tmpfs" ino=1294 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=1
[   52.225160][  T453] type=1400 audit(1728080571.848:28): avc:  denied  { create } for  comm="dump.f2fs" name="nv_normal.bin" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   52.225170][  T453] type=1400 audit(1728080571.848:29): avc:  denied  { read write open } for  comm="dump.f2fs" path="/data/vendor/copied/efs.img/nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   52.225184][  T453] type=1400 audit(1728080571.852:30): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   52.225198][  T453] type=1400 audit(1728080571.852:31): avc:  denied  { relabelto } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[   52.225213][  T453] type=1400 audit(1728080571.852:32): avc:  denied  { write } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[   52.225227][  T453] type=1400 audit(1728080571.852:33): avc:  denied  { setattr } for  comm="dump.f2fs" name="nv_normal.bin" dev="dm-57" ino=7569677 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=file permissive=1
[   52.225240][  T453] type=1400 audit(1728080571.852:34): avc:  denied  { chown } for  comm="dump.f2fs" capability=0  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   52.264424][  T453] type=1400 audit(1728080571.852:35): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.310613][  T453] type=1400 audit(1728080571.852:36): avc:  denied  { relabelto } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.356910][  T453] type=1400 audit(1728080571.852:37): avc:  denied  { search } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.402344][  T453] type=1400 audit(1728080571.852:38): avc:  denied  { setattr } for  comm="dump.f2fs" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.446523][  T453] type=1400 audit(1728080571.868:39): avc:  denied  { write } for  comm="dump.f2fs" path="/dev/kmsg_debug" dev="tmpfs" ino=6 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:kmsg_debug_device:s0 tclass=chr_file permissive=1
[   52.481694][  T453] type=1400 audit(1728080571.876:40): avc:  denied  { remove_name } for  comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.534169][  T453] type=1400 audit(1728080571.876:41): avc:  denied  { rename } for  comm="mv" name="efs.img" dev="dm-57" ino=7569676 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_file:s0 tclass=dir permissive=1
[   52.552872][  T453] type=1400 audit(1728080571.892:42): avc:  denied  { read } for  comm="fsync" name="copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.586267][  T453] type=1400 audit(1728080571.892:43): avc:  denied  { fowner } for  comm="fsync" capability=3  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   52.586291][  T453] type=1400 audit(1728080571.892:44): avc:  denied  { open } for  comm="fsync" path="/data/vendor/copied" dev="dm-57" ino=7569664 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir permissive=1
[   52.636388][  T453] type=1400 audit(1728080572.012:45): avc:  denied  { getattr } for  comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.657184][  T453] type=1400 audit(1728080572.012:46): avc:  denied  { read write } for  comm="dump.f2fs" name="sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.676513][  T453] type=1400 audit(1728080572.012:47): avc:  denied  { open } for  comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.704304][  T453] type=1400 audit(1728080572.012:48): avc:  denied  { ioctl } for  comm="dump.f2fs" path="/dev/block/sda7" dev="tmpfs" ino=1141 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_block_device:s0 tclass=blk_file permissive=1
[   52.732919][  T453] type=1400 audit(1728080572.016:49): avc:  denied  { relabelto } for  comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[   52.767434][  T453] type=1400 audit(1728080572.016:50): avc:  denied  { write } for  comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[   52.805716][  T453] type=1400 audit(1728080572.016:51): avc:  denied  { setattr } for  comm="dump.f2fs" name="dds.bin" dev="dm-57" ino=7569688 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=file permissive=1
[   53.034704][  T453] type=1400 audit(1728080572.016:52): avc:  denied  { relabelto } for  comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066603][  T453] type=1400 audit(1728080572.016:53): avc:  denied  { search } for  comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066613][  T453] type=1400 audit(1728080572.016:54): avc:  denied  { setattr } for  comm="dump.f2fs" name="replay" dev="dm-57" ino=7569687 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066624][  T453] type=1400 audit(1728080572.020:55): avc:  denied  { rename } for  comm="mv" name="modem_userdata.img" dev="dm-57" ino=7569686 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_userdata_file:s0 tclass=dir permissive=1
[   53.066649][  T453] type=1400 audit(1728080572.088:56): avc:  denied  { getattr } for  comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.100566][  T453] type=1400 audit(1728080572.088:57): avc:  denied  { read write } for  comm="dump.f2fs" name="sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.100577][  T453] type=1400 audit(1728080572.088:58): avc:  denied  { open } for  comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.170745][  T453] type=1400 audit(1728080572.088:59): avc:  denied  { ioctl } for  comm="dump.f2fs" path="/dev/block/sda1" dev="tmpfs" ino=1382 ioctlcmd=0x1268 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_block_device:s0 tclass=blk_file permissive=1
[   53.170754][  T453] type=1400 audit(1728080572.092:60): avc:  denied  { relabelto } for  comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[   53.170765][  T453] type=1400 audit(1728080572.092:61): avc:  denied  { write } for  comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[   53.170775][  T453] type=1400 audit(1728080572.092:62): avc:  denied  { setattr } for  comm="dump.f2fs" name="defender_charger_time" dev="dm-57" ino=7569692 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=file permissive=1
[   53.170785][  T453] type=1400 audit(1728080572.092:63): avc:  denied  { relabelto } for  comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[   53.170797][  T453] type=1400 audit(1728080572.092:64): avc:  denied  { search } for  comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[   53.170811][  T453] type=1400 audit(1728080572.092:65): avc:  denied  { setattr } for  comm="dump.f2fs" name="battery" dev="dm-57" ino=7569691 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_battery_file:s0 tclass=dir permissive=1
[   53.170825][  T453] type=1400 audit(1728080572.092:66): avc:  denied  { relabelto } for  comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   53.170839][  T453] type=1400 audit(1728080572.092:67): avc:  denied  { search } for  comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   53.207440][  T453] type=1400 audit(1728080572.092:68): avc:  denied  { setattr } for  comm="dump.f2fs" name="touch" dev="dm-57" ino=7569694 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   53.262539][  T453] type=1400 audit(1728080572.092:69): avc:  denied  { create } for  comm="dump.f2fs" name="0" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[   53.291111][  T453] type=1400 audit(1728080572.092:70): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=lnk_file permissive=1
[   53.314133][  T453] type=1400 audit(1728080572.092:71): avc:  denied  { relabelto } for  comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[   53.351258][  T453] type=1400 audit(1728080572.092:72): avc:  denied  { setattr } for  comm="dump.f2fs" name="0" dev="dm-57" ino=7569696 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=1
[   53.418367][  T453] type=1400 audit(1728080572.092:73): avc:  denied  { chown } for  comm="dump.f2fs" capability=0  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   53.461321][  T453] type=1400 audit(1728080572.092:74): avc:  denied  { relabelto } for  comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[   53.467294][  T453] type=1400 audit(1728080572.092:75): avc:  denied  { write } for  comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[   53.484014][  T453] type=1400 audit(1728080572.092:76): avc:  denied  { setattr } for  comm="dump.f2fs" name="nsp" dev="dm-57" ino=7569697 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file permissive=1
[   53.510185][  T453] type=1400 audit(1728080572.092:77): avc:  denied  { relabelto } for  comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[   53.527739][  T453] type=1400 audit(1728080572.092:78): avc:  denied  { search } for  comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[   53.544592][  T453] type=1400 audit(1728080572.092:79): avc:  denied  { sys_admin } for  comm="dump.f2fs" capability=21  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   53.589553][  T453] type=1400 audit(1728080572.092:80): avc:  denied  { setattr } for  comm="dump.f2fs" name="ss" dev="dm-57" ino=7569695 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir permissive=1
[   53.660501][  T453] type=1400 audit(1728080572.092:81): avc:  denied  { relabelto } for  comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[   53.706160][  T453] type=1400 audit(1728080572.092:82): avc:  denied  { search } for  comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[   53.750214][  T453] type=1400 audit(1728080572.092:83): avc:  denied  { setattr } for  comm="dump.f2fs" name="qti_fp" dev="dm-57" ino=7569698 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_fingerprint_file:s0 tclass=dir permissive=1
[   53.792724][  T453] type=1400 audit(1728080572.092:84): avc:  denied  { relabelto } for  comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[   53.833755][  T453] type=1400 audit(1728080572.092:85): avc:  denied  { write } for  comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[   53.866130][  T453] type=1400 audit(1728080572.092:86): avc:  denied  { setattr } for  comm="dump.f2fs" name="cs40l26.cal" dev="dm-57" ino=7569700 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=file permissive=1
[   53.933950][  T453] type=1400 audit(1728080572.092:87): avc:  denied  { relabelto } for  comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[   53.977389][  T453] type=1400 audit(1728080572.092:88): avc:  denied  { search } for  comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[   54.007088][  T453] type=1400 audit(1728080572.092:89): avc:  denied  { setattr } for  comm="dump.f2fs" name="haptics" dev="dm-57" ino=7569699 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_haptics_file:s0 tclass=dir permissive=1
[   54.049913][  T453] type=1400 audit(1728080572.092:90): avc:  denied  { relabelto } for  comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[   54.102692][  T453] type=1400 audit(1728080572.092:91): avc:  denied  { write } for  comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[   54.144176][  T453] type=1400 audit(1728080572.092:92): avc:  denied  { setattr } for  comm="dump.f2fs" name=".station_record" dev="dm-57" ino=7569701 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
[   54.187937][  T453] type=1400 audit(1728080572.092:93): avc:  denied  { relabelto } for  comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[   54.219942][  T453] type=1400 audit(1728080572.092:94): avc:  denied  { write } for  comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[   54.287284][  T453] type=1400 audit(1728080572.092:95): avc:  denied  { setattr } for  comm="dump.f2fs" name="icm45631_accel_fac_cal.reg" dev="dm-57" ino=7569704 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=file permissive=1
[   54.332099][  T453] type=1400 audit(1728080572.092:96): avc:  denied  { relabelto } for  comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[   54.364108][  T453] type=1400 audit(1728080572.092:97): avc:  denied  { search } for  comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[   54.411041][  T453] type=1400 audit(1728080572.092:98): avc:  denied  { setattr } for  comm="dump.f2fs" name="registry" dev="dm-57" ino=7569703 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_sensor_reg_file:s0 tclass=dir permissive=1
[   54.411050][  T453] type=1400 audit(1728080572.096:99): avc:  denied  { relabelto } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[   54.411061][  T453] type=1400 audit(1728080572.096:100): avc:  denied  { write } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[   54.411075][  T453] type=1400 audit(1728080572.096:101): avc:  denied  { setattr } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Hbin_OTP.txt" dev="dm-57" ino=7569726 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=file permissive=1
[   54.411089][  T453] type=1400 audit(1728080572.096:102): avc:  denied  { create } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   54.411103][  T453] type=1400 audit(1728080572.096:103): avc:  denied  { read write open } for  comm="dump.f2fs" path="/data/vendor/copied/persist.img/camera/OTP_calibration/djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   54.411118][  T453] type=1400 audit(1728080572.096:104): avc:  denied  { relabelfrom } for  comm="dump.f2fs" name="djinn-boitata_PDAF_Vbin_OTP.txt" dev="dm-57" ino=7569727 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=file permissive=1
[   54.411130][  T453] type=1400 audit(1728080572.096:105): avc:  denied  { relabelto } for  comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[   54.411139][  T453] type=1400 audit(1728080572.096:106): avc:  denied  { search } for  comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[   54.411148][  T453] type=1400 audit(1728080572.096:107): avc:  denied  { setattr } for  comm="dump.f2fs" name="OTP_calibration" dev="dm-57" ino=7569725 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_camera_file:s0 tclass=dir permissive=1
[   54.411157][  T453] type=1400 audit(1728080572.100:108): avc:  denied  { relabelto } for  comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[   54.411171][  T453] type=1400 audit(1728080572.100:109): avc:  denied  { write } for  comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[   54.411180][  T453] type=1400 audit(1728080572.100:110): avc:  denied  { setattr } for  comm="dump.f2fs" name="speaker.cal" dev="dm-57" ino=7569760 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=file permissive=1
[   54.411189][  T453] type=1400 audit(1728080572.100:111): avc:  denied  { relabelto } for  comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[   54.411198][  T453] type=1400 audit(1728080572.100:112): avc:  denied  { search } for  comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[   54.411207][  T453] type=1400 audit(1728080572.100:113): avc:  denied  { setattr } for  comm="dump.f2fs" name="audio" dev="dm-57" ino=7569759 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_audio_file:s0 tclass=dir permissive=1
[   54.411216][  T453] type=1400 audit(1728080572.100:114): avc:  denied  { relabelto } for  comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[   54.411225][  T453] type=1400 audit(1728080572.100:115): avc:  denied  { write } for  comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[   54.411234][  T453] type=1400 audit(1728080572.100:116): avc:  denied  { setattr } for  comm="dump.f2fs" name="factory_cal0.pb" dev="dm-57" ino=7569764 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=file permissive=1
[   54.411243][  T453] type=1400 audit(1728080572.100:117): avc:  denied  { relabelto } for  comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[   54.411252][  T453] type=1400 audit(1728080572.100:118): avc:  denied  { search } for  comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[   54.411262][  T453] type=1400 audit(1728080572.100:119): avc:  denied  { setattr } for  comm="dump.f2fs" name="display" dev="dm-57" ino=7569763 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_display_file:s0 tclass=dir permissive=1
[   54.411274][  T453] type=1400 audit(1728080572.120:120): avc:  denied  { rename } for  comm="mv" name="persist.img" dev="dm-57" ino=7569690 scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
[   54.411286][  T453] type=1400 audit(1728080572.132:121): avc:  denied  { fowner } for  comm="fsync" capability=3  scontext=u:r:copy_efs_files_to_data:s0 tcontext=u:r:copy_efs_files_to_data:s0 tclass=capability permissive=1
[   58.572689][  T453] type=1400 audit(1728080578.820:122): avc:  denied  { signull } for  comm="shared_modem_pl" scontext=u:r:modem_svc_sit:s0 tcontext=u:r:hal_radioext_default:s0 tclass=process permissive=1 bug=b/368187536
[   58.735984][  T453] type=1400 audit(1728080578.984:123): avc:  denied  { sendto } for  comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[   58.844813][  T453] type=1400 audit(1728080579.092:124): avc:  denied  { sendto } for  comm="binder:1143_2" path="/dev/socket/statsdw" scontext=u:r:modem_ml_svc_sit:s0 tcontext=u:r:statsd:s0 tclass=unix_dgram_socket permissive=1
[   86.597962][  T453] type=1400 audit(1728080606.848:455): avc:  granted  { read } for  comm="rkstack.process" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   86.616310][  T453] type=1400 audit(1728080606.848:456): avc:  granted  { read open } for  comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   86.645641][  T453] type=1400 audit(1728080606.848:457): avc:  granted  { getattr } for  comm="rkstack.process" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   91.030419][  T453] type=1400 audit(1728080611.268:458): avc:  denied  { open } for  comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[   91.171034][  T453] type=1400 audit(1728080611.268:459): avc:  denied  { getattr } for  comm="ogle.android.as" path="/proc/version" dev="proc" ino=4026532093 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=1 app=com.google.android.as
[   91.348507][  T453] type=1400 audit(1728080611.368:460): avc:  denied  { create } for  comm="init" name="iostats" scontext=u:r:vendor_init:s0 tcontext=u:object_r:rootdisk_sysdev:s0 tclass=file permissive=1
[   91.556216][  T453] type=1400 audit(1728080611.784:461): avc:  denied  { create } for  comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[   91.591920][  T453] type=1400 audit(1728080611.784:462): avc:  denied  { open } for  comm="HeapTaskDaemon" path="/data/user/0/com.google.pixel.camera.services/cache/oat_primary/arm64/PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[   91.610505][  T453] type=1400 audit(1728080611.824:463): avc:  denied  { add_name } for  comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=dir permissive=1
[   91.615399][  T453] type=1400 audit(1728080611.824:464): avc:  denied  { create } for  comm="HeapTaskDaemon" name="SecureElement.2505.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[   91.668729][  T453] type=1400 audit(1728080611.824:465): avc:  denied  { write open } for  comm="HeapTaskDaemon" path="/data/user/0/com.android.se/cache/oat_primary/arm64/SecureElement.2505.tmp" dev="dm-57" ino=11961765 scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1
[   91.668788][  T453] type=1400 audit(1728080611.836:466): avc:  denied  { rename } for  comm="HeapTaskDaemon" name="PersistentBackgroundCameraServices.2450.tmp" dev="dm-57" ino=11961224 scontext=u:r:vendor_pbcs_app:s0:c232,c259,c512,c768 tcontext=u:object_r:system_app_data_file:s0:c232,c259,c512,c768 tclass=file permissive=1
[   92.928109][  T453] type=1400 audit(1728080613.172:471): avc:  granted  { execute } for  comm="id.apps.tachyon" path="/data/data/com.google.android.apps.tachyon/app_lib/libjingle_peerconnection_so.so" dev="dm-57" ino=11976916 scontext=u:r:untrusted_app:s0:c201,c256,c512,c768 tcontext=u:object_r:app_data_file:s0:c201,c256,c512,c768 tclass=file app=com.google.android.apps.tachyon
[   98.286553][  T453] type=1400 audit(1728080618.536:472): avc:  granted  { read } for  comm="NetworkMonitor/" name="psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   98.288073][  T453] type=1400 audit(1728080618.536:473): avc:  granted  { read open } for  comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   98.817428][  T453] type=1400 audit(1728080618.536:474): avc:  granted  { getattr } for  comm="NetworkMonitor/" path="/proc/2394/net/psched" dev="proc" ino=4026532082 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   98.821639][  T453] type=1400 audit(1728080619.040:475): avc:  denied  { read } for  comm=424720546872656164202332 name="/" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[   99.279860][  T453] type=1400 audit(1728080619.040:476): avc:  denied  { open } for  comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
[   99.285144][  T453] type=1400 audit(1728080619.040:477): avc:  denied  { getattr } for  comm=424720546872656164202332 path="/metadata" dev="sda10" ino=2 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1 app=com.google.android.googlequicksearchbox
10-04 15:23:52.880  5118  5118 I IntentService[D: type=1400 audit(0.0:1275): avc:  denied  { setattr } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880  5118  5118 I IntentService[D: type=1400 audit(0.0:1276): avc:  denied  { append } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:52.880  5118  5118 I IntentService[D: type=1400 audit(0.0:1277): avc:  denied  { open } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1
10-04 15:23:55.096  5118  5118 I IntentService[D: type=1400 audit(0.0:1291): avc:  denied  { search } for  name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service
10-04 15:23:55.096  5118  5118 I IntentService[D: type=1400 audit(0.0:1292): avc:  denied  { getattr } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1297): avc:  denied  { getattr } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1298): avc:  denied  { setattr } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1299): avc:  denied  { append } for  name="omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.620  5118  5118 I IntentService[D: type=1400 audit(0.0:1300): avc:  denied  { open } for  path="/data/vendor/radio/omadm_logs.txt" dev="dm-57" ino=7569652 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0:c512,c768 tclass=file permissive=1 app=com.android.omadm.service
10-04 15:23:55.956  5118  5118 I IntentService[D: type=1400 audit(0.0:1301): avc:  denied  { search } for  name="radio" dev="dm-57" ino=7569419 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:radio_vendor_data_file:s0 tclass=dir permissive=1 app=com.android.omadm.service

Test: atest Enable16KbTest
Flag: build.RELEASE_GOOGLE_CAIMAN_16K_DEVELOPER_OPTION
Bug: 347108593
Change-Id: I67929732c9b23081f3608ac5da413adda81b6c44
2024-10-15 22:53:30 +00:00
Chi-Wei Kao
e0c7545cd1 Merge "Add SELiunx for camera debug app (propsetter)" into main 2024-10-09 02:10:37 +00:00
cwkao
c5a7f8cc0d Add SELiunx for camera debug app (propsetter)
Add the following avc denial:
```
10-02 19:55:46.156   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=activity scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:activity_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.258   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=netstats scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:netstats_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.263   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=content_capture scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.267   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=gpu scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:gpu_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.267   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=activity_task scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:activity_task_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.416   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=voiceinteraction scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:voiceinteraction_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.417   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=autofill scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:autofill_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.425   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=sensitive_content_protection_service scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:sensitive_content_protection_service:s0 tclass=service_manager permissive=1
10-02 19:55:46.427   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=performance_hint scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:hint_service:s0 tclass=service_manager permissive=1
10-02 19:55:48.156   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=audio scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:audio_service:s0 tclass=service_manager permissive=1
10-02 19:55:53.869   402   402 E SELinux : avc:  denied  { find } for pid=6934 uid=10311 name=textservices scontext=u:r:camera_propsetter_app:s0:c55,c257,c512,c768 tcontext=u:object_r:textservices_service:s0 tclass=service_manager permissive=1
```

Bug: 370472903
Test: locally on komodo
Flag: EXEMPT NDK
Change-Id: Ia1a8b42697e790f27a5da9aaa1f7c83fddf2a365
2024-10-09 02:09:57 +00:00
chenkris
537bf14fe6 add selinux permission for fps_touch_handler wakeup
Fix the following avc denial:
avc:  denied  { read } for  name="wakeup96" dev="sysfs" ino=101698 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0

Bug: 371877715
Test: ls -lZ /sys/devices/platform/odm//odm:fps_touch_handler/wakeup
Flag: EXEMPT NDK
Change-Id: I9aff36eaaec914c7a9b4939353fe88f5c0565799
2024-10-07 06:36:52 +00:00
Thiébaud Weksteen
f39431c3c8 Remove duplicate service entries
These entries are defined in the platform policy.

Flag: EXEMPT bugfix
Bug: 367832910
Test: TH
Change-Id: I113222c692b971c698684f762294565b96f8d0cb
2024-10-01 14:48:40 +10:00
Leo Hsieh
ac26d97317 Allow hal_fingerprint_default to access sysfs_aoc_udfps
Fix the following avc denial:
avc:  denied  { search } for  name="17000000.aoc" dev="sysfs" ino=26962 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=dir permissive=1
avc:  denied  { write } for  name="udfps_set_clock_source" dev="sysfs" ino=110484 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
avc:  denied  { read } for  name="udfps_get_disp_freq" dev="sysfs" ino=110486 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc:s0 tclass=file permissive=1
avc:  denied  { write } for  name="udfps_set_clock_source" dev="sysfs" ino=109423 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_aoc_udfps:s0 tclass=file permissive=0

Bug: 357976286
Test: Verify fingerprint HAL process can read/write to the sysfs node.
Flag: EXEMPT NDK
Change-Id: Ia8d6288812ef47dad2018d384f43374da7005a4a
2024-09-30 08:44:07 +00:00
Tej Singh
0507349a4b Make android.framework.stats-v2-ndk app reachable
For libedgetpu

Test: TH
Bug: 354763040
Flag: EXEMPT bugfix
Change-Id: Id4f43ba150bd476426ace22c7d866ee87d5777a0
2024-09-20 21:41:23 -07:00
chenkris
ab3bd433f8 Allow fingerprint to access /dev/fth_fd
Fix the following avc denial:
avc:  denied  { open } for  path="/dev/fth_fd" dev="tmpfs" ino=1575 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1

Bug: 368517769
Test: enroll and authenticate fingerprint.
Change-Id: I46e59d0fb4526586ce6e95e1d715b22e08b4347d
2024-09-20 09:15:44 +00:00
Prochin Wang
90453768c7 Change vendor_fingerprint_prop to vendor_restricted_prop
This is to allow the fingerprint HAL to access the property.

Bug: 366105474
Flag: build.RELEASE_PIXEL_BOOST_DATALAYER_PSA_ENABLED
Test: mm
Change-Id: Iba81a714af741edabdb587d8e5f9d6060dd133c5
2024-09-16 02:12:26 +00:00
Neo Yu
696b8a5777 Merge "Move sepolicy about hal_radioext_default to gs-common" into main 2024-09-06 01:41:13 +00:00
Wilson Sung
42fee8809a Move euiccpixel_app to vendor
Bug: 312143882
Test: make selinux_policy
Flag: EXEMPT sepolicy refactor
Change-Id: I0f6ac76860c90b8022a85cafb80350a708d278c1
2024-09-04 15:10:03 +00:00
Randall Huang
21194d2dc3 storage: move storage related device type to common folder
Bug: 364225000
Test: forrest build
Change-Id: I3fb2a9a46d00ac27931ee8c1ad7b3ceef0920cdb
Signed-off-by: Randall Huang <huangrandall@google.com>
2024-09-04 10:44:29 +08:00
Attis Chen
2f8ab31157 Merge "Label sysfs node power_mode as sysfs_display." into main 2024-09-02 04:54:18 +00:00
Neo Yu
d5626145f3 Move sepolicy about hal_radioext_default to gs-common
Bug: 363665676
Test: verify with test roms
Flag: EXEMPT sepolicy refactor
Change-Id: I618742012138123329ae47c05c958e77f5573956
2024-09-01 14:25:00 +08:00
Nattharat Jariyanuntanaet
11c0bf5839 Merge "Update sepolicy for nfc antenna selftest values" into main 2024-08-30 05:06:06 +00:00
chenkris
dbc540c147 Allow fingerprint to access sysfs_lhbm
Fix following avc denail:
android.hardwar: type=1400 audit(0.0:17): avc:  denied  { write } for  name="local_hbm_delay_frames" dev="sysfs" ino=83619 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_lhbm:s0 tclass=file permissive=0

Bug: 362149568
Test: enroll and authenticate fingerprint
Change-Id: I8c4b18b39fa5c391e9773c7780afe9e0de16e2a9
2024-08-29 05:08:49 +00:00
Nattharat Jariyanuntanaet
4599e2be44 Update sepolicy for nfc antenna selftest values
Allow persist.vendor.nfc.antenna. to be vendor public values for the NFC
companion app to access

avc:  denied  { read } for  name="u:object_r:vendor_nfc_antenna_prop:s0" dev="tmpfs" ino=414 scontext=u:r:untrusted_app:s0:c79,c257,c512,c768 tcontext=u:object_r:vendor_nfc_antenna_prop:s0 tclass=file permissive=0 app=com.google.android.apps.internal.nfcassistancetool

Bug: 361050657
Test: m selinux_policy
Flag: NONE add permission
Change-Id: I0e7c3580e4df332fa3d14c939eb5e588f7600601
2024-08-23 02:42:23 +00:00
Joen Chen
e584e43da5 Merge "Label frame_interval and expected_present_time as sysfs_display" into main 2024-08-19 04:53:58 +00:00
attis
99c09bbbba Label sysfs node power_mode as sysfs_display.
Label power_mode to sysfs_panel to let it be allowed in dumpstate.

avc log:
08-07 18:44:42.192 21635 21635 W dump_display: type=1400 audit(0.0:30): avc:  denied  { read } for  name="power_mode" dev="sysfs" ino=83607 scontext=u:r:dump_display:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 bug=b/322917055

Test: ls -Z, adb bugreport.
Flag: EXEMPT bugfix
Bug: 358505990
Change-Id: I4aa8c13e7fb875e67457a15ea32caaf2ce422039
Signed-off-by: attis <attis@google.com>
2024-08-12 10:53:54 +00:00
Joen Chen
e8d646b5e6 Label frame_interval and expected_present_time as sysfs_display
Bug: 330392550
Flag: EXEMPT bugfix
Test: Check the files label by "adb shell ls -Z"
Change-Id: Iaf8a32671bce035f5c82bd1b34b81c433638ac39
2024-08-12 06:37:33 +00:00
Donnie Pollitz
cb18bb48d5 trusty: Allow linking/read tdp and td
Background:
* storageproxyd needs to be able to create and read symlinks associated
  with TDP and TD.

08-07 08:13:44.868   750   750 W binder:750_2: type=1400 audit(0.0:18): avc:  denied  { create } for  name="0" scontext=u:r:tee:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=lnk_file permissive=0
08-07 07:35:19.396   755   755 W binder:755_2: type=1400 audit(0.0:7): avc:  denied  { read } for  name="0" dev="sda1" ino=15 scontext=u:r:tee:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=lnk_file permissive=0
08-07 08:34:24.956   742   742 W binder:742_2: type=1400 audit(0.0:8): avc:  denied  { read } for  name="persist" dev="dm-52" ino=406 scontext=u:r:tee:s0 tcontext=u:object_r:tee_data_file:s0 tclass=lnk_file permissive=0

Flag: EXEMPT resource only update
Bug: 357815590
Test: Tested by purging device and verifying fresh device
Change-Id: Ib239534bfb28d05de14095e84961ff0f84cde68d
Signed-off-by: Donnie Pollitz <donpollitz@google.com>
2024-08-07 08:41:32 +00:00
Gil Liu
b356ac167e Merge "add hal_graphics_composer to access thermal temperature" into main 2024-07-29 06:10:28 +00:00
Carlos Rodriguez
dd5b70f378 DisplayPort Stats: add sysfs access permission on Zumapro devices
07-25 14:13:16.736  5784  5784 W pixelstats-vend: type=1400 audit(0.0:21): avc:  denied  { read } for  name="fec_dsc_supported" dev="sysfs" ino=82516 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
07-25 14:13:16.736  5784  5784 W pixelstats-vend: type=1400 audit(0.0:22): avc:  denied  { read } for  name="fec_dsc_not_supported" dev="sysfs" ino=82517 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
07-25 14:13:16.736  5784  5784 W pixelstats-vend: type=1400 audit(0.0:23): avc:  denied  { read } for  name="max_res_other" dev="sysfs" ino=82515 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
07-25 14:13:16.736  5784  5784 W pixelstats-vend: type=1400 audit(0.0:24): avc:  denied  { read } for  name="max_res_1366_768" dev="sysfs" ino=82505 scontext=u:r:pixelstats_vendor:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

Bug: 343602691
Bug: 317486088

Flag: EXEMPT bugfix
Test: Android built and flashed and error is gone
Change-Id: I594536581ea468d40c9153bdc1bdd6b1ab7282fd
2024-07-25 21:14:55 +00:00
gilliu
4c189644a9 add hal_graphics_composer to access thermal temperature
type=1400 audit(0.0:77): avc:  denied  { search } for  name="thermal"
dev="tmpfs" ino=1618 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:thermal_link_device:s0 tclass=dir permissive=0

type=1400 audit(0.0:74): avc:  denied  { search } for  name="thermal"
dev="sysfs" ino=21594 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=0

type=1400 audit(0.0:74): avc:  denied  { read } for  name="temp"
dev="sysfs" ino=73536 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0

type=1400 audit(0.0:74): avc:  denied  { getattr } for
path="/sys/devices/virtual/thermal/thermal_zone12/temp" dev="sysfs"
ino=73537 scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:object_r:sysfs_thermal:s0 tclass=file permissive=0

Bug: 340846691
Test: check no avc pattern on logcat from test image
Flag: NONE add permission
Change-Id: I0f327b98e32627e00be4cc0d0a99be39d1ec3bf2
2024-07-22 12:18:58 +00:00
Roy Luo
71d51ce40a Merge "Add xhci-hcd-exynos.7 wakeup paths for suspend service" into main 2024-07-17 01:23:23 +00:00
Roy Luo
d1ad140faf Add xhci-hcd-exynos.7 wakeup paths for suspend service
Bug: 334189230
Test: verified on device
Change-Id: I0adcbe0bb1aff8ff4442c16bb733603ad8c012cf
Signed-off-by: Roy Luo <royluo@google.com>
2024-07-16 19:49:52 +00:00
Vishvam Mazumdar
88e0059ef0 Merge "Add SELinux policy to allow CPU Idle Histogram Stats in dumpstate." into main 2024-07-10 21:41:10 +00:00
Vishvam Mazumdar
d6b8239e73 Add SELinux policy to allow CPU Idle Histogram Stats in dumpstate.
This change is to allow the CPU Idle Histogram Stats to be dumped in
bugreports so that there is more insight into the idle behavior of
devices in the field.

Test: build/flash
Test: adb bugreport
Bug: 344908619
Flag: EXEMPT bugfix
Change-Id: If19b9471cf91ddc6e16347e7a4ea18d3298783d5
Signed-off-by: Vishvam Mazumdar <vmazumdar@google.com>
2024-07-10 21:39:23 +00:00
Jeremy DeHaan
b3d863d552 Allow HWC to access frame_rate node
Flag: EXEMPT bugfix
Bug: 346461765
Change-Id: Id7b3195e76cdce3e612eb9c9d177af24145e70a2
Signed-off-by: Jeremy DeHaan <jdehaan@google.com>
2024-07-04 19:47:10 +00:00
Jack Wu
ee58427ea3 add permission for rt9471 sysfs
Bug: 347914940
Test: adb bugreport
Flag: EXEMPT bugfix
Change-Id: I155c58d857f676fc3a2ff6c2fe9be6262405c7b9
Signed-off-by: Jack Wu <wjack@google.com>
2024-06-19 16:13:33 +08:00
Kiwon Park
4e6cd49893 Merge "Revert "Add setupwizard_feature_prop as one of properties allowed to be read"" into main 2024-06-14 00:06:27 +00:00
Kiwon Park
33de53de68 Revert "Add setupwizard_feature_prop as one of properties allowed to be read"
This reverts commit 26efc37a3d.

Reason for revert: Doesn't fix the issues in factory testing

Change-Id: I8c8473f5a9c0cf9c53a95943101976d4b7103580
2024-06-13 17:24:30 +00:00
Cheng Chang
92c5aff54d gps: Move type declaration to device folder am: 8fa884d01c
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/27574819

Change-Id: I8d7cd44249f8912b9fab64d24ff53381e20fc05b
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-06-12 07:27:17 +00:00
Cheng Chang
8fa884d01c gps: Move type declaration to device folder
Bug: 343280252
Test: b/343280252 compile and abtd test
Change-Id: I492ea0b14953cf5b0111ac70bf82240522a15494
2024-06-11 07:52:11 +00:00
Kiwon Park
070be283a7 Add setupwizard_feature_prop as one of properties allowed to be read
06-05 20:45:54.890420  root   351   351 W libc    : Unable to set property "setupwizard.feature.provisioning_profile_mode" to "true": error code: 0x18
06-05 20:45:54.894967  root   350   350 E init    : Unable to set property 'setupwizard.feature.provisioning_profile_mode' from uid:0 gid:0 pid:351: SELinux permission check failed

Test: manual
Bug: 336903409
Change-Id: I7282cfdbd621dd0e77f08c8ff7287f9693fa060a
Merged-In: I7282cfdbd621dd0e77f08c8ff7287f9693fa060a
2024-06-06 21:42:07 +00:00
Kiwon Park
26efc37a3d Add setupwizard_feature_prop as one of properties allowed to be read
06-05 20:45:54.890420  root   351   351 W libc    : Unable to set property "setupwizard.feature.provisioning_profile_mode" to "true": error code: 0x18
06-05 20:45:54.894967  root   350   350 E init    : Unable to set property 'setupwizard.feature.provisioning_profile_mode' from uid:0 gid:0 pid:351: SELinux permission check failed

Test: manual
Bug: 336903409
Change-Id: I7282cfdbd621dd0e77f08c8ff7287f9693fa060a
2024-06-06 21:41:56 +00:00
Roy Luo
ff802c138e Support sending vendor command to GL852G via libusbhost
libusbhost need access to USB device fs.

Bug: 261923350
Bug: 340665903
Test: no audit log in logcat after command execution
Change-Id: I4b0c8cc750eff12d2494504f9f215d5b1bab35fd
2024-05-22 00:49:12 +00:00
Treehugger Robot
fd7f96c57c Merge "Allow hwc to access te_rate_hz & te_option" into main 2024-05-15 01:41:45 +00:00
Donnie Pollitz
c41ed2ee7f Merge "Add permission for storageproxy to create symlinks for ss" into 24D1-dev 2024-05-14 21:59:03 +00:00
Treehugger Robot
9519db1e1b Merge "sepolicy: allow hal_gnss_pixel to connect to hal_contexthub_default" into main 2024-05-13 08:09:15 +00:00
Cheng Chang
b9181de2ea sepolicy: allow hal_gnss_pixel to connect to hal_contexthub_default
avc:  denied  { call } for  scontext=u:r:hal_contexthub_default:s0 tcontext=u:r:hal_gnss_pixel:s0 tclass=binder permissive=0

Bug: 339391267
Test: Verified the boot health at b/339391267#comment21.
Test: Verified the boot health at b/339391267#comment22.
Change-Id: I109d03e52f6576328b92ec0b18041da8fac502eb
2024-05-10 09:41:57 +00:00
Weizhung Ding
24015b5aeb Add HWC permission to access IStats AIDL am: 32a69c8d11
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/27282714

Change-Id: Ia7f5f040fbe9b08384f5b61e398781f3fe9d3323
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-10 06:54:33 +00:00
Weizhung Ding
260af3904b add sysfs access permission on Zumapro devices. am: b5833b7ddf
Original change: https://googleplex-android-review.googlesource.com/c/device/google/zumapro-sepolicy/+/27282713

Change-Id: Ibf10ea36cc1a257f0351daa7c154ba81a3d17226
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-05-10 06:54:30 +00:00
Weizhung Ding
32a69c8d11 Add HWC permission to access IStats AIDL
avc:  denied  { call } for  scontext=u:r:hal_graphics_composer_default:s0
tcontext=u:r:system_server:s0 tclass=binder permissive=0

Bug: 339598226
Test: Build and check log
Change-Id: I7e5ec165df0d397250b09f5981c1f45aea27bd4c
2024-05-09 11:49:47 +00:00
Weizhung Ding
b5833b7ddf add sysfs access permission on Zumapro devices.
Bug: 339598226
Test: build and check log
Change-Id: Ia7a7f0f8a5ffc63ab52f41d7a012260d73c54153
2024-05-09 11:49:19 +00:00