Commit Graph

2356 Commits

Author SHA1 Message Date
Alexander Koskovich 428a21761b common: Update compatibility matrix to LA.VENDOR.1.0.r1-17200-WAIPIO.QSSI13.0
Change-Id: I29f23e8238d53bed58bfc051066b6dca48ebabfc
2022-12-05 04:04:58 +00:00
Jake Weinstein aca789be51 vendor: media: Add prebuilt_hidl_interfaces for dist builds
Change-Id: I2f904f3e98af96e77c57963c85a41334dbcda840
2022-12-05 04:03:37 +00:00
Alexander Koskovich 327de13160 vendor: media: Conditionally update to LA.VENDOR.1.0.r1-16000-WAIPIO.QSSI13.0
For now, this is for 5.10 only. 5.4 and others may upgrade
at some point. Until then, 5.4 uses media-5.4
and pre-5.4 uses media-legacy.

Change-Id: I7dccc184f81d5b1733852397c59d36ca0c3489ca
2022-12-05 04:03:27 +00:00
Alexander Koskovich 5d7681d6fb common: wlan: Update to LA.VENDOR.1.0.r1-16000-WAIPIO.QSSI13.0
NOTE:
[1] - It is necessary to remove HIDL entry in Manifest:

fe498fe66e

Change-Id: I49f05ed43fabc42230a8039a4ffa79c57f2f2c97
2022-12-05 04:00:56 +00:00
Jake Weinstein 639161d061 vendor: perf: Conditionally update to LA.VENDOR.1.0.r1
Blobs are updated to LA.VENDOR.1.0.r1-16000-WAIPIO.QSSI13.0
Configs are updated to to LA.VENDOR.1.0.r1-15600-WAIPIO.0

This does not work yet on pre-5.10 SoCs.
Those SoCs will use the perf-legacy
component until that is fixed (or indefinitely
depending on the complexity of the fix).

Note: I am aware that there are conditions in perf
that only apply to legacy and conditions in perf-legacy
that only apply to perf. We need to nail down the
supported targets before I can clean up completely.

Change-Id: I7925042da82fac6e5353c1a4b1660b3ca9e128d7
2022-12-05 03:57:46 +00:00
Jake Weinstein 9749276e50 vendor: adreno: Conditionally upgrade to LA.VENDOR.1.0.r1-16000-WAIPIO.QSSI13.0
Currently, this only works on 5.4 and 5.10,
so pre-5.4 devices will stay on 5.4
binaries for the time being. This
renames components to the below:

adreno: 5.4/5.10 (LA.VENDOR.1.0.r1-16000-WAIPIO.QSSI13.0)
adreno-6xx-legacy: 4.9-4.19 (LA.UM.9.14.r1-20200-LAHAINA.QSSI13.0)
adreno-5xx: 3.18/4.4 (LA.UM.10.6.2.r1-01600-89xx.0)

Change-Id: I892e3b2e3c5c1d6d95d7c0ab4674075aa5546a3a
2022-12-05 03:57:25 +00:00
Jake Weinstein 19ec3eba9c common: Redo component selection logic
Maintainers should not need to manually select
the appropriate variant of a component for
their SoC. We know what does and does not
work for an SoC. Automatically select
the necessary component. This allows us
to be more flexible when new SoCs launch
and components may need to be renamed or
refactored.

Change-Id: Ibe9815ba7f70ec760c7b0cbd3771707af2e59854
2022-12-05 03:57:01 +00:00
chrisw444 e8269cc8c9 common: sepolicy: Fix mediaserver denial
* 10-30 10:47:22.470 E/SELinux (560): avc:  denied  { find } for pid=1236 uid=1013 name=package_native scontext=u:r:mediaserver:s0 tcontext=u:object_r:package_native_service:s0 tclass=service_manager permissive=0

Change-Id: Ia93424d231b2d8c95e32c6e58cf534f991ad9a5c
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Signed-off-by: Richard Raya <rdxzv.dev@gmail.com>
2022-12-01 11:00:15 -03:00
Jake Weinstein 8cd49f2619 Force pre-5.10 devices to treat 170M as sRGB in SF
Bug: 229442032
Test: builds, boots
Change-Id: If144724a342be4a74f823aa25ff8a74fe3d2843a
2022-11-28 14:53:58 +09:00
Pullakavi Srinivas ea327c78f7 hwc: Disable SF composition prediction model on 5.4 and lower
CRs-Fixed: 3243885
Change-Id: I64f82a25768b561bb343fdb7686b7d6c020d024a
2022-11-28 14:53:13 +09:00
Omkar Chandorkar 0eda1a7e88
system: update to LA.QSSI.13.0.r1-07400-qssi.0
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Change-Id: Ifcba087a46a711303816c5766c81b6dc0021c5d4
2022-11-16 18:53:32 +09:00
chrisl7 676c5a53ff vendor: init: Fix condition for init legacy devices
[1] - The old definition wasn't working, and init post_boot.sh and early_boot.sh
      was being used on legacy devices, which shouldn't happen.

[2] - Yes I've tried other ways to pin but only this worked.

Change-Id: I2b3f41b34ba6297fe1019773c2e7d5fd7d17d00c
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2022-11-15 22:05:38 +00:00
chrisl7 c9d8b8cf45 vendor: init: Fix Invalid section keyword found after f9f83796b3
[1] - 346073a91a

Change-Id: I8fc63f3bffb8db4fecd119c55b9b2afc6b2a0fff
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2022-11-13 16:54:12 +00:00
chrisl7 27f89765a5 system: overlay: Remove support bluetooth_hfp_inband_ringing overlay
[1]  - In Android 13 this is set via properties

Change-Id: Ic610b67c9f4e5d834f54d992565769240b3e6451
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2022-11-13 16:54:00 +00:00
UtsavBalar1231 917d987f7f common: sepolicy: Allow mediaserver to access QSPM HAL
mediserver is looking for QSPM hwservice to initiate adreno profile processing.
libadreno_app_profiles checks for QSPM hwservice access to get memory pointer from QSPM
for adreno profile processing.
So it is required for us to allow mediaserver access to fetch QSPM HAL service.

This fixes following warning
E SELinux : avc:  denied  { find } for interface=vendor.qti.qspmhal::IQspmhal sid=u:r:mediaserver:s0 pid=1437 scontext=u:r:mediaserver:s0 tcontext=u:object_r:vendor_hal_qspmhal_hwservice:s0 tclass=hwservice_manager permissive=0
W Adreno-AppProfiles: Could not find QSPM HAL service. Skipping adreno profile processing.

Change-Id: If0460b4bf7e8981aa98521824b34c1326f243c15
Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2022-11-13 16:53:52 +00:00
Omkar Chandorkar 23177c217d sepolicy: kona: label vendor_boot partition
- devices like alioth ship with vendor_boot on kona

Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Change-Id: Icc0ca6d1eaa2602e0ba927a85e1c639ae30c5a5f
2022-11-09 06:45:09 +00:00
Omkar Chandorkar 2c4028daad common: sepolicy: Allow Secure Element to read NFC chipid
Change-Id: I3a15e4a2fa0115455bdd1ca206830baee873dbfe
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-09 06:44:31 +00:00
Jake Weinstein 2f16a29f0a perf: Set restricted cpuset to the same CPUs as system-background
system-background should only include efficiency cores
and restricted should do the same in order to save
power while the screen is off. Copy system-background
CPUs instead of hardcoding to account for platforms
with varying numbers of efficiency cores.

Change-Id: I3a46190a2fa76eb1e9061a605c6a2e74006975de
2022-11-09 03:38:48 +00:00
UtsavBalar1231 4ba8b00145 common: sepolicy: Allow Perf HAL to read cmdline
Fixes [   30.378433] type=1400 audit(1667805344.191:499): avc: denied { read } for comm=41646170744C61756E636820566D name="cmdline" dev="proc" ino=80996 scontext=u:r:vendor_hal_perf_default:s0 tcontext=u:r:system_server:s0 tclass=file permissive=1

Change-Id: I8f1ddf532a1e4a99aca8fca63c53e34cc716ac99
2022-11-09 03:38:37 +00:00
Jake Weinstein 5d67c870c3 common: sepolicy: Label ipebpsstriping170 for pinner
Change-Id: I75ffd066ff6a5989bb6bd735278f63c7d9e57ea6
2022-11-08 08:17:11 +00:00
Jake Weinstein 93382fa26a vendor: init: Allow 5.4+ devices to boot without modules
init.qti.kernel.rc waits for vendor.all.modules.ready to be
set before finishing init. This is never set when there
are no modules present. Adding vendor_modprobe_no_modules.sh
to unconditionally set vendor.all.modules.ready and boot.

Change-Id: I59f9ae8408f1341469ab7dd02c2ad1222f711fae
2022-11-06 19:30:41 +00:00
Sandeep Singh d9f6752cbb common: sepolicy: Add permission for cnss-daemon to write in persist folder
Add permission for cnss-daemon to create file in
/mnt/vendor/persist/wlan folder.

Change-Id: I11690dee5383e8555260a1c6bbfa266043ed395e
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-06 14:51:27 +00:00
UtsavBalar1231 39942ef559 common: sepolicy: Allow flipendo to find vendor_hal_perf
This fixes ANDR-PERF-CLIENT-SYS not being accessed by flipendo
E SELinux : avc:  denied  { find } for interface=vendor.qti.hardware.perf::IPerf sid=u:r:flipendo:s0:c199,c256,c512,c768 pid=21903 scontext=u:r:flipendo:s0:c199,c256,c512,c768 tcontext=u:object_r:vendor_hal_perf_hwservice:s0 tclass=hwservice_manager permissive=0
E ANDR-PERF-CLIENT-SYS: IPerf:: Perf HAL Service 2.2 is not available.

Change-Id: I42a582864309f17e183e10baf04cbd01eba04913
Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-06 14:48:40 +00:00
Omkar Chandorkar 7a8a93d1a4 common: sepolicy: suppress harmless denials
- for cleaner avc logs

Change-Id: I55f0317e38e6a2fc74739db9993f59e628d099c3
Co-authored-by: UtsavBalar1231 <utsavabalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-05 17:33:25 +00:00
UtsavBalar1231 f50136a7a6 common: sepolicy: Allow init.qcom.usb.sh to create files in uvc.0 dir
During the UVC conifguration initialiation qcom USB script tries to create multiple folder and symlinks
so allow qcom USB script to succesfully create them without any denials.

This fixes:
W init.qcom.usb.s: type=1400 audit(0.0:10): avc: denied { write } for name="uvc.0" dev="configfs" ino=27535 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W init.qcom.usb.s: type=1400 audit(0.0:11): avc: denied { write } for name="uvc.0" dev="configfs" ino=27535 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir   : type=1400 audit(0.0:12): avc: denied { write } for name="header" dev="configfs" ino=27537 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln      : type=1400 audit(0.0:13): avc: denied { write } for name="fs" dev="configfs" ino=27546 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln      : type=1400 audit(0.0:14): avc: denied { write } for name="ss" dev="configfs" ino=27547 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir   : type=1400 audit(0.0:15): avc: denied { write } for name="uncompressed" dev="configfs" ino=27550 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir   : type=1400 audit(0.0:16): avc: denied { write } for name="uncompressed" dev="configfs" ino=27550 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir   : type=1400 audit(0.0:17): avc: denied { write } for name="mjpeg" dev="configfs" ino=27551 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir   : type=1400 audit(0.0:18): avc: denied { write } for name="mjpeg" dev="configfs" ino=27551 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir   : type=1400 audit(0.0:19): avc: denied { write } for name="h264" dev="configfs" ino=27552 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir   : type=1400 audit(0.0:20): avc: denied { write } for name="h264" dev="configfs" ino=27552 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir   : type=1400 audit(0.0:21): avc: denied { write } for name="header" dev="configfs" ino=27549 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln      : type=1400 audit(0.0:22): avc: denied { write } for name="header" dev="configfs" ino=27549 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln      : type=1400 audit(0.0:23): avc: denied { write } for name="header" dev="configfs" ino=27549 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln      : type=1400 audit(0.0:24): avc: denied { write } for name="header" dev="configfs" ino=27549 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln      : type=1400 audit(0.0:25): avc: denied { write } for name="fs" dev="configfs" ino=27556 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln      : type=1400 audit(0.0:26): avc: denied { write } for name="hs" dev="configfs" ino=27557 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln      : type=1400 audit(0.0:27): avc: denied { write } for name="ss" dev="configfs" ino=27558 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0

Change-Id: Ic092fe1d6ea0d42f0d4939ac3a4241ec0063697d
Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-05 17:33:25 +00:00
UtsavBalar1231 522391750b common: sepolicy: Allow init.qcom.post_boot.sh to set
watermark_scale_factor

- addresses
W init.qcom.post_: type=1400 audit(0.0:42): avc: denied { write } for name="watermark_scale_factor" dev="proc" ino=52566 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:proc_watermark_scale_factor:s0 tclass=file permissive=0

Change-Id: Ib79c0208e758f03df5ce6652322802354836d6a5
Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-05 17:33:25 +00:00
UtsavBalar1231 24cc0790bc common: sepolicy: Allow init to modify read_ahead_kb and discard_max_bytes
Change-Id: Ie5eee0883558a489c8cda2e4418f7a7144bf1ae1
Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-05 17:33:25 +00:00
kocolin 574d2193e2 common: sepolicy: Label libipebpsstriping for pinner
Change-Id: I6806151eee833725e173903d03e9459839333565
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-05 17:33:25 +00:00
Jake Weinstein 35bbde4eaf vendor: init: Add legacy scripts for pre-5.10 devices
This allows legacy devices to keep working with
new init without increasing maintenance or affecting
more recent SoCs.

Change-Id: Ia66fa4b044bc9d7f2fabe9a0f6e4b18f6f1189e9
2022-11-04 19:48:07 +00:00
Alexander Koskovich f9f83796b3 vendor: init: Update to LA.VENDOR.1.0.r1-17700-WAIPIO.QSSI13.0
Remove init.qcom.factory.rc because it is not needed.
init.kernel* and init.qti.* are from LA.VENDOR.1.0.r1-15600-WAIPIO.QSSI13.0

Change-Id: Ia16d51b80f402634bd918314ee3cf7691421668d
2022-11-04 19:47:51 +00:00
Himanshu Agrawal 97b4c0d232 common: sepolicy: Fix compilation issues for newer upgrade
Change-Id: I60686d0066a1aa099a7dffbca091c9a7e2bac7f8
2022-10-30 04:50:58 +00:00
Jake Weinstein 4cf4a266c1 common: sepolicy: Remove blank msmsteppe policies
Qualcomm removed them at
"removing some of the target dir from the component.", which
we reverted.

Change-Id: If2d407c03c112099b67bcd88d2ec4b31c0425642
2022-10-30 02:31:07 +09:00
Jake Weinstein c6e82f947b vendor: Use new IPA on 5.10 only for now
5.4 has broken tethering settings on some devices.
Will revisit.

Change-Id: I6c526c8fe8202fda4c6e2c985f20c3d0730d8c65
2022-10-30 02:27:35 +09:00
PainKiller3 89e506c28a sepolicy: Update paths for new sepolicy location
Change-Id: I4fa022c674cf031fa2c89fabad1f457ac3516132
2022-10-29 17:12:55 +00:00
Jyotiraditya Panda 4bd3d38ceb sepolicy_vndr: lahaina: Fix rtc0 wakeup node label path.
Fixes:

  W Binder:601_2: type=1400 audit(0.0:797): avc: denied { read } for name="wakeup15" dev="sysfs" ino=65223
    scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=dir permissive=0
  E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup15: Permission denied

Change-Id: I7e3d90eab1b0a7ad73d810221bf1c7aca3936883
Signed-off-by: Jyotiraditya Panda <jyotiraditya@aospa.co>
2022-10-29 11:58:28 +09:00
Jake Weinstein 9373746f3b common: sepolicy: Remove waipio policies
These were added back at 'Revert "removing some of the target dir from the component."',
however, taro uses the taro directory.

Change-Id: Ide946d9db03f1f2ffbabab0203090238b18475f3
2022-10-29 11:58:28 +09:00
Omkar Chandorkar 717123bb4d sepolicy_vndr: generic: allow tlocd to search for vendor_location_data_file
Change-Id: I7a6e3679e8b3c216e034f0897218898539337e42
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-29 11:58:28 +09:00
Omkar Chandorkar 4e2cc088a4 sepolicy_vndr: generic: address ims denials for legacy stack
Change-Id: Icd379fdefdeb8feabe7ec658cf8a4e8056b35e53
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-29 11:58:28 +09:00
Omkar Chandorkar 960bf8f349 Revert "Neural Networks: Remove NNHAL-1.3 configuration"
This reverts commit b0b589b96c18ed37c77479ece367c6b34af7c56b.

Change-Id: Ifadb4bc83d580735ba9be940f0e77057f9e70e68
2022-10-29 11:58:28 +09:00
Omkar Chandorkar 1c575c42d0 sepolicy_vndr: qva: allow vppservice to access ion_device
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Change-Id: I10edaf60af3682599b55d9877f7ef11e5aba9b81
2022-10-29 11:58:28 +09:00
Omkar Chandorkar 782b7e8229 sepolicy_vndr: qva: allow esepowermanager to access ion_device
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Change-Id: I16291a16ffac819960aeb681af9ecae1b48f4b61
2022-10-29 11:58:28 +09:00
Omkar Chandorkar 20d7c954dd sepolicy_vndr: generic: add poweropt sepolicy for kona
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Change-Id: I8477b7455b12dfa783d7e646b92726e6dc91361a
2022-10-29 11:58:28 +09:00
Omkar Chandorkar 0e4a4ed479 sepolicy_vndr: qva: allow vendor_hal_qteeconnector to access ion_devices
- addresses
W qteeconnector@1: type=1400 audit(0.0:144): avc: denied { read } for name="ion" dev="tmpfs" ino=1280 scontext=u:r:vendor_hal_qteeconnector_qti:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=0

Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Change-Id: I743a9efe95c4d56dd613722f6e61c200297a0b16
2022-10-29 11:58:28 +09:00
Omkar Chandorkar 1dbfe6c867 sepolicy_vndr: qva: allow netmgrd to modify rmnet module parameters
- addresses
W netmgrd : type=1400 audit(0.0:135): avc: denied { search } for name="parameters" dev="sysfs" ino=51272 scontext=u:r:vendor_netmgrd:s0 tcontext=u:object_r:vendor_sysfs_rmnet:s0 tclass=dir permissive=0

Change-Id: I88a99677ae3a1a0070111d1978c48d1cf43094e1
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-29 11:58:28 +09:00
Arian 8ede8d6ad2 sepolicy_vndr: qva: Update vendor property types
Change-Id: I93335f35c94250bc62defb36552ac5db2efbb98b
2022-10-29 11:58:28 +09:00
Foxtrot47 09af1dabaf sepolicy_vndr: generic: Drop hbtp rule from msmnile
Change-Id: Ib14ff840d752713da5cd1ca72e6516d5359beb6a
2022-10-29 11:58:28 +09:00
chrisl7 df490c97ef sepolicy: vndr: Remove hal_rcsservice to all platform
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: I140ee0b92bd1b47bb91e1c2df422e7e2b2676774
2022-10-29 11:58:28 +09:00
Arian 87fd803d2a sepolicy_vndr: qva: Remove mediatranscoding sepolicy
commit [1] made the mediatranscoding type private.
Instead [2] was merged into android12-gsi which
moves the rule to system/sepolicy.

[1]: 63655462bb
[2]: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1880325

Change-Id: Ic6d9db21c437cbafe4d008eba9d67c5f3ce5842a

qva: Remove mediatranscoding sepolicy

Change-Id: Ie9818d52e997de166f8f9229369d2e29f78d8e95
2022-10-29 11:58:28 +09:00
MoetaYuko 3b251dd74c sepolicy: Fix genfscon for kona
Change-Id: I4ed9e080904d7d2dbbb88a2da0aaffda37a0277b
2022-10-29 11:58:28 +09:00
Omkar Chandorkar ae1f27b0b6 kona: fix compile
Change-Id: I18270f41c2d53ce2b3628ab4bc843e8560557ba3
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-29 11:58:28 +09:00