Add labels for charger related sysfs devices and script, and add policy
for charger script to access charger devices.
Change-Id: I4cbea169bd75a8f6474d6390614f43dd6ed5efc2
All vendor init process would have access to vendor_default_prop.
Define security context for "ro.build.software.version" as
vendor_default_prop.
Change-Id: I5b1f1698dcbb3d914a66c540f31f7624c707a72e
- Add permission for rild to set and get the property
persist.vendor.net.doxlat
- Revoke set_prop permission to system_server.
- Define domain for DataConnection HAL
Change-Id: I143bfffa8af61d087d8210516c57a211e25f0a1d
CRs-Fixed: 2425156
This commit defines required seploicy rules for wifilearner service
and IWifiStats HAL.
CRs-Fixed: 2444187
Change-Id: I42d84567f253b42b42ce27138cb25df89246c604
As part of CTS testing its expected no denails should be seen
from dumpstate domain during testing so addressing generic
permission issue.
test :testNoBugreportDenials
Change-Id: I27178e6b4180d53cd5f6574bf71fe54819b10454
Failure VtsTrebleVendorVintfTest tests failed as
vendor.qti.hardware.scve.panorama@1.0::IPanoramaTracking
not available
Change-Id: I6c64ab6ce120c45d43479ab663c11f7650d35f05
Add rules for hal_usb_qti service, which is part of hal_usb
and hal_usb_gadget domains defined by system policy. Grant
access to needed properties and files.
Change-Id: I1e03ad1e63f5c70788f04e52833f6d09cc76eca8
As part of security hardening following violators are
been removed
1. untrusted_app_visible_hwservice_violators
2. data_between_core_and_vendor_violators
Security testing check for violators sharing data between core and
vendor so removed the violator exception in vendor_init.
hwservice are not to be exposed to untrusted app so remove hal_perf
for this list untrusted_app_visible_hwservice_violators list
Test:
testNoExemptionsForDataBetweenCoreAndVendor
testNoUntrustedAppVisiblehwservice
Change-Id: I76f26848a0f148b1b332f68fd05f7632f9399af6
Following paths on sysfs are now labeled in system side
file_contexts so removing the duplicate entries from
vendor side genfs_contexts .
/module/tcp_cubic/parameters
/devices/virtual/net
Change-Id: I4c872ca3e14da9a73b1adbfd9671c3df1a0046c8
vendor.gatekeeper.disable_spu is added to /vendor/build.prop,
allowing vendor_init to set this property to ensure the
property can be read by gatekeeper and through getprop
Change-Id: Icb9362e330573eec9d96f5bb8d5bb0aeae1f8b76
Add the set_prop for the hvdcp_opti to have a write access to the
persist property.
Change-Id: Id15a2529faa74e2fc96cec9a9d02d2dd84145d34
Signed-off-by: Kiran Gunda <kgunda@codeaurora.org>
This is needed to set the receive packet steering entry.
Fixes the following denial -
avc: denied { read write } for comm="netmgrd" name="rps_cpus"
dev="sysfs" ino=79460 scontext=u:r:netmgrd:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
CRs-fixed: 2425568
Change-Id: Idc94fbef7ed922a6d2376fd82bdb6cb45ff0d536
Mediacodec needs to access audio devices to use OMX HW decoders and
encoders. Allow mediacodec to access audio devices.
Change-Id: I6706f989d8e90607bd3134a88268322451122b15