Cvp is a new computer vision hardware
which interacts with DSP and video driver.
Adding new ion mem permission for cvp domains.
Change-Id: I6c2118b15cf5ccc6505c80969c4090e3396238e4
Allows netmgr to control starting/stopping the qmipriod daemon via
setting the relevant android properties.
Change-Id: I35d9af93ff565bddc4813eef8ad36db896d4a400
Add smcinvoke dev node as tee device in file_contexts.
This node has been moved from qssi to vendor for GSI
check.
Change-Id: I9ff2e94f8024f6b091afaa8e04381a3d808d9a2a
The `wifi.interface` property was labelled as `exported_default_prop` by
system/sepolicy in android 11. Since android 12 it is labelled as
`wifi_hal_prop` which causes the following denial.
W libc : Access denied finding property "wifi.interface"
W cnd : type=1400 audit(0.0:22): avc: denied { read } for name="u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=26257 scontext=u:r:cnd:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=0
Change-Id: I15c7ea0b0975e7be2f348b1215b4417d5ab08bf8
SLM enable dual link wifi data transfer by
efficient utilization of available channel capacity.
SLM enables UID specifc data transfer over two links.
"persist.vendor.slm.enable" property used to enable
and disable SLM feature.
CRs-Fixed: 2607286
Change-Id: Ia562f698a3fa309eb45e98dea2a9fdc6a7623799
levelFrom is used to determine the level (sensitivity + categories)
for MLS/MCS. If set to all, level is determined from both UID and
user ID. This is bad for poweroffalarm, as it needs to be able to
write to /persist/alarm/data which has a context without mls_level:
u:object_r:persist_alarm_file:s0
instead of
u:object_r:persist_alarm_file:s0:c0,c256,c512,c768
Change-Id: I9a8b706cdedc090281e4b5542eb34816b7ff338e
This reverts commit 2978c00a08.
Removing these rules was completely wrong because even the latest
PowerOffAlarm APK's from Android 13 images still need to write
to /persist/alarm/data file. Whatever CLO is doing hasn't been
propagated to WAIPIO.QSSI13.0 tags... so far.
Change-Id: I60e1b970025b0019b77721559d29c1e7fa1b7093
Add selinux rules for drm clearkey services. Refine and extend drm
widevine service rules for future updates.
Change-Id: I4cada93265a8e469352a6ecba3c7b676b665c2d3
The AOSP code already defines and gives permission
to this label. Further this is renames in latest code
to ffs_config_prop so referring the label here gives
compilation error.
Removing it since already the permissions are there.
Change-Id: I14154df9cf269e3524c80a539c97bcb77dd97fc0
Signed-off-by: Udipto Goswami <quic_ugoswami@quicinc.com>
1, Define a type vendor_qteeconnector_opti_prop for qteeconnector.
2, Allow vendor_init and init_shell to set the property.
Change-Id: I6323a7a04cb5f1d32a051bf02089be42787d1967
tee device node is used to communicate with trusted environment.
Sometime wait is used in init rc files. Adding policy to provide
vendor_init required permission for legacy
Change-Id: I97101bc653a73ae4c9e1d96bc326fcddcf390ae6
Add vendor_ prefix to qteeconnector label in order to
allow secure_elemnt HAl to access qteeconnector services.
Change-Id: Icebff13e2119bfdd7a50c582dd08927bfdc39c1a
Allow sepolicy rules for hang_guard to
send signal to process, write into kmsg,
look through proc and write into sysrq.
Change-Id: Ia707097a5e4867377138df7948f50441f560bdd6