Adding a new label to /sys/block/dev/sd*
Allow vendor_qti_init_shell to have permissions to
update read_ahead_kb nodes of
- /sys/block/ram*
- /sys/block/loop*
- /sys/block/sd*
- /sys/block/zram0
Change-Id: I123fb7608b95c33ec15b6c5ad3f1e7dd471c6853
* Allow Spearhead to create and manage child processes. The child
processes of Spearhead will manage a subset of Spearhead
functionality
* Allow creation and management of FIFO file. The FIFO file is used
to control the operation of Spearhead (ON / OFF) via filesystem
Change-Id: Ie2c715b2a777b4754ccb5c5be1eebf858b80ef27
Add more sepolicy rules to access new trusted_touch_enable,
trusted_touch_type and trusted_touch_event nodes in TUI HAL.
Change-Id: I9592fb68dc3d38288b5b4ed6c5c118eefc1cf4fb
As the debugfs_mmc check is going to be done most of drivers
and will hit search denails .
So adding the permission to dir search .
Change-Id: I69751e34bcad90af9bfa4d98c89287258382fe7c
1. Allow qvrservice to access native sensor services
in system server via bind call.
2. Suppressing the dsp error messages.
Change-Id: I6492c379a8b63dcf0d5faec2426094b616924b67
While setting ssr recovery persist property avc denial error
is thrown and that could be due to wpss is not added
to the allowed list.
Add wpss subsystem to the list to overcome this.
Change-Id: Ie77539ccc5d44056f54fe7c006017438ee903eec
The qfprom node is not accessible when it's path is added to file_contexts, so
removing it from feat_conf and adding to genfs_contexts, to access it.
Change-Id: Ib916eda6e26992d833c7ec49fa76de26555d73f9
One particular script running under vendor-qti-testscripts context
requires calling `getprop persist.vendor.usb.enable_ftrace`. Add
permission for it to read vendor_usb_prop.
Change-Id: I06a477a166c7b3c6d97d4832478cc59c48790933
vold deamon tries to query the QMCS partition during bootup.
While this access is correctly denied, it results in errors.
For debug and ENG builds, suppress denial messages when the vold
context attempts to access the QMCS context.
Change-Id: Ibe9a153e5863ad13475bd777b221bbc8bbfb5893
Spearhead framework is used for collecting data path stats
for debugging. DLSC is the agent that will collect stats
related to the network stack. For this framework to function
we need to define new SELinux policies to provide the
required access privileges.
Since Spearhead will only be enabled on userdebug
builds, move the Spearhead framework policy to
the test folder.
Change-Id: Icb29b7ffd73c255933d05fe7e5de31aa724e2b73
-SCVE needs to read soc_id from runtime property to differentiate
between targets having same lunch option
-Added libsoc helper for hal_camera
Change-Id: If5cef7f1c5cb89ee0bf4d0da83629a60c7d9d056
Add sepolicy rules to access new trusted_touch_enable,
trusted_touch_type and trusted_touch_event nodes in TUI HAL
Change-Id: Id4c06bf7bc6cae867aeb999d25791093ef8ad8d3