Since the new memory hal for pasr-v2 will also be used for other
targets that share the same Android image, move all the sepolicy
files to common folder to make it target independent.
Also, update memory pasr hal, psi_service and powerservice_app to
use the updated attributes.
Change-Id: I8978ce2bfff34a9b43d4eacc10f4b5076567768c
A new display partition has been introduced on Lahaina family
targets. Update SELINUX policies to allow partition mounting,
unmounting, autoformatting, and read only access by
the graphics composer HAL.
Change-Id: Ia61df85566525fc1c24ab3dcd2130839286a3cd9
Sepolicy rules for agm service
Change-Id: I686455b1e0cc95360dee60961eb443c79c4f6ebf
sepolicy: Add sepolicy changes for servreg.
agm service requires permissions to servreg
in order to communicate to libpdmapper and libpdlocator.
Change-Id: I613078aa731729476fcb31e160b32cb217966828
sepolicy: Add sepolicy rules for debugfs
Add sepolicy rules for AGM to access debugfs.
Change-Id: I5121c6af4954c50c9c15e132bd4a3da6a771f64e
add permissions to read properties
Change-Id: Ifbe016247386fb418b9e81cd3d44472b30e41863
sepolicy: Allow audio hal for wfd
Change-Id: I75a444ed937ed15645dffdf72d75ed18219c1b11
sepolicy: agm: Make agm service run in hal_audio domain
Change-Id: I503f07312bf898891f57ac28fbb03837958b5e72
sepolicy: add support for PAL hidl service
Use audiohal service context for PAL hidl service as PAL
service will run in context of the audio hal hidl process
context.
Change-Id: If518cf1eeab885f878712e4052895bc0aa8870eb
Add sepolicy for display composer to open/read dmabuf heaps as LTM
needs to allocate dmabuf heaps for histogram buffer.
Change-Id: I7cc3cb022814da50895f0d7b2e4593a35f60899d
As prebuilt path is not set while building vndr so it is unable to find the non_plat_sepolicy.cil
file for system_ext and product.
Change-Id: Id88b81ff75e3278d19bcff511c1b012c9b84a192
Introduce the labels for the CP_PIXEL and CP_NON_PIXEL heaps, and drop the
label for the secure display heap, as this heap is being merged into the secure
display heap.
Change-Id: Ia93b45308922ea40452caba3b45924f95f66c548
Peripheral manager uses mdm helper to get details of the modem,
provide access to enable boot up of modem. This change sets the
appropriate sepolicy labels for remoteproc nodes for peripheral
manager to use.
Change-Id: Ifde86e7547327a137d6529f83a5f8704d6002d71
MWQEM enable dual link wifi data transfer by
efficient utilization of available channel capacity.
MWQEM enables UID specifc data transfer over two links.
"persist.vendor.mwqem.enable" property used to enable
and disable MWQEM feature.
Change-Id: I75f1327abdde9a0314d2091129121a33f1abb2a7
Allow location processes to create lnk_file
in vendor_location_socket path. These lnk_files
are used as the ALIAS of its mq_client socket.
Change-Id: I770ff1bbde1d4926b14e81eabd6e919e5e52102f
CRs-Fixed: 2781188
Allow WiFi hal to create sock_file and lnk_file in
vendor_location_socket path.
Change-Id: I28812d325bdc5ada6a58ec6af9dd6ded6bb7a9cc
CRs-Fixed: 2820484
All vendor services should start with "vendor" prefix. Therefore,
renaming "keymaster-sb-4-0" to "vendor.keymaster-sb-4-0".
Change-Id: Ib534340e8171083452ea58542569ebcd589661c4
Add the labels for our DMA-BUF heaps. Add the policy that gives apps
access to our system heap, in line with how access to the built-in
system heap will be given to apps.
Change-Id: I2cffa38baf8893553e449259d0f6c2e2fb768991
Allow keymaster init script to start keymaster stronbox and authsecret
service.
Test: Checked multiple boot ups on cedros and lahaina and no tombstones observed
from Keymaster or authsecret service.
Change-Id: I2ab22deb997b958f8641fe0482b227ee589b85f1
Add a rule to allow gatekeeper and keymaster HAL
to access /dev/spss_utils (vendor_spss_utils_device).
Change-Id: I210598660e61c3149b2b5279ecd808a59b64cec0
Add smcinvoke dev node as tee device in file_contexts.
This node has been moved from qssi to vendor for GSI
check.
Change-Id: I9ff2e94f8024f6b091afaa8e04381a3d808d9a2a