Bug: 193367138
Test: make sure no denied logs in oemrilservice_app when access the
radio property
Signed-off-by: Sungwoo choi <sungwoo48.choi@samsung.com>
Change-Id: I9014002476df7b4e650f7a5a2f153e4eca47d23d
Support both 1.0 and 1.1.
Bug: 186539538
Test: run vts -m VtsHalTetheroffloadControlV1_0TargetTest
run vts -m VtsHalTetheroffloadControlV1_1TargetTest
Signed-off-by: Namkyu Kim <namkyu78.kim@samsung.com>
Change-Id: I76a26dcd22e1c8985d470a39b9aeae618f459d00
The storageproxyd needs a wakelock around the sequence of UFS commands
Bug: 193456223
Test: Trusty storage tests
Change-Id: I1efe3144c8bcc17c056fc3b9b796e080f77991d5
The avc denials are listed in b/192208389#comment10.
Bug: 192208389
Test: Manually tested
Change-Id: Ib2e3cf498851c0c9e5e74aacc9bf391549c0ad1a
Signed-off-by: Darren Hsu <darrenhsu@google.com>
The storageproxyd needs to create persist/ss from scratch.
So we add the create perm.
Bug: 193489307
Test: Trusty storage tests
Change-Id: Ida1c07acac26494ae6bba0392fb2da0425803608
hal_googlebattery will be writing to:
/sys/devices/platform/google,cpm/dc_ctl
Test: Ensure there are no errors on logcat | grep google_battery@
Bug: 183772980
Change-Id: Id4490d6de161eefe63c36c01d497696b16c6292d
Fix seapp_contexts sepolicy for shannon-rcs, where
:shannonrcsservice process exceptions are not handled
Bug: 190581528
Signed-off-by: Myung-jong Kim <mj610.kim@samsung.com>
Change-Id: I15cbf103cea70f6db878305a8fca6b35aa521f9b
It is for power hal can access system file of INT clock
Bug: 168654554
Test: 1. Check file group of INT clock system file
2. P21 Camera Test Checklist done
Change-Id: I1952c5d2ae39c338c9d2ccb8db49d1d119943c06
Fixes: b/192026913
Test: Run dumpstate and confirm no avc denials
Signed-off-by: Michael Ayoubi <mayoubi@google.com>
Change-Id: I3d818fb066a834663dc63b8757bd16c08a1a0e9e
Should fix intermittent failures of SELinuxUncheckedDenialBootTest.
Bug: 192485697
Test: build, checked for denials in logcat
Change-Id: I3b9cafd99f9ff343e5ab5c67f5f268e5eb4382d6
This is to enable clearing of secure element during a master reset.
Bug: 182508814
Test: master reset on device with keys; verified no keys after reset
Signed-off-by: Jeffrey Carlyle <jcarlyle@google.com>
Change-Id: I9bb569e09f8cd6f5640757bd0d10a14ef32946ff
Revert "add gs101-specific recovery library"
Revert "recovery: enable support for device-specific WipeSe impl..."
Revert "clear secure element of Digital Car Keys during factory ..."
Revert submission 14983788-clear_keys
Reason for revert: b/192373955
Reverted Changes:
Ia8fc29e6c:add gs101-specific recovery library
Icc1eabfd4:clear secure element of Digital Car Keys during fa...
I943d97b26:recovery: enable support for device-specific WipeS...
I15c7fbd7f:allow recovery and fastboot to access secure elmen...
Change-Id: Ic576b40641171298ad840bedbd4a9f7b67052d95
This mirrors the same sepolicy line in previous Pixel devices.
Bug: 189493387
Test: fastboot flash vendor_boot on r4
Change-Id: Ie15c8e6e5c01b249e1e5e244666c461253279f0b
major changes:
1. This change is to allow rlsservice to read the status of
display status file. Similar method was employed in previous
pixels.
Bug: 191122203
Test: p21 camera test checklist
Change-Id: I09483881294fd6dde46d4d0b7283311a2d20c404
This is to enable clearing of secure element during a master reset.
Bug: 182508814
Test: master reset on device with keys; verified no keys after reset
Signed-off-by: Jeffrey Carlyle <jcarlyle@google.com>
Change-Id: I15c7fbd7f2c4fb34dcad0ae4f5cee3238f526fa5
This change removes direct access to the LHBM sysfs node from SystemUI,
but allows SystemUI to make binder calls to the hardware composer (HWC),
which can be used to enable or disable LHBM.
Bug: 191132545
Bug: 190563896
Bug: 184768835
Test: no avc denials
Change-Id: I5417377ff096e869ad772e4fd2fb23f8c1fd4f1e