These policies are moved to gs-common as part of ag/24002524
Bug: 288368306
Change-Id: Iaa15e497eafd54b1b702192a3c8f7fe0c908f8a1
Signed-off-by: Dinesh Yadav <dkyadav@google.com>
Mali driver (and codec HAL as well) require direct access to video
secure dmabuf devices. Mali driver being an SP-HAL cannot explicitly
write blanket rules for all the scontext. So, we piggyback on
dmabuf_system_secure_heap_device to allow all scontext to be able to use
these device nodes.
This is just as secure as dmabuf_system_secure_heap_device in that case.
There is no additional security impact. An app can still use gralloc to
allocate buffers from these heaps and disallowing access to these heaps
to the intended users.
Fix: 278823239
Fix: 278513588
Fix: 275646321
Test: dEQP-VK.memory.allocation
Change-Id: I01a2730fc222efe94d4e48e7ee4c317aa65f0064
Allow hal_uwb_default to access /dev/uci
Bug: 263048994
Test: http://ab/I86600010139623509
Change-Id: I6324044822f74d1f0d14cc9c6d057dce0dfcc9ee
Signed-off-by: Rex Lin <rexcylin@google.com>
This is needed as google_camera_app needs write access to gxp.
Test: Tested with private build "P51261040" with Tot google3 gca-dogfood app & found no selinux violations.
Bug: 264139000
Change-Id: Ic1a262cc40578ebd2305efe851e54cf857bd02c1
Bug: 247013568
Test: - Verify that this change is a NOP for devices with TDP already
created on top of the legacy f2fs partition /mnt/vendor/persist/ss
- Verify that this change creates a valid symlink on a manually
migrated block device
Change-Id: I226f365c6afbb5fa91ec1c9c1943f8dddac8183a
Allow the script to access the specified partition and sysfs.
Bug: 224464892
Test: full build and test ffu flow
Change-Id: I27f0d4d97f15a7c108e6ae1b8c12fda2c69c303a
Signed-off-by: Leo Liou <leoliou@google.com>
There is no change in dmabuf heaps from pro, so these use the exact same
SEpolicy rules
Fix: 264489636
Test: Boots to home (with SELinux enforced)
Test: VtsHalGraphicsMapperV4_0TargetTest
Change-Id: I58ec8d9558fa76b805c0882cbbb20bfd08aead13
Add hal_camera_default.te for zuma. Move referenced contexts and
settings to new zuma-sepolicy folders. Add hal_camera_default type declaration
to file.te
Bug: 261651093, 260366029, 263185135
Test: Build and test for hal_camera_default denials
Change-Id: Id0246f9ca8fd399853894e9e41548976ab44ccd0