Board tree for Google Tensor G3 devices
Find a file
Ankit Goyal ded9266dd4 Mark video secure devices as default dmabuf heaps
Mali driver (and codec HAL as well) require direct access to video
secure dmabuf devices. Mali driver being an SP-HAL cannot explicitly
write blanket rules for all the scontext. So, we piggyback on
dmabuf_system_secure_heap_device to allow all scontext to be able to use
these device nodes.

This is just as secure as dmabuf_system_secure_heap_device in that case.
There is no additional security impact. An app can still use gralloc to
allocate buffers from these heaps and disallowing access to these heaps
to the intended users.

Fix: 278823239
Fix: 278513588
Fix: 275646321
Test: dEQP-VK.memory.allocation
Change-Id: I01a2730fc222efe94d4e48e7ee4c317aa65f0064
2023-04-19 19:48:38 +00:00
legacy Move ARM runtime option SELinux rules out of 'legacy/' 2023-04-14 09:20:40 +00:00
private update error on ROM 9900526 2023-04-07 14:43:36 +08:00
radio Modem ML: Grant access to modem ML data dir 2023-04-12 08:48:57 +00:00
system_ext/private zuma: fingerprint: fix SELinux denails 2022-12-23 17:43:50 +08:00
tracking_denials Merge "Remove dontaudit for hal_radioext_default to service_manager." into udc-d1-dev 2023-04-19 03:04:57 +00:00
vendor Mark video secure devices as default dmabuf heaps 2023-04-19 19:48:38 +00:00
widevine Branch zuma from gs201 2022-04-19 14:10:58 +08:00
bug_map Update error on ROM 9558720 2023-02-07 11:29:45 +08:00
OWNERS Branch zuma from gs201 2022-04-19 14:10:58 +08:00
zuma-sepolicy.mk Allow HWC to access panel model 2023-03-03 13:48:53 -08:00