Commit graph

5 commits

Author SHA1 Message Date
Max Weffers
7b049283ea
sdm660: sepolicy: Allow vendor_init to set props 2019-08-15 15:31:17 +02:00
Subhajeet Muhuri
0e89ed5c61
sdm660-common: sepolicy: Address more vendor_init denials 2019-08-14 10:04:14 +02:00
Tom Cherry
f3aa8e3d2b
sdm660-common: sepolicy: Add restricted permissions to vendor_init
The core SEPolicy for vendor_init is being restricted to the proper
Treble restrictions.  Since this is a legacy device, it is tagged as a
data_between_core_and_vendor_violators and the needed permissions are
added to its device specific vendor_init.te

Bug: 62875318
Test: boot walleye without audits
Change-Id: I13aaa2278e71092d740216d3978dc720afafe8ea
Signed-off-by: Subhajeet Muhuri <kenny3fcb@gmail.com>
2019-08-14 10:04:13 +02:00
GuaiYiHu
d2ce22775d
sdm660-common: sepolicy: Address camera denials
Change-Id: I052adadca396fb104af49daec1d83047d0809416
2019-08-14 10:04:13 +02:00
Dan Cashman
b1f434c446
wayne-common: Add BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIR
Move vendor policy to vendor and add a place for system extensions.
Also add such an extension: a labeling of the qti.ims.ext service.

Bug: 38151691
Bug: 62041272
Test: Policy binary identical before and after, except plat_service_contexts
has new service added.
Change-Id: Ie4e8527649787dcf2391b326daa80cf1c9bd9d2f

Change-Id: I1493c4c8876c4446a1de46b39942098bf49c79f8
2019-08-14 10:04:10 +02:00
Renamed from sepolicy/vendor_init.te (Browse further)