theimpulson
8e8382e7e7
sepolicy: qva: Remove duplicate specification for qti.ims.ext
...
*Warned on boot by SELinux
04-07 04:27:33.567 561 561 W SELinux : Multiple same specifications for qti.ims.ext.
*Current Duplicate: https://github.com/LineageOS/android_device_qcom_sepolicy/blob/lineage-17.0/generic/private/service_contexts#L27
Change-Id: I81772ce4207cb6f24a6b94f6d160c1afa285dab4
2019-10-28 04:32:26 +01:00
Michael Bestas
4c39c3c5b5
Merge tag 'LA.UM.8.1.r1-09500-sm8150.0' of https://source.codeaurora.org/quic/la/device/qcom/sepolicy into lineage-17.0
...
"LA.UM.8.1.r1-09500-sm8150.0"
Conflicts:
Android.mk
Change-Id: I2aea726910b3b33582c5a4608bbe2fe59d5de1a4
2019-10-18 20:19:43 +03:00
LuK1337
0740394e16
Revert "sepolicy: Fix target selection"
...
* UM_4_14_FAMILY isn't defined by the time sepolicy.mk is included.
This reverts commit d4266182f8 .
Change-Id: Ie07c1994c73bd2b2c55b02669c29e31c1dc31528
2019-09-27 14:14:49 +02:00
V S Ganga VaraPrasad (VARA) Adabala
372e27004d
Merge commit '4969e852def2de8160d7b4da28689aabaf746a48' into sepolicy.lnx.5.9.r1-rel
...
Change-Id: I5c8a382f178503d5d04f264aeb7109c3a74f0c8a
2019-09-23 15:07:06 +05:30
Pawan Chilka
47468bb1b3
Revert "Revert "qspmhal: Add SE policy for QSPM-hal""
...
This reverts commit df464efafd .
Change-Id: I364a10a990210c5f7daa22ff7a5f6f8c558436f7
2019-09-23 12:28:15 +05:30
Pawan Chilka
84d7053655
Revert "Revert "qspmsvc: Add SE policy for qspmsvc""
...
This reverts commit c81577cc44 .
Change-Id: Ifc0dd95b1ae55cf0da277c35aefcfd5fb8ed8024
2019-09-23 12:24:38 +05:30
Pawan Chilka
f47da64aee
Revert "Revert "Add Sepolicy rules for qspmhal debug prop""
...
This reverts commit 1d89ca6ab1 .
Change-Id: Ie959247df5dae3afcb45ce870ebade7c29e8402b
2019-09-23 12:21:50 +05:30
qctecmdr
4969e852de
Merge "sepolicy: update npu dcvs nodes"
2019-09-18 07:48:12 -07:00
qctecmdr
d42c427166
Merge "atoll: Added sepolicy rule to access qfprom node"
2019-09-18 07:48:12 -07:00
qctecmdr
9e45385399
Merge "Adjust sepolicy to allow connecting to thermal socket"
2019-09-18 04:12:20 -07:00
qctecmdr
1391622b32
Merge "sepolicy: add sysfs_net related path entries"
2019-09-18 04:12:19 -07:00
qctecmdr
a269d8df30
Merge "Sepolicy: Update the subsystem numbers."
2019-09-18 04:12:19 -07:00
qctecmdr
73490248aa
Merge "Sepolicy : Add dont audit for vendor_gles_data_file label"
2019-09-18 04:00:10 -07:00
qctecmdr
f11edaff17
Merge "sepolicy: add support for limits-cdsp sepolicy context"
2019-09-18 03:58:06 -07:00
qctecmdr
5689051be7
Merge "sepolicy-sensors : allow init daemon to set sensors_prop properties"
2019-09-18 03:49:09 -07:00
Chitti Babu Theegala
172832d060
atoll: Added sepolicy rule to access qfprom node
...
Change-Id: I85f22a6737bd2ecaf5347ba14d6087833941e5c6
2019-09-17 10:06:57 +05:30
Keerthi Gowda Balehalli Satyanarayana
f43732e1ef
Sepolicy: Update the subsystem numbers.
...
Change-Id: I987e968d529773d4b0d98697bab13dfb18a2323b
2019-09-16 11:52:18 -07:00
Ayishwarya Narasimhan
ebcacf2bae
sepolicy: add sysfs_net related path entries
...
Change-Id: I93d461b653a90f59820c84606538d991581c4cfe
2019-09-16 10:19:02 -07:00
Rahul Janga
176a46a17b
Sepolicy : Add dont audit for vendor_gles_data_file label
...
System process cannot access vendor partition files.
Change-Id: I7fd5805ac98319660c1e5f9fca3ae2137a49d0a0
2019-09-16 12:08:02 +05:30
binzhang
5ec1c4565d
sepolicy: add rule for reading qfprom node.
...
Change-Id: I37e63fb286cdde6faa0f73ac4a1134ef76600701
CRs-Fixed: 2522474
2019-09-16 13:07:18 +08:00
Volodymyr Zhdanov
9fc1fa70c4
legacy: Fix newline in file_contexts
...
Change-Id: Ia1543799d5cf858053dd127c1e9ea9559236bd9e
2019-09-15 23:07:07 +02:00
Volodymyr Zhdanov
d4266182f8
sepolicy: Fix target selection
...
Anything lower or equals to sdm845 is now considered legacy.
Change-Id: Id4e2433304396c8ca7430d3308f65d8d878f9bb9
2019-09-15 23:06:58 +02:00
Kishore Sri venkata Ganesh Bolisetty
1be160adb2
Adjust sepolicy to allow connecting to thermal socket
...
Change-Id: I9b0ac22bd7ff2e7de023bc517f4d2079a53be7a8
2019-09-14 18:46:02 -07:00
Rashed Abdel-Tawab
db447e21bf
sepolicy: Move definitions from Android.mk to make opt-in
...
Move the BOARD definitions to sepolicy.mk to allow devices to opt
in rather then automatically include with Android.mk. Also include
lineage-specific qcom sepolicy now located in
device/lineage/sepolicy/qcom.
Original commits:
959d336245
27f078f104
Change-Id: Ibf70e4c8ab9d91b50c62c3e9f1263e1624e8ca00
2019-09-15 01:53:58 +03:00
Keerthi Gowda Balehalli Satyanarayana
6ac3bf81e1
Sepolicy: Set genfs context for all subsystems
...
ssr_setup needs permission to write RELATED to restart_level
file of all subsystem to do SSR.
Change-Id: I789b7db351cd6f36e08d8fb4753f23d6621672f9
2019-09-13 11:40:04 -07:00
Amandeep Virk
36630509ab
sepolicy: Add iuicc0 and iuicc1 devices for spdaemon
...
Define iuicc0 and iuicc1 devices so that spdaemon can
open spcom channels to corresponding iuicc0 and iuicc1
applications on the Secure Processor.
Change-Id: I3b343524fbb95a05f39c2a9a086815c096c4cfea
2019-09-13 09:13:13 -07:00
Manaf Meethalavalappu Pallikunhi
9a9f8c08b6
sepolicy: add support for limits-cdsp sepolicy context
...
Add limits_block_device file contexts for limits partitions
and allow thermal-engine to access this partition.
Add lmh-cdsp sysfs file to sysfs_thermal file context.
Change-Id: I9c18c9d862f5e99ca36cb8c38acd98ac4f152ebf
2019-09-13 02:31:58 -07:00
qctecmdr
ae36718169
Merge "PreferredApps: Add iop-hal permissions for lmkd"
2019-09-12 22:05:37 -07:00
qctecmdr
1e13c05d21
Merge "sepolicy: add policy for qseecom hal"
2019-09-12 22:05:37 -07:00
Sandeep Neerudu
b153c387c3
sepolicy-sensors : allow init daemon to set sensors_prop properties
...
Change-Id: I6b587a167538cc49c9049511f9448ec99c40b212
2019-09-12 20:01:16 +05:30
qctecmdr
eeebb6acfb
Merge "sepolicy: allow sensor daemon to use wake-lock"
2019-09-11 12:23:20 -07:00
qctecmdr
1f9f384a46
Merge "vendor_init: write permission for vendor_mpctl_prop"
2019-09-11 09:23:52 -07:00
qctecmdr
3978cff1ee
Merge "sepolicy : updated dpm property rules."
2019-09-11 05:45:31 -07:00
qctecmdr
3a5c7a904b
Merge "Camera: Add permission for Post Proc service"
2019-09-11 02:36:51 -07:00
qctecmdr
57c7491880
Merge "sepolicy: Add sepolicy rules for qvrservice."
2019-09-11 02:36:51 -07:00
qctecmdr
5e239c45fe
Merge "sepolicy: Define new policy rule to read gpu model"
2019-09-10 23:54:12 -07:00
Manoj Basapathi
b4864f11d7
sepolicy : updated dpm property rules.
...
-Add rules to access dpm persist properties.
CRs-Fixed: 2525295
Change-Id: I6b999f35d7af2f9969bf60ce54aee2d94d342560
2019-09-11 12:05:33 +05:30
Abhimanyu Garg
663925fcf1
AGP: Perfhal adding permission to access QSPM and Display
...
Adding permission to access QSPM and Display HAL from perf HAL.
Change-Id: I5415298d018298845aefdd9ca5a471af3a53958b
2019-09-10 17:27:25 -07:00
Jun-Hyung Kwon
fb52f0e6fe
sepolicy: allow sensor daemon to use wake-lock
...
allow sscrpcd daemon to access wake-lock sysfs nodes
Change-Id: I679b077480aea8d5eef9df0dd346bd65611ee000
2019-09-10 13:20:36 -07:00
Bhargav Upperla
e6b3ace940
PreferredApps: Add iop-hal permissions for lmkd
...
This allows access to iop-hal client apis.
(such as obtaining list of preferred apps
at any given time)
Change-Id: I7c051d87a67480b1d2f5610b029d121f34af6bb1
2019-09-10 12:19:02 -07:00
Ashwani Jha
1699eb27a5
sepolicy: Add sepolicy rules for qvrservice.
...
Sepolicy rules to give access to qvrservice external sensor
nodes.
Change-Id: If7ab208a626f601d429d6a370e2d2f73804a930d
2019-09-10 09:55:43 -07:00
Chitti Babu Theegala
2c6a0f6ecc
vendor_init: write permission for vendor_mpctl_prop
...
allow vendor_init to set vendor_mpctl_prop properties
Change-Id: I493763d791937eeba94d860ade0325cf71897d9f
2019-09-10 18:21:40 +05:30
Gaurav Kashyap
8b4882d11f
sepolicy: add policy for qseecom hal
...
Add new policy for QSEECom HIDL implementation which
makes qseecom available to system processes.
Change-Id: Iba0e74fcbd39c8af0aaa89d61d2ac0e5a76ac458
2019-09-10 05:15:35 -07:00
Pawan Chilka
df464efafd
Revert "qspmhal: Add SE policy for QSPM-hal"
...
This reverts commit 462570fd1e .
Change-Id: I7296defc675638a4777ae25f5db08c376843e913
2019-09-10 17:32:08 +05:30
Pawan Chilka
c81577cc44
Revert "qspmsvc: Add SE policy for qspmsvc"
...
This reverts commit da563d80ea .
Change-Id: I3e6e44f9941eb544059af4f149230a80c2b27e22
2019-09-10 17:30:13 +05:30
Rahul Janga
cb631679e9
sepolicy: Define new policy rule to read gpu model
...
Add a new file context label for gpu_model sysfs entry. allowed read
access to that entry.
Addressing the following denials :
type=1400 audit(9324.519:24): avc: denied { read }
for comm="HwBinder:765_2" name="gpu_model" dev="sysfs"
ino=44362 scontext=u:r:hal_graphics_allocator_default:s0
tcontext=u:object_r:sysfs_kgsl:s0 tclass=file permissive=0
type=1400 audit(9324.519:24): avc: denied { read } for
comm="HwBinder:765_2" name="gpu_model" dev="sysfs" ino=44362
scontext=u:r:hal_graphics_allocator_default:s0 tcontext=u:
object_r:sysfs_kgsl:s0 tclass=file permissive=0
type=1400 audit(9325.619:26): avc: denied { read } for comm=
"BootAnimation" name="gpu_model" dev="sysfs" ino=44362
scontext=u:r:bootanim:s0 tcontext=u:object_r:sysfs_kgsl:s0
tclass=file permissive=0
type=1400 audit(1566811221.909:56): avc: denied { read } for
comm="android.anim" name="gpu_model" dev="sysfs" ino=44362
scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_kgsl:s0
tclass=file permissive=0
avc: denied { read } for name="gpu_model" dev="sysfs" ino=28656
scontext=u:r:location_app:s0:c74,c256,c512,c768 tcontext=u:object_r
:sysfs_kgsl_gpu_model:s0 tclass=file permissive=0
avc: denied { read } for name="gpu_model" dev="sysfs" ino=28656
scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:
sysfs_kgsl_gpu_model:s0 tclass=file permissive=0
Change-Id: Ice9dd15278495475615e494c35af065e7736ea93
2019-09-10 17:29:18 +05:30
Pawan Chilka
1d89ca6ab1
Revert "Add Sepolicy rules for qspmhal debug prop"
...
This reverts commit 0c0244ed87 .
Change-Id: I5ce22b79de0a6fc0d68ce95fea5941d14017c1a7
2019-09-10 17:27:42 +05:30
qctecmdr
e9e144ebc7
Merge "sepolicy: Allow qti-testscripts to be killed by lmkd"
2019-09-09 15:52:40 -07:00
Gaurav Kashyap
386c39fef8
sepolicy: add policy for qseecom hal
...
Add new policy for QSEECom HIDL implementation which
makes qseecom available to system processes.
Change-Id: Iba0e74fcbd39c8af0aaa89d61d2ac0e5a76ac458
2019-09-09 15:49:09 -07:00
Patrick Daly
ec1ff88e19
sepolicy: Allow qti-testscripts to be killed by lmkd
...
lmkd kills tasks with oom_score_adj >= 0 when the system is under memory
pressure. Enhancements have been added to lmkd to support this behavior
for processes started from shell as well.
Change-Id: Ia28c3373d8b755f911337bb849262e5b654d5041
2019-09-09 15:43:18 -07:00
Rama Krishna Nunna
e708395c65
Camera: Add permission for Post Proc service
...
- New service added for Post Processor
Change-Id: Ib55517449cee80dd4883a75d8ad9bfb0ed6e1ae1
2019-09-09 11:15:12 -07:00
qctecmdr
01be32b76a
Merge "sepolicy: Add policy rule for ephemeral_app"
2019-09-09 07:38:19 -07:00
qctecmdr
cabbd51a70
Merge "sepolicy: Add write perms to proc file system for legacy devices"
2019-09-09 05:32:20 -07:00
qctecmdr
6a0bbdcf4a
Merge "sepolicy: adding vendor_persist_type attribute."
2019-09-09 03:02:57 -07:00
Vinay Gannevaram
8fa93e4043
sepolicy: Add write perms to proc file system for legacy devices
...
Provide Wi-Fi HAL read and write access to proc file system for
legacy devices. Wi-Fi Hal needs access to proc file system in
order to configure kernel tcp parameters for achieving higher
peak throughputs.
CRs-Fixed: 2520437
Change-Id: I96ef5dad8585f1426bc1c9460eec9ce02efaf6a8
2019-09-09 02:04:14 -07:00
qctecmdr
4e5384fc3c
Merge "sepolicy: Add policies for WFD contexts to access debug properties"
2019-09-06 03:37:36 -07:00
qctecmdr
bc9ae81c34
Merge "Sepolicy: Added rule to give binder call permission to hal_camera"
2019-09-06 00:46:37 -07:00
qctecmdr
296542ffe9
Merge "sepolicy: Define key for TimeService apk"
2019-09-05 22:37:17 -07:00
qctecmdr
2f5a2e83ea
Merge "sepolicy: Correct the path of sysfs_qdss_dev for atoll"
2019-09-05 03:12:00 -07:00
Jaihind Yadav
2450cae440
sepolicy: adding vendor_persist_type attribute.
...
adding neverallow so that coredomain should not access persist file.
Change-Id: If8ab44db78e08e347cb33239bf2544c22c362b5b
2019-09-05 11:36:15 +05:30
Mohit Aggarwal
e0df12a1b1
sepolicy: Define key for TimeService apk
...
Define key for TimeService apk.
Change-Id: I612120345bed56fd92d438a0a2db3db6aa919519
2019-09-04 03:50:31 -07:00
padarshr
77be3489ac
lito: Assign subsys nodes file contexts in a dynamic way.
...
The subsystem name to subsys number mapping is not constant
and can change based on the order of probing OR incase a new
subsystem gets added.
To handle such cases, this change assigns the contexts in a
more dynamic way using regex within file-contexts file.
Change-Id: I3e126c49ff65e6405df07b3cca70003977efbde2
2019-09-04 02:57:03 -07:00
Mao Jinlong
fc03101333
sepolicy: Correct the path of sysfs_qdss_dev for atoll
...
Correct the path of sysfs_qdss_dev to avoid the denial.
Change-Id: I6db70e793aa6a8955edb139aa5523e1a2de55607
2019-09-04 02:25:56 -07:00
qctecmdr
eee010c2cf
Merge "sepolicy: Allow mediaserver to read video sys property"
2019-09-03 15:21:41 -07:00
qctecmdr
402c05fb1b
Merge "sepolicy: Add policy rule for untrusted_app context for lito"
2019-09-03 12:40:59 -07:00
Indranil
e75fb81950
sepolicy: Add policies for WFD contexts to access debug properties
...
Change-Id: Ib3fbfa502ab5ce6e8a0263c3a43472e11abdb96c
2019-09-03 05:37:19 -07:00
Santosh Mardi
92826f3f3b
sepolicy: update npu dcvs nodes
...
Update sepolicy to give permission for split npu dcvs nodes
monitoring traffic from NPU->LLCC->DDR.
Change-Id: I2bc9f46d85bd3f383ac05205d859a84ca914a087
2019-09-03 17:05:48 +05:30
Chinmay Patil
afc870451d
Sepolicy: Added rule to give binder call permission to hal_camera
...
-Android framework sensorservice is required to access
sensor data via android interface in trinket
-This permission existed in P build in following location:
sepolicy/vendor/common/hal_camera.te
-Added permission in sepolicy/qva/vendor/trinket/
Change-Id: I0ec3b9e8ffc07bdfa48e9df94da8395efb01eda5
2019-09-03 02:35:18 -07:00
Paras Nagda
0a5643e972
sepolicy: add rule for video properties
...
add rule to access video properties.
Change-Id: I9bbd3453aabf36ca46ce4019f0a265206017a82c
2019-09-02 23:16:08 -07:00
qctecmdr
b73bd28fb5
Merge "sepolicy: Allow lmkd to write to /dev/kmsg on eng/debug builds"
2019-09-01 21:31:19 -07:00
Linux Build Service Account
9600c44500
Merge 96ac07afa2 on remote branch
...
Change-Id: Ieed370ab54e04d23b599ece3a9569341d1214c95
2019-08-31 08:28:46 -07:00
qctecmdr
e641ed89a4
Merge "Sepolicy: Set genfs context for spss restart_level"
2019-08-29 12:01:41 -07:00
qctecmdr
dda12b34fa
Merge "sepolicy: Allow esehal to access NFC device node"
2019-08-29 09:23:25 -07:00
qctecmdr
9aff364ccb
Merge "Added sepolicy rules to access qfprom0 nodes"
2019-08-29 09:23:25 -07:00
qctecmdr
e7d176d6fb
Merge "sepolicy: Add new entry of kgsl-hyp in subsys SSR entries"
2019-08-29 07:08:41 -07:00
Amir Samuelov
728433c061
sepolicy: fix init mount spunvm for IAR
...
add relabelfrom rule to allow init process to mount
the spunvm partition.
Change-Id: Iab80fb118b31e6f12343bf3927ba66a06730b948
2019-08-29 05:12:52 -07:00
qctecmdr
f0ea5ddb69
Merge "vendor: sepolicy: access spunvm partition for SPU IAR"
2019-08-29 02:24:56 -07:00
qctecmdr
d5ab6560e1
Merge "sepolicy: fix access rule for vendor_wpa_wlan sockets"
2019-08-29 02:24:56 -07:00
qctecmdr
630cec245e
Merge " sepolicy:MLID socket:Loc search permisssion grant"
2019-08-29 00:09:42 -07:00
qctecmdr
abbbbc8ada
Merge "sepolicy: adding permission for dir search for mod_probe and ueventd"
2019-08-29 00:09:42 -07:00
Amir Samuelov
67985803c9
vendor: sepolicy: access spunvm partition for SPU IAR
...
Allow spademon to access spunvm partition.
Allow spademon to mount spunvm partition.
Never allow others services (except init) to access
the spunvm partition.
Change-Id: I77c9baf126489694007721c29ceee118ecea9b60
2019-08-28 23:45:32 -07:00
Syam Prasad Reddy Battula
e1449fb97f
sepolicy:MLID socket:Loc search permisssion grant
...
Grant MLID socket location search permission
to avoid avc errors
Change-Id: I809ef21f61ff3e4d3f77b998a4eddb8bab5f395d
2019-08-29 11:59:44 +05:30
qctecmdr
84663d8dc4
Merge "Add file contexts for few new partitions."
2019-08-28 09:32:49 -07:00
qctecmdr
47e6cb2e18
Merge "Add search policy for ipc_logging"
2019-08-28 09:32:49 -07:00
Bhuvan Varshney
2b86630569
sepolicy: Allow esehal to access NFC device node
...
esehal require access to NFC device node
to send ese cold reset command.
Added sepolicy rules to allow esehal access
to NFC device node.
Change-Id: I49e29653c65ea993a7e899862d382712ec762df6
2019-08-28 04:12:24 -07:00
qctecmdr
b503b24365
Merge "sepolicy: tloc daemon: allow access to smcinvoke"
2019-08-28 03:59:52 -07:00
qctecmdr
9ed512a1c5
Merge "sepolicy: Give permission for usb script to write configfs files"
2019-08-28 03:59:52 -07:00
richagar
a167a7f74c
Added sepolicy rules to access qfprom0 nodes
...
Added new sysfs_qfprom to add permissions for
nvmem and feat_conf10 nodes
Change-Id: I2c06d80679f5ab7c7df74d1cf7ee6e5e9366772a
2019-08-28 16:12:34 +05:30
Preeti Nagar
1f24257d88
sepolicy: tloc daemon: allow access to smcinvoke
...
add policy rule to allow tloc daemon to access smcinvoke,
fixes the below avc denial.
avc: denied { read write } for comm=""tloc_daemon"" name=""smcinvoke""
dev=""tmpfs"" ino=521 scontext=u:r:tlocd:s0
tcontext=u:object_r:smcinvoke_device:s0 tclass=chr_file permissive=0
Change-Id: I2187c75f62798f19bb45ef1ac68257ee219b6198
2019-08-28 00:08:32 -07:00
Chitti Babu Theegala
5155305f1b
sepolicy: fix access to perf vendor properties
...
Change-Id: I21d82f85b20bf51a20b28c0ef5b9038244ba7657
2019-08-28 12:22:07 +05:30
Lior David
3fc25f3369
sepolicy: fix access rule for vendor_wpa_wlan sockets
...
The socket path and object name were incorrect. Apply
the same fix from legacy file_contexts
Change-Id: Iadd1e13357f18aa96af53ecc8c11d62527693c17
2019-08-28 09:37:34 +03:00
Vinayak Soni
5e27879eb6
Add search policy for ipc_logging
...
Add search policy for ipc_logging on debugfs
node for peripheral manager.
Change-Id: If81e46d88328c5ceff72de22cf25dc06987294c3
2019-08-27 06:09:15 -07:00
padarshr
79388ae1da
Add file contexts for few new partitions.
...
This adds file contexts to few new partitions so
that the ota update engine is allowed to do OTA
over them.
Change-Id: I0290b50a92a7a051a4b285a01b3b70d204be6b82
2019-08-27 03:37:05 -07:00
Rahul Janga
f3449651eb
sepolicy: Add policy rule for ephemeral_app
...
Add search permission for ephemeral_app context on venfor_gles_data
_file label.
Addressing the following denial:
avc: denied { search } for name="gpu" dev="dm-0"
ino=357 scontext=u:r:ephemeral_app:s0:c208,c256,c512,
c768 tcontext=u:object_r:vendor_gles_data_file:s0
tclass=dir permissive=0 app=android.renderscript.cts
Change-Id: I8c345fe6ea153babd6fbded79f41e4d6b75d8b90
2019-08-27 12:16:09 +05:30
Patrick Daly
80e0fc772c
sepolicy: Allow lmkd to write to /dev/kmsg on eng/debug builds
...
Allow only on eng/debug builds.
Change-Id: Ia762389a5ead92abd4d73e67127ede6242e4444d
2019-08-26 12:45:16 -07:00
Rahul Janga
724d1df132
sepolicy: Add policy rule for untrusted_app context for lito
...
Adressing the following avc denial:
avc: denied { write } for name="gpu" dev="dm-0" ino=357
scontext=u:r:untrusted_app:s0:c126,c257,c512,c768 tcontext=
u:object_r:vendor_gles_data_file:s0 tclass=dir permissive=0
app=com.drawelements.deqp
Change-Id: I0371b3f87e5b43e308d6b1fe1b5c78e93fc9d555
2019-08-27 00:11:46 +05:30
Ramkumar Radhakrishnan
9b99e7994c
sepolicy: Add permissions for feature_enabler_client
...
1. Allow read permission to /mnt/vendor/persist/data/*
2. Binder access for featenab_client.service
Change-Id: I2fcc6e34c5c208c41fcff5ab526a420210a9204c
2019-08-26 11:17:56 -07:00
Jaihind Yadav
51b1575e24
sepolicy: adding permission for dir search for mod_probe and ueventd
...
Change-Id: Iea8497fd897de07ef9c429192cfad81b68db7dd9
2019-08-26 07:09:54 -07:00
Brijesh Patel
e886880af4
sepolicy: Allow mediaserver to read video sys property
...
CRs-Fixed: 2516144
Change-Id: I0b217f22dc640e6469653b8d294cbfc3ce550e1d
2019-08-26 18:23:08 +05:30
Rahul Janga
caabd3c0e9
sepolicy: Add new entry of kgsl-hyp in subsys SSR entries
...
Based on loading time kgsl-hyp may get subsys4 label.
Change-Id: Ie47abc3de175bea66fab9afbc4a1163680bf3f97
2019-08-26 14:18:08 +05:30
qctecmdr
c2328042d7
Merge "atoll: Add gralloc lib permission"
2019-08-24 09:39:23 -07:00
qctecmdr
75514682ae
Merge "Add sepolicy for vulkan lib"
2019-08-24 09:39:22 -07:00
Piyush Balwani
8a5b8e2c7b
Merge commit 'f235441e831ceab5ff14be3056238aaaa4c97d0a' into HEAD
...
Change-Id: Ic4a366ffa2d94d2e13456b001360fdf63f83f31d
2019-08-24 15:20:11 +05:30
qctecmdr
65c3501f44
Merge "sepolicy: adding permission to set attribute for lnkfile."
2019-08-24 01:51:08 -07:00
qctecmdr
d606fa3610
Merge "Add Device Info hal vendor.qti.hardware.radio.internal.deviceinfo@1.0"
2019-08-23 22:39:17 -07:00
Jaihind Yadav
79c6d9eeb8
sepolicy: adding permission to set attribute for lnkfile.
...
Change-Id: I899502be11970d8f8b4df77d86a850313a8acc70
2019-08-23 18:53:11 +05:30
Padmanabham Bodda
84df30c0af
Add sepolicy for vulkan lib
...
Make vulkan library accessible from both coredomain
and non-coredomain
Change-Id: Ie91364141b234cc5679f4ce3f51c2152dcbdf636
2019-08-23 17:23:07 +05:30
Ramakant Singh
4e8a1c0a62
atoll: Add gralloc lib permission
...
Change-Id: Ia11880f7cf9b87631b64b59d1438b4b4e71d1ec7
2019-08-23 11:37:45 +05:30
Keerthi Gowda
e1d605c33e
Sepolicy: Set genfs context for spss restart_level
...
ssr_setup needs permission to write RELATED to restart_level
file of spss subsystem to do SSR.
Change-Id: Id7e86422d474cdf6a1c141522ffadf91c4bb4ff9
2019-08-22 15:10:10 -07:00
qctecmdr
96ac07afa2
Merge "sepolicy : Add policy rules for usta service"
2019-08-22 01:47:30 -07:00
Piyush Balwani
70fd385268
Revert "Revert "qspmhal: Add SE policy for QSPM-hal.""
...
This reverts commit 4cacde9357 .
Change-Id: I0b4aa7ab1c38c9e1b8d142fa98a39c84e9854c1e
2019-08-22 00:04:40 -07:00
qctecmdr
97e65dca75
Merge "sepolicy: Allow lmkd to write to /dev/kmsg"
2019-08-21 21:49:21 -07:00
qctecmdr
69f6a49336
Merge "sepolicy: Changes to allow kill capability"
2019-08-21 10:58:26 -07:00
qctecmdr
0f7cf01e30
Merge "sepolicy: Add dontaudit rules to fix avc denials"
2019-08-21 07:54:23 -07:00
qctecmdr
82638e94c4
Merge "Adding Kill capability to perf hal service"
2019-08-21 07:54:23 -07:00
qctecmdr
0a0ac2035a
Merge "Sepolicy: Allow socket creation, permission to access IOP"
2019-08-21 07:54:23 -07:00
qctecmdr
b8e001a86b
Merge "sepolicy: Adding sepolicy rules for servicetracker@1.1"
2019-08-21 05:29:42 -07:00
Shishir Singh
796deb0948
sepolicy: Changes to allow kill capability
...
-- Fix for netmgrd kill permission denial.
Change-Id: I34f6a60696e9607d35b49de3753af8e76286a09d
2019-08-21 05:04:00 -07:00
qctecmdr
374f0c5cc9
Merge "Add support for"
2019-08-21 02:52:41 -07:00
qctecmdr
cc92b27fe8
Merge "Initial bringup changes for Dynamic Partition"
2019-08-20 12:00:11 -07:00
Vivek Arugula
8abeddf306
sepolicy : Add policy rules for usta service
...
As part of making USTA (Sensor android test application) as
installable, we split the app into 2 parts. One Acts as only UI,
another one acts as service which interacts with sensors native
via JNI. Both the apps are placed in system/app path only.
Change-Id: I58df425bebef96b9d6515179e9581eed03571ad6
2019-08-20 20:45:43 +05:30
Vinay Verma
b464e074ec
sepolicy: Adding sepolicy rules for servicetracker@1.1
...
Change-Id: I8bf74a895343da07bb3d78adf56f3414d1a44f71
2019-08-20 13:44:39 +05:30
Ritika Gera
b121dae290
Adding Kill capability to perf hal service
...
Adding permission to kill only the app domain from vendor.
Change-Id: Ic0f65833b7ccfe552e97b4f97b1587531ccda2bc
2019-08-20 13:02:40 +05:30
Sai Manobhiram
ef25729ffe
Sepolicy: Allow socket creation, permission to access IOP
...
Netlink Socket : Add a policy for allowing to create a socket from perf hal
and getting data
IOP : perf-hal needs access to IOP serivice.
Meminfo, KGSL_MEM : Accessing proc_meminfo and kgsl sys_fs nodes for reading data.
Change-Id: Id31f8ccac4abb1e23df2f22f720a7976655bee89
2019-08-19 16:51:21 +05:30
qctecmdr
f235441e83
Merge "Sepolicy: Added a rule to give the access for ioctl"
2019-08-18 23:01:24 -07:00
Aman Gupta
18ca2e9393
Sepolicy: Added a rule to give the access for ioctl
...
Added a rule to give the access for ioctl for udp_socket
Change-Id: I3b7836ec9345d2c1d36ca80782294f173fcc8662
2019-08-16 14:35:25 +05:30
Jaihind Yadav
57219ca85a
sepolicy: removing dup entry from genfscon
...
Change-Id: I36e23b2f1f24d15806e325296ad180d6785ca467
2019-08-16 12:06:50 +05:30
Deepthi Gunturi
b9d3fa6d6f
Add support for
...
1. Update engine to update newly created partitions.
2. Add the label for the recovery and vbmeta_system block device.
Change-Id: I0c184068b0fad710a1362a18e4ceef9b1d84bc65
2019-08-16 11:42:49 +05:30
Deepthi Gunturi
d4edb549b2
Initial bringup changes for Dynamic Partition
...
Change-Id: I8ecf7718862037010b1ef8aa67f17c905591cc78
2019-08-16 11:19:13 +05:30
Patrick Daly
1e21255098
sepolicy: Allow lmkd to write to /dev/kmsg
...
Allow lmkd to log task kills to dmesg for debugging purposes.
Change-Id: I70c11640b54b09270f41bbd1cf08b6d370aa6f66
2019-08-14 18:37:03 -07:00
Aditya Nellutla
da48f604ca
sepolicy: Add dontaudit rules to fix avc denials
...
Add dontaudit rules for priv, platform and untrusted_app_25
to fix the avc denials
Change-Id: I7363620ce718c92096013cf7978195a4be60bfba
2019-08-14 15:21:02 +05:30
qctecmdr
4939d2f41b
Merge "sepolicy : add selabel for brightness sysfs node."
2019-08-13 02:16:30 -07:00
Piyush Balwani
3582482053
Revert "Revert "qspmsvc: Add SE policy for qspmsvc""
...
This reverts commit 051599fe99 .
Change-Id: Id6d0356a27864800b280679a7eda93062444291b
2019-08-13 14:14:50 +05:30
qctecmdr
e8ecc393d9
Merge "Sepolicy : add vendor prefix to vm_bms"
2019-08-12 23:07:26 -07:00
Jaihind Yadav
0ac1358c78
sepolicy: removing violators from couple of system domains.
...
This violators is no longer needed because module needed this is no longer exist.
Change-Id: Ia095e10f9139199296619fc54bda5f32ac543454
2019-08-12 17:25:49 +05:30
Nahush Gondhalekar
72e86dc39f
Removing usf for treble compliance.
...
Change-Id: I5771a191610adb8ca968902e2c7b6eac1830874c
2019-08-12 04:46:31 -07:00
Ashay Jaiswal
e04d97a1ec
Sepolicy : add vendor prefix to vm_bms
...
vm_bms is a proprietary service, add vendor prefix to
vm_bms.
Change-Id: I00840fd821fb724c6026c3a7ff666a8c341862db
2019-08-12 13:35:49 +05:30
qctecmdr
fa6d1e3d3e
Merge "sepolicy: update ssr subsystem nodes with secontext"
2019-08-09 15:33:27 -07:00
qctecmdr
b9ddd84d1f
Merge "sepolicy : update SSR node paths"
2019-08-09 12:07:59 -07:00
qctecmdr
d0af56c3e6
Merge "sepolicy: Allow platform app to access fingerprint HAL"
2019-08-09 08:32:33 -07:00
qctecmdr
700457194e
Merge "sepolicy: Add permission for QtiMapperExtension version 1.1."
2019-08-09 04:57:41 -07:00
Ravi Kumar Siddojigari
f46d34c555
sepolicy: update ssr subsystem nodes with secontext
...
Adding SSR nodes secontext
Change-Id: I93b252e892f57a8244766f57cab568be49d177fd
2019-08-09 04:38:25 -07:00
Ravi Kumar Siddojigari
51d95531e4
sepolicy : update SSR node paths
...
ssr node on some target seem to be have different
path so adding that path and setting the secontext .
Change-Id: Iac60712957d9bc694fce201e9958649b0b30d3d5
2019-08-09 04:38:13 -07:00
qctecmdr
76f19f2ea6
Merge "sepolicy: Add rules to enhance pkt logging for cnss_diag"
2019-08-09 02:11:29 -07:00
Chandana Kishori Chiluveru
4b80dc9eeb
sepolicy: Give permission for usb script to write configfs files
...
On boot or on charger bootup case init.qcom.usb.sh script need access
to write /config/usb_gadget/g1/strings/0x409/product. So adding the
required permissions to avoid below sepolicy deniels.
sepolicy: avc: denied { write } for comm="init.qcom.usb.s"
name="0x409" dev="configfs" ino=17748 scontext=u:r:qti_init_shell:s0
tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
avc: denied { create } for comm="init.qcom.usb.s" name="product"
scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=file
permissive=0
Change-Id: I7a70c2b65bb518836f4b7cfc7df61e70f12f2ef9
2019-08-09 02:02:26 -07:00
Nivedita Sarkar
5b0df0034c
Add Device Info hal vendor.qti.hardware.radio.internal.deviceinfo@1.0
...
- Add new HAL to the config files
- vendor.qti.hardware.radio.internal.deviceinfo@1.0
Change-Id: Ia32ee8d8742850bc95fe5ac8876aca8843d73f3e
CRs-Fixed: 2444683
2019-08-08 23:11:07 -07:00
Ashish Kumar
78fbc21a47
sepolicy: Add permission for QtiMapperExtension version 1.1.
...
CRs-Fixed: 2505716
Change-Id: I61d02bcccf2069f792f2ee118fcf5dbf9a7b77ee
2019-08-08 22:25:46 -07:00
qctecmdr
d463f6aad1
Merge "Sepolicy : Do not audit untrusted_app_27 to fix avc denials"
2019-08-08 14:54:08 -07:00
qctecmdr
170e863214
Merge "sepolicy: Remove accessing bt vendor prop and fm prop"
2019-08-08 10:02:18 -07:00
qctecmdr
5b50e33fa9
Merge "sepolicy: do not access bt vendor prop from system_server"
2019-08-08 09:43:32 -07:00
Hu Wang
f0b0780006
sepolicy: Add rules to enhance pkt logging for cnss_diag
...
Fix sepolicy denies seen when cnss_diag do pkt logging.
CRs-Fixed: 2502031
Change-Id: If0ae5fb9da36483bef686ae86bdd865f8a3e51ec
2019-08-08 04:48:33 -07:00
Ramakant Singh
909df8b238
sepolicy : add selabel for brightness sysfs node.
...
CRs-Fixed: 2502915
Change-Id: Icc2ca246f297972f6e42902f1d93cab37c138d18
2019-08-08 17:08:34 +05:30
Srinu Jella
081f762184
sepolicy: Remove accessing bt vendor prop and fm prop
...
Remove accessing bt vendor prop and fm prop from
system app.
CRs-Fixed: 2503715
Change-Id: I44065536f313e900fa08848c3309391f3817f162
2019-08-07 22:55:44 -07:00
Nitin Shivpure
4bf9f92f56
sepolicy: do not access bt vendor prop from system_server
...
Do not access bt vendor prop from system_server.
Change-Id: I44065536f313e900fa08848c3309391f3817f16c
2019-08-07 00:11:05 -07:00
kranthi
03232c6a4f
Sepolicy : Do not audit untrusted_app_27 to fix avc denials
...
Add do not audit rule for unrusted_app_27 to fix AVC
denials for gpubusy and max_gpuclk props
denial:
type=1400 audit(0.0:465): avc: denied { read } for name="max_gpuclk" dev="sysfs"
ino=56328 scontext=u:r:untrusted_app_27:s0:c178,c256,c512,c768
tcontext=u:object_r:sysfs_kgsl:s0 tclass=file permissive=0 app=com.gameloft.android.ANMP.GloftA9HM
type=1400 audit(0.0:381): avc: denied { read } for name="gpubusy" dev="sysfs"
ino=56330 scontext=u:r:untrusted_app_27:s0:c168,c256,c512,c768
tcontext=u:object_r:sysfs_kgsl:s0 tclass=file permissive=0 app=com.tencent.ig
Change-Id: If11c109b5426c598121cff045ad1693d2221d57e
2019-08-07 11:35:59 +05:30
Veerendranath Jakkam
c80a246800
wifi: Remove system_writes_vendor_properties_violators
...
Remove sepolicy rules which are allowing system to modify
below vendor properties.
- vendor_wifi_ftmd_prop
- vendor_softap_prop
Change-Id: I3fa6c5f7fa34b37eaaa0b7c393fb256c1ed70d42
CRs-Fixed: 2503731
2019-08-06 22:49:16 -07:00
qctecmdr
0bc13bf5ee
Merge "sepolicy: Allow NN HAL to access npu device node"
2019-08-06 16:26:49 -07:00
Jilai Wang
7dab1aa8e1
sepolicy: Allow NN HAL to access npu device node
...
This change is to allow NN HAL to access npu device node.
Change-Id: I193a7fb0b571a734804bc31ccf52376e9a13d500
2019-08-06 16:55:43 -04:00
qctecmdr
e82546c812
Merge "Add getprop rule for ro.vendor.qspm.enable prop"
2019-08-06 13:11:15 -07:00
Mulugeta Engdaw
c06abae137
Add getprop rule for ro.vendor.qspm.enable prop
...
This property is set in vendor at compile time
Change-Id: Ib4f39c785b2ddcbf3155edb08652ea233f6e179c
2019-08-06 09:47:34 -07:00
qctecmdr
6fa46962ae
Merge "sepolicy: update access permissions for wigig property"
2019-08-06 09:17:27 -07:00
qctecmdr
026e77ebc6
Merge "sepolicy: remove qcv audio prop rules"
2019-08-06 06:06:22 -07:00
Maya Erez
89448bf3ec
sepolicy: update access permissions for wigig property
...
system_app should have access to get_prop
persist.vendor.wigig.inwifi.enable to show the Wigig
enable toggle in WiFi Settings accordingly.
system_server should have read / write access to
persist.vendor.wigig.inwifi.sta.enable for keeping the
wigig STA enabled/disabled state.
Change-Id: Ia672a04721d9df4668e8310f81cf5bd413335c25
2019-08-06 15:44:39 +03:00
Dhananjay Kumar
0561f2214b
sepolicy: remove qcv audio prop rules
...
Remove rules to allow qcv audio porp from audio service.
This is to fix violations reported in vts test
testVendorPropertyNamespace.
Change-Id: I294ba7380646d1d460b1b71df7ffeb0ecd80f33e
2019-08-06 03:28:35 -07:00
shoudil
8428651a3d
sepolicy: fix gts failed issue on sdm845
...
Change-Id: Ia909dce485cafb525f0057aa6eb5b79ced6c2e4b
CRs-Fixed: 2479922
2019-08-06 17:08:31 +08:00
qctecmdr
41f166edaa
Merge "sepolicy : Update sysfs_net related path entries"
2019-08-04 23:37:42 -07:00
qctecmdr
73907001e9
Merge "sepolicy: rule to set kptrstrict value"
2019-08-01 23:55:59 -07:00
Prakash Pabba
7108bee23f
sepolicy : Update sysfs_net related path entries
...
Update the secontexts for sysfs_net for
trinket target
Change-Id: I8dec3234c541826a2753becdec111406420fd9a6
CRs-Fixed:
2019-08-01 23:27:59 -07:00
James Shao
d81bff05a2
sepolicy: allow lib resource permission and socket create permission for
...
ssg_app
Change-Id: Ia38a9f9483462db1a512d78901af38e03fb9bace
2019-08-01 11:36:18 -07:00
Jaihind Yadav
4676536dd1
sepolicy: rule to set kptrstrict value
...
Change-Id: I05764146d61ff2ff934888280523fa0559dd083c
2019-07-31 23:22:36 -07:00
Neeraj Soni
da0b77d045
sepolicy: remove permission for vold access to tee device
...
BUG: b/121350843
vold need access to tee device for disk encryption use case. This permission
can be removed as new cryptfshw hal is implemented in vendor which
will interface vold to tee device.
Change-Id: I69cba9cbd7119c2897e93c122b4946fd76773bb9
Signed-off-by: Neeraj Soni <neersoni@codeaurora.org >
2019-07-31 22:47:35 -07:00
Mohit Aggarwal
52d479a86e
sepolicy: Define key for TimeService apk
...
Define key for TimeService apk.
Change-Id: I612120345bed56fd92d438a0a2db3db6aa919519
2019-07-31 16:13:15 +05:30
qctecmdr
ac4425b5be
Merge "Add SE policy for Bluetooth SAR HAL"
2019-07-30 16:07:25 -07:00
qctecmdr
662e886cb2
Merge "sepolicy: Rename vendor defined property"
2019-07-30 12:53:17 -07:00
Linux Build Service Account
00bec6771e
Merge "Revert "sepolicy : Add property access rules for sensors init script"" into sepolicy.lnx.5.9.r1-rel
2019-07-30 10:50:22 -07:00
qctecmdr
a07041b856
Merge "sepolicy: Add rule for dun hidl daemon"
2019-07-30 10:06:12 -07:00
Jun-Hyung Kwon
9811518a92
Revert "sepolicy : Add property access rules for sensors init script"
...
This reverts commit 50dbc4287a .
Change-Id: Ia35ac0fc17cf2fc6cde6cc08465cf1d586a28f5d
2019-07-30 09:13:25 -07:00
qctecmdr
a1be834bae
Merge "Revert "sepolicy : Add property access rules for sensors init script""
2019-07-30 07:00:21 -07:00
Pavan Kumar M
77ca83c1e1
sepolicy: Rename vendor defined property
...
All vendor defined properties should begin with
vendor keyword.
Change-Id: I0235d2b37ead9f015fe27075906dbf33b218173f
2019-07-29 23:45:31 -07:00
Nitin Shivpure
685ce39967
sepolicy: Add rule for dun hidl daemon
...
Add rule for dun hidl daemon.
Change-Id: I06b36bbf4932de6d803075b7f01475ce519fdbb8
2019-07-29 22:44:35 -07:00
Pavan Kumar M
c0341c0917
sepolicy : Add sysfs_net related path entries
...
Update the secontexts for sysfs_net for
sdm845/lito targets
Change-Id: I8fbd3aef8809d9d32caa80691dd2558adad73a08
CRs-Fixed: 2497802
2019-07-29 21:35:14 -07:00
Jun-Hyung Kwon
2475d56cc7
Revert "sepolicy : Add property access rules for sensors init script"
...
This reverts commit 50dbc4287a .
Change-Id: Ia35ac0fc17cf2fc6cde6cc08465cf1d586a28f5d
2019-07-29 17:59:28 -07:00
Subramanian Srinivasan
04ebecedaf
Add SE policy for Bluetooth SAR HAL
...
Add SE policy for Bluetooth SAR HAL
Change-Id: I37fd5a877ee2d05b01ac888ba194379943d2fdf7
2019-07-29 17:20:44 -07:00
Ravi Kumar Siddojigari
688fe5855a
Revert "vendor: sepolicy: spdaemon: add IAR support"
...
This reverts commit 91cb2d7f8f .
Change-Id: Ib76df12b69e88c9601b8bf2d2dd9ba4032e54b4d
2019-07-29 04:27:02 -07:00
Pavan Kumar M
50ef9c7f89
sepolicy: Rename vendor defined property
...
All vendor defined properties should begin with
vendor keyword.
Change-Id: I0235d2b37ead9f015fe27075906dbf33b218173f
2019-07-29 00:22:17 -07:00
qctecmdr
bb7f2ca878
Merge "Sepolicy: Add policy rules for untrusted_app context"
2019-07-28 21:21:10 -07:00
Pooja Singh
656c0b5107
Change to support OTA for AB with Dynamic partition enabled
...
It includes
- Updating file context for newly introduced partitions
- Provides permission to update_engine to update partition
while performing OTA
Change-Id: Iefcb54d1688aadeb67ba09148f560e9bbfcaace7
2019-07-26 12:02:36 +05:30
qctecmdr
de2575e96b
Merge "vendor: sepolicy: spdaemon: add IAR support"
2019-07-25 13:38:37 -07:00
qctecmdr
4cf6dcc346
Merge "Sepolicy: Add Do not audit for vendor_gles_data_file"
2019-07-25 11:07:21 -07:00
M Safoorah Banu
519adac2db
Sepolicy:Add permissions to configure snoop file size for bt_logger
...
- Add permissions to configure snoop file size for bt_logger
using persist property to avoid overlap of logs.
- If the property is not set, default file size
is set 20MB.
Change-Id: Icb09928009431285377f2e6403ad43da33fca2cb
2019-07-25 01:21:16 -07:00
Rahul Janga
0eb606ffab
Sepolicy: Add Do not audit for vendor_gles_data_file
...
Addressing the following denials:
audit(0.0:118774): avc: denied { read } for name="esx_config.txt"
dev="dm-4" ino=7451 scontext=u:r:system_app:s0
tcontext=u:object_r:vendor_gles_data_file:s0 tclass=file permissive=1
avc: denied { open } for path="/data/vendor/gpu/esx_config.txt"
dev="dm-4" ino=7451 scontext=u:r:system_app:s0
tcontext=u:object_r:vendor_gles_data_file:s0 tclass=file permissive=1
avc: denied { getattr } for path="/data/vendor/gpu/esx_config.txt"
dev="dm-4" ino=7451 scontext=u:r:system_app:s0
tcontext=u:object_r:vendor_gles_data_file:s0 tclass=file permissive=1
Change-Id: I1d9a8c64a2206e3faa9f367f731f3f542ce7fd4b
2019-07-25 11:06:50 +05:30
Rahul Janga
9610a7ef1f
Sepolicy: Add policy rules for untrusted_app context
...
Add gpu related policy rules for untrusted_app
Addressing the following denial:
type=1400 audit(0.0:593): avc: denied { search } for name="gpu" dev="dm-0"
ino=405 scontext=u:r:untrusted_app:s0:c144,c256,c512,c768
tcontext=u:object_r:vendor_gles_data_file:s0 tclass=dir permissive=0
app=com.android.chrome
Change-Id: Iabbc7bea6f00a055f7f0ea3d2b926225737b99d5
2019-07-24 09:54:45 -07:00
Piyush Balwani
03d3ceeacb
Sepolicy : Do not audit untrusted_app_27 to fix avc denials
...
Add do not audit rule for unrusted_app_27 to fix AVC
denials for gpubusy and max_gpuclk props
Change-Id: Idc541a0effc6812c12c1ff5024dfd0b6d4171180
2019-07-24 18:22:45 +05:30
Piyush Balwani
f467130082
sepolicy: provide rules for cryptfs_hw hal
...
BUG: b/121350843
vold need to communicate with tee device node to set crypto
engine keys for userdata encryption. cryptfs_hw hal is
implemented to facilitate this commuincation.
Conflicts:
qva/vendor/common/hwservice_contexts
Change-Id: I19b70e8fadd431fbdfac7b80cb3b6608e439f605
2019-07-24 18:21:29 +05:30
Piyush Balwani
051599fe99
Revert "qspmsvc: Add SE policy for qspmsvc"
...
This reverts commit da563d80ea .
Change-Id: Ic02e61c8bd0f83d41800da3e962120361af8cf73
2019-07-24 18:14:09 +05:30
Piyush Balwani
4cacde9357
Revert "qspmhal: Add SE policy for QSPM-hal"
...
This reverts commit 462570fd1e .
Change-Id: I9f8823a35be7118d738e144e5523e05ffea719b0
2019-07-24 18:10:10 +05:30
Abir Ghosh
cfa04d86d3
sepolicy: Allow platform app to access fingerprint HAL
...
Give permission to platform app instead of system app
to access fingerprint HAL.
Change-Id: I99e3bf11b445fea3d5c64b4e2450fb12653b141a
2019-07-24 17:22:05 +05:30
qctecmdr
6e692787b6
Merge "Sepolicy: White list adreno_app_profiles lib"
2019-07-24 04:45:42 -07:00
Mulugeta Engdaw
0c0244ed87
Add Sepolicy rules for qspmhal debug prop
...
Sepolicy rule added for debug.vendor.qspm
property to support conditional logs.
Change-Id: I28bddabf6a8c03f2fb732789df7e0ec2ae100e05
2019-07-23 13:42:19 -07:00
qctecmdr
83bbdc849e
Merge "Sepolicy : Do not audit untrusted_app_27 to fix avc denials"
2019-07-23 05:35:59 -07:00
Aditya Nellutla
202f6a1a0f
Sepolicy: White list adreno_app_profiles lib
...
This change white lists new adreno_app_profiles library
to avoid sepolicy denials.
Change-Id: Ied35b574aff554a8d26e2cee4fa0530098a48080
2019-07-23 17:40:35 +05:30
Aditya Nellutla
fcbbf0696e
Sepolicy : Do not audit untrusted_app_27 to fix avc denials
...
Add do not audit rule for unrusted_app_27 to fix AVC
denials for gpubusy and max_gpuclk props
Change-Id: Idc541a0effc6812c12c1ff5024dfd0b6d4171180
2019-07-23 16:45:49 +05:30
qctecmdr
280fff6e47
Merge "Sepolicy : Do not audit mediaswcodec access to vendor_gles_data_file"
2019-07-23 02:48:00 -07:00
Neeraj Soni
370def11f6
sepolicy: provide rules for cryptfs_hw hal
...
BUG: b/121350843
vold need to communicate with tee device node to set crypto
engine keys for userdata encryption. cryptfs_hw hal is
implemented to facilitate this commuincation.
Change-Id: I19b70e8fadd431fbdfac7b80cb3b6608e439f605
Signed-off-by: Neeraj Soni <neersoni@codeaurora.org >
2019-07-23 11:21:33 +05:30
Amir Samuelov
91cb2d7f8f
vendor: sepolicy: spdaemon: add IAR support
...
add read/write access to IAR-DB at /mnt/vendor/persist/iar_db
add read/write access to IAR-DB at /vendor/spunvm/iar_db
add read/write access to spss_utils at /dev/spss_utils
Change-Id: If74d48087833a8507d8f167cdd950f0ad73afbe4
2019-07-22 05:38:46 -07:00
qctecmdr
78d4d2046a
Merge "sepolicy permission required for Socket in port_bridge module."
2019-07-22 05:35:32 -07:00
Chinmay Agarwal
9c95b19d57
sepolicy permission required for Socket in port_bridge module.
...
Given SE Policy permissions for port-bridge module to create a UNIX
socket and enable communication with clients in different modules.
Change-Id: I1d3a4fdc30847cd8ee7f7715d3249c1957a0776d
2019-07-22 14:21:49 +05:30
Indranil
d7f2bae30c
sepolicy: Enable WFD HAL to access UHID driver
...
WFD HAL requires access to UHID driver to support HID events over
UIBC in a WFD session. Add requisite policy to grant it access.
Change-Id: If895fb2e6ee2fa4de62a2d51b0f6ed675640b83c
CRs-Fixed: 2489083
2019-07-21 22:22:34 -07:00
Linux Build Service Account
dfa276e847
Merge 637902d73b on remote branch
...
Change-Id: Icf603dafee357f0bf722ad315f47c6efdbcd90e9
2019-07-21 18:19:07 -07:00
qctecmdr
f90a05b5e1
Merge "sepolicy: add sepolicy label to parallel psy for lito"
2019-07-21 11:50:13 -07:00
qctecmdr
8f58785a19
Merge "Add sepolicy for super image"
2019-07-20 05:56:41 -07:00
qctecmdr
828a1b4bbc
Merge "Adding self kill capability for perf hal"
2019-07-20 02:36:23 -07:00
qctecmdr
4fbb508cd5
Merge "sepolicy: add permissions for wfdvndservice"
2019-07-19 13:16:16 -07:00
qctecmdr
72635c8301
Merge "sepolicy: msmnile_au: add support for wlan dynamic detect"
2019-07-19 10:15:15 -07:00
Rahul Janga
026b564bc3
Sepolicy : Do not audit mediaswcodec access to vendor_gles_data_file
...
Addressing the following denial:
type=1400 audit(0.0:10197): avc: denied { search } for name="gpu"
dev="dm-4" ino=405 scontext=u:r:mediaswcodec:s0
tcontext=u:object_r:vendor_gles_data_file:s0 tclass=dir permissive=0
Change-Id: I02c0e40e376dc9d856e1541ba85ede5db379d49a
2019-07-19 13:50:09 +05:30
richagar
4c9b4e5542
Adding self kill capability for perf hal
...
Allow perf for self kill capability
Change-Id: I88c24af42e87112a2abeb3efe1656871cccf6751
2019-07-19 00:00:21 -07:00
qctecmdr
c39df4864d
Merge "sepolicy: Add write permission to proc file system"
2019-07-18 23:55:40 -07:00
Hu Wang
5b9fd371e8
sepolicy: msmnile_au: add support for wlan dynamic detect
...
Add script init.qcom.wlan.sh for wlan device detecting
during system booting up; and property 'ro.vendor.wlan.chip'
to indicate the current wlan device.
With the help of the two upon, the correct wlan driver
can be selected and loaded properly when there are
more than one wlan drivers.
CRs-Fixed: 2470141
Change-Id: I06a914eeecef49ab42fe93f692b532f636e94637
2019-07-18 22:37:46 -07:00
Lubin Yin
a7b7e69713
sepolicy: add permissions for wfdvndservice
...
Allow wfdvndservice to access graphics_composer and qdisplay_service.
Change-Id: I7d4b7cb824032705f6e3c4cf192668c52672412d
2019-07-17 13:54:03 -07:00
Benergy Meenan Ravuri
dda985d21c
Add sepolicy for super image
...
Label super partition as super_block_device.
Change-Id: Ibb7578216f47c35570ec9e8203b6bd2d5d444b0f
2019-07-17 19:24:00 +05:30
Ankita Bajaj
bd1c72c440
sepolicy: Add write permission to proc file system
...
Provide Wi-Fi HAL read and write access to proc file system.
Wi-Fi Hal needs access to proc file system in order to configure
kernel tcp parameters for achieving higher peak throughputs.
CRs-Fixed: 2491783
Change-Id: I36613f74aaa4adfc33e68442befcdb78af5edd5c
2019-07-17 14:06:46 +05:30
Ramkumar Radhakrishnan
718f54d0f1
te: Add access permissions for feature_enabler_client
...
Add read/write and get attribute permission for feature_enabler_client
to access files from /mnt/vendor/persist/feature_enabler_client folder
Change-Id: I9a690acd2a55358dfa5ba5a0411b1dad59e5e7f0
2019-07-16 16:31:19 -07:00
qctecmdr
bec6e8c945
Merge "sepolicy : add rule to allow dpmd self kill"
2019-07-16 07:01:25 -07:00
qctecmdr
637902d73b
Merge "Add sepolicy for super image"
2019-07-16 06:53:06 -07:00
Pavan Kumar M
a0bc72f6d9
sepolicy : add rule to allow dpmd self kill
...
add self kill rule to kill dpmd child process
which executes iptable commands.
denial:
dpmd : type=1400 audit(0.0:56633): avc: denied { kill }
for capability=5 scontext=u:r:dpmd:s0 tcontext=u:r:dpmd:s0
tclass=capability permissive=1
CRs-Fixed: 2490550
Change-Id: I4cc1f23a8c3ba37e33fd02c729c2f4d2a7eea4d4
2019-07-16 12:07:53 +05:30
Ashay Jaiswal
6fc0ff1119
sepolicy: add sepolicy label to parallel psy for lito
...
Add sepolicy label to parallel power supply sysfs exposed by
parallel charger, this is accessed by userspace daemon to control
parallel charging.
Change-Id: I1b557be1588293472bd1e140cd568104f02c94a2
2019-07-16 11:14:10 +05:30
Indranil
9ad0b0d451
sepolicy: Changes to support Sigma HAL
...
Change-Id: Ieb4fcae90d2ff9d90a6976e41563bbd61ff7b1b9
2019-07-15 18:55:41 +05:30
Jilai Wang
8a996616fd
sepolicy: Allow appdomain to access NPU device driver node
...
This change is to allow appdomain to access NPU device driver
node.
Change-Id: I5c3270afd105c236a8226d94ac7aa028e4ce1047
2019-07-12 11:23:42 -04:00
Vinay Verma
6eb21e1ba4
Add sepolicy for super image
...
- Label super partition as super_block_device
- Add rules for kernel 4.19 support for init domain
This is a set of vendor changes necessary for interworking
with kernel verison 4.19 properly.
With kernel 4.19, additional filesystem getattr operations
are performed by init for the firmware mount points.
In addition on bootup after adb remount with Android's
Dynamic Partition feature, init needs access to underlying
block devices for overlayfs mounting. At that stage of
init, while SELinux is initialized (thus the need to add
these rules), the underlying block device nodes in tmpfs
have not yet be labeled.
Change-Id: I1f59d701e6ec73eb66a012337eab87593e1921f6
2019-07-12 20:45:48 +05:30
Pavan Kumar M
bc2f64ad5b
sepolicy : Add sysfs_net related path entries
...
Update the secontexts for sysfs_net for
trinket and steppe targets
Change-Id: If263835eaf0a86960596d6ab97657fa6e23a1385
CRs-Fixed: 2485002
2019-07-12 00:03:35 -07:00
jkalsi
8e0dc84de8
Sepolicy change for QDMAUtils
...
Change-Id: I881983f83a99e60faecc6508fcc130820bcc8b58
2019-07-11 17:12:35 -07:00
qctecmdr
832c6fad98
Merge "sepolicy for face3d"
2019-07-11 11:45:58 -07:00
Karthik Nagarajan
2fa08dee4a
sepolicy for face3d
...
sepolicy for face3d service
Change-Id: I28aa2130ebb4112b6b5f8bf594453e879778d2c0
2019-07-10 15:40:24 -07:00
Indranil
aa006542d9
sepolicy: Adding changes for Sigma HAL
...
Sigma requires SEAndroid policies due to design
re-architecure inorder to become qssi compliant.
Change-Id: I653aa6b8d6dca9a8a4f42281fe4f0598bfca93e9
2019-07-09 18:40:39 +05:30
qctecmdr
5361807541
Merge "Perf: Allow perf hal service to access appdomain files"
2019-07-09 01:10:07 -07:00
Ravi Kumar Siddojigari
40c4aa3116
sepolicy : optimization [3/3] in file_contexts
...
Cleanup of file_contexts which are no longer needed or optimize
the regexp which can help in betterment in bootup time.
Change-Id: I9b59f7c46290e14bb32d91219d5c2de408a240d9
2019-07-08 22:41:32 -07:00
Ananth Raghavan Subramanian
3fd8770e09
sepolicy: Add rules for PASR-HAL
...
Add contexts for memory offline nodes, and allow PASR-HAL to access
them.
Change-Id: I323f7a7369a3aea93f755bd7d2684374bf2f3b9e
2019-07-08 11:40:48 -07:00
Libo Jin
6e5939a0b8
Perf: Allow perf hal service to access appdomain files
...
Change-Id: Ibb772f43eb12d318c07875cb6930bc5e0c746988
CRs-Fixed:2478972
2019-07-08 01:25:19 -07:00
Linux Build Service Account
18495e829c
Merge 790484ce21 on remote branch
...
Change-Id: Ib23a8ccec16c322eaaa0ae8701c36d25a06bf6ee
2019-07-06 15:32:52 -07:00
Mohamed Moussa
da563d80ea
qspmsvc: Add SE policy for qspmsvc
...
Add SE policy for qspmsvc
Change-Id: I24d3ea90ac1c9d9ae485ca9cc5fd3fb65f537a4f
2019-07-05 16:26:38 -07:00
Mohamed Moussa
462570fd1e
qspmhal: Add SE policy for QSPM-hal
...
Add SE policy for QSPM-hal.
Change-Id: Ic64d0045095a089b1f6a0586f4b9c4a19ef9732c
2019-07-05 16:18:13 -07:00
qctecmdr
790484ce21
Merge "sepolicy: Add policy rules for untrusted_app27"
2019-07-05 01:52:26 -07:00
qctecmdr
5dc80bd4b4
Merge "sepolicy : optimization [2/3] in file_contexts"
2019-07-04 23:35:22 -07:00
qctecmdr
27f397e091
Merge "sepolicy: add sepolicy for new added prop"
2019-07-04 16:57:00 -07:00
qctecmdr
96338f46ca
Merge "sepolicy: add rules for audio properties"
2019-07-04 14:50:01 -07:00
qctecmdr
59ddc6c41d
Merge "sepolicy: add sensing_vendor_data_file for sensing output"
2019-07-04 12:51:11 -07:00
qctecmdr
ab80bbb26c
Merge "sepolicy: Add secure_element sepolicy rules"
2019-07-04 10:35:09 -07:00
qctecmdr
08d963728f
Merge "sepolicy: add sepolicy for vpsservice"
2019-07-04 03:58:12 -07:00
Ravi Kumar Siddojigari
25a1bf7120
sepolicy : fixed sensors_vendor_data_file type error
...
As the defination in file.te is not matching with the
rule in sensors.te due to typo errro corrected the
name .
Change-Id: Ia5355c2d37bb4d65f8cebeec4e4a6d3996dcef65
2019-07-04 12:09:40 +05:30
Ravi Kumar Siddojigari
fc252511cb
sepolicy : optimization [2/3] in file_contexts
...
Cleanup of file_contexts which are no longer needed or optimize
the regexp which can help in betterment in bootup time.
Change-Id: I3d95b2e9387dfc8fe4a50237c75d79d83c87fa99
2019-07-03 23:30:31 -07:00
qctecmdr
eefd2e03be
Merge "sepolicy: Allow all processes to access non-secure DSP device node"
2019-07-03 21:50:38 -07:00
qctecmdr
72b1329cdb
Merge "Moving some Sepolicies for Boot time optimization"
2019-07-03 21:49:11 -07:00
qctecmdr
3d74cc9774
Merge "sepolicy: Allow USTA test app to access /data/sensors/scripts for legacy path."
2019-07-03 21:48:10 -07:00
qctecmdr
6aa30ba53c
Merge "Fixing avc denial for vendor_mpctl_prop"
2019-07-03 21:46:38 -07:00
qctecmdr
2f8e6c76ac
Merge "sepolicy: Update thermal-engine sepolicy rules for generic vendor file"
2019-07-03 21:45:04 -07:00
qctecmdr
04ad6d3f83
Merge "sepolicy: add permissions to qoslat device on kona"
2019-07-03 21:44:05 -07:00
shoudil
fe25195b29
sepolicy: add sepolicy for new added prop
...
Add sepolicy for new property ro.vendor.qti.va_odm.support,
and allow the prop settable for vendor_init.
Change-Id: Ie8b5fa13630c3dc332473088676a59404765745e
CRs-Fixed: 2483344
2019-07-03 17:28:37 +08:00
Tharun Kumar Merugu
818b8a81de
sepolicy: Allow all processes to access non-secure DSP device node
...
Allow all processes to offload to CDSP using the non-secure device
node.
Change-Id: I17036280ab5ee35e802f6a5c0e5f95933a427f8f
2019-07-03 04:21:20 +05:30
Sandeep Neerudu
39b6ea1f19
sepolicy-sensors:allow access to vendor_data_file for On Device Logging
...
Change-Id: I85a31c39c82df7a33e632267a90ebfc38982b5d4
2019-07-02 02:43:20 -07:00
Manaf Meethalavalappu Pallikunhi
00a7aae2a8
sepolicy: Update thermal-engine sepolicy rules for generic vendor file
...
Update generic thermal-engine sepolicy rule by adding access of
thermal socket, QMI socket, dsprpc access, uio access etc. and
cleanup unwanted sepolicy access.
Change-Id: I83ba6cbe291d594b8b2d8720046851b3fb550aac
2019-07-02 14:41:58 +05:30
Cong Jiajia
3a37919641
sepolicy: add sepolicy for vpsservice
...
Add sepolicy for vpsservice.
Change-Id: I0898d3a62dbb87bfc291353ee3b042576c8c01a3
2019-07-01 19:48:02 -07:00
qctecmdr
c39f08374c
Merge "Added selinux rule for hal_perf"
2019-07-01 15:13:20 -07:00
Maya Erez
c9effc2e53
sepolicy: add sensing_vendor_data_file for sensing output
...
Add sensing_vendor_data_file and its permissions to sensing daemon
to allow reporting the sensing results.
Change-Id: I4571734a5c622437d590b0cb9b195e5e3da92a68
2019-07-01 18:14:26 +03:00
Rahul Janga
828e434087
sepolicy: Add policy rules for untrusted_app27
...
Updated new policy rules for untrusted_app_context.
This change allows apps to access our debug locations.
Change-Id: I9a647ff6e303764a3280aed846e5cb9a4b80ef79
2019-07-01 19:33:06 +05:30
Samyak Jain
ec23d1fbfb
sepolicy: add rules for audio properties
...
add rules for some audio properties as
exception to avoid avc denial
Change-Id: Iac45f5018a28e417c1966740e3aa95927a9a60e6
2019-07-01 04:28:18 -07:00
Bhuvan Varshney
87a4020851
sepolicy: Add secure_element sepolicy rules
...
Added sepolicy rules to fix below denial:
avc: denied { find } for interface=
vendor.qti.hardware.perf::IPerf
sid=u:r:secure_element:s0:c44,c260,c512,c768 pid=2295
scontext=u:r:secure_element:s0:c44,c260,c512,c768
tcontext=u:object_r:hal_perf_hwservice:s0
tclass=hwservice_manager permissive=0
Change-Id: I2b21cd96206ddec173a85855245105e67d70aa3f
2019-07-01 16:16:08 +05:30
Linux Build Service Account
dffaa186f8
Merge 326d19f2fe on remote branch
...
Change-Id: I2cb781ea1699b7bb3e83750b314e3bc4b2d84bc6
2019-06-30 11:20:31 -07:00
qctecmdr
f48e75edbe
Merge "kona: Add rules for kernel 4.19 support for init domain"
2019-06-28 14:25:41 -07:00
qctecmdr
326d19f2fe
Merge "sepolicy: Allow binder call action for location from system_server"
2019-06-28 02:06:59 -07:00
qctecmdr
7093215131
Merge "sepolicy: Revert FIDO session file location"
2019-06-28 00:01:35 -07:00
Vivek Arugula
c3013804e9
sepolicy: Allow USTA test app to access /data/sensors/scripts for legacy path.
...
Change-Id: I2526ac36b4b1f55b2aa11bb34350ef14ba306290
2019-06-28 12:13:03 +05:30
David Ng
e9adb2964f
kona: Add rules for kernel 4.19 support for init domain
...
This is a set of vendor changes necessary for interworking
with kernel verison 4.19 properly.
With kernel 4.19, additional filesystem getattr operations
are performed by init for the firmware mount points.
In addition on bootup after adb remount with Android's
Dynamic Partition feature, init needs access to underlying
block devices for overlayfs mounting. At that stage of
init, while SELinux is initialized (thus the need to add
these rules), the underlying block device nodes in tmpfs
have not yet be labeled.
Change-Id: Iaf15fda401da7b4a34e281e010e16303966bb2c0
2019-06-27 18:23:45 -07:00
Indranil
27b6cae070
sepolicy: wifidisplayhalservice: Add permission for proc_audiod
...
-- wifidisplayhalservice needs permission to read soundcard status
Change-Id: Ie305549e2fcab7a96777eb65dee9dbd295a307ce
2019-06-27 13:37:32 +05:30
Amir Vajid
6143b71b4f
sepolicy: add permissions to qoslat device on kona
...
Add permissions to access qoslat device on kona.
Change-Id: I944372c6218dd98b6b7996215d06251f571c34e5
2019-06-26 19:09:34 -07:00
qctecmdr
6337e49876
Merge "sepolicy: add sensingdaemon property"
2019-06-26 16:31:16 -07:00
qctecmdr
e31c7c321e
Merge "Sepolicy : Enable smcinvoke_device for Widevine"
2019-06-26 14:10:19 -07:00
qctecmdr
144ff244ad
Merge "Sepolicy: Set genfs context for modem restart_level"
2019-06-26 11:56:16 -07:00
Smita Ghosh
9cb4501ac6
Sepolicy: Set genfs context for modem restart_level
...
ssr_setup needs permission to write related to restart_level
Change-Id: Ie917cf6d942b7636385a135870651baf7aae62a3
2019-06-26 09:30:24 -07:00
qctecmdr
e5019e48e1
Merge "sepolicy: fix rule for wigig socket location"
2019-06-26 08:46:25 -07:00
Sachin Grover
96c43ee563
Moving some Sepolicies for Boot time optimization
...
Move sysfs wilcard entries to genfs context for boot
time optimization.
Change-Id: I61386c1e55ea469af3c608da76406e1177a69e66
Signed-off-by: Sachin Grover <sgrover@codeaurora.org >
2019-06-26 18:59:01 +05:30
qctecmdr
77e299b075
Merge "sepolicy: add sepolicy for SmoMo"
2019-06-26 06:22:45 -07:00
Lior David
9fba5e1409
sepolicy: fix rule for wigig socket location
...
The change "sepolicy: update legacy rules for wigig sockets"
contained an incorrect update for vendor_wpa_wlan socket
which caused WIFI start failure. Fix this rule.
Change-Id: I6890fd27f28baabe6177c468b54f81bfd12d39b4
2019-06-26 14:39:50 +03:00
Harikrishnan Hariharan
1eedfff43e
sepolicy: Allow binder call action for location from system_server
...
Change-Id: Iff0baf6966b545fa9bdc5d03e0221ee05d144326
CRs-Fixed: 2479129
2019-06-26 01:46:55 -07:00
Li Sun
3e81ad4d3f
sepolicy: allow mediacodec to access configstore
...
Allow mediacodec to access configstore
Change-Id: I33e6c7cff1a1f609b4bb03d036e881fccc83e2db
2019-06-25 21:59:08 -07:00
Phalguni
0968dd3f1c
Sepolicy : Enable smcinvoke_device for Widevine
...
Change-Id: Ie3439958b0cb3f6b1b56870c3b3bad49e70e8b4d
2019-06-25 17:03:06 -07:00
Maya Erez
c0aad47531
sepolicy: add sensingdaemon property
...
Add property for sensingdaemon daemon required for
wigig sensing feature.
Change-Id: I1ae28975c6e6cd71ce1482d15b6f38b701e99c3d
2019-06-25 20:02:27 +03:00
qctecmdr
1ec1fa4cd5
Merge "Add file contexts for new partitions on Kona"
2019-06-25 09:27:05 -07:00
Ray Zhang
be555fdcac
sepolicy: add sepolicy for SmoMo
...
Add sepolicy for display smooth smoothing service.
Change-Id: Icfc5f76a10a4e1e30556bd2cf35e5717362c4091
2019-06-25 05:16:00 -07:00
richagar
a9ddc89ab2
Added selinux rule for hal_perf
...
Added permissions for hal_perf
in domain.te in legacy and qva
Change-Id: I6006587266735c9f0b8cc3e694c8b08ac2bec064
2019-06-25 15:43:29 +05:30
qctecmdr
4522c825a8
Merge "sepolicy: Adding sepolicy rules for servicetracker HAL"
2019-06-25 01:02:34 -07:00
qctecmdr
8a5fbd5660
Merge "sepolicy : adding misc bootup denails"
2019-06-24 22:51:07 -07:00
Vinayak Soni
f80ff8d11c
Add file contexts for new partitions on Kona
...
Add file contexts for multiimgqti, featenabler
and core_nhlos partitions to enable A/B OTA update
on these partitions.
Change-Id: I532be0343de4068fd40b00b675d2765c5e5ab4f0
2019-06-24 13:58:54 -07:00
Gopal Krishna Shukla
fa3e697732
sepolicy: Adding sepolicy rules for servicetracker HAL
...
Change-Id: Iccfd17e4d2d4f198a47f2e7828811919eacd2181
2019-06-24 19:18:44 +05:30
Ravi Kumar Siddojigari
5dc863443d
sepolicy : adding misc bootup denails
...
Following are added
1.ueventd and vold need search/read access to /mnt/vendor/persist
2. system_server need access to /sys/class/rtc/rtc0 path.
Change-Id: I4d5f322019f1e75aab1be2168eb3805f4f3998c6
2019-06-24 18:44:04 +05:30
qctecmdr
8dae450f0e
Merge "sepolicy: update legacy rules for wigig sockets"
2019-06-24 05:26:08 -07:00
qctecmdr
fa19cf137f
Merge "sepolicy: Allow service_manager find access to mediametrics_service"
2019-06-24 01:00:17 -07:00
richagar
648f11e757
Fixing avc denial for vendor_mpctl_prop
...
Adding permission for platform_app to
access vendor_mpctl_prop
Change-Id: Ifd9b6a3a9f20eec7f4681e233a5d90001cf4eaa9
2019-06-24 09:43:34 +05:30
Devi Sandeep Endluri V V
77ab93c1f4
sepolicy : update dpmd file context rules.
...
-With dynamic partition builds ,separate product.img
binary is generated .
-Update file context rules with product tag.
Change-Id: I6d845e525fce3faed32bb3483b5f9bb31131dbf0
CRs-Fixed: 2475556
2019-06-21 02:53:16 -07:00
Harikrishnan Hariharan
9757c8019e
sepolicy: Allow service_manager find access to mediametrics_service
...
Allow service_manager find access to mediametrics_service for
location test app domain.
Change-Id: I7855ca0d0a970a458fdf611a07dfe844f14ec890
CRs-Fixed: 2476548
2019-06-21 11:42:21 +05:30
Lior David
a4c86f9f78
sepolicy: update legacy rules for wigig sockets
...
wigig sockets moved into their own directory under
/dev/socket/wigig, but the location was not updated
in the legacy rules.
Change-Id: I443bd2d35698a3ab9d81a17ebe9813bbad1b70c2
2019-06-21 01:13:27 +03:00
qctecmdr
9451393ed5
Merge "KONA: Add support for update_engine"
2019-06-20 13:01:43 -07:00
qctecmdr
f9227ca426
Merge "sepolicy: update path of LED files for lito"
2019-06-20 10:53:05 -07:00
qctecmdr
f36c5f61f1
Merge "sepolicy: Add properties to fix wfd denials"
2019-06-20 08:41:32 -07:00
qctecmdr
3db39e369d
Merge "sepolicy: Modify the path in sysfs rule"
2019-06-20 06:25:15 -07:00
Ashay Jaiswal
406b596d6c
sepolicy: update path of LED files for lito
...
LED sysfs files are exposed by PM8150l, update LED file
path accordingly.
Change-Id: Id76fbda4395f2c35ff76078938cb664ba1589dd4
2019-06-20 04:48:40 -07:00
Pavan Kumar M
76e95132fd
sepolicy: Modify the path in sysfs rule
...
Modify the path in sysfs rule for msmnile.
Add the corresponding net sysfs rule for sdm710.
Change-Id: Ibd299806e4a0edf91ff071774064e19a2135bbbd
CRs-Fixed: 2473945
2019-06-20 03:02:21 -07:00
qctecmdr
32645d8905
Merge "Add sepolicy for BT lazyhal property"
2019-06-20 01:16:09 -07:00
Balakrishna Godavarthi
bc07bc1014
Add sepolicy for BT lazyhal property
...
This patch adds lazyhal property to bluetooth_prop
and allows bluetooth application to access the property.
Change-Id: I1803488eaced69116ba07f219f7dc22b7ee1d1ca
2019-06-19 22:56:02 -07:00
anilsr
c5f043fff0
sepolicy: Allow camera hal to access qdisplay service.
...
Change-Id: If1f0f8bc7163a549200d41e20776c34d62386e4c
2019-06-19 22:34:35 -07:00
Smita Ghosh
6230a463f5
KONA: Add support for update_engine
...
Change-Id: I514d6ece3186bc27a07b38ba76f5154e092428f9
2019-06-19 17:56:33 -07:00
qctecmdr
180704bb4e
Merge "sepolicy: Add capabilityconfigstore support for legacy targets."
2019-06-19 04:30:11 -07:00
qctecmdr
7c32d91780
Merge "sepolicy : moving dumpstate permission to normal builds ."
2019-06-19 01:12:18 -07:00
qctecmdr
cc70fbee28
Merge "sepolicy: Add access policy for charger files"
2019-06-18 22:45:20 -07:00
Ravi Kumar Siddojigari
626a7aca87
sepolicy : moving dumpstate permission to normal builds .
...
As the testcase is expected to pass in even userbuild .
Moving the rule out of test folder .
Change-Id: I0cab3ac99d99b417b159a6229e61e3a4fc492497
2019-06-19 11:11:08 +05:30
qctecmdr
f668967b3c
Merge "Sepolicy: Add power off alarm app rules"
2019-06-18 14:05:22 -07:00
qctecmdr
a11a323e14
Merge "sepolicy: Do not audit zygote service access to vendor_gles_data_file"
2019-06-18 10:56:07 -07:00
Mahantesh Sanakall
a8916de8f7
sepolicy: Add capabilityconfigstore support for legacy targets.
...
1. Define domain for capabilityconfigstore
2. Add type for /data/vendor/configstore folder
3. Allow capabilityconfigstore HIDL Server access/r/w it
Change-Id: I2781d93f02fc4673d935d6b764f53a9f45868256
2019-06-18 09:57:24 -07:00
qctecmdr
3c29db5277
Merge "sepolicy: Give read/write permission to vender_gles_data_file"
2019-06-18 08:21:02 -07:00
qctecmdr
3d35ea5570
Merge "sepolicy: Allow platform app to access hal display color service"
2019-06-18 05:57:09 -07:00
qctecmdr
faf26fd926
Merge "sepolicy: add policy for qti audiocontrol"
2019-06-18 02:37:14 -07:00
Trudy Shearer
b37e569182
sepolicy: Revert FIDO session file location
...
Reverting the FIDO session file location accessed via QTEEConnector
to match previous version for backward compatibility
Change-Id: I7701088159977747be8002a4381fd8afdc8b268f
2019-06-18 13:04:41 +05:30
Xiaoxia Dong
cf1e90774e
Sepolicy: Add power off alarm app rules
...
Grant access to hal_perf.
Change-Id: If93ccf6884e07c9d524acd8b8c17e3e8dd635543
2019-06-18 13:59:24 +08:00
qctecmdr
325a1f201f
Merge "sepolicy : Allow APK files to access SCVE libs"
2019-06-17 21:25:09 -07:00
Manu Prasad
b022740e5a
sepolicy: Add properties to fix wfd denials
...
-- Add properties to enable wfd dumping
-- Allow to access logmask file in /data/vendor
-- Allow source to access video SKU and UBWC property
Change-Id: I7688f1e9dde493c9542d213ba87d2efc8dcb37d3
2019-06-16 23:31:35 -07:00
Linux Build Service Account
b3251051a4
Merge b9ff465d8a on remote branch
...
Change-Id: I035407b9f78b5c6dd24828d5c02c40c30950f93a
2019-06-14 18:46:06 -07:00
qctecmdr
8bec0c22ea
Merge "sepolicy: Add location and wifihal rules for legacy devices"
2019-06-14 05:31:33 -07:00
Vinay Gannevaram
8980acb821
sepolicy: Add location and wifihal rules for legacy devices
...
Add socket communication sepolicy rules for location and wifihal.
lowiserver would interact with wifihal for nl communication.
CRs-Fixed: 2467101
Change-Id: Iff7e5f50858c95ad86ff34e5f5333bd9304aec4e
2019-06-14 04:04:14 -07:00
qctecmdr
9847575da6
Merge "Initial Android target definition for trinket"
2019-06-14 03:14:11 -07:00
qctecmdr
d3424b1836
Merge "sepolicy: add permission for sensingdaemon to create socket"
2019-06-13 22:11:15 -07:00
Xu Yang
40ce4bbb1d
sepolicy: Allow platform app to access hal display color service
...
Change-Id: I7d64d51e8d7ec9a9b6a0c129070265cb01c813d4
2019-06-13 19:22:42 -07:00
qctecmdr
2137a69ea5
Merge "sepolicy: add audio permission for spi device"
2019-06-13 15:46:11 -07:00
qctecmdr
d533508208
Merge "Sepolicy: add rule for seempd"
2019-06-13 13:14:47 -07:00
Maya Erez
8a1bb28a03
sepolicy: add permission for sensingdaemon to create socket
...
Allow sensingdaemon access to create socket, to fix the
following error, seen when trying to run the sensingdaemon
with start command:
avc: denied { create } for scontext=u:r:sensingdaemon:s0
tcontext=u:r:sensingdaemon:s0 tclass=qipcrtr_socket permissive=0
Change-Id: I68ae70fe93e0b73f0b6aeec5e84793edf532dfd0
2019-06-13 16:32:33 +03:00
Rahul Janga
872951efad
sepolicy: Give read/write permission to vender_gles_data_file
...
These rules are missed while porting the policies from Android P
to Android Q.
Adressing the following denial:
type=1400 audit(14866.629:43): avc: denied { search } for comm="HwBinder:753_1"
name="gpu" dev="sda9" ino=376 scontext=u:r:hal_graphics_allocator_default:s0
tcontext=u:object_r:vendor_gles_data_file:s0 tclass=dir permissive=0
Change-Id: I24434be8d895d5dab8e5c24643c8be48f20d8673
2019-06-13 18:10:12 +05:30
Vishvanath Singh
afe286084c
Initial Android target definition for trinket
...
Defining sysfs_jpeg in qva
Change-Id: I06429f5dde5b32cafd525d0fca010719a3fcec48
2019-06-13 05:05:12 -07:00
Suman Voora
0a44470698
sepolicy : Allow APK files to access SCVE libs
...
APK needs access for SCVE libs which are on vendor side for
providing the system access for the hals.
These SCVE libs run on different platforms such as GPU,
dsp and cpu, which uses the ion memory.
Change-Id: I21a0bd9c6f2fac58a54e4b7cedc6ab8ea29ea929
2019-06-13 15:26:00 +05:30
Maya Erez
654a150566
sepolicy: add policies for wigig sensingdaemon service
...
Add SE policies for sensingdaemon daemon required for
wigig sensing feature.
Change-Id: I5e5363495cdff6966f6b377fd4688df72f5aa7d0
2019-06-13 01:12:57 -07:00
Kavya Nunna
362458c219
sepolicy: Add access policy for charger files
...
Add charger.te file and add policy for charger script
to access charger devices.
while at it add sepolicy rules for hvdcp_opti.
Change-Id: Ib14d5baad3415e3044732177c73b3e64d4f8fdc4
2019-06-13 11:50:57 +05:30
Derek Chen
44aac37477
sepolicy: add audio permission for spi device
...
Add audio device domain permission for
spidev2.0 device node.
Change-Id: Iff17bc9d05f780620ee1ee89166a74bef38342fb
2019-06-12 14:42:50 -07:00
qctecmdr
38ea1e979b
Merge "sepolicy: Add rules to enable non-A/B dynamic partitions"
2019-06-12 10:59:51 -07:00
qctecmdr
f82a9615fa
Merge "sepolicy: Add support for fastbootd to flash dynamic partitions"
2019-06-12 07:50:38 -07:00
qctecmdr
493e78747d
Merge "sepolicy: Add permissions for composer service"
2019-06-12 04:46:19 -07:00
Mahantesh Sanakall
ef4cce3990
sepolicy: Add rules to enable non-A/B dynamic partitions
...
Change-Id: Icb6e99cf07a1105bb3f2f4311825617c58b8e699
2019-06-12 04:17:35 -07:00
Anuj Singhal
bad42f8098
sepolicy: Add support for fastbootd to flash dynamic partitions
...
Sepolicy changes needed for dynamic partition support for legacy
targets : SDM845 and SDM710
- Add rules to enable fastbootd mode flashing of dynamic partition
- Define labels for super, recovery and vbmeta_system partitions
- Allow update_engine to access recovery partition for OTA
Change-Id: I6f692da6ab687529833a87b6feb375fda26508b8
2019-06-12 15:04:58 +05:30
Derek Chen
1346f7ac89
sepolicy: add policy for qti audiocontrol
...
Added audiocontrol_qti domain and access for Qti
AudioControl HAL Service.
Change-Id: I68a56e82a14c4b9d98f3045d0336f14979333a1b
2019-06-12 02:14:23 -07:00
Marco Zhang
1b7a795471
sepolicy : remove duplicate defination of uefi_block_device
...
As definition of uefi_block_device been moved to common
removing this definition from other target specific folders
Change-Id: I7367555c4d2d869b8f55a3c5bad0ad72a0203e67
2019-06-12 00:08:56 -07:00
Rajavenu Kyatham
23a0ea8f24
sepolicy: Add permissions for composer service
...
- composer service is required for communication b/w
SF and HWC.
Change-Id: I52652d309363b3f0f7b963d615688ce3e11c6fef
CRs-Fixed: 2466343
2019-06-12 12:20:03 +05:30
qctecmdr
78d4d64afd
Merge "sepolicy:Moved NNHAL-1.2v rules to common folder"
2019-06-11 16:31:14 -07:00
qctecmdr
e410bc9a3a
Merge "sepolicy: Fix denials in location app"
2019-06-11 13:33:17 -07:00
qctecmdr
de2313a4a8
Merge "Sepolicy: Add sepolicy permissions to NPU LLCC BWMON device"
2019-06-11 10:41:00 -07:00
Harikrishnan Hariharan
acd13b1cee
sepolicy: Fix denials in location app
...
- Add rule for write access to dpmtcm_socket sock file
- Add few domains to dont audit rule list for vendor_gles_data_file
dir search.
Change-Id: Iabc0250d2ac0bf28e4f4dd3d8c67b4bf20fbeb1e
CRs-Fixed: 2469209
2019-06-11 22:40:07 +05:30
kranthi
6b7b1f3a39
sepolicy: Do not audit zygote service access to vendor_gles_data_file
...
Do not audit zygote service access to vendor_gles_data_file.
Addressing the following denial:
type=1400 audit(0.0:123): avc: denied { search } for name="gpu" dev="dm-0"
ino=1654839 scontext=u:r:zygote:s0 tcontext=u:object_r:
vendor_gles_data_file:s0 tclass=dir permissive=0
CRs-Fixed: 2465123
Change-Id: I6cc6e3e6e393a7181bd9fea6992e6f86f987f0d5
2019-06-11 07:29:51 -07:00
qctecmdr
b362bed0fa
Merge "Sepolicy: Add permissions to set vendor boot mode prop for Factory HIDL"
2019-06-11 06:52:29 -07:00
Huang Li
b3e35668d2
Sepolicy: Add permissions to set vendor boot mode prop for Factory HIDL
...
Allow permissions for Factory HIDL to set vendor.sys.boot_mode prop.
Change-Id: Ifa5edbb01d5f859225ccb440ec367c222b8eebf4
CRs-Fixed: 2450631
2019-06-11 18:29:07 +08:00
Madhanraj Chelladurai
ed9d8b83c9
sepolicy: permissions for audio, hw service for location_test_app
...
permissions for audio and hw service access for
location_test_app
Change-Id: I1e059486248dafc7a6adeb0b6273eb3d39ab2235
CRs-Fixed: 2445789
2019-06-11 03:20:36 -07:00
qctecmdr
deb6cc1f72
Merge "sepolicy: allow gnss hal to access health hal"
2019-06-10 12:14:36 -07:00
qctecmdr
fdbf08d08c
Merge "sepolicy: Allow secure_element HAL to access vendor data"
2019-06-10 08:56:18 -07:00
Linux Build Service Account
b7ad438646
Merge a0e764c972 on remote branch
...
Change-Id: I2f0ec57cafd29e60973b24c098a46a0d25aecb4d
2019-06-10 06:31:22 -07:00
qctecmdr
11d1a57ae3
Merge "sepolicy: Add permissions for composer service"
2019-06-10 06:30:18 -07:00
Gaurav Singhal
6502396bcb
sepolicy: Allow secure_element HAL to access vendor data
...
Allow secure element HAL service to access vendor data file
for JCOP and loader service use cases.
Change-Id: Ic37f364be5374a2de24f5c02f4b4536ce0212e79
2019-06-10 17:47:18 +05:30
Rajavenu Kyatham
e3f33989ec
sepolicy: Add permissions for composer service
...
CRs-Fixed: 2466343
Change-Id: I5a66822c1c8b46093cd62eb08aa1ff48b1c658b7
2019-06-10 04:12:38 -07:00
qctecmdr
dca379a39e
Merge "sepolicy: provide rules for cryptfs_hw hal"
2019-06-10 04:08:18 -07:00
Nitin Shivpure
ebc9ef5c11
sepolicy: allow bluetooth hal to access persist/bluetooth data
...
allow bluetooth hal to access(read, write, create) persist bluetooth
data.
Change-Id: Idee1f22f12c9852532325577efd534a731985d45
2019-06-10 12:52:52 +05:30
vishawar
29f7028ff8
sepolicy:Moved NNHAL-1.2v rules to common folder
...
-Removed target specific data rules
-Added rules to common folder
Change-Id: I935dc8025f98c9cf18db15e01276c9237f6e77eb
2019-06-10 10:48:17 +05:30
Neeraj Soni
66bb7bb387
sepolicy: provide rules for cryptfs_hw hal
...
BUG: b/121350843
vold need to communicate with tee device node to set crypto
engine keys for userdata encryption. cryptfs_hw hal is
implemented to facilitate this commuincation.
Change-Id: Ie1d02b211e1f6e147092710008b363795df5e0a6
Signed-off-by: Neeraj Soni <neersoni@codeaurora.org >
2019-06-09 12:41:46 +05:30
qctecmdr
fdd65f7f77
Merge "sepolicy: Add iuicc device and its access for spdaemon"
2019-06-08 21:35:06 -07:00
qctecmdr
f520720f98
Merge "sepolicy: add permission for qdmaststsd"
2019-06-08 15:15:04 -07:00
qctecmdr
345bdfcd92
Merge "sepolicy: add sysfs paths for mhi timesync feature support"
2019-06-08 12:37:14 -07:00
qctecmdr
b676c640d7
Merge "sepolicy : add binder call from system_app-> update_engine"
2019-06-08 07:38:16 -07:00
qctecmdr
b9ff465d8a
Merge "Initial target definition for atoll"
2019-06-08 07:25:55 -07:00
qctecmdr
6a9caf83c8
Merge "sepolicy : Add net admin capability for cnss-daemon"
2019-06-08 07:25:08 -07:00
qctecmdr
29da6714d6
Merge "sepolicy: Add support for touch AOI and touch wakeup"
2019-06-07 21:11:23 -07:00
qctecmdr
9b5f8fae6e
Merge "sepolicy: labeling subsystem and graphics nodes"
2019-06-07 21:11:23 -07:00
qctecmdr
f68c353327
Merge "sepolicy: allow time-services to access perf hal"
2019-06-07 21:11:23 -07:00
qctecmdr
135d0cc82c
Merge "Allow qtelephony to access perf hal"
2019-06-07 21:11:23 -07:00
Rama Aparna Mallavarapu
813d7dac28
Sepolicy: Add sepolicy permissions to NPU LLCC BWMON device
...
Add permissions to npu llcc bw device so that post boot script
can modify them at boot.
Change-Id: I6be945877cdf379cba40e19e6a24a787c918cb9f
2019-06-07 12:14:00 -07:00
Amandeep Virk
57c728d261
sepolicy: Add iuicc device and its access for spdaemon
...
Define iuicc device so that spdaemon can open an spcom
channel to corresponding iuicc application on Secure
Processor
Change-Id: I8028df28b12058cbb4d49023cf548755ec3f271c
2019-06-07 10:47:19 -07:00
Vinay Gannevaram
11de9bde80
sepolicy : Add net admin capability for cnss-daemon
...
cnss-daemon needs net admin capability to interact
via nl communication.
CRs-Fixed: 2461663
Change-Id: I8b23451895b38e29dd84aaf6e440071157d9407e
2019-06-06 23:26:17 -07:00
Shawn Shin
4b6dde0be7
sepolicy: add permission for qdmaststsd
...
qdmastatsd use it for collection
Change-Id: I5570834336bf0aa24dd4e8507fe2c702788ecd38
2019-06-06 09:55:30 -07:00
Harikrishnan Hariharan
ee24695856
sepolicy: allow gnss hal to access health hal
...
Add rule for gnss hal to listen battery status for legacy
devices upgrade.
Change-Id: Ia251c3446b7f7861bb920fe635229d8e2e90c824
CRs-Fixed: 2467115
2019-06-06 19:11:12 +05:30
Jaihind Yadav
cc3cac8f9b
sepolicy: labeling subsystem and graphics nodes
...
Change-Id: Ie1b1c3135269f6417bfa78a9bcd4e055d3d3fd65
2019-06-05 23:26:34 -07:00
Mohit Aggarwal
938a52c749
sepolicy: allow time-services to access perf hal
...
Allow time-services to access perf hal
Change-Id: Iaca0b6e47b63aeccdf5e5faa3628a0cc53017be0
2019-06-06 10:42:17 +05:30
Sujeev Dias
10553605a6
sepolicy: add sysfs paths for mhi timesync feature support
...
Add sysfs path for mhi timesync feature files to be read from
userspace applications/services.
CRs-Fixed: 2426302
Change-Id: Ib28800e000774d8ce27dd9a78db9efd6ebdbdb00
2019-06-04 17:47:19 -07:00
qctecmdr
8ef1adb229
Merge "sepolicy: xtwifi-client access to hlos_rfs shared"
2019-06-04 14:10:33 -07:00
qctecmdr
8da456b050
Merge "sepolicy : addressed dumpstate related denials."
2019-06-04 11:20:55 -07:00
qctecmdr
878819b0d9
Merge "sepolicy: Read vendor_pd_locater_dbg_prop in GNSS HIDL for legacy"
2019-06-04 05:44:15 -07:00
Abir Ghosh
f777748b76
sepolicy: Add support for touch AOI and touch wakeup
...
Add sepolicy permissions for qfp-daemon to access sysfs
nodes for setting touch AOI and touch wakeup feature for
fingerprint.
Change-Id: Ic890c4cc95abdaaede9f7d448d848d5859c4a04a
2019-06-04 15:31:58 +05:30
qctecmdr
fb960e3998
Merge "Sepolicy: Add vendor_adsprpc_prop to app.te"
2019-06-04 02:53:26 -07:00
qctecmdr
697281bf7f
Merge "sepolicy: Add rule for audioserver to find audio_service"
2019-06-04 00:19:32 -07:00
Harikrishnan Hariharan
76007ff333
sepolicy: xtwifi-client access to hlos_rfs shared
...
Change-Id: Ibaea6e128388ad6abb1df731017550a0cb28f377
CRs-Fixed: 2464825
2019-06-04 12:29:08 +05:30
qctecmdr
56ec950386
Merge "sepolicy: Add permissions for feature_enabler_client app"
2019-06-03 15:59:39 -07:00
Ramkumar Radhakrishnan
9adc02b0ab
sepolicy: Add permissions for feature_enabler_client app
...
Add permission for feature enabler client app to have read and write
access to qseecom node, ion node,and mink socket
Change-Id: I08d5c5a27846fc5c22d505a66544645cb0543223
2019-06-03 14:35:27 -07:00
qctecmdr
97c0281668
Merge "genfs_contexts: Add label to graphics sysfs nodes for kona"
2019-06-03 13:25:05 -07:00
Harikrishnan Hariharan
90d39e829c
sepolicy: Read vendor_pd_locater_dbg_prop in GNSS HIDL for legacy
...
Add rule to read vendor_pd_locater_dbg_prop in GNSS HIDL for legacy
devices
Change-Id: If7cc23dcf06278877c16f9d964b272ff08c24825
CRs-Fixed: 2464884
2019-06-03 22:52:26 +05:30
Ravi Kumar Siddojigari
9767ee2638
sepolicy : addressed dumpstate related denials.
...
As part of CTS testing its expected no denails should be seen
from dumpstate domain during testing so addressing generic
permission issue.
test :testNoBugreportDenials
Change-Id: Ic60a49e6330c42aa99280af8e6913af140e981e5
2019-06-03 18:21:39 +05:30
Deepthi Gunturi
8b3da704fa
Initial target definition for atoll
...
Change-Id: Icca936427ca63aeab20a3f26d69a4e92c8935746
2019-06-03 05:29:33 -07:00
Ravi Kumar Siddojigari
a0e764c972
sepolicy : bt services domains aligned with prebuilds version 29.0
...
Change-Id: I095c5294daf29da389c2da16f03c6bb1508d6be6
2019-06-03 16:30:32 +05:30
Ramjee Singh
cafb67c1ca
sepolicy: Add rule for audioserver to find audio_service
...
Add rule for audioserver to find audio_service for AAudio usecase
Change-Id: I1cd1b621b362124a338973aaeff6341e6862418d
2019-06-03 14:40:57 +05:30
Jiju Kinattingal
00b0397122
Allow qtelephony to access perf hal
...
Allow qtelephony to access perf hal
Change-Id: I143e04dff71a78f61d680ecb7ad5b007a2e618d3
2019-06-03 14:05:35 +05:30
qctecmdr
15bee8edb0
Merge "Sepolicy : Enable qce_device"
2019-06-01 06:15:04 -07:00
qctecmdr
6b51f30af2
Merge "sepolicy: allow bluetooth to access perf hal"
2019-05-31 16:45:30 -07:00
Phalguni
0b9199016f
Sepolicy : Enable qce_device
...
Change-Id: Ibdb12124a8568759ba057ac6e7cce70c93a78889
2019-05-31 11:11:12 -07:00
Abhimanyu Garg
2470da3fec
genfs_contexts: Add label to graphics sysfs nodes for kona
...
Add label to graphics sysfs nodes to avoid the denial for perf
features.
Change-Id: I553f629493cbab21affb2d91b9695bc9263ed405
2019-05-31 10:24:32 -07:00
qctecmdr
598fb80fab
Merge "sepolicy: add sepolicy for usta_app to open system_data_file"
2019-05-31 10:19:46 -07:00
Nitin Shivpure
3f4efd7619
sepolicy: allow bluetooth to access perf hal
...
allow bluetooth to access perf hal
Change-Id: Ibe71b00b71b010c8032a563638debea7990067b6
2019-05-31 03:00:48 -07:00
shann
674bed6d2f
sepolicy: add sepolicy for usta_app to open system_data_file
...
The error is encountered when usta_app (test app) is trying to open
system_data_file(/data/misc/gpu/adreno_config.txt). Providing only open
permission to the test app.
Addressing the issue:
avc: denied { open } for comm="RenderThread" path="/data/misc/gpu/adreno_config.txt"
dev="dm-0" ino=1180432 scontext=u:r:usta_app:s0 tcontext=u:object_r:system_data_file:s0
tclass=file permissive=1
JIRAs-Fixed: APTSEC-22
CRs-Fixed: 2460155
Change-Id: I73828c62fac6022197ff58f04494331a609a4175
2019-05-31 02:40:34 -07:00
qctecmdr
c3e77cff36
Merge "sepolicy: give se policy permission to dcvs nodes"
2019-05-31 01:23:13 -07:00
Santosh Mardi
c36cb42ae9
sepolicy: give se policy permission to dcvs nodes
...
Give SE policy permission to dcvs nodes used to scale L3,
LLCC and DDR frequency based on traffic.
Change-Id: I37758b21eee4546f4966575e523ff36ce3b0949f
2019-05-31 12:03:10 +05:30
qctecmdr
72e7df6cd9
Merge "sepolicy: add missing permission for location.te"
2019-05-30 22:46:20 -07:00
qctecmdr
ccdd1c9ed8
Merge "sepolicy: Adding permissions for location apps"
2019-05-30 11:12:22 -07:00
qctecmdr
af62dc76a8
Merge "sepolicy: allow gnss hal to access health hal"
2019-05-30 08:51:25 -07:00
Ashish Dhiman
52aefeeada
sepolicy: add missing permission for location.te
...
added missing sepolicy for xtwifi-client location
client
CRs-Fixed: 2460415
Change-Id: I0cd2182ef287619759fe86b654133bd7026dbc70
2019-05-30 08:48:40 -07:00
Harikrishnan Hariharan
1bc9e92696
sepolicy: Adding permissions for location apps
...
Adding perf hal permissions to location_app.te and
location_app_test.te.
Change-Id: I564848d17439cd1b1aeef85efe21fa83b84a4dea
CRs-Fixed: 2457559
2019-05-29 23:28:29 -07:00
Harikrishnan Hariharan
4829c3a00a
sepolicy: allow gnss hal to access health hal
...
Add rule for gnss hal to listen battery status.
Change-Id: If9874ab9bbb92a42b74ec696f55725b98a913f9e
CRs-fixed: 2411905
2019-05-29 23:28:21 -07:00
Anmolpreet Kaur
b59a8af1bb
sepolicy: private: Remove smcinvoke daemon sepolicy
...
smcinvoke daemon will no longer be available in system.
Sepolicy rules are not needed to be defined as smcinvoked
is deprecated from system.
Change-Id: I12d00976789db4cf00aabeeb2781e34b19830eed
2019-05-29 23:18:20 -07:00
Linux Build Service Account
f912cc2e2c
Merge 0875429068 on remote branch
...
Change-Id: I726645f1a26e27f1dbf9eff4e6928d99d474f883
2019-05-29 19:02:25 -07:00
qctecmdr
aa536e05d4
Merge "sepolicy: Adding permissions for nfc"
2019-05-29 16:35:06 -07:00
qctecmdr
8db4440147
Merge "sepolicy: Allow init to access mem_sleep"
2019-05-29 13:50:14 -07:00
qctecmdr
a7ff30b3c2
Merge "sepolicy: permit graphics hwcomposer to read kgsl sysfs nodes"
2019-05-29 11:11:13 -07:00
Ananth Raghavan Subramanian
ab0c44baeb
sepolicy: Allow init to access mem_sleep
...
Add labels for the mem_sleep node and allow the init shell to access it.
Change-Id: Id9ba40a2c0c52e9ab08b249291a5090b249ce64d
2019-05-29 09:51:38 -07:00
qctecmdr
fa61edc076
Merge "Add sepolicy for dynamic partition."
2019-05-29 08:27:03 -07:00
qctecmdr
a8130be8b8
Merge "sepolicy : Add rule to set property for wlan driver/fw ver info"
2019-05-29 01:50:22 -07:00
Padmanabhan Komanduru
00ddb37c5f
sepolicy: permit graphics hwcomposer to read kgsl sysfs nodes
...
Permit graphics hwcomposer to access kgsl sysfs node to get
the value of maximum GPU clock supported.
Change-Id: Idc3966029364436cbca445a9bc704ee2a2caf874
2019-05-29 14:02:15 +05:30
Vinay Verma
bdbf9d49aa
Add sepolicy for dynamic partition.
...
Change-Id: Ic2ebaf716195e64015b3beb457f1364cf4fec604
2019-05-29 13:25:19 +05:30
qctecmdr
3c447db2dc
Merge "sepolicy: msmnile: Add vehicle hal rules for Q bringup"
2019-05-28 12:26:16 -07:00
qctecmdr
4fd76090d3
Merge "sepolicy: add SE policy rules for hta runtime libraries"
2019-05-28 10:21:15 -07:00
Vinay Gannevaram
839229b542
sepolicy : Add rule to set property for wlan driver/fw ver info
...
wlan driver/fw version are set at property at enforcing mode.
Add rules to allow to set wlan driver/fw version info
CRs-Fixed: 2460816
Change-Id: Ic0bb570cd53fe450512496c5864f432ce3219bbe
2019-05-28 20:44:09 +05:30
Amareswar Reddy Valasa
21e39ad540
Sepolicy: add rule for seempd
...
[ 22.106248] type=1400 audit(428.119:82): avc: denied { search } for
comm="seempd" name="seemp" dev="dm-0" ino=835653 scontext=u:r:seempd:s0
tcontext=u:object_r:seemp_data_file:s0 tclass=dir permissive=0
Change-Id: Id36a6ed86a60644929bc907b7ceb58b843083283
2019-05-28 16:36:10 +05:30
qctecmdr
e159097d13
Merge "sepolicy: Allow read for avextension debug property"
2019-05-28 03:02:41 -07:00
qctecmdr
cc5fa63528
Merge "sepolicy : clean-up of netd_socket usage."
2019-05-28 00:46:25 -07:00
Brijesh Patel
5b813bd3f4
sepolicy: Allow read for avextension debug property
...
- Multiple processes and applications use avextension
directly or indirectly causing property read denials
for debug property.
Change-Id: Ibe71b00b71b010c8032a563638debea7990057a6
2019-05-28 00:28:03 -07:00
Ravi Kumar Siddojigari
4cb4eee99e
sepolicy : clean-up of netd_socket usage.
...
As public defination of netd_scoket is removed removing all the
references to this.
Change-Id: I752d1d546d5d6e76dc4e43fc3d4a90b0aca077c8
2019-05-28 11:47:01 +05:30
qctecmdr
bd64e5e5d2
Merge "sepolicy: add device sepolicy rule for NNHAL-1.2v"
2019-05-27 22:34:05 -07:00
qctecmdr
7191695bde
Merge "sepolicy: add rules for imshelper_app"
2019-05-27 04:56:35 -07:00
qctecmdr
94af206963
Merge "sepolicy : Remove deprecated smcinvoke_daemon"
2019-05-27 02:41:16 -07:00
Devi Sandeep Endluri V V
6a63afe092
sepolicy: add rules for imshelper_app
...
Add rules to allow imshelper_app to search
radio_data_file
Change-Id: I1184833d2cde889292aa4cf205e748cecb23ae3c
2019-05-27 00:37:30 -07:00
qctecmdr
c2bc90639c
Merge "sepolicy : Remove deprecated smcinvoke_daemon"
2019-05-27 00:35:59 -07:00
Anmolpreet Kaur
f2d9e37035
sepolicy : Remove deprecated smcinvoke_daemon
...
smcinvoke daemon will no longer be available in system.
Sepolicy rules are not needed to be defined as smcinvoked
is deprecated from system.
Change-Id: I19bcfc36aed1ed0ae28739b9428127faec7b65b4
2019-05-27 12:04:50 +05:30
Anuj
eca40c74e6
sepolicy: msmnile: Add vehicle hal rules for Q bringup
...
Change-Id: Ic389c51cf3b9bf63a4be158e055321776cb05b30
2019-05-26 21:11:31 -07:00
Tharaga Balachandran
3dd3609333
sepolicy: Add policies for mapper and allocator
...
CRs-Fixed: 2451972
Change-Id: I3415b9672066bdbd6726fcd32b165980b0c7eeca
2019-05-24 11:53:40 -07:00
Vishawa Raj Singh
26e7f29bdf
sepolicy: add device sepolicy rule for NNHAL-1.2v
...
Updated rules for legacy targets from generic targets
Change-Id: I1128703a8303d5359c3a28329a7f3c3f091d9d44
2019-05-24 16:50:43 +05:30
Amareswar Reddy Valasa
169b91dfa7
sepolicy : Remove deprecated smcinvoke_daemon
...
smcinvoke daemon will no longer be available in system.
Sepolicy rules are not needed to be defined as smcinvoked
is deprecated from system.
Change-Id: I7a52b1f282744d6845d6b7270adcff9ccc39842b
2019-05-24 15:55:21 +05:30
Chinmay Agarwal
f847c3d887
sepolicy : add sepolicy rule to avoid avc denials
...
Signed-off-by: Chinmay Agarwal <chinagar@codeaurora.org >
Acked-by: Sumedha Shenolikar <sshenoli@qti.qualcomm.com >
Change-Id: I53b2cc9ce3474ef64857bd56ad39e8286cc6eeae
2019-05-23 23:26:20 -07:00
Smita Ghosh
993ea39cea
Sepolicy: Set genfs context for modem restart_level
...
If this is not set, modem ssr fails
Change-Id: Ie6d035f80f897cd278facb885e937ebf37b79900
2019-05-23 17:58:19 -07:00
Jilai Wang
530c3e89b0
sepolicy: add SE policy rules for hta runtime libraries
...
Add hta runtime libraries to file_contexts for allowing applications from
data partition to link to them.
Change-Id: Ib6318f59fd1b0f7d462f587721d90bd3c1f909b0
2019-05-23 16:17:45 -04:00
Ravi Kumar Siddojigari
0875429068
sepolicy : remove duplicate defination of uefi_block_device
...
As definition of uefi_block_device been moved to common
removing this definition from other target specific folders
Change-Id: I9d9420125a7d0dc4ee78763081bd7865c1cf3a6d
2019-05-23 18:45:57 +05:30
qctecmdr
07a510a630
Merge "sepolicy: Add SEPolicy for Power 1.2 HAL service"
2019-05-22 11:11:03 -07:00
qctecmdr
1746d28635
Merge "recovery: Add non-ab dynamic partitions policies"
2019-05-22 04:49:59 -07:00
Tharun Kumar Merugu
747bd62df7
Sepolicy: Add vendor_adsprpc_prop to app.te
...
Add vendor_adsprpc_prop to app.te
Change-Id: Iadd721e6face7badcd1472abc4759dd8a366444f
2019-05-22 14:30:56 +05:30
Ravi Kumar Siddojigari
06ac6020da
sepolicy : add binder call from system_app-> update_engine
...
As part of gota testing for addressing following denial.
type=1400 audit(0.0:431): avc: denied { call } for
scontext=u:r:system_app:s0 tcontext=u:r:update_engine:s0 tclass=binder permissive=0
Change-Id: Ica6e91ac202cafd203c503bacd65d7bc8e256d6b
2019-05-22 13:49:33 +05:30
padarshr
0a4914f674
recovery: Add non-ab dynamic partitions policies
...
With dynamic partitions enabled, recovery, while doing non-a/b ota
needs read access to sysfs_dm, allow the same.
Change-Id: I98d3d2421ffd49df1d2b84bb42cab9ee529d530a
2019-05-22 01:05:33 -07:00
qctecmdr
b291856fc9
Merge "Add support for"
2019-05-22 00:00:07 -07:00
richagar
5c0dd72f17
sepolicy: Adding permissions for nfc
...
Adding perf hal permissions to nfc.te
for legacy and qva
Change-Id: Ic62e0cff34fb7af1778239c1d436a3a25c0cfc01
2019-05-22 12:21:29 +05:30
Mulugeta Engdaw
6310eac02a
Add support for
...
1. Fastbootd to flash physical and logical partitions
2. Update engine to update newly created partitions
3. Change the label for the super block device
Change-Id: I4c38960e2cbacd3bfe81208d6f451ab09e7b3943
2019-05-21 22:06:55 -07:00
Tyler Wear
57528806a2
iwlan: Logging Property
...
Add runtime property to enable logcat logging for iwlan services.
Change-Id: I41d1129611a8026ae2943c77492715c3eca975b2
2019-05-21 16:01:46 -07:00
qctecmdr
a233a885d6
Merge "sepolicy: Add rule for audioserver to find audio_service"
2019-05-21 11:34:59 -07:00
Ananth Raghavan Subramanian
d1f4773fb1
sepolicy: Add SEPolicy for Power 1.2 HAL service
...
Change-Id: Ifd78b40bf597dc02ca2ca3a8e471b348f72f8c4a
2019-05-21 11:17:47 -07:00
qctecmdr
04c14f1d19
Merge "Sepolicy: Add selinux permission for QtiMapper interface."
2019-05-21 09:36:08 -07:00
qctecmdr
93114e2f63
Merge "sepolicy : startup scripts are given permission to read /proc/meminfo"
2019-05-21 02:29:14 -07:00
Ashish Kumar
47a514ed91
Sepolicy: Add selinux permission for QtiMapper interface.
...
CRs-Fixed: 2451646
Change-Id: Ic909d367ac4bec149451b1fb68b400f27c62491f
2019-05-21 13:57:17 +05:30
qctecmdr
8844b19e03
Merge "sepolicy: Add persist file access rules for USTA test App"
2019-05-21 00:17:27 -07:00
Arun Mirpuri
0d8f1a137c
sepolicy: Add rule for audioserver to find audio_service
...
Add rule for audioserver to find audio_service for AAudio usecase
Change-Id: I86772100c02d523d3108a13dd8daec2f9c1d27b5
2019-05-20 17:10:45 -07:00
qctecmdr
4a93f74008
Merge "Sepolicy: Set genfs context for modem restart_level"
2019-05-20 14:26:03 -07:00
Eric Chang
22585dcd63
selinux: Add permission for qtidataservices to call location
...
Change-Id: I3742196a3a5c9f1ff66ec34eedfac5b879928e3a
2019-05-20 10:48:20 -07:00
vishawar
00f64065c3
Added device sepolicy rules for NN HAL data files for kona
...
Change-Id: I8d5daa58201fd72a5a88670f7c97e8e681ad2bf3
2019-05-20 05:31:14 -07:00
qctecmdr
3e26c96aa7
Merge "sepolicy: smcinvoke: Remove sepolicy for smcinvoke"
2019-05-19 23:30:07 -07:00
Mulugeta Engdaw
45ce93a6cc
Allow system_server to read Peripheral Manager prop.
...
Allow system_server to read/access peripheral manager prop
during shutdown.
Files Affected:
generic/vendor/common/system_server.te
Test:
confirmed prop value is read during shutdown.
Change-Id: I44a4f312320cb15e31e473e6b8f5220804ce29fc
2019-05-17 11:36:57 -07:00
Smita Ghosh
e7b9fe2a1c
Sepolicy: Set genfs context for modem restart_level
...
If this is not set, modem ssr fails
Change-Id: Ie6d035f80f897cd278facb885e937ebf37b79900
2019-05-17 10:49:59 -07:00
qctecmdr
625a956160
Merge "sepolicy: Add vendor grep file context."
2019-05-17 05:54:28 -07:00
Anmolpreet Kaur
11f6e452fd
sepolicy: smcinvoke: Remove sepolicy for smcinvoke
...
There are no components of smcinvoke in the system
from Q onwards. The given sepolicy rules can be removed
as there exists no smcinvoked in system/bin.
Change-Id: I185047392c3d9835ce7de23fd8bf73cc0c566cf0
2019-05-17 03:41:41 -07:00
Ravi Kumar Siddojigari
ae4f642494
sepolicy : startup scripts are given permission to read /proc/meminfo
...
post_boot or other startup scrpits need access to /proc/meminfo
so adding the required permission.
Change-Id: Ia3ecab3b049af4204c8af85bdee6eba2fa5849bd
2019-05-17 12:19:49 +05:30
Anmolpreet Kaur
8ed8327620
sepolicy: smcinvoke: Remove sepolicy for smcinvoke
...
There are no components of smcinvoke in the system
from Q onwards. The given sepolicy rules can be removed
as there exists no smcinvoked in system/bin.
Change-Id: I185047392c3d9835ce7de23fd8bf73cc0c566cf0
2019-05-16 20:08:27 -07:00
Ashwani Jha
0fc7dce82c
sepolicy: Add sepolicy rules for qvrservice
...
Sepolicy rules to give qvrservice access to ion device and video device.
Change-Id: I63d73686952aa4600b7d4ad2471014ff0969c493
2019-05-16 14:23:53 -07:00
qctecmdr
f9e9972d78
Merge "sepolicy : add network stack rules"
2019-05-16 08:00:09 -07:00
Linux Build Service Account
8b280ab594
Merge 56ec9c4e76 on remote branch
...
Change-Id: I2a0e3e44e68e235f3e0cfee14343a0ca442c2c98
2019-05-16 07:56:18 -07:00
qctecmdr
f45ff29020
Merge "sepolicy: Give read/write permission to vender_gles_data_file"
2019-05-16 05:41:03 -07:00
Devi Sandeep Endluri V V
09d9ad6f0b
sepolicy : add network stack rules
...
add network stack rules to create TCM socket.
Change-Id: I6fa881de13e2d8c30ebe15a7525ec45f94e03a78
CRs-Fixed: 2453152
2019-05-16 04:46:47 -07:00
qctecmdr
d2cb04b0d9
Merge "sepolicy: Add permission to access min_level_change node for hdcp"
2019-05-16 03:41:20 -07:00
Sandeep Neerudu
50dbc4287a
sepolicy : Add property access rules for sensors init script
...
Change-Id: I59d8cfbe7b6dd88e748a33ffad9a006026ba3573
2019-05-16 01:23:12 -07:00
qctecmdr
5091e4e873
Merge "sepolicy: Allow camera to access cvp"
2019-05-15 21:56:05 -07:00
qctecmdr
89c497f151
Merge "Camera: Allow camera to access GPU device"
2019-05-15 10:35:10 -07:00
Ruofei Ma
715d9362c8
sepolicy: Allow camera to access cvp
...
Add rule to allow camera to access cvp device.
Change-Id: I3d35546cea0ba3fa700eb18a7178d6fa153d251a
2019-05-15 10:06:05 -07:00
Sandeep Neerudu
01daaa8332
sepolicy: Add persist file access rules for USTA test App
...
Change-Id: I1ea7b7bd2a77dc37021fc3312ca04e25eeff06a9
2019-05-15 06:35:49 -07:00
qctecmdr
3e491f0340
Merge "sepolicy: allow property settable for vendor_init"
2019-05-15 04:46:24 -07:00
Vijay Dandiga
48242a3651
sepolicy: Add vendor grep file context.
...
grep is used in detecting RAM size in post init scripts.
Based on RAM size, few memory parameters are set.
Change-Id: Iee3cb90fe43c3b0f182dcffd71bc7bcac652188d
2019-05-15 16:08:16 +05:30
qctecmdr
0e7f78678e
Merge "Camera: Add permission to access camera library for passthrough hidl"
2019-05-14 23:10:42 -07:00
Pu Chen
635f6ca03c
Camera: Allow camera to access GPU device
...
Add rule to access GPU device.
Change-Id: I7fb469c478184075f7bf2c50e8a256d6c392a9dc
2019-05-14 15:48:02 -07:00
qctecmdr
354070317e
Merge "sepolicy: Adding rules for WFD secure sink on legacy targets"
2019-05-14 08:10:03 -07:00
Ravikanth Tuniki
0c661ba66a
sepolicy: Add permission to access min_level_change node for hdcp
...
CRs-Fixed: 2449926
Change-Id: Ia5e79827f17adf7924da1eac99e2ece892ba07ab
2019-05-14 16:44:12 +05:30
Manu Prasad
c62f59a643
sepolicy: Adding rules for WFD secure sink on legacy targets
...
Change-Id: I6fb86150d4d11bb656bdf7d1477bc8ce337bc29c
2019-05-14 01:23:13 -07:00
Mao Jinlong
9f773f683b
genfs_contexts: Add label to qdss sysfs nodes for kona and lito
...
Add label to qdss sysfs nodes to avoid the denial when qcomsysd accesses
qdss sysfs.
Change-Id: I38c8900b11343a6579c88b3a799f070d01936423
2019-05-14 15:33:24 +08:00
Vijay Agrawal
9e590042e9
sepolicy: Give read/write permission to vender_gles_data_file
...
Add sepolicy for untrusted_app_25, priv_app.te, domain.te
to read/write vender_gles_data_file to access system_server,
surfaceflinger, bootanim, system_app, platform_app,
priv_app, radio, shell
04-11 21:12:48.359 8395 8395 W RenderThread: type=1400
audit(0.0:1058): avc: denied { read } for
name="esx_config.txt" dev="dm-0" ino=295474
scontext=u:r:untrusted_app_25:s0:c512,c768
tcontext=u:object_r:vendor_data_file:s0 tclass=file
permissive=0 app=com.qualcomm.adrenotest.
CRs-Fixed:2436094, 2441817
Change-Id: I15dc9873cd38bbca9f955917d57b3da2a5b056b7
Signed-off-by: Vijay Agrawal <vijaagra@codeaurora.org >
2019-05-14 11:01:35 +05:30
qctecmdr
162144eeba
Merge "Add loopback vendor service domain"
2019-05-13 11:35:20 -07:00
Eric Chang
044af9fdc0
Add loopback vendor service domain
...
Change-Id: I48600bd2d41f9f145a01f4af06f0312dc74f0ec0
2019-05-13 10:14:53 -07:00
Ashwani Jha
c00a363079
sepolicy: Add sepolicy rules for qvrservice.
...
Sepolicy rules to give access to qvrservice and external apk that uses
qvr runtime.
Change-Id: I86e5056112b62c65b0bd7a6ec00fdc2afc5f2b88
2019-05-13 09:17:07 -07:00
shoudil
0ab001b27a
sepolicy: allow property settable for vendor_init
...
Allow property ro.vendor.qti.va_aosp settable for vendor_init.
Help ODM properties get loaded successfully.
Change-Id: Ie3005a625957673c150aba40373572278329bf0a
CRs-Fixed: 2451592
2019-05-13 18:12:04 +08:00
qctecmdr
4ca4564abe
Merge "sepolicy: Add access policy for charger files"
2019-05-12 22:15:07 -07:00
Umang Agrawal
c0b750ecef
sepolicy: Add access policy for charger files
...
Add labels for charger related sysfs devices and script, and add policy
for charger script to access charger devices.
Change-Id: I4cbea169bd75a8f6474d6390614f43dd6ed5efc2
2019-05-10 11:55:15 +05:30
qctecmdr
56ec9c4e76
Merge "sepolicy: Added hal_perf_hwservice permisions"
2019-05-09 11:52:26 -07:00
qctecmdr
f8546824b2
Merge "sepolicy: Define security context for "ro.build.software.version""
2019-05-09 10:01:31 -07:00
qctecmdr
bd80cd6bfa
Merge "sepolicy : addressed dumpstate related denials."
2019-05-09 08:15:09 -07:00
qctecmdr
65d2e95aab
Merge "sepolicy: Add sepolicy for hal_memtrack to read sysfs_kgsl_proc"
2019-05-09 05:50:26 -07:00
Devi Sandeep Endluri V V
ec15b57f88
sepolicy: Define security context for "ro.build.software.version"
...
All vendor init process would have access to vendor_default_prop.
Define security context for "ro.build.software.version" as
vendor_default_prop.
Change-Id: I5b1f1698dcbb3d914a66c540f31f7624c707a72e
2019-05-09 04:12:47 -07:00
qctecmdr
a608767889
Merge "sepolicy: Declared FastCV libs as sp-hal"
2019-05-09 04:01:18 -07:00
qctecmdr
2906183b07
Merge "sepolicy: Declaring opencl.so as sp-hal for all the targets."
2019-05-09 02:10:34 -07:00
qctecmdr
58bd346722
Merge "sepolicy: Add rule for imsrcsd to communicate with radio"
2019-05-09 00:25:19 -07:00
qctecmdr
7e71c0fd5c
Merge "sepolicy: Add policy for USB HAL"
2019-05-08 22:30:10 -07:00
qctecmdr
9d00341c38
Merge "qva: Add sepolicy support for wifilearner service and IWifiStats HAL."
2019-05-08 16:51:58 -07:00
kranthi
abea04783c
sepolicy: Add sepolicy for hal_memtrack to read sysfs_kgsl_proc
...
Add sepolicy for hal_memtrack_default to read kgsl memory.
avc: denied { read } for comm="memtrack@1.0-se"
name="gpumem_mapped"dev="sysfs" ino=82422
scontext=u:r:hal_memtrack_default:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0.
CRs-Fixed: 2421195
Change-Id: I254df836754b5ebc09f44f7053edf85867a963a5
2019-05-08 15:22:59 +05:30
Richa Agarwal
7d6fb60768
sepolicy: Added hal_perf_hwservice permisions
...
Added hal_perf_hwservice permisions for
qtidataservices_app.te file
Change-Id: Ib480a503c1652e0650bda4aff07085ff894178d6
2019-05-08 14:02:21 +05:30
Pavan Kumar M
58d519cbcc
Add permission to set/get persist.vendor.net.doxlat
...
- Add permission for rild to set and get the property
persist.vendor.net.doxlat
- Revoke set_prop permission to system_server.
- Define domain for DataConnection HAL
Change-Id: I143bfffa8af61d087d8210516c57a211e25f0a1d
CRs-Fixed: 2425156
2019-05-07 21:06:28 -07:00
Veerendranath Jakkam
d64f108c0e
qva: Add sepolicy support for wifilearner service and IWifiStats HAL.
...
This commit defines required seploicy rules for wifilearner service
and IWifiStats HAL.
CRs-Fixed: 2444187
Change-Id: I42d84567f253b42b42ce27138cb25df89246c604
2019-05-07 21:28:25 +05:30
Linux Build Service Account
9ed0709c28
Merge 68595637d5 on remote branch
...
Change-Id: I4a095dda600e696f0afc360008f0cd8ae802fc04
2019-05-07 05:57:21 -07:00
Suman Voora
50a3807ca7
sepolicy: Declared FastCV libs as sp-hal
...
Updated the permissions for cvp,scve hals
Needed CV libs to be accessed by the apks.
Change-Id: Ic65a1e4bd75d4d978200fe62e23ddc354a7e83f2
2019-05-07 16:08:39 +05:30
Ravi Kumar Siddojigari
432d4af4c9
sepolicy : addressed dumpstate related denials.
...
As part of CTS testing its expected no denails should be seen
from dumpstate domain during testing so addressing generic
permission issue.
test :testNoBugreportDenials
Change-Id: I27178e6b4180d53cd5f6574bf71fe54819b10454
2019-05-07 00:37:11 -07:00
qctecmdr
518a386347
Merge "sepolicy: Add required sepolicy for vulkan.adreno.so"
2019-05-06 11:25:08 -07:00
Linux Build Service Account
56e314bc8c
Merge 3233102de8 on remote branch
...
Change-Id: Ib7472326dfe87f035270d895e1cb1d419e6af0fb
2019-05-06 11:17:13 -07:00
qctecmdr
e46c882b62
Merge "sepolicy: remove violators which are not to be used"
2019-05-06 03:50:36 -07:00
qctecmdr
c6c1f9df62
Merge "sepolicy: Add wakelock capability for rcsservice"
2019-05-05 21:57:18 -07:00
qctecmdr
fb28767493
Merge "sepolicy :: Adding PanoramaTracking interface in hwservice"
2019-05-05 21:56:18 -07:00
qctecmdr
38ceae6f6b
Merge "sepolicy: Add policy to allow access to rmnet_mhi0 RPS entry"
2019-05-05 21:55:16 -07:00
qctecmdr
eba70922ee
Merge "sepolicy: GPU permission for halcamera"
2019-05-05 21:54:19 -07:00
qctecmdr
e36a6e565c
Merge "sepolicy: add permission for charger"
2019-05-05 21:48:28 -07:00
qctecmdr
b461848bbe
Merge "sepolicy: Allow the write access to persist property"
2019-05-05 21:47:17 -07:00
qctecmdr
6cc069c44c
Merge "Allow vendor_init to set disable_spu property"
2019-05-05 21:46:19 -07:00
qctecmdr
6f9f6654cf
Merge "sepolicy: Add sepolicy rules for qg device"
2019-05-05 21:45:12 -07:00
qctecmdr
5bc74aa235
Merge "Adding sepolicy rules to qva folder"
2019-05-05 21:44:28 -07:00
qctecmdr
a82887e992
Merge "sepolicy: Add interface entry for WFD HAL"
2019-05-05 21:42:15 -07:00
qctecmdr
ec7072156a
Merge "sepolicy: allow mediacodec to access audio devices"
2019-05-04 21:04:12 -07:00
Rama Krishna Nunna
bc8a16ed8b
Camera: Add permission to access camera library for passthrough hidl
...
- Gralloc needs to access Camera library
- Adding necessary permissions
Change-Id: Id1d1740dd10fcc4ca393f909348297ac13beba39
2019-05-03 16:25:45 -07:00
Devi Sandeep Endluri V V
e8c9a38c08
sepolicy: Add rule for imsrcsd to communicate with radio
...
Change-Id: I6d1c45b5d92347957b4f2813e267dda5049c4d9d
2019-05-03 03:01:08 -07:00
qctecmdr
68595637d5
Merge "sepolicy : Permit system_server to read vendor display properties"
2019-05-03 01:13:39 -07:00
Sumit LNU
bfb6285e8a
sepolicy :: Adding PanoramaTracking interface in hwservice
...
Failure VtsTrebleVendorVintfTest tests failed as
vendor.qti.hardware.scve.panorama@1.0::IPanoramaTracking
not available
Change-Id: I6c64ab6ce120c45d43479ab663c11f7650d35f05
2019-05-03 11:09:28 +05:30
Jack Pham
f9bd0b096a
sepolicy: Add policy for USB HAL
...
Add rules for hal_usb_qti service, which is part of hal_usb
and hal_usb_gadget domains defined by system policy. Grant
access to needed properties and files.
Change-Id: I1e03ad1e63f5c70788f04e52833f6d09cc76eca8
2019-05-02 11:17:41 -07:00
Ravi Kumar Siddojigari
a26eb5586a
sepolicy: remove violators which are not to be used
...
As part of security hardening following violators are
been removed
1. untrusted_app_visible_hwservice_violators
2. data_between_core_and_vendor_violators
Security testing check for violators sharing data between core and
vendor so removed the violator exception in vendor_init.
hwservice are not to be exposed to untrusted app so remove hal_perf
for this list untrusted_app_visible_hwservice_violators list
Test:
testNoExemptionsForDataBetweenCoreAndVendor
testNoUntrustedAppVisiblehwservice
Change-Id: I76f26848a0f148b1b332f68fd05f7632f9399af6
2019-05-02 16:46:14 +05:30
Jaihind Yadav
5955fb1335
sepolicy : remove sysfs_net related entries which are duplicate
...
Following paths on sysfs are now labeled in system side
file_contexts so removing the duplicate entries from
vendor side genfs_contexts .
/module/tcp_cubic/parameters
/devices/virtual/net
Change-Id: I4c872ca3e14da9a73b1adbfd9671c3df1a0046c8
2019-05-02 14:39:44 +05:30
Barani Muthukumaran
99a68bb7fe
Allow vendor_init to set disable_spu property
...
vendor.gatekeeper.disable_spu is added to /vendor/build.prop,
allowing vendor_init to set this property to ensure the
property can be read by gatekeeper and through getprop
Change-Id: Icb9362e330573eec9d96f5bb8d5bb0aeae1f8b76
2019-05-01 17:23:01 -07:00
Subbaraman Narayanamurthy
060ac51eda
sepolicy: add permission for charger
...
Add the necessary permission for charger binary to support offmode
charging.
Change-Id: I6b173c07e221b50b51f3381f8d0b490535ae73ae
2019-05-01 15:37:18 -07:00
Kiran Gunda
28b52b4bc4
sepolicy: Allow the write access to persist property
...
Add the set_prop for the hvdcp_opti to have a write access to the
persist property.
Change-Id: Id15a2529faa74e2fc96cec9a9d02d2dd84145d34
Signed-off-by: Kiran Gunda <kgunda@codeaurora.org >
2019-05-01 06:28:38 -07:00
Subash Abhinov Kasiviswanathan
78217eca78
sepolicy: Add policy to allow access to rmnet_mhi0 RPS entry
...
This is needed to set the receive packet steering entry.
Fixes the following denial -
avc: denied { read write } for comm="netmgrd" name="rps_cpus"
dev="sysfs" ino=79460 scontext=u:r:netmgrd:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
CRs-fixed: 2425568
Change-Id: Idc94fbef7ed922a6d2376fd82bdb6cb45ff0d536
2019-04-30 16:23:20 -06:00
Ramjee Singh
5bd9b9abe0
sepolicy: allow mediacodec to access audio devices
...
Mediacodec needs to access audio devices to use OMX HW decoders and
encoders. Allow mediacodec to access audio devices.
Change-Id: I6706f989d8e90607bd3134a88268322451122b15
2019-04-30 05:11:50 -07:00
Mathew Joseph Karimpanal
b32d150dc9
sepolicy : Permit system_server to read vendor display properties
...
Permit system_server to read vendor.display.xxx properties.
Change-Id: I4fb74c2edabd6203304b256bb87cb84517dcad58
CRs-fixed: 2444569
2019-04-30 17:29:19 +05:30
Indranil
f3baa43a0d
sepolicy: Add interface entry for WFD HAL
...
Change-Id: I3c52c6f7c5de4ea2d324012ce08bbe9a0c2d6d84
2019-04-29 19:13:29 +05:30
Sauhard Pande
53433c8f19
sepolicy: GPU permission for halcamera
...
Change-Id: I3a20638f7f6b054561c4b25f4eb49f9a4cad05cf
2019-04-29 05:50:35 -07:00
Richa Agarwal
2a87915b13
Adding sepolicy rules to qva folder
...
Added label 'u:object_r:sysfs_devfreq:s0'
to gpubw node and 'u:object_r:lm_data_file:s0'
to LM path in file_context for qva and added
mlstrustedsubject for hal_perf_default
Change-Id: I5c035c5fcce7cb29113f377c436e38844e52feab
2019-04-29 14:26:29 +05:30
Jun Wang
2e4ab590b4
sepolicy: Add needed sysfs rule for spdaemon in msmnile
...
Change-Id: I986a668cf15877f3817ade1acd249ce24c4352f6
CRs-Fixed: 2435032
2019-04-28 02:58:20 -07:00
Abhinay Reddy Vanipally
8bcbbab4df
Merge commit 'ae588b7cb8825011c673ef88e219de2f6a5c850a' into HEAD
...
Change-Id: Iae1cfa9a0d2c3a96da21f28fd42fa894c984b274
2019-04-26 15:48:34 -07:00
Eric Chang
8cb4145a73
sepolicy: Add wakelock capability for rcsservice
...
Change-Id: If842405cbbb8fba6d2b6d4d471f00d1b02320cfe
2019-04-26 14:48:07 -07:00
Harshdeep Dhatt
7c60ce7a95
sepolicy: Add required sepolicy for vulkan.adreno.so
...
CRs-Fixed: 2442489
Change-Id: I9ab11f0ae7df7f03cdb6cc2a8709d7a090299237
2019-04-26 14:39:51 -06:00
qctecmdr
3233102de8
Merge "Sepolicy: Update sepolicy ops listener"
2019-04-26 10:40:04 -07:00
Ravi Kumar Siddojigari
81835b7c6c
sepolicy : remove sysfs_net related entries which are duplicate
...
Following paths on sysfs are now labeled in system side
file_contexts so removing the duplicate entries from
vendor side genfs_contexts .
/module/tcp_cubic/parameters
/devices/virtual/net
Change-Id: I92336f6c991d6a9e9a51246082c5940b8d6ebaae
2019-04-26 02:20:20 -07:00
qctecmdr
8f5a2321d7
Merge "Remove permission to read hosts file"
2019-04-25 21:21:11 -07:00
qctecmdr
866dc7ca9d
Merge "Sepolicy: Added rule to support ODL for ADPL"
2019-04-25 18:31:08 -07:00
qctecmdr
df0f58b163
Merge "sepolicy: Add needed sysfs rule for spdaemon in msmnile"
2019-04-25 15:05:08 -07:00
qctecmdr
b10326c413
Merge "sepolicy: add spdaemon access to HAL telephony"
2019-04-25 11:02:17 -07:00
qctecmdr
518f0034fa
Merge "sepolicy: Remove gralloc.qcom from SP HALs."
2019-04-24 06:55:21 -07:00
Konstantin Dorfman
ba1c8bebda
sepolicy: add spdaemon access to HAL telephony
...
On targets where there is no direct link between Modem and Secure
Processor, spdaemon calls UIM REMOTE telephony HAL in order to register
as UIM REMOTE client. This is needed as part of FR49517 for making
spdaemon a bridge for MPSS to iUICC (on SPSS) communication.
Change-Id: Id4ff9555beed678286806b1054d017b62b479391
2019-04-23 15:08:21 +03:00
Aman Gupta
04bdbfe277
Sepolicy: Added rule to support ODL for ADPL
...
Added a file context for odl_ipa_ctl/ipa_adpl char device
Change-Id: Ia135f4fed4bf438084bf4101d5dc24560c741028
2019-04-22 10:51:27 -07:00
qctecmdr
ae588b7cb8
Merge "sepolicy : bringup changes for lito"
2019-04-22 03:41:48 -07:00
Ravi Kumar Siddojigari
5036be09ea
sepolicy : bringup changes for lito
...
bringup changes for lito.
Tested for build and boot tested .
Change-Id: I2a4731ba69aa673695af00d5bb698c4391cb1d47
2019-04-22 00:11:38 -07:00
Tirupathi Reddy
46320b773d
sepolicy : correct AndroidNN binary details
...
Change-Id: I4b565ce9b28fe7e83cd6b678616490e7ec351272
2019-04-21 23:10:43 -07:00
qctecmdr
6ad0a132ae
Merge "[sepolicy] Add WIGIG device entry to genfs_contexts"
2019-04-20 05:40:52 -07:00
qctecmdr
0df6b406a8
Merge "Sepolicy: Added rules for QTI HANA55 MHI node access"
2019-04-20 02:29:58 -07:00
qctecmdr
0a40db544d
Merge "sepolicy: update access policy for charger script"
2019-04-19 23:29:04 -07:00
qctecmdr
8035dd6f20
Merge "dpm : add ability to send signal to child process"
2019-04-19 14:41:07 -07:00
qctecmdr
69a4638778
Merge "msmnile: Port recovery domain rules."
2019-04-19 11:46:08 -07:00
Phalguni
43411c2675
Sepolicy: Update sepolicy ops listener
...
Add read and write permissions for graphics device
CRs-Fixed: 2438059
Change-Id: Ide4f6c936512956f68a2de1e672c28a9d3f4435b
2019-04-19 10:44:48 -07:00
Tapas Dey
f655e8ebfb
sepolicy: Fix NFC avc denial issue
...
Add rule to allow NFC to access runtime data file and fix below
denial:
com.android.nfc: type=1400 audit(0.0:1125): avc: denied { write }
for comm=4173796E635461736B202331 name="nfc" dev="sda8" ino=475137
scontext=u:r:nfc:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
permissive=0
Change-Id: I977931c1918035ad46ccc5240a03463e4d9edb56
2019-04-19 11:44:09 +05:30
qctecmdr
38f1871b9d
Merge "sepolicy: kona: Fix parallel charger path"
2019-04-18 04:46:29 -07:00
padarshr
a227a6a469
msmnile: Port recovery domain rules.
...
Add recovery process's needed sepolicies that were
missing in generic folder, to grant accesses (for
various things like sdcard mount/read etc).
Change-Id: Id2fe77d41a0b0395c66a218e275b1a0b45aec593
2019-04-18 03:33:32 -07:00
Jun Wang
f4839bf3b6
sepolicy: Add needed sysfs rule for spdaemon in msmnile
...
Change-Id: I986a668cf15877f3817ade1acd249ce24c4352f6
CRs-Fixed: 2435032
2019-04-18 17:42:00 +08:00
qctecmdr
b4bad736b6
Merge "sepolicy: Policy fix for CND SSR"
2019-04-18 01:40:06 -07:00
Kavya Nunna
a841ea3704
sepolicy: Add sepolicy rules for qg device
...
Userspace needs to access qg device add sepolicy rules
for the same.
Change-Id: Iea24a6539c0b0146e041bfcc1dc301a5f5b40f71
2019-04-18 11:57:17 +05:30
qctecmdr
75ca001e60
Merge "sepolicy: Policy fix for emmc based rpmb partition"
2019-04-17 15:10:35 -07:00
Tyler Wear
da8f3bb6a4
sepolicy: Policy fix for CND SSR
...
Add sepolicy rule to alow cnd process to perform
directory read on the SYSFS for SSR.
Change-Id: I5d8093b6d01584bcdbd0526f7335d7fcc601a4e5
2019-04-17 14:31:55 -07:00
Aman Gupta
c2e74e6de7
Sepolicy: Added rules for QTI HANA55 MHI node access
...
MHI node name retrival access policy rules
Change-Id: I513732f0c85db0c9a56920fad9f4331bd41e6f52
2019-04-17 13:40:50 -07:00
qctecmdr
e5544a4709
Merge "sepolicy: add sepolicy support for btconfigstore"
2019-04-17 11:10:31 -07:00
qctecmdr
8bbaa5353d
Merge "sepolicy: Label new a2dp service as audio hw service"
2019-04-17 10:53:19 -07:00
qctecmdr
4c7f130826
Merge "QDMA sepolicy: removing read_logd permission for qdmastats"
2019-04-17 10:50:51 -07:00
Linux Build Service Account
34ca4f3904
Merge "sepolicy: Cleanup legacy redefinitions from wfd" into sepolicy.lnx.5.9.r1-rel
2019-04-17 07:10:23 -07:00
Linux Build Service Account
123545393e
Merge "sepolicy: Change policy for wfd on legacy targets" into sepolicy.lnx.5.9.r1-rel
2019-04-17 07:10:21 -07:00
Anuj Jalota
cedf94bb8c
sepolicy: Declaring opencl.so as sp-hal for all the targets.
...
Change-Id: I57b831db4da8e62971e2b3961bbb181c70b57353
2019-04-17 17:52:16 +05:30
Srinu Jella
5ef06bbb32
sepolicy: Label new a2dp service as audio hw service
...
- Label the new a2dp HAL service as Audio he service
so that Audio HAL process can load it and bluetooth
host process can interact with new service.
Change-Id: If7a4c5f9dcf33edbef5647107cae4cfdf847c63f
2019-04-17 16:29:11 +05:30
Manu Prasad
c3e98d3566
sepolicy: Cleanup legacy redefinitions from wfd
...
Change-Id: If0f1a2d61d86b507cc6ab94fc0f961bed645cc91
2019-04-17 03:16:20 -07:00
Manu Prasad
9ba7b3a9ac
sepolicy: Change policy for wfd on legacy targets
...
WFD requires revision in its SEAndroid policies due
to an OS upgrade and design re-architecture to conform
to system-wide mandates.
Change-Id: I5a9adc280cefab73d8c467379b74951fc3a88e71
2019-04-17 03:16:08 -07:00
Ramandeep Trehan
8341826c28
sepolicy: Policy fix for eMMC based rpmb partition
...
Add sepolicy rules to allow qseecom daemon process
to perform ioctl calls to rpmb partition in case of
eMMC based targets.
Change-Id: I1993a0cdf54dc949172afae8c095b4e253355e1c
2019-04-17 03:01:18 -07:00
Ramakant Singh
bd4ac11e91
sepolicy: Remove gralloc.qcom from SP HALs.
...
Change-Id: I31fed11610325293527928e54d82084a62b86343
2019-04-17 01:03:33 -07:00
Devi Sandeep Endluri V V
6204222d2f
dpm : add ability to send signal to child process
...
-dpm need access to send signal to child process
while installing iptable rules with specific timeout.
CRs-Fixed: 2354745
Change-Id: I072f0a2d99dc5563b56815c25c6b7edb2e764175
2019-04-16 22:50:28 -07:00
Anmolpreet Kaur
f0ab1bd034
sepolicy: Policy fix for emmc based rpmb partition
...
Latest sepolicy rules in android Q enforce ioctl
restrictions on blk_file. This change adds sepolicy
rules to allow qseecom daemon process to perform ioctl
calls to rpmb partition in case of emmc based targets.
Change-Id: I884dbe35b5233eac195cfcfdaa73b359b671955d
Signed-off-by: Anmolpreet Kaur <anmolpre@codeaurora.org >
2019-04-16 21:52:06 -07:00
Nitin Shivpure
82ee6af929
sepolicy: add sepolicy support for btconfigstore
...
- Add separate hal_btconfigstore_hwservice
- Initialize server and client for hal_btconfigstore.
- Make system_app to be a client of hal_btconfigstore for FM.
- Make Bluetooth to be a client of hal_btconfigstore.
Change-Id: I680bcdb79836fbba22140f9e4bcfadeb7a70ed59
2019-04-16 21:40:17 -07:00
qctecmdr
e177d2f636
Merge "sepolicy: Policy fix for eMMC based rpmb partition"
2019-04-16 07:38:41 -07:00
qctecmdr
ef859b2d53
Merge "sepolicy: camera: add camera prop access permission"
2019-04-16 07:38:41 -07:00
qctecmdr
1c81b5fef4
Merge "wfd: Allow wfd processes to read video properties"
2019-04-16 07:38:27 -07:00
qctecmdr
844afc639a
Merge "sepolicy: allow system_app to interact with soter hal"
2019-04-16 03:24:00 -07:00
qctecmdr
49df0132e3
Merge "sepolicy: allow mediacodec to access audio devices"
2019-04-16 03:23:02 -07:00
qctecmdr
b6d1d58154
Merge "wfd: Add polices for dumping of debug data"
2019-04-16 03:10:33 -07:00
qctecmdr
d605348b04
Merge "Adding perf hal permissions to iop hal"
2019-04-15 22:58:59 -07:00
Linux Build Service Account
b29ced6621
Merge "Revert "sepolicy: Add gralloc.qcom to SP HALs""
2019-04-15 14:38:40 -07:00
Vara Prasad A V S G
a5979272df
Revert "sepolicy: Add gralloc.qcom to SP HALs"
...
This reverts commit e24e97f45d .
Change-Id: I079652093d98399bb365e338478ce6541c3e0971
2019-04-16 02:52:39 +05:30
Banajit Goswami
854b070029
sepolicy: allow mediacodec to access audio devices
...
Mediacodec needs to access audio devices to use OMX HW decoders and
encoders. Allow mediacodec to access audio devices.
Change-Id: I791776848b1d42ff1bc13a445c03197d71e3bba4
2019-04-15 13:25:20 -07:00
Subbaraman Narayanamurthy
b4e06efc2b
sepolicy: update access policy for charger script
...
Currently qti_init_shell label is applied for init.qti.charger.sh
however the script filename is changed to init.qti.chg_policy.sh
under charger_monitor project. Hence update access policy for
init.qti.chg_policy.sh and move them to qva/vendor/common along
with "hvdcp_opti" which seems to be the proper place.
Change-Id: I86ec11c12593a76069fbdcf5ed41cc05359938ad
2019-04-15 12:22:01 -07:00
Subbaraman Narayanamurthy
a91ce136d1
sepolicy: kona: Fix parallel charger path
...
Fix the device path for smb1355 parallel charger that can be used
on kona platforms.
Change-Id: I0d05cbe1239eeba5d0bd38f5cb204b68536ead3f
2019-04-15 12:12:36 -07:00
Linux Build Service Account
b6674c1097
Merge 804a52018e on remote branch
...
Change-Id: Ic27963872c49acc1e366c1d800b0cb831799af3e
2019-04-15 06:47:37 -07:00
jkalsi
b20d9cf73e
QDMA sepolicy: removing read_logd permission for qdmastats
...
Change-Id: Ic699c3af4bc806dfffe811eb9f126affb7ecf16b
2019-04-15 12:17:10 +05:30
Ramandeep Trehan
f7ab3e2a01
sepolicy: Policy fix for eMMC based rpmb partition
...
Add sepolicy rules to allow qseecom daemon process
to perform ioctl calls to rpmb partition in case of
eMMC based targets.
Change-Id: I1993a0cdf54dc949172afae8c095b4e253355e1c
2019-04-15 11:40:54 +05:30
qctecmdr
9d8decb80a
Merge "Add rules for PPTP/L2TP VPN connection success"
2019-04-12 07:00:20 -07:00
Sauhard Pande
63146a889c
sepolicy: camera: add camera prop access permission
...
Change-Id: I76102dec03f38426c41654c1dcac8316fc992798
2019-04-12 05:07:07 -07:00
qctecmdr
61d16198a6
Merge "Sepolicy: Add power off alarm rules"
2019-04-12 03:55:16 -07:00
ziqichen
ebe00485e2
sepolicy: allow system_app to interact with soter hal
...
add policies for soter to adapt to Android Q
Change-Id: I1c5079f2f2dfd7d937bbe35b9f9ae73bf9d2f1a7
2019-04-12 16:29:17 +08:00
qctecmdr
a946e1c166
Merge "sepolicy: Adding sepolicy for lmkd."
2019-04-12 01:05:13 -07:00
qctecmdr
6a2a57493b
Merge "sepolicy: Add policies for soter"
2019-04-11 22:06:34 -07:00
Chalapathi Bathala
5e1f14729e
[sepolicy] Add WIGIG device entry to genfs_contexts
...
[sepolicy] Add WIGIG device entry to genfs_contexts
Change-Id: I56e2eeeb9739e607bfbc33fcc06c96c3efd6084a
2019-04-11 18:40:43 -07:00
Lubin Yin
b238111218
sepolicy: Added ion permission for MLS screen capture
...
Change-Id: I735ad041cf52dd72f90a64e4c43223e0cce1a4e2
2019-04-11 13:25:26 -07:00
qctecmdr
18d948e94e
Merge "SEPOLICY: Add vendor_adsprpc_prop property"
2019-04-11 04:50:55 -07:00
ziqichen
7972a74474
sepolicy: Add policies for soter
...
1. Allow access to tee device
2. Allow access to load firmware images
3. Allow access to interract with ion_device
Change-Id: Ibedc9b5e4eef94dc737f21a85cc7a974dab3d8aa
2019-04-11 17:26:09 +08:00
qctecmdr
aca7245cf7
Merge "sepolicy : Removed netadmin capability for location"
2019-04-11 01:10:08 -07:00
qctecmdr
edd0f7d44b
Merge "sepolicy : Added wifihal sock perms and allow clients to connect"
2019-04-10 22:20:29 -07:00
qctecmdr
2c586da413
Merge "sepolicy: Added socket perms to location to connect to wpa ctrl socket"
2019-04-10 16:54:16 -07:00
qctecmdr
13f06ea405
Merge "sepolicy: Cleanup legacy redefinitions from wfd"
2019-04-10 11:37:44 -07:00
qctecmdr
9aa1426883
Merge "sepolicy: Change policy for wfd on legacy targets"
2019-04-10 11:37:44 -07:00
qctecmdr
930915e763
Merge "sepolicy: Add access policy for hvdcp_opti properties"
2019-04-10 08:29:32 -07:00
qctecmdr
57e979f818
Merge "Initial Sepolicy definition for lito"
2019-04-10 05:20:45 -07:00
Indranil
cf2a5ffa10
wfd: Allow wfd processes to read video properties
...
With separation of video properties into system/vendor buckets,
WFD needs to amend the rules accordingly.
Change-Id: I5570ac3045b5f6c11afe9765192d7a2bc4bb5e1f
2019-04-10 04:45:32 -07:00
Indranil
a2c91d7ca0
wfd: Add rules for access to OSAL debug framework
...
With migration of code on WFD source from system to vendor and
to system_app for WFD sink, add rules for access to OSAL logmask
file and OSAL debug properties(to allow for parser log debugging).
Change-Id: I209685d4336f0466421f286ecc50d81c1d9b9aa1
2019-04-10 04:44:55 -07:00
Indranil
cc9337be71
wfd: Add polices for dumping of debug data
...
Rules need to be added for dumping since WFD spans across
both system/vendor context post-QSSI re-architecture.
Change-Id: I11b0410af67eb2127d4d04e009ff8dbea81f2058
2019-04-10 04:44:16 -07:00
Vara Prasad A V S G
179e60432d
Merge commit '5338a3c972b538f4fd47a85cafb636c5a0b2089f' into HEAD
...
Conflicts:
generic/vendor/common/file.te
qva/vendor/common/system_app.te
Change-Id: I010a47eda83c35fe3e6ef6cf35d7b8fe06afb354
2019-04-10 16:39:50 +05:30
Vinay Gannevaram
606163f5ea
sepolicy : Removed netadmin capability for location
...
Removed net admin capabilites for lowi. From now nl msgs of lowi
would route to wifihal via control socket.
Wifi hal allows its authenticated clients to send nl msgs to it.
Lowi module is one of its clients and hence added socket permissions
to access wifihal control interface
CRs-Fixed: 2424268
Change-Id: I18aba9169b23e8b0c9260cbf1e7a52bf59e0030d
2019-04-10 03:01:51 -07:00
Vinay Gannevaram
1eaea11a3c
sepolicy : Added wifihal sock perms and allow clients to connect
...
Added wifihal directory in /dev/sockets path.
Wifi hal allows its authenticated clients to send nl msgs to it.
Lowi module is one of its clients and hence added socket permissions
to access wifihal control interface.
CRs-Fixed: 2424252
Change-Id: I9aa7b54f2f944d59148508eace3c658a23e5d2d8
2019-04-10 03:01:01 -07:00
qctecmdr
5db8ade2e8
Merge "QTI: cleanup of selinux denials for QTI"
2019-04-10 02:19:27 -07:00
Tharun Kumar Merugu
e0c312a1ff
SEPOLICY: Add vendor_adsprpc_prop property
...
Add vendor_adsprpc_prop property to support the OS-upgrade.
Change-Id: Ie68d96a5e871b1fcc9920c24a393b60d6eb602f3
2019-04-09 18:19:55 +05:30
richagar
294b8479ae
Adding perf hal permissions to iop hal
...
Added hal_client_domain(hal_iop_default, hal_perf)
to hal_iop_default.te
Change-Id: I5266702086a2d8b40eb91ca5c487cce9893bd312
2019-04-09 17:51:01 +05:30
Vinay Gannevaram
9b3711ccdc
sepolicy: Added socket perms to location to connect to wpa ctrl socket
...
Lowi interacts with wpa supplicant for scan and anqp query via ctrl
communication. As the wpa control socket is in /data/vendor/ path
the required sepolicy changes are needed for location module
CRs-Fixed: 2431133
Change-Id: Icaef72229bc028c446c8d60c0b471de9583c63ae
2019-04-09 04:25:59 -07:00
richagar
16da6b2ff8
sepolicy: Adding sepolicy for lmkd.
...
Added lmkd.te and hwservicemanager.te
Change-Id: Ie63202497c3542d6b534aa654db22e3c71427c4c
2019-04-09 16:54:04 +05:30
Veerubhotla Hari
ecd1a1ca99
Initial Sepolicy definition for lito
...
Change-Id: I23d6aac0ecdede3d611e2803c53d940412d4e232
2019-04-09 01:30:37 -07:00
Manu Prasad
241f3766f0
sepolicy: Cleanup legacy redefinitions from wfd
...
Change-Id: If0f1a2d61d86b507cc6ab94fc0f961bed645cc91
2019-04-09 00:27:03 -07:00
Manu Prasad
3089da6c10
sepolicy: Change policy for wfd on legacy targets
...
WFD requires revision in its SEAndroid policies due
to an OS upgrade and design re-architecture to conform
to system-wide mandates.
Change-Id: I5a9adc280cefab73d8c467379b74951fc3a88e71
2019-04-09 00:26:54 -07:00
Qimeng Pan
322dbb03e5
Sepolicy: Add power off alarm rules
...
Add power off alarm rules to access share preference in add data.
Change-Id: I972bc5a83f0e68c289c7defbcf7e2b7318eaa8e4
CRs-Fixed: 2430367
2019-04-09 13:57:45 +08:00
qctecmdr
804a52018e
Merge "sepolicy: Label new a2dp service as audio hw service"
2019-04-08 13:24:01 -07:00
Aman Gupta
651460474b
QTI: cleanup of selinux denials for QTI
...
cleanup of selinux denials for QTI
Change-Id: I59220452e9caae01bdb6bce4873defa3f36ea20f
2019-04-08 03:30:13 -07:00
Fenglin Wu
25eb1099d3
sepolicy: Add access policy for hvdcp_opti properties
...
Add selinux policy for applications to access hvdcp_opti persist
properties.
Change-Id: I361db072b1c3969557589f90335435242591bb85
2019-04-08 10:24:08 +08:00
Devi Sandeep Endluri V V
6da7a4e87c
Add rules for PPTP/L2TP VPN connection success
...
In newer kernels (4.14 and above), new context pppox_socket
is defined for PPPOX sockets. For successful VPN connection,
need the corresponding pppox_socket specific rules for ppp
and mtp daemons
CRs-Fixed: 2412475
Change-Id: I3488dabcc464b81a1e1109489b5aeb7530102997
2019-04-05 23:04:11 +05:30
qctecmdr
aa1e0ce51f
Merge "Label the scsi_generic sysfs node and give it's read access to bootctl."
2019-04-04 23:36:07 -07:00
qctecmdr
a5e932e911
Merge "NETMGR: Allow netmgr to invoke rmnet modules"
2019-04-04 14:52:08 -07:00
Subash Abhinov Kasiviswanathan
3ee6f4a8c6
NETMGR: Allow netmgr to invoke rmnet modules
...
Netmgr writes to rmnet perf module parameters to control
the data path. Add policies to fix the following denials -
[ 44.473586] selinux: avc: denied { set } for
property=persist.vendor.data.perf_ko_load pid=1346 uid=1001 gid=1001
scontext=u:r:netmgrd:s0 tcontext=u:object_r:vendor_default_prop:s0
tclass=property_service permissive=0\x0a
[ 743.943376] type=1400 audit(1551998622.899:40940): avc: denied
{ read write } for comm="netmgrd" name="rmnet_perf_opt_mode"
dev="sysfs" ino=77174 scontext=u:r:netmgrd:s0
tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
CRs-fixed: 2425568
Change-Id: Id24e36ff6dc25bb8c38230a147c0cce8f81a5012
2019-04-04 13:56:00 -07:00
Harikrishnan Hariharan
649897bd9f
Fix sepolicy denial for location apps
...
Fix sepolicy denial for location apps for open permission
required for file object with cgroup target context. Use
rw_file_perms permission macro.
Change-Id: I9a3f6a1a7ad77fb0ba4177771d3be84e6636f53d
CRs-Fixed: 2429612
2019-04-04 08:33:30 -07:00
padarshr
1efa2458e3
Label the scsi_generic sysfs node and give it's read access to bootctl.
...
Bootctl needs read access to scsi_generic node to lookup what
/dev/sgN device corresponds to the XBL partitions.
Label it and give read access to bootctl.
Change-Id: I91d54ba05dd3d5fe34296e3911537ed57e51a067
2019-04-04 05:22:29 -07:00
qctecmdr
8698210f33
Merge "sepolicy: Adding rules for WFD sink hdcp"
2019-04-04 03:57:23 -07:00
qctecmdr
5a46c7d597
Merge "sepolicy: update sepolicy for mediacodec"
2019-04-04 00:51:02 -07:00
qctecmdr
ad64c58cab
Merge "Allow system_server to access /sys/kernel/debug/binder/state"
2019-04-03 21:47:42 -07:00
qctecmdr
6e5e970f33
Merge "Sepolicy: Update sepolicy ops listener"
2019-04-03 15:55:59 -07:00
qctecmdr
caa60455fe
Merge "sepolicy: wigig fixes"
2019-04-03 12:46:16 -07:00
qctecmdr
8be1ddb977
Merge "sepolicy: add wigig and FST rules"
2019-04-03 07:56:05 -07:00
qctecmdr
0ea5678b0f
Merge "sepolicy: /sys/kernel/debug/ access for hal_graphics_composer"
2019-04-03 04:49:16 -07:00
Rajathi S
8e37fd67f0
sepolicy: update sepolicy for mediacodec
...
Update permissions for mediacodec to enable communication
with dsp
CRs-Fixed: 2425233
Change-Id: I5f1ef7c1e420de267e8c4005867e7b1b45978c53
2019-04-03 15:10:42 +05:30
Lior David
16e0b7a2c6
sepolicy: wigig fixes
...
1. Add rules for accessing the capability config store.
It will be used instead of vendor properties that pass
information between system and vendor contexts.
2. Add rule to hal_wifi_supplicant for creating sockets,
fixes this error:
avc: denied { create } for comm="wpa_supplicant" scontext=u:r:hal_wifi_supplicant_default:s0 tcontext=u:r:hal_wifi_supplicant_default:s0 tclass=qipcrtr_socket permissive=0
Change-Id: I735bdc1fc1942cdf03b1dad416a81d1ec91ac44f
2019-04-03 01:43:17 +03:00
Lior David
ae8b742840
sepolicy: add wigig and FST rules
...
This is a cumulative patch which adds rules needed
for wigig and FST, including cleanup of rules that
are no longer needed, and adjustments for new sepolicy
restrictions.
Based on these changes:
1) sepolicy: Add policies for FST manager service
Add SE policies for FST Manager daemon required for
fast-session-transfer feature.
Change-Id: I3750d298c33e9f70e51545a678502b6d7dd0b0e6
2) sepolicy: allow fstman write permissions to wifi directory
FST Manager needs write permissions to wifi directory for supporting
whitelist of rate upgrate interface (wlan1)
Change-Id: I564e7da6118e17f7487242c55b0373dab8d12578
3) sepolicy: support wigig services
For managing the wigig network, define wigig services as
system service and allow access to wpa_wigig0 control socket.
wigig supplicant creates sockets under /data/misc/wifi/wigig_sockets.
CRs-Fixed: 997409
Change-Id: I8113892b7fdbf1a4f7dd4b9c7cf490264952fe69
4) sepolicy: Update policies for FST
Recent android changes removed permission for
systemserver and netd to read system properties.
Added such support as it is needed for fst feature
Change-Id: I045b7115f9a6ba5c03f7f8e510a29e847a534686
CRs-Fixed: 1028134
5) sepolicy: support wigig services and fast session transfer
Add rules for allowing wigig framework and FST to work.
Includes:
- communication between wigig framework and wigig HAL service
- permissions for wigig HAL service
- file/socket permissions for fstman daemon
- permissions for WIFI framework to operate FST.
Change-Id: Ibf0970aa0f06fac1dab4d8a2b31a9f0fc4ab3a6e
6) sepolicy: support FST in SoftAP mode
Add rules needed for supporting FST in SoftAP mode:
- Extend the wifi_vendor_hostapd_socket file definition to include
the hostapd global socket.
- Allow hostapd to send messages back to fstman event socket
- Allow fstman to communicate with hostapd global socket.
Change-Id: Ifbf38e24ff9e0834ef3f3dd8cf70d4e5ce1af4d1
7) sepolicy: add rules for wigig network performance tuner(npt)
Add rules needed to support the wigig network performance tuner.
The npt is a standalone service which provides the ability to
tune network stack parameters. It can accumulate tuning requests
from multiple clients and merge requests.
The npt provides an hwbinder service used by wigig framework
(hosted inside system_server).
The npt also listens on a unix socket, this is used by vendor
components for backward compatibility with previous implementation.
Change-Id: Iaabb4c13519c14b0e79631c7eaed7e53a1076063
8) sepolicy: add permissions to access wigig's snr_thresh sysfs
Part of FST functionality, fstman needs to access snr_thresh sysfs.
Change-Id: Ie10778c0c4b874b2ea8467f2deac26ae7d776bdc
9) sepolicy: fix hostapd rules for FST
FST was broken by commit 3e2b4523e6
("sepolicy: Adding rule for cnd"). Object was changed from
wifi_vendor_wpa_socket to wpa_socket. However wifi_vendor_wpa_socket
provides access to /data/vendor/wifi/sockets where wpa_socket
provides access to /data/misc/wifi/sockets.
Change-Id: Ia70999c3aedc4e073bfcc2ac72bde83d5b521aa4
10) sepolicy: move definitions of wigig services
Move the definitions of wigig services from common
to private, otherwise they do not work in newer version
of Android.
Change-Id: Ia4d0770314706b97ee0fea8f36fe920f0d7103cf
11) sepolicy: remove duplicate definitions of wigig and wigigp2p
wigig and wigigp2p service definitions were duplicated in
common/service_contexts and private/service_contexts,
it caused problems with OTA build.
Change-Id: Ifaeb9ffdf65be44de3ef8d15c323e436b5e04d9f
12) sepolicy: add rules for on-demand insmod/rmmod of wigig driver
Add rules to allow wigig HAL service to insmod/rmmod the wigig module,
similar to the WIFI HAL. This is needed because the wigig chip
leaks power while wigig driver is loaded, so the driver must be
unloaded when wigig framework is disabled.
Change-Id: Id96f50020b3e7028b2c6bdd319383879565087c6
13) sepolicy: fixes for wigig SoftAP (hostapd)
Added some fixes to get wigig SoftAP working.
In recent version of Android hostapd now has its own HAL domain.
Update hostapd rules to refer to this new domain.
Also, there are few small updates to refer to proper types for
vendor files and sockets.
Change-Id: If53a3674312f5a008984eb7ff2aa6026dcdf0af7
14) sepolicy: FST fixes
1. Restore access to hostapd global socket from fstman.
2. fstman now generates its configuration (fstman.ini) based
on system properties, so it needs read access to these.
3. wpa_supplicant global socket moved to vendor_wpa_wlan0,
so fstman (and other vendor services) can access it.
Change-Id: I099d7f3b187989c26666b93288b1693f5db20bec
15) sepolicy: allow platform_app to read wigig properties
WigigSettings application needs to read wigig system property.
Change-Id: Ic5e28b454bfa261b4cbd91dc76b7e2267e1acb74
16) sepolicy: fix wigignpt access to network parameters
Add rule to fix problem with accessing sysfs network
parameters on recent android versions.
Based on this audit log:
avc: denied { search } for pid=1024 comm="wigignpt" name="net" dev="sysfs" ino=41025 scontext=u:r:wigignpt:s0 tcontext=u:object_r:sysfs_net:s0 tclass=dir permissive=0
CRs-Fixed: 2217480
Change-Id: Ifdb8b794a4a310c1548743cc19df77d7eb0d302b
Change-Id: I0c847447acf3ffd7903a62e0139e69308dca851f
2019-04-03 01:43:17 +03:00
qctecmdr
5338a3c972
Merge "sepolicy: add rules to connect to ims_socket"
2019-04-02 15:35:16 -07:00
Gurpreet Singh Dhami
1fea5898dd
sepolicy: /sys/kernel/debug/ access for hal_graphics_composer
...
Add rules to allow hwcomposer process to open /sys/kernel/debug/ nodes
for debugfs node content dumping during HWRecovery
Change-Id: I2e3c4dec714a6b3391401bf9dd7cf9f0217270ff
2019-04-02 14:56:57 -04:00
Lubin Yin
d11ed5578a
sepolicy: Adding rules for WFD sink hdcp
...
Change-Id: I3ce7f6d75ba4100a1f534a2054fe0099c799f818
2019-04-02 10:44:04 -07:00
qctecmdr
6637e88f9c
Merge "Add selinux labels for spdaemon"
2019-04-02 08:26:07 -07:00
qctecmdr
905920ade9
Merge "mirrorlink: Add mirrorlink specific permissions"
2019-04-02 05:11:24 -07:00
Pavan Kumar M
77613ff04b
sepolicy: add rules to connect to ims_socket
...
Add rules for imshelper_App to write and connect
to ims_socket.
Change-Id: I0ec8c0708abfcc22bf7fce8ea70c4ef4a98c16e4
2019-04-02 16:50:00 +05:30
qctecmdr
e5ff527a76
Merge "sepolicy: Add policy for Qti mapper version 1.1"
2019-04-02 02:01:08 -07:00
qctecmdr
8dcdfe73fa
Merge "sepolicy: Add gralloc.qcom to SP HALs"
2019-04-01 22:34:01 -07:00
qctecmdr
72050af051
Merge "Sepolicy: Adding SEpolicy for IOP"
2019-04-01 15:30:03 -07:00
Ashish Kumar
6331acd1ed
sepolicy: Add policy for Qti mapper version 1.1
...
CRs-Fixed: 2411582
Change-Id: If75eeb142b0484def250d813337e2d3307193c1b
2019-04-01 10:28:24 -07:00
qctecmdr
3fea7ba91a
Merge "sepolicy: add persist file access for hvdcp"
2019-04-01 07:56:10 -07:00
qctecmdr
f084569e85
Merge "sepolicy: Add hal entries for ML HW service"
2019-04-01 04:56:15 -07:00
Archit Srivastava
e24e97f45d
sepolicy: Add gralloc.qcom to SP HALs
...
Change-Id: I0d2358e142f9b6fba2f0efeb520734f5097aeed8
2019-04-01 13:55:44 +05:30
Shibin George
cb03ca6211
Allow system_server to access /sys/kernel/debug/binder/state
...
For debugging watchdog issues in system_server, system_server
needs read access to binder-state file. Access to generic debugfs has
been removed for all processes except init, vendor_init & dumpstate.
This CL labels /sys/kernel/debug/binder/state file and allows
system_server, dumpstate, vendor_init & init, 'r_file_perms' access
to the same file.
The label and the associated access permissions only apply to
userdebug builds.
Change-Id: I159e39bcd05d699454797f8b1d1c17c810c99cb1
2019-04-01 00:41:08 -07:00
Indranil
e6dbe4d954
mirrorlink: Add mirrorlink specific permissions
...
1. Add usb genfs entry for kona
2. Allow access to /proc/asound/pcm file
Change-Id: Ic765e318c13d8c74423ad51e9b8399667775a582
2019-03-31 22:35:42 -07:00
Wenjun Zhang
c5ee0fe22d
sepolicy: add hal_light hwservice to fix Light HIDL not exit
...
Allow system_app to interact with light hal.
Change-Id: I2081f610fcb51a773f96921a16b11d0cb68dd83c
2019-03-30 23:43:09 -07:00
qctecmdr
322a3ff193
Merge "Sepolicy changes to allow create socket"
2019-03-30 03:51:00 -07:00
qctecmdr
65c6b01815
Merge "sepolicy: Add permissions for NPU DSP device"
2019-03-29 10:02:09 -07:00
qctecmdr
46c2f001a6
Merge "sepolicy: allow hal_usb_default to read sysfs_usb_supply"
2019-03-29 10:02:09 -07:00
Biswajit Paul
b1c2b069c9
Add selinux labels for spdaemon
...
adding needed selinux labels for spdaemon for auto-pil
Change-Id: I2fd295fe24eb96b4cf8316020805c1aef2076eb1
2019-03-28 17:52:22 -07:00
Subbaraman Narayanamurthy
6fcf2c22d5
sepolicy: add persist file access for hvdcp
...
hvdcp_opti daemon needs to store some parameters under vendor
persist (/mnt/vendor/persist/hvdcp_opti/*). Add the necessary
rule for it.
Also, move hvdcp.te from generic/vendor/common to qva/vendor/common.
Change-Id: I337b9c862d15c1080f7f7de7ba2fe26111d9f02b
2019-03-28 13:21:15 -07:00
Indranil
d3f758d9ad
sepolicy: Add hal entries for ML HW service
...
ML HW service has 3 hal registered, add all of them in
hwservice_context
Change-Id: I10e47a41a323be6346ad658965cd6ad632a0f8aa
2019-03-28 14:19:55 +05:30
Phalguni
ea7825dd44
Sepolicy: Update sepolicy ops listener
...
Add read and write permissions for graphics device
Change-Id: I86c22daaa99bf77f4dc633a09de8cab4fcd8169e
2019-03-27 17:08:42 -07:00
Rama Aparna Mallavarapu
20a506cf29
sepolicy: Add permissions for NPU DSP device
...
Add permissions to NPU DSP device so that post_boot
script can update the sysfs nodes for this device.
Change-Id: I531cc4d9feedc22c0cfe515dcf86dbd917bc280b
2019-03-27 15:15:46 -07:00
Devi Sandeep Endluri V V
89d738f84e
Sepolicy changes to allow create socket
...
Allow hal_rcsservice to create qipcrtr_socket
Denial:
avc: denied { create } for comm="imsrcsd"
scontext=u:r:hal_rcsservice:s0 tcontext=u:r:hal_rcsservice:s0
tclass=qipcrtr_socket permissive=0
Change-Id: I2efa91e771ae5a51aa23becef72000daf6c54dc5
2019-03-27 03:29:53 -07:00
Devi Sandeep Endluri V V
8b59adcf27
sepolicy/radio: Add sepolicy rule for RCS client
...
Rule for client applications to communicate with RCS vendor
service
Denial:
avc: denied { find } for
interface=com.qualcomm.qti.imscmservice::IImsCmService
sid=u:r:radio:s0 pid=5649 scontext=u:r:radio:s0
tcontext=u:object_r:hal_imsrcsd_hwservice:s0
tclass=hwservice_manager permissive=0
Change-Id: I3ea3d95e77509c89fdb3515f5eaa0a0d4d376e1f
2019-03-27 03:25:13 -07:00
Chandana Kishori Chiluveru
4cfec0d1a9
sepolicy: allow hal_usb_default to read sysfs_usb_supply
...
Grant file read access to hal_usb_default context to read
from the syfs_usb_supply file context. This allows the USB
HAL to be able to read from /sys/class/power_supply/usb/*.
Change-Id: I6ac5672a87114af09c2b9314191116dd21c9e77a
2019-03-27 03:24:10 -07:00
Karthik Gopalan
dd6d8b9ac1
Sepolicy: Adding SEpolicy for IOP
...
Adding SEPolicy for IOP.
CRs-Fixed: 2419687
Change-Id: Ia3f53f4aeaaa2cb12bb534ef3bd51daa60ed3d95
2019-03-27 15:12:59 +05:30
qctecmdr Service
2be1440bc7
Merge "sepolicy: Add rule for CneApp to communicate with CND"
2019-03-26 02:26:20 -07:00
qctecmdr Service
e387f73c1c
Merge "sepolicy: allow system app access sensor calibration"
2019-03-25 22:56:06 -07:00
Devi Sandeep Endluri V V
ab7b116bc4
sepolicy: Add rule for CneApp to communicate with CND
...
Add missing rules for CneApp and CND communication in
legacy folder.
Change-Id: I245e605e4ccc751311434e7ecfd775c8973c0b18
CRs-fixed: 2419820
2019-03-25 20:28:32 -07:00
qctecmdr Service
c971f716e7
Merge "sepolicy: legacy: Enable NFC HIDL 1.2 service"
2019-03-25 14:29:10 -07:00
qctecmdr Service
42473ec6e3
Merge "sepolicy: add sysfs path for CDSP to L3 device"
2019-03-25 14:29:10 -07:00
qctecmdr Service
f346b83490
Merge "sepolicy: Add unix socket permissions to the qteeconnector"
2019-03-25 11:22:57 -07:00
qctecmdr Service
65c5e6487f
Merge "sepolicy: add liblistenjni and liblistensoundmodel2"
2019-03-25 06:37:04 -07:00
Gurpreet Singh Dhami
aa715072bd
sepolicy: Add sepolicies for foss
...
FOSS is part of hardware.graphics.composer process now. Earlier
it was part of mm-pp-daemon process. So adding corresponding sepolicies
and removing obsolete sepolicies related to mm-pp-daemon.
Change-Id: I6b6f5995813ac268b90d3d7d4cee0ec7cb67f6f5
2019-03-25 02:14:05 -07:00
Linux Build Service Account
90bc6a0a07
Merge "sepolicy: add liblistenjni and liblistensoundmodel2" into sepolicy.lnx.5.9.r1-rel
2019-03-25 02:08:13 -07:00
Bhuvan Varshney
43b76fa247
sepolicy: legacy: Enable NFC HIDL 1.2 service
...
NFC HIDL 1.2 service is required to be
invoked from the boot.
Added entry for HIDL 1.2 service.
Change-Id: I5210f78c95f47365c56d7c4e05b06432a67b6921
2019-03-25 01:49:03 -07:00
Daqing Chen
d14724676c
sepolicy: allow system app access sensor calibration
...
Allow system app access sensor calibration hidl
service on Q.
Change-Id: I99e5aa900cb215d3a13e36f0b451d54e7031bdcf
2019-03-25 15:24:48 +08:00
qctecmdr Service
b71d77714c
Merge "sepolicy: Add permissions for fingerprint"
2019-03-23 13:39:53 -07:00
qctecmdr Service
4a5e015318
Merge "Sepolicy-QTI/ADPL: Created a file context for sockets"
2019-03-23 10:32:08 -07:00
qctecmdr Service
12e40f73d6
Merge "sepolicy: add permissions for extcon file"
2019-03-23 10:32:08 -07:00
qctecmdr Service
6e8e91f71f
Merge "sepolicy: Add permissions for cpu7 L3 memlat node"
2019-03-23 10:32:08 -07:00
qctecmdr Service
7385a7803e
Merge "Audio: add missing audio rules"
2019-03-23 10:32:07 -07:00
qctecmdr Service
0319850a3d
Merge "sepolicy: Add sepolicies for foss"
2019-03-23 10:32:07 -07:00
qctecmdr Service
a23099a64b
Merge "sepolicy: qva: necessary sepolicy changes for vpp services"
2019-03-23 06:00:02 -07:00
qctecmdr Service
d3c8d12e82
Merge "Add system_app_data_file permission for perfdump"
2019-03-23 06:00:02 -07:00
qctecmdr Service
20300abb1b
Merge "sepolicy: permissions for ipcrtr access for location_test_app"
2019-03-23 06:00:02 -07:00
qctecmdr Service
f511cb0989
Merge "sepolicy: add rules for jank killer feature"
2019-03-23 06:00:02 -07:00
qctecmdr Service
b8229bc625
Merge "sepolicy: Fix generic rules for time-services"
2019-03-23 06:00:02 -07:00
qctecmdr Service
69d14bc580
Merge "kona: Update WLAN node in genfs_contexts"
2019-03-23 02:57:05 -07:00
qctecmdr Service
52d99b04aa
Merge "sepolicy: Add access policy for charger files"
2019-03-23 02:57:05 -07:00
qctecmdr Service
3f428a034a
Merge "sepolicy: Allow vendor init to set target sku version"
2019-03-23 02:57:05 -07:00
qctecmdr Service
b2970fc5c0
Merge "sepolicy: allow camera process to access synx device node"
2019-03-23 02:57:04 -07:00
qctecmdr Service
11e7a11f36
Merge "QDMA sepolicy: adding qmux_socket permissions"
2019-03-23 02:57:04 -07:00
Gurpreet Singh Dhami
5a0a08ed0a
sepolicy: Add sepolicies for foss
...
FOSS is part of hardware.graphics.composer process now. Earlier
it was part of mm-pp-daemon process. So adding corresponding sepolicies
and removing obsolete sepolicies related to mm-pp-daemon.
Change-Id: I6b6f5995813ac268b90d3d7d4cee0ec7cb67f6f5
2019-03-23 02:54:52 -07:00
Samyak Jain
0d9edc1927
sepolicy: add liblistenjni and liblistensoundmodel2
...
add liblistenjni and liblistensoundmodel2, and tag them
as same-process HAL
Change-Id: I11f7c5587dd40f64a04af1f6227ab7d859b6a2c2
2019-03-23 00:33:05 -07:00
Ravi Kumar Siddojigari
33913c473f
sepolicy : restore vold access to tee_device node .
...
We need to remove coredomains access to tee_device but as seeing
issue we are restoring this for vold for now.
Change-Id: Ia5599051f75b456a462088e83741a8a975d99056
2019-03-22 20:15:38 +05:30
Samyak Jain
d25b70c41e
sepolicy: add liblistenjni and liblistensoundmodel2
...
add liblistenjni and liblistensoundmodel2, and tag them
as same-process HAL
Change-Id: I11f7c5587dd40f64a04af1f6227ab7d859b6a2c2
2019-03-22 06:56:12 -07:00
Gurpreet Singh Dhami
0a645fff17
sepolicy: Add support for qdcm socket service
...
Change-Id: I6ca534fa015091381f87b9b12056fec82b52581c
2019-03-22 06:49:28 -07:00
Jun Wang
dbb0a8e6e9
Add system_app_data_file permission for perfdump
...
Change-Id: Iedcea675ba25cb1521b3cbbc69a579c12f750dfe
CRs-Fixed: 2418861
2019-03-22 05:27:32 -07:00
Aman Gupta
03e1a2c4b4
Sepolicy-QTI/ADPL: Created a file context for sockets
...
Created a file context for sockets files
Change-Id: I6eed60942b74f12a71ade6d2f410e02064dc50c7
2019-03-22 03:07:47 -07:00
Mohit Aggarwal
03e4ae3501
sepolicy: Fix generic rules for time-services
...
The patch fixes generic sepolicy rules for
time-services.
Also adds rules required to read mhi sysfs
nodes for remote & local qtimer values.
Change-Id: I40c0e94e5e999f591d6780f62cefffae940f6345
2019-03-22 13:58:03 +05:30
Karthik Gopalan
6739038499
sepolicy: add rules for jank killer feature
...
Allow sf to access kgsl sysnode.
CRs-Fixed: 2418823
Change-Id: I4c6c8f5906f85e33f5f1e2de6ed8ca28ec3e2588
2019-03-21 22:43:14 -07:00
Bhuvan Varshney
d37766d1d6
sepolicy: Add unix socket permissions to the qteeconnector
...
Addition of unix socket permissions to the hal_qteeconnector_qti
Change-Id: Ieea042da1910c9a65c9a0516ac87a45d6b39c25f
2019-03-21 05:47:27 -07:00
Srinu Jella
4e37227d67
sepolicy: Label new a2dp service as audio hw service
...
- Label the new a2dp HAL service as Audio he service
so that Audio HAL process can load it and bluetooth
host process can interact with new service.
Change-Id: If7a4c5f9dcf33edbef5647107cae4cfdf847c63d
2019-03-21 17:49:07 +05:30
qctecmdr Service
f441b83563
Merge "Fix the sysfs definition to avoid compilation error."
2019-03-21 03:29:58 -07:00
Biswajit Paul
97779c24bc
Fix the sysfs definition to avoid compilation error.
...
Move sysfs_mhi to common as the label is applicable to all target.
Change-Id: Id4e50fcbd2e2ec697fdb7ae58ef1427bf3c22d54
2019-03-21 15:26:06 +05:30
qctecmdr Service
729ade1807
Merge "perf: Sepolicies to fix perflock functionalities"
2019-03-21 02:37:21 -07:00
qctecmdr Service
b6fb5234af
Merge "sepolicy: Add support for qdcm socket service"
2019-03-21 00:26:59 -07:00
Ravi Kumar Siddojigari
5f36c08ca0
sepolicy : remove coredomains access to tee_device
...
As part of security hardening coredomains access
to tee_device need to be removed.
Change-Id: Id6e5af8fed25d6c8e2a38d5f9c36e86d20534fce
2019-03-20 14:24:23 +05:30
Amir Vajid
5e237febcd
sepolicy: add sysfs path for CDSP to L3 device
...
Update permissions for CDSP to L3 device path
on kona.
Change-Id: I8a7c5e26516f4244b99ab23f2ae182f80675e152
2019-03-19 16:48:01 -07:00
Linux Build Service Account
5d41be8a01
Merge 2ef38c5590 on remote branch
...
Change-Id: I35b3329367bfa26a1f94ba1cb03cf9ff44e478dc
2019-03-19 04:46:21 -07:00
Gurpreet Singh Dhami
dc0ac36ee5
sepolicy: Add support for qdcm socket service
...
Change-Id: I6ca534fa015091381f87b9b12056fec82b52581c
2019-03-19 02:09:59 -07:00
Fenglin Wu
770c40ec5a
sepolicy: Add access policy for charger files
...
Add labels for charger related sysfs devices and script, and add policy
for charger script to access charger devices.
Change-Id: I64a70d11c051017d1eca70b09f735623312e4d69
2019-03-19 14:49:31 +08:00
jkalsi
be4baded88
QDMA sepolicy: adding qmux_socket permissions
...
Change-Id: I34ec014fafa12f8e676da244372af3b93886e079
2019-03-18 21:37:42 -07:00
Aalique Grahame
ccf383cd23
sepolicy: add permissions for extcon file
...
Add permissions for extcon files needed for display-port.
CRs-Fixed: 2417348
Change-Id: I334bf01d83b74b4f211f96552ac8f3e53274a8e7
2019-03-18 17:12:15 -07:00
Banajit Goswami
0b5c8e3e48
sepolicy: allow mediacodec to access audio devices
...
Mediacodec needs to access audio devices to use OMX HW decoders and
encoders. Allow mediacodec to access audio devices.
Change-Id: I791776848b1d42ff1bc13a445c03197d71e3bba4
2019-03-18 15:45:11 -07:00
Karthik Gopalan
c0eb4d4fb3
perf: Sepolicies to fix perflock functionalities
...
1. Allow perf-hal to create and read/write values
into default_values file which is created in
/data/vendor/perfd.
2. Allow perf-hal to read /sys/class/devfreq
directory and fetch values from the files.
CRs-Fixed: 2417754
Change-Id: I7a4494e95ff9cd57a295c76c53f4afb90570cc4d
2019-03-18 18:50:39 +05:30
Abir Ghosh
c340ac354d
sepolicy: Add permissions for fingerprint
...
Add selinux permissions for qfp-daemon and
qbt driver. Allow system app to access
fingerprint HAL.
Change-Id: I5106501475f8071fd272700a094cb9e33cfdbc50
2019-03-18 15:38:46 +05:30
Uma Mehta
92bcb31e29
sepolicy: Allow vendor init to set target sku version
...
- Add permission for vendor init to set target version
based on soc id
CRs-Fixed: 2412391
Change-Id: I5aa548088a5b74f63052335027f6e04e64af4fd7
2019-03-18 02:43:27 -07:00
Shashi Shekar Shankar
eeee4c4244
sepolicy: Add permissions for cpu7 L3 memlat node
...
Add permissions to the CPU7 Memlat node for sysfs
to access it.
Change-Id: Iafe49457112a20d40c1706f02ebf197323c864b2
2019-03-18 00:47:14 -07:00
Li Sun
d0a2404b49
sepolicy: qva: necessary sepolicy changes for vpp services
...
Add/update sepolicy files for vpp services
Change-Id: Ic97f87e13132417cbaacce17a99deed390a7bd87
2019-03-17 19:25:03 -07:00
Yuanyuan Liu
915ffc781e
kona: Update WLAN node in genfs_contexts
...
Update WLAN node from "a0000000.qcom,cnss-qca6390" to
"b0000000.qcom,cnss-qca6390" in genfs_contexts.
Change-Id: I54334e9bd7ffc17653b2d30d689200b557eba2f8
2019-03-15 20:17:11 -07:00
Dante Russo
66ef595ebf
Remove permission to read hosts file
...
Remove permission for reading hosts
file due to new Android socket API
Change-Id: I63b80cd4a487c0d41220045b876d53fdb6388a52
CRs-Fixed: 2417347
2019-03-15 15:02:16 -07:00
Madhanraj Chelladurai
b4fa6580ed
sepolicy: permissions for ipcrtr access for location_test_app
...
Change-Id: Id806be31f734a2eb1b85db7bfacf7af334be44e6
CRs-Fixed: 2416997
2019-03-15 16:19:39 +05:30
qctecmdr Service
a43bfe4a1a
Merge "msmnile: Add spmi and i2c-pmic devices to genfs_contexts"
2019-03-15 02:40:02 -07:00
qctecmdr Service
b5ab6efca8
Merge "ANT: Add sepolicy rule for Ant hidl support"
2019-03-15 00:20:11 -07:00
qctecmdr Service
4172afb708
Merge "Sepolicy: Add legacy sepolicy rule for BT"
2019-03-14 20:09:06 -07:00
Vikram Panduranga
ae5b60a087
Audio: add missing audio rules
...
Add audio rule in system_server for accessing sound card.
Change-Id: I528486c60094a197a3da2820bfa1dc74dca6ead4
2019-03-14 14:34:14 -07:00
Amir Vajid
5490bded32
sepolicy: correct sysfs paths for L3 devices
...
Update the sysfs paths for L3 devices based on
latest naming convention.
Change-Id: Ia4dbc8eee0e8640e343997898929f2a93be6403c
2019-03-14 12:32:22 -07:00
Mahesh Kumar Sharma
ac0cc62190
ANT: Add sepolicy rule for Ant hidl support
...
This adds binder call and access to bluetooth hwservice
Change-Id: I3cf370a9fc2fdc1bf3294abe5d27b25794e0e024
2019-03-13 17:01:58 -07:00
Sumukh Hallymysore Ravindra
556d712ff8
sepolicy: allow camera process to access synx device node
...
Allow the hal camera process to access the new global synx
device node.
Change-Id: I70b41cb620b85f418bd8353132c25d922b2f9559
2019-03-13 13:56:21 -07:00
Jaihind Yadav
2ef38c5590
sepolicy: removing vendor_carrier_file access.
...
Due to new restriction we have to remove access for idmap and system server.
Change-Id: I8c78c32812e2a16b01e82d997d1f80510515b1b9
2019-03-13 18:56:15 +05:30
Umang Agrawal
76cf294090
msmnile: Add spmi and i2c-pmic devices to genfs_contexts
...
Define selinux context label for FG spmi device. While at it, add
the selinux context definition for smb1390 device also along with
SMB1355 alternate i2c address context definition.
Change-Id: I9d7c89a6fbbb2648d9c5a3e522b32c5e675c6534
2019-03-13 11:33:47 +05:30
Nitin Shivpure
c062eb63f9
Sepolicy: Add legacy sepolicy rule for BT
...
- Remove vendor_bluetooth_prop rule for unused wcnss_filter
& hal_audio
- Add persist.vendor.qcom.bluetooth. &
vendor.qcom.bluetooth. into vendor_bluetooth_prop context.
- Add SE policy for BT configstore.
- set vendor BT properties from vendor_init.
Change-Id: I9bb5277554363f981c7a639dc00c93b609423acb
2019-03-12 18:55:23 -07:00
qctecmdr Service
73edc0e71e
Merge "Sepolicy: Update subsys nodes for the tip"
2019-03-12 16:30:49 -07:00
Chalapathi Bathala
06ba5da903
Sepolicy: Update subsys nodes for the tip
...
Change-Id: I57efaf410d82a319beb2ae9d7aad821f9b772b85
2019-03-12 15:20:35 -07:00
qctecmdr Service
5d8c309001
Merge "sepolicy: Define sepolicy for feature_enabler_client"
2019-03-12 14:25:05 -07:00
Ramkumar Radhakrishnan
2c0afeca16
sepolicy: Define sepolicy for feature_enabler_client
...
Change-Id: Id66258f5d0f9a0189b5f42682d051962a9a751f2
2019-03-12 14:05:05 -07:00
qctecmdr Service
855fa68d92
Merge "sepolicy: Add rules for mirrorlink"
2019-03-12 12:18:40 -07:00
Lubin Yin
1eac18e8ff
sepolicy: Add rules for mirrorlink
...
Add rules for mirrorlink
Change-Id: I01f24a080a8a3e5c0197ffc19e5c54305233df14
2019-03-12 11:34:20 -07:00
qctecmdr Service
9a7670d0bf
Merge "sepolicy: Add permissions for seccam"
2019-03-12 10:06:49 -07:00
qctecmdr Service
09547897e0
Merge "sepolicy: including TARGET_SEPOLICY_DIR in build"
2019-03-12 07:26:37 -07:00
Amit P Choudhari
fb1af4c8a6
sepolicy: Add permissions for seccam
...
Add permissions for qteeconnector and
seccam service
Change-Id: I5d5cd5b569591b23b2af4d720a67c1ed73626191
2019-03-12 18:03:41 +05:30
qctecmdr Service
318cedb711
Merge "sepolicy: Add rule for CneApp to communicate to CND"
2019-03-12 05:00:07 -07:00
Jaihind Yadav
e4b5e2c874
sepolicy: including TARGET_SEPOLICY_DIR in build
...
for some target TARGET_BOARD_PLATFORM is differet and sepolicy dir is different.
So adding support for that.
Change-Id: I4bb5f04111af101dee581e98036e0a9646bb946e
2019-03-12 02:57:33 -07:00
qctecmdr Service
5de3fffd7f
Merge "QDMA sepolicy changes for QC Single Vendor Image"
2019-03-12 02:16:03 -07:00
Uma Mehta
e339640d50
sepolicy: Add video properties set and get permissions
...
CRs-Fixed: 2412391
Change-Id: Ic0838c1144b1bdd5f4ed8b2655cd1502b5796eb9
2019-03-11 04:28:43 -07:00
Sauvik Saha
c29ae4e712
sepolicy: Add rule for CneApp to communicate to CND
...
- Add rule to read cne prop.
- Add binder call rule.
Change-Id: I7c03fe016ede17fb747ad6cba85ff33725ff9f48
CRs-fixed: 2413355
2019-03-11 03:08:34 -07:00
jkalsi
47c6e5dbb5
QDMA sepolicy changes for QC Single Vendor Image
...
Change-Id: I8ea8990509ee8908177823cf9f57a38d806d07a6
2019-03-11 10:54:17 +05:30
Jaihind Yadav
82218a9737
sepolicy: corrected firmware_file file type association
...
As we no longer us firmware mount on root/system we are
de-associating system_file_type form it .
Change-Id: Icc57733457145d01cc9901bc74b85a161101fa75
2019-03-10 21:59:14 +05:30
Jaihind Yadav
eba0bd917b
sepolicy: corrected firmware_file file type association
...
As we no longer us firmware mount on root/system we are
de-associating system_file_type form it .
Change-Id: If2a8153436f4ffaa5e5539c09df184a7b9e5fbb8
2019-03-08 04:54:08 -08:00
Wileen Chiu
49e1584b0c
sepolicy: Add create permissions for rild/atfwd
...
- modify permissions to include create for selinux
Change-Id: Ia9b40461354bba57448abd32727d11d1dfa8850e
CRs-Fixed: 2376128
2019-03-08 02:10:14 -08:00
himta ram
1b6976b1a6
sepolicy: add sepolicy support for fm
...
intialize server and client for hal_fm.
Change-Id: If63714283194baaac950a7426b95f17ee110eb4f
2019-03-07 23:51:26 -08:00
Linux Build Service Account
6cd3885fd4
Merge f83e96756d on remote branch
...
Change-Id: I0cbdf70021a040a996d9514e2efdd6070e1de7a6
2019-03-07 15:31:54 -08:00
qctecmdr Service
e05c363bf0
Merge "sepolicy : cleanup rule accessing to "sysfs""
2019-03-07 10:27:32 -08:00
qctecmdr Service
05fa23f48c
Merge "sepolicy: Enable NFC HIDL 1.2 service"
2019-03-07 08:17:29 -08:00
qctecmdr Service
1bcf4ab545
Merge "sepolicy : remove mdtpdaemon and mdtpservice_app references"
2019-03-07 05:58:13 -08:00
Ravi Kumar Siddojigari
880a69cd42
sepolicy : cleanup rule accessing to "sysfs"
...
As part of security hardening access to sysfs label related
sepolicy rules should be removed.
So cleaning all the directory reads and sysfs:file access
which were seen in the following .
hal_bootctl
hal_gnss_qti
hal_pasrmanager
pd_services
ssr_diag
ssr_setup
thermal-engine
qmuxd
sensors
hal_perf_default
Change-Id: I51e98a3f68211357e2bb1455f28a96fc3aad4d88
2019-03-07 18:24:30 +05:30
Ravi Kumar Siddojigari
8c4e003c61
sepolicy : remove mdtpdaemon and mdtpservice_app references
...
As mdtpdaemon and mdtpservice_app are no longer used removing
services and related sepolicy.
Change-Id: I0307929acb5bfadbf3cca37396281b45dc995016
2019-03-07 03:31:19 -08:00
Ravi Kumar Siddojigari
111e4e1a76
sepolicy : remove rfs_access to /system/rfs files .
...
As part of treble vendor process is not allowed to access
system_files.
Change-Id: I6955beaac67def598bd7a5055e2479b9a1727b58
2019-03-07 03:30:50 -08:00
Bhuvan Varshney
47c100b89c
sepolicy: Enable NFC HIDL 1.2 service
...
NFC HIDL 1.2 service is required to be
invoked from the boot.
Added entry for HIDL 1.2 service.
Change-Id: I1a0913415178c0636b1723d1de33b97b2f8578f7
2019-03-07 03:14:59 -08:00
qctecmdr Service
557f0e49f0
Merge "sepolicy : Changes to support wfd"
2019-03-06 13:17:20 -08:00
qctecmdr Service
c729b75ba8
Merge "sepolicy: IWlan QTIDATASERVICES"
2019-03-06 11:08:08 -08:00
Tyler Wear
64e1f060aa
sepolicy: IWlan QTIDATASERVICES
...
Add IWlan hal to qtidataservices app.
CRs-fixed: 2382338
Change-Id: Ia551f83b6894f2a6206c42f25b5ab2f1c9e67b0f
2019-03-06 09:38:30 -08:00
qctecmdr Service
2a94ea4c97
Merge "sepolicy: Add rules to allow SDM to open ion_device"
2019-03-06 08:34:08 -08:00
qctecmdr Service
58cc5f3fbc
Merge "sepolicy: Add create permissions for rild/atfwd"
2019-03-06 06:00:58 -08:00
qctecmdr Service
abee449fe7
Merge "perf-hal: sepolicy for perf-hal@2.0"
2019-03-06 03:05:11 -08:00
Indranil
fae511cd1e
sepolicy : Changes to support wfd
...
Change-Id: I8ef01b499b2d5495518241c1a217e8df0d8cd8c5
2019-03-06 16:06:53 +05:30
richagar
ab5b64b4a1
sepolicy: Changes for perf 2.0
...
Removing duplicate perf2.0 statements from
legacy/vendor/common/file_contexts
Change-Id: I026fa129bf834452ecf47edb002e5e37b4be47fb
2019-03-05 23:22:34 -08:00
Wileen Chiu
1c570a452d
sepolicy: Add create permissions for rild/atfwd
...
- modify permissions to include create for selinux
Change-Id: Ia9b40461354bba57448abd32727d11d1dfa8850e
CRs-Fixed: 2376128
2019-03-05 15:33:58 -08:00
Karthik Gopalan
c724d73a9c
perf-hal: sepolicy for perf-hal@2.0
...
sepolicy rules for perf-hal@2.0
CRs-Fixed: 2403587
Change-Id: Iabc8e8f1ef35690daaff429395432a1570603269
2019-03-05 16:04:39 +05:30
qctecmdr Service
558b8a3f71
Merge "QTI: Enable QTI on kona"
2019-03-04 04:17:06 -08:00
qctecmdr Service
66e79cd90d
Merge "sepolicy: update BT Se linux policy rule"
2019-03-04 03:59:18 -08:00
qctecmdr Service
ef10b2c7c4
Merge "sepolicy : Changes for perf 2.0"
2019-03-04 03:43:08 -08:00
qctecmdr Service
7a8adcbd30
Merge "sepolicy: Add SE policy for BT configstore"
2019-03-04 03:23:32 -08:00
qctecmdr Service
bb6a692563
Merge "Sepolicy: Set genfs context for subsystems restart_level"
2019-03-04 03:06:14 -08:00
qctecmdr Service
28dcdf1c4c
Merge "Enhance sepolicy rules as per generic and qva sepolicy changes."
2019-03-04 02:43:22 -08:00
himta ram
07a65ff69b
sepolicy: add sepolicy support for fm app
...
add sepolicy support for accessing fmradio
device node from fm app.
Change-Id: I2a408e8421543ab0f62e3af1b9fbddccff8edd3d
2019-03-01 03:01:20 -08:00
Richa Agarwal
87c5c09dea
sepolicy : Changes for perf 2.0
...
Moving perf-hal from 1.0 to 2.0.
Change-Id: I9600e51150caa982966d026c336ff0e5c9bdf08a
2019-03-01 15:03:32 +05:30
Nitin Shivpure
a20df4daee
sepolicy: update BT Se linux policy rule
...
- Remove vendor_bluetooth_prop rule for unused wcnss_filter
& hal_audio
- Add persist.vendor.qcom.bluetooth. &
vendor.qcom.bluetooth. into vendor_bluetooth_prop context.
- Allow qipcrtr_socket perms for user builds as well.
- Allow BT process accessing persist.vendor.bt_logger.log_mask
Change-Id: I44065536f313e900fa08848c3309391f3817e05c
2019-03-01 00:07:53 -08:00
Nitin Shivpure
c87f0c217e
sepolicy: Add SE policy for BT configstore
...
Add SE policy for BT configstore.
Change-Id: Idd8e959aa2ac1e416b38704d64f677b206eec3cd
2019-03-01 00:07:29 -08:00
qctecmdr Service
349455471d
Merge "sepolicy: Bring-up changes for following targets on new components"
2019-02-28 22:31:38 -08:00
Deepthi Gunturi
cb5d1e1c21
Sepolicy: Set genfs context for subsystems restart_level
...
If genfs for subsystems is not set, ssr triggers will fail.
Change-Id: I5d66bad086d2c73a457ea912d0e7e1478e4b41c4
2019-02-28 10:58:12 +05:30
Ping Li
0c045a2732
sepolicy: Add rules to allow SDM to open ion_device
...
LTM feature requires ION buffers, hence this change adds policy to
allow SDM to open ion_device to allocate ION buffers.
Change-Id: I4cf2b6bec5083b8970a614e43fb43348abbc1fc4
2019-02-27 18:49:13 -08:00
Jaihind Yadav
f83e96756d
sepolicy: add sepolicy support for fm
...
added separate hal_fm_hwservice for fm app.
intialize server and client for hal_fm.
made system_app to be a client of hal_fm
Change-Id: I4881913e5f9abc3699730e8a6abac3756dc91337
2019-02-27 17:48:40 +05:30
Jaihind Yadav
7a7bea74bc
sepolicy: adding the misc change from 5.0 to 5.9
...
This is delta of sepolicy 5.0 component between 25th jan to 26th fab.
Change-Id: I43dbdf9f4e4300dfafedbd2e19460fb55844fbac
2019-02-27 17:16:13 +05:30
vijay.rayabarapu
2f62f4c113
sepolicy: Bring-up changes for following targets on new components
...
moving the sepolicy to new branch for following targets
msmsteppe
trinket
sdmmagpie
Change-Id: Id4b80adafad4f64610e0ae17cfbce56a3b1b6f94
2019-02-27 02:12:04 -08:00
Abhishek Srivastava
f64ab09bc5
Enhance sepolicy rules as per generic and qva sepolicy changes.
...
This commit introduces the WLAN sepolicy rules in accordance with the
QVA VS Generic rules.
CRs-Fixed: 2402079
Change-Id: I4bfc4f3ef1ef2c5ffe986cc3d3f44dc9f5b92a1a
2019-02-26 19:27:34 +05:30
Wileen Chiu
72b1eb3af1
sepolicy: added permissions needed for rild
...
Adding sepolicy rules for denials seen for
ril daemon
Change-Id: I6b3c3e0dd1d145590bb825f4370ed28a77f49577
CRs-Fixed: 2376128
2019-02-25 14:30:46 -08:00
Aman Gupta
67c75280fa
QTI: Enable QTI on kona
...
add mhi rules needed
Change-Id: I0da8d165d801762d50e60f4aa770b9fdd60bcb38
2019-02-25 06:26:40 -08:00
qctecmdr Service
150553f9ff
Merge "Sepolicy: Add power off alarm rules"
2019-02-25 05:40:53 -08:00
qctecmdr Service
0ba45e4a3f
Merge "sepolicy: Add qva mediaextractor process permissions"
2019-02-25 05:22:47 -08:00
qctecmdr Service
69a2b0fbae
Merge "sepolicy: add rules to access sensors power scripts from app"
2019-02-25 05:05:24 -08:00
Vara Prasad A V S G
62b4f40c18
Merge commit '959bd02417abbf2c636ae910a5d97c64440f5a77' into HEAD
...
Conflicts:
qva/private/system_app.te
qva/vendor/common/hal_wifi_supplicant.te
Change-Id: I925ad6915b5443017f2976b239b0024df2de7dd6
2019-02-25 17:30:52 +05:30
Vara Prasad A V S G
c85824bd54
Revert "Sepolicy: Addressed the denial to create qipcrtr_socket"
...
This reverts commit e0b98d525d .
Change-Id: I47269ac9c92ff187742c089595f64dab61c12df1
2019-02-24 16:46:16 +05:30
Vara Prasad A V S G
7b6ff63021
Revert "Updating rule for wlan"
...
This reverts commit 6e46def524 .
Change-Id: I7a8efe1e532c417e3c2b5676128a507478eba63d
2019-02-24 16:44:10 +05:30
Vara Prasad A V S G
8e4cb654ce
Revert "Enhance sepolicy rules as per the new requirement of QVA."
...
This reverts commit 308822ab67 .
Change-Id: Ie889e0cd3cb05bf3a2a00a1b3dbe6d2f09d8b55a
2019-02-24 16:40:31 +05:30
Subash Abhinov Kasiviswanathan
5b4c0415c7
sepolicy: move netmgrd.te from msmnile to common
...
These policies apply to all targets and can
be moved to common. This gives netmgrd permissions to
create qipcrtr_socket in other targets.
Change-Id: Ic049b8ac6beea536b6cb8d3a439d03e4bc1828f4
2019-02-22 12:42:20 -07:00
Qimeng Pan
edf74ef256
Sepolicy: Add power off alarm rules
...
Add power off alarm rules
Change-Id: I02b59aa2c34efc4b57810e592ca2750a511155f0
CRs-Fixed: 2399628
2019-02-22 00:10:40 -08:00
Piyush Balwani
b211f6f9a1
fixed compilation error
...
Change-Id: I42af2bda42b1e3b66a539bfdb5384ebaacd44ac7
2019-02-22 00:03:56 +05:30
Uma Mehta
d3e3fdd5ea
sepolicy: Add qva mediaextractor process permissions
...
- Add permission to read parser enable property and
osal debug property
CRs-Fixed: 2402865
Change-Id: I002eeb74993af1d782095eefc6476bb50ae7d326
2019-02-21 18:10:37 +05:30
qctecmdr Service
959bd02417
Merge "sepolicy: comply with app_zygote neverallow rules"
2019-02-21 03:31:46 -08:00
Aman Gupta
e0b98d525d
Sepolicy: Addressed the denial to create qipcrtr_socket
...
Taken care of denial to create a qipcrtr_socket by QTI
Change-Id: Icf4c0b60d30f1c496cc4b5afed94efa639143109
2019-02-21 03:25:28 -08:00
qctecmdr Service
0c9dc10a75
Merge "FR53463: Location generic and qva sepolicy changes."
2019-02-21 03:13:23 -08:00
Vara Prasad A V S G
6e46def524
Updating rule for wlan
...
Change-Id: If10230457e64cc3795756d2d402547cb29434f24
2019-02-21 02:43:09 -08:00
qctecmdr Service
7ecdf9605e
Merge "sepolicy: allowed v1.2 HALs for DRM and clearkey"
2019-02-21 02:42:11 -08:00
Harikrishnan Hariharan
a1dad7f9a8
FR53463: Location generic and qva sepolicy changes.
...
Location sepolicy changes for SElinux support for common
vendor image as part of FR53463.
Change-Id: I3eed6eed7a44c1aed50b667671f875597da64db1
CRs-Fixed: 2341061
2019-02-21 16:11:54 +05:30
Vara Prasad A V S G
308822ab67
Enhance sepolicy rules as per the new requirement of QVA.
...
This commit enhances the sepolicy rules as per the requirement of QVA
CRs-Fixed: 2402079
Change-Id: I4bfc4f3ef1ef2c5ffe986cc3d3f44dc9f5b92a1a
2019-02-21 16:03:11 +05:30
qctecmdr Service
0c4a032f4d
Merge "sepolicy: Change policy for wfd"
2019-02-21 02:25:15 -08:00
Indranil
bc08ccc617
sepolicy: Change policy for wfd
...
WFD requires revision in it's SEAndroid policies due
to an OS upgrade and design re-architecure to conform
to system-wide mandates.
Change-Id: I3cd532c638b4bf6ee7ea8589fc64448cc08403f5
2019-02-21 12:07:34 +05:30
Ravi Kumar Siddojigari
69a079b4b9
sepolicy: comply with app_zygote neverallow rules
...
due security hardening we are seeing compile time issue with
testscript domains so updating te files to to comply to
app_zygote restrtiction.
Change-Id: I9d368fd756653f835aa38d9fcc0ef08fcf8368c7
2019-02-20 22:22:54 -08:00
Pavan Kumar M
8324dc3a97
Sepolicy changes to allow create socket
...
Allow cnd to create qipcrtr_socket
Denial :
avc: denied { create } for comm="cnd" scontext=u:r:cnd:s0
tcontext=u:r:cnd:s0 tclass=qipcrtr_socket permissive=1
Change-Id: I10885b9af1d362c2d04e5406ce618c0e6f84507f
CRs-Fixed: TBD
2019-02-20 21:17:42 -08:00
qctecmdr Service
e7994ced68
Merge "sepolicy : removed wfdservice access to tee_device"
2019-02-20 09:38:20 -08:00
qctecmdr Service
6ed8c6b341
Merge "Camera: Update permissions for Camera process"
2019-02-20 09:38:20 -08:00
qctecmdr Service
aa875c05a3
Merge "Sepolicy: Addressed the denial to create qipcrtr_socket"
2019-02-20 09:38:20 -08:00
qctecmdr Service
ce0a718d48
Merge "Sepolicy: set the property for dataadpl to start on bootup"
2019-02-20 08:21:00 -08:00
qctecmdr Service
d441f2b38c
Merge "SEPolicy : Add permissions for read MBN configs directory"
2019-02-20 08:21:00 -08:00
qctecmdr Service
63ba7b1ed6
Merge "Add SE policy for Bluetooth SAR HAL"
2019-02-20 08:21:00 -08:00
qctecmdr Service
3f7d06d919
Merge "sepolicy: Update the sysfs paths for the L3 devices."
2019-02-20 08:21:00 -08:00
qctecmdr Service
5580a13e33
Merge "sepolicy: Update device nodes for Kona"
2019-02-20 08:21:00 -08:00
Murthy Nidadavolu
8a721d67b2
sepolicy: allowed v1.2 HALs for DRM and clearkey
...
v1.2 HALs to run for widevine and clearkey
Change-Id: I6df2a73aa943059172643c20691e8be21d6775ce
2019-02-20 16:47:29 +05:30
qctecmdr Service
d2533e796a
Merge "sepolicy: adding sepolicy changes"
2019-02-20 01:05:11 -08:00
Aman Gupta
fcff6f52ac
Sepolicy: Addressed the denial to create qipcrtr_socket
...
Taken care of denial to create a qipcrtr_socket by QTI
Change-Id: Icf4c0b60d30f1c496cc4b5afed94efa639143109
2019-02-19 23:17:40 -08:00
qctecmdr Service
2a97390193
Merge "sepolicy: adding permission for hal_perf_default."
2019-02-19 22:41:26 -08:00
qctecmdr Service
6fbbe4eec8
Merge "sepolicy: Add missing mirrorlink rules"
2019-02-19 20:14:00 -08:00
Bruce Levy
dba0a6c89c
sepolicy: Update device nodes for Kona
...
Change-Id: I8068d580792645816a68699041a967d267f85132
2019-02-19 17:31:02 -08:00
Indranil
4f8a7da59d
sepolicy: Add missing mirrorlink rules
...
Add rules which were accidently deleted by other gerrits
Change-Id: Id42b518aee6bed91667e9439ca902e2424ba9fdc
2019-02-19 03:55:40 -08:00
Vara Prasad A V S G
867eadcffe
Merge commit '2fec3186505e747a4fa4fcf7f7a04234858ebb5b' into HEAD
...
Change-Id: Ib7bda7af7764d6492241a9817043ed156a376b86
2019-02-19 11:26:22 +05:30
Vara Prasad A V S G
236cfd1726
Revert "sepolicy: Add sepolicy rules/files for mirrolrink"
...
This reverts commit bf13670060 .
Change-Id: I051f7001eb12c40fccc656077f040e016f74074d
2019-02-19 11:21:52 +05:30
Jaihind Yadav
91a8b0f08b
sepolicy: adding sepolicy changes
...
this chanegs is delta of changes 2588020
Change-Id: I6e5765f0927f22769cce0cb354329b6d3a95d1fd
2019-02-18 21:49:34 -08:00
Jaihind Yadav
78f021fe6a
sepolicy: moving qssi supported legacy target here.
...
Change-Id: Ife7e851823afc1dcbf2f561c8079795e909544bc
2019-02-18 21:49:10 -08:00
Rama Aparna Mallavarapu
a6d05fa912
sepolicy: Update the sysfs paths for the L3 devices.
...
Fix the incorrect sysfs path for the L3 devices so that
postboot scripts can access them.
Change-Id: I16c68615bbb0f66fedc44475cb4774661d60d272
2019-02-18 14:00:45 -08:00
Subramanian Srinivasan
b1777f4010
Add SE policy for Bluetooth SAR HAL
...
Add SE policy for Bluetooth SAR HAL
Change-Id: Iad048c3572baffb1333a0800a86207d518151dc4
2019-02-18 13:17:47 -08:00
Jaihind Yadav
b4e71b14e7
sepolicy: adding permission for hal_perf_default.
...
Due to newrestriction priv_app can't access cgroup.
priv_app is client of hal_perf, so had to remove for hal_perf and adding for hal_perf_default.
Change-Id: I16b7ae208275ca8109fd05eb9cf19950ddf96fe6
2019-02-18 18:47:21 +05:30
Aman Gupta
9723220937
Sepolicy: set the property for dataadpl to start on bootup
...
set the property for dataadpl to start on bootup
Change-Id: I04bd132c50330839d26b177bf2ef2774664a2885
2019-02-18 01:26:02 -08:00
Ravi Kumar Siddojigari
ca429c825f
sepolicy : removed wfdservice access to tee_device
...
Based on the b/120243891 tee_device are not allowed to access
by coredomains (in full treble enabled devices) so removed
the access in wfdservice.te
Change-Id: I6608e08ac8ead3f4823b5443e86d937bd2b472ca
2019-02-18 12:56:17 +05:30
Sai Kousik Swarna
5223a96650
SEPolicy : Add permissions for read MBN configs directory
...
Add permissions to access /data/vendor/modem_config from
RILD and ModemTestMode
Change-Id: Ie4c7123f5703aed125a4025a474738dfbd071808
CRs-Fixed: 2396249
2019-02-17 21:25:01 -08:00
qctecmdr Service
d5df8025f1
Merge "sepolicy : add sepolicy rules require for DPM"
2019-02-17 06:34:57 -08:00
qctecmdr Service
b3b88696a6
Merge "sepolicy: Add ipa_uc"
2019-02-16 00:16:30 -08:00
himta ram
b0dca15f04
sepolicy: add sepolicy support for fm
...
added separate hal_fm_hwservice for fm app.
intialize server and client for hal_fm.
made system_app to be a client of hal_fm
Change-Id: I2a9d9bebb77cecd535017856031e45f077724e94
2019-02-15 20:15:09 -08:00
Indranil
cbdbbf3527
sepolicy: Add missing mirrorlink rules
...
Add rules which were accidently deleted by other gerrits
Change-Id: Id42b518aee6bed91667e9439ca902e2424ba9fdc
2019-02-15 15:55:36 +05:30
Sunid Wilson
6602793f4f
Camera: Update permissions for Camera process
...
- Deleted unnecessary rules
Change-Id: If9fd992c6aa6ff4da1e5527b0de124816aeb3255
2019-02-14 16:39:12 -08:00
Devi Sandeep Endluri V V
705d80ecdd
sepolicy : add sepolicy rules require for DPM
...
Added sepolicy rules required for DPM.
CRs-fixed: 2395418
Change-Id: Id8b08c827735e826e0cd220b2d380092058992a8
2019-02-13 22:40:45 -08:00
qctecmdr Service
2fec318650
Merge "sepolicy : merge of sepolicy.lnx.5.0 to sepolicy.lnx.5.9"
2019-02-12 21:07:02 -08:00
Tharaga Balachandran
5b4a8b5ddb
sepolicy: Add permission for /mnt/vendor/persist/display
...
Allow hal_graphics_composer to access /mnt/vendor/persist/display
Change-Id: I7af786708b2fce5dfdf2930cacc2e47452f6dba3
CRs-Fixed: 2260713
2019-02-12 20:22:58 -05:00
Shaikh Shadul
2b72835fe1
sepolicy: add rules to access sensors power scripts from app
...
Change-Id: I15fc2d53291458079de1a369316d45b1bc638e10
2019-02-12 17:03:56 -08:00
Amir Levy
fcf4269a60
sepolicy: Add ipa_uc
...
Add ipa_uc to subsys1, move venus to subsys2.
Change-Id: I53aeaa7dc73832f2ac7b9c09e594ee70b9af4d86
2019-02-12 10:29:45 -08:00
Ravi Kumar Siddojigari
0bbc2777cd
sepolicy : merge of sepolicy.lnx.5.0 to sepolicy.lnx.5.9
...
as part of keeping common system image syncing the public and
private folder of 2 components.
Change-Id: Ia2bffa5155b001b67ac6c4f9b0cc156c4afb5ad6
2019-02-12 18:57:48 +05:30
Indranil
bf13670060
sepolicy: Add sepolicy rules/files for mirrolrink
...
Add sepolicy rules/files for mirrolrink component
Change-Id: I8123e81079468facd9345cf2c30411699557a893
2019-02-11 06:40:31 -08:00
Linux Build Service Account
1a202a8b71
Merge 17fbf07c6e on remote branch
...
Change-Id: I99aaee45865d098d90a504be3bad1ef3578ea45b
2019-02-10 06:23:29 -08:00
Smita Ghosh
26ff9f0b2b
Sepolicy: add support for capabilityconfigstore
...
1. Define domain for capabilityconfigstore
3. Add type for /data/vendor/configstore folder
4. Allow capabilityconfigstore HIDL Server access/r/w it.
Change-Id: Ic5fdf44f55d2647d34c9bdf574d60bc445256a48
2019-02-08 14:55:41 -08:00
David Ng
e6c6ac2997
kona: Add storage block device and display-related labels
...
Add partition and display-related SELinux labels.
Change-Id: I054dc40dd2f1f150497e1321e1d91d309288ca0f
2019-02-07 11:56:49 -08:00
Chalapathi Bathala
ee029bfa0b
sepolicy: Add file_contexts for kona
...
sepolicy: Add file_contexts for kona
Change-Id: I399bac8b3c558cd638942f4a7705a5e6d8d7bbcc
2019-02-07 10:52:36 -08:00
qctecmdr Service
e3397a0fe4
Merge "sepolicy: Remove diag support from surfaceflinger"
2019-02-07 07:50:58 -08:00
qctecmdr Service
72fda2a24a
Merge "Move qdss sysfs file definition from target folder to common"
2019-02-06 22:24:25 -08:00
Biswajit Paul
3a9b15b59f
Move qdss sysfs file definition from target folder to common
...
This CL fixes the compilation issue due to missing definition
of sysfs_qdss_dev on target other than msmnile. Also fix some
warning while I am here.
Change-Id: I3bc035f13fb0fe13650dac3c2d4b022e789d9f7b
2019-02-06 22:09:14 -08:00
Gurpreet Singh Dhami
0a532f7169
sepolicy: Remove diag support from surfaceflinger
...
Change-Id: Id615edb832ce53fd97975dfd1e3550eb5906fbed
2019-02-06 19:04:54 -05:00
qctecmdr Service
7552c9cbde
Merge "sepolicy: Add support for ipa_uc subsys device."
2019-02-06 11:40:09 -08:00
Tyler Wear
c01d674958
Single System Image
...
Move vendor add sepolicy to specific folder.
Change-Id: Idd18772b023ddf05c6a08d0516383738d823e644
CRs-fixed: 2382338
2019-02-06 17:16:31 +05:30
qctecmdr Service
03f7bef71a
Merge "msmnile: Add odm & product partitions; delete SD card bootup config"
2019-02-05 17:40:35 -08:00
David Ng
5e73656b36
msmnile: Add odm & product partitions; delete SD card bootup config
...
Add odm and product partition labelling.
Unrelated, remove obsolete SD card bootup configuration.
Clean up for consistent column format spacing.
Change-Id: Ie4d76f36a0a594c5af3eda8432cfaec630dd1976
2019-02-05 15:08:11 -08:00
James Shao
48d8241486
Sepolicy update patch to enable Connection Security
...
Change-Id: I69c7e449120a9a448d79128a0eeeea2ee6b8d3a1
2019-02-05 14:50:12 -08:00
Rama Aparna Mallavarapu
8fd6365b75
sepolicy: Add permissions for dcvs nodes
...
Add permissions to the bus dcvs nodes for sysfs
to access it.
Change-Id: Ibf6d4560f15883bb18a10802a3163cc78f29190b
2019-02-04 15:42:10 -08:00
qctecmdr Service
90f20fd4af
Merge "sepolicy: Add sepolicy rules/files for mirrolrink"
2019-02-03 18:51:09 -08:00
Weiyin Jiang
fb4d38659c
audiohalext: add config store interfaces to audio_hwservice
...
Add AHAL extension interfaces to audio hwservice.
Change-Id: I054fd3dcc1b27b0a32b52ba05152290f744fd0c6
2019-02-01 00:52:11 -08:00
qctecmdr Service
510ce76673
Merge "Make sepolicy rules for new domain qtidataservices"
2019-01-31 23:33:29 -08:00
qctecmdr Service
aff9f4ffa6
Merge "Sepolicy: generic: Use codec2 public interface names"
2019-01-31 23:19:07 -08:00
Ankit Jain
675dc5a907
sepolicy: Update sepolicy rules for TFTP and RMTFS.
...
Update the sepolicy for TFTP and RMTFS to include all required
permissions.
Change-Id: I0e08b271cd7bca29ff6fd717ab37e446774e4c55
2019-01-31 12:12:31 +05:30
qctecmdr Service
0861fa9b03
Merge "sepolicy : Correcting path regexp in file_context for sysfs_usbpd_device"
2019-01-30 21:55:12 -08:00
Praveen Chavan
2e8d5e249a
Sepolicy: generic: Use codec2 public interface names
...
update media.c2::IConfigurable to use public names.
NOTE: This is temporary and will be removed since the reworked
service in upstream does not require this
Change-Id: Ic38de94d60014e4a56253415f224b4741f077898
2019-01-30 18:12:31 -08:00
Tyler Wear
18f71a195c
imsrtp - Single System Image
...
Change-Id: I27387725509541a06d9fe4aa8954ffedcf216488
2019-01-30 16:24:45 -08:00
Indranil
ff4a101598
sepolicy: Add sepolicy rules/files for mirrolrink
...
Add sepolicy rules/files for mirrolrink component
Change-Id: I8123e81079468facd9345cf2c30411699557a893
2019-01-30 19:39:49 +05:30
Ravi Kumar Siddojigari
d2acefa3f9
sepolicy : Correcting path regexp in file_context for sysfs_usbpd_device
...
As it was assumed that all the node path of pmic and usb are going
to have hex values in the path where [a-z0-9] was replace with
[a-f0-9] which was leading to regression so correcting them.
Change-Id: I9f3f60e3d68662e9286191965f232625f5dd4bd2
2019-01-30 19:19:32 +05:30
qctecmdr Service
e8e7e08cf2
Merge "sepolicy: add selinux rule for audio ftm test"
2019-01-29 17:40:00 -08:00
Xiaojun Sang
ea2bc4cb6d
sepolicy: add selinux rule for audio ftm test
...
allow mm-audio-ftm to run and access data and config file.
Change-Id: I61803ceb1f746505e846c042c1152ea981289c18
2019-01-30 08:48:33 +08:00
Tapas Dey
bfe7af7df2
sepolicy: Add NFC sepolicy rules
...
Added missing sepolicy rules to fix NFC
enablement issue.
Change-Id: Ib0f6fa8dac34d91eb0664f5285727c4fbb6e39ee
2019-01-29 19:39:18 +05:30
qctecmdr Service
17fbf07c6e
Merge "Sepolicy: Added rules for QTI HANA55 enablement"
2019-01-28 22:30:17 -08:00
Abhinay Reddy Vanipally
dc6ff6d1bc
sepolicy: Add support for ipa_uc subsys device.
...
Add support for ipa_uc subsys device
Change-Id: I23d39e183ae3f2ddaaf9d178fd17bb2a32294d3a
2019-01-28 10:21:28 -08:00
Linux Build Service Account
c2928abb5e
Merge 5c1c005e3f on remote branch
...
Change-Id: I2956fa1afd748686ceaf5bb5e59875dc0f29a471
2019-01-28 06:21:50 -08:00
qctecmdr Service
d765654f62
Merge "sepolicy: add audio rules to qva folder"
2019-01-28 01:39:21 -08:00
qctecmdr Service
64bfa45fc3
Merge "common: Move sscrpcd from targets to common path"
2019-01-28 01:19:38 -08:00
qctecmdr Service
7e7eb94c2d
Merge "sepolicy :: Addition of sepolicy for cvphal"
2019-01-28 01:02:46 -08:00
qctecmdr Service
4cd8dfb4ac
Merge "FR53056 for Connection Security."
2019-01-28 00:44:42 -08:00
shoudil
d5509a4dba
sepolicy: add new property and sepolicy
...
Add property ro.vendor.qti.va_aosp.support and sepolicy.
The property will be used to detect the framework type
at runtime.
Change-Id: Id5ede408641cd371d546ee5b35087c71781e380b
CRs-Fixed: 2379644
2019-01-24 21:32:14 -08:00
Aman Gupta
2e892172ec
Sepolicy: Added rules for QTI HANA55 enablement
...
QTI policies for MHI node retrival
Change-Id: I2a252638c1f167162954206d0ebfac390e1fa756
2019-01-24 18:29:11 -08:00
Vikram Panduranga
d1c36a1d5e
sepolicy: add audio rules to qva folder
...
Add delta audio rules that are needed to
support value add features into qva folder.
Change-Id: I39ab747df98b067b78e7009d198f7a7837d5bd4d
2019-01-24 11:27:48 -08:00
Vivek Arugula
087da0cd30
common: Move sscrpcd from targets to common path
...
Change-Id: Ia28decb18c387bc22408b70a55b9fc21f01f3c63
2019-01-24 10:50:53 -08:00
James Shao
6f4bddb347
FR53056 for Connection Security.
...
Enable SSG sepolicy on latest Android versions.
Port LA.1.0 Connection Security sepolicy to LA.2.0.
sepolicy.lnx.4.0 to sepolicy.lnx.5.9
Change-Id: I20c2f5b099baa4664f48e72225cd962a09893991
2019-01-24 09:56:23 -08:00
suchawla
6deb2681cc
sepolicy :: Addition of sepolicy for cvphal
...
Cvp is a new computer vision hardware
which interacts with DSP and video driver.
Adding new ion mem permission for cvp domains.
Change-Id: I6c2118b15cf5ccc6505c80969c4090e3396238e4
2019-01-24 13:31:00 +05:30
qctecmdr Service
5c1c005e3f
Merge "sepolicy: add rs_exec permissions to org.codeaurora.snapcam"
2019-01-23 23:32:19 -08:00
qctecmdr Service
a23c904f84
Merge "sepolicy : removed duplicate definations from hwservice_contexts"
2019-01-23 21:36:05 -08:00
qctecmdr Service
93b5ce4f01
Merge "sepolicy: add bt prop permission to audio hal"
2019-01-23 16:59:06 -08:00
qctecmdr Service
b840fc09b1
Merge "Added device sepolicy rules for NN HAL 1.2 implementation"
2019-01-23 15:19:14 -08:00
vijay.rayabarapu
ff7b884e6c
Sepolicy: adding new line to property context file
...
Change-Id: Ic384df1fcd2bdc58ce017e44468dbfe8cfc9f42e
2019-01-23 12:19:18 -08:00
qctecmdr Service
2643556c36
Merge "Associate proc_type to proc_audiod and add qti_debugfs fs_type"
2019-01-23 11:33:37 -08:00
Srinu Jella
ef2fbd28be
sepolicy: add bt prop permission to audio hal
...
- Sepolicy rule added to read bluetooth property
to be read from Audio hal.
Change-Id: Ib9b19b6d00747938e7cbbf87b6324c37e22f5973
2019-01-23 14:55:55 +05:30
Ravi Kumar Siddojigari
00a7d989e1
sepolicy : removed duplicate definations from hwservice_contexts
...
build error as following are address by removing the duplicate defs
Multiple same specifications for vendor.qti.hardware.iop::IIop.
Multiple same specifications for vendor.qti.hardware.alarm::IAlarm.
Change-Id: I2b3de7d4155aaef141fbe9f7bb30161e214767cd
2019-01-22 22:26:09 -08:00
Jaihind Yadav
4e58a85d79
sepolicy: add rs_exec permissions to org.codeaurora.snapcam
...
Bug: 123050471
Change-Id: I6bbd8b89b494b8529060eb33a8b8ce79c7cecf7c
2019-01-22 16:29:17 +05:30
Mahesh Kumar Sharma
4b7b683bdb
sepolicy: grant write permission of rkill state to bluetooth
...
Add label for rfkill and extldo node and grant
writeable permission to bluetooth.
Change-Id: I6cb08069193dcf29675d35bfa4d91d2729cc0518
2019-01-21 14:34:57 -08:00
qctecmdr Service
c02d1b31ae
Merge "sepolicy: added permissions needed for atfwd"
2019-01-21 01:09:30 -08:00
qctecmdr Service
82252acb81
Merge "sepolicy: Add gralloc.qcom to SP HALs"
2019-01-21 01:01:01 -08:00
Huang Li
b47502c653
Sepolicy: Porting QMMI/FFBM Sepolicy from sepolicy 4.0 to 5.9.
...
Porting all relative sepolicy files for factory test.
Change-Id: I573bd39f5071a646bb38854027e066b09602b9f1
CRs-Fixed: 2374478,2374492,2374499,2374503
2019-01-21 13:14:43 +08:00
Biswajit Paul
5edc732c57
Associate proc_type to proc_audiod and add qti_debugfs fs_type
...
proc_audiod was mising the attribute proc_type. Add the same to
fix compilation when proc_audiod rules are added. Also add qti_debugfs
to enable usage of the same.
Change-Id: I160a576dc2ea3ad5f9e9d5c7327ebabdabbc051a
2019-01-18 16:31:55 -08:00
Naseer Ahmed
e025f2ec9a
sepolicy: Add gralloc.qcom to SP HALs
...
Change-Id: I22465657ce3db65fce34579889b8c6762301db45
CRs-Fixed: 2383034
2019-01-18 19:14:26 -05:00
Wileen Chiu
5d9c5005f1
sepolicy: added permissions needed for atfwd
...
Adding sepolicy rules for denials seen for
atfwd daemon.
Change-Id: Id4b0e2a36222ca12dfe5a6ec4121ab7cf605afe5
2019-01-18 15:09:52 -08:00
John Zhao
0dbba5d923
sepolicy: timezone to be overrided by vendor
...
Allow the timezone to be overrided by vendor
CRs-Fixed: 2293241
Change-Id: I5f253df2ecb41013c9ab33d2087f2e0e2ea9e25a
2019-01-17 23:08:50 -08:00
Alex Kuoch
a20bceae50
Added device sepolicy rules for NN HAL 1.2 implementation
...
Change-Id: Ibedaf1e6b3756664398a2e7f7ebbea9de069ca06
2019-01-17 16:13:13 -05:00
qctecmdr Service
baf172aa10
Merge "sepolicy: add sepolicy for secure ui data files"
2019-01-17 04:37:36 -08:00
Rajesh Yadav
d4888158be
sepolicy: add sepolicy for secure ui data files
...
Add /data/vendor/tui dir read permissions to tee
to allow dynamic font loading by sui listener.
Change-Id: Ibbb6b27ed896e89d9eab3fc91e58feef6759c079
2019-01-17 17:48:30 +05:30
qctecmdr Service
8087eab689
Merge "Sepolicy: Address bootup denials for configstore"
2019-01-17 00:27:52 -08:00
Divya Sharma
48af07427e
file removed generic/vendor/common/drmserver.te
...
Change-Id: Ie5509b96206257dabbb8ddecaa3ab560971df9a4
2019-01-16 21:47:47 -08:00
qctecmdr Service
f98e11ea8a
Merge "sepolicy: configure framework detect jni as SP-HAL"
2019-01-14 01:05:18 -08:00
qctecmdr Service
a7fef51c5b
Merge "selinux: Add policy for port-bridge to support mhi"
2019-01-13 23:31:40 -08:00
qctecmdr Service
6ad10fec94
Merge "Camera: adding sepolicy for accessing vendor properties"
2019-01-13 23:15:19 -08:00
Mohamed Sunfeer
319cd450b9
sepolicy: Add selinux rules to disable SPU
...
Add disable SPU property to allow OEM to disable SPU.
Change-Id: I60a98f87d7557ea9263843ed8d475c091c5e634c
2019-01-11 16:40:21 +05:30
Sauhard Pande
1b99037858
Camera: adding sepolicy for accessing vendor properties
...
Issue: To access and read vendor.camera.aux.packagelist
and persist.vendor.camera.privapp.list. Needed to identify
priviledged app and dual camera exposure
Fix: Accessed only on system side thus added flags as
extended_core_property_type
Change-Id: I9518e88cdbc8411a9c070cc01a000442828715a4
2019-01-10 22:16:36 -08:00
Sean Tranchetti
ee012cbc25
selinux: Add policy for port-bridge to support mhi
...
Allow port-bridge to operate over the mhi interface.
Change-Id: I1aa0a6ddf2a39344a7e1e56c928cc6947cf8640d
2019-01-10 12:22:31 -07:00
Ankur Sharma
6ed23be2cd
Make sepolicy rules for new domain qtidataservices
...
Adding rules and binder call for the new domain
qtidataservices_app which is created as part of
moving cne's certifciate API's from system to
vendor partition.
Change-Id: I1b67595e413983a925d4be4ad182e748de68e309
CRs-Fixed: 2378996
2019-01-10 19:19:51 +05:30
Archit Srivastava
4631b2782b
Sepolicy: Address bootup denials for configstore
...
Allowing surfaceflinger to check HDR and WCG Supported at run time from
hardware to override hardcoded values defined in $TARGET.mk
Change-Id: Id4857b9d790b73b787e20f7cbc46d3dcf34a47ea
2019-01-10 17:47:12 +05:30
Aman Gupta
41b5846702
Sepolicy: Addressed the DATAQTI denials for IPC Router socket
...
Addressed the DATAQTI denials for IPC Router socket
Change-Id: I95bdcbf7608e0973d616cf89a5022bf324247a91
2019-01-09 07:56:21 -08:00
shoudil
1c4c060c2a
sepolicy: configure framework detect jni as SP-HAL
...
Allow vendor apk to access share libs under /vendor
to dynamically detetct framework as modified or purs
AOSP.
Change-Id: Ic5a755fcd2bc8042db9294aff2d7ec69d9db0385
CRs-Fixed: 2376508
2019-01-09 16:54:38 +08:00
Linux Build Service Account
205b5e1f58
Merge f9adb88fe8 on remote branch
...
Change-Id: Ia71b2674060d3983b85ea5839503b8a8926fa5c7
2019-01-08 15:29:05 -08:00
qctecmdr Service
714332895d
Merge "sepolicy: Label /data/vendor/tombstones and provide access for rfs_access"
2019-01-07 22:32:02 -08:00
Eric Chang
baff8e9b42
Create new sepolicy domain for qtidataservices
...
Adds selinux policies required to move CNE's certificate
API from system to vendor partition
Change-Id: I37cc2f23a4b776807e4333c04710eb49b70a7e62
2019-01-07 10:20:40 -08:00
Abhinay Reddy Vanipally
019acee551
sepolicy: Label /data/vendor/tombstones and provide access for rfs_access
...
changing the label /data/vendor/tombstones and provide access for rfs_access
Change-Id: Ia05abd97c0125a9d2af183524d1d8731aa8303c0
2019-01-03 09:29:45 -08:00
Aman Gupta
b576ecfec9
Sepolicy: Addressed the DATAQTI denials for IPC Router socket
...
Addressed the DATAQTI denials for IPC Router socket
Change-Id: I95bdcbf7608e0973d616cf89a5022bf324247a91
2019-01-02 03:16:33 -08:00
Shaikh Shadul
f9adb88fe8
sepolicy: initial sensors policy changes for common image
...
Change-Id: I7bc74d7b90ef39d878cd4b096713c66f818b4fe6
2018-12-26 14:28:45 +05:30
qctecmdr Service
a7d9f7bc9e
Merge "sepolicy: msmnile: add esoc ssr node"
2018-12-20 23:44:48 -08:00
qctecmdr Service
ae7ff39c1f
Merge "sepolicy: add policies for mdm_helper"
2018-12-20 23:25:54 -08:00
qctecmdr Service
5bfbe5e910
Merge "Add genfs_contexts file for Kona Q"
2018-12-20 23:10:45 -08:00
Eric Chang
d792669537
selinux: Add policy for rild to add IDataConnection HAL
...
Denial
SELinux : avc: denied { add } for interface=
vendor.qti.hardware.data.connection::IDataConnection pid=5619
scontext=u:r:rild:s0 tcontext=u:object_r:default_android_hwservice:s0
tclass=hwservice_manager permissive=0
Change-Id: I0d3eedf7e001179f6ed6faa7b2ae93ea2df9306c
2018-12-19 11:25:22 -08:00
Jaihind Yadav
f45cc554e4
sepolicy:removed system_file access for the domain
...
netmgrd and qti_init_shell is accessing system file.
due to newrestriction in AOSP it is throwing build error.
So removing it.
Change-Id: I5c43c38ac0d7e47c9b602a484ceb7b70322debc8
2018-12-19 05:27:49 -08:00
Sahil Madeka
a77ced9488
Add genfs_contexts file for Kona Q
...
Change-Id: Icdd1fe857e76c3d0554d911612fb15562af29925
2018-12-19 04:15:01 -08:00
qctecmdr Service
6efd0a5ed9
Merge "sepolicy: removing /firmware and /bt_firmware labeling"
2018-12-19 01:23:51 -08:00
Jaihind Yadav
a0c3217131
sepolicy: removing /firmware and /bt_firmware labeling
...
/firmare and /bt_firmware is not there for this target.
So removing labeling of these partition from file_contetxs.
Change-Id: I246dae55956421c502c4eb0a46ea8579187240ee
2018-12-19 00:58:01 -08:00
Jaihind Yadav
0ad82e0e41
Revert "sepolicy: priv_app is no longer client of hal_perf."
...
This reverts commit ccc837d327 .
Change-Id: If69d4a4b27e7b6d69c2ee0dabd5d41d4c4429f98
2018-12-18 02:04:13 -08:00
Jaihind Yadav
672e3dbde7
sepolicy: removing legacy target dir.
...
this target is no longer would be supported on this compponent.
So removing it.
Change-Id: I70c96a029a476c8067182bdd6dbb0b25d683791a
2018-12-18 12:45:20 +05:30
qctecmdr Service
70e43bc400
Merge "Add macro for framework type detection module"
2018-12-17 01:09:00 -08:00
Linux Build Service Account
d5fdcbbad2
Merge 4327d05bdd on remote branch
...
Change-Id: I731b8ac931f1170c454906c9c2f4e7376613e38e
2018-12-17 00:19:28 -08:00
Jaihind Yadav
ccc837d327
sepolicy: priv_app is no longer client of hal_perf.
...
Due to newrestriction priv_app can't access cgroup.
And priv_app is client of hal_perf, so had to remove it.
Change-Id: Idb17f438e06bdd71df235072eec4973556ce09d0
2018-12-14 18:48:08 +05:30
Smita Ghosh
0f0c42fe37
Add OTA support for multiimgoem
...
update_engine needs rw access to each of the partitions that needs to
be updated by OTA.
Change-Id: Id3af536cebd2e280abf89443cb9ac445e009aa7d
2018-12-12 18:42:46 -08:00
Adam Bickett
ec9e378641
sepolicy: msmnile: add esoc ssr node
...
Add esoc node to sysfs_ssr type. This is required to allow subsystem
queries for targets with external modem.
Change-Id: Ib2f559e27770a5b113e77672554825904b5c707d
2018-12-11 23:04:47 -08:00
Chalapathi Bathala
41c6bfc0aa
sepolicy: add policies for mdm_helper
...
Add policies for mdm_helper
Change-Id: Ie233107671fd9566f822d54bc1cd0b22286ca6f3
2018-12-11 10:41:56 -08:00
David Ng
8546ead68d
Add macro for framework type detection module
...
Add permissions needed for clients to use the
vendor framework detection library module. All
native clients using the framework detection
module must use the macro for their domain.
The existing permission needs are empty
(already part of domain) but added placeholder
to allow any underlying mechanism changes that
may require new permissions.
Change-Id: I88de640608e673a77a357afce11af8cb4d01e2d9
2018-12-07 12:37:19 -08:00
Linux Build Service Account
4327d05bdd
Merge "sepolicy: kernel.te: Add qipcrtr_socket permissions" into sepolicy.lnx.5.9
2018-12-06 09:15:08 -08:00
Chris Lew
9f53c9f73d
sepolicy: kernel.te: Add qipcrtr_socket permissions
...
Give kernel permissions to create qipcrtr_socket which is used for
diag and kernel qmi.
Change-Id: Id7911a882ea39b9dc84344f38466e845aef3dbd8
2018-12-05 01:02:42 -08:00
Chris Lew
e0eb6bb836
sepolicy: kernel.te: Add qipcrtr_socket permissions
...
Give kernel permissions to create qipcrtr_socket which is used for
diag and kernel qmi.
Change-Id: Id7911a882ea39b9dc84344f38466e845aef3dbd8
2018-12-04 16:30:52 -08:00
Linux Build Service Account
e20b53e96a
Merge c21eb88d4b on remote branch
...
Change-Id: Ic5631dbc718a67d488cea87daea0cd857e03c5e3
2018-12-04 11:02:46 -08:00
Hemant Gupta
383fbb48eb
sepolicy : Address BT denials resulting in error popups
...
Address BT denials resulting in error popups.
Change-Id: Ifba5c183739663113dd58814fbf445ae51cefd77
2018-11-28 10:01:54 -08:00
Eric Chang
9413225997
selinux: Add policy for rild to add IWlan HAL.
...
Change-Id: Ife3b1197be06593aae1eb031f79ca64c513d8b6e
2018-11-27 13:35:49 -08:00
Hemant Gupta
c21eb88d4b
sepolicy : Address BT denials resulting in error popups
...
Address BT denials resulting in error popups.
Change-Id: Ifba5c183739663113dd58814fbf445ae51cefd77
2018-11-27 16:21:06 +05:30
Ravi Kumar Siddojigari
85919d9661
sepolicy : cleanup and misc denials addressed .
...
as part of bringup addressed misc denials and code cleanup
Change-Id: Ifba5c183739663113dd58814fbf445ae51cefe77
2018-11-16 13:09:15 -08:00
Siddeswar Aluganti
d7bc99211f
Fix build error.
...
Change-Id: I96aef4e64d51c4d5f7bb10a1d9a91a468d230107
2018-11-16 13:09:10 -08:00
Siddeswar Aluganti
640fdb28fc
Fix build errors.
...
Change-Id: If024d9253ad12fcbeab755f1e77421ec20f28b95
2018-11-16 13:09:07 -08:00
Vara Prasad A V S G
7d02f97b4d
sepolicy : remove system_writes_vendor_properties_violators
...
As part of treble system /core services are not allowed to
set vendor property .
if Property defined is part of system image then it can be set
or get by core/system services provided we define the property
as extended_core_property_type. So adding this to the property
that are added by vendor and used by core/system services.
Change-Id: I7ad8bc562be09126c082fc54f52499f5138fea5b
2018-11-16 13:08:56 -08:00
Ravi Kumar Siddojigari
4106db5b4f
sepolicy : cleanup and misc denials addressed .
...
as part of bringup addressed misc denials and code cleanup
Change-Id: Ifba5c183739663113dd58814fbf445ae51cefe77
2018-11-15 22:25:34 -08:00
Vara Prasad A V S G
1287d1c879
sepolicy : remove system_writes_vendor_properties_violators
...
As part of treble system /core services are not allowed to
set vendor property .
if Property defined is part of system image then it can be set
or get by core/system services provided we define the property
as extended_core_property_type. So adding this to the property
that are added by vendor and used by core/system services.
Change-Id: I7ad8bc562be09126c082fc54f52499f5138fea5b
2018-11-15 03:41:05 -08:00
Siddeswar Aluganti
69f3ff2c7d
Fix build errors.
...
Change-Id: If024d9253ad12fcbeab755f1e77421ec20f28b95
2018-11-14 14:37:31 -08:00
Siddeswar Aluganti
424bfd1ce2
Fix build error.
...
Change-Id: I96aef4e64d51c4d5f7bb10a1d9a91a468d230107
2018-11-13 15:25:23 -08:00
David Ng
f555172e7b
Add JTAG console labeling (hvc0) and fix generic/vendor/test
...
Add console labeling for JTAG console device. Debug builds only
as not expecting console via JTAG in a commercial configuration.
Fix generic/vendor/test policy pickup.
Change-Id: I03257ad59f7b4f41680da3942606dd40c147bcbf
2018-11-08 18:40:06 -08:00
mraja
b2fbfd7d3a
sepolicy: following the AOSP model to label the nodes.
...
sdd node was labeled as ssd_Device for some target but ssd_block_device for other.
So making it unique across all target.
Change-Id: I1248585c0c6ab33fbc9daaa8d0ab8d6299ec2fb8
2018-11-02 18:17:29 +05:30
Ravi Kumar Siddojigari
ddf399906e
sepolicy :[2/2] fix system_file_type and get_prop for coredomians.
...
As part of new AOSP restriction all the domains which are working
from system partation should have "system_file_type" attribute
else will lead to compile time failure .
For reading / setting any property we should be using
following macros .
set_prop( domain, property_label)
get_prop( domain, property_label)
So addressing these as part of new requirments .
Change-Id: Ie7a9c72994f3a1a62f8cf70d40a3a56d494a1726
2018-11-02 14:21:31 +05:30
Ravi Kumar Siddojigari
59906d1904
sepolicy : cleanup of duplicate rules #1
...
domain.te already had given access to
r_dir_file({domain - isolated_app}, sysfs_soc);
r_dir_file({domain - isolated_app}, sysfs_esoc);
r_dir_file({domain - isolated_app}, sysfs_ssr);
r_dir_file({domain - isolated_app}, sysfs_thermal);
so removing all the duplicate rules covering this
Change-Id: Ic74a8c62a81567dbe5bfc69f691bc2239565ba5f
2018-11-02 01:21:27 -07:00
Jaihind Yadav
f90c624e54
sepolicy: fix system_file_type and get_prop for coredomians.
...
As part of new AOSP restriction all the domains which are working
from system partation should have "system_file_type" attribute
else will lead to compile time failure .
For reading / setting any property we should be using
following macros .
set_prop( domain, property_label)
get_prop( domain, property_label)
So addressing these as part of new requirments .
Change-Id: I6ef373404640f285a57484024665a42f615ce863
2018-11-02 01:21:04 -07:00
Jaihind Yadav
fd253c8e33
sepolicy: changes needed to get the target boot to UI.
...
Adding the label to services/daemon which was not getting started due to
incorrect label and add the sepolicy rules to get the target to boot
in enfrocing mode.
Change-Id: I12fc4bfe38153cd51fb2d9b869f05a06c9d2c61f
2018-11-01 15:47:55 -07:00
Jaihind Yadav
07a6077476
sepolicy: inital commit for seperation of generic to qva
...
restructuring dir sturcture.
adding support of upcomming target.
Change-Id: I6b23e7c0c8bed79146b29c681c7ef1f5311e1234
2018-10-31 17:47:16 +05:30
Murtuza Raja
a6efa300ce
Fix compilation errors for a new SP
...
-Remove violating sepolicy rules
-Several sepolicy rules are violating new neverallow rules
-Rename mediacodec to hal_omx_server
Change-Id: I92e46378092f14b7ceab9b946207f006ce0e2611
2018-10-09 11:42:28 +05:30
Tharun Kumar Merugu
7afc43d8da
Sepolicy: Add sysfs L3 permissions to init_shell domain on SDM710
...
Cdsprpcd domain listens to L3 clock requests from CDSP and votes
for CPU L3 frequency via sysfs_devfreq_l3cdsp node. The change
allows init shell to modify l3-cdsp governor to userspace
facilitating Cdsprpcd daemon in voting for L3 clock on SDM710.
Change-Id: Icf8c4a3e6ff282e0204317a33dd79d1fa67bd804
2018-09-30 21:22:54 +05:30
Linux Build Service Account
6bc46b9a25
Merge "sepolicy: add domain for sysmonapp applications"
2018-09-29 00:24:20 -07:00
Linux Build Service Account
4919ce2c49
Merge "sepolicy: add policy file for USTA test app"
2018-09-27 19:04:02 -07:00
Tharun Kumar Merugu
3fd09c4fd0
sepolicy: add domain for sysmonapp applications
...
Add a domain with necessary permissions for sysmonapp applications
signed using the certificate provided.
Change-Id: Id61eb7e263cf83724305eda624fb06c2df5ac555
2018-09-27 17:19:31 +05:30
Shaikh Shadul
4919e7e29b
sepolicy: add policy file for USTA test app
...
USTA is a system app which interacts with fastRPC to communicate
to SLPI. There are changes in fastRPC to access require DAC and MAC
permissions, required only by USTA test app. Adding separate domain
for USTA app.
Change-Id: I89c1beff1c10d341e678f7ae654dc16d2c184a83
2018-09-25 17:30:33 +05:30
Ravi Kumar Siddojigari
245caecf01
sepolicy : add permission to read “ ro.vendor.build.security_patch"
...
Compliance testing expected to check this property value and this
is public readable property so adding all domain read access.
Change-Id: I6bf54f8d3e36abff5d7be698b6af5517347fb733
2018-09-24 23:53:38 -07:00
Linux Build Service Account
7cfcfce1b5
Merge "sepolicy for all IGnss/ILocHidl services"
2018-09-24 14:15:49 -07:00
Baili Feng
f68d9350d9
sepolicy for all IGnss/ILocHidl services
...
Change-Id: I9fa8be7d18a9be27f4591ddadf91d80eb1460b24
CRs-Fixed: 2215791
2018-09-20 11:30:29 -07:00
Smita Ghosh
b4ab913dbe
Add sepolicy rule for sysfs_ssr
...
Change-Id: I8f50fcda192bef3aaab534bc097f8b152fe8bc52
2018-09-20 05:40:34 -07:00
Hans Chang
90bfed3b79
Added msm8996 and files
...
Change-Id: I1a558eeb9d8b0c2fb39d1307581d6c4b2fbdb93a
Signed-off-by: Hans Chang <hansc@codeaurora.org >
2018-09-11 17:05:39 -07:00
Mukul Sharma
7097824b33
sepolicy: Add vendor wifi prop in vendor partition access
...
Due to never allow for wifi_prop, vendor process cannot
access the system wifi_prop property. But in certain
scenario other process need it. Hence add a support of
same.
Change-Id: I6648e0e038888e79bee5f987bc584ad126924a66
CRs-fixed: 2293118
2018-09-04 12:44:09 +05:30
Mao Jinlong
4145969d92
init_shell: Add set_prop policy to alarm_boot property
...
Init shell need to set alarm boot property to indicate that if the
boot-up is triggered by rtc alarm.
Change-Id: I0d692b1f92695b399e73021eb84bda2dda6142eb
2018-08-29 10:57:42 +08:00
Ramkumar Radhakrishnan
b3cb68136e
sepolicy: Removal of hal_display_config attributes
...
1. Remove hal_display_config attributes and replace it with
hal_graphics_composer.
2. Provide permissions to all hal_graphics_composer client to access
hal_display_config service.
Change-Id: I6c91dbe8797d6ffe47f99e21b810f7ac72503f02
CRs-Fixed: 2287704
2018-08-27 16:39:42 -07:00
Aditya Nellutla
f9f6d1d504
sepolicy: White list vendor specific graphics properties
...
This change adds new graphics vendor properties and fixes
permissions to resolve sepolicy denials.
Change-Id: Ibcf25e680ccd9b56607f6520fe712a78b3f93a9d
2018-08-21 16:38:26 +05:30
Ramkumar Radhakrishnan
51f8af3330
sepolicy: Allow system graphics to access pmic secure_mode nodes
...
Change-Id: I9fc932d76f9eceb157c0b48cf1d666cde6b55e59
CRs-Fixed: 2289554
2018-08-13 10:49:49 -07:00
Kiran Gunda
ca6a427fa6
vendor: sdm845: add lcd_bias node for sepolicy
...
Add lcd_bias nodes for common sepolicy rules.
Change-Id: I32ef96235ca3091d28744d9fd0143d7e2fb1fcf6
Signed-off-by: Kiran Gunda <kgunda@codeaurora.org >
2018-08-11 15:19:44 +05:30
Ruthwar Ambeer
8c6e09b1b3
Allow rild to get qmuxd_socket create permissions.
...
This change is to add sepolicy rules to get create
permissions for qmux_socket.
Change-Id: Ifc9665d5451c1887a725a032807f225efefb4a10
CRs-Fixed: 2287953
2018-08-09 17:42:33 +05:30
Linux Build Service Account
f12882015a
Merge "vendor: sdm845: add spmi devices file permission context to genfs_contexts"
2018-08-08 09:43:51 -07:00
Linux Build Service Account
05c41a75c5
Merge "sepolicy: Add sepolicies for LED sysfs nodes"
2018-08-07 22:09:37 -07:00
Abhishek Arpure
eae684795b
Remove unused property "ro.build.software.version"
...
"ro.build.software.version" is not getting set anymore.
Its presence in property_context is causing VNDK failure.
Remove it to fix testVendorPropertyNamespace failure.
Change-Id: Icaf8c4e1195b10712208bb5a331572ce78243560
2018-08-06 15:15:55 +05:30
Linux Build Service Account
4db54b7b2f
Merge "sepolicy: setting secontext to rtc node"
2018-08-03 04:05:30 -07:00
Linux Build Service Account
dd818b92c4
Merge "Sepolicy: Allow processes to access new restricted DSP device node"
2018-08-01 13:06:20 -07:00
Tharun Kumar Merugu
aec6e0f2ec
Sepolicy: Allow processes to access new restricted DSP device node
...
Allow the known processes to offload to ADSP / SLPI using the new
device node.
Change-Id: Icaf8c4e1195b10711208bb5a331572ce78143560
2018-08-01 17:31:47 +05:30
Linux Build Service Account
7afdc18d5e
Merge "sepolicy: Fix for rild vndk compliance"
2018-07-31 19:18:23 -07:00
Shshank Sharma
03e13e5fdc
sepolicy: Fix for rild vndk compliance
...
CRs-Fixed: 2284930
Change-Id: Ie90f051a80b0aaf0eb0cd3b437eec439177054d1
2018-07-31 13:52:10 -07:00
Linux Build Service Account
0806a528fc
Merge "sepolicy: Add permission to read BD address from modem NV"
2018-07-31 12:51:25 -07:00
Linux Build Service Account
77d4317950
Merge "sepolicy: Add property context for vendor GPU frequencies"
2018-07-31 12:51:24 -07:00
Jaihind Yadav
9b975284c7
sepolicy: setting secontext to rtc node
...
Change-Id: I6b7bb083d995e028bef17ccddc519cdb06cea377
2018-07-31 12:08:05 +05:30
Bandari Ramesh
3d1648139a
sepolicy: Add permission to read BD address from modem NV
...
- These se policy changes are required by bt HAL daemon
to interact with QMI module to get BD Address from modem NV
CRs-Fixed: 2139166
Change-Id: I37e73a6670d23012655fe8eb094a84ed7eea35d1
2018-07-30 23:13:26 -07:00
Archana Sriram
dad7306f06
sepolicy: Add property context for vendor GPU frequencies
...
Added property vendor.gpu.available_frequencies and
rule to allow init_shell to set this property.It resolves the
below avc denial.
selinux: avc: denied { set } for property=ro.gpu.available_frequencies
pid=686 uid=0 gid=0 scontext=u:r:qti_init_shell:s0
tcontext=u:object_r:default_prop:s0 tclass=property_service
permissive=0
CRs-Fixed: 2283789
Change-Id: I102a33cbfd7f2f538751f98e88ae0e434e94cea5
2018-07-30 18:15:41 +05:30
Uday Kiran Pichika
5ebac4853a
sepolicy: Add sepolicies for LED sysfs nodes
...
Charging LED indicator is not working due to sepolicy
issues. Added the related LED policies
CRs-Fixed: 2109021
Change-Id: Ia5476e9981973fba685d0d21127f2db27e47ddbb
2018-07-30 18:00:47 +05:30
Tyler Wear
9d99681f56
sepolicy: tetheroffload diag
...
Rule to allow tetheroffload to search for a dir.
Change-Id: Ica2b6e7528ed4538f3d04ba27ec40bc224bf7c96
2018-07-26 14:03:16 -07:00
Phalguni
e67f776f6a
sepolicy: add drm v1.1 to file context
...
add new rules to allow copy of data between old certificate path
and new cerificate path
Change-Id: I6094a2467066a0f50e292d67bae84e7ca02160cd
2018-07-25 10:13:36 -07:00
Umang Agrawal
bac23c7028
vendor: sdm845: add spmi devices file permission context to genfs_contexts
...
Add battery_supply, leds, usb_supply and graphics context nodes for spmi
devices to genfs_contexts file, to allow proper access permissions to
hvdcp_opti and healthd.
Change-Id: If111e5d32a7acdbb75a1bb2d9f3f64b4fc740857
2018-07-24 19:31:06 +05:30
Linux Build Service Account
fc5556a815
Merge "sepolicy: Update qseecomd sepolicy on tzstorage data folder"
2018-07-16 11:36:29 -07:00
Tharaga Balachandran
4b3c3a9f36
Display: Refactor display property contexts
...
- Delete redundant property contexts (sdm.idle_time, vendor.display.idle_time).
- Rename gralloc debug property context to vendor_gralloc_prop.
- Add ro.vendor.display and persist.vendor.display to vendor_gralloc_prop context.
- Remove vendor property context for debug.sf.nobootanimation
and qem.gles as these are system properties.
- Remove ctl.ppd which is deprecated.
CRs-Fixed: 2258755
Change-Id: Id874ba942432b5cc0141c02bbe9e52c93a3a5526
2018-07-10 16:26:07 -04:00
Tharaga Balachandran
a7acdea410
Display: Add property context for vendor display properties
...
Remove vendor property context for lcd density
Change-Id: I37ecf245e2db3b813bd7a97db2ecd43d9a6a62c8
CRs-Fixed: 2251892
2018-07-10 16:26:07 -04:00
Sandeep Gutta
c89ad9311e
vendor_init: add set_prop for vendor_radio_prop
...
Add set_prop for vendor radio related properties.
This is to give access for vendor init scripts to able to do
set_prop of vendor radio system properties.
Change-Id: I28036d94a2475720064bc563e1bc25ea8e805106
CRs-Fixed: 2246590
2018-07-09 11:45:08 -07:00
Rafeeqh Shaik
ae223fd7ea
Add permission to get vendor_pd_locater_dbg_prop for rild
...
Add permission to get vendor_pd_locater_dbg_prop for rild
Change-Id: Iae91ce96b0a1496e02760ee697dd6a11b6c74ad8
CRs-Fixed: 2243653
2018-06-28 11:33:18 -07:00
Rafeeqh Shaik
c4856e6f7d
Allow access to exported properties
...
Allow rild, qti_init_shell to access exported3_radio_prop.
Change-Id: I9348d4962098ac681748e8a59855388258b30feb
CRs-Fixed: 2244637
2018-06-28 11:25:24 -07:00
Linux Build Service Account
e44cdf646a
Merge "Add rule to access vendor radio properties"
2018-06-28 03:43:26 -07:00
mohamed sunfeer
d576738d45
sepolicy: Update qseecomd sepolicy on tzstorage data folder
...
update qseecomd policy to allow sfs listener to write to
/data/vendor/tzstorage folder.
Change-Id: I452fbdac22e4ab9df54c6a142c20d9e8e9816feb
2018-06-26 14:26:08 +05:30
Linux Build Service Account
ab6975a01d
Merge "Alow update_engine to access all the partitions"
2018-06-25 18:07:59 -07:00
Linux Build Service Account
5cf63ad70c
Merge "Allow rild to access the debug prop"
2018-06-25 18:07:58 -07:00
Linux Build Service Account
3536e7c8e3
Merge "sepolicy: vendor cne"
2018-06-23 18:04:58 -07:00
Garik Badalyan
2dac2c6ee0
Add rule to access vendor radio properties
...
This change is to add get_prop rule to access
vendor radio properties in system space.
Change-Id: Ie10458ab6b83b36f8e464fcaf55c52f44ade170b
CRs-Fixed: 2254471
2018-06-22 17:50:01 -07:00
Brandon Solis
cfe203ebef
sepolicy: vendor cne
...
Added persist.vendor.cne. , persist.vendo.cnd and ro. to property contexts
Change-Id: I0475bcc1eff2b2ca04b2945eee40e786db7c660f
2018-06-22 16:41:21 -07:00
mraja
d7480654c1
sepolicy: update sepolicy for modem partition for sdm710
...
Update the sepolicy rules for modem dev nodes
Change-Id: I1539c3f28faf76cb17f191628d084521ca723874
2018-06-22 15:13:11 +05:30
Linux Build Service Account
db6981b944
Merge "sepolicy: vendor ims"
2018-06-21 21:14:48 -07:00
Smita Ghosh
dd8e7cf29b
Allow rild to access the debug prop
...
Change-Id: I56b0566bf156fca8131df208dc644f08f407f831
2018-06-21 15:39:26 -07:00
mraja
049d26869e
sdm710 : resolve sensor functionality issue.
...
Allow read permissions to adsprpcd.
Change-Id: I70c989979a308018781a9652a13721dfecabfd41
2018-06-21 05:32:35 -07:00
Tyler Wear
2eebb90609
sepolicy: vendor ims
...
Added persist.vendor.ims. to property contexts.
Change-Id: I52fa6d8fcc0c9e1a9e705581401dca47fecc1ccc
2018-06-20 17:51:51 -07:00
Linux Build Service Account
df5c577912
Merge "sepolicy: Allow bootctl hal to modify GPT on sdm710(emmc)"
2018-06-19 22:04:15 -07:00
Linux Build Service Account
39fa24ae4c
Merge "sepolicy: Changes to ensure vendor audio props are in vendor img"
2018-06-19 17:33:56 -07:00
Smita Ghosh
491527a4a1
Alow update_engine to access all the partitions
...
Change-Id: Iadca0f93d7440d23d155b8cb21b413a4fbca1a0a
2018-06-19 15:53:41 -07:00
Shibin George
a2a6ab5817
sepolicy: Allow bootctl hal to modify GPT on sdm710(emmc)
...
bootctl hal marks the current slot as bootable on every boot
(if not already set); For this purpose, the hal needs GPT r/w
access.
Change-Id: I8c7738217e6dab58a257de654755838e7eade6e6
2018-06-19 06:35:54 -07:00
Linux Build Service Account
fd4d1e7184
Merge "sepolicy: add sepolicy rule for hvdcp_opti service" into sepolicy.lnx.4.9
2018-06-19 01:28:53 -07:00
Roopesh Rajashekharaiah Nataraja
69424359c8
sepolicy: Fix treble violations associated with properties
...
Change-Id: I8e69aeeaf62f50ab837d56ec9f685a46a6ccae08
2018-06-18 13:40:59 -07:00
Ashay Jaiswal
7e81d17fef
sepolicy: add sepolicy rule for hvdcp_opti service
...
Add sepolicy context for hvdcp_opti service.
Change-Id: I27435479f6d70efe143a671149ea7d52374c0bb9
2018-06-18 10:02:35 +05:30
Arun Mirpuri
b739f5cfb5
sepolicy: Changes to ensure vendor audio props are in vendor img
...
Added changes in vendor_init and init_shell so that vendor audio
props are created in vendor image and are read correctly
Change-Id: I8d7a3966b55722f723323ece61484855923a7183
CR-fixed: 2227280
2018-06-15 17:48:33 -07:00
Vivek Arugula
f426e2e764
Mount persist changes from sensors module.
...
Change-Id: Ib343b81dff362474ea30b59bb2a95a362a5104aa
2018-06-15 16:44:13 -07:00
Ankit Jain
0e955dff6b
sepolicy: update sepolicy for rmt_storage and tftp_server
...
This change defines the sepolicy rules for rmt_storage and tftp_server
Change-Id: Iaabd434e98909ff043d9e20418382630b4539ec6
2018-06-15 16:44:13 -07:00
Smita Ghosh
154d804620
Dsp and /firmware relocation.
...
Add vendor_file_type to adsprpcd_file
Add file context for /vendor/dsp
/frimware is been relocated to /vendor/radio_mnt .
Updated the sepolicy file based on this changes.
Change-Id: I9348167e8004626a39feb8d62ee54424448e0e10
2018-06-15 16:44:13 -07:00
Smita Ghosh
c2224c66f9
sepolicy: selinux changes for persist due to mount point changes.
...
1- labeling /mnt/vendor/persist to mnt_vendor_file.
2- adding vendor_persit_type attrbute for persist
2- removing persist related rule for coredomains
3- Adding required policy to access persist
Change-Id: I0d9cd14ecd0653c37c8aee3a6a4f4e076c92abee
2018-06-15 16:44:00 -07:00
Arun Mirpuri
5cb6a57305
sepolicy: Added support for vendor_audio_prop for audio props
...
Added support for vendor_audio_prop and moved all audio
properties to that type. This is done to conform with Treble
guidelines where vendor domains can access only vendor props.
Added access to only selective domains that need access to
these props.
Change-Id: Ic8999407bb77f265389ca07323099a11cf281563
2018-06-13 15:47:08 -07:00
Roopesh Rajashekharaiah Nataraja
32cd5d657e
sepolicy: Fix violations with system domains writing vendor props
...
Change-Id: If048123c309b3a91fc8bd9df25cc4d069f6c3bc5
2018-06-13 08:03:39 -07:00
Linux Build Service Account
c2c4d9e224
Merge "sepolicy : remove property context for vendor.qcom.bluetooth" into sepolicy.lnx.4.9
2018-06-13 02:38:52 -07:00
Linux Build Service Account
6d6149f3e7
Merge "sepolicy: rules for adsprpcd to access persist files" into sepolicy.lnx.4.9
2018-06-13 00:51:15 -07:00
Satish kumar sugasi
f6fa45b456
sepolicy : remove property context for vendor.qcom.bluetooth
...
On PRODUCT_COMPATIBLE_PROPERTY_OVERRIDE enable we are seeing BT
is not compliance so removing this.
vendor.qcom.bluetooth:
As this property is only been set once and read (not dynamic) we
are removing the context which will make this property to be as
vendor_default_prop which will enable vendor process to read.
Change-Id: Ibabaef2444155130e66daf0cb138e00a7e76b4ff
2018-06-12 13:26:07 -07:00
Smita Ghosh
59e8a5be58
Add sepolicy rule for sysfs_ssr
...
Change-Id: Idad0972d9c6c1943a161afbb5417921afe441b98
2018-06-11 15:01:58 -07:00
Tharun Kumar Merugu
a7ee841de1
sepolicy: rules for adsprpcd to access persist files
...
Sensors configuration files present on /persist folder.
Allow adsprpcd to read and write into /persist/sensors folder.
Change-Id: Id28a88936708fc9e906cc460c76f6500b04f7050
2018-06-11 14:45:50 +05:30
Tyler Wear
c0a8454e33
Move sepolicy hardware service to vendor
...
Move the hwservice definitions for cne and uce HALs to vendor.
Change-Id: I09d6ff62960230939821a1def5bcdb36632f4800
CRs-fixed: 2255755
2018-06-08 14:14:27 -07:00
Paresh Purabhiya
cd25774ac3
sepolicy : product related files added for compilation.
...
added product related files for bringup compilation
and bootup.
Change-Id: I5960cba9eea67624e2b3e6e5955365ea891b3c2d
2018-06-05 11:50:41 -07:00
Ankit Jain
fa6419864e
sepolicy: rmt_storage:Add rule to set ctl property from rmt_storage
...
This change adds rule to set the vendor defined ctl property
from rmt_storage service.
Change-Id: Iaaf7dd8024ed8b5f5dff0e1b6e262b41181523b7
2018-06-04 02:07:43 -07:00
Linux Build Service Account
f9945d43c9
Merge "Add vendor prefix to below selinux attributes" into sepolicy.lnx.4.9
2018-06-02 04:22:07 -07:00
Linux Build Service Account
6426975ff6
Merge "sepolicy: allow connect to pps unix socket for HDR Video" into sepolicy.lnx.4.9
2018-06-01 16:07:34 -07:00
Smita Ghosh
5eb1d86002
Add vendor prefix to below selinux attributes
...
- ssr_diag
- per_mgr
- pd_mapper
- ssr_setup
- subsystem_ramdump
Change-Id: I8fc13dd5ebb912f318def6d35ad0f9083d6472fe
2018-06-01 13:50:50 -07:00
Linux Build Service Account
292669470b
Merge "Adding access to GPU device for neural network driver" into sepolicy.lnx.4.9
2018-05-31 00:49:56 -07:00
Linux Build Service Account
0d0cbdb1b6
Merge "Sepolicy: Add rules to load SRM TA" into sepolicy.lnx.4.9
2018-05-31 00:49:52 -07:00
Li Wei
610c71c695
set prop for persist.sys.usb.config in vendor_init
...
- persist.sys. mapping to system_prop from core_prop_type
is not permitted and need an alternative to set this
property.
CRs-Fixed: 2222437
Change-Id: I80eb9fe50ec7550029ba20c302bbe8b4e13017c0
2018-05-29 17:49:12 -07:00
Yida Wang
cc0d1e3d84
Adding access to GPU device for neural network driver
...
Change-Id: I2400309d7945217380408fa09b0a8f73ebeec1ae
2018-05-29 16:10:03 -04:00
Phalguni
0e00a0ba74
Sepolicy: Add rules to load SRM TA
...
Update rules for hdcp_srm
CRs-Fixed: 2144968
Change-Id: I2de1f082d94e93cd6e5b62dc8ba476270dab07e4
2018-05-29 12:49:29 -07:00
Linux Build Service Account
6e61829396
Merge "Include test folder policies and fix build errors." into sepolicy.lnx.4.9
2018-05-27 02:11:06 -07:00
Gurpreet Singh Dhami
bb5bfbd655
sepolicy: allow connect to pps unix socket for HDR Video
...
This patch fixes the selinux denial for opening pps unix socket.
This is used in HDR Mode.
Change-Id: I822b7540a7edf0caba30c90eb9775db5365e5cd0
2018-05-24 12:11:50 -04:00
Tharun Kumar Merugu
92179483dd
Sepolicy: Add sysfs L3 permissions to cdsprpcd & init_shell domains
...
Cdsprpcd daemon listens to CDSP requests for CPU L3 clock frequency
in IO-coherency enabled cases.
Change-Id: Iac5d9bae6d40cc819ffd748f2cc6ed6eda5c95c3
2018-05-24 12:08:31 +05:30
Tharun Kumar Merugu
54fd59ca23
Sepolicy: Add cdsprpcd domain and related permissions
...
Add cdsprpcd domain and execute permissions.
Change-Id: I2f0dbdfb6842743c765c9e1800a378f981ffaa94
2018-05-22 11:34:20 -07:00
Sridhar Parasuram
c368c780a3
Include test folder policies and fix build errors.
...
Change-Id: I1f8393adced420f2fbf5f36294325f3aeda0285c
2018-05-22 11:06:37 -07:00
Linux Build Service Account
f0a6d35ff4
Merge "sepolicy: add sepolicies for Codec 2.0"
2018-05-19 00:00:11 -07:00
Yida Wang
52944cba72
Added device sepolicy rules for NN HAL data files
...
Change-Id: I102644d08b0cb228f93a792e6a96bd812329574e
2018-05-15 08:37:50 -07:00
Praveen Chavan
258422609e
sepolicy: add sepolicies for Codec 2.0
...
Change-Id: Idd3551ba1fc5930bc999f268156d2fed3cb65532
2018-05-15 05:07:29 -07:00
Roopesh Rajashekharaiah Nataraja
58144e09b6
Bluetooth: Add support for FR49055
...
- Cleanup the properties from wcnss_filter
sepolicy file.
Change-Id: I3175a01861cf2ca697837788daf7a6df1aefb334
2018-05-14 12:33:48 -07:00
Linux Build Service Account
7fa1b44718
Merge "SEPOLICY: QTI sepolicy change"
2018-05-09 23:53:45 -07:00
Ankit Jain
f7b98074bb
sepolicy: allow rmt_storage to access sysfs_ssr context with read permission
...
This changes allow rmt_storage to read file
/sys/bus/msm_subsys/devices/subsys<>/name with sysfs_ssr context.
This is required by libmdmdetect to determine the presence of modem
subsystem at run time.
Change-Id: I29cb0c43cd4f428bfaa42fedb428afe759690fd0
2018-05-08 20:21:20 -07:00
Ankit Jain
f0fe2057d6
sepolicy: rmt_storage: remove access to qti_debugfs for rmt_storage
...
This change removes the access to qti_debugfs file context for
rmt_storage.
Change-Id: I8e92ef3929fbc4cc39bea3a5847f64e6c72b97ed
2018-05-08 20:20:54 -07:00
Mohammed Javid
359cc9a13f
SEPOLICY: QTI sepolicy change
...
update qti sepolicy to meet new requirement to start vendor.qti binary
Change-Id: Id6b874c509ee516c569c3347648fef0c5a689a0b
2018-05-08 01:00:58 +05:30
Linux Build Service Account
0fc201444c
Merge "Add selinux rules for update engine"
2018-05-04 11:15:42 -07:00
Linux Build Service Account
907f3233ac
Merge "Sepolicy: Fix denial for enabling FOSS"
2018-05-03 02:07:30 -07:00
Aravind Asam
ddc381d563
Update SE Linux configurations for ss-restart, ss-services
...
Update property paths to use 'vendor' in name
Change-Id: I40e88096c136d11b1725dc95a5166ebe3bb0f6d1
2018-05-02 14:28:03 -07:00
Rajiv Ranjan
c5367878c3
sepolicy: Add rule to enable creating wlan_logs in /data/vendor/wifi
...
Add wifi_vendor_data_file label and required
sepolicy rule to enable creation of wlan_logs folder
under /data/vendor/wifi.
CRs-Fixed: 2211450
Change-Id: I61516b352c0c6021234d713e4ed3e9c8ccd85855
2018-05-02 10:38:25 +05:30
Smita Ghosh
5befd44f62
Add selinux rules for update engine
...
Change-Id: I12fd72ec526ccd85f68b94f6b1580455484a9925
2018-05-01 10:30:54 -07:00
Brandon
14e8679ef4
Data IMS: Sepolicy for new HAL to pass SIP headers to Clients
...
Desc: sepolicy for new HAL
Change-Id: Ie9e4352e820a29bb31f1f9bdff3393151eeaab24
2018-04-28 09:50:21 -07:00
Linux Build Service Account
fffa5cd69f
Merge "sepolicy: add rules for vendor property"
2018-04-27 23:39:55 -07:00
Linux Build Service Account
fa38946736
Merge "Clean up usage of set and get prop for system defined properties"
2018-04-27 16:55:40 -07:00
Linux Build Service Account
ca1c386c91
Merge "Fix for *radio* property access failure"
2018-04-27 16:55:33 -07:00
Linux Build Service Account
1e2e36a85a
Merge "sepolicy: Add rule for system app with userdebug tag to access QMI IOCTLs"
2018-04-27 05:36:50 -07:00
Linux Build Service Account
4a1496dac1
Merge "sepolicy: Moved TUI files from /data/misc/qsee to /data/vendor/tui/"
2018-04-26 19:26:49 -07:00
Garmond Leung
0d52b9ada9
sepolicy: add rules for vendor property
...
Support for additional rules related to vendor created properties.
CRs-Fixed: 2213047
Change-Id: I144d21ad43ecb28260b5eb6fc6ce6ad89d970726
2018-04-26 16:04:30 -07:00
Roopesh Rajashekharaiah Nataraja
392ac2c8de
Fix for *radio* property access failure
...
Change-Id: Ia60d674d1cf0b70b9027dd05aa61b722e9e2d519
2018-04-26 14:38:37 -07:00
Roopesh Rajashekharaiah Nataraja
4b50e292f1
Clean up usage of set and get prop for system defined properties
...
Change-Id: I582b523bf44073a156242cd4b5478fee667693cf
2018-04-26 14:27:43 -07:00
Jack Pham
2ee7578514
sepolicy: allow vendor_init to set vendor_usb_prop
...
vendor_init needs to be able to setprop vendor.usb.* properties
e.g. init.target.rc.
Change-Id: I0e57a5753cd1fee4788fea3c52e583d6b61d857d
2018-04-26 12:00:06 -07:00
Linux Build Service Account
c01cf19e6c
Merge "sepolicy: add vendor prefix to usb properties"
2018-04-26 00:51:11 -07:00
Jack Pham
b89cf8351c
sepolicy: add vendor prefix to usb properties
...
Define property context for vendor.usb.* and allow access to
the same for vendor_init and qti_init_shell. Also remove the
definitions of sys_usb_configfs and sys_usb_controller since
they are redefinitions of the same properties already part of
exported_system_radio_prop and exported2_system_prop and are
already granted to vendor_init and recovery (via coredomain).
Change-Id: Ia394934cb9f34032b95701f768d9ed4e26819ac5
2018-04-25 18:13:18 -07:00
Yida Wang
028443303c
Add device sepolicy rules for NN HAL implementation
...
Change-Id: I41d761efd3eecc8afd77d073332bfcb62e732145
2018-04-25 13:11:19 -07:00
Linux Build Service Account
aabd37303a
Merge "FR 48725: Support for new rules related to vendor props"
2018-04-24 17:28:52 -07:00
Gerrit - the friendly Code Review server
af01fb8c1a
Merge changes into sepolicy.lnx.4.9
2018-04-24 03:51:43 -07:00
Linux Build Service Account
d97a039fa4
Merge "sepolicy: Add rules for data/vendor/camera"
2018-04-24 03:47:34 -07:00
RAJATH R
cada09ca41
FR 48725: Support for new rules related to vendor props
...
- Sepolicy changes required for support for additional
rules related to vendor created Android properties.
- Sepolicy changes required for new HAL dump
format
CRs-Fixed: 2227667 2216610
Change-Id: I2fb44a6ea40f669698e4af1eee9b68039f8af6b9
2018-04-23 22:20:24 -07:00
Linux Build Service Account
a497cc4521
Merge "qmuxd.te: Remove all references"
2018-04-23 22:12:13 -07:00
Linux Build Service Account
e766ded742
Merge "genfs_context: Add devfreq nodes to sysfs_devfreq"
2018-04-23 22:12:12 -07:00
Linux Build Service Account
ac7512d8d6
Merge "Associate proc_wifi_dbg with proc_type"
2018-04-23 17:21:19 -07:00
Sauhard Pande
10541848d7
sepolicy: Add rules for data/vendor/camera
...
Enabling SE Linux policies for /data/vendor/camera
for filecreate and read permission
Change-Id: I971d74f76461b502911a4fabb2753d7b537845c0
2018-04-23 12:37:06 -07:00
Subash Abhinov Kasiviswanathan
8de0b57a85
netmgrd: add policies for netmgr recovery file
...
Define a new file context for netmgr recovery
file and add the corresponding SE policy to
allow netmgr access to that file.
CRs-Fixed: 2225495
Change-Id: I051b6d4361a1cef783dd22523c4da3a62ce21065
2018-04-23 12:01:11 -07:00
Subash Abhinov Kasiviswanathan
2b7efaaf49
qmuxd.te: Remove all references
...
qmuxd is not used on this target, so remove all unused contexts.
CRs-Fixed: 2190092
Change-Id: Ifd92ffe4652e9734f6ea4f8e959c8028979ec6b6
2018-04-23 11:46:47 -07:00
Amit P Choudhari
9c0812725c
sepolicy: Moved TUI files from /data/misc/qsee to /data/vendor/tui/
...
-Added permissions for accessing the files
Change-Id: Id23cef4caadefae5f0db47e786ca90ad53bf938e
2018-04-23 16:49:45 +05:30
AnilKumar Chimata
55fe0717e2
sepolicy: Change qseecom listener property
...
Update qseecom listner property to new one by prepending
vendor name to make vendor service.
Change-Id: I49c1525cb34c66b3e9592e5d226301a01ad2e4b6
2018-04-21 03:02:11 +05:30
Shaikh Shadul
514fa155be
sepolicy: Add rule for system app with userdebug tag to access QMI IOCTLs
...
Add rule to access system app with userdebug tag to create socket and
access QMI IOCTLs.
Change-Id: I219e5402957ae642f60c05de230aa7cec1cc076c
2018-04-20 15:41:05 +05:30
Kyle Yan
b78c8b7c6e
genfs_context: Add devfreq nodes to sysfs_devfreq
...
Postboot accesses multiple devfreq device nodes so label them under
sysfs_devfreq to allow reads/writes.
Change-Id: Ife684c4568bf01a002dde4591cfeb833bbda922b
2018-04-18 17:06:26 -07:00
Gurpreet Singh Dhami
b0826555e4
Sepolicy: Fix denial for enabling FOSS
...
Change-Id: I9bcf57483693f1b1f55a38ff04d7cfe3fa978f65
2018-04-18 13:58:38 -04:00
Srinivas Narne
6383e16ea1
Associate proc_wifi_dbg with proc_type
...
Associate proc_wifi_dbg with proc_type
Remove IOffloadConfig, IOffloadConrol to fix bootup
Change-Id: I0a69a16be10b391461b75ce8c84eebf42279c40a
2018-04-17 17:28:37 -07:00
Linux Build Service Account
24e385f86d
Merge "sepolicy: Configure hbtp jnis as same hal process"
2018-04-17 14:27:26 -07:00
Alex Sarraf
54a7eee71a
sepolicy: Configure hbtp jnis as same hal process
...
Configure hbtp jnis as same hal process
Change-Id: Ic69c565684b5942dc13002080c2234499141f5ad
2018-04-16 11:22:41 -07:00
Linux Build Service Account
39b770132a
Merge "sepolicy: Add rule to create socket and access QMI IOCTLs"
2018-04-14 22:51:47 -07:00
Alex Sarraf
e7bfd75199
sepolicy: allow ctl property set for vendor.hbtp
...
allow ctl property set for vendor.hbtp service to be launched by
vendor init process
Change-Id: I117947396a853f1c18febbc8979da47103354e1d
2018-04-13 16:34:08 -07:00
Linux Build Service Account
6947a00bfd
Merge "sepolicy: Changes to enable FOSS"
2018-04-12 17:27:29 -07:00
Linux Build Service Account
1e691e7af1
Merge "Allow xtra-daemon to communicate with hal_gnss"
2018-04-12 13:20:25 -07:00
Linux Build Service Account
174af1bb5a
Merge "Remove wifi_data_file from data_between_core_and_vendor_violators"
2018-04-12 09:29:44 -07:00
Linux Build Service Account
76f5912287
Merge "sepolicy: SDM845.LA.1.9: Add rw permission for i2c touch sys node"
2018-04-12 07:18:30 -07:00
Linux Build Service Account
cf27e0aa5f
Merge "sepolicy: Add DRM widevine HAL"
2018-04-11 13:24:50 -07:00
Shaikh Shadul
e5f92e8eb3
sepolicy: Add rule to create socket and access QMI IOCTLs
...
Add rule to create socket and access QMI IOCTLs by applications
running in system app context.
Change-Id: Ib2ee23be8d3c46c2301e5acb0ece13fd8a3b68a5
2018-04-11 18:46:47 +05:30
Linux Build Service Account
25bc357493
Merge "sepolicy: add wcd-spi-ac device node to policy"
2018-04-11 00:59:42 -07:00
Linux Build Service Account
9cb244a941
Merge "sepolicy: allow init script to set boot.parsed, cores_online properties"
2018-04-11 00:59:41 -07:00
Naseer Ahmed
0ca2583000
sepolicy: Changes to enable FOSS
...
Change-Id: I737141930a9c97748a771a62cc54a89774d5574c
2018-04-10 17:15:20 -04:00
Srinivas Girigowda
fc54d547b9
Remove wifi_data_file from data_between_core_and_vendor_violators
...
CRs-Fixed: 2221880
Change-Id: I124d152c5b309dc708fd8a27905f55bd3c91259a
2018-04-10 09:10:15 -07:00
Amit P Choudhari
6b011caa94
sepolicy: SDM845.LA.1.9: Add rw permission for i2c touch sys node
...
Change-Id: I5e0fd2a668042044304c3b9361b5121e2d2dfc67
2018-04-10 12:45:36 +05:30
Linux Build Service Account
4e2dc063ce
Merge "Remove cgroup create_file_perms from init/vendor_init"
2018-04-10 00:12:41 -07:00
Dante Russo
8a91ee7078
Allow xtra-daemon to communicate with hal_gnss
...
Communication over socket
CRs-fixed: 2220236
Change-Id: Icfc897342ff8bbaf4c07b8032ac18d9a470fea8e
2018-04-09 16:14:59 -07:00
Bhalchandra Gajare
cd96fe711a
sepolicy: add wcd-spi-ac device node to policy
...
wcd-spi-ac-client device node is used by audioserver to
communicate the SPI access control data to the driver.
Change adds this device node to security policy so that
audioserver process can access this device node.
Change-Id: I9f71034d3529c0cee4ee1e3472e0f0563c13ba2d
2018-04-09 16:10:58 -07:00
Vijay Ganti
65e2f3a5d1
sepolicy: allow init script to set boot.parsed, cores_online properties
...
perf-hal reads these properties during initiaization and prepares
itself for the upcoming perflock requests from clients.
- vendor.post_boot.parsed
- ro.vendor.perf.cores_online
Change-Id: I491d870b420365bfe5d7e332004594bf10c1d5ea
2018-04-09 12:27:16 -07:00
Tyler Wear
a683298033
netmgrd: Remove policies related to setting of properties
...
Netmgrd no longer sets any of the net and rmnet properties since
the equivalent functionality is deprecated.
CRs-Fixed: 2219985
Change-Id: I72461d1784712c8cfe4998608a1519b8f7208f6d
2018-04-06 11:23:38 -06:00
Udaya Bhaskara Reddy Mallavarapu
6b9d980e67
sepolicy: Add DRM widevine HAL
...
Add DRM widevine HAL for widevine DRM service
Change-Id: Ic1e1b5c85a3f91a6e7190e492605819513ee7295
2018-04-06 00:12:01 -07:00
Linux Build Service Account
4666943851
Merge "cnd: Remove Unnecessary Policies"
2018-04-05 22:19:59 -07:00
Srinivas Narne
1d2aa592e5
Remove cgroup create_file_perms from init/vendor_init
...
These are needed to address new neverallows.
Change-Id: Ic6d59bb4018a684d027219edb1f11c0ba387b0c5
2018-04-05 11:31:21 -07:00
Vijay Ganti
a4fdf25684
sepolicy: Add Policy for hal perf
...
Add Policy for hal perf
Change-Id: I5e84e80afceb32aa50de699c6386fc6bc556da5b
2018-04-04 15:22:08 -07:00
Sunmeet Gill
70f87e5b57
cnd: Remove Unnecessary Policies
...
Remove any policies which are not explicitly needed
for cnd functionality.
Change-Id: I22db76f1416555386a52fbc3ac1ec05b419cdf8b
2018-04-04 10:23:56 -07:00
Linux Build Service Account
976817786e
Merge "sepolicy: Fix denials for backlight"
2018-04-02 21:29:27 -07:00
Linux Build Service Account
8dd3ec2fcf
Merge "Sepolicy: Added sepolicies for tloc daemon"
2018-04-02 10:45:29 -07:00
Vivek Vilvaraj
c7f46198c2
Sepolicy: Added sepolicies for tloc daemon
...
Added SELinux policies for Trusted Location Service
Change-Id: I245c41356bcd4d285126cf3f81367003c16e6a36
2018-04-01 22:44:26 -07:00
Wileen Chiu
540003b3b6
Move qtelephony from system user
...
- change from system user to user app
- remove unneeded and add necessary rules
Change-Id: Ic8dbb8da47f31fedddf2c8e3f07abfdfde0cb804
CRs-Fixed: 2215452
2018-03-30 14:57:05 -07:00
Linux Build Service Account
b3191052f3
Merge "Add sepolicy dir and sock permissions to location module"
2018-03-29 22:49:03 -07:00
Linux Build Service Account
8f83f2f73a
Merge "sepolicy: Rename sensors property type"
2018-03-29 02:51:13 -07:00
Vinay Gannevaram
f77c440c2d
Add sepolicy dir and sock permissions to location module
...
Allow location module to have directory read, write
and socket create permissions in /data/vendor/ path.
CRs-Fixed: 2205732
Change-Id: I4a75623b562337e13b121bacf86af0f97f457916
2018-03-29 14:12:36 +05:30
Gerrit - the friendly Code Review server
5155ee3f24
Merge changes into sepolicy.lnx.4.9
2018-03-28 18:43:06 -07:00
Linux Build Service Account
30e15c2e3e
Merge "Fix sysfs_type dir related neverallows"
2018-03-28 18:36:50 -07:00
Shaikh Shadul
892e7d6538
sepolicy: Rename sensors property type
...
Rename sensors property type in align with sensors service
names which is using user defined properties.
Change-Id: Iea2bec805b9ac937b46b982cf2af7afaa6c4fee3
2018-03-28 23:49:22 +05:30
Linux Build Service Account
d947ad7c19
Merge "Add file_contexts for atfwd native service"
2018-03-28 08:06:16 -07:00
Linux Build Service Account
cb3afd8f7c
Merge "genfs_context: Fix non printable character in sysfs_net context"
2018-03-28 04:10:45 -07:00
Gurpreet Singh Dhami
bc904a9503
sepolicy: Fix denials for backlight
...
Change-Id: Ia3d4eaf86ff94492c41911d1fa6d9632e1afe030
2018-03-27 17:10:50 -04:00
Sridhar Parasuram
397607a435
Fix sysfs_type dir related neverallows
...
Change-Id: I90c2a81aaea542611324c0675b36571fa39d6cae
2018-03-27 13:37:16 -07:00
Subash Abhinov Kasiviswanathan
477821cd20
genfs_context: Fix non printable character in sysfs_net context
...
Non printable character was causing a compilation error in newer
builds, so remove it.
CRs-Fixed: 2199494
Change-Id: I7f0a78b2e4ab099c9978a3c91151424637704adb
2018-03-26 19:27:28 -06:00
Amit P Choudhari
fb993fb687
qcom: sdm845: Added sepolicy changes for TUI HIDL service
...
Change-Id: Ia96f9ea3992633bc3390143347365fff1fed3c79
2018-03-24 02:51:15 +05:30
Linux Build Service Account
4616be8883
Merge "hal_rcsservice: Added rules to set ctl.stop property from imsrcsd"
2018-03-23 13:52:33 -07:00
Linux Build Service Account
681434b5d6
Merge "SEPOLICY: ipacm sepolicy change"
2018-03-23 13:52:31 -07:00
Linux Build Service Account
625d0e37b3
Merge "sepolicy: Added rule to fix avc denied issue in hal_audio_default"
2018-03-23 03:14:18 -07:00
Skylar Chang
285f2725a8
SEPOLICY: ipacm sepolicy change
...
Change ipacm/ipacm-diag sepolicy to meet new requirement to
start binary as vendor.ipacm.
Change-Id: I01b034be540dcc95ee63485ef1bb7fa8a044db33
2018-03-22 19:03:32 -07:00
Avinash Nalluri
4d2fdfc8b3
Add file_contexts for atfwd native service
...
Change-Id: I6fa1d7bea7b9a2525162460aaece4425ec77dd1d
CRs-fixed: 2204944
2018-03-22 13:22:09 -07:00
Uday Kiran Pichika
af80861093
sepolicy: Add required sysfs nodes access for display
...
CRs-Fixed: 2207188
Change-Id: Ie82b308c7bf4f3556d134cebbd8707afb3a9c26e
2018-03-22 18:59:51 +05:30
Arun Mirpuri
22210e7455
sepolicy: Added rule to fix avc denied issue in hal_audio_default
...
Added rule to fix avc denied issue observed because some perf
component updates timerslack_ns in hal_audio_default context
periodically
Change-Id: I53fcf7f6ca897e4bf43cdaf69fdf3203ba884b81
2018-03-21 17:24:33 -07:00
Devi Sandeep Endluri V V
39d3034746
hal_rcsservice: Added rules to set ctl.stop property from imsrcsd
...
Added rules to set ctl.stop property from imsrcsd
Change-Id: Ib7c4cb42ea0bd5ed2bc0eb42c9ac0ccc107516a6
2018-03-21 17:38:26 +05:30
Sean Tranchetti
fe7b7d5257
genfs_context: Add rps to sysfs_net context
...
Netmgrd accesses /sys/devices/virtual/net/rmnet_*/queues/rx-0/rps_cpus,
so we must use labeling of the /sys/devices/virtual/net directory.
Change-Id: Ic72352fb9dae8c6677a73363cb5ba9820cd3dd8c
CRs-Fixed: 2199494
2018-03-20 12:31:16 -06:00
Arun Mirpuri
c43d368c4d
sepolicy: Remove references to audio_data_file
...
Fix all audio specific paths to refer to
vendor/audio and update hal_audio_default
Change-Id: I1eee00d3696c5b4d73dca0ee18a0b1bc0cb1bf3e
2018-03-19 19:01:51 -07:00
Linux Build Service Account
1a5f66efe1
Merge "sepolicy/common: Add Keymaster 4.0 support"
2018-03-16 18:55:46 -07:00
Linux Build Service Account
526a5832d7
Merge "sepolicy : moving vendor testscripts to system"
2018-03-15 07:58:50 -07:00
Linux Build Service Account
5dc8fbe637
Merge "Label qti-testscript"
2018-03-15 07:58:49 -07:00
Linux Build Service Account
00a5f57647
Merge "sepolicy: Add new vendor media file type"
2018-03-15 01:09:34 -07:00
Linux Build Service Account
934577a1ab
Merge "Add msm_irqbalance te file and policies"
2018-03-14 17:11:24 -07:00
Zhen Kong
c8a71d9aaa
sepolicy/common: Add Keymaster 4.0 support
...
Add Keymaster 4.0 support in sepolicy
Change-Id: I8785bb418651cee7be230fcf10eace614203d09e
2018-03-14 16:10:39 -07:00
Linux Build Service Account
e9c8c04efe
Merge "Add sepolicy for chre daemon"
2018-03-14 09:19:59 -07:00
Mahesh Lanka
4a3de74d59
sepolicy: Add new vendor media file type
...
-Add new vendor media file type
-Add rule to allow MediaCodec Read/Write access to this file
Change-Id: I21f53fbf10208e6aab313abb3e9533195dc2fce3
2018-03-14 02:21:46 -07:00
Linux Build Service Account
d8263e65e8
Merge "Add appropriate selabel to ImageFv partition."
2018-03-13 18:03:14 -07:00
Sridhar Parasuram
deb1e89261
Add msm_irqbalance te file and policies
...
Change-Id: I05a56d22b1f587314ccbee0e31cae503b7c1635d
2018-03-13 12:26:07 -07:00
Sathish Ambley
a8591688ab
Add sepolicy for chre daemon
...
Add sepolicy for chre daemon.
Change-Id: Ifd0f0dcd512af5727cd39cbaf549d0aeee145034
2018-03-13 09:44:19 -07:00
Tyler Wear
8b012e1d07
connectivity: provide dataservice app radio file permissions.
...
Bug: 38043081
Change-Id: Ifebefb01452ba2b9d8b8763b416c54d3b7f46568
2018-03-12 12:13:05 -07:00
padarshr
31ae26c28f
Add appropriate selabel to ImageFv partition.
...
Since ImageFv is now an upgradable A/B partition,
adding appropriate selabel to it.
Change-Id: I188edb41aeb86945277d1ab4fabb885678c2a4ed
2018-03-12 19:27:03 +05:30
Ravi Kumar Siddojigari
1599867199
sepolicy : moving vendor testscripts to system
...
As vendor testscripts domain is moved to system we
have to modify its startup and access based on this.
Change-Id: I1ceadac67912830feb09f6c013c4e77e3c5d4571
2018-03-09 15:53:03 -08:00
Sridhar Parasuram
f187b4ef2c
Label qti-testscript
...
Change-Id: Ic022c3df0c0bbcc66b5a563a8f52b2f1b50f06f4
2018-03-09 15:53:02 -08:00
Sridhar Parasuram
93caf547ce
Add create_dir_perms to data files for vendor_init
...
Change-Id: Icd550bb4eb696ca3ca1fb8932b869fa25187831c
2018-03-09 15:52:57 -08:00
Sridhar Parasuram
660e13e840
Add ctl property for msm_irqbalance
...
Change-Id: I2883b56a029e1ed321341a4d9d1421baf8b8ca5b
2018-03-09 13:48:10 -08:00
Linux Build Service Account
b135887cb0
Merge "Add rild as secure_element hal server"
2018-03-07 16:42:13 -08:00
Eric Chang
174a238ddc
CA Certificate - sepolicy
...
Allow location to use cneapiclient for querying ca certificate
Change-Id: I8e10f744c3c40bfbda02988225d25a0992101c8e
2018-03-05 13:22:11 -08:00
Sandeep Gutta
ab7b7eccf8
Add rild as secure_element hal server
...
secure_elment to access UICC using rild.
Change-Id: If30c50fdc3f6fac7da8e26db7ab21b6ee6558a71
2018-03-05 11:02:30 +05:30
Linux Build Service Account
7055cd6ab9
Merge "allow rild to access diag_device"
2018-03-02 05:42:05 -08:00
Linux Build Service Account
244cd5ebee
Merge "Fix issues related with qcrild"
2018-03-02 00:22:11 -08:00
Linux Build Service Account
fd415c3d2d
Merge "move dataservice_app to radio process"
2018-03-02 00:22:10 -08:00
Hua Liu
0b66260b89
allow rild to access diag_device
...
Change-Id: I458decaa1eeca3e8d8d6e91ed70496f9c167fc00
2018-03-01 17:53:56 -08:00
Hua Liu
f827acffa7
Fix issues related with qcrild
...
- Associate qcrild with rild_exec context
- Create new property contexts for qcrild
and allow init_shell to set ctl properties
on these daemons to successfully start the
processes.
Change-Id: I4ca55577f489fdd5fb7a470b600a670dbcfa622a
2018-03-01 15:39:13 -08:00
Tyler Wear
05733f76b2
cnd: Net Admin
...
Fix cnd selinux rules.
Change-Id: I3449a85b7de9139e508814d6e99b3ad3bd2d1d50
CRs-fixed: 2187775
2018-03-01 11:08:22 -08:00
Tyler Wear
a65fea5e71
move dataservice_app to radio process
...
Bug: 38043081
Change-Id: I63866a0dbb934dd07da7c2acaf3fec6a36eea23e
2018-03-01 10:59:23 -08:00
Tyler Wear
5bf9d9af15
rcs: IMS system property
...
Read the system property for IMS module.
Change-Id: I0203bc2e7f2c801d3949f0287968043c7b142d95
2018-02-28 15:22:49 -08:00
Srinivas Girigowda
ee7b3626e6
wifi: Use wpa_data_file instead of wifi_vendor_data_file
...
system/sepolicy already defines wpa_data_file, Use that
instead of wifi_vendor_data_file
Change-Id: I916724ed60162b2b32247f07cca9c1a69363c9fb
CRs-Fixed: 2195448
2018-02-27 14:54:49 -08:00
Srinivas Girigowda
47fbf5a3dc
hal_wifi_supplicant: Remove wpa_socket
...
Change-Id: If1b501dda7ff4d335955d59c85805d84756b5d7f
CRs-Fixed: 2195448
2018-02-27 14:54:35 -08:00
Linux Build Service Account
0cb2fd4757
Merge "Moving location sockets from /data to /dev"
2018-02-27 13:43:48 -08:00
Naseer Ahmed
0fda360207
sepolicy: Allow HWC to talk to allocator
...
Change-Id: I43fabb7db42a65eaea6cab5461f14405498e790d
2018-02-26 10:23:08 -08:00
Linux Build Service Account
b640da57bc
Merge "Allow permissions to call CNE"
2018-02-24 00:06:53 -08:00
Linux Build Service Account
8343677b58
Merge "Update sysfs labeling"
2018-02-23 20:57:39 -08:00
Dante Russo
bd301074b6
Allow permissions to call CNE
...
Allow XTRA permissions to call CNE
CRs-Fixed: 2195094
Change-Id: I895966bbb888e4d6141befe62171e56379debe7c
2018-02-23 12:01:53 -08:00
Naseer Ahmed
704a55d170
sepolicy: Add policy for qti allocator and mapper
...
Change-Id: I532940d043bc51515bbf89deea283a60628528d9
2018-02-23 11:29:40 -08:00
Shaikh Shadul
f6c02fd2d2
sepolicy: allow init-qcom-sensors-sh to start sensors daemons
...
Add rules to allow init-qcom-sensors-sh to start sensors
daemons sscrpcd, sensors.qti from sensors script.
Change-Id: Ifde06f15fea9d306f3783694724d3116481a2c06
2018-02-23 08:48:28 -08:00
Sridhar Parasuram
db8636ccde
Update sysfs labeling
...
Change-Id: Ib698defb6e2accebda58c853c5c0be23becfedcb
2018-02-23 08:01:27 -08:00
Sridhar Parasuram
1a761eb564
Update labeling for audio_data_file
...
Change-Id: I04af86a64198c7e96f018a74aaf32ebed7bbc8b2
2018-02-21 13:53:03 -08:00
Linux Build Service Account
dc58c3ab0c
Merge "cnd: Net Admin" into sepolicy.lnx.4.9
2018-02-20 10:43:43 -08:00
Dante Russo
9a6a2b8090
Moving location sockets from /data to /dev
...
Keeping sockets in /data/vendor/location prevents
unmounting of /data partition after build load
CRs-Fixed: 2175510
Change-Id: I5b4b7a2cdc07a042795f0950725ce2d9c3518cf3
2018-02-15 10:20:40 -08:00
Sridhar Parasuram
486aa76037
Add wifi_data_file to data_between_core_and_vendor_violators
...
This change is needed until upstream fixes the wifi hal
Change-Id: Ie8c7b0df204d2274b3b0624ee5a9f47976c7fb20
2018-02-14 11:22:44 -08:00
Sridhar Parasuram
32aac06248
Remove policies using dac_override and dac_read_search capability
...
Change-Id: I591163c182f8c564f696fd3dd899041de24bdb6b
2018-02-14 11:22:43 -08:00
Tyler Wear
8f8b9beb46
cnd: Net Admin
...
Add net admin permission to CND.
Change-Id: I217d409b3813824de8822e719dc654df4a5c48fb
CRs-fixed: 2187775
2018-02-13 18:06:59 -08:00
Tyler Wear
660907d4dd
Data SE Linux Cleanup
...
Sepolicy changes related to data modules needed for
the general cleanup effort.
Change-Id: I8b0247295e25faadfe63be9079055d76576958d3
2018-02-09 16:29:57 -08:00
Sridhar Parasuram
cc31c50446
Address new neverallow policies
...
Change-Id: I3fa9d205956c5a89f610893a9fd8d855b0383fd6
2018-02-05 11:06:24 -08:00
Sridhar Parasuram
ea1eb0b08c
Address denials and cleanup
...
Change-Id: Id83d5c31fc168834b3cb89e7b32691770c4b7914
2018-02-02 10:20:11 -08:00
Linux Build Service Account
f607fe78fe
Merge "sepolicy: added new sepolicy files for chre" into sepolicy.lnx.4.9
2018-01-31 14:45:45 -08:00
Sridhar Parasuram
b73ca02e5a
Add a separate te file for the following shell scripts
...
* init.qcom.sensors.sh
* init.qti.ims.sh
* init.qcom.crashdata.sh
Add te files for ims, crashdata and sensors shell scripts
Change-Id: If482df2e2ef2dc257b79cece2bb1eb5f812007d2
2018-01-31 10:07:05 -08:00
Sridhar Parasuram
7962575a24
Add test policies
...
Change-Id: Ib8f60653e57388941e17d86be4495366930db89b
2018-01-31 10:07:00 -08:00
Biswajit Paul
237fb5193c
sepolicy: added new sepolicy files for chre
...
Added new sepolicy files and socket node to make chre
daemon working
Change-Id: Iabb3a631aaf9aebaabf4cdbae23ca5ea5a3dda44
2018-01-29 11:43:47 -08:00
Sridhar Parasuram
48d5ab5d3c
Add policies for init-qti-fbe-sh
...
Change-Id: Id768c70019a80d46a6e371d3573e700925209fdf
2018-01-25 11:57:12 -08:00
Sridhar Parasuram
df17efd8b1
Remove init-sh files that are not needed
...
Change-Id: I4b588c258f1d50b956bace1b61d0964fa0848c10
2018-01-25 11:57:07 -08:00
Sridhar Parasuram
77eb26c3a3
Remove the keymaster passthrough
...
Change-Id: I5d2497d5e6ff450a3be99e2a638b503d69c9e444
2018-01-24 17:08:14 -08:00
Sridhar Parasuram
9e70bfd3ac
Move common files inside vendor to vendor/common
...
Change-Id: I0e5f67069463b6bd2bbfee355d95d490e64adad6
2018-01-24 14:29:45 -08:00
Sridhar Parasuram
8f9839c487
Address denials needed for bootup
...
Change-Id: I0cf893edf163692b637a490c3759dd13f5c74925
2018-01-23 16:51:32 -08:00
Sridhar Parasuram
f58300a8c3
Remove legacy rules
...
Change-Id: Id7e86dd4f772d9dd2e9bcf0f641ab25630a2f3a8
2018-01-23 16:47:41 -08:00
Sridhar Parasuram
1154147746
Add new files needed for bootup
...
Change-Id: I51a3bd1931709d375f6859054a9238b2f0ce9de5
2018-01-23 16:47:35 -08:00
Sridhar Parasuram
e479b0cee6
Fix compile issues
...
Change-Id: I26fd2e0ad503bbdd4235b2120737feb9f5711a0b
2018-01-23 14:20:48 -08:00
Sridhar Parasuram
7eaf0fb2b2
Add new files
...
Change-Id: Ib5cb0f02a9175b1154f9f933116a386a39581c0f
2018-01-23 14:20:48 -08:00
Sridhar Parasuram
0579b0d176
Sync with upstream
...
Change-Id: I53c51d4f5e98be617dac6aadecc81dbad809aeda
2018-01-23 14:20:48 -08:00
Sridhar Parasuram
168d612523
Delete not needed te files
...
Change-Id: If5d48ea45f10cd880b76497581f30c6c5acad0e2
2018-01-23 14:08:55 -08:00
Sridhar Parasuram
dd0edaa506
Update makefile
...
Change-Id: I617860882e0667fdd7a5b521de5366d7012978f0
2018-01-19 10:19:35 -08:00
Sridhar Parasuram
de5802b907
Reorg with upstream structure
...
Change-Id: I945f212747f6cda200468b943b62b3103aa866af
2018-01-19 10:19:22 -08:00
Sridhar Parasuram
5324911929
Remove old target specific files
...
Change-Id: I5df3eb5341ad8e4f5b1ccff49aafa303dc1b6711
2018-01-03 09:13:07 -08:00