Compare commits

...

79 Commits

Author SHA1 Message Date
Ricardo Cerqueira
ca334323e9 uncrypt needs to write to the BCB
and in QC hardware, that's misc_partition...

Change-Id: I1d2f5d11423f01435f17f0e6f5d418cc0ce30e9d
2015-04-22 01:28:18 +01:00
percy-g2
5f595f2531 msm8610: Compile sensor policy and fix typo
Change-Id: I30c33635dcce202f5f6753dc8a9bf746012d66b4
Signed-off-by: percy-g2 <gahlotpercy@gmail.com>
2015-02-21 22:09:34 +05:30
Ricardo Cerqueira
23a1492f57 Revert "SEAndroid: Updated vold domain related policy"
This reverts commit 733050a425.
This has an incorrect path, and doesn't belong here at all. Any
platform using UMS is affected by this

Change-Id: I067ba68a64c16406b787fefd97d6c6d9e0d41344
2015-02-11 23:16:47 +00:00
Kun Liang
5ca33d98db sepolicy: fix app_process lnk_file read denied issue
app_process is a lnk_file pointed to app_process32 or
app_process64 under /system/bin. It should be labelled as
system_file but not zygote_exec.

Change-Id: If6ddbc9d9262094f3fb44686bff4826d2afc2ce2
2015-01-21 01:35:12 -08:00
Sridhar Gujje
cb1eb911e9 sepolicy : added secontext for app_process which is a link which
get created and pointed to 64/32 bit arch bin.

added secontext as zygote_exec for  app_process.

Change-Id: I0887c8d90c88a2ecc169aaad3aa92d832e557994
2015-01-21 01:35:12 -08:00
Steve Kondik
5e7c74af59 selinux: Cleanup warnings
Change-Id: Ic70fe8cafcd837c5a52af69f46b565c5b58c0fa3
2015-01-16 10:23:00 -08:00
Srikanth Uyyala
7f134914b0 selinux: audio: update policy file for audio
update policy file to allow QACT to access debugfs

Change-Id: Ia4897325e1869015f4e205823eff1e923ba3abef
2015-01-15 18:34:33 -08:00
Dilip Gudlur
c6a655da9c sepolicy: add appdomain permissions for perfd
Allow appdomain to access perfd.

Change-Id: I20c26842b643c49304a066a5726b9dc531d1a81e
2015-01-15 18:15:17 -08:00
Dilip Gudlur
46b55b9d66 SEAndroid: Add sepolicy for surfaceflinger
Add perfd permissions for surfaceflinger.

Change-Id: I24844c687457159b7b1eb0559a7469a043b4c60b
2015-01-15 18:14:59 -08:00
Kun Liang
9e6e6b745b sepolicy: allow radio to access video_device, smd_device
VideoCall which belongs to radio domain need permission to access
video_device, smd_device.

Change-Id: Ie14f58ffd3a980e4125c8711177ae6be1b83a49e
2015-01-15 18:13:09 -08:00
Steve Kondik
4d416de23a sepolicy: Additional CM-specific mpdecision rule
Change-Id: Ie63338d2f7b353b481952e4ae39e117f141a87e1
2015-01-15 18:12:42 -08:00
Justin Philip
b338663b23 Seandroid: Allow mm-pp-deamon access to unix socket
Modify mm-pp-deaemon policy file to enable access to
listen and accept unix socket calls from init to enable CABL.

Change-Id: If8621d31d8ae07d17803bb2d152bebf5fffdc51e
2015-01-15 18:08:19 -08:00
Susheel Yadagiri
394243c1fd sepolicy: Added rule to enable unlink of dpmwrapper socket
when dpmd process is restarted dpmwrapper socket needs to be
unlinked and started again. Unlink fails because permission is
denied.

Change-Id: Ie3059785bb7aae940559623e59476d7f15f2730d
2015-01-15 18:07:45 -08:00
Richard LIU
2a2c5b7193 Sepolicy: allow RILD to access health monitor device
Assign read permission on system health monitor device
to RILD

Change-Id: I1691c8354d55f0caea7cf7d85847a15e5e6a344c
2015-01-15 17:36:01 -08:00
Boxiang Pan
8610282347 Sepolicy: allow cnd to access ipa_dev.
adding rules to allow cnd to access ipa_dev for tethering and
data path offload

Change-Id: I571c9e627be89c1baa3c4ae28f9fde1304ebf75b
2015-01-15 17:35:51 -08:00
Sachin Shah
703780d9b7 WFD: Add directory search permissions for video device
This permission is needed for WFD to use OMX HAL interface
as opposed to V4L2 driver layer.

Change-Id: Ib888c88d860ce86f4965de109d297787ddb5ee4b
2015-01-15 17:35:42 -08:00
Ricardo Cerqueira
6cd495bc96 netd: Fix creation of hostapd sockets dir
Change-Id: I76fa316c8512d7e7e887f9f3ec249b7b5912f344
2015-01-14 17:50:33 -08:00
Daniel Hillenbrand
01a24c6b61 common: remove duplicate
device/qcom/sepolicy/common/wcnss_service.te:17:ERROR 'duplicate declaration of type/attribute' at token ';' on line 14366:
type wcnss_service_qmuxd_socket, file_type;
checkpolicy:  error(s) encountered while parsing configuration

Change-Id: Idbcccdae3f0303f6b7d2a85a2ab75a82b5b729f3
2015-01-10 15:24:11 +01:00
Ricardo Cerqueira
b68d772868 Fix access to crypto/DRM firmware
Change-Id: I099953a8adeacd90320daabfab384de74c52a5c3
2015-01-10 03:48:17 +00:00
ramsudharsan
64bf328100 Fix: Repetition of same filenames in the sepolicy union list
Change-Id: I382431a18d0283f1f7fd603ac8f9b707021f3ef1
Signed-off-by: ramsudharsan <ramsudharsanm@gmail.com>
2015-01-01 15:51:00 +05:30
Steve Kondik
77bb91189b sepolicy: Allow apps to read battery status
* Various apps do this to monitor the battery. No harm there.

Change-Id: Id1b843ca509747ed963b89d025a39b5b1fcc7ddb
2014-12-31 16:59:58 -08:00
myfluxi
233406f509 sepolicy: Allow untrusted apps to read temp sensors
Change-Id: I8636f704d7f917e69b69710337ac3dd0e14bda54
2014-12-31 00:59:15 +01:00
Steve Kondik
dbda30f1dd sepolicy: Fix denials related to extended location services
* Also snuck in GPU thermal control.

Change-Id: I5f0fe6a8c48b9a39e3770cca709a9cb7b3943f85
2014-12-30 15:47:23 +00:00
Ricardo Cerqueira
c76fa3504d Merge remote-tracking branch 'caf/LA.BF.2.1_rb1.6' into cm-12.0
Conflicts:
	Android.mk
	common/file_contexts
	common/ims.te
	common/mm-pp-daemon.te
	common/netmgrd.te
	common/radio.te
	common/service.te
	common/service_contexts
	common/system_app.te
	common/system_server.te
	common/thermal-engine.te
	common/untrusted_app.te
	common/wpa.te
	msm8960/Android.mk
	msm8960/file.te
	msm8960/file_contexts

Change-Id: I8308142c06d36380d422fd2256cceae2227fd04f
2014-12-29 16:25:58 +00:00
Satya Durga Srinivasu Prabhala
0066d40fd3 sepolicy: allow system apps to access sensors settings file
system apps need to access sensors settings file in persist partition
to enable or disable sensors in debug & eng builds.

Change-Id: I2cd7ddface6cf7f21cd8b0294c71740945977cd9
2014-12-29 16:16:32 +00:00
Avijit Kanti Das
6893e318ea Seandroid: Moving connectionmanager policy to common
Moving policies related to connection manager to
common folder.

Change-Id: I9be8a072c8b7fda4cab2e246ec68dbcd8d21f562
2014-12-29 16:15:37 +00:00
Avijit Kanti Das
a7b1dd8b00 Seandroid: Adding few more policies for IMS
Addressing fer more more bootup denials

Change-Id: I57811d052d527786ee9c604a09a85719cbb4ae10
2014-12-29 16:15:31 +00:00
Avijit Kanti Das
c8c429725b Seandroid: Changing context for wcnss services
Changing wcnss service context from wpa to wcnss

Change-Id: Ia5c4c0c8fdf3c073e47e44a4b4e29ae886c87a1f
2014-12-29 16:13:10 +00:00
Avijit Kanti Das
010821e8c5 Seandroid: Adding context for digital Pen
Adding context for Digital Pen.

Change-Id: I34eee1069fb01fc0c71815550359165911af69f6
2014-12-29 16:12:38 +00:00
Avijit Kanti Das
7a0858247d Seandroid: Adding policy for IMS
Addressing few bootup denial from IMS

Change-Id: Ie5f258d63a32e2715e6212e6ce31540882d7e9d5
2014-12-29 16:08:33 +00:00
Avijit Kanti Das
9e7c1012e5 Seandroid: Adding context for imscmservice
Adding context for imscmservice, Also addressing few ims related
denial logs

Change-Id: I3e17e57221dc531729ce897590857dbd773d2bbd
2014-12-29 16:08:19 +00:00
Avijit Kanti Das
99ff2c38b4 Seandroid: Adding policy for QTI
Adding policy for QTI.

Change-Id: I78b2a2a2bf25b90810256a15bd757e3848dd83b5
2014-12-29 16:07:33 +00:00
Susheel Yadagiri
8bc7e81ee9 sepolicy: add getattr attribute rule for appdomain in dpmd
added rule for getattr for dpmd

Change-Id: I23516a8f96751ef7556673d52fc23feb63f40489
2014-12-29 16:06:40 +00:00
Kevin Tang
013555b4e8 sepolicy: allow location apps to access sensor services
Added rules for accessing sensor manager services from location
applications.

CRs-Fixed: 764189

Change-Id: I1e98ed907c70a78198ef35cb70fddfbe48dcb82d
2014-12-29 16:05:31 +00:00
Subash Abhinov Kasiviswanathan
3c4f75f3c7 sepolicy: Allow clients of netmgrd read access to netmgrd stat file
rild and location services - which are clients of netmgrd, needs to
have unicast netlink message communication with netmgrd. For this,
it needs to obtain the pid of the netmgrd. To determine the pid of
netmgrd, rild needs access to parse through the proc file system and
find the entry corresponding to netmgrd.

Fix denials faced while accessing the various files corresponding to
the processes in proc.
[   78.653558] type=1400 audit(2567.649:197): avc: denied { search }
for pid=1190 comm="rild" name="1" dev="proc" ino=11739
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=dir permissive=0

[   72.888233] type=1400 audit(1548.919:122): avc: denied { read }
for pid=1181 comm="rild" name="stat" dev="proc" ino=14756
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0

[   66.428453] type=1400 audit(2167.259:82): avc: denied { open }
for pid=1183 comm="rild" path="/proc/1/stat" dev="proc" ino=4086
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0

[  124.895876] type=1400 audit(2587.889:125): avc: denied { getattr }
for pid=1164 comm="rild" path="/proc/1/stat" dev="proc" ino=25356
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0

[  124.897171] type=1400 audit(2587.889:1257): avc: denied { search }
for pid=1164 comm="rild" name="2" dev="proc" ino=25252
scontext=u:r:rild:s0 tcontext=u:r:kernel:s0 tclass=dir permissive=0

[   96.631049] type=1400 audit(3925.959:261): avc: denied { search }
for pid=1176 comm="rild" name="297" dev="proc" ino=10500
scontext=u:r:rild:s0 tcontext=u:r:ueventd:s0 tclass=dir permissive=0

Allow these domains access to the proc stat files of netmgrd while
silently denying access to all other files.

Change-Id: I8d0d09cb9e85fdfa898f19a9eafe9ddaee6c208a
2014-12-29 16:05:27 +00:00
Linux Build Service Account
414d97d5c1 Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.012 on remote branch
Change-Id: Iec1b3a91aeefefddcfc6eb3f3601fa47d2f7d3b1
2014-12-18 15:38:38 -07:00
Avijit Kanti Das
d53bd7aad5 Seandroid: Adding policy for atfwd
Provide atfwd write access to property_socket

Change-Id: I8afee52ca6c9db2c6ce1dcc37ded24d3bec74687
2014-12-12 16:52:07 -08:00
Linux Build Service Account
9a787b08fc Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.011 on remote branch
Change-Id: I22a14d19c9fabf648686360289dbe561645501d9
2014-12-12 13:51:27 -07:00
Steve Kondik
e04329df88 sepolicy: Rule for CM's mpdecision extension
Change-Id: Ibb83220b32bad7805653140751c978e629f87ffb
2014-12-11 22:24:53 -08:00
Ricardo Cerqueira
2177774b6e thermal-engine: Fix socket re-creation perms
Let thermald tear down old pre-existing sockets so new ones can
be created
Change-Id: Ibfdab2201a4f928bd116c0ec64ecd1bc7bf67fb8
2014-12-10 16:44:31 +00:00
Linux Build Service Account
371523db94 Merge "Seandroid: Adding policy for atfwd" into LA.BF.2.1_rb1.4 2014-12-04 14:57:05 -08:00
Avijit Kanti Das
0d416bd687 Seandroid: Adding policy for atfwd
Provide atfwd the write access to property_socket

Change-Id: I8afee52ca6c9db2c6ce1dcc37ded24d3bec74687
2014-12-04 12:07:00 -08:00
Shiju Mathew
a23cdf8576 sepolicy: Update thermal policy to enable graphics mitigation
Update thermal policy so that thermal-engine will be
able to access graphics sysfs nodes to do graphics
mitigation.

Change-Id: I13cef8e82b60382e2ac55966ba72053e1c6cd478
2014-12-04 10:54:22 -08:00
Ricardo Cerqueira
fe6821c5da location: Fix xtwifi's access to location sockets
Change-Id: Ia121624f054e75a06930c1be3bdd6e6d24b2d388
2014-12-04 17:42:42 +00:00
Linux Build Service Account
0cc214480c Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.008 on remote branch
Change-Id: Ie89c25dfed4f2a3ab974d585556460a775beb4c6
2014-12-03 21:27:42 -07:00
Ricardo Cerqueira
9c9e8b69b6 HAX: Enable access to diag on user builds
This should be temporary. Some components (radio and display, mostly)
still rely on diag for logging, and its absence makes the whole subsystem
spin and break things. Pending fixing those components, re-enable diag.

Change-Id: Ic6badb3f89d08ef247455bc669392bea53c33bab
2014-11-28 20:19:00 +00:00
Ricardo Cerqueira
43d959cbfb mpdecision: Let mpdecision tune KSM
Change-Id: I6d7511d94996dcec974b671d681fd70a8dbc4290
2014-11-28 16:24:57 +00:00
Ricardo Cerqueira
dec4dac88b msm8960: Add rules for bridgemgr
Most Fusion devices have this to talk to rmnet.
Add common rules for it

Change-Id: If2989904be017b6f979da99bfd321ac62ddbbfbb
2014-11-28 16:02:40 +00:00
Samir Mehta
f39389d9ee SEAndroid: Fixing few denials
This fixes the below issues

1. 744304 - SELinux Surf port Enumeration issue
   Files changed - mdm_helper.te
                 - rild.te
                 - file_contexts
                 - file.te
                 - rmt_storage.te
                 - device.te
2. 751137 - WIFI is not turning ON
   Files Changed - wpa.te
                 - system_server.te

3. Issues related to CTS testInitDomain and boot up
   denials for other domains.

CRs-fixed: 744304 751137

Change-Id: I2785e85592a10468a667be363e6115e27b76707f
2014-11-28 16:02:36 +00:00
Dinesh K Garg
1f2a5ed5ba sepolicy: Update policy for secure components
Playready stores license under /data/data/app_ms. All TZ apps including
Playready would create their own directory under /data/misc/qsee.
To get test apps working with older dir structure, userdebug mode
build would have permision to create directory under /data/data.
Test apps based on newer targets must move to new structure.
Also add policies for secureUI.

Change-Id: Ibc4412ca9e8e065d54263bb46333bd223dfb553d
2014-11-28 12:21:00 +00:00
Samir Mehta
6341d29f82 Sepolicy: Fix camera & surface flinger denials
Device node were not proper /dev/msm_camera was
labelled as audio_device which is wrong and
/dev/msm_rotator as well as audio_device, so
changing the label to appropriate to fix the false positive
denials.

Change-Id: I7b3ebbcb9999d794823ee7c0d7cad330d50be02e
2014-11-28 12:15:18 +00:00
Katish Paran
25b68bc534 sepolicy: Update policy for time daemon
This patch updates the socket permission for time-daemon.

Change-Id: Ifc7d377585e9699a21ed569fe0402de35992c13b
2014-11-27 18:44:06 +00:00
Kurva Harish
d03bdc134d Seandroid: Added rules to thermal-engine
Added rules to thermal-engine for access to thermal-sockets which
is needed for  mediaserver ,camera and couple of other services.

Change-Id: I7f5f89c112357ee595f275b20325fede40439924
2014-11-27 18:44:06 +00:00
Bhavya Sokke Mallikarjunappa
7dbb59b937 sepolicy: add rule for dpm
add rule for DPM data file for db file
and removed duplicate rules

Change-Id: Ieed4f0b1cf19df06c04528245a0c6b799518542a
2014-11-27 18:44:06 +00:00
Ricardo Cerqueira
722b2d01aa time_daemon: Fix labeling the time atom data files
Change-Id: I49c270cfb6853f0e6f94335b9d84bc85ab97e1e2
2014-11-27 17:34:33 +00:00
Ricardo Cerqueira
836b91b673 thermal: Allow socket creation at /dev/socket
Change-Id: I090179b83404c0a19917a79d705b74a57a982971
2014-11-27 17:04:05 +00:00
Ricardo Cerqueira
7e70b69007 camera: Fix domain socket labeling
Change-Id: I42094eb1064eca4cf227ee7af559427b160f476e
2014-11-27 17:01:35 +00:00
Ricardo Cerqueira
c30eafa602 mediaserver: Fix access to perflock (thermal)
Change-Id: I30edc8e6aa189d4c5da2b83e90d27ec53c1f044d
2014-11-27 16:49:17 +00:00
Ricardo Cerqueira
10d5f0abec thermal: Fix labeling the thermal sockets
Change-Id: Iffdaca86f539ede159aa9c02f8839e0f69bfc1d9
2014-11-27 16:49:11 +00:00
Ricardo Cerqueira
7d7716eb3a Do not include common SE policies automatically
Automatic additions to BOARD_SEPOLICY_UNION from Android.mk do not
guarantee order or precedence of rules. More often than not, these
rules get included _after_ the device's own, which makes
it impossible for the device to extend them, or even to use types
defined here.

Manually include these in the device's BoardConfig with
"include device/qcom/sepolicy/sepolicy.mk" before
its own specific BOARD_SEPOLICY_DIRS (if any) instead. Or just
include files piecemeal.

Change-Id: I2ce0c3ec325906a46570b26c5f0c2018390d2ec9
2014-11-26 17:34:15 +00:00
Subash Abhinov Kasiviswanathan
dd4a9de52f netmgrd: allow communication with connectivity framework
Fix the following denials

Allow communication with cnd sockets
[   22.806091] type=1400 audit(1415054892.584:18): avc: denied { write }
for pid=1317 comm="netmgrd" name="cnd" dev="tmpfs" ino=8381
scontext=u:r:netmgrd:s0 tcontext=u:object_r:cnd_socket:s0 tclass=sock_file
[ 22.316132] type=1400 audit(1415053588.674:56): avc: denied
{ connectto } for pid=1321 comm="netmgrd" path="/dev/socket/cnd"
scontext=u:r:netmgrd:s0 tcontext=u:r:cnd:s0 tclass=unix_stream_socket

Allow operations on netlink xfrm sockets
[   20.794160] type=1400 audit(1415053541.505:16): avc: denied
{ setopt } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[   20.794450] type=1400 audit(1415053541.505:17): avc: denied
{ getattr } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[   20.794528] type=1400 audit(1415053541.505:18): avc: denied
{ write } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[   20.794602] type=1400 audit(1415053541.505:19): avc: denied
{ nlmsg_write } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[   20.794688] type=1400 audit(1415053541.505:20): avc: denied
{ read } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket

Allow operations on netd and its resources
[   20.827567] type=1400 audit(1415053541.545:21): avc: denied { read }
for pid=1166 comm="ip" name="rt_tables" dev="mmcblk0p13" ino=268
scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0 tclass=file
[   20.827802] type=1400 audit(1415053541.545:22): avc: denied { open }
for pid=1166 comm="ip" name="rt_tables" dev="mmcblk0p13" ino=268
scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0 tclass=file
[   20.827915] type=1400 audit(1415053541.545:23): avc: denied { getattr
}for pid=1166 comm="ip" path="/data/misc/net/rt_tables" dev="mmcblk0p13"
ino=268 scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0
tclass=file
[   21.480717] type=1400 audit(1415053542.195:24): avc: denied { getattr
} for pid=1259 comm="sh" path="/system/bin/ndc" dev="mmcblk0p12" ino=444
 scontext=u:r:netmgrd:s0 tcontext=u:object_r:wpa_exec:s0 tclass=file
[   21.481188] type=1400 audit(1415053542.195:25): avc: denied { execute
} for pid=1259 comm="sh" name="ndc" dev="mmcblk0p12" ino=444
scontext=u:r:netmgrd:s0 tcontext=u:object_r:wpa_exec:s0 tclass=file
[   21.482377] type=1400 audit(1415053542.195:26): avc: denied { read
open } for pid=1260 comm="sh" name="ndc" dev="mmcblk0p12" ino=444
scontext=u:r:netmgrd:s0 tcontext=u:object_r:wpa_exec:s0 tclass=file
[   21.482614] type=1400 audit(1415053542.195:27): avc: denied
{ execute_no_trans } for pid=1260 comm="sh" path="/system/bin/ndc"
dev="mmcblk0p12" ino=444 scontext=u:r:netmgrd:s0
tcontext=u:object_r:wpa_exec:s0 tclass=file
avc: denied { search } for pid=1168 comm="ip" name="net" dev="mmcblk0p34"
ino=210 scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0
tclass=dir permissive=0

CRs-Fixed: 748457
Change-Id: Ie1044b498002602354b28f3c2e36bf1c9ee64e15
2014-11-20 21:51:28 -08:00
Vince Leung
c7902e848c sepolicy: allow untrusted_app access to perflock
Add allow policy for untrusted app to write into
PerfLock socket

Change-Id: Ib494148895b38e352635511643fa90266c8d2ae9
2014-11-20 21:51:28 -08:00
Tushar Janefalkar
2e74d6e656 SEAndroid: Add new location policy
Added policy for lowi-server to access
netlink sockets

Change-Id: I8fd6687d2b2e7c4dcb5e05b6f0541b3a24807b23
CRs-fixed: 747721
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
96ed5acea1 Seandroid: replacing policies with macro
Using macro for location services

Change-Id: Ic70498c3463803a36718091d43837c2f93e6d34b
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
ddfd476afb Seandroid: Moving wpa related policies to wpa.te
Moving all wpa related issues to wpa.te and removing unnecessary
files

Change-Id: I610dbb0041ad89489fad2235f3d7cbb0c49edfb8
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
ea450c9eb2 Seandroid: Removing unused file
Removing unused file gloabal_macro.te

Change-Id: If5bd3813b0918ca08bbcebc4339d873f4abb95a9
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
4e65b736cd Seandroid: Adding dun service context.
Adding context for dun service

Change-Id: Ie20962700335058800ed0d42ed01c2f27e4f96de
2014-11-20 21:51:28 -08:00
Boxiang Pan
c2aebb2983 sepolicy: add rule for CNE.
add rule for CNE data file for db file

Change-Id: I1dbc81f7be2bb4b4344336546622d351f5fa3e23
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
4f4e27e5d7 Seandroid: Add policy for wbc services
Add policy for wbc services

Change-Id: I1ca863faeaac84382cc6e208fa4c869978d9b80a
2014-11-20 21:51:28 -08:00
Samir Mehta
0599820753 sepolicy : Define policy for wcnss service domain
Adding wcnss domain and secontext needed for this domain.

Change-Id: I905a0e7b3e1672ead5980b81134c4d1a9b5164e5
2014-11-20 21:51:28 -08:00
Sri Krishna Chaitanya Madireddy
4224895441 EAndroid:add policy for init_shell
Adding policy for ini_shell for test scripts

Change-Id: Ic5c876b75612c6b8f06ee566ff144c6d50243c8a
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
9fa941580c Seandroid: Adding policy for system_app
Adding policy for system_app to give access to debugfs

Change-Id: I98e5fff67d56840eb8b025223d94e28315e22765
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
ed0bb3b52c Seandroid: Moving adbd to enforcing mode
Moving seandroid to enforcing mode

Change-Id: I2425464992e0ea8cc44f9680781e011340b48513
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
3dd1ac9c1b Seandroid: Adding policy for QTI.
Adding policy for QTI.

Change-Id: Iea59e6add0540600effdbc117ef6dc7c88055218
2014-11-20 21:51:28 -08:00
Chirayu Desai
fab062c43b Correct executable bit for source files
Change-Id: Ic37634d5e53376b59d4df80caae2681f960fceee
2014-11-19 04:37:24 +00:00
Chirayu Desai
d76e3d7e9b Append to sepolicy variables
Change-Id: I0cf2a72b1219d9f7331323d97ab2bd017a076691
2014-11-13 17:22:12 +05:30
Boxiang Pan
b00e855871 sepolicy: add rule for cne logging
add a rule for allow enabling cne debug logging.

Change-Id: I266b224cf1af720f664f504019f0098d7d258712
2014-11-12 15:19:59 -08:00
Linux Build Service Account
f9737d1a54 Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.002 on remote branch
Change-Id: I6588eee30de0a2dd68d152675a70fa704b8a22fa
2014-11-12 14:53:58 -07:00
Boxiang Pan
8e537c3faf sepolicy: add rule for cne logging
add a rule for allow enabling cne debug logging.

Change-Id: I266b224cf1af720f664f504019f0098d7d258712
2014-11-05 00:16:50 -08:00
41 changed files with 230 additions and 135 deletions

119
Android.mk Executable file → Normal file
View File

@@ -1,109 +1,10 @@
# Board specific SELinux policy variable definitions
ifeq ($(call is-vendor-board-platform,QCOM),true)
BOARD_SEPOLICY_DIRS := \
device/qcom/sepolicy \
device/qcom/sepolicy/common \
device/qcom/sepolicy/test \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)
BOARD_SEPOLICY_UNION := \
genfs_contexts \
file_contexts \
service_contexts \
property_contexts \
te_macros \
device.te \
vold.te \
ueventd.te \
file.te \
property.te \
untrusted_app.te \
drmserver.te \
adbd.te \
app.te \
cnd.te \
system_server.te \
mediaserver.te \
msm_irqbalanced.te \
qmuxd.te \
netmgrd.te \
port-bridge.te \
atfwd.te \
radio.te \
smd_test.te \
qmi_ping.te \
qmi_test_service.te \
irsc_util.te \
netd.te \
rild.te \
diag.te \
diag_test.te \
audiod.te \
service.te \
system_app.te \
thermal-engine.te \
vm_bms.te \
system_app.te \
bluetooth.te \
init_shell.te \
mpdecision.te \
perfd.te \
mm-qcamerad.te \
domain.te \
init.te \
time_daemon.te \
rmt_storage.te \
rfs_access.te \
hvdcp.te \
qti.te \
qseecomd.te \
mcStarter.te \
keystore.te \
ims.te \
imscm.te \
healthd.te \
charger_monitor.te \
surfaceflinger.te \
mm-pp-daemon.te \
wpa.te \
bootanim.te \
zygote.te \
mdm_helper.te \
peripheral_manager.te \
qcomsysd.te \
usb_uicc_daemon.te \
adsprpcd.te \
qlogd.te \
ipacm.te \
dpmd.te \
ssr_setup.te \
subsystem_ramdump.te \
ssr_diag.te \
sectest.te \
location.te \
location_app.te \
seapp_contexts \
logd.te \
installd.te \
wcnss_service.te \
mmi.te \
dhcp.te \
wfd_app.te \
mediaserver_test.te \
hbtp.te \
kernel.te \
vold.te
# Compile sensor pilicy only for SSC targets
SSC_TARGET_LIST := apq8084
SSC_TARGET_LIST += msm8226
SSC_TARGET_LIST += msm8960
SSC_TARGET_LIST += msm8974
SSC_TARGET_LIST += msm8994
#ifeq ($(call is-board-platform-in-list,$(SSC_TARGET_LIST)),true)
BOARD_SEPOLICY_UNION += sensors.te
BOARD_SEPOLICY_UNION += sensors_test.te
#endif
endif
# Don't recurse into the platform makefiles. We don't care about them, and
# we don't want to force a reset of BOARD_SEPOLICY_DIRS
#
# If you want to use these policies, add a
#
# include device/qcom/sepolicy/sepolicy.mk
#
# to your device's BoardConfig. It is highly recommended that in case
# you have your own BOARD_SEPOLICY_DIRS and BOARD_SEPOLICY_UNION declarations,
# the inclusion happens _before_ those lines

View File

@@ -7,3 +7,8 @@ unix_socket_connect(appdomain, dpmwrapper, dpmd)
unix_socket_connect(appdomain, qlogd, qlogd)
#Allow all apps to open and send ioctl to qdsp device
allow appdomain qdsp_device:chr_file r_file_perms;
# access to perflock
allow appdomain mpctl_socket:dir r_dir_perms;
unix_socket_send(appdomain, mpctl, perfd)
unix_socket_connect(appdomain, mpctl, perfd)

View File

@@ -66,3 +66,5 @@ allow cnd mediaserver:fd use;
allow cnd mediaserver:tcp_socket { read write bind getattr shutdown getopt };
allow cnd mediaserver:file { open read };
# allow cnd to access ipa_dev
allow cnd ipa_dev:chr_file r_file_perms;

View File

@@ -1,13 +1,15 @@
type diag, domain;
type diag_exec, exec_type, file_type;
userdebug_or_eng(`
# Our BSPs still use diag for logging on a ton of components.
# Allow access in user builds for now.
#userdebug_or_eng(`
domain_auto_trans(shell, diag_exec, diag)
domain_auto_trans(adbd, diag_exec, diag)
file_type_auto_trans(diag, system_data_file, diag_data_file);
allow diag diag_device:chr_file {ioctl read write open getattr};
allow diag devpts:chr_file {ioctl read write open getattr};
allow diag shell:fd {use};
allow diag su:fd {use};
#allow diag su:fd {use};
allow diag cgroup:dir { create add_name };
allow diag console_device:chr_file { read write };
allow diag port:tcp_socket name_connect;
@@ -25,4 +27,4 @@ userdebug_or_eng(`
allow diag persist_drm_file:file create_file_perms;
# allow access to qseecom for drmdiagapp
allow sectest tee_device:chr_file rw_file_perms;
')
#')

View File

@@ -1,6 +1,6 @@
userdebug_or_eng(`
#userdebug_or_eng(`
allow domain diag_device:chr_file rw_file_perms;
')
#')
r_dir_file(domain, sysfs_socinfo);
r_dir_file(domain, sysfs_esoc);

View File

@@ -36,3 +36,6 @@ allow dpmd kernel:system module_request;
#appdomain
allow dpmd appdomain:fd use;
allow dpmd appdomain:tcp_socket { read write getopt getattr };
#permission to unlink dpmwrapper socket
allow dpmd socket_device:dir remove_name;

View File

@@ -106,9 +106,6 @@ type ipacm_data_file, file_type;
#Define the files written during the operation of mmi
type mmi_data_file, file_type, data_file_type;
#needed by vold
type proc_dirty_ratio, fs_type;
# hbtp config file
type hbtp_cfg_file, file_type;
type hbtp_log_file, file_type;

View File

@@ -213,7 +213,7 @@
/data/hlos_rfs(/.*)? u:object_r:rfs_shared_hlos_file:s0
/data/camera(/.*)? u:object_r:camera_socket:s0
/data/system/sensors(/.*)? u:object_r:sensors_data_file:s0
/data/time/* u:object_r:time_data_file:s0
/data/time(/.*)? u:object_r:time_data_file:s0
/data/nfc(/.*)? u:object_r:nfc_data_file:s0
/data/system/perfd(/.*)? u:object_r:mpctl_data_file:s0
/data/misc/perfd(/.*)? u:object_r:mpctl_socket:s0

1
common/genfs_contexts Executable file → Normal file
View File

@@ -1,2 +1 @@
genfscon proc /asound/card0/state u:object_r:proc_audiod:s0
genfscon proc /proc/sys/vm/dirty_ratio u:object_r:proc_dirty_ratio:s0

View File

@@ -1 +0,0 @@
allow kernel block_device:blk_file r_file_perms;

View File

@@ -1,2 +1,6 @@
# Allow keystore to operate using qseecom_device
allow keystore tee_device:chr_file rw_file_perms;
# Allow keystore to search and get keymaste.mdt
allow keystore firmware_file:dir search;
allow keystore firmware_file:file { read getattr open };

View File

@@ -16,9 +16,10 @@ binder_call(location, system_server)
allow location location_data_file:dir rw_dir_perms;
allow location location_data_file:fifo_file create_file_perms;
allow location location_data_file:file create_file_perms;
allow location location_data_file:sock_file create_file_perms;
allow location location_exec:file execute_no_trans;
allow location location_socket:sock_file create_file_perms;
allow location self:capability { setuid setgid };
allow location self:capability { setuid setgid net_admin };
allow location self:socket create_socket_perms;
allow location sensors:unix_stream_socket connectto;
allow location sensors_device:chr_file r_file_perms;

0
common/mdm_helper.te Executable file → Normal file
View File

View File

@@ -16,6 +16,7 @@ allow mediaserver camera_data_file:sock_file write;
userdebug_or_eng(`
allow mediaserver camera_data_file:dir rw_dir_perms;
allow mediaserver camera_data_file:file create_file_perms;
allow mediaserver debugfs:file rw_file_perms;
')
allow mediaserver sysfs_esoc:dir r_dir_perms;
@@ -25,6 +26,7 @@ allow mediaserver system_app_data_file:file rw_file_perms;
allow mediaserver mpctl_socket:dir r_dir_perms;
unix_socket_send(mediaserver, mpctl, mpdecision)
unix_socket_connect(mediaserver, mpctl, mpdecision)
unix_socket_connect(mediaserver, thermal, thermal-engine)
# access to perflock
allow mediaserver mpctl_socket:dir r_dir_perms;
@@ -33,3 +35,7 @@ unix_socket_connect(mediaserver, mpctl, perfd)
# for thermal sock files
unix_socket_connect(mediaserver, thermal, thermal-engine)
# Allow mediaserver to search and get the widevine, playready firmwares
allow mediaserver firmware_file:dir search;
allow mediaserver firmware_file:file { read getattr open };

10
common/mm-pp-daemon.te Executable file → Normal file
View File

@@ -23,8 +23,9 @@ allow mm-pp-daemon sensors_socket:sock_file rw_file_perms;
allow mm-pp-daemon sensors:unix_stream_socket connectto;
allow mm-pp-daemon system_prop:property_service set;
userdebug_or_eng(`
#Calibration can only be done on userdebug or eng builds
#Enable on user builds too. This is causing mayhem for gfx
#userdebug_or_eng(`
# Display calibration service opens /dev/diag in order to communicate with the
# target device
allow mm-pp-daemon diag_device:chr_file rw_file_perms;
@@ -41,12 +42,15 @@ userdebug_or_eng(`
allow mm-pp-daemon system_file:file execute_no_trans;
allow mm-pp-daemon zygote_exec:file rx_file_perms;
allow mm-pp-daemon self:process ptrace;
')
# Allow mm-pp-daemon to change the brightness of the target during display
# calibration
allow mm-pp-daemon sysfs:file rw_file_perms;
#')
# Allow socket calls in pp-daemon
unix_socket_connect(mm-pp-daemon, property, init)
unix_socket_connect(mm-pp-daemon, pps, init)
allow mm-pp-daemon init:unix_stream_socket listen;
allow mm-pp-daemon init:unix_stream_socket accept;

View File

@@ -7,6 +7,8 @@ userdebug_or_eng(`
')
#Communicate with user land process through domain socket
type_transition mm-qcamerad system_data_file:sock_file camera_socket "cam_socket1";
type_transition mm-qcamerad system_data_file:sock_file camera_socket "cam_socket2";
allow mm-qcamerad camera_socket:sock_file { create unlink write };
allow mm-qcamerad camera_socket:dir w_dir_perms;
unix_socket_connect(mm-qcamerad, sensors, sensors)

View File

@@ -7,6 +7,8 @@ allow mpdecision sysfs_mpdecision:file rw_file_perms;
allow mpdecision sysfs_devices_system_cpu:file rw_file_perms;
allow mpdecision sysfs_rqstats:file w_file_perms;
allow mpdecision sysfs_cpu_online:file rw_file_perms;
# For the KSM tunables
allow mpdecision sysfs_writable:file rw_file_perms;
#Allow mpdecision set cpu affinity
allow mpdecision kernel:process setsched;
#Allow writes to /dev/cpu_dma_latency
@@ -32,3 +34,9 @@ allow mpdecision mpctl_data_file:file { create_file_perms unlink };
#allow poll of system_server status
allow mpdecision system_server:dir search;
allow mpdecision system_server:file { open read };
#cm extra opts
allow mpdecision thermal-engine:unix_stream_socket connectto;
allow mpdecision thermal_socket:sock_file write;
allow mpdecision sysfs_thermal:file rw_file_perms;
allow mpdecision sysfs_devices_system_iosched:file rw_file_perms;

View File

@@ -4,6 +4,10 @@ allow netd netd:packet_socket { create bind setopt read ioctl };
allow netd wfd_app:fd use;
allow netd wfd_app:tcp_socket { read write setopt getopt };
# See change I4dd0326110c655fcd6cd5f8425be523d9e64ffa7 to system/netd
type_transition netd wifi_data_file:dir wpa_socket "sockets";
allow netd wpa_socket:dir create_dir_perms;
dontaudit netd self:capability sys_module;
#needed for ipt_TCPMSS and ip6t_TCPMSS

0
common/qseecomd.te Executable file → Normal file
View File

View File

@@ -11,3 +11,8 @@ unix_socket_connect(radio, dpmd, dpmd)
# IMS needs permission to use unix domain socket
allow radio ims:unix_stream_socket connectto;
# allow radio to access video_device, smd_device for VideoCall
allow radio video_device:dir r_dir_perms;
allow radio video_device:chr_file rw_file_perms;
allow radio smd_device:chr_file rw_file_perms;

View File

@@ -13,8 +13,9 @@ allow rild sysfs_ssr:lnk_file { read open };
allow rild mediaserver:binder { transfer call };
#allow rild diag_device:chr_file { open read write };
allow rild diag_device:chr_file { open read write };
allow rild rild_socket:chr_file { open read write };
allow rild system_health_monitor_device:chr_file r_file_perms;
allow rild sysfs_ssr:dir r_dir_perms;
allow rild sysfs_ssr:lnk_file read;

View File

@@ -2,3 +2,4 @@
user=gps domain=location_app type=location_app_data_file
user=system seinfo=platform name=com.qualcomm.services.location domain=location_app type=location_app_data_file
user=system seinfo=platform name=com.qualcomm.location.XT domain=location_app type=location_app_data_file
user=system seinfo=platform name=com.qualcomm.msapm domain=location_app type=location_app_data_file

View File

@@ -53,5 +53,5 @@ allow sensors device_latency:chr_file w_file_perms;
# Access to tests from userdebug/eng builds
userdebug_or_eng(`
domain_auto_trans(shell, sensors_exec, sensors)
allow sensors diag_device:chr_file rw_file_perms;
')
allow sensors diag_device:chr_file rw_file_perms;

0
common/ssr_diag.te Executable file → Normal file
View File

0
common/subsystem_ramdump.te Executable file → Normal file
View File

View File

@@ -6,3 +6,8 @@ r_dir_file(surfaceflinger, mm-pp-daemon)
binder_call(surfaceflinger, location)
binder_call(surfaceflinger, tee)
# access to perflock
allow surfaceflinger mpctl_socket:dir r_dir_perms;
unix_socket_send(surfaceflinger, mpctl, perfd)
unix_socket_connect(surfaceflinger, mpctl, perfd)

View File

@@ -33,7 +33,7 @@ allow system_server location_data_file:dir rw_dir_perms;
allow system_server location_data_file:fifo_file create_file_perms;
allow system_server location_socket:sock_file rw_file_perms;
allow system_server location_app_data_file:dir r_dir_perms;
allow system_server location_data_file:sock_file rw_file_perms;
allow system_server location_data_file:sock_file create_file_perms;
#For wifistatemachine
allow system_server kernel:key search;

View File

@@ -10,11 +10,11 @@ init_daemon_domain(thermal-engine)
allow thermal-engine thermal_device:chr_file rw_file_perms;
#This is required to access smem log device
allow thermal-engine smem_log_device:chr_file rw_file_perms;
allow thermal-engine self:capability { dac_read_search dac_override fsetid };
allow thermal-engine self:capability { dac_read_search dac_override fsetid chown };
allow thermal-engine self:socket create_socket_perms;
#This is required to access thermal sockets
allow thermal-engine thermal_socket:dir w_dir_perms;
allow thermal-engine thermal_socket:sock_file { create setattr open read write };
allow thermal-engine thermal_socket:sock_file { create setattr open read write unlink };
#This is required for thermal sysfs access
allow thermal-engine sysfs_thermal:dir r_dir_perms;
allow thermal-engine sysfs_thermal:file rw_file_perms;
@@ -24,3 +24,8 @@ allow thermal-engine sysfs:file write;
qmux_socket(thermal-engine);
allow thermal-engine sysfs_mpdecision:file rw_file_perms;
r_dir_file(thermal-engine, sysfs_ssr);
#Label the thermal sockets correctly
type_transition thermal-engine socket_device:sock_file thermal_socket;
#Allow creation of the sockets in the socket dir
allow thermal-engine socket_device:dir { write add_name remove_name };

View File

@@ -12,6 +12,8 @@ allow time_daemon smem_log_device:chr_file rw_file_perms;
allow time_daemon rtc_device:chr_file { open read ioctl };
allow time_daemon alarm_device:chr_file { open read write ioctl };
#============= File labeling ==============
type_transition time_daemon system_data_file:file time_data_file;
#============= File read/write ==============
allow time_daemon time_data_file:file { write create open read};
allow time_daemon time_data_file:dir { write add_name search};

3
common/uncrypt.te Normal file
View File

@@ -0,0 +1,3 @@
allow uncrypt misc_partition:blk_file w_file_perms;
allow uncrypt misc_partition:dir r_dir_perms;

View File

@@ -1,10 +1,16 @@
# access to perflock
allow untrusted_app mpctl_socket:dir r_dir_perms;
unix_socket_send(untrusted_app, mpctl, perfd)
unix_socket_connect(untrusted_app, mpctl, perfd)
unix_socket_send(untrusted_app, mpctl, mpdecision)
unix_socket_connect(untrusted_app, mpctl, mpdecision)
# read temp sensors
allow untrusted_app sysfs_thermal:file r_file_perms;
allow untrusted_app sysfs_thermal:lnk_file r_file_perms;
allow untrusted_app sysfs_thermal:dir r_dir_perms;
# allow apps to read battery status
allow untrusted_app sysfs_battery_supply:dir r_dir_perms;
allow untrusted_app sysfs_battery_supply:file r_file_perms;
# test apps needs to communicate with imscm
# using binder call
userdebug_or_eng(`

1
common/vold.te Executable file → Normal file
View File

@@ -6,4 +6,3 @@ allow vold proc_sysrq:file rw_file_perms;
allow vold self:capability sys_boot;
allow vold cache_file:dir { write add_name };
allow vold cache_file:file { write create open };
allow vold proc_dirty_ratio:file rw_file_perms;

View File

@@ -14,7 +14,6 @@ allow wcnss_service wifi_data_file:file create_file_perms;
allow wcnss_service system_prop:property_service set;
allow wcnss_service persist_file:dir r_dir_perms;
qmux_socket(wcnss_service);
allow wcnss_service self:socket create_socket_perms;
allow wcnss_service smem_log_device:chr_file rw_file_perms;

View File

@@ -12,7 +12,6 @@ allow wfd_app video_device:dir r_dir_perms;
allow wfd_app video_device:chr_file rw_file_perms;
allow wfd_app audio_device:dir r_dir_perms;
allow wfd_app audio_device:chr_file rw_file_perms;
allow wfd_app fwmarkd_socket:sock_file write;
allow wfd_app netd:unix_stream_socket connectto;
allow wfd_app firmware_file:dir r_dir_perms;
allow wfd_app firmware_file:file r_file_perms;

View File

@@ -1 +1,2 @@
BOARD_SEPOLICY_UNION += \
bridgemgr.te

16
msm8960/bridgemgr.te Normal file
View File

@@ -0,0 +1,16 @@
# Bridge Manager (radio process)
type bridge, domain;
type bridge_exec, exec_type, file_type;
# Started by init
init_daemon_domain(bridge)
# Uevent for usb connection
allow bridge self:netlink_kobject_uevent_socket { create bind read };
# Talk to qmuxd (qmux_radio)
qmux_socket(bridge)
# Alert the RmNet SMD & SDIO function driver of the correct transport.
# (/sys/class/android_usb/f_rmnet_smd_sdio/transport)
allow bridge sysfs_rmnet:file { open read write getattr };

View File

@@ -1,2 +1,4 @@
#efs file types
type efs_data_file, file_type, data_file_type;
#for Fusion's bridgemgr
type sysfs_rmnet, fs_type, sysfs_type;

View File

@@ -20,3 +20,9 @@
# Data files
#
/data/qcks(/.*)? u:object_r:efs_data_file:s0
###################################
# SDIO transport control on Fusion
#
/sys/class/android_usb/f_rmnet_smd_sdio/transport -- u:object_r:sysfs_rmnet:s0
/sys/devices/virtual/android_usb/android0/f_rmnet_smd_sdio/transport -- u:object_r:sysfs_rmnet:s0

2
msm8994/ims.te Normal file
View File

@@ -0,0 +1,2 @@
allow ims self:capability net_raw;
allow ims self:socket { read bind create write ioctl };

106
sepolicy.mk Normal file
View File

@@ -0,0 +1,106 @@
# Board specific SELinux policy variable definitions
BOARD_SEPOLICY_DIRS += \
device/qcom/sepolicy \
device/qcom/sepolicy/common \
device/qcom/sepolicy/test \
device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)
BOARD_SEPOLICY_UNION += \
genfs_contexts \
file_contexts \
service_contexts \
property_contexts \
te_macros \
device.te \
ueventd.te \
file.te \
property.te \
untrusted_app.te \
drmserver.te \
adbd.te \
app.te \
cnd.te \
system_server.te \
mediaserver.te \
msm_irqbalanced.te \
qmuxd.te \
netmgrd.te \
port-bridge.te \
atfwd.te \
radio.te \
smd_test.te \
qmi_ping.te \
qmi_test_service.te \
irsc_util.te \
netd.te \
rild.te \
diag.te \
diag_test.te \
audiod.te \
service.te \
thermal-engine.te \
vm_bms.te \
system_app.te \
bluetooth.te \
init_shell.te \
mpdecision.te \
perfd.te \
mm-qcamerad.te \
domain.te \
init.te \
time_daemon.te \
rmt_storage.te \
rfs_access.te \
hvdcp.te \
qti.te \
qseecomd.te \
mcStarter.te \
keystore.te \
ims.te \
imscm.te \
healthd.te \
charger_monitor.te \
surfaceflinger.te \
mm-pp-daemon.te \
wpa.te \
bootanim.te \
zygote.te \
mdm_helper.te \
peripheral_manager.te \
qcomsysd.te \
usb_uicc_daemon.te \
adsprpcd.te \
qlogd.te \
ipacm.te \
dpmd.te \
ssr_setup.te \
subsystem_ramdump.te \
ssr_diag.te \
sectest.te \
location.te \
location_app.te \
seapp_contexts \
logd.te \
installd.te \
wcnss_service.te \
mmi.te \
dhcp.te \
wfd_app.te \
mediaserver_test.te \
hbtp.te \
vold.te
-include device/qcom/sepolicy/$(TARGET_BOARD_PLATFORM)/Android.mk
# Compile sensor policy only for SSC targets
SSC_TARGET_LIST := apq8084
SSC_TARGET_LIST += msm8226
SSC_TARGET_LIST += msm8610
SSC_TARGET_LIST += msm8960
SSC_TARGET_LIST += msm8974
SSC_TARGET_LIST += msm8994
#ifeq ($(call is-board-platform-in-list,$(SSC_TARGET_LIST)),true)
BOARD_SEPOLICY_UNION += sensors.te
BOARD_SEPOLICY_UNION += sensors_test.te
#endif

0
test/file_contexts Executable file → Normal file
View File