Ricardo Cerqueira
ca334323e9
uncrypt needs to write to the BCB
...
and in QC hardware, that's misc_partition...
Change-Id: I1d2f5d11423f01435f17f0e6f5d418cc0ce30e9d
2015-04-22 01:28:18 +01:00
percy-g2
5f595f2531
msm8610: Compile sensor policy and fix typo
...
Change-Id: I30c33635dcce202f5f6753dc8a9bf746012d66b4
Signed-off-by: percy-g2 <gahlotpercy@gmail.com >
2015-02-21 22:09:34 +05:30
Ricardo Cerqueira
23a1492f57
Revert "SEAndroid: Updated vold domain related policy"
...
This reverts commit 733050a425 .
This has an incorrect path, and doesn't belong here at all. Any
platform using UMS is affected by this
Change-Id: I067ba68a64c16406b787fefd97d6c6d9e0d41344
2015-02-11 23:16:47 +00:00
Kun Liang
5ca33d98db
sepolicy: fix app_process lnk_file read denied issue
...
app_process is a lnk_file pointed to app_process32 or
app_process64 under /system/bin. It should be labelled as
system_file but not zygote_exec.
Change-Id: If6ddbc9d9262094f3fb44686bff4826d2afc2ce2
2015-01-21 01:35:12 -08:00
Sridhar Gujje
cb1eb911e9
sepolicy : added secontext for app_process which is a link which
...
get created and pointed to 64/32 bit arch bin.
added secontext as zygote_exec for app_process.
Change-Id: I0887c8d90c88a2ecc169aaad3aa92d832e557994
2015-01-21 01:35:12 -08:00
Steve Kondik
5e7c74af59
selinux: Cleanup warnings
...
Change-Id: Ic70fe8cafcd837c5a52af69f46b565c5b58c0fa3
2015-01-16 10:23:00 -08:00
Srikanth Uyyala
7f134914b0
selinux: audio: update policy file for audio
...
update policy file to allow QACT to access debugfs
Change-Id: Ia4897325e1869015f4e205823eff1e923ba3abef
2015-01-15 18:34:33 -08:00
Dilip Gudlur
c6a655da9c
sepolicy: add appdomain permissions for perfd
...
Allow appdomain to access perfd.
Change-Id: I20c26842b643c49304a066a5726b9dc531d1a81e
2015-01-15 18:15:17 -08:00
Dilip Gudlur
46b55b9d66
SEAndroid: Add sepolicy for surfaceflinger
...
Add perfd permissions for surfaceflinger.
Change-Id: I24844c687457159b7b1eb0559a7469a043b4c60b
2015-01-15 18:14:59 -08:00
Kun Liang
9e6e6b745b
sepolicy: allow radio to access video_device, smd_device
...
VideoCall which belongs to radio domain need permission to access
video_device, smd_device.
Change-Id: Ie14f58ffd3a980e4125c8711177ae6be1b83a49e
2015-01-15 18:13:09 -08:00
Steve Kondik
4d416de23a
sepolicy: Additional CM-specific mpdecision rule
...
Change-Id: Ie63338d2f7b353b481952e4ae39e117f141a87e1
2015-01-15 18:12:42 -08:00
Justin Philip
b338663b23
Seandroid: Allow mm-pp-deamon access to unix socket
...
Modify mm-pp-deaemon policy file to enable access to
listen and accept unix socket calls from init to enable CABL.
Change-Id: If8621d31d8ae07d17803bb2d152bebf5fffdc51e
2015-01-15 18:08:19 -08:00
Susheel Yadagiri
394243c1fd
sepolicy: Added rule to enable unlink of dpmwrapper socket
...
when dpmd process is restarted dpmwrapper socket needs to be
unlinked and started again. Unlink fails because permission is
denied.
Change-Id: Ie3059785bb7aae940559623e59476d7f15f2730d
2015-01-15 18:07:45 -08:00
Richard LIU
2a2c5b7193
Sepolicy: allow RILD to access health monitor device
...
Assign read permission on system health monitor device
to RILD
Change-Id: I1691c8354d55f0caea7cf7d85847a15e5e6a344c
2015-01-15 17:36:01 -08:00
Boxiang Pan
8610282347
Sepolicy: allow cnd to access ipa_dev.
...
adding rules to allow cnd to access ipa_dev for tethering and
data path offload
Change-Id: I571c9e627be89c1baa3c4ae28f9fde1304ebf75b
2015-01-15 17:35:51 -08:00
Sachin Shah
703780d9b7
WFD: Add directory search permissions for video device
...
This permission is needed for WFD to use OMX HAL interface
as opposed to V4L2 driver layer.
Change-Id: Ib888c88d860ce86f4965de109d297787ddb5ee4b
2015-01-15 17:35:42 -08:00
Ricardo Cerqueira
6cd495bc96
netd: Fix creation of hostapd sockets dir
...
Change-Id: I76fa316c8512d7e7e887f9f3ec249b7b5912f344
2015-01-14 17:50:33 -08:00
Daniel Hillenbrand
01a24c6b61
common: remove duplicate
...
device/qcom/sepolicy/common/wcnss_service.te:17:ERROR 'duplicate declaration of type/attribute' at token ';' on line 14366:
type wcnss_service_qmuxd_socket, file_type;
checkpolicy: error(s) encountered while parsing configuration
Change-Id: Idbcccdae3f0303f6b7d2a85a2ab75a82b5b729f3
2015-01-10 15:24:11 +01:00
Ricardo Cerqueira
b68d772868
Fix access to crypto/DRM firmware
...
Change-Id: I099953a8adeacd90320daabfab384de74c52a5c3
2015-01-10 03:48:17 +00:00
ramsudharsan
64bf328100
Fix: Repetition of same filenames in the sepolicy union list
...
Change-Id: I382431a18d0283f1f7fd603ac8f9b707021f3ef1
Signed-off-by: ramsudharsan <ramsudharsanm@gmail.com >
2015-01-01 15:51:00 +05:30
Steve Kondik
77bb91189b
sepolicy: Allow apps to read battery status
...
* Various apps do this to monitor the battery. No harm there.
Change-Id: Id1b843ca509747ed963b89d025a39b5b1fcc7ddb
2014-12-31 16:59:58 -08:00
myfluxi
233406f509
sepolicy: Allow untrusted apps to read temp sensors
...
Change-Id: I8636f704d7f917e69b69710337ac3dd0e14bda54
2014-12-31 00:59:15 +01:00
Steve Kondik
dbda30f1dd
sepolicy: Fix denials related to extended location services
...
* Also snuck in GPU thermal control.
Change-Id: I5f0fe6a8c48b9a39e3770cca709a9cb7b3943f85
2014-12-30 15:47:23 +00:00
Ricardo Cerqueira
c76fa3504d
Merge remote-tracking branch 'caf/LA.BF.2.1_rb1.6' into cm-12.0
...
Conflicts:
Android.mk
common/file_contexts
common/ims.te
common/mm-pp-daemon.te
common/netmgrd.te
common/radio.te
common/service.te
common/service_contexts
common/system_app.te
common/system_server.te
common/thermal-engine.te
common/untrusted_app.te
common/wpa.te
msm8960/Android.mk
msm8960/file.te
msm8960/file_contexts
Change-Id: I8308142c06d36380d422fd2256cceae2227fd04f
2014-12-29 16:25:58 +00:00
Satya Durga Srinivasu Prabhala
0066d40fd3
sepolicy: allow system apps to access sensors settings file
...
system apps need to access sensors settings file in persist partition
to enable or disable sensors in debug & eng builds.
Change-Id: I2cd7ddface6cf7f21cd8b0294c71740945977cd9
2014-12-29 16:16:32 +00:00
Avijit Kanti Das
6893e318ea
Seandroid: Moving connectionmanager policy to common
...
Moving policies related to connection manager to
common folder.
Change-Id: I9be8a072c8b7fda4cab2e246ec68dbcd8d21f562
2014-12-29 16:15:37 +00:00
Avijit Kanti Das
a7b1dd8b00
Seandroid: Adding few more policies for IMS
...
Addressing fer more more bootup denials
Change-Id: I57811d052d527786ee9c604a09a85719cbb4ae10
2014-12-29 16:15:31 +00:00
Avijit Kanti Das
c8c429725b
Seandroid: Changing context for wcnss services
...
Changing wcnss service context from wpa to wcnss
Change-Id: Ia5c4c0c8fdf3c073e47e44a4b4e29ae886c87a1f
2014-12-29 16:13:10 +00:00
Avijit Kanti Das
010821e8c5
Seandroid: Adding context for digital Pen
...
Adding context for Digital Pen.
Change-Id: I34eee1069fb01fc0c71815550359165911af69f6
2014-12-29 16:12:38 +00:00
Avijit Kanti Das
7a0858247d
Seandroid: Adding policy for IMS
...
Addressing few bootup denial from IMS
Change-Id: Ie5f258d63a32e2715e6212e6ce31540882d7e9d5
2014-12-29 16:08:33 +00:00
Avijit Kanti Das
9e7c1012e5
Seandroid: Adding context for imscmservice
...
Adding context for imscmservice, Also addressing few ims related
denial logs
Change-Id: I3e17e57221dc531729ce897590857dbd773d2bbd
2014-12-29 16:08:19 +00:00
Avijit Kanti Das
99ff2c38b4
Seandroid: Adding policy for QTI
...
Adding policy for QTI.
Change-Id: I78b2a2a2bf25b90810256a15bd757e3848dd83b5
2014-12-29 16:07:33 +00:00
Susheel Yadagiri
8bc7e81ee9
sepolicy: add getattr attribute rule for appdomain in dpmd
...
added rule for getattr for dpmd
Change-Id: I23516a8f96751ef7556673d52fc23feb63f40489
2014-12-29 16:06:40 +00:00
Kevin Tang
013555b4e8
sepolicy: allow location apps to access sensor services
...
Added rules for accessing sensor manager services from location
applications.
CRs-Fixed: 764189
Change-Id: I1e98ed907c70a78198ef35cb70fddfbe48dcb82d
2014-12-29 16:05:31 +00:00
Subash Abhinov Kasiviswanathan
3c4f75f3c7
sepolicy: Allow clients of netmgrd read access to netmgrd stat file
...
rild and location services - which are clients of netmgrd, needs to
have unicast netlink message communication with netmgrd. For this,
it needs to obtain the pid of the netmgrd. To determine the pid of
netmgrd, rild needs access to parse through the proc file system and
find the entry corresponding to netmgrd.
Fix denials faced while accessing the various files corresponding to
the processes in proc.
[ 78.653558] type=1400 audit(2567.649:197): avc: denied { search }
for pid=1190 comm="rild" name="1" dev="proc" ino=11739
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=dir permissive=0
[ 72.888233] type=1400 audit(1548.919:122): avc: denied { read }
for pid=1181 comm="rild" name="stat" dev="proc" ino=14756
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0
[ 66.428453] type=1400 audit(2167.259:82): avc: denied { open }
for pid=1183 comm="rild" path="/proc/1/stat" dev="proc" ino=4086
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0
[ 124.895876] type=1400 audit(2587.889:125): avc: denied { getattr }
for pid=1164 comm="rild" path="/proc/1/stat" dev="proc" ino=25356
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0
[ 124.897171] type=1400 audit(2587.889:1257): avc: denied { search }
for pid=1164 comm="rild" name="2" dev="proc" ino=25252
scontext=u:r:rild:s0 tcontext=u:r:kernel:s0 tclass=dir permissive=0
[ 96.631049] type=1400 audit(3925.959:261): avc: denied { search }
for pid=1176 comm="rild" name="297" dev="proc" ino=10500
scontext=u:r:rild:s0 tcontext=u:r:ueventd:s0 tclass=dir permissive=0
Allow these domains access to the proc stat files of netmgrd while
silently denying access to all other files.
Change-Id: I8d0d09cb9e85fdfa898f19a9eafe9ddaee6c208a
2014-12-29 16:05:27 +00:00
Linux Build Service Account
414d97d5c1
Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.012 on remote branch
...
Change-Id: Iec1b3a91aeefefddcfc6eb3f3601fa47d2f7d3b1
2014-12-18 15:38:38 -07:00
Avijit Kanti Das
d53bd7aad5
Seandroid: Adding policy for atfwd
...
Provide atfwd write access to property_socket
Change-Id: I8afee52ca6c9db2c6ce1dcc37ded24d3bec74687
2014-12-12 16:52:07 -08:00
Linux Build Service Account
9a787b08fc
Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.011 on remote branch
...
Change-Id: I22a14d19c9fabf648686360289dbe561645501d9
2014-12-12 13:51:27 -07:00
Steve Kondik
e04329df88
sepolicy: Rule for CM's mpdecision extension
...
Change-Id: Ibb83220b32bad7805653140751c978e629f87ffb
2014-12-11 22:24:53 -08:00
Ricardo Cerqueira
2177774b6e
thermal-engine: Fix socket re-creation perms
...
Let thermald tear down old pre-existing sockets so new ones can
be created
Change-Id: Ibfdab2201a4f928bd116c0ec64ecd1bc7bf67fb8
2014-12-10 16:44:31 +00:00
Linux Build Service Account
371523db94
Merge "Seandroid: Adding policy for atfwd" into LA.BF.2.1_rb1.4
2014-12-04 14:57:05 -08:00
Avijit Kanti Das
0d416bd687
Seandroid: Adding policy for atfwd
...
Provide atfwd the write access to property_socket
Change-Id: I8afee52ca6c9db2c6ce1dcc37ded24d3bec74687
2014-12-04 12:07:00 -08:00
Shiju Mathew
a23cdf8576
sepolicy: Update thermal policy to enable graphics mitigation
...
Update thermal policy so that thermal-engine will be
able to access graphics sysfs nodes to do graphics
mitigation.
Change-Id: I13cef8e82b60382e2ac55966ba72053e1c6cd478
2014-12-04 10:54:22 -08:00
Ricardo Cerqueira
fe6821c5da
location: Fix xtwifi's access to location sockets
...
Change-Id: Ia121624f054e75a06930c1be3bdd6e6d24b2d388
2014-12-04 17:42:42 +00:00
Linux Build Service Account
0cc214480c
Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.008 on remote branch
...
Change-Id: Ie89c25dfed4f2a3ab974d585556460a775beb4c6
2014-12-03 21:27:42 -07:00
Ricardo Cerqueira
9c9e8b69b6
HAX: Enable access to diag on user builds
...
This should be temporary. Some components (radio and display, mostly)
still rely on diag for logging, and its absence makes the whole subsystem
spin and break things. Pending fixing those components, re-enable diag.
Change-Id: Ic6badb3f89d08ef247455bc669392bea53c33bab
2014-11-28 20:19:00 +00:00
Ricardo Cerqueira
43d959cbfb
mpdecision: Let mpdecision tune KSM
...
Change-Id: I6d7511d94996dcec974b671d681fd70a8dbc4290
2014-11-28 16:24:57 +00:00
Ricardo Cerqueira
dec4dac88b
msm8960: Add rules for bridgemgr
...
Most Fusion devices have this to talk to rmnet.
Add common rules for it
Change-Id: If2989904be017b6f979da99bfd321ac62ddbbfbb
2014-11-28 16:02:40 +00:00
Samir Mehta
f39389d9ee
SEAndroid: Fixing few denials
...
This fixes the below issues
1. 744304 - SELinux Surf port Enumeration issue
Files changed - mdm_helper.te
- rild.te
- file_contexts
- file.te
- rmt_storage.te
- device.te
2. 751137 - WIFI is not turning ON
Files Changed - wpa.te
- system_server.te
3. Issues related to CTS testInitDomain and boot up
denials for other domains.
CRs-fixed: 744304 751137
Change-Id: I2785e85592a10468a667be363e6115e27b76707f
2014-11-28 16:02:36 +00:00
Dinesh K Garg
1f2a5ed5ba
sepolicy: Update policy for secure components
...
Playready stores license under /data/data/app_ms. All TZ apps including
Playready would create their own directory under /data/misc/qsee.
To get test apps working with older dir structure, userdebug mode
build would have permision to create directory under /data/data.
Test apps based on newer targets must move to new structure.
Also add policies for secureUI.
Change-Id: Ibc4412ca9e8e065d54263bb46333bd223dfb553d
2014-11-28 12:21:00 +00:00
Samir Mehta
6341d29f82
Sepolicy: Fix camera & surface flinger denials
...
Device node were not proper /dev/msm_camera was
labelled as audio_device which is wrong and
/dev/msm_rotator as well as audio_device, so
changing the label to appropriate to fix the false positive
denials.
Change-Id: I7b3ebbcb9999d794823ee7c0d7cad330d50be02e
2014-11-28 12:15:18 +00:00
Katish Paran
25b68bc534
sepolicy: Update policy for time daemon
...
This patch updates the socket permission for time-daemon.
Change-Id: Ifc7d377585e9699a21ed569fe0402de35992c13b
2014-11-27 18:44:06 +00:00
Kurva Harish
d03bdc134d
Seandroid: Added rules to thermal-engine
...
Added rules to thermal-engine for access to thermal-sockets which
is needed for mediaserver ,camera and couple of other services.
Change-Id: I7f5f89c112357ee595f275b20325fede40439924
2014-11-27 18:44:06 +00:00
Bhavya Sokke Mallikarjunappa
7dbb59b937
sepolicy: add rule for dpm
...
add rule for DPM data file for db file
and removed duplicate rules
Change-Id: Ieed4f0b1cf19df06c04528245a0c6b799518542a
2014-11-27 18:44:06 +00:00
Ricardo Cerqueira
722b2d01aa
time_daemon: Fix labeling the time atom data files
...
Change-Id: I49c270cfb6853f0e6f94335b9d84bc85ab97e1e2
2014-11-27 17:34:33 +00:00
Ricardo Cerqueira
836b91b673
thermal: Allow socket creation at /dev/socket
...
Change-Id: I090179b83404c0a19917a79d705b74a57a982971
2014-11-27 17:04:05 +00:00
Ricardo Cerqueira
7e70b69007
camera: Fix domain socket labeling
...
Change-Id: I42094eb1064eca4cf227ee7af559427b160f476e
2014-11-27 17:01:35 +00:00
Ricardo Cerqueira
c30eafa602
mediaserver: Fix access to perflock (thermal)
...
Change-Id: I30edc8e6aa189d4c5da2b83e90d27ec53c1f044d
2014-11-27 16:49:17 +00:00
Ricardo Cerqueira
10d5f0abec
thermal: Fix labeling the thermal sockets
...
Change-Id: Iffdaca86f539ede159aa9c02f8839e0f69bfc1d9
2014-11-27 16:49:11 +00:00
Ricardo Cerqueira
7d7716eb3a
Do not include common SE policies automatically
...
Automatic additions to BOARD_SEPOLICY_UNION from Android.mk do not
guarantee order or precedence of rules. More often than not, these
rules get included _after_ the device's own, which makes
it impossible for the device to extend them, or even to use types
defined here.
Manually include these in the device's BoardConfig with
"include device/qcom/sepolicy/sepolicy.mk" before
its own specific BOARD_SEPOLICY_DIRS (if any) instead. Or just
include files piecemeal.
Change-Id: I2ce0c3ec325906a46570b26c5f0c2018390d2ec9
2014-11-26 17:34:15 +00:00
Subash Abhinov Kasiviswanathan
dd4a9de52f
netmgrd: allow communication with connectivity framework
...
Fix the following denials
Allow communication with cnd sockets
[ 22.806091] type=1400 audit(1415054892.584:18): avc: denied { write }
for pid=1317 comm="netmgrd" name="cnd" dev="tmpfs" ino=8381
scontext=u:r:netmgrd:s0 tcontext=u:object_r:cnd_socket:s0 tclass=sock_file
[ 22.316132] type=1400 audit(1415053588.674:56): avc: denied
{ connectto } for pid=1321 comm="netmgrd" path="/dev/socket/cnd"
scontext=u:r:netmgrd:s0 tcontext=u:r:cnd:s0 tclass=unix_stream_socket
Allow operations on netlink xfrm sockets
[ 20.794160] type=1400 audit(1415053541.505:16): avc: denied
{ setopt } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[ 20.794450] type=1400 audit(1415053541.505:17): avc: denied
{ getattr } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[ 20.794528] type=1400 audit(1415053541.505:18): avc: denied
{ write } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[ 20.794602] type=1400 audit(1415053541.505:19): avc: denied
{ nlmsg_write } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[ 20.794688] type=1400 audit(1415053541.505:20): avc: denied
{ read } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
Allow operations on netd and its resources
[ 20.827567] type=1400 audit(1415053541.545:21): avc: denied { read }
for pid=1166 comm="ip" name="rt_tables" dev="mmcblk0p13" ino=268
scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0 tclass=file
[ 20.827802] type=1400 audit(1415053541.545:22): avc: denied { open }
for pid=1166 comm="ip" name="rt_tables" dev="mmcblk0p13" ino=268
scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0 tclass=file
[ 20.827915] type=1400 audit(1415053541.545:23): avc: denied { getattr
}for pid=1166 comm="ip" path="/data/misc/net/rt_tables" dev="mmcblk0p13"
ino=268 scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0
tclass=file
[ 21.480717] type=1400 audit(1415053542.195:24): avc: denied { getattr
} for pid=1259 comm="sh" path="/system/bin/ndc" dev="mmcblk0p12" ino=444
scontext=u:r:netmgrd:s0 tcontext=u:object_r:wpa_exec:s0 tclass=file
[ 21.481188] type=1400 audit(1415053542.195:25): avc: denied { execute
} for pid=1259 comm="sh" name="ndc" dev="mmcblk0p12" ino=444
scontext=u:r:netmgrd:s0 tcontext=u:object_r:wpa_exec:s0 tclass=file
[ 21.482377] type=1400 audit(1415053542.195:26): avc: denied { read
open } for pid=1260 comm="sh" name="ndc" dev="mmcblk0p12" ino=444
scontext=u:r:netmgrd:s0 tcontext=u:object_r:wpa_exec:s0 tclass=file
[ 21.482614] type=1400 audit(1415053542.195:27): avc: denied
{ execute_no_trans } for pid=1260 comm="sh" path="/system/bin/ndc"
dev="mmcblk0p12" ino=444 scontext=u:r:netmgrd:s0
tcontext=u:object_r:wpa_exec:s0 tclass=file
avc: denied { search } for pid=1168 comm="ip" name="net" dev="mmcblk0p34"
ino=210 scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0
tclass=dir permissive=0
CRs-Fixed: 748457
Change-Id: Ie1044b498002602354b28f3c2e36bf1c9ee64e15
2014-11-20 21:51:28 -08:00
Vince Leung
c7902e848c
sepolicy: allow untrusted_app access to perflock
...
Add allow policy for untrusted app to write into
PerfLock socket
Change-Id: Ib494148895b38e352635511643fa90266c8d2ae9
2014-11-20 21:51:28 -08:00
Tushar Janefalkar
2e74d6e656
SEAndroid: Add new location policy
...
Added policy for lowi-server to access
netlink sockets
Change-Id: I8fd6687d2b2e7c4dcb5e05b6f0541b3a24807b23
CRs-fixed: 747721
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
96ed5acea1
Seandroid: replacing policies with macro
...
Using macro for location services
Change-Id: Ic70498c3463803a36718091d43837c2f93e6d34b
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
ddfd476afb
Seandroid: Moving wpa related policies to wpa.te
...
Moving all wpa related issues to wpa.te and removing unnecessary
files
Change-Id: I610dbb0041ad89489fad2235f3d7cbb0c49edfb8
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
ea450c9eb2
Seandroid: Removing unused file
...
Removing unused file gloabal_macro.te
Change-Id: If5bd3813b0918ca08bbcebc4339d873f4abb95a9
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
4e65b736cd
Seandroid: Adding dun service context.
...
Adding context for dun service
Change-Id: Ie20962700335058800ed0d42ed01c2f27e4f96de
2014-11-20 21:51:28 -08:00
Boxiang Pan
c2aebb2983
sepolicy: add rule for CNE.
...
add rule for CNE data file for db file
Change-Id: I1dbc81f7be2bb4b4344336546622d351f5fa3e23
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
4f4e27e5d7
Seandroid: Add policy for wbc services
...
Add policy for wbc services
Change-Id: I1ca863faeaac84382cc6e208fa4c869978d9b80a
2014-11-20 21:51:28 -08:00
Samir Mehta
0599820753
sepolicy : Define policy for wcnss service domain
...
Adding wcnss domain and secontext needed for this domain.
Change-Id: I905a0e7b3e1672ead5980b81134c4d1a9b5164e5
2014-11-20 21:51:28 -08:00
Sri Krishna Chaitanya Madireddy
4224895441
EAndroid:add policy for init_shell
...
Adding policy for ini_shell for test scripts
Change-Id: Ic5c876b75612c6b8f06ee566ff144c6d50243c8a
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
9fa941580c
Seandroid: Adding policy for system_app
...
Adding policy for system_app to give access to debugfs
Change-Id: I98e5fff67d56840eb8b025223d94e28315e22765
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
ed0bb3b52c
Seandroid: Moving adbd to enforcing mode
...
Moving seandroid to enforcing mode
Change-Id: I2425464992e0ea8cc44f9680781e011340b48513
2014-11-20 21:51:28 -08:00
Avijit Kanti Das
3dd1ac9c1b
Seandroid: Adding policy for QTI.
...
Adding policy for QTI.
Change-Id: Iea59e6add0540600effdbc117ef6dc7c88055218
2014-11-20 21:51:28 -08:00
Chirayu Desai
fab062c43b
Correct executable bit for source files
...
Change-Id: Ic37634d5e53376b59d4df80caae2681f960fceee
2014-11-19 04:37:24 +00:00
Chirayu Desai
d76e3d7e9b
Append to sepolicy variables
...
Change-Id: I0cf2a72b1219d9f7331323d97ab2bd017a076691
2014-11-13 17:22:12 +05:30
Boxiang Pan
b00e855871
sepolicy: add rule for cne logging
...
add a rule for allow enabling cne debug logging.
Change-Id: I266b224cf1af720f664f504019f0098d7d258712
2014-11-12 15:19:59 -08:00
Linux Build Service Account
f9737d1a54
Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.002 on remote branch
...
Change-Id: I6588eee30de0a2dd68d152675a70fa704b8a22fa
2014-11-12 14:53:58 -07:00
Boxiang Pan
8e537c3faf
sepolicy: add rule for cne logging
...
add a rule for allow enabling cne debug logging.
Change-Id: I266b224cf1af720f664f504019f0098d7d258712
2014-11-05 00:16:50 -08:00