Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						1ccdd65d0e 
					 
					
						
						
							
							uncrypt needs to write to the BCB  
						
						 
						
						... 
						
						
						
						and in QC hardware, that's misc_partition...
Change-Id: I1d2f5d11423f01435f17f0e6f5d418cc0ce30e9d 
						
						
					 
					
						2015-04-22 10:42:26 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								percy-g2 
							
						 
					 
					
						
						
							
						
						5f595f2531 
					 
					
						
						
							
							msm8610: Compile sensor policy and fix typo  
						
						 
						
						... 
						
						
						
						Change-Id: I30c33635dcce202f5f6753dc8a9bf746012d66b4
Signed-off-by: percy-g2 <gahlotpercy@gmail.com > 
						
						
					 
					
						2015-02-21 22:09:34 +05:30  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						23a1492f57 
					 
					
						
						
							
							Revert "SEAndroid: Updated vold domain related policy"  
						
						 
						
						... 
						
						
						
						This reverts commit 733050a425 .
This has an incorrect path, and doesn't belong here at all. Any
platform using UMS is affected by this
Change-Id: I067ba68a64c16406b787fefd97d6c6d9e0d41344 
						
						
					 
					
						2015-02-11 23:16:47 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Kun Liang 
							
						 
					 
					
						
						
							
						
						5ca33d98db 
					 
					
						
						
							
							sepolicy: fix app_process lnk_file read denied issue  
						
						 
						
						... 
						
						
						
						app_process is a lnk_file pointed to app_process32 or
app_process64 under /system/bin. It should be labelled as
system_file but not zygote_exec.
Change-Id: If6ddbc9d9262094f3fb44686bff4826d2afc2ce2 
						
						
					 
					
						2015-01-21 01:35:12 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Sridhar Gujje 
							
						 
					 
					
						
						
							
						
						cb1eb911e9 
					 
					
						
						
							
							sepolicy : added secontext for app_process which is a link which  
						
						 
						
						... 
						
						
						
						get created and pointed to 64/32 bit arch bin.
added secontext as zygote_exec for  app_process.
Change-Id: I0887c8d90c88a2ecc169aaad3aa92d832e557994 
						
						
					 
					
						2015-01-21 01:35:12 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Steve Kondik 
							
						 
					 
					
						
						
							
						
						5e7c74af59 
					 
					
						
						
							
							selinux: Cleanup warnings  
						
						 
						
						... 
						
						
						
						Change-Id: Ic70fe8cafcd837c5a52af69f46b565c5b58c0fa3 
						
						
					 
					
						2015-01-16 10:23:00 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Srikanth Uyyala 
							
						 
					 
					
						
						
							
						
						7f134914b0 
					 
					
						
						
							
							selinux: audio: update policy file for audio  
						
						 
						
						... 
						
						
						
						update policy file to allow QACT to access debugfs
Change-Id: Ia4897325e1869015f4e205823eff1e923ba3abef 
						
						
					 
					
						2015-01-15 18:34:33 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Dilip Gudlur 
							
						 
					 
					
						
						
							
						
						c6a655da9c 
					 
					
						
						
							
							sepolicy: add appdomain permissions for perfd  
						
						 
						
						... 
						
						
						
						Allow appdomain to access perfd.
Change-Id: I20c26842b643c49304a066a5726b9dc531d1a81e 
						
						
					 
					
						2015-01-15 18:15:17 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Dilip Gudlur 
							
						 
					 
					
						
						
							
						
						46b55b9d66 
					 
					
						
						
							
							SEAndroid: Add sepolicy for surfaceflinger  
						
						 
						
						... 
						
						
						
						Add perfd permissions for surfaceflinger.
Change-Id: I24844c687457159b7b1eb0559a7469a043b4c60b 
						
						
					 
					
						2015-01-15 18:14:59 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Kun Liang 
							
						 
					 
					
						
						
							
						
						9e6e6b745b 
					 
					
						
						
							
							sepolicy: allow radio to access video_device, smd_device  
						
						 
						
						... 
						
						
						
						VideoCall which belongs to radio domain need permission to access
video_device, smd_device.
Change-Id: Ie14f58ffd3a980e4125c8711177ae6be1b83a49e 
						
						
					 
					
						2015-01-15 18:13:09 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Steve Kondik 
							
						 
					 
					
						
						
							
						
						4d416de23a 
					 
					
						
						
							
							sepolicy: Additional CM-specific mpdecision rule  
						
						 
						
						... 
						
						
						
						Change-Id: Ie63338d2f7b353b481952e4ae39e117f141a87e1 
						
						
					 
					
						2015-01-15 18:12:42 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Justin Philip 
							
						 
					 
					
						
						
							
						
						b338663b23 
					 
					
						
						
							
							Seandroid: Allow mm-pp-deamon access to unix socket  
						
						 
						
						... 
						
						
						
						Modify mm-pp-deaemon policy file to enable access to
listen and accept unix socket calls from init to enable CABL.
Change-Id: If8621d31d8ae07d17803bb2d152bebf5fffdc51e 
						
						
					 
					
						2015-01-15 18:08:19 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Susheel Yadagiri 
							
						 
					 
					
						
						
							
						
						394243c1fd 
					 
					
						
						
							
							sepolicy: Added rule to enable unlink of dpmwrapper socket  
						
						 
						
						... 
						
						
						
						when dpmd process is restarted dpmwrapper socket needs to be
unlinked and started again. Unlink fails because permission is
denied.
Change-Id: Ie3059785bb7aae940559623e59476d7f15f2730d 
						
						
					 
					
						2015-01-15 18:07:45 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Richard LIU 
							
						 
					 
					
						
						
							
						
						2a2c5b7193 
					 
					
						
						
							
							Sepolicy: allow RILD to access health monitor device  
						
						 
						
						... 
						
						
						
						Assign read permission on system health monitor device
to RILD
Change-Id: I1691c8354d55f0caea7cf7d85847a15e5e6a344c 
						
						
					 
					
						2015-01-15 17:36:01 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Boxiang Pan 
							
						 
					 
					
						
						
							
						
						8610282347 
					 
					
						
						
							
							Sepolicy: allow cnd to access ipa_dev.  
						
						 
						
						... 
						
						
						
						adding rules to allow cnd to access ipa_dev for tethering and
data path offload
Change-Id: I571c9e627be89c1baa3c4ae28f9fde1304ebf75b 
						
						
					 
					
						2015-01-15 17:35:51 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Sachin Shah 
							
						 
					 
					
						
						
							
						
						703780d9b7 
					 
					
						
						
							
							WFD: Add directory search permissions for video device  
						
						 
						
						... 
						
						
						
						This permission is needed for WFD to use OMX HAL interface
as opposed to V4L2 driver layer.
Change-Id: Ib888c88d860ce86f4965de109d297787ddb5ee4b 
						
						
					 
					
						2015-01-15 17:35:42 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						6cd495bc96 
					 
					
						
						
							
							netd: Fix creation of hostapd sockets dir  
						
						 
						
						... 
						
						
						
						Change-Id: I76fa316c8512d7e7e887f9f3ec249b7b5912f344 
						
						
					 
					
						2015-01-14 17:50:33 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Daniel Hillenbrand 
							
						 
					 
					
						
						
							
						
						01a24c6b61 
					 
					
						
						
							
							common: remove duplicate  
						
						 
						
						... 
						
						
						
						device/qcom/sepolicy/common/wcnss_service.te:17:ERROR 'duplicate declaration of type/attribute' at token ';' on line 14366:
type wcnss_service_qmuxd_socket, file_type;
checkpolicy:  error(s) encountered while parsing configuration
Change-Id: Idbcccdae3f0303f6b7d2a85a2ab75a82b5b729f3 
						
						
					 
					
						2015-01-10 15:24:11 +01:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						b68d772868 
					 
					
						
						
							
							Fix access to crypto/DRM firmware  
						
						 
						
						... 
						
						
						
						Change-Id: I099953a8adeacd90320daabfab384de74c52a5c3 
						
						
					 
					
						2015-01-10 03:48:17 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								ramsudharsan 
							
						 
					 
					
						
						
							
						
						64bf328100 
					 
					
						
						
							
							Fix: Repetition of same filenames in the sepolicy union list  
						
						 
						
						... 
						
						
						
						Change-Id: I382431a18d0283f1f7fd603ac8f9b707021f3ef1
Signed-off-by: ramsudharsan <ramsudharsanm@gmail.com > 
						
						
					 
					
						2015-01-01 15:51:00 +05:30  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Steve Kondik 
							
						 
					 
					
						
						
							
						
						77bb91189b 
					 
					
						
						
							
							sepolicy: Allow apps to read battery status  
						
						 
						
						... 
						
						
						
						* Various apps do this to monitor the battery. No harm there.
Change-Id: Id1b843ca509747ed963b89d025a39b5b1fcc7ddb 
						
						
					 
					
						2014-12-31 16:59:58 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								myfluxi 
							
						 
					 
					
						
						
							
						
						233406f509 
					 
					
						
						
							
							sepolicy: Allow untrusted apps to read temp sensors  
						
						 
						
						... 
						
						
						
						Change-Id: I8636f704d7f917e69b69710337ac3dd0e14bda54 
						
						
					 
					
						2014-12-31 00:59:15 +01:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Steve Kondik 
							
						 
					 
					
						
						
							
						
						dbda30f1dd 
					 
					
						
						
							
							sepolicy: Fix denials related to extended location services  
						
						 
						
						... 
						
						
						
						* Also snuck in GPU thermal control.
Change-Id: I5f0fe6a8c48b9a39e3770cca709a9cb7b3943f85 
						
						
					 
					
						2014-12-30 15:47:23 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						c76fa3504d 
					 
					
						
						
							
							Merge remote-tracking branch 'caf/LA.BF.2.1_rb1.6' into cm-12.0  
						
						 
						
						... 
						
						
						
						Conflicts:
	Android.mk
	common/file_contexts
	common/ims.te
	common/mm-pp-daemon.te
	common/netmgrd.te
	common/radio.te
	common/service.te
	common/service_contexts
	common/system_app.te
	common/system_server.te
	common/thermal-engine.te
	common/untrusted_app.te
	common/wpa.te
	msm8960/Android.mk
	msm8960/file.te
	msm8960/file_contexts
Change-Id: I8308142c06d36380d422fd2256cceae2227fd04f 
						
						
					 
					
						2014-12-29 16:25:58 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Satya Durga Srinivasu Prabhala 
							
						 
					 
					
						
						
							
						
						0066d40fd3 
					 
					
						
						
							
							sepolicy: allow system apps to access sensors settings file  
						
						 
						
						... 
						
						
						
						system apps need to access sensors settings file in persist partition
to enable or disable sensors in debug & eng builds.
Change-Id: I2cd7ddface6cf7f21cd8b0294c71740945977cd9 
						
						
					 
					
						2014-12-29 16:16:32 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						6893e318ea 
					 
					
						
						
							
							Seandroid: Moving connectionmanager policy to common  
						
						 
						
						... 
						
						
						
						Moving policies related to connection manager to
common folder.
Change-Id: I9be8a072c8b7fda4cab2e246ec68dbcd8d21f562 
						
						
					 
					
						2014-12-29 16:15:37 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						a7b1dd8b00 
					 
					
						
						
							
							Seandroid: Adding few more policies for IMS  
						
						 
						
						... 
						
						
						
						Addressing fer more more bootup denials
Change-Id: I57811d052d527786ee9c604a09a85719cbb4ae10 
						
						
					 
					
						2014-12-29 16:15:31 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						c8c429725b 
					 
					
						
						
							
							Seandroid: Changing context for wcnss services  
						
						 
						
						... 
						
						
						
						Changing wcnss service context from wpa to wcnss
Change-Id: Ia5c4c0c8fdf3c073e47e44a4b4e29ae886c87a1f 
						
						
					 
					
						2014-12-29 16:13:10 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						010821e8c5 
					 
					
						
						
							
							Seandroid: Adding context for digital Pen  
						
						 
						
						... 
						
						
						
						Adding context for Digital Pen.
Change-Id: I34eee1069fb01fc0c71815550359165911af69f6 
						
						
					 
					
						2014-12-29 16:12:38 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						7a0858247d 
					 
					
						
						
							
							Seandroid: Adding policy for IMS  
						
						 
						
						... 
						
						
						
						Addressing few bootup denial from IMS
Change-Id: Ie5f258d63a32e2715e6212e6ce31540882d7e9d5 
						
						
					 
					
						2014-12-29 16:08:33 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						9e7c1012e5 
					 
					
						
						
							
							Seandroid: Adding context for imscmservice  
						
						 
						
						... 
						
						
						
						Adding context for imscmservice, Also addressing few ims related
denial logs
Change-Id: I3e17e57221dc531729ce897590857dbd773d2bbd 
						
						
					 
					
						2014-12-29 16:08:19 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						99ff2c38b4 
					 
					
						
						
							
							Seandroid: Adding policy for QTI  
						
						 
						
						... 
						
						
						
						Adding policy for QTI.
Change-Id: I78b2a2a2bf25b90810256a15bd757e3848dd83b5 
						
						
					 
					
						2014-12-29 16:07:33 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Susheel Yadagiri 
							
						 
					 
					
						
						
							
						
						8bc7e81ee9 
					 
					
						
						
							
							sepolicy: add getattr attribute rule for appdomain in dpmd  
						
						 
						
						... 
						
						
						
						added rule for getattr for dpmd
Change-Id: I23516a8f96751ef7556673d52fc23feb63f40489 
						
						
					 
					
						2014-12-29 16:06:40 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Kevin Tang 
							
						 
					 
					
						
						
							
						
						013555b4e8 
					 
					
						
						
							
							sepolicy: allow location apps to access sensor services  
						
						 
						
						... 
						
						
						
						Added rules for accessing sensor manager services from location
applications.
CRs-Fixed: 764189
Change-Id: I1e98ed907c70a78198ef35cb70fddfbe48dcb82d 
						
						
					 
					
						2014-12-29 16:05:31 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Subash Abhinov Kasiviswanathan 
							
						 
					 
					
						
						
							
						
						3c4f75f3c7 
					 
					
						
						
							
							sepolicy: Allow clients of netmgrd read access to netmgrd stat file  
						
						 
						
						... 
						
						
						
						rild and location services - which are clients of netmgrd, needs to
have unicast netlink message communication with netmgrd. For this,
it needs to obtain the pid of the netmgrd. To determine the pid of
netmgrd, rild needs access to parse through the proc file system and
find the entry corresponding to netmgrd.
Fix denials faced while accessing the various files corresponding to
the processes in proc.
[   78.653558] type=1400 audit(2567.649:197): avc: denied { search }
for pid=1190 comm="rild" name="1" dev="proc" ino=11739
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=dir permissive=0
[   72.888233] type=1400 audit(1548.919:122): avc: denied { read }
for pid=1181 comm="rild" name="stat" dev="proc" ino=14756
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0
[   66.428453] type=1400 audit(2167.259:82): avc: denied { open }
for pid=1183 comm="rild" path="/proc/1/stat" dev="proc" ino=4086
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0
[  124.895876] type=1400 audit(2587.889:125): avc: denied { getattr }
for pid=1164 comm="rild" path="/proc/1/stat" dev="proc" ino=25356
scontext=u:r:rild:s0 tcontext=u:r:init:s0 tclass=file permissive=0
[  124.897171] type=1400 audit(2587.889:1257): avc: denied { search }
for pid=1164 comm="rild" name="2" dev="proc" ino=25252
scontext=u:r:rild:s0 tcontext=u:r:kernel:s0 tclass=dir permissive=0
[   96.631049] type=1400 audit(3925.959:261): avc: denied { search }
for pid=1176 comm="rild" name="297" dev="proc" ino=10500
scontext=u:r:rild:s0 tcontext=u:r:ueventd:s0 tclass=dir permissive=0
Allow these domains access to the proc stat files of netmgrd while
silently denying access to all other files.
Change-Id: I8d0d09cb9e85fdfa898f19a9eafe9ddaee6c208a 
						
						
					 
					
						2014-12-29 16:05:27 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Linux Build Service Account 
							
						 
					 
					
						
						
							
						
						414d97d5c1 
					 
					
						
						
							
							Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.012 on remote branch  
						
						 
						
						... 
						
						
						
						Change-Id: Iec1b3a91aeefefddcfc6eb3f3601fa47d2f7d3b1 
						
						
					 
					
						2014-12-18 15:38:38 -07:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						d53bd7aad5 
					 
					
						
						
							
							Seandroid: Adding policy for atfwd  
						
						 
						
						... 
						
						
						
						Provide atfwd write access to property_socket
Change-Id: I8afee52ca6c9db2c6ce1dcc37ded24d3bec74687 
						
						
					 
					
						2014-12-12 16:52:07 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Linux Build Service Account 
							
						 
					 
					
						
						
							
						
						9a787b08fc 
					 
					
						
						
							
							Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.011 on remote branch  
						
						 
						
						... 
						
						
						
						Change-Id: I22a14d19c9fabf648686360289dbe561645501d9 
						
						
					 
					
						2014-12-12 13:51:27 -07:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Steve Kondik 
							
						 
					 
					
						
						
							
						
						e04329df88 
					 
					
						
						
							
							sepolicy: Rule for CM's mpdecision extension  
						
						 
						
						... 
						
						
						
						Change-Id: Ibb83220b32bad7805653140751c978e629f87ffb 
						
						
					 
					
						2014-12-11 22:24:53 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						2177774b6e 
					 
					
						
						
							
							thermal-engine: Fix socket re-creation perms  
						
						 
						
						... 
						
						
						
						Let thermald tear down old pre-existing sockets so new ones can
be created
Change-Id: Ibfdab2201a4f928bd116c0ec64ecd1bc7bf67fb8 
						
						
					 
					
						2014-12-10 16:44:31 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Linux Build Service Account 
							
						 
					 
					
						
						
							
						
						371523db94 
					 
					
						
						
							
							Merge "Seandroid: Adding policy for atfwd" into LA.BF.2.1_rb1.4  
						
						 
						
						
						
						
					 
					
						2014-12-04 14:57:05 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						0d416bd687 
					 
					
						
						
							
							Seandroid: Adding policy for atfwd  
						
						 
						
						... 
						
						
						
						Provide atfwd the write access to property_socket
Change-Id: I8afee52ca6c9db2c6ce1dcc37ded24d3bec74687 
						
						
					 
					
						2014-12-04 12:07:00 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Shiju Mathew 
							
						 
					 
					
						
						
							
						
						a23cdf8576 
					 
					
						
						
							
							sepolicy: Update thermal policy to enable graphics mitigation  
						
						 
						
						... 
						
						
						
						Update thermal policy so that thermal-engine will be
able to access graphics sysfs nodes to do graphics
mitigation.
Change-Id: I13cef8e82b60382e2ac55966ba72053e1c6cd478 
						
						
					 
					
						2014-12-04 10:54:22 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						fe6821c5da 
					 
					
						
						
							
							location: Fix xtwifi's access to location sockets  
						
						 
						
						... 
						
						
						
						Change-Id: Ia121624f054e75a06930c1be3bdd6e6d24b2d388 
						
						
					 
					
						2014-12-04 17:42:42 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Linux Build Service Account 
							
						 
					 
					
						
						
							
						
						0cc214480c 
					 
					
						
						
							
							Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.008 on remote branch  
						
						 
						
						... 
						
						
						
						Change-Id: Ie89c25dfed4f2a3ab974d585556460a775beb4c6 
						
						
					 
					
						2014-12-03 21:27:42 -07:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						9c9e8b69b6 
					 
					
						
						
							
							HAX: Enable access to diag on user builds  
						
						 
						
						... 
						
						
						
						This should be temporary. Some components (radio and display, mostly)
still rely on diag for logging, and its absence makes the whole subsystem
spin and break things. Pending fixing those components, re-enable diag.
Change-Id: Ic6badb3f89d08ef247455bc669392bea53c33bab 
						
						
					 
					
						2014-11-28 20:19:00 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						43d959cbfb 
					 
					
						
						
							
							mpdecision: Let mpdecision tune KSM  
						
						 
						
						... 
						
						
						
						Change-Id: I6d7511d94996dcec974b671d681fd70a8dbc4290 
						
						
					 
					
						2014-11-28 16:24:57 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						dec4dac88b 
					 
					
						
						
							
							msm8960: Add rules for bridgemgr  
						
						 
						
						... 
						
						
						
						Most Fusion devices have this to talk to rmnet.
Add common rules for it
Change-Id: If2989904be017b6f979da99bfd321ac62ddbbfbb 
						
						
					 
					
						2014-11-28 16:02:40 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Samir Mehta 
							
						 
					 
					
						
						
							
						
						f39389d9ee 
					 
					
						
						
							
							SEAndroid: Fixing few denials  
						
						 
						
						... 
						
						
						
						This fixes the below issues
1. 744304 - SELinux Surf port Enumeration issue
   Files changed - mdm_helper.te
                 - rild.te
                 - file_contexts
                 - file.te
                 - rmt_storage.te
                 - device.te
2. 751137 - WIFI is not turning ON
   Files Changed - wpa.te
                 - system_server.te
3. Issues related to CTS testInitDomain and boot up
   denials for other domains.
CRs-fixed: 744304 751137
Change-Id: I2785e85592a10468a667be363e6115e27b76707f 
						
						
					 
					
						2014-11-28 16:02:36 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Dinesh K Garg 
							
						 
					 
					
						
						
							
						
						1f2a5ed5ba 
					 
					
						
						
							
							sepolicy: Update policy for secure components  
						
						 
						
						... 
						
						
						
						Playready stores license under /data/data/app_ms. All TZ apps including
Playready would create their own directory under /data/misc/qsee.
To get test apps working with older dir structure, userdebug mode
build would have permision to create directory under /data/data.
Test apps based on newer targets must move to new structure.
Also add policies for secureUI.
Change-Id: Ibc4412ca9e8e065d54263bb46333bd223dfb553d 
						
						
					 
					
						2014-11-28 12:21:00 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Samir Mehta 
							
						 
					 
					
						
						
							
						
						6341d29f82 
					 
					
						
						
							
							Sepolicy: Fix camera & surface flinger denials  
						
						 
						
						... 
						
						
						
						Device node were not proper /dev/msm_camera was
labelled as audio_device which is wrong and
/dev/msm_rotator as well as audio_device, so
changing the label to appropriate to fix the false positive
denials.
Change-Id: I7b3ebbcb9999d794823ee7c0d7cad330d50be02e 
						
						
					 
					
						2014-11-28 12:15:18 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Katish Paran 
							
						 
					 
					
						
						
							
						
						25b68bc534 
					 
					
						
						
							
							sepolicy: Update policy for time daemon  
						
						 
						
						... 
						
						
						
						This patch updates the socket permission for time-daemon.
Change-Id: Ifc7d377585e9699a21ed569fe0402de35992c13b 
						
						
					 
					
						2014-11-27 18:44:06 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Kurva Harish 
							
						 
					 
					
						
						
							
						
						d03bdc134d 
					 
					
						
						
							
							Seandroid: Added rules to thermal-engine  
						
						 
						
						... 
						
						
						
						Added rules to thermal-engine for access to thermal-sockets which
is needed for  mediaserver ,camera and couple of other services.
Change-Id: I7f5f89c112357ee595f275b20325fede40439924 
						
						
					 
					
						2014-11-27 18:44:06 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Bhavya Sokke Mallikarjunappa 
							
						 
					 
					
						
						
							
						
						7dbb59b937 
					 
					
						
						
							
							sepolicy: add rule for dpm  
						
						 
						
						... 
						
						
						
						add rule for DPM data file for db file
and removed duplicate rules
Change-Id: Ieed4f0b1cf19df06c04528245a0c6b799518542a 
						
						
					 
					
						2014-11-27 18:44:06 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						722b2d01aa 
					 
					
						
						
							
							time_daemon: Fix labeling the time atom data files  
						
						 
						
						... 
						
						
						
						Change-Id: I49c270cfb6853f0e6f94335b9d84bc85ab97e1e2 
						
						
					 
					
						2014-11-27 17:34:33 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						836b91b673 
					 
					
						
						
							
							thermal: Allow socket creation at /dev/socket  
						
						 
						
						... 
						
						
						
						Change-Id: I090179b83404c0a19917a79d705b74a57a982971 
						
						
					 
					
						2014-11-27 17:04:05 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						7e70b69007 
					 
					
						
						
							
							camera: Fix domain socket labeling  
						
						 
						
						... 
						
						
						
						Change-Id: I42094eb1064eca4cf227ee7af559427b160f476e 
						
						
					 
					
						2014-11-27 17:01:35 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						c30eafa602 
					 
					
						
						
							
							mediaserver: Fix access to perflock (thermal)  
						
						 
						
						... 
						
						
						
						Change-Id: I30edc8e6aa189d4c5da2b83e90d27ec53c1f044d 
						
						
					 
					
						2014-11-27 16:49:17 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						10d5f0abec 
					 
					
						
						
							
							thermal: Fix labeling the thermal sockets  
						
						 
						
						... 
						
						
						
						Change-Id: Iffdaca86f539ede159aa9c02f8839e0f69bfc1d9 
						
						
					 
					
						2014-11-27 16:49:11 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Ricardo Cerqueira 
							
						 
					 
					
						
						
							
						
						7d7716eb3a 
					 
					
						
						
							
							Do not include common SE policies automatically  
						
						 
						
						... 
						
						
						
						Automatic additions to BOARD_SEPOLICY_UNION from Android.mk do not
guarantee order or precedence of rules. More often than not, these
rules get included _after_ the device's own, which makes
it impossible for the device to extend them, or even to use types
defined here.
Manually include these in the device's BoardConfig with
"include device/qcom/sepolicy/sepolicy.mk" before
its own specific BOARD_SEPOLICY_DIRS (if any) instead. Or just
include files piecemeal.
Change-Id: I2ce0c3ec325906a46570b26c5f0c2018390d2ec9 
						
						
					 
					
						2014-11-26 17:34:15 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Subash Abhinov Kasiviswanathan 
							
						 
					 
					
						
						
							
						
						dd4a9de52f 
					 
					
						
						
							
							netmgrd: allow communication with connectivity framework  
						
						 
						
						... 
						
						
						
						Fix the following denials
Allow communication with cnd sockets
[   22.806091] type=1400 audit(1415054892.584:18): avc: denied { write }
for pid=1317 comm="netmgrd" name="cnd" dev="tmpfs" ino=8381
scontext=u:r:netmgrd:s0 tcontext=u:object_r:cnd_socket:s0 tclass=sock_file
[ 22.316132] type=1400 audit(1415053588.674:56): avc: denied
{ connectto } for pid=1321 comm="netmgrd" path="/dev/socket/cnd"
scontext=u:r:netmgrd:s0 tcontext=u:r:cnd:s0 tclass=unix_stream_socket
Allow operations on netlink xfrm sockets
[   20.794160] type=1400 audit(1415053541.505:16): avc: denied
{ setopt } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[   20.794450] type=1400 audit(1415053541.505:17): avc: denied
{ getattr } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[   20.794528] type=1400 audit(1415053541.505:18): avc: denied
{ write } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[   20.794602] type=1400 audit(1415053541.505:19): avc: denied
{ nlmsg_write } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
[   20.794688] type=1400 audit(1415053541.505:20): avc: denied
{ read } for pid=1162 comm="ip" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_xfrm_socket
Allow operations on netd and its resources
[   20.827567] type=1400 audit(1415053541.545:21): avc: denied { read }
for pid=1166 comm="ip" name="rt_tables" dev="mmcblk0p13" ino=268
scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0 tclass=file
[   20.827802] type=1400 audit(1415053541.545:22): avc: denied { open }
for pid=1166 comm="ip" name="rt_tables" dev="mmcblk0p13" ino=268
scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0 tclass=file
[   20.827915] type=1400 audit(1415053541.545:23): avc: denied { getattr
}for pid=1166 comm="ip" path="/data/misc/net/rt_tables" dev="mmcblk0p13"
ino=268 scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0
tclass=file
[   21.480717] type=1400 audit(1415053542.195:24): avc: denied { getattr
} for pid=1259 comm="sh" path="/system/bin/ndc" dev="mmcblk0p12" ino=444
 scontext=u:r:netmgrd:s0 tcontext=u:object_r:wpa_exec:s0 tclass=file
[   21.481188] type=1400 audit(1415053542.195:25): avc: denied { execute
} for pid=1259 comm="sh" name="ndc" dev="mmcblk0p12" ino=444
scontext=u:r:netmgrd:s0 tcontext=u:object_r:wpa_exec:s0 tclass=file
[   21.482377] type=1400 audit(1415053542.195:26): avc: denied { read
open } for pid=1260 comm="sh" name="ndc" dev="mmcblk0p12" ino=444
scontext=u:r:netmgrd:s0 tcontext=u:object_r:wpa_exec:s0 tclass=file
[   21.482614] type=1400 audit(1415053542.195:27): avc: denied
{ execute_no_trans } for pid=1260 comm="sh" path="/system/bin/ndc"
dev="mmcblk0p12" ino=444 scontext=u:r:netmgrd:s0
tcontext=u:object_r:wpa_exec:s0 tclass=file
avc: denied { search } for pid=1168 comm="ip" name="net" dev="mmcblk0p34"
ino=210 scontext=u:r:netmgrd:s0 tcontext=u:object_r:net_data_file:s0
tclass=dir permissive=0
CRs-Fixed: 748457
Change-Id: Ie1044b498002602354b28f3c2e36bf1c9ee64e15 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Vince Leung 
							
						 
					 
					
						
						
							
						
						c7902e848c 
					 
					
						
						
							
							sepolicy: allow untrusted_app access to perflock  
						
						 
						
						... 
						
						
						
						Add allow policy for untrusted app to write into
PerfLock socket
Change-Id: Ib494148895b38e352635511643fa90266c8d2ae9 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Tushar Janefalkar 
							
						 
					 
					
						
						
							
						
						2e74d6e656 
					 
					
						
						
							
							SEAndroid: Add new location policy  
						
						 
						
						... 
						
						
						
						Added policy for lowi-server to access
netlink sockets
Change-Id: I8fd6687d2b2e7c4dcb5e05b6f0541b3a24807b23
CRs-fixed: 747721 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						96ed5acea1 
					 
					
						
						
							
							Seandroid: replacing policies with macro  
						
						 
						
						... 
						
						
						
						Using macro for location services
Change-Id: Ic70498c3463803a36718091d43837c2f93e6d34b 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						ddfd476afb 
					 
					
						
						
							
							Seandroid: Moving wpa related policies to wpa.te  
						
						 
						
						... 
						
						
						
						Moving all wpa related issues to wpa.te and removing unnecessary
files
Change-Id: I610dbb0041ad89489fad2235f3d7cbb0c49edfb8 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						ea450c9eb2 
					 
					
						
						
							
							Seandroid: Removing unused file  
						
						 
						
						... 
						
						
						
						Removing unused file gloabal_macro.te
Change-Id: If5bd3813b0918ca08bbcebc4339d873f4abb95a9 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						4e65b736cd 
					 
					
						
						
							
							Seandroid: Adding dun service context.  
						
						 
						
						... 
						
						
						
						Adding context for dun service
Change-Id: Ie20962700335058800ed0d42ed01c2f27e4f96de 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Boxiang Pan 
							
						 
					 
					
						
						
							
						
						c2aebb2983 
					 
					
						
						
							
							sepolicy: add rule for CNE.  
						
						 
						
						... 
						
						
						
						add rule for CNE data file for db file
Change-Id: I1dbc81f7be2bb4b4344336546622d351f5fa3e23 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						4f4e27e5d7 
					 
					
						
						
							
							Seandroid: Add policy for wbc services  
						
						 
						
						... 
						
						
						
						Add policy for wbc services
Change-Id: I1ca863faeaac84382cc6e208fa4c869978d9b80a 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Samir Mehta 
							
						 
					 
					
						
						
							
						
						0599820753 
					 
					
						
						
							
							sepolicy : Define policy for wcnss service domain  
						
						 
						
						... 
						
						
						
						Adding wcnss domain and secontext needed for this domain.
Change-Id: I905a0e7b3e1672ead5980b81134c4d1a9b5164e5 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Sri Krishna Chaitanya Madireddy 
							
						 
					 
					
						
						
							
						
						4224895441 
					 
					
						
						
							
							EAndroid:add policy for init_shell  
						
						 
						
						... 
						
						
						
						Adding policy for ini_shell for test scripts
Change-Id: Ic5c876b75612c6b8f06ee566ff144c6d50243c8a 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						9fa941580c 
					 
					
						
						
							
							Seandroid: Adding policy for system_app  
						
						 
						
						... 
						
						
						
						Adding policy for system_app to give access to debugfs
Change-Id: I98e5fff67d56840eb8b025223d94e28315e22765 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						ed0bb3b52c 
					 
					
						
						
							
							Seandroid: Moving adbd to enforcing mode  
						
						 
						
						... 
						
						
						
						Moving seandroid to enforcing mode
Change-Id: I2425464992e0ea8cc44f9680781e011340b48513 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Avijit Kanti Das 
							
						 
					 
					
						
						
							
						
						3dd1ac9c1b 
					 
					
						
						
							
							Seandroid: Adding policy for QTI.  
						
						 
						
						... 
						
						
						
						Adding policy for QTI.
Change-Id: Iea59e6add0540600effdbc117ef6dc7c88055218 
						
						
					 
					
						2014-11-20 21:51:28 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Chirayu Desai 
							
						 
					 
					
						
						
							
						
						fab062c43b 
					 
					
						
						
							
							Correct executable bit for source files  
						
						 
						
						... 
						
						
						
						Change-Id: Ic37634d5e53376b59d4df80caae2681f960fceee 
						
						
					 
					
						2014-11-19 04:37:24 +00:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Chirayu Desai 
							
						 
					 
					
						
						
							
						
						d76e3d7e9b 
					 
					
						
						
							
							Append to sepolicy variables  
						
						 
						
						... 
						
						
						
						Change-Id: I0cf2a72b1219d9f7331323d97ab2bd017a076691 
						
						
					 
					
						2014-11-13 17:22:12 +05:30  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Boxiang Pan 
							
						 
					 
					
						
						
							
						
						b00e855871 
					 
					
						
						
							
							sepolicy: add rule for cne logging  
						
						 
						
						... 
						
						
						
						add a rule for allow enabling cne debug logging.
Change-Id: I266b224cf1af720f664f504019f0098d7d258712 
						
						
					 
					
						2014-11-12 15:19:59 -08:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Linux Build Service Account 
							
						 
					 
					
						
						
							
						
						f9737d1a54 
					 
					
						
						
							
							Merge AU_LINUX_ANDROID_LA.BF.2.1_RB1.05.00.00.173.002 on remote branch  
						
						 
						
						... 
						
						
						
						Change-Id: I6588eee30de0a2dd68d152675a70fa704b8a22fa 
						
						
					 
					
						2014-11-12 14:53:58 -07:00  
					
					
						 
						
						
							
							
							
							
							
							 
						
					 
				 
			
				
					
						
							
							
								 
								Boxiang Pan 
							
						 
					 
					
						
						
							
						
						8e537c3faf 
					 
					
						
						
							
							sepolicy: add rule for cne logging  
						
						 
						
						... 
						
						
						
						add a rule for allow enabling cne debug logging.
Change-Id: I266b224cf1af720f664f504019f0098d7d258712 
						
						
					 
					
						2014-11-05 00:16:50 -08:00