Commit graph

2865 commits

Author SHA1 Message Date
qctecmdr
3db39e369d Merge "sepolicy: Modify the path in sysfs rule" 2019-06-20 06:25:15 -07:00
Pavan Kumar M
76e95132fd sepolicy: Modify the path in sysfs rule
Modify the path in sysfs rule for msmnile.
Add the corresponding net sysfs rule for sdm710.

Change-Id: Ibd299806e4a0edf91ff071774064e19a2135bbbd
CRs-Fixed: 2473945
2019-06-20 03:02:21 -07:00
qctecmdr
32645d8905 Merge "Add sepolicy for BT lazyhal property" 2019-06-20 01:16:09 -07:00
Balakrishna Godavarthi
bc07bc1014 Add sepolicy for BT lazyhal property
This patch adds lazyhal property to bluetooth_prop
and allows bluetooth application to access the property.

Change-Id: I1803488eaced69116ba07f219f7dc22b7ee1d1ca
2019-06-19 22:56:02 -07:00
anilsr
c5f043fff0 sepolicy: Allow camera hal to access qdisplay service.
Change-Id: If1f0f8bc7163a549200d41e20776c34d62386e4c
2019-06-19 22:34:35 -07:00
qctecmdr
180704bb4e Merge "sepolicy: Add capabilityconfigstore support for legacy targets." 2019-06-19 04:30:11 -07:00
qctecmdr
7c32d91780 Merge "sepolicy : moving dumpstate permission to normal builds ." 2019-06-19 01:12:18 -07:00
qctecmdr
cc70fbee28 Merge "sepolicy: Add access policy for charger files" 2019-06-18 22:45:20 -07:00
Ravi Kumar Siddojigari
626a7aca87 sepolicy : moving dumpstate permission to normal builds .
As the testcase is expected to pass in even userbuild .
Moving the rule out of test folder .

Change-Id: I0cab3ac99d99b417b159a6229e61e3a4fc492497
2019-06-19 11:11:08 +05:30
qctecmdr
f668967b3c Merge "Sepolicy: Add power off alarm app rules" 2019-06-18 14:05:22 -07:00
qctecmdr
a11a323e14 Merge "sepolicy: Do not audit zygote service access to vendor_gles_data_file" 2019-06-18 10:56:07 -07:00
Mahantesh Sanakall
a8916de8f7 sepolicy: Add capabilityconfigstore support for legacy targets.
1. Define domain for capabilityconfigstore
2. Add type for /data/vendor/configstore folder
3. Allow capabilityconfigstore HIDL Server access/r/w it

Change-Id: I2781d93f02fc4673d935d6b764f53a9f45868256
2019-06-18 09:57:24 -07:00
qctecmdr
3c29db5277 Merge "sepolicy: Give read/write permission to vender_gles_data_file" 2019-06-18 08:21:02 -07:00
qctecmdr
3d35ea5570 Merge "sepolicy: Allow platform app to access hal display color service" 2019-06-18 05:57:09 -07:00
qctecmdr
faf26fd926 Merge "sepolicy: add policy for qti audiocontrol" 2019-06-18 02:37:14 -07:00
Xiaoxia Dong
cf1e90774e Sepolicy: Add power off alarm app rules
Grant access to hal_perf.

Change-Id: If93ccf6884e07c9d524acd8b8c17e3e8dd635543
2019-06-18 13:59:24 +08:00
qctecmdr
325a1f201f Merge "sepolicy : Allow APK files to access SCVE libs" 2019-06-17 21:25:09 -07:00
qctecmdr
8bec0c22ea Merge "sepolicy: Add location and wifihal rules for legacy devices" 2019-06-14 05:31:33 -07:00
Vinay Gannevaram
8980acb821 sepolicy: Add location and wifihal rules for legacy devices
Add socket communication sepolicy rules for location and wifihal.
lowiserver would interact with wifihal for nl communication.

CRs-Fixed: 2467101
Change-Id: Iff7e5f50858c95ad86ff34e5f5333bd9304aec4e
2019-06-14 04:04:14 -07:00
qctecmdr
9847575da6 Merge "Initial Android target definition for trinket" 2019-06-14 03:14:11 -07:00
qctecmdr
d3424b1836 Merge "sepolicy: add permission for sensingdaemon to create socket" 2019-06-13 22:11:15 -07:00
Xu Yang
40ce4bbb1d sepolicy: Allow platform app to access hal display color service
Change-Id: I7d64d51e8d7ec9a9b6a0c129070265cb01c813d4
2019-06-13 19:22:42 -07:00
qctecmdr
2137a69ea5 Merge "sepolicy: add audio permission for spi device" 2019-06-13 15:46:11 -07:00
qctecmdr
d533508208 Merge "Sepolicy: add rule for seempd" 2019-06-13 13:14:47 -07:00
Maya Erez
8a1bb28a03 sepolicy: add permission for sensingdaemon to create socket
Allow sensingdaemon access to create socket, to fix the
following error, seen when trying to run the sensingdaemon
with start command:
avc: denied { create } for scontext=u:r:sensingdaemon:s0
tcontext=u:r:sensingdaemon:s0 tclass=qipcrtr_socket permissive=0

Change-Id: I68ae70fe93e0b73f0b6aeec5e84793edf532dfd0
2019-06-13 16:32:33 +03:00
Rahul Janga
872951efad sepolicy: Give read/write permission to vender_gles_data_file
These rules are missed while porting the policies from Android P
to Android Q.

Adressing the following denial:

type=1400 audit(14866.629:43): avc: denied { search } for comm="HwBinder:753_1"
name="gpu" dev="sda9" ino=376 scontext=u:r:hal_graphics_allocator_default:s0
tcontext=u:object_r:vendor_gles_data_file:s0 tclass=dir permissive=0

Change-Id: I24434be8d895d5dab8e5c24643c8be48f20d8673
2019-06-13 18:10:12 +05:30
Vishvanath Singh
afe286084c Initial Android target definition for trinket
Defining sysfs_jpeg in qva

Change-Id: I06429f5dde5b32cafd525d0fca010719a3fcec48
2019-06-13 05:05:12 -07:00
Suman Voora
0a44470698 sepolicy : Allow APK files to access SCVE libs
APK needs access for SCVE libs which are on vendor side for
providing the system access for the hals.
These SCVE libs run on different platforms such as GPU,
dsp and cpu, which uses the ion memory.

Change-Id: I21a0bd9c6f2fac58a54e4b7cedc6ab8ea29ea929
2019-06-13 15:26:00 +05:30
Maya Erez
654a150566 sepolicy: add policies for wigig sensingdaemon service
Add SE policies for sensingdaemon daemon required for
wigig sensing feature.

Change-Id: I5e5363495cdff6966f6b377fd4688df72f5aa7d0
2019-06-13 01:12:57 -07:00
Kavya Nunna
362458c219 sepolicy: Add access policy for charger files
Add charger.te file and add policy for charger script
to access charger devices.

while at it add sepolicy rules for hvdcp_opti.

Change-Id: Ib14d5baad3415e3044732177c73b3e64d4f8fdc4
2019-06-13 11:50:57 +05:30
Derek Chen
44aac37477 sepolicy: add audio permission for spi device
Add audio device domain permission for
spidev2.0 device node.

Change-Id: Iff17bc9d05f780620ee1ee89166a74bef38342fb
2019-06-12 14:42:50 -07:00
qctecmdr
38ea1e979b Merge "sepolicy: Add rules to enable non-A/B dynamic partitions" 2019-06-12 10:59:51 -07:00
qctecmdr
f82a9615fa Merge "sepolicy: Add support for fastbootd to flash dynamic partitions" 2019-06-12 07:50:38 -07:00
qctecmdr
493e78747d Merge "sepolicy: Add permissions for composer service" 2019-06-12 04:46:19 -07:00
Mahantesh Sanakall
ef4cce3990 sepolicy: Add rules to enable non-A/B dynamic partitions
Change-Id: Icb6e99cf07a1105bb3f2f4311825617c58b8e699
2019-06-12 04:17:35 -07:00
Anuj Singhal
bad42f8098 sepolicy: Add support for fastbootd to flash dynamic partitions
Sepolicy changes needed for dynamic partition support for legacy
targets : SDM845 and SDM710
- Add rules to enable fastbootd mode flashing of dynamic partition
- Define labels for super, recovery and vbmeta_system partitions
- Allow update_engine to access recovery partition for OTA

Change-Id: I6f692da6ab687529833a87b6feb375fda26508b8
2019-06-12 15:04:58 +05:30
Derek Chen
1346f7ac89 sepolicy: add policy for qti audiocontrol
Added audiocontrol_qti domain and access for Qti
AudioControl HAL Service.

Change-Id: I68a56e82a14c4b9d98f3045d0336f14979333a1b
2019-06-12 02:14:23 -07:00
Marco Zhang
1b7a795471 sepolicy : remove duplicate defination of uefi_block_device
As definition of uefi_block_device  been moved to common
removing this definition from other target specific folders

Change-Id: I7367555c4d2d869b8f55a3c5bad0ad72a0203e67
2019-06-12 00:08:56 -07:00
Rajavenu Kyatham
23a0ea8f24 sepolicy: Add permissions for composer service
- composer service is required for communication b/w
  SF and HWC. 

Change-Id: I52652d309363b3f0f7b963d615688ce3e11c6fef
CRs-Fixed: 2466343
2019-06-12 12:20:03 +05:30
qctecmdr
78d4d64afd Merge "sepolicy:Moved NNHAL-1.2v rules to common folder" 2019-06-11 16:31:14 -07:00
qctecmdr
e410bc9a3a Merge "sepolicy: Fix denials in location app" 2019-06-11 13:33:17 -07:00
qctecmdr
de2313a4a8 Merge "Sepolicy: Add sepolicy permissions to NPU LLCC BWMON device" 2019-06-11 10:41:00 -07:00
Harikrishnan Hariharan
acd13b1cee sepolicy: Fix denials in location app
- Add rule for write access to dpmtcm_socket sock file
- Add few domains to dont audit rule list for vendor_gles_data_file
dir search.

Change-Id: Iabc0250d2ac0bf28e4f4dd3d8c67b4bf20fbeb1e
CRs-Fixed: 2469209
2019-06-11 22:40:07 +05:30
kranthi
6b7b1f3a39 sepolicy: Do not audit zygote service access to vendor_gles_data_file
Do not audit zygote service access to vendor_gles_data_file.

Addressing the following denial:

type=1400 audit(0.0:123): avc: denied { search } for name="gpu" dev="dm-0"
ino=1654839 scontext=u:r:zygote:s0 tcontext=u:object_r:
vendor_gles_data_file:s0 tclass=dir permissive=0

CRs-Fixed: 2465123

Change-Id: I6cc6e3e6e393a7181bd9fea6992e6f86f987f0d5
2019-06-11 07:29:51 -07:00
qctecmdr
b362bed0fa Merge "Sepolicy: Add permissions to set vendor boot mode prop for Factory HIDL" 2019-06-11 06:52:29 -07:00
Huang Li
b3e35668d2 Sepolicy: Add permissions to set vendor boot mode prop for Factory HIDL
Allow permissions for Factory HIDL to set vendor.sys.boot_mode prop.

Change-Id: Ifa5edbb01d5f859225ccb440ec367c222b8eebf4
CRs-Fixed: 2450631
2019-06-11 18:29:07 +08:00
Madhanraj Chelladurai
ed9d8b83c9 sepolicy: permissions for audio, hw service for location_test_app
permissions for audio and hw service access for
location_test_app

Change-Id: I1e059486248dafc7a6adeb0b6273eb3d39ab2235
CRs-Fixed: 2445789
2019-06-11 03:20:36 -07:00
qctecmdr
deb6cc1f72 Merge "sepolicy: allow gnss hal to access health hal" 2019-06-10 12:14:36 -07:00
qctecmdr
fdbf08d08c Merge "sepolicy: Allow secure_element HAL to access vendor data" 2019-06-10 08:56:18 -07:00
qctecmdr
11d1a57ae3 Merge "sepolicy: Add permissions for composer service" 2019-06-10 06:30:18 -07:00