Commit graph

31 commits

Author SHA1 Message Date
qctecmdr Service
90f20fd4af Merge "sepolicy: Add sepolicy rules/files for mirrolrink" 2019-02-03 18:51:09 -08:00
Weiyin Jiang
fb4d38659c audiohalext: add config store interfaces to audio_hwservice
Add AHAL extension interfaces to audio hwservice.

Change-Id: I054fd3dcc1b27b0a32b52ba05152290f744fd0c6
2019-02-01 00:52:11 -08:00
Indranil
ff4a101598 sepolicy: Add sepolicy rules/files for mirrolrink
Add sepolicy rules/files for mirrolrink component

Change-Id: I8123e81079468facd9345cf2c30411699557a893
2019-01-30 19:39:49 +05:30
qctecmdr Service
e8e7e08cf2 Merge "sepolicy: add selinux rule for audio ftm test" 2019-01-29 17:40:00 -08:00
Xiaojun Sang
ea2bc4cb6d sepolicy: add selinux rule for audio ftm test
allow mm-audio-ftm to run and access data and config file.

Change-Id: I61803ceb1f746505e846c042c1152ea981289c18
2019-01-30 08:48:33 +08:00
Tapas Dey
bfe7af7df2 sepolicy: Add NFC sepolicy rules
Added missing sepolicy rules to fix NFC
enablement issue.

Change-Id: Ib0f6fa8dac34d91eb0664f5285727c4fbb6e39ee
2019-01-29 19:39:18 +05:30
qctecmdr Service
d765654f62 Merge "sepolicy: add audio rules to qva folder" 2019-01-28 01:39:21 -08:00
qctecmdr Service
7e7eb94c2d Merge "sepolicy :: Addition of sepolicy for cvphal" 2019-01-28 01:02:46 -08:00
qctecmdr Service
4cd8dfb4ac Merge "FR53056 for Connection Security." 2019-01-28 00:44:42 -08:00
Vikram Panduranga
d1c36a1d5e sepolicy: add audio rules to qva folder
Add delta audio rules that are needed to
support value add features into qva folder.

Change-Id: I39ab747df98b067b78e7009d198f7a7837d5bd4d
2019-01-24 11:27:48 -08:00
James Shao
6f4bddb347 FR53056 for Connection Security.
Enable SSG sepolicy on latest Android versions.
Port LA.1.0 Connection Security sepolicy to LA.2.0.
sepolicy.lnx.4.0 to sepolicy.lnx.5.9

Change-Id: I20c2f5b099baa4664f48e72225cd962a09893991
2019-01-24 09:56:23 -08:00
suchawla
6deb2681cc sepolicy :: Addition of sepolicy for cvphal
Cvp is a new computer vision hardware
which interacts with DSP and video driver.
Adding new ion mem permission for cvp domains.

Change-Id: I6c2118b15cf5ccc6505c80969c4090e3396238e4
2019-01-24 13:31:00 +05:30
qctecmdr Service
a23c904f84 Merge "sepolicy : removed duplicate definations from hwservice_contexts" 2019-01-23 21:36:05 -08:00
vijay.rayabarapu
ff7b884e6c Sepolicy: adding new line to property context file
Change-Id: Ic384df1fcd2bdc58ce017e44468dbfe8cfc9f42e
2019-01-23 12:19:18 -08:00
Ravi Kumar Siddojigari
00a7d989e1 sepolicy : removed duplicate definations from hwservice_contexts
build error as following are address by removing the duplicate defs
Multiple same specifications for vendor.qti.hardware.iop::IIop.
Multiple same specifications for vendor.qti.hardware.alarm::IAlarm.

Change-Id: I2b3de7d4155aaef141fbe9f7bb30161e214767cd
2019-01-22 22:26:09 -08:00
Huang Li
b47502c653 Sepolicy: Porting QMMI/FFBM Sepolicy from sepolicy 4.0 to 5.9.
Porting all relative sepolicy files for factory test.

Change-Id: I573bd39f5071a646bb38854027e066b09602b9f1
CRs-Fixed: 2374478,2374492,2374499,2374503
2019-01-21 13:14:43 +08:00
qctecmdr Service
8087eab689 Merge "Sepolicy: Address bootup denials for configstore" 2019-01-17 00:27:52 -08:00
qctecmdr Service
6ad10fec94 Merge "Camera: adding sepolicy for accessing vendor properties" 2019-01-13 23:15:19 -08:00
Mohamed Sunfeer
319cd450b9 sepolicy: Add selinux rules to disable SPU
Add disable SPU property to allow OEM to disable SPU.

Change-Id: I60a98f87d7557ea9263843ed8d475c091c5e634c
2019-01-11 16:40:21 +05:30
Sauhard Pande
1b99037858 Camera: adding sepolicy for accessing vendor properties
Issue: To access and read vendor.camera.aux.packagelist
and persist.vendor.camera.privapp.list. Needed to identify
priviledged app and dual camera exposure

Fix: Accessed only on system side thus added flags as
extended_core_property_type

Change-Id: I9518e88cdbc8411a9c070cc01a000442828715a4
2019-01-10 22:16:36 -08:00
Archit Srivastava
4631b2782b Sepolicy: Address bootup denials for configstore
Allowing surfaceflinger to check HDR and WCG Supported at run time from
hardware to override hardcoded values defined in $TARGET.mk

Change-Id: Id4857b9d790b73b787e20f7cbc46d3dcf34a47ea
2019-01-10 17:47:12 +05:30
Shaikh Shadul
f9adb88fe8 sepolicy: initial sensors policy changes for common image
Change-Id: I7bc74d7b90ef39d878cd4b096713c66f818b4fe6
2018-12-26 14:28:45 +05:30
Chalapathi Bathala
41c6bfc0aa sepolicy: add policies for mdm_helper
Add policies for mdm_helper

Change-Id: Ie233107671fd9566f822d54bc1cd0b22286ca6f3
2018-12-11 10:41:56 -08:00
Hemant Gupta
c21eb88d4b sepolicy : Address BT denials resulting in error popups
Address BT denials resulting in error popups.

Change-Id: Ifba5c183739663113dd58814fbf445ae51cefd77
2018-11-27 16:21:06 +05:30
Ravi Kumar Siddojigari
4106db5b4f sepolicy : cleanup and misc denials addressed .
as part of bringup addressed misc denials and code cleanup

Change-Id: Ifba5c183739663113dd58814fbf445ae51cefe77
2018-11-15 22:25:34 -08:00
Vara Prasad A V S G
1287d1c879 sepolicy : remove system_writes_vendor_properties_violators
As part of treble system /core services are not allowed  to
set vendor property .

if Property defined is part of system image then it can be set
or get by core/system services provided we define the property
as extended_core_property_type. So adding this to the property
that are added by vendor and used by core/system services.

Change-Id: I7ad8bc562be09126c082fc54f52499f5138fea5b
2018-11-15 03:41:05 -08:00
Siddeswar Aluganti
69f3ff2c7d Fix build errors.
Change-Id: If024d9253ad12fcbeab755f1e77421ec20f28b95
2018-11-14 14:37:31 -08:00
mraja
b2fbfd7d3a sepolicy: following the AOSP model to label the nodes.
sdd node was labeled as ssd_Device for some target but ssd_block_device for other.
So making it unique across all target.

Change-Id: I1248585c0c6ab33fbc9daaa8d0ab8d6299ec2fb8
2018-11-02 18:17:29 +05:30
Ravi Kumar Siddojigari
ddf399906e sepolicy :[2/2] fix system_file_type and get_prop for coredomians.
As part of new AOSP restriction all the domains which are working
from system partation should have "system_file_type" attribute
else will lead to compile time failure .
For reading / setting any property  we should be using
following macros .
set_prop( domain, property_label)
get_prop( domain, property_label)

So addressing  these as part of new requirments .
Change-Id: Ie7a9c72994f3a1a62f8cf70d40a3a56d494a1726
2018-11-02 14:21:31 +05:30
Jaihind Yadav
fd253c8e33 sepolicy: changes needed to get the target boot to UI.
Adding the label to services/daemon which was not getting started due to
incorrect label and add the sepolicy rules to get the target to boot
 in enfrocing mode.

Change-Id: I12fc4bfe38153cd51fb2d9b869f05a06c9d2c61f
2018-11-01 15:47:55 -07:00
Jaihind Yadav
07a6077476 sepolicy: inital commit for seperation of generic to qva
restructuring dir sturcture.
    adding support of upcomming target.

Change-Id: I6b23e7c0c8bed79146b29c681c7ef1f5311e1234
2018-10-31 17:47:16 +05:30