Commit graph

22 commits

Author SHA1 Message Date
Michael Bestas
fc9b1c6105
sepolicy: Guard debugfs rules
Allow building with PRODUCT_SET_DEBUGFS_RESTRICTIONS set.

Change-Id: I0d0703ea21f1f812c06247a3db2bc755e8904149
2023-07-15 14:01:14 +03:00
Michael Bestas
bac2436661 Use set_prop() macro for property sets
Change-Id: Id67a05f8ed718cad5856613c2700f4ce1e404cf0
2022-09-16 19:32:19 +01:00
Volodymyr Zhdanov
abb050ee08
legacy: Fix newline in file_contexts
Change-Id: Ia1543799d5cf858053dd127c1e9ea9559236bd9e
2022-08-25 16:39:33 +03:00
Himanshu Agrawal
7671ef762c sepolicy: making system/product and vendor restricted/internal prop
making system/product and vendor to restricted and public
prop for all the extendeded core prop and property type defined in public

Change-Id: Icbfe02ecb49a70619d6aa03a45975b2db186f559
2021-08-10 05:01:54 -07:00
Akhil Manikoth Kallankandy
86ab7112b8 sepolicy : add new qsta_app.te file for QSTA app
Change-Id: I7c1086ef983a2a74415a5291b39dfc0305bcc601
2021-02-11 10:40:40 +05:30
Eruvaram Kumar Raja Reddy
f997082943 sepolicy: adding vendor prefix to avoid naming colision
Update legacy properties with vendor prefix to void VTS failure
due to API30 changes

CRs-Fixed: 2825382

Change-Id: I39a5de4ad6450d805bf74e88aabc38c8347d89a4
2020-11-30 17:01:29 +05:30
Vamsi Krishna Gattupalli
fa6d5b4fdc sepolicy: add policies for DSP HAL manager
Add DSP HAL manager related attributes and policies. Allow untrusted
shell apps and APKs to be a client of the DSP HAL server. Mark the
DSP HAL interface library as same process HAL.

Change-Id: I7b2e5c716c6191d480d26d39a3adf188dc3aefb3
2020-09-22 10:52:41 +05:30
Shivam Agrawal
05ae9e6df9 sepolicy: Remove all qssi specific WFD sepolicy change
- revert all qssi specific WFD sepolicy changes on 6.0.c2
  to port WFD sepolicy changes from sepolicy.lnx.5.0

Change-Id: I22e335471e2877ce1c3fd24c1997ae037c4f38df
2020-07-16 19:57:37 +05:30
Rajshekar Eashwarappa
cdecf2b978 Sepolicy: Comment out neverallow violations
To compile sdm710 target.

Change-Id: I274b7ad2da86a39f6fe7295eb77570f1bdd87375
2020-04-07 10:28:20 -07:00
Jaihind Yadav
c03022a303 sepolicy: adding vendor_ prefix changes for pub/priv dirs.
to avoid naming colision with system types we are adding vendor_ prefix for all vendor defined types.

Change-Id: I1396f2c6d9576af3c3755096bb1e69d254b6db4e
2020-01-14 07:14:38 -08:00
Vivek Arugula
11ff0c9a5d sepolicy: avoid avc denials in USTA test app path
Change-Id: I8f2ab92e54f66c79a2979c6825aed68f81a1739f
2019-10-23 13:12:22 -07:00
kranthi
29c5c84110 Sepolicy : Add dont audit for vendor_gles_data_file label
System process cannot access vendor partition files.

Change-Id: I7fd5805ac98319660c1e5f9fca3ae2137a49d0a0
2019-09-23 16:41:37 +05:30
Vivek Arugula
11a5a1c2e3 sepolicy : Add policy rules for usta service
As part of making USTA (Sensor android test application) as
installable, we split the app into 2 parts. One Acts as only UI,
another one acts as service which interacts with sensors native
via JNI. Both the apps are placed in system/app path only.

Change-Id: I58df425bebef96b9d6515179e9581eed03571ad6
2019-09-13 17:34:22 -07:00
Vivek Arugula
c3013804e9 sepolicy: Allow USTA test app to access /data/sensors/scripts for legacy path.
Change-Id: I2526ac36b4b1f55b2aa11bb34350ef14ba306290
2019-06-28 12:13:03 +05:30
Ravi Kumar Siddojigari
626a7aca87 sepolicy : moving dumpstate permission to normal builds .
As the testcase is expected to pass in even userbuild .
Moving the rule out of test folder .

Change-Id: I0cab3ac99d99b417b159a6229e61e3a4fc492497
2019-06-19 11:11:08 +05:30
Ravi Kumar Siddojigari
9767ee2638 sepolicy : addressed dumpstate related denials.
As part of CTS testing its expected no denails should be seen
from dumpstate domain during testing so addressing generic
permission issue.

test :testNoBugreportDenials

Change-Id: Ic60a49e6330c42aa99280af8e6913af140e981e5
2019-06-03 18:21:39 +05:30
Sandeep Neerudu
01daaa8332 sepolicy: Add persist file access rules for USTA test App
Change-Id: I1ea7b7bd2a77dc37021fc3312ca04e25eeff06a9
2019-05-15 06:35:49 -07:00
Ravi Kumar Siddojigari
432d4af4c9 sepolicy : addressed dumpstate related denials.
As part of CTS testing its expected no denails should be seen
from dumpstate domain during testing so addressing generic
permission issue.

test :testNoBugreportDenials

Change-Id: I27178e6b4180d53cd5f6574bf71fe54819b10454
2019-05-07 00:37:11 -07:00
Manu Prasad
3089da6c10 sepolicy: Change policy for wfd on legacy targets
WFD requires revision in its SEAndroid policies due
to an OS upgrade and design re-architecture to conform
to system-wide mandates.

Change-Id: I5a9adc280cefab73d8c467379b74951fc3a88e71
2019-04-09 00:26:54 -07:00
Shibin George
cb03ca6211 Allow system_server to access /sys/kernel/debug/binder/state
For debugging watchdog issues in system_server, system_server
needs read access to binder-state file. Access to generic debugfs has
been removed for all processes except init, vendor_init & dumpstate.
This CL labels /sys/kernel/debug/binder/state file and allows
system_server, dumpstate, vendor_init & init, 'r_file_perms' access
to the same file.
The label and the associated access permissions only apply to
userdebug builds.

Change-Id: I159e39bcd05d699454797f8b1d1c17c810c99cb1
2019-04-01 00:41:08 -07:00
Jaihind Yadav
7a7bea74bc sepolicy: adding the misc change from 5.0 to 5.9
This is delta of sepolicy 5.0 component between 25th jan to 26th fab.

Change-Id: I43dbdf9f4e4300dfafedbd2e19460fb55844fbac
2019-02-27 17:16:13 +05:30
Jaihind Yadav
78f021fe6a sepolicy: moving qssi supported legacy target here.
Change-Id: Ife7e851823afc1dcbf2f561c8079795e909544bc
2019-02-18 21:49:10 -08:00