Shawn Shin
ce33f422e7
sepolicy:qcc add to legacy
...
Change-Id: I7031cd4070c478f1fccfe8e0b1e7053d6c57c36e
2020-10-30 16:10:52 -07:00
qctecmdr
758b6d2b99
Merge "sepolicy: align fst-manager and wigig legacy rules"
2020-10-29 23:51:22 -07:00
qctecmdr
887dc95b06
Merge "sepolicy: allow block_suspend deniel for lmkd"
2020-10-28 00:12:18 -07:00
Dedy Lansky
046ff067d0
sepolicy: align fst-manager and wigig legacy rules
...
Add legacy rules for enabling fst-manager to act
as a HAL service, and allow fst-manager and wigig
framework to access the capability config store.
These rules were missing in the legacy folder and
copied from the qva rules since there are still
platforms that need them.
Change-Id: I7a08bec9f3f84599a6392e8a5bd22c26e28e00a3
2020-10-27 22:53:42 -07:00
Himanshu Agrawal
21fbe23415
sepolicy: allow block_suspend deniel for lmkd
...
Avoid below deniel for lmkd:
avc: denied{ block_suspend }for comm="lmkd" capability=36
scontext=u:r:lmkd:s0 tcontext=u:r:lmkd:s0 tclass=capability2
permissive=0.
Change-Id: I332281110d4fa1fa208349a302fdc33a3a40d8ef
2020-10-27 22:31:24 -07:00
Arvind Kumar
7af4487b0c
Add file context for Light AIDL HAL Service
...
Change-Id: I1e5a79a5846910f90362d97899e5fc0d7dbfadbb
2020-10-27 00:54:23 -07:00
Ankur Sharma
ae9d933056
Sepolicy denials xtra for legacy R targets
...
- Fix sepolicy denial when xtra-daemon access the cacert
service.
- Allow location clientdomain to perform binder IPC to
qtidataservices_app serverdomain.
Change-Id: I0aae254fb4b4a67336d67f96856a2cf0d70954fc
CRs-Fixed: 2778560
2020-10-21 07:34:12 -07:00
c_gopir
7dff049400
Sepolicy : Add power AIDL to context
...
Add power HAL exec to file contexts
Change-Id: Ib97298e739f030454256c88f78e6862c2f4838bb
2020-10-19 21:44:18 -07:00
qctecmdr
1e9503d754
Merge "sepolicy: Add video property to get permission"
2020-10-15 22:17:56 -07:00
Milap Gajjar
78877b8b75
msm8998 inital bringup with enforce mode
...
Change-Id: If8164daa32ca0ba796a4bf78e9c450ce1669b509
2020-10-15 01:56:39 -07:00
Paras Nagda
44e4db86e8
sepolicy: Add video property to get permission
...
Allow Zygote to read video property
Change-Id: Iac936e84549cde02e2b87309f32cdbd2d8a0fe5f
2020-10-14 06:30:06 -07:00
Milap Gajjar
ef77a8cdd5
sdm660: Initial bring up sepolicy changes
...
Change-Id: Ifa42b7bebd66884698697fecc538f1ff6057519d
2020-10-14 03:27:54 -07:00
Paras Nagda
5bc47cdaf0
sepolicy: Add video property get permission
...
Allow mediaserver to read video sys property
Change-Id: Id09d5fbcbacbba3130ca9d7759ff67ade3a839b3
2020-10-06 22:26:31 -07:00
qctecmdr
b22751353a
Merge "sepolicy: add policies for DSP HAL manager"
2020-09-30 00:50:57 -07:00
Jiten Patel
c4f5909333
sepolicy: Policy fix for rpmb partition
...
On 4.19 kernel, due to upstream commit <97548575be>
(mmc: block: Convert RPMB to a character device),
Block device design for RPMB is now changed to char device.
This change add required permissions for qseecom daemon to
be able to access new device design for RPMB eMMC device.
Change-Id: I77a4ffc2107e61f66fe75cd2ccdc4d8da2685523
2020-09-26 17:09:23 +05:30
Karthik Gopalan
bc3a9ace81
sepolicy: Add policies for beluga properties
...
Add policies for beluga properties
Change-Id: I25283d9148166ad158181efddebd61277eebf8cb
2020-09-24 01:36:11 -07:00
qctecmdr
e40220732a
Merge "sepolicy: Allow all app domains to search sysfs_kgsl"
2020-09-23 01:51:40 -07:00
Vamsi Krishna Gattupalli
fa6d5b4fdc
sepolicy: add policies for DSP HAL manager
...
Add DSP HAL manager related attributes and policies. Allow untrusted
shell apps and APKs to be a client of the DSP HAL server. Mark the
DSP HAL interface library as same process HAL.
Change-Id: I7b2e5c716c6191d480d26d39a3adf188dc3aefb3
2020-09-22 10:52:41 +05:30
Murthy Nidadavolu
8d4a25335b
sepolicy: Updating sepolicy for DRM HAL
...
Adding 1.3 drm HAL to file_contexts.
Change-Id: I59f87fb9eb4a1605cf299a973986164f6761dab2
2020-09-18 13:39:59 +05:30
qctecmdr
ee00935244
Merge "sepolicy: Update thermal-engine sepolicy rules for legacy vendor file"
2020-09-16 03:30:27 -07:00
Nilesh Gharde
07cedab877
Sepolicy denials for location on legacy R targets
...
Fix for denial when xtra-demon trying getting
qccsyshal service instance
Change-Id: I522531dee26dd5ee426a7ae966e49a0a4e685481
CRs-fixed: 2765244
2020-09-15 11:55:49 +05:30
Asha Magadi Venkateshamurthy
7ef030e945
sepolicy: Update thermal-engine sepolicy rules for legacy vendor file
...
Update legacy thermal-engine sepolicy rule for SDM660 target by adding
access of sysfs nodes of thermal devices, kgsl and devfreq by adding
sepolicy rules.
Change-Id: I49c511d2dbc67169daa937102d58839eb799b977
2020-09-14 12:14:23 +05:30
qctecmdr
7036682bb5
Merge "sepolicy: add support for separate dcvs script for sdm660"
2020-09-04 05:32:35 -07:00
Asha Magadi Venkateshamurthy
c7c8131f02
sepolicy: add support for separate dcvs script for sdm660
...
Give sepolicy permission to dcvs node used to set
memlat parameters.
Change-Id: Iadddf5d11375a6d7cc48d523ed8c44baf4643be1
2020-09-04 10:55:17 +05:30
Bharat Pawar
b4ca9cb07f
sepolicy: Allow all app domains to search sysfs_kgsl
...
Fixing below avc denails
type=1400 audit(0.0:86144): avc: denied { search } for
name="kgsl-3d0" dev="sysfs" ino=43551 scontext=u:r:mediaswcodec:s0
Change-Id: Ibf7a9a231119c23c4830538323587edbe95150a2
2020-09-03 19:15:02 +05:30
Bharat Pawar
90dc370d64
sepolicy: Adding rules for servicetracker HAL for legacy target.
...
Also adding file_context for servicetracker V1.2
Change-Id: I7145f86093c954376e6dd8bbcd8f6d2e6005a981
2020-09-03 17:47:59 +05:30
Bharat Pawar
3bdddf83fd
sepolicy: Add label for vibrator AIDL HAL service
...
Add selinux label for vibrator AIDL HAL service
so that it can accessthe vibrator device correctly.
Change-Id: I6486b6cf399ce60a671b187c624993820c6f246c
2020-08-21 15:48:02 +05:30
qctecmdr
f95a6b8611
Merge "perf: Fix sepolicy errors during boot"
2020-08-13 07:28:05 -07:00
qctecmdr
33281c7bda
Merge "Sepolicy: ported all Wfd sepolicy from sepolicy.lnx.5.0"
2020-08-13 05:34:25 -07:00
qctecmdr
3c94562422
Merge "sepolicy: Remove all qssi specific WFD sepolicy change"
2020-08-13 03:40:25 -07:00
Shashi Shekar Shankar
ded4b6e973
perf: Fix sepolicy errors during boot
...
Fix sepolicy errors on legacy targets.
Change-Id: Ia491e7e3330243d3ec70fba97c3beafc65f93afc
2020-08-12 19:57:11 -07:00
Pavan Kumar M
b7b9097e20
sepolicy: Add sepolicy rules for IImsFactory HAL for legacy targets
...
Change-Id: I371457018f309bb3a23138ac8d71d4628430f69e
2020-08-07 04:26:38 -07:00
Rajeswari N
ae41118035
sepolicy: Add perf 2.2 hal
...
Support for perf HAL 2.2 uprev
Change-Id: Ia6abea00751494803bf78839ef96608dfbc9b09d
2020-08-04 15:15:36 +05:30
Shivam Agrawal
ff436b9716
Sepolicy: ported all Wfd sepolicy from sepolicy.lnx.5.0
...
- WFD sepolicy fix.
Change-Id: I1000b0277318ca7439a5bb177787dffe8d51b7c9
2020-07-29 14:10:43 +05:30
qctecmdr
d580bc7940
Merge "Allow BT LAZY HAL serivce to access bluetooth hal"
2020-07-28 08:46:15 -07:00
qctecmdr
8e93513c1d
Merge "sepolicy: Add interface entry for Legacy HAL"
2020-07-28 06:48:53 -07:00
Bharat Pawar
b98304acab
Allow BT LAZY HAL serivce to access bluetooth hal
...
BT lazy service is a new shared object on go targets
which requires to access BT HAL.
Change-Id: I5b4248a35c52211e03da9f0f9410d967e2b2c602
2020-07-22 22:54:28 +05:30
Tapas Dey
c6aece100b
sepolicy: Add interface entry for Legacy HAL
...
Added INxpNfcLegacy HAL interface entry
for Legacy HAL.
Change-Id: I8e241a7f13ce5d6431a47c3084384af6c0291cba
2020-07-22 14:08:54 +05:30
Shivam Agrawal
05ae9e6df9
sepolicy: Remove all qssi specific WFD sepolicy change
...
- revert all qssi specific WFD sepolicy changes on 6.0.c2
to port WFD sepolicy changes from sepolicy.lnx.5.0
Change-Id: I22e335471e2877ce1c3fd24c1997ae037c4f38df
2020-07-16 19:57:37 +05:30
Rajeswari N
5bab8c4b02
sepolicy: sepolicy changes for perf HAL Uprev
...
Perf Hal Uprev 2.1 support added and IPerfcallback HAL added
Change-Id: Icd1cfba45e2a118de9a1944e6d9709ae458b9015
2020-07-16 00:04:44 -07:00
Rajshekar Eashwarappa
dbb48aa54b
SEPolicy: Adding sdm660 policies
...
Change-Id: I71b5ec869475846e0c7b8f3ba00f6a018a631a50
2020-07-10 01:00:59 -07:00
himta ram
10a90a8e77
sepolicy: add sepolicy rules for pronto based targets
...
Add sepolicy rule for pronto based targets.
CRs-Fixed: 2724004
Change-Id: I64804f3dd532934d314cb5731fc7f1633d13a236
2020-07-02 14:00:32 +05:30
qctecmdr
a55d07264e
Merge "sepolicy: Adding vendor_qti_init_shell label to legacy"
2020-07-01 09:29:09 -07:00
qctecmdr
a123f4808c
Merge "Remove QtiTetherService references"
2020-07-01 09:23:48 -07:00
Pavan Kumar M
5cffcfdf15
Remove QtiTetherService references
...
QtiTetherService is not used anymore, remove all
the existing references
Change-Id: I9cf47507686907d29faef44c65d6e30dd584f19c
CRs-Fixed: 2710079
2020-06-15 10:21:25 +05:30
Udipto Goswami
12fed7ec7d
sepolicy: Adding vendor_qti_init_shell label to legacy
...
There are some targets which uses legacy sepolicy but
USB uses vendor_qti_init_shell label for its rc file
execution which causes a mismatch as legacy uses
qti_init_shell. This stop the USB rc file from
executing the command for calling the script file
responsible for setting the composition.
Ultimately setting the default value which is adb
on bootup instead of default composition.
Fix this by setting an alias as vendor_qti_init_shell
in legacy sepolicy for qti_init_shell allowing USB
to use vendor label.
Change-Id: Ia8953ed61bb1b87d01b17d02fc7e4bf4b86e66eb
Signed-off-by: Udipto Goswami <ugoswami@codeaurora.org>
2020-06-12 04:00:05 -07:00
Bharat Pawar
5fb71e0e4a
sepolicy: Pick legacy sepolicies for 8953/37 targets
...
Pick legacy sepolicy rules instaed of qva for 8953 and
8937 targets.
Change-Id: I509de01be51f1fc19ac3e1f49ffcf3f547c70457
2020-06-12 14:25:51 +05:30
Bharat Pawar
327503aee9
sepolicy: Add support for 8937 and 8953 targets
...
Change-Id: I22d8f079acfc59c16adb66e46755157b7c61a6bd
2020-06-05 16:27:16 +05:30
Linux Build Service Account
5bfd49e2ab
Merge "sepolicy: adding dontaudit for vendor modprobe." into sepolicy.lnx.6.0
2020-05-13 00:21:14 -07:00
Linux Build Service Account
47d0180911
Merge "sepolicy: adding dontaudit for init_shell" into sepolicy.lnx.6.0
2020-05-13 00:21:12 -07:00