Commit graph

345 commits

Author SHA1 Message Date
Bhuvan Varshney
e76fd334c4 sepolicy: Enable esepowermanager 1.1 HAL service
esepowermanager HAL 1.1 service is required to be
invoked from the boot.

Added entry for esepowermanager HAL 1.1 service.

Change-Id: I82825f66dee8981407903fd7f67cf474a44904cb
2020-01-28 11:00:11 +05:30
qctecmdr
92f07d6f82 Merge "Allow update engine to access to metadata_file." 2020-01-24 03:29:31 -08:00
qctecmdr
3a0f79dc80 Merge "sepolicy: Rename NFC HIDL service to 2.0" 2020-01-23 11:58:30 -08:00
P.Adarsh Reddy
eca8ae265e Allow update engine to access to metadata_file.
With virtual-ab feature, update engine needs access
to metadata_file, allow the same.

Change-Id: Ia366da18517db28f4404f2605987e1b36906a83a
2020-01-23 19:56:47 +05:30
Prateek Sood
853ca77c79 msm_irqbalance: Applying naming rules for selinux labels
SELinux label for vendor properties are required to have vendor_
prefix. Adding vendor_ prefix for vendor properties related to
msm_irqbalancer.

Change-Id: I10338b7c69b7cbe02703d622c2fef4c1de9358e5
2020-01-21 21:49:51 -08:00
Bhuvan Varshney
a8ba7832ea sepolicy: Rename NFC HIDL service to 2.0
Rename NFC HIDL service 1.3 to 2.0 as the NFC
HAL has major changes which are not backward
compatible with the older HALs.

Removed entries for NFC HIDL services
which no more in use.

Change-Id: I1b1f21b9f62336cb5a6aebcc04083c20d7780a6c
2020-01-20 16:59:04 +05:30
Jaihind Yadav
c03022a303 sepolicy: adding vendor_ prefix changes for pub/priv dirs.
to avoid naming colision with system types we are adding vendor_ prefix for all vendor defined types.

Change-Id: I1396f2c6d9576af3c3755096bb1e69d254b6db4e
2020-01-14 07:14:38 -08:00
Mahesh Sharma
a418dabea1 sepolicy: Add rules for ANT HAL
Change-Id: I1eb832cc45b50965611e848b78e64ae6fac73977
2020-01-08 18:03:51 -08:00
himta ram
c0d7a5ce1d sepolicy: add sepolicy support for fm domain switch
Switch FM app's domain from system to platform app.
Add sepolicy rules for fm in platform_app domain.
Reomve fm sepolicy rules from system_app domain.

CRs-fixed: 2595596
Change-Id: I40a4f68eb8ded948d44653d3bc0209bbb3d9ef35
2020-01-02 01:02:34 -08:00
Gaurav Singhal
c690ddd92c sepolicy: Enable NFC HIDL 1.3 service
NFC HIDL 1.3 service is required to be
invoked from the boot.

Added entry for NFC HIDL 1.3 service.

Change-Id: I82e34f09a4309ca1102ed8f86728eb994ed62852
2019-12-31 14:55:30 +05:30
Vivek Arugula
11ff0c9a5d sepolicy: avoid avc denials in USTA test app path
Change-Id: I8f2ab92e54f66c79a2979c6825aed68f81a1739f
2019-10-23 13:12:22 -07:00
Jaihind Yadav
1aaca258ca Revert "Added selinux rule for hal_perf"
This reverts commit a9ddc89ab2.

Change-Id: Ibc2a8b5b1e5baeeca5a996710e26173b0edad9bc
2019-10-22 00:41:42 -07:00
qctecmdr
d8982c8764 Merge "sepolicy: remove mirrorlink related sepolicies" 2019-09-29 01:26:13 -07:00
qctecmdr
74707b14bd Merge "Sepolicy : Add dont audit for vendor_gles_data_file label" 2019-09-28 23:26:06 -07:00
Mohit Aggarwal
6886e3677e sepolicy: Define key for TimeService apk
Define key for TimeService apk
Change-Id: I612120345bed56fd92d438a0a2db3db6aa919519
2019-09-26 03:44:36 -07:00
Sandeep Neerudu
b9cad48c95 sepolicy-sensors : allow init daemon to set sensors_prop properties
Change-Id: I6b587a167538cc49c9049511f9448ec99c40b212
2019-09-23 22:14:10 -07:00
kranthi
29c5c84110 Sepolicy : Add dont audit for vendor_gles_data_file label
System process cannot access vendor partition files.

Change-Id: I7fd5805ac98319660c1e5f9fca3ae2137a49d0a0
2019-09-23 16:41:37 +05:30
Indranil
0c7a5a1cad sepolicy: remove mirrorlink related sepolicies
Since mirrorlink feature is de-PORed,delete mirrorlink
project te files and respective entries throughout
the sepolicy component.

Change-Id: Id8e4a824f0690c519ce2a9bd1007fff2eaf2e36c
2019-09-20 10:34:12 +05:30
Vivek Arugula
11a5a1c2e3 sepolicy : Add policy rules for usta service
As part of making USTA (Sensor android test application) as
installable, we split the app into 2 parts. One Acts as only UI,
another one acts as service which interacts with sensors native
via JNI. Both the apps are placed in system/app path only.

Change-Id: I58df425bebef96b9d6515179e9581eed03571ad6
2019-09-13 17:34:22 -07:00
qctecmdr
e8ecc393d9 Merge "Sepolicy : add vendor prefix to vm_bms" 2019-08-12 23:07:26 -07:00
Jaihind Yadav
0ac1358c78 sepolicy: removing violators from couple of system domains.
This violators is no longer needed because module needed this is no longer exist.

Change-Id: Ia095e10f9139199296619fc54bda5f32ac543454
2019-08-12 17:25:49 +05:30
Nahush Gondhalekar
72e86dc39f Removing usf for treble compliance.
Change-Id: I5771a191610adb8ca968902e2c7b6eac1830874c
2019-08-12 04:46:31 -07:00
Ashay Jaiswal
e04d97a1ec Sepolicy : add vendor prefix to vm_bms
vm_bms is a proprietary service, add vendor prefix to
vm_bms.

Change-Id: I00840fd821fb724c6026c3a7ff666a8c341862db
2019-08-12 13:35:49 +05:30
Ashish Kumar
78fbc21a47 sepolicy: Add permission for QtiMapperExtension version 1.1.
CRs-Fixed: 2505716
Change-Id: I61d02bcccf2069f792f2ee118fcf5dbf9a7b77ee
2019-08-08 22:25:46 -07:00
qctecmdr
170e863214 Merge "sepolicy: Remove accessing bt vendor prop and fm prop" 2019-08-08 10:02:18 -07:00
qctecmdr
5b50e33fa9 Merge "sepolicy: do not access bt vendor prop from system_server" 2019-08-08 09:43:32 -07:00
Srinu Jella
081f762184 sepolicy: Remove accessing bt vendor prop and fm prop
Remove accessing bt vendor prop and fm prop from
system app.

CRs-Fixed: 2503715
Change-Id: I44065536f313e900fa08848c3309391f3817f162
2019-08-07 22:55:44 -07:00
Nitin Shivpure
4bf9f92f56 sepolicy: do not access bt vendor prop from system_server
Do not access bt vendor prop from system_server.

Change-Id: I44065536f313e900fa08848c3309391f3817f16c
2019-08-07 00:11:05 -07:00
Veerendranath Jakkam
c80a246800 wifi: Remove system_writes_vendor_properties_violators
Remove sepolicy rules which are allowing system to modify
below vendor properties.
 - vendor_wifi_ftmd_prop
 - vendor_softap_prop

Change-Id: I3fa6c5f7fa34b37eaaa0b7c393fb256c1ed70d42
CRs-Fixed: 2503731
2019-08-06 22:49:16 -07:00
shoudil
8428651a3d sepolicy: fix gts failed issue on sdm845
Change-Id: Ia909dce485cafb525f0057aa6eb5b79ced6c2e4b
CRs-Fixed: 2479922
2019-08-06 17:08:31 +08:00
qctecmdr
73907001e9 Merge "sepolicy: rule to set kptrstrict value" 2019-08-01 23:55:59 -07:00
Jaihind Yadav
4676536dd1 sepolicy: rule to set kptrstrict value
Change-Id: I05764146d61ff2ff934888280523fa0559dd083c
2019-07-31 23:22:36 -07:00
Neeraj Soni
da0b77d045 sepolicy: remove permission for vold access to tee device
BUG: b/121350843
vold need access to tee device for disk encryption use case. This permission
can be removed as new cryptfshw hal is implemented in vendor which
will interface vold to tee device.

Change-Id: I69cba9cbd7119c2897e93c122b4946fd76773bb9
Signed-off-by: Neeraj Soni <neersoni@codeaurora.org>
2019-07-31 22:47:35 -07:00
qctecmdr
ac4425b5be Merge "Add SE policy for Bluetooth SAR HAL" 2019-07-30 16:07:25 -07:00
qctecmdr
662e886cb2 Merge "sepolicy: Rename vendor defined property" 2019-07-30 12:53:17 -07:00
Pavan Kumar M
c0341c0917 sepolicy : Add sysfs_net related path entries
Update the secontexts for sysfs_net for
sdm845/lito targets

Change-Id: I8fbd3aef8809d9d32caa80691dd2558adad73a08
CRs-Fixed: 2497802
2019-07-29 21:35:14 -07:00
Subramanian Srinivasan
04ebecedaf Add SE policy for Bluetooth SAR HAL
Add SE policy for Bluetooth SAR HAL

Change-Id: I37fd5a877ee2d05b01ac888ba194379943d2fdf7
2019-07-29 17:20:44 -07:00
Ravi Kumar Siddojigari
688fe5855a Revert "vendor: sepolicy: spdaemon: add IAR support"
This reverts commit 91cb2d7f8f.

Change-Id: Ib76df12b69e88c9601b8bf2d2dd9ba4032e54b4d
2019-07-29 04:27:02 -07:00
Pavan Kumar M
50ef9c7f89 sepolicy: Rename vendor defined property
All vendor defined properties should begin with
vendor keyword.

Change-Id: I0235d2b37ead9f015fe27075906dbf33b218173f
2019-07-29 00:22:17 -07:00
qctecmdr
de2575e96b Merge "vendor: sepolicy: spdaemon: add IAR support" 2019-07-25 13:38:37 -07:00
Amir Samuelov
91cb2d7f8f vendor: sepolicy: spdaemon: add IAR support
add read/write access to IAR-DB at /mnt/vendor/persist/iar_db
add read/write access to IAR-DB at /vendor/spunvm/iar_db
add read/write access to spss_utils at /dev/spss_utils

Change-Id: If74d48087833a8507d8f167cdd950f0ad73afbe4
2019-07-22 05:38:46 -07:00
qctecmdr
78d4d2046a Merge "sepolicy permission required for Socket in port_bridge module." 2019-07-22 05:35:32 -07:00
Chinmay Agarwal
9c95b19d57 sepolicy permission required for Socket in port_bridge module.
Given SE Policy permissions for port-bridge module to create a UNIX
socket and enable communication with clients in different modules.

Change-Id: I1d3a4fdc30847cd8ee7f7715d3249c1957a0776d
2019-07-22 14:21:49 +05:30
Indranil
d7f2bae30c sepolicy: Enable WFD HAL to access UHID driver
WFD HAL requires access to UHID driver to support HID events over
UIBC in a WFD session. Add requisite policy to grant it access.

Change-Id: If895fb2e6ee2fa4de62a2d51b0f6ed675640b83c
CRs-Fixed: 2489083
2019-07-21 22:22:34 -07:00
qctecmdr
828a1b4bbc Merge "Adding self kill capability for perf hal" 2019-07-20 02:36:23 -07:00
richagar
4c9b4e5542 Adding self kill capability for perf hal
Allow perf for self kill capability

Change-Id: I88c24af42e87112a2abeb3efe1656871cccf6751
2019-07-19 00:00:21 -07:00
Lubin Yin
a7b7e69713 sepolicy: add permissions for wfdvndservice
Allow wfdvndservice to access graphics_composer and qdisplay_service.

Change-Id: I7d4b7cb824032705f6e3c4cf192668c52672412d
2019-07-17 13:54:03 -07:00
qctecmdr
5361807541 Merge "Perf: Allow perf hal service to access appdomain files" 2019-07-09 01:10:07 -07:00
Ravi Kumar Siddojigari
40c4aa3116 sepolicy : optimization [3/3] in file_contexts
Cleanup of file_contexts which are no longer needed or optimize
the regexp which can help in betterment in bootup time.

Change-Id: I9b59f7c46290e14bb32d91219d5c2de408a240d9
2019-07-08 22:41:32 -07:00
Libo Jin
6e5939a0b8 Perf: Allow perf hal service to access appdomain files
Change-Id: Ibb772f43eb12d318c07875cb6930bc5e0c746988
CRs-Fixed:2478972
2019-07-08 01:25:19 -07:00
qctecmdr
5dc80bd4b4 Merge "sepolicy : optimization [2/3] in file_contexts" 2019-07-04 23:35:22 -07:00
Ravi Kumar Siddojigari
25a1bf7120 sepolicy : fixed sensors_vendor_data_file type error
As the defination in file.te is not matching with the
rule in sensors.te due to typo errro corrected the
name .

Change-Id: Ia5355c2d37bb4d65f8cebeec4e4a6d3996dcef65
2019-07-04 12:09:40 +05:30
Ravi Kumar Siddojigari
fc252511cb sepolicy : optimization [2/3] in file_contexts
Cleanup of file_contexts which are no longer needed or optimize
the regexp which can help in betterment in bootup time.

Change-Id: I3d95b2e9387dfc8fe4a50237c75d79d83c87fa99
2019-07-03 23:30:31 -07:00
qctecmdr
72b1329cdb Merge "Moving some Sepolicies for Boot time optimization" 2019-07-03 21:49:11 -07:00
qctecmdr
3d74cc9774 Merge "sepolicy: Allow USTA test app to access /data/sensors/scripts for legacy path." 2019-07-03 21:48:10 -07:00
qctecmdr
6aa30ba53c Merge "Fixing avc denial for vendor_mpctl_prop" 2019-07-03 21:46:38 -07:00
Sandeep Neerudu
39b6ea1f19 sepolicy-sensors:allow access to vendor_data_file for On Device Logging
Change-Id: I85a31c39c82df7a33e632267a90ebfc38982b5d4
2019-07-02 02:43:20 -07:00
qctecmdr
c39f08374c Merge "Added selinux rule for hal_perf" 2019-07-01 15:13:20 -07:00
qctecmdr
7093215131 Merge "sepolicy: Revert FIDO session file location" 2019-06-28 00:01:35 -07:00
Vivek Arugula
c3013804e9 sepolicy: Allow USTA test app to access /data/sensors/scripts for legacy path.
Change-Id: I2526ac36b4b1f55b2aa11bb34350ef14ba306290
2019-06-28 12:13:03 +05:30
Indranil
27b6cae070 sepolicy: wifidisplayhalservice: Add permission for proc_audiod
-- wifidisplayhalservice needs permission to read soundcard status

Change-Id: Ie305549e2fcab7a96777eb65dee9dbd295a307ce
2019-06-27 13:37:32 +05:30
Sachin Grover
96c43ee563 Moving some Sepolicies for Boot time optimization
Move sysfs wilcard entries to genfs context for boot
time optimization.

Change-Id: I61386c1e55ea469af3c608da76406e1177a69e66
Signed-off-by: Sachin Grover <sgrover@codeaurora.org>
2019-06-26 18:59:01 +05:30
Lior David
9fba5e1409 sepolicy: fix rule for wigig socket location
The change "sepolicy: update legacy rules for wigig sockets"
contained an incorrect update for vendor_wpa_wlan socket
which caused WIFI start failure. Fix this rule.

Change-Id: I6890fd27f28baabe6177c468b54f81bfd12d39b4
2019-06-26 14:39:50 +03:00
Li Sun
3e81ad4d3f sepolicy: allow mediacodec to access configstore
Allow mediacodec to access configstore

Change-Id: I33e6c7cff1a1f609b4bb03d036e881fccc83e2db
2019-06-25 21:59:08 -07:00
richagar
a9ddc89ab2 Added selinux rule for hal_perf
Added permissions for hal_perf
in domain.te in legacy and qva

Change-Id: I6006587266735c9f0b8cc3e694c8b08ac2bec064
2019-06-25 15:43:29 +05:30
richagar
648f11e757 Fixing avc denial for vendor_mpctl_prop
Adding permission for platform_app to
access vendor_mpctl_prop

Change-Id: Ifd9b6a3a9f20eec7f4681e233a5d90001cf4eaa9
2019-06-24 09:43:34 +05:30
Lior David
a4c86f9f78 sepolicy: update legacy rules for wigig sockets
wigig sockets moved into their own directory under
/dev/socket/wigig, but the location was not updated
in the legacy rules.

Change-Id: I443bd2d35698a3ab9d81a17ebe9813bbad1b70c2
2019-06-21 01:13:27 +03:00
qctecmdr
f36c5f61f1 Merge "sepolicy: Add properties to fix wfd denials" 2019-06-20 08:41:32 -07:00
qctecmdr
3db39e369d Merge "sepolicy: Modify the path in sysfs rule" 2019-06-20 06:25:15 -07:00
Pavan Kumar M
76e95132fd sepolicy: Modify the path in sysfs rule
Modify the path in sysfs rule for msmnile.
Add the corresponding net sysfs rule for sdm710.

Change-Id: Ibd299806e4a0edf91ff071774064e19a2135bbbd
CRs-Fixed: 2473945
2019-06-20 03:02:21 -07:00
Balakrishna Godavarthi
bc07bc1014 Add sepolicy for BT lazyhal property
This patch adds lazyhal property to bluetooth_prop
and allows bluetooth application to access the property.

Change-Id: I1803488eaced69116ba07f219f7dc22b7ee1d1ca
2019-06-19 22:56:02 -07:00
qctecmdr
180704bb4e Merge "sepolicy: Add capabilityconfigstore support for legacy targets." 2019-06-19 04:30:11 -07:00
qctecmdr
7c32d91780 Merge "sepolicy : moving dumpstate permission to normal builds ." 2019-06-19 01:12:18 -07:00
qctecmdr
cc70fbee28 Merge "sepolicy: Add access policy for charger files" 2019-06-18 22:45:20 -07:00
Ravi Kumar Siddojigari
626a7aca87 sepolicy : moving dumpstate permission to normal builds .
As the testcase is expected to pass in even userbuild .
Moving the rule out of test folder .

Change-Id: I0cab3ac99d99b417b159a6229e61e3a4fc492497
2019-06-19 11:11:08 +05:30
Mahantesh Sanakall
a8916de8f7 sepolicy: Add capabilityconfigstore support for legacy targets.
1. Define domain for capabilityconfigstore
2. Add type for /data/vendor/configstore folder
3. Allow capabilityconfigstore HIDL Server access/r/w it

Change-Id: I2781d93f02fc4673d935d6b764f53a9f45868256
2019-06-18 09:57:24 -07:00
Trudy Shearer
b37e569182 sepolicy: Revert FIDO session file location
Reverting the FIDO session file location accessed via QTEEConnector
to match previous version for backward compatibility

Change-Id: I7701088159977747be8002a4381fd8afdc8b268f
2019-06-18 13:04:41 +05:30
Manu Prasad
b022740e5a sepolicy: Add properties to fix wfd denials
-- Add properties to enable wfd dumping
-- Allow to access logmask file in /data/vendor
-- Allow source to access video SKU and UBWC property

Change-Id: I7688f1e9dde493c9542d213ba87d2efc8dcb37d3
2019-06-16 23:31:35 -07:00
Vinay Gannevaram
8980acb821 sepolicy: Add location and wifihal rules for legacy devices
Add socket communication sepolicy rules for location and wifihal.
lowiserver would interact with wifihal for nl communication.

CRs-Fixed: 2467101
Change-Id: Iff7e5f50858c95ad86ff34e5f5333bd9304aec4e
2019-06-14 04:04:14 -07:00
Kavya Nunna
362458c219 sepolicy: Add access policy for charger files
Add charger.te file and add policy for charger script
to access charger devices.

while at it add sepolicy rules for hvdcp_opti.

Change-Id: Ib14d5baad3415e3044732177c73b3e64d4f8fdc4
2019-06-13 11:50:57 +05:30
qctecmdr
38ea1e979b Merge "sepolicy: Add rules to enable non-A/B dynamic partitions" 2019-06-12 10:59:51 -07:00
qctecmdr
f82a9615fa Merge "sepolicy: Add support for fastbootd to flash dynamic partitions" 2019-06-12 07:50:38 -07:00
Mahantesh Sanakall
ef4cce3990 sepolicy: Add rules to enable non-A/B dynamic partitions
Change-Id: Icb6e99cf07a1105bb3f2f4311825617c58b8e699
2019-06-12 04:17:35 -07:00
Anuj Singhal
bad42f8098 sepolicy: Add support for fastbootd to flash dynamic partitions
Sepolicy changes needed for dynamic partition support for legacy
targets : SDM845 and SDM710
- Add rules to enable fastbootd mode flashing of dynamic partition
- Define labels for super, recovery and vbmeta_system partitions
- Allow update_engine to access recovery partition for OTA

Change-Id: I6f692da6ab687529833a87b6feb375fda26508b8
2019-06-12 15:04:58 +05:30
Rajavenu Kyatham
23a0ea8f24 sepolicy: Add permissions for composer service
- composer service is required for communication b/w
  SF and HWC. 

Change-Id: I52652d309363b3f0f7b963d615688ce3e11c6fef
CRs-Fixed: 2466343
2019-06-12 12:20:03 +05:30
qctecmdr
b362bed0fa Merge "Sepolicy: Add permissions to set vendor boot mode prop for Factory HIDL" 2019-06-11 06:52:29 -07:00
Huang Li
b3e35668d2 Sepolicy: Add permissions to set vendor boot mode prop for Factory HIDL
Allow permissions for Factory HIDL to set vendor.sys.boot_mode prop.

Change-Id: Ifa5edbb01d5f859225ccb440ec367c222b8eebf4
CRs-Fixed: 2450631
2019-06-11 18:29:07 +08:00
qctecmdr
deb6cc1f72 Merge "sepolicy: allow gnss hal to access health hal" 2019-06-10 12:14:36 -07:00
qctecmdr
11d1a57ae3 Merge "sepolicy: Add permissions for composer service" 2019-06-10 06:30:18 -07:00
Rajavenu Kyatham
e3f33989ec sepolicy: Add permissions for composer service
CRs-Fixed: 2466343
Change-Id: I5a66822c1c8b46093cd62eb08aa1ff48b1c658b7
2019-06-10 04:12:38 -07:00
qctecmdr
dca379a39e Merge "sepolicy: provide rules for cryptfs_hw hal" 2019-06-10 04:08:18 -07:00
Nitin Shivpure
ebc9ef5c11 sepolicy: allow bluetooth hal to access persist/bluetooth data
allow bluetooth hal to access(read, write, create) persist bluetooth
data.

Change-Id: Idee1f22f12c9852532325577efd534a731985d45
2019-06-10 12:52:52 +05:30
Neeraj Soni
66bb7bb387 sepolicy: provide rules for cryptfs_hw hal
BUG: b/121350843
vold need to communicate with tee device node to set crypto
engine keys for userdata encryption. cryptfs_hw hal is
implemented to facilitate this commuincation.

Change-Id: Ie1d02b211e1f6e147092710008b363795df5e0a6
Signed-off-by: Neeraj Soni <neersoni@codeaurora.org>
2019-06-09 12:41:46 +05:30
qctecmdr
345bdfcd92 Merge "sepolicy: add sysfs paths for mhi timesync feature support" 2019-06-08 12:37:14 -07:00
Harikrishnan Hariharan
ee24695856 sepolicy: allow gnss hal to access health hal
Add rule for gnss hal to listen battery status for legacy
devices upgrade.

Change-Id: Ia251c3446b7f7861bb920fe635229d8e2e90c824
CRs-Fixed: 2467115
2019-06-06 19:11:12 +05:30
Mohit Aggarwal
938a52c749 sepolicy: allow time-services to access perf hal
Allow time-services to access perf hal

Change-Id: Iaca0b6e47b63aeccdf5e5faa3628a0cc53017be0
2019-06-06 10:42:17 +05:30
Sujeev Dias
10553605a6 sepolicy: add sysfs paths for mhi timesync feature support
Add sysfs path for mhi timesync feature files to be read from
userspace applications/services.

CRs-Fixed: 2426302
Change-Id: Ib28800e000774d8ce27dd9a78db9efd6ebdbdb00
2019-06-04 17:47:19 -07:00
qctecmdr
8da456b050 Merge "sepolicy : addressed dumpstate related denials." 2019-06-04 11:20:55 -07:00
qctecmdr
878819b0d9 Merge "sepolicy: Read vendor_pd_locater_dbg_prop in GNSS HIDL for legacy" 2019-06-04 05:44:15 -07:00
qctecmdr
697281bf7f Merge "sepolicy: Add rule for audioserver to find audio_service" 2019-06-04 00:19:32 -07:00
Harikrishnan Hariharan
90d39e829c sepolicy: Read vendor_pd_locater_dbg_prop in GNSS HIDL for legacy
Add rule to read vendor_pd_locater_dbg_prop in GNSS HIDL for legacy
devices

Change-Id: If7cc23dcf06278877c16f9d964b272ff08c24825
CRs-Fixed: 2464884
2019-06-03 22:52:26 +05:30
Ravi Kumar Siddojigari
9767ee2638 sepolicy : addressed dumpstate related denials.
As part of CTS testing its expected no denails should be seen
from dumpstate domain during testing so addressing generic
permission issue.

test :testNoBugreportDenials

Change-Id: Ic60a49e6330c42aa99280af8e6913af140e981e5
2019-06-03 18:21:39 +05:30
Ravi Kumar Siddojigari
a0e764c972 sepolicy : bt services domains aligned with prebuilds version 29.0
Change-Id: I095c5294daf29da389c2da16f03c6bb1508d6be6
2019-06-03 16:30:32 +05:30
Ramjee Singh
cafb67c1ca sepolicy: Add rule for audioserver to find audio_service
Add rule for audioserver to find audio_service for AAudio usecase

Change-Id: I1cd1b621b362124a338973aaeff6341e6862418d
2019-06-03 14:40:57 +05:30
Nitin Shivpure
3f4efd7619 sepolicy: allow bluetooth to access perf hal
allow bluetooth to access perf hal

Change-Id: Ibe71b00b71b010c8032a563638debea7990067b6
2019-05-31 03:00:48 -07:00
qctecmdr
aa536e05d4 Merge "sepolicy: Adding permissions for nfc" 2019-05-29 16:35:06 -07:00
Padmanabhan Komanduru
00ddb37c5f sepolicy: permit graphics hwcomposer to read kgsl sysfs nodes
Permit graphics hwcomposer to access kgsl sysfs node to get
the value of maximum GPU clock supported.

Change-Id: Idc3966029364436cbca445a9bc704ee2a2caf874
2019-05-29 14:02:15 +05:30
qctecmdr
cc5fa63528 Merge "sepolicy : clean-up of netd_socket usage." 2019-05-28 00:46:25 -07:00
Ravi Kumar Siddojigari
4cb4eee99e sepolicy : clean-up of netd_socket usage.
As public defination of netd_scoket is removed removing all the
references to this.

Change-Id: I752d1d546d5d6e76dc4e43fc3d4a90b0aca077c8
2019-05-28 11:47:01 +05:30
qctecmdr
bd64e5e5d2 Merge "sepolicy: add device sepolicy rule for NNHAL-1.2v" 2019-05-27 22:34:05 -07:00
Devi Sandeep Endluri V V
6a63afe092 sepolicy: add rules for imshelper_app
Add rules to allow imshelper_app to search
radio_data_file

Change-Id: I1184833d2cde889292aa4cf205e748cecb23ae3c
2019-05-27 00:37:30 -07:00
Tharaga Balachandran
3dd3609333 sepolicy: Add policies for mapper and allocator
CRs-Fixed: 2451972
Change-Id: I3415b9672066bdbd6726fcd32b165980b0c7eeca
2019-05-24 11:53:40 -07:00
Vishawa Raj Singh
26e7f29bdf sepolicy: add device sepolicy rule for NNHAL-1.2v
Updated rules for legacy targets from generic targets

Change-Id: I1128703a8303d5359c3a28329a7f3c3f091d9d44
2019-05-24 16:50:43 +05:30
richagar
5c0dd72f17 sepolicy: Adding permissions for nfc
Adding perf hal permissions to nfc.te
for legacy and qva

Change-Id: Ic62e0cff34fb7af1778239c1d436a3a25c0cfc01
2019-05-22 12:21:29 +05:30
qctecmdr
04c14f1d19 Merge "Sepolicy: Add selinux permission for QtiMapper interface." 2019-05-21 09:36:08 -07:00
Ashish Kumar
47a514ed91 Sepolicy: Add selinux permission for QtiMapper interface.
CRs-Fixed: 2451646
Change-Id: Ic909d367ac4bec149451b1fb68b400f27c62491f
2019-05-21 13:57:17 +05:30
qctecmdr
8844b19e03 Merge "sepolicy: Add persist file access rules for USTA test App" 2019-05-21 00:17:27 -07:00
qctecmdr
d2cb04b0d9 Merge "sepolicy: Add permission to access min_level_change node for hdcp" 2019-05-16 03:41:20 -07:00
Sandeep Neerudu
01daaa8332 sepolicy: Add persist file access rules for USTA test App
Change-Id: I1ea7b7bd2a77dc37021fc3312ca04e25eeff06a9
2019-05-15 06:35:49 -07:00
qctecmdr
0e7f78678e Merge "Camera: Add permission to access camera library for passthrough hidl" 2019-05-14 23:10:42 -07:00
Ravikanth Tuniki
0c661ba66a sepolicy: Add permission to access min_level_change node for hdcp
CRs-Fixed: 2449926
Change-Id: Ia5e79827f17adf7924da1eac99e2ece892ba07ab
2019-05-14 16:44:12 +05:30
Manu Prasad
c62f59a643 sepolicy: Adding rules for WFD secure sink on legacy targets
Change-Id: I6fb86150d4d11bb656bdf7d1477bc8ce337bc29c
2019-05-14 01:23:13 -07:00
qctecmdr
f8546824b2 Merge "sepolicy: Define security context for "ro.build.software.version"" 2019-05-09 10:01:31 -07:00
qctecmdr
bd80cd6bfa Merge "sepolicy : addressed dumpstate related denials." 2019-05-09 08:15:09 -07:00
Devi Sandeep Endluri V V
ec15b57f88 sepolicy: Define security context for "ro.build.software.version"
All vendor init process would have access to vendor_default_prop.
Define security context for "ro.build.software.version" as
vendor_default_prop.

Change-Id: I5b1f1698dcbb3d914a66c540f31f7624c707a72e
2019-05-09 04:12:47 -07:00
Pavan Kumar M
58d519cbcc Add permission to set/get persist.vendor.net.doxlat
- Add permission for rild to set and get the property
  persist.vendor.net.doxlat

- Revoke set_prop permission to system_server.

- Define domain for DataConnection HAL

Change-Id: I143bfffa8af61d087d8210516c57a211e25f0a1d
CRs-Fixed: 2425156
2019-05-07 21:06:28 -07:00
Ravi Kumar Siddojigari
432d4af4c9 sepolicy : addressed dumpstate related denials.
As part of CTS testing its expected no denails should be seen
from dumpstate domain during testing so addressing generic
permission issue.

test :testNoBugreportDenials

Change-Id: I27178e6b4180d53cd5f6574bf71fe54819b10454
2019-05-07 00:37:11 -07:00
qctecmdr
518a386347 Merge "sepolicy: Add required sepolicy for vulkan.adreno.so" 2019-05-06 11:25:08 -07:00
qctecmdr
a82887e992 Merge "sepolicy: Add interface entry for WFD HAL" 2019-05-05 21:42:15 -07:00
qctecmdr
ec7072156a Merge "sepolicy: allow mediacodec to access audio devices" 2019-05-04 21:04:12 -07:00
Rama Krishna Nunna
bc8a16ed8b Camera: Add permission to access camera library for passthrough hidl
- Gralloc needs to access Camera library
- Adding necessary permissions

Change-Id: Id1d1740dd10fcc4ca393f909348297ac13beba39
2019-05-03 16:25:45 -07:00
Jaihind Yadav
5955fb1335 sepolicy : remove sysfs_net related entries which are duplicate
Following paths on sysfs are now labeled in system side
file_contexts  so removing the duplicate entries from
vendor side genfs_contexts .

/module/tcp_cubic/parameters
/devices/virtual/net
Change-Id: I4c872ca3e14da9a73b1adbfd9671c3df1a0046c8
2019-05-02 14:39:44 +05:30
Ramjee Singh
5bd9b9abe0 sepolicy: allow mediacodec to access audio devices
Mediacodec needs to access audio devices to use OMX HW decoders and
encoders. Allow mediacodec to access audio devices.

Change-Id: I6706f989d8e90607bd3134a88268322451122b15
2019-04-30 05:11:50 -07:00
Indranil
f3baa43a0d sepolicy: Add interface entry for WFD HAL
Change-Id: I3c52c6f7c5de4ea2d324012ce08bbe9a0c2d6d84
2019-04-29 19:13:29 +05:30
Harshdeep Dhatt
7c60ce7a95 sepolicy: Add required sepolicy for vulkan.adreno.so
CRs-Fixed: 2442489

Change-Id: I9ab11f0ae7df7f03cdb6cc2a8709d7a090299237
2019-04-26 14:39:51 -06:00
qctecmdr
3233102de8 Merge "Sepolicy: Update sepolicy ops listener" 2019-04-26 10:40:04 -07:00
qctecmdr
518f0034fa Merge "sepolicy: Remove gralloc.qcom from SP HALs." 2019-04-24 06:55:21 -07:00
Tirupathi Reddy
46320b773d sepolicy : correct AndroidNN binary details
Change-Id: I4b565ce9b28fe7e83cd6b678616490e7ec351272
2019-04-21 23:10:43 -07:00
Phalguni
43411c2675 Sepolicy: Update sepolicy ops listener
Add read and write permissions for graphics device
CRs-Fixed: 2438059

Change-Id: Ide4f6c936512956f68a2de1e672c28a9d3f4435b
2019-04-19 10:44:48 -07:00
qctecmdr
75ca001e60 Merge "sepolicy: Policy fix for emmc based rpmb partition" 2019-04-17 15:10:35 -07:00
qctecmdr
e5544a4709 Merge "sepolicy: add sepolicy support for btconfigstore" 2019-04-17 11:10:31 -07:00
Srinu Jella
5ef06bbb32 sepolicy: Label new a2dp service as audio hw service
- Label the new a2dp HAL service as Audio he service
  so that Audio HAL process can load it and bluetooth
  host process can interact with new service.

Change-Id: If7a4c5f9dcf33edbef5647107cae4cfdf847c63f
2019-04-17 16:29:11 +05:30
Ramakant Singh
bd4ac11e91 sepolicy: Remove gralloc.qcom from SP HALs.
Change-Id: I31fed11610325293527928e54d82084a62b86343
2019-04-17 01:03:33 -07:00
Anmolpreet Kaur
f0ab1bd034 sepolicy: Policy fix for emmc based rpmb partition
Latest sepolicy rules in android Q enforce ioctl
restrictions on blk_file. This change adds sepolicy
rules to allow qseecom daemon process to perform ioctl
calls to rpmb partition in case of emmc based targets.

Change-Id: I884dbe35b5233eac195cfcfdaa73b359b671955d
Signed-off-by: Anmolpreet Kaur <anmolpre@codeaurora.org>
2019-04-16 21:52:06 -07:00
Nitin Shivpure
82ee6af929 sepolicy: add sepolicy support for btconfigstore
- Add separate hal_btconfigstore_hwservice
- Initialize server and client for hal_btconfigstore.
- Make system_app to be a client of hal_btconfigstore for FM.
- Make Bluetooth to be a client of hal_btconfigstore.

Change-Id: I680bcdb79836fbba22140f9e4bcfadeb7a70ed59
2019-04-16 21:40:17 -07:00
qctecmdr
d605348b04 Merge "Adding perf hal permissions to iop hal" 2019-04-15 22:58:59 -07:00
qctecmdr
a946e1c166 Merge "sepolicy: Adding sepolicy for lmkd." 2019-04-12 01:05:13 -07:00
qctecmdr
13f06ea405 Merge "sepolicy: Cleanup legacy redefinitions from wfd" 2019-04-10 11:37:44 -07:00
richagar
294b8479ae Adding perf hal permissions to iop hal
Added hal_client_domain(hal_iop_default, hal_perf)
to hal_iop_default.te

Change-Id: I5266702086a2d8b40eb91ca5c487cce9893bd312
2019-04-09 17:51:01 +05:30
richagar
16da6b2ff8 sepolicy: Adding sepolicy for lmkd.
Added lmkd.te and hwservicemanager.te

Change-Id: Ie63202497c3542d6b534aa654db22e3c71427c4c
2019-04-09 16:54:04 +05:30
Manu Prasad
241f3766f0 sepolicy: Cleanup legacy redefinitions from wfd
Change-Id: If0f1a2d61d86b507cc6ab94fc0f961bed645cc91
2019-04-09 00:27:03 -07:00
Manu Prasad
3089da6c10 sepolicy: Change policy for wfd on legacy targets
WFD requires revision in its SEAndroid policies due
to an OS upgrade and design re-architecture to conform
to system-wide mandates.

Change-Id: I5a9adc280cefab73d8c467379b74951fc3a88e71
2019-04-09 00:26:54 -07:00
padarshr
1efa2458e3 Label the scsi_generic sysfs node and give it's read access to bootctl.
Bootctl needs read access to scsi_generic node to lookup what
/dev/sgN device corresponds to the XBL partitions.
Label it and give read access to bootctl.

Change-Id: I91d54ba05dd3d5fe34296e3911537ed57e51a067
2019-04-04 05:22:29 -07:00
qctecmdr
ad64c58cab Merge "Allow system_server to access /sys/kernel/debug/binder/state" 2019-04-03 21:47:42 -07:00
qctecmdr
6e5e970f33 Merge "Sepolicy: Update sepolicy ops listener" 2019-04-03 15:55:59 -07:00
Lior David
ae8b742840 sepolicy: add wigig and FST rules
This is a cumulative patch which adds rules needed
for wigig and FST, including cleanup of rules that
are no longer needed, and adjustments for new sepolicy
restrictions.

Based on these changes:
1) sepolicy: Add policies for FST manager service

Add SE policies for FST Manager daemon required for
fast-session-transfer feature.

Change-Id: I3750d298c33e9f70e51545a678502b6d7dd0b0e6

2) sepolicy: allow fstman write permissions to wifi directory

FST Manager needs write permissions to wifi directory for supporting
whitelist of rate upgrate interface (wlan1)

Change-Id: I564e7da6118e17f7487242c55b0373dab8d12578

3) sepolicy: support wigig services

For managing the wigig network, define wigig services as
system service and allow access to wpa_wigig0 control socket.

wigig supplicant creates sockets under /data/misc/wifi/wigig_sockets.

CRs-Fixed: 997409
Change-Id: I8113892b7fdbf1a4f7dd4b9c7cf490264952fe69

4) sepolicy: Update policies for FST

Recent android changes removed permission for
systemserver and netd to read system properties.

Added such support as it is needed for fst feature

Change-Id: I045b7115f9a6ba5c03f7f8e510a29e847a534686
CRs-Fixed: 1028134

5) sepolicy: support wigig services and fast session transfer

Add rules for allowing wigig framework and FST to work.
Includes:
- communication between wigig framework and wigig HAL service
- permissions for wigig HAL service
- file/socket permissions for fstman daemon
- permissions for WIFI framework to operate FST.

Change-Id: Ibf0970aa0f06fac1dab4d8a2b31a9f0fc4ab3a6e

6) sepolicy: support FST in SoftAP mode

Add rules needed for supporting FST in SoftAP mode:
- Extend the wifi_vendor_hostapd_socket file definition to include
  the hostapd global socket.
- Allow hostapd to send messages back to fstman event socket
- Allow fstman to communicate with hostapd global socket.

Change-Id: Ifbf38e24ff9e0834ef3f3dd8cf70d4e5ce1af4d1

7) sepolicy: add rules for wigig network performance tuner(npt)

Add rules needed to support the wigig network performance tuner.
The npt is a standalone service which provides the ability to
tune network stack parameters. It can accumulate tuning requests
from multiple clients and merge requests.
The npt provides an hwbinder service used by wigig framework
(hosted inside system_server).
The npt also listens on a unix socket, this is used by vendor
components for backward compatibility with previous implementation.

Change-Id: Iaabb4c13519c14b0e79631c7eaed7e53a1076063

8) sepolicy: add permissions to access wigig's snr_thresh sysfs

Part of FST functionality, fstman needs to access snr_thresh sysfs.

Change-Id: Ie10778c0c4b874b2ea8467f2deac26ae7d776bdc

9) sepolicy: fix hostapd rules for FST

FST was broken by commit 3e2b4523e6
("sepolicy: Adding rule for cnd"). Object was changed from
wifi_vendor_wpa_socket to wpa_socket. However wifi_vendor_wpa_socket
provides access to /data/vendor/wifi/sockets where wpa_socket
provides access to /data/misc/wifi/sockets.

Change-Id: Ia70999c3aedc4e073bfcc2ac72bde83d5b521aa4

10) sepolicy: move definitions of wigig services

Move the definitions of wigig services from common
to private, otherwise they do not work in newer version
of Android.

Change-Id: Ia4d0770314706b97ee0fea8f36fe920f0d7103cf

11) sepolicy: remove duplicate definitions of wigig and wigigp2p

wigig and wigigp2p service definitions were duplicated in
common/service_contexts and private/service_contexts,
it caused problems with OTA build.

Change-Id: Ifaeb9ffdf65be44de3ef8d15c323e436b5e04d9f

12) sepolicy: add rules for on-demand insmod/rmmod of wigig driver

Add rules to allow wigig HAL service to insmod/rmmod the wigig module,
similar to the WIFI HAL. This is needed because the wigig chip
leaks power while wigig driver is loaded, so the driver must be
unloaded when wigig framework is disabled.

Change-Id: Id96f50020b3e7028b2c6bdd319383879565087c6

13) sepolicy: fixes for wigig SoftAP (hostapd)

Added some fixes to get wigig SoftAP working.
In recent version of Android hostapd now has its own HAL domain.
Update hostapd rules to refer to this new domain.

Also, there are few small updates to refer to proper types for
vendor files and sockets.

Change-Id: If53a3674312f5a008984eb7ff2aa6026dcdf0af7

14) sepolicy: FST fixes

1. Restore access to hostapd global socket from fstman.
2. fstman now generates its configuration (fstman.ini) based
on system properties, so it needs read access to these.
3. wpa_supplicant global socket moved to vendor_wpa_wlan0,
so fstman (and other vendor services) can access it.

Change-Id: I099d7f3b187989c26666b93288b1693f5db20bec

15) sepolicy: allow platform_app to read wigig properties

WigigSettings application needs to read wigig system property.

Change-Id: Ic5e28b454bfa261b4cbd91dc76b7e2267e1acb74

16) sepolicy: fix wigignpt access to network parameters

Add rule to fix problem with accessing sysfs network
parameters on recent android versions.
Based on this audit log:
avc: denied { search } for pid=1024 comm="wigignpt" name="net" dev="sysfs" ino=41025 scontext=u:r:wigignpt:s0 tcontext=u:object_r:sysfs_net:s0 tclass=dir permissive=0

CRs-Fixed: 2217480
Change-Id: Ifdb8b794a4a310c1548743cc19df77d7eb0d302b

Change-Id: I0c847447acf3ffd7903a62e0139e69308dca851f
2019-04-03 01:43:17 +03:00
qctecmdr
8dcdfe73fa Merge "sepolicy: Add gralloc.qcom to SP HALs" 2019-04-01 22:34:01 -07:00
qctecmdr
72050af051 Merge "Sepolicy: Adding SEpolicy for IOP" 2019-04-01 15:30:03 -07:00
Archit Srivastava
e24e97f45d sepolicy: Add gralloc.qcom to SP HALs
Change-Id: I0d2358e142f9b6fba2f0efeb520734f5097aeed8
2019-04-01 13:55:44 +05:30
Shibin George
cb03ca6211 Allow system_server to access /sys/kernel/debug/binder/state
For debugging watchdog issues in system_server, system_server
needs read access to binder-state file. Access to generic debugfs has
been removed for all processes except init, vendor_init & dumpstate.
This CL labels /sys/kernel/debug/binder/state file and allows
system_server, dumpstate, vendor_init & init, 'r_file_perms' access
to the same file.
The label and the associated access permissions only apply to
userdebug builds.

Change-Id: I159e39bcd05d699454797f8b1d1c17c810c99cb1
2019-04-01 00:41:08 -07:00
Indranil
d3f758d9ad sepolicy: Add hal entries for ML HW service
ML HW service has 3 hal registered, add all of them in
hwservice_context

Change-Id: I10e47a41a323be6346ad658965cd6ad632a0f8aa
2019-03-28 14:19:55 +05:30
Phalguni
ea7825dd44 Sepolicy: Update sepolicy ops listener
Add read and write permissions for graphics device

Change-Id: I86c22daaa99bf77f4dc633a09de8cab4fcd8169e
2019-03-27 17:08:42 -07:00
Karthik Gopalan
dd6d8b9ac1 Sepolicy: Adding SEpolicy for IOP
Adding SEPolicy for IOP.

CRs-Fixed: 2419687

Change-Id: Ia3f53f4aeaaa2cb12bb534ef3bd51daa60ed3d95
2019-03-27 15:12:59 +05:30
Devi Sandeep Endluri V V
ab7b116bc4 sepolicy: Add rule for CneApp to communicate with CND
Add missing rules for CneApp and CND communication in
legacy folder.

Change-Id: I245e605e4ccc751311434e7ecfd775c8973c0b18
CRs-fixed: 2419820
2019-03-25 20:28:32 -07:00
Bhuvan Varshney
43b76fa247 sepolicy: legacy: Enable NFC HIDL 1.2 service
NFC HIDL 1.2 service is required to be
invoked from the boot.

Added entry for HIDL 1.2 service.

Change-Id: I5210f78c95f47365c56d7c4e05b06432a67b6921
2019-03-25 01:49:03 -07:00
qctecmdr Service
b71d77714c Merge "sepolicy: Add permissions for fingerprint" 2019-03-23 13:39:53 -07:00
qctecmdr Service
4a5e015318 Merge "Sepolicy-QTI/ADPL: Created a file context for sockets" 2019-03-23 10:32:08 -07:00
qctecmdr Service
f511cb0989 Merge "sepolicy: add rules for jank killer feature" 2019-03-23 06:00:02 -07:00
qctecmdr Service
3f428a034a Merge "sepolicy: Allow vendor init to set target sku version" 2019-03-23 02:57:05 -07:00
Ravi Kumar Siddojigari
33913c473f sepolicy : restore vold access to tee_device node .
We need to remove coredomains access to tee_device but as seeing
issue we are restoring this for vold for now.

Change-Id: Ia5599051f75b456a462088e83741a8a975d99056
2019-03-22 20:15:38 +05:30
Aman Gupta
03e1a2c4b4 Sepolicy-QTI/ADPL: Created a file context for sockets
Created a file context for sockets files

Change-Id: I6eed60942b74f12a71ade6d2f410e02064dc50c7
2019-03-22 03:07:47 -07:00
Karthik Gopalan
6739038499 sepolicy: add rules for jank killer feature
Allow sf to access kgsl sysnode.

CRs-Fixed: 2418823

Change-Id: I4c6c8f5906f85e33f5f1e2de6ed8ca28ec3e2588
2019-03-21 22:43:14 -07:00
qctecmdr Service
729ade1807 Merge "perf: Sepolicies to fix perflock functionalities" 2019-03-21 02:37:21 -07:00
Ravi Kumar Siddojigari
5f36c08ca0 sepolicy : remove coredomains access to tee_device
As part of security hardening  coredomains access
to tee_device need  to be  removed.

Change-Id: Id6e5af8fed25d6c8e2a38d5f9c36e86d20534fce
2019-03-20 14:24:23 +05:30
Karthik Gopalan
c0eb4d4fb3 perf: Sepolicies to fix perflock functionalities
1. Allow perf-hal to create and read/write values
into default_values file which is created in
/data/vendor/perfd.

2. Allow perf-hal to read /sys/class/devfreq
directory and fetch values from the files.

CRs-Fixed: 2417754

Change-Id: I7a4494e95ff9cd57a295c76c53f4afb90570cc4d
2019-03-18 18:50:39 +05:30
Abir Ghosh
c340ac354d sepolicy: Add permissions for fingerprint
Add selinux permissions for qfp-daemon and
qbt driver. Allow system app to access
fingerprint HAL.

Change-Id: I5106501475f8071fd272700a094cb9e33cfdbc50
2019-03-18 15:38:46 +05:30
Uma Mehta
92bcb31e29 sepolicy: Allow vendor init to set target sku version
- Add permission for vendor init to set target version
  based on soc id

CRs-Fixed: 2412391

Change-Id: I5aa548088a5b74f63052335027f6e04e64af4fd7
2019-03-18 02:43:27 -07:00
qctecmdr Service
4172afb708 Merge "Sepolicy: Add legacy sepolicy rule for BT" 2019-03-14 20:09:06 -07:00
Jaihind Yadav
2ef38c5590 sepolicy: removing vendor_carrier_file access.
Due to new restriction we have to remove access for idmap and system server.
Change-Id: I8c78c32812e2a16b01e82d997d1f80510515b1b9
2019-03-13 18:56:15 +05:30
Nitin Shivpure
c062eb63f9 Sepolicy: Add legacy sepolicy rule for BT
- Remove vendor_bluetooth_prop rule for unused wcnss_filter
  & hal_audio
- Add persist.vendor.qcom.bluetooth. &
  vendor.qcom.bluetooth. into vendor_bluetooth_prop context.
- Add SE policy for BT configstore.
- set vendor BT properties from vendor_init.

Change-Id: I9bb5277554363f981c7a639dc00c93b609423acb
2019-03-12 18:55:23 -07:00
Uma Mehta
e339640d50 sepolicy: Add video properties set and get permissions
CRs-Fixed: 2412391

Change-Id: Ic0838c1144b1bdd5f4ed8b2655cd1502b5796eb9
2019-03-11 04:28:43 -07:00
Jaihind Yadav
82218a9737 sepolicy: corrected firmware_file file type association
As we no longer us firmware mount on root/system  we are
    de-associating  system_file_type form it .

Change-Id: Icc57733457145d01cc9901bc74b85a161101fa75
2019-03-10 21:59:14 +05:30
Jaihind Yadav
eba0bd917b sepolicy: corrected firmware_file file type association
As we no longer us firmware mount on root/system  we are
de-associating  system_file_type form it .
Change-Id: If2a8153436f4ffaa5e5539c09df184a7b9e5fbb8
2019-03-08 04:54:08 -08:00
himta ram
1b6976b1a6 sepolicy: add sepolicy support for fm
intialize server and client for hal_fm.

Change-Id: If63714283194baaac950a7426b95f17ee110eb4f
2019-03-07 23:51:26 -08:00
qctecmdr Service
e05c363bf0 Merge "sepolicy : cleanup rule accessing to "sysfs"" 2019-03-07 10:27:32 -08:00
qctecmdr Service
1bcf4ab545 Merge "sepolicy : remove mdtpdaemon and mdtpservice_app references" 2019-03-07 05:58:13 -08:00
Ravi Kumar Siddojigari
880a69cd42 sepolicy : cleanup rule accessing to "sysfs"
As part of security hardening access to sysfs label related
sepolicy rules should be removed.
So cleaning all the  directory  reads  and   sysfs:file access
which were seen in the following .
  hal_bootctl
  hal_gnss_qti
  hal_pasrmanager
  pd_services
  ssr_diag
  ssr_setup
  thermal-engine
  qmuxd
  sensors
  hal_perf_default

Change-Id: I51e98a3f68211357e2bb1455f28a96fc3aad4d88
2019-03-07 18:24:30 +05:30
Ravi Kumar Siddojigari
8c4e003c61 sepolicy : remove mdtpdaemon and mdtpservice_app references
As mdtpdaemon and mdtpservice_app are no longer used removing
services and related sepolicy.

Change-Id: I0307929acb5bfadbf3cca37396281b45dc995016
2019-03-07 03:31:19 -08:00
Ravi Kumar Siddojigari
111e4e1a76 sepolicy : remove rfs_access to /system/rfs files .
As part of treble vendor process is not allowed to access
system_files.

Change-Id: I6955beaac67def598bd7a5055e2479b9a1727b58
2019-03-07 03:30:50 -08:00
richagar
ab5b64b4a1 sepolicy: Changes for perf 2.0
Removing duplicate perf2.0 statements from
legacy/vendor/common/file_contexts

Change-Id: I026fa129bf834452ecf47edb002e5e37b4be47fb
2019-03-05 23:22:34 -08:00
Richa Agarwal
87c5c09dea sepolicy : Changes for perf 2.0
Moving perf-hal from 1.0 to 2.0.

Change-Id: I9600e51150caa982966d026c336ff0e5c9bdf08a
2019-03-01 15:03:32 +05:30
Jaihind Yadav
f83e96756d sepolicy: add sepolicy support for fm
added separate hal_fm_hwservice for fm app.
intialize server and client for hal_fm.
made system_app to be a client of hal_fm

Change-Id: I4881913e5f9abc3699730e8a6abac3756dc91337
2019-02-27 17:48:40 +05:30
Jaihind Yadav
7a7bea74bc sepolicy: adding the misc change from 5.0 to 5.9
This is delta of sepolicy 5.0 component between 25th jan to 26th fab.

Change-Id: I43dbdf9f4e4300dfafedbd2e19460fb55844fbac
2019-02-27 17:16:13 +05:30
Jaihind Yadav
91a8b0f08b sepolicy: adding sepolicy changes
this chanegs is delta of changes 2588020
Change-Id: I6e5765f0927f22769cce0cb354329b6d3a95d1fd
2019-02-18 21:49:34 -08:00
Jaihind Yadav
78f021fe6a sepolicy: moving qssi supported legacy target here.
Change-Id: Ife7e851823afc1dcbf2f561c8079795e909544bc
2019-02-18 21:49:10 -08:00