Commit graph

19 commits

Author SHA1 Message Date
Charlotte D
edadce3968 change xiaomi -> lenovo 2018-11-18 18:01:38 +00:00
Isaac Chen
d5fe8be114 msm8937-common: sepolicy: Address more denials
* Also arrange sepolicies
2018-07-09 00:00:47 +08:00
Bruno Martins
848ee28b5a msm8937-common: sepolicy: Allow rild to set radio props 2018-07-09 00:00:47 +08:00
Rashed Abdel-Tawab
b93a294b74 msm8937-common: Build QTI HIDL power 1.0 HAL 2018-07-09 00:00:45 +08:00
Bruno Martins
d761cec8e3 msm8937-common: sepolicy: Add debug rules for rmt_storage
Change-Id: Ie0c94ac657127b1653afbbb82b06789dfe34032d
2018-07-09 00:00:21 +08:00
Martijn Coenen
a85558ea52 msm8937-common: Add selinux/private/service_contexts.
This makes sure that the remaining binder services
for radio end up in plat_service_contexts.

That in turn allows us to enforce that servicemanager
will only serve services from plat_service_contexts
on FULL_TREBLE devices.

Bug: 36866029
Test: boot, verify radio services still work
Change-Id: Ib67b3a03e5599484c5c4fb27a0f323a37dd51636
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:21 +08:00
Isaac Chen
5478c86bac msm8937-common: sepolicy: Address keylayout denial
05-30 07:55:45.151   987   987 W InputReader: type=1400 audit(0.0:10): avc: denied { read } for name="gf3208.idc" dev="mmcblk0p48" ino=1329 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=0
05-30 07:55:45.151   987   987 W InputReader: type=1400 audit(0.0:11): avc: denied { read } for name="gf3208.kl" dev="mmcblk0p48" ino=1333 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=0
05-30 07:55:45.199   987   987 W InputReader: type=1400 audit(0.0:12): avc: denied { read } for name="gpio-keys.kl" dev="mmcblk0p48" ino=1334 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=0
05-30 07:55:45.299   987   987 W InputReader: type=1400 audit(0.0:13): avc: denied { read } for name="ft5x06_720p.kl" dev="mmcblk0p48" ino=1332 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=0

Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:21 +08:00
Isaac Chen
57f366a761 msm8937-common: sepolicy: Address cas HAL denial
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:21 +08:00
Isaac Chen
1a6dae3d38 msm8937-common: sepolicy: Address camera daemon denial
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:21 +08:00
Isaac Chen
724868de36 msm8937-common: sepolicy: Organize for treble compatibility
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:20 +08:00
Isaac Chen
3e93f804b6 msm8937-common: sepolicy: Initial O denial
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:20 +08:00
TheScarastic
265678c804 msm8937-common: Add custom biometrics 2018-06-29 00:02:43 +08:00
Darshan Manjrekar
70f1a47192 land: Address denials 2017-12-27 14:41:55 +05:30
Michael Bestas
9d7267d0be land: Remove obsolete sepolicy rules
* They are not required after commits:
  land: Update ril-daemon service
  Grant netmgrd proper unix perms

Change-Id: I721a9935764f5003cf597095bbe3493dc8a6b0d1
2017-12-09 14:02:28 +05:30
Bruno Martins
f4645e088c land: Grant rmt_storage proper unix perms
Do not grant DAC override permission which would allow this daemon
unix permissions to everything.

avc: denied { dac_override } for pid=2664 comm="rmt_storage" capability=1 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=0

Change-Id: Ib02b4aedab479f5ad8aca3a2100b5c489397002a
2017-12-09 14:02:28 +05:30
Prateek Chaubey
92c8318178 land: Address Bluetooth Denial 2017-12-09 13:58:06 +05:30
Prateek Chaubey
5320556c8e land: address some denials 2017-08-07 10:40:05 +02:00
Prateek Chaubey
7069b2a85e land: Fix Fingerprint 2017-08-07 10:38:52 +02:00
karthick111
4518d68489 land: Initial sepolicy 2017-08-07 10:35:24 +02:00