Jake Weinstein
ea027c21d4
Revert "aospa: sepolicy: Resolve additional selinux denials with OTA"
...
This reverts commit 35666dec78
.
Reason for revert: Revisit this for Topaz.
Change-Id: I6f25db01bae6216955a077b4724b485502df2457
2022-08-25 05:00:47 +00:00
Chris Crump
35666dec78
aospa: sepolicy: Resolve additional selinux denials with OTA
...
dac_override allow requires https://gerrit.aospa.co/c/AOSPA/android_system_sepolicy/+/22414
Change-Id: I7d5072bc513ec22aa61eb30904441f98f0f5e87c
2022-08-08 10:19:29 +00:00
Chris Crump
60b01a2afe
aospa: sepolicy: Add ParanoidHub and additional update_engine polices
...
* common: add update_engine policies
Dan Pasanen
<dan.pasanen@gmail.com>
* sepolicy: add rules for updater and update_engine
Dan Pasanen
<dan.pasanen@gmail.com>
* common: Switch Updater app to its own SELinux domain
Łukasz Patron <priv.luk@gmail.com>
* updater_app: Allow updater_app domain to access the network
Eamon Powell <eamonpowell@outlook.com>
* Updater: Allow binder calls to gpu service
Bruno Martins <bgcngm@gmail.com>
* updater_app: Grant additional permissions
Nolen Johnson <johnsonnolen@gmail.com>
* common: exported2_default_prop -> build_prop
Michael Bestas <mkbestas@lineageos.org>
Change-Id: I14f2ccfa17f6b88924d341b69305343f97877f70
2022-07-19 13:42:54 -04:00
Omkar Chandorkar
70f7ee3ee9
sepolicy: drop LOS FOD rules
...
* rip a11 fod
Change-Id: I1134fa4eb9dec691b55ff06e806a551c53cffb84
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-06-29 21:18:36 +09:00
Juhyung Park
81b5802e14
aospa: sepolicy: allow setting ro.vendor.lmkd.* properties
...
Change-Id: Ia45e4d2554e96333ed751352c05db883038fda2e
Signed-off-by: Juhyung Park <qkrwngud825@gmail.com>
2022-02-21 01:16:05 +09:00
Bruno Martins
0e63a30326
aospa: sepolicy: Label basic USB HAL
...
Change-Id: I6aeb36893125c52dcdabe2a2c8bcb2347af33481
2022-02-16 07:51:16 +00:00
Fabian Leuteneegger
5c4eced731
aospa: sepolicy: Add policies for Pocked Judge
...
Change-Id: I837baa51f68f00009651e8c8477b0cdf49afabf7
2021-12-08 14:52:37 +00:00
StyloGey
c77eaa3178
aospa: Introduce AOSPA power HAL for gestures.
...
Change-Id: Icd7222888835d939da8032ace0fbdbb9fb555329
2021-10-14 11:46:06 +09:00
TheStrix
a76053d59d
aospa: sepolicy: Allow bootanim to find mediametrics_service
...
Change-Id: I4dca1ac09c4b3f3dd196c0132370b0400b8f8e07
2021-10-14 11:46:06 +09:00
LuK1337
4cf084f63d
aospa: sepolicy: Add rules for FOD.
...
Change-Id: Id9b8d33075b6f394710dfeeca88d73949bb837af
2021-10-14 11:46:06 +09:00
Vishalcj17
ab0d34ec12
aospa: Cleanup as much as possible.
...
* bravo six, going in for a restructure.
Change-Id: Ib787d9e52cbd97a797c62a0053a525756bc74b2c
2021-10-14 11:45:32 +09:00
Linux4
2af3dda541
[lineage-17.1] sepolicy: add hal_powershare
...
Change-Id: I2ed2d8c1c8ac03c33900d83802e8a981785e6406
2021-07-25 09:11:54 +00:00
Bruno Martins
7b8dd7440a
pa: sepolicy: Label basic USB HAL
...
Change-Id: I6aeb36893125c52dcdabe2a2c8bcb2347af33481
2021-06-09 03:55:47 +00:00
Omkar Chandorkar
3c732db59c
pa: sepolicy: make vendor_sysfs_dc_dim type public
...
Signed-off-by: Omkar Chandorkar <gotenksIN@aosip.dev>
Change-Id: I771ee9da1da5daef0718c6b8543ba1001366e17a
2021-05-27 03:12:48 +00:00
rituj
f5b06273d3
pa: selinux: Introduce Applock [3/3]
...
Change-Id: I92532e5d5ed33cced5583b7fda19327787234af7
2021-03-18 13:17:26 +00:00
StyloGey
cb103cccad
pa: Introduce AOSPA power HAL for gestures.
...
Change-Id: Icd7222888835d939da8032ace0fbdbb9fb555329
2021-03-15 15:24:43 +00:00
Rituj Beniwal
bf07d8d771
pa: sepolicy: Introduce automated DC Dimming.
...
* Label sysfs node as vendor_sysfs_dc_dim in device tree.
Change-Id: Ie370de435763e9eb4e10940bd9b2484650c3cdce
2021-03-13 06:21:49 +00:00
dianlujitao
62f4359626
pa: sepolicy: Expose aux camera whitelist property.
...
Change-Id: I8f6d2fcd498ed78d8404451b33ba830381c36061
2021-03-12 07:06:00 -07:00
Puneet Mishra
4e19732c40
pa: sepolicy: Allow platform apps to find the NFC service.
...
* Several APIs on NFC require platform permissions,
therefore, NFC test applications are equipped with them.
Change-Id: I35435b4aac0b0153c7847a8e02ab36985f54e774
2020-12-31 17:17:44 -07:00
Alexander Koskovich
98af27b706
pa: sepolicy: Write some missing rules for FOD.
...
Change-Id: I255a0b5e25461298d19e7f13a24e4262330b83cf
2020-12-18 00:40:26 +00:00
LuK1337
d1d045c2bb
pa: sepolicy: Add rules for FOD.
...
Change-Id: I067ead0c2f60493a974bc220b67d7039acea4823
2020-11-21 05:10:37 +00:00
Jake Weinstein
292d764015
vendor: move sepolicy to device/pa/sepolicy
...
Change-Id: I0eda57cfd95d313d6cd544983504ed55a608d11b
2019-07-31 12:44:21 +00:00
Hernán Castañón Álvarez
ca2b717196
pa: sepolicy: move PA sepolicy to system.
...
This is needed for QSSIs to be able to use our vendor/pa sepolicies.
This won´t cause any issues to device specific builds.
Signed-off-by: Hernán Castañón Álvarez <herna@paranoidandroid.co>
Change-Id: Ifb4057334110d1c7389f728cbaf573a5538a98d2
2019-03-23 12:20:07 +00:00
TheStrix
c60446fc2c
Initial sepolicy changes for pie
...
Change-Id: I0707ae85da0d153a8c383b9eaa08ef9c4057f8fd
2018-09-20 04:52:13 +00:00
Jake Weinstein
e7b25190d3
pa: Fix zygote denial
...
Fixes the following denial
avc: denied { create } for pid=668 comm="main" name="tasks" scontext=u:r:zygote:s0 tcontext=u:object_r:cgroup:s0 tclass=file permissive=0
Change-Id: I4d001f3973e73a6dd4027e6a872688df68a0f4a8
2018-02-18 08:14:32 +00:00
Lennart
c86c71bbfa
pa: fix denial to show the correct selinux mode
...
Without this commit the settings always show permissive as selinux
status even it it was enforcing
Change-Id: Icd5003e67a725323a5445a936d5a38a3006c5456
2018-02-17 00:31:43 +01:00
cj360
1b055f37a6
sepolicy: Fix mkfs sepolicy for Oreo
...
Needs coredomain
a2718d3071
Change-Id: Ie612c590739cf88191b093f92087092d9e574a13
Signed-off-by: cj360 <ayunker551@gmail.com>
2018-02-13 16:12:38 +00:00
Alex Naidis
2637516bfb
pa: Initial 8.0 bringup
...
- Update version number
- Cleanup sepolicy, remove theming support
- Initial pass at overlays
- Remove pa-services for now
Change-Id: I933a9fadc9d81da9454c5e369e841fcc22629932
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
2017-11-11 08:24:50 -05:00
Alex Naidis
9f6515fd98
pa: Give system server full read access to user profiles
...
Fixes denials such as
[ 1053.875830] type=1400 audit(1502291448.945:27): avc: denied { open } for pid=1389 comm="PackageManager" path="/data/misc/profiles/cur/0/foreign-dex" dev="sda15" ino=1945922 scontext=u:r:system_server:s0 tcontext=u:object_r:user_profile_data_file:s0 tclass=dir permissive=0
Change-Id: I9769df7bd7fd5167690acc182d187bb609b00c13
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
2017-08-10 01:59:01 +00:00
Ícaro Hoff
b0fefe82a5
pa: address profile picture "read" permission denial
...
[ 8875.702197] type=1400 audit(1502056520.069:19): avc: denied { read } for pid=10749 comm="Binder:10227_6" path="/data/user_de/0/com.android.settings/cache/TakeEditUserPhoto2.jpg" dev="sda10" ino=65289 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=file permissive=0
Change-Id: I29cf861ade67b11b4cf0cf8b00b0960b77b62759
Signed-off-by: Ícaro Hoff <icarohoff@gmail.com>
2017-08-06 19:07:53 -03:00
Chris Lahaye
6e07618a4e
pa: Add selinux policy for pocket bridge
...
Change-Id: I45b8eeab76833f5c95211da5d869b21cb72510c4
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
2017-08-02 15:42:55 -04:00
Carlo Savignano
66580b14d2
pa: Add pocket judge selinux policy
...
Ticket: NOUGAT-9
Change-Id: I46fa86a55389421f615e0af366bee9413617297c
Signed-off-by: Carlo Savignano <carlosavignano@aospa.co>
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
2017-08-02 15:41:50 -04:00
thecrazyskull
a0d58315db
pa: sepolicy: Add Color Engine policy
...
Change-Id: I9b9915c63326634f7f8c8e31a23efe93a07b8a42
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
2017-08-02 15:41:42 -04:00
Jake Weinstein
f23c100401
pa: Fix a user profile data denial
...
Change-Id: I1a441c9a893edc3a5ccbb9d5ba373ceeed441a87
2017-07-30 14:10:59 +00:00
Alex Naidis
b544174dd1
pa: Fix audioserver's communication with boot animation
...
Audioserver needs to communicate with boot animation
via binder.
Change-Id: Iafd3701f1cf741b30808fc1ad989f9c07cca7935
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
2017-07-27 20:28:48 +00:00
Jake Weinstein
a6fa8c8528
pa: fix denial when setting user profile picture
...
[298887.878199] type=1400 audit(1500699998.019:640): avc: denied { write } for pid=6660 comm="Binder:6647_1" path="/data/user_de/0/com.android.settings/cache/CropEditUserPhoto.jpg" dev="sda15" ino=1866326 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=file permissive=0
[298887.910918] type=1400 audit(1500699998.049:641): avc: denied { write } for pid=15001 comm="Binder:6647_5" path="/data/user_de/0/com.android.settings/cache/CropEditUserPhoto.jpg" dev="sda15" ino=1866326 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:system_app_data_file:s0 tclass=file permissive=0
Change-Id: Ia416e69b561c2b656d00ed401abd4d7d67bfc0d4
2017-07-24 02:42:36 +00:00
Surge Raval
017b3b4792
pa: Add policy to fix interfacer derp on boot
...
05-29 08:40:17.200 10546 10600 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 10600 (POSIX timer 0)
05-29 08:40:17.200 428 428 W : debuggerd: handling request: pid=10546 uid=1006 gid=1006 tid=10600
05-29 08:40:17.223 20058 20058 E : debuggerd: Unable to connect to activity manager (connect failed: Connection refused)
05-29 08:40:17.225 580 580 E SELinux : SELinux: Could not set context for /data/data/projekt.interfacer: Permission denied
05-29 08:40:17.226 580 580 E installd: Failed top-level restorecon for /data/data/projekt.interfacer: Permission denied
05-29 08:40:17.219 580 580 W installd: type=1400 audit(0.0:135): avc: denied { relabelto } for name="projekt.interfacer" dev="sda15" ino=61332 scontext=u:r:installd:s0 tcontext=u:object_r:theme_data_file:s0 tclass=dir permissive=0
05-29 08:40:17.226 19831 19831 E PackageManager: Failed to create app data for projekt.interfacer, but trying to recover: com.android.internal.os.InstallerConnection$InstallerException: Failed to execute create_app_data [null, projekt.interfacer, 0, 3, 1000, platform:privapp, 25]: -1
05-29 08:40:17.228 580 580 E : Couldn't opendir /data/user_de/0/projekt.interfacer: No such file or directory
05-29 08:40:17.229 19831 19831 W PackageManager: com.android.internal.os.InstallerConnection$InstallerException: Failed to execute destroy_app_data [null, projekt.interfacer, 0, 3, 61332]: -2
05-29 08:40:17.229 580 580 E SELinux : SELinux: Could not set context for /data/data/projekt.interfacer: Permission denied
05-29 08:40:17.229 580 580 E installd: Failed top-level restorecon for /data/data/projekt.interfacer: Permission denied
05-29 08:40:17.219 580 580 W installd: type=1400 audit(0.0:136): avc: denied { relabelto } for name="projekt.interfacer" dev="sda15" ino=61488 scontext=u:r:installd:s0 tcontext=u:object_r:theme_data_file:s0 tclass=dir permissive=0
05-29 08:40:17.230 19831 19831 D PackageManager: Recovery failed!
05-29 08:40:17.231 580 580 E SELinux : SELinux: Could not set context for /data/data/projekt.interfacer: Permission denied
05-29 08:40:17.231 580 580 E installd: Failed top-level restorecon for /data/data/projekt.interfacer: Permission denied
05-29 08:40:17.232 19831 19831 E PackageManager: Failed to create app data for projekt.interfacer, but trying to recover: com.android.internal.os.InstallerConnection$InstallerException: Failed to execute create_app_data [null, projekt.interfacer, 0, 3, 1000, platform:privapp, 25]: -1
05-29 08:40:17.219 580 580 W installd: type=1400 audit(0.0:137): avc: denied { relabelto } for name="projekt.interfacer" dev="sda15" ino=61488 scontext=u:r:installd:s0 tcontext=u:object_r:theme_data_file:s0 tclass=dir permissive=0
05-29 08:40:17.233 580 580 E : Couldn't opendir /data/user_de/0/projekt.interfacer: No such file or directory
05-29 08:40:17.233 19831 19831 W PackageManager: com.android.internal.os.InstallerConnection$InstallerException: Failed to execute destroy_app_data [null, projekt.interfacer, 0, 3, 61488]: -2
05-29 08:40:17.234 580 580 E SELinux : SELinux: Could not set context for /data/data/projekt.interfacer: Permission denied
05-29 08:40:17.234 580 580 E installd: Failed top-level restorecon for /data/data/projekt.interfacer: Permission denied
05-29 08:40:17.234 19831 19831 D PackageManager: Recovery failed!
05-29 08:40:17.229 580 580 W installd: type=1400 audit(0.0:138): avc: denied { relabelto } for name="projekt.interfacer" dev="sda15" ino=61491 scontext=u:r:installd:s0 tcontext=u:object_r:theme_data_file:s0 tclass=dir permissive=0
05-29 08:40:17.274 20058 20058 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Change-Id: I39def485bbeea25e2b32baa30e575779afd50ce4
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
2017-06-01 22:34:54 +02:00
Alex Naidis
874527426a
pa: sepolicy: Fix substratum related denial
...
Part of 780277a592
The other part is in system/sepolicy already.
Change-Id: I351d48e564b8844474a15ee961aa139252adbfaa
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
2017-03-27 16:33:06 +02:00
Evan Anderson
582bd50276
Revert "pa: allow system server to change hw buttons prop"
...
* This breaks building for Nexus devices since they do not use the qcom
common sepolicy
This reverts commit ccc59715e0
.
Change-Id: Ie7b93f4455b13d3db2386c6c8e8f103a51458b72
Signed-off-by: Evan Anderson <evananderson@aospa.co>
2017-03-16 13:43:21 -04:00
thecrazyskull
e1dafe3a42
pa: sepolicy: extend for our keyhandler extension
...
Change-Id: I05146b35f80b62f5a6fac4588bf99526c4720c86
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
2017-03-15 00:59:37 +09:00
Thecrazyskull
ccc59715e0
pa: allow system server to change hw buttons prop
...
* Needed for buttons code
Change-Id: I057c26f66c1932c5ea2ed5ac75c678331f665f89
2017-03-15 00:59:09 +09:00
George G
4f34278ed0
pa: sepolicy: fix themed sounds
...
02-08 17:26:48.011 18259-18259/? W/SoundPoolThread: type=1400 audit(0.0:31): avc: denied { read } for path="/data/system/theme/audio/ui/Lock.ogg" dev="dm-0" ino=1006317 scontext=u:r:drmserver:s0 tcontext=u:object_r:theme_data_file:s0 tclass=file permissive=0
Change-Id: If96d784d4a79e7c7f7d21d191c2e0795c366e03a
2017-03-09 18:45:16 +00:00
bigrushdog
1727ae20f8
pa: sepolicy: fix themed boot animation
...
W BootAnimation: type=1400 audit(0.0:42): avc: denied { open } for uid=1003 path="/data/system/theme/bootanimation.zip" dev="mmcblk0p42" ino=1657697 scontext=u:r:bootanim:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0
W : Unable to open '/data/system/theme/bootanimation.zip': Permission denied
W zipro : Error opening archive /data/system/theme/bootanimation.zip: I/O Error
Change-Id: I1440bd967d7a06ee64ea861a2544b54caf909f23
2017-03-09 18:45:06 +00:00
d34d
2ef1577fda
pa: Introduce sepolicy exceptions for theme assets
...
Assets such as composed icons and ringtones need to be accessed
by apps. This patch adds the policy needed to facilitate this.
Change-Id: I0420de579aed0cff5add181cd0a8bf0f2b05d723
2017-03-09 18:44:50 +00:00
Mårten Kongstad
41d323a141
pa: OMS7-N: Add service 'overlay' to service_contexts
...
The 'overlay' service is the Overlay Manager Service, which tracks
packages and their Runtime Resource Overlay overlay packages.
Bug: 31052947
Co-authored-by: Martin Wallgren <martin.wallgren@sonymobile.com>
Signed-off-by: Zoran Jovanovic <zoran.jovanovic@sonymobile.com>
Change-Id: Ie996707dd02166325271bee49163ac263e560a1d
2017-02-24 21:53:21 +00:00
Christopher N. Hesse
a9dfdafe59
pa: sepolicy: Move IOP rules to qcom common tree
...
Change-Id: Ie3a3c555ebe11375dcd95b094d05e069158dab52
2017-02-22 16:34:45 +00:00
Thecrazyskull
ae74d700c5
pa: Allow iop to search sdcardfs dirs
...
Change-Id: I88b36d943fde2057765e5c978412db704866e79d
2017-01-21 15:09:48 +00:00
Luca Stefani
884980a0a5
pa: sepolicy: Allow system_server dir read access
...
Change-Id: Ia6fc26781c1cb576c2feee3e941d7206e7878bb5
Signed-off-by: Park Ju Hyung <qkrwngud825@gmail.com>
2017-01-14 07:48:18 +09:00
Alex Naidis
b5b198f2ce
pa: sepolicy: address new denial
...
Change-Id: I6fdf9c06591a44c115e0c1005e9cd03c6457f5f5
Signed-off-by: Alex Naidis <alex.naidis@linux.com>
2016-12-18 20:13:54 +01:00
thecrazyskull
08029e68cb
vendor: sepolicy: adress IOP denials
...
Change-Id: I6e30574c3cece5f8d95d2a58290d80c872f24656
2016-11-19 07:51:40 -05:00