Commit graph

305 commits

Author SHA1 Message Date
LuK1337
bb066620d8
sdm660-common: sepolicy: Address radio denials
Change-Id: If37262e6be3d31f51dcd482db04ce647ecd57e4d
Signed-off-by: Subhajeet Muhuri <subhajeet.muhuri@aosip.dev>
2020-12-13 18:38:07 +06:00
Aayush Gupta
2ccf864f31
sdm660-common: Address denials regarding to access sysfs_kgsl
[   22.419451] type=1400 audit(1601312073.698:17): avc: denied { search } for comm="ImageWallpaper" name="kgsl-3d0" dev="sysfs" ino=29220 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:sysfs_kgsl:s0 tclass=dir permissive=0 app=com.android.systemui
[    9.476242] type=1400 audit(1601312065.534:13): avc: denied { search } for comm="BootAnimation" name="kgsl-3d0" dev="sysfs" ino=29220 scontext=u:r:bootanim:s0 tcontext=u:object_r:sysfs_kgsl:s0 tclass=dir permissive=0

Change-Id: I80c5de2d9687b3127922d5bc55c26461a797d0f9
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Signed-off-by: Subhajeet Muhuri <subhajeet.muhuri@aosip.dev>
2020-12-13 18:38:07 +06:00
Nolen Johnson
0d7a7d4ef5
sdm660-common: Move rtc contexts to device/qcom/sepolicy
* In device/qcom/sepolicy-legacy-um now.

Change-Id: I80b877d4b65a3d22cf7a61d70e08e48edeb627de
2020-12-13 18:38:07 +06:00
nebrassy
7821f6dc80
sdm660-common: sepolicy: drop seapp_contexts
now labeled in sepolicy-legacy-um

Change-Id: I284d16905a7e67c3d86f300ac9bf73fa1b9490fc
2020-12-13 18:38:07 +06:00
OdSazib
f614ba1ce6
sdm660-common: Clean up sepolicy for Android 11
checkpolicy:  error(s) encountered while parsing configuration

Changes in Android 11
* dpmd > vendor_dpmd
* persist_camera_prop > vendor_persist_camera_prop
* persist_dpm_prop > vendor_persist_dpm_prop

Signed-off-by: OdSazib <odsazib@gmail.com>
2020-12-13 18:38:07 +06:00
LuK1337
510d313d4e
sdm660-common: sepolicy: Label /persist
Change-Id: I471c0d1fedb51eabc32b54ab35a9823db8efd034
2020-12-13 18:37:01 +06:00
OdSazib
9bd430ff9b
sdm660-common: XiaomiParts: Add Headphone & Mic Gain
* This is manually ported by me from Lavender tree on Corvus-Devices
* Thanks @StyloGey for reviewing the java code and giving me a better solution
* Original repo: https://github.com/Corvus-Devices/device_xiaomi_lavender.git

To get it working, you need these two commits in your kernel:
> c04d6d6e61
> 8e25ac3318

Signed-off-by: OdSazib <odsazib@gmail.com>
Change-Id: I1bb48ced1f23728daa2e5170647ce08a04347110
2020-10-19 11:36:06 +06:00
OdSazib
7580f5f636
sdm660-common: XiamiParts: Add FPS Info Overlay
* Ported from: https://github.com/Corvus-Devices/device_xiaomi_lavender.git

Signed-off-by: OdSazib <odsazib@gmail.com>
2020-10-19 11:36:06 +06:00
OdSazib
471da74c21
sdm660-common: XiaomiParts: Remove dirac completely
* Fix XiaomiPart crash while using audio mod like v4a/dolby

Signed-off-by: odsazib <odsazib@gmail.com>
2020-10-19 11:36:06 +06:00
OdSazib
dd14ca3e30
sdm660-common: Address denials for Livedisplay
Signed-off-by: odsazib <odsazib@gmail.com>
2020-10-19 11:36:06 +06:00
Max Weffers
f1b43abf23
sdm660-common: Add IOP Hal blobs from LA.UM.8.2.r1-06500-sdm660.0
Change-Id: I86bf8623dab2b5a5295bbebc602587b2347fdaf6
2020-08-12 02:11:34 +06:00
Michael Bestas
5fcfc725ef
sdm660-common: sepolicy: Allow dpmd set ctl_stop_prop
Change-Id: Id24b6370e907cc153b07383c65416aa9226e65a8
2020-08-12 02:11:34 +06:00
Max Weffers
a502a3904b
sdm660: sepolicy: Adjust sepolicy for new tap to wake nodes 2020-08-12 02:02:40 +06:00
Christian Oder
9a26ceac4c
sdm660-common: remove neverallow
Change-Id: I3a6a7c7e6f95947eaf807a0e6d8ab19144a9cee5
2020-08-12 02:02:38 +06:00
Max Weffers
b7b7fae1ef
sdm660-common: sepolicy: unbreak sepolicy for carbon
Change-Id: Ie324b974ceb741c524abe7ba53cadb4c2b01219e
2020-08-12 02:02:38 +06:00
Dušan Uverić
3476f16be6
sdm660-common: XiaomiParts: add notification LED brightness slider
Signed-off-by: Dušan Uverić <dusan.uveric9@gmail.com>
Change-Id: I86851420cca27d34e36f8e385859c5be63545bba
2020-08-12 02:02:38 +06:00
Max Weffers
b0fa4e9f51
sdm660-common: sepolicy: Adress few denials
Change-Id: I45c7af8087a8495e4e7902d74f7811c2d40f5197
2020-08-12 02:02:38 +06:00
dianlujitao
684521256a
sdm660-common: sepolicy: Label new TP node
Change-Id: Id55db9b6614320650c8c61e698f71ddc9f04d086
2020-08-12 02:02:38 +06:00
erfanoabdi
7a514dc86e
sdm660-common: sepolicy: Label Video prop
Change-Id: Id66a71d45ac8dc5a635bc0e208b45423bd9125e6
2020-08-12 02:02:38 +06:00
dianlujitao
8d789ade9f
sdm660-common: sepolicy: Clean up sepolicy rules
Change-Id: I9d7312e6aaafdde2c0751f4887f05d8d5029ee04
2020-08-12 02:02:38 +06:00
Max Weffers
eb97b49f0c
sdm660-common: Address SELiunx denials and clean up
Change-Id: I997a268c9ce23eab80f1981293720e17d21bbb7a
2020-08-12 02:02:38 +06:00
Max Weffers
880ca53df2
sdm660-common: sepolicy: Address some denials
Change-Id: Iaba642838e51a2c39c2961e30456148f9794f60e
2020-08-12 02:02:38 +06:00
dianlujitao
06e3d383a2
sdm660-common: sepolicy: Label button backlight nodes
Change-Id: I594a07fc3e68f1b50f181c4b254811814990c599
2020-08-12 02:02:38 +06:00
dianlujitao
55f4d4eb18
sdm660-common: sepolicy: Drop unused sysfs_light
Change-Id: I62bfac69bdcebaf7d484bbc39ea4e16f8beb8e6b
2020-08-12 02:02:38 +06:00
dianlujitao
f735b1ab0c
sdm660-common: sepolicy: Label IR dev node for jason
Change-Id: I7ba6af074485509a501f656587379fb0ba5b07d3
2020-08-12 02:02:37 +06:00
Davide Garberi
4461490e45
sdm660-common: sepolicy: Label renamed white led node
Change-Id: Ia7c3c47efb628f851dd377b2e09b6f8e150013e3
2020-08-12 02:02:37 +06:00
Max Weffers
903525f9b0
sdm660: sepolicy: Allow vendor init to set few props
Change-Id: I0b2574b0e2f5f9b84df1db9ea7386522361a2864
2020-08-12 02:02:37 +06:00
Soul Trace
9b5bf8c210
ipacm: Fix WLAN tethering offload
Fix reboot after 120 seconds on WLAN tethering enable.
Fix "target device is connected but no internet" issue.

Move ipacm-related sections from rootdir/etc/init.qcom.rc to data-ipa-cfg-mgr/ipacm/src/ipacm.rc
Make ipacm.rc look like vendor/qcom/opensource/data-ipa-cfg-mgr/ipacm/src/ipacm.rc but add
writepid /dev/cpuset/system-background/tasks to the service definition.
This let ipacm start after data decryption (it got killed on data decrypt and not respawned,
because was disabled).
This fixes following errors:
04-01 14:35:57.525   591 17586 W libc    : Unable to set property "ctl.interface_start" to "android.hardware.tetheroffload.config@1.0::IOffloadConfig/default": error code: 0x20
04-01 14:35:57.526  2665  3190 I ServiceManagement: getService: Trying again for android.hardware.tetheroffload.config@1.0::IOffloadConfig/default...
04-01 14:35:57.526   591 17586 E hwservicemanager: Failed to set property for starting android.hardware.tetheroffload.config@1.0::IOffloadConfig/default

Set wifi.active.interface context to exported_wifi_prop and allow hal_wifi_default to set it.
I don't know why context definition was not embedded to the contexts file, but now it is.
This fixes following errors:
[163263.846522] selinux: avc:  denied  { set } for property=wifi.active.interface pid=2733 uid=1010 gid=1010 scontext=u:r:hal_wifi_default:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=0

Change-Id: I735e7d8d8d07b9545ef16a6baa35a13aba3cd116
2020-08-12 02:02:37 +06:00
Max Weffers
599a611dd8
sdm660: sepolicy: Grant Vendor Toolbox fingerprint file acces in persist
Change-Id: I16afcc9bf2f822d741470ca5b741a4b283196575
2020-08-12 02:02:37 +06:00
dianlujitao
6df111fbc1
sdm660-common: sepolicy: Adjust for lavender dt2w node
Signed-off-by: Sebita <kjjjnob.seba@gmail.com>
Change-Id: If08946adbf5c2fa619178b3f15ae0635bacdf8a8
2020-03-10 09:41:52 +01:00
LuK1337
2eb56727c3
sdm660-common: sepolicy: Add more /persist related contexts to toolbox rules
Change-Id: If9b28d1196eb352422e5acb0a570f2e005c2dcdf
2020-03-10 09:39:56 +01:00
LuK1337
1e7b6a0417
sdm660-common: sepolicy: Drop unnecessary rule
* This is already granted through init_daemon_domain(domain).

Change-Id: I6c2f1b3e267256da958b40af5014972785617cbe
2020-03-10 09:39:56 +01:00
Felix
ac571ee966
sdm660-common: Force restorecon for /mnt/vendor/persist
The restorecon_recursive directive in init is only applied if the
file_contexts file changed between builds, but not necessarily if any
file or folder inside /mnt/vendor/persist/ has changed.

The restorecon code checks whether an xattr named
"security.sehash" contains a string that matches the current
combined hashes of the SELinux context files and skips restoring labels
if there is a match, see
https://android.googlesource.com/platform/external/selinux/+/refs/tags/android-9.0.0_r35/libselinux/src/android/android_platform.c#1546

Force wiping that xattr so that restorecon always runs since it's not
very expensive (there are currently only about 50 files on /persist).

The restorecon is needed to fix issues such as wrong stock labels on
/mnt/vendor/persist/sensors/:
sensors_persist_file -> persist_sensors_file

Change-Id: Ic0cd848836ee550499d9236f56ed6e939e35f01e
2020-03-10 09:39:45 +01:00
Ethan Chen
89f5d20ec4
sdm660-common: Allow init to relabel persist link file
Change-Id: I7872b8455a66e45826d86e0bb71faa1f28a2c7a3
2020-02-27 17:01:34 +01:00
AmulyaX
f9e999cb0f
sdm660-common: Address QtiExtendedFP denial
Signed-off-by: AmulyaX <amulya.b520@gmail.com>
2020-01-31 16:42:36 +01:00
AmulyaX
0f03dbd079
sdm660-common: Address camera hal denial
Signed-off-by: AmulyaX <amulya.b520@gmail.com>
2020-01-31 16:42:28 +01:00
chandra chaganti
691a8c6843
sdm660-common: sepolicy: allow appdomain to get persist_camera_prop
* E libc    : Access denied finding property "vendor.camera.aux.packagelist"

Change-Id: I06feb5bd6a2321880065585395101c349c741909
2020-01-28 16:59:19 +01:00
Max Weffers
3c13d5743f
sdm660-common: sepolicy: Add sysfs Label for Platinas Fpc Fingerprint
Change-Id: I7423f84d6142b43818dfd2aa24ca935e6188c32f
2020-01-28 16:59:14 +01:00
LuK1337
987436f592
sdm660-common: sepolicy: Address time_daemon denials
Change-Id: I83947a673ed19cfc20c130fb133d1957aa44d284
2020-01-13 22:08:51 +01:00
PIPIPIG233666
bae9198c4e
sdm660-common: Address fp denials
Change-Id: Ie2abb5480d3442e5f64d532561ce657362f9f081
2020-01-06 21:06:22 +01:00
PIPIPIG233666
9c6a56cef6
sdm660-common: Address thermal-engine denials
Change-Id: I7d824f1066638ec6e73ae80093737b380436ba80
2020-01-06 21:06:22 +01:00
Michael Bestas
7e257d0aea
sdm660-common: sepolicy: Silence harmless QCOM denials
Change-Id: Iad1e2c0e654a4a46da76a57ece63dc4f35761d50
2020-01-06 21:06:21 +01:00
Sebita
7f874140c7
sdm660-common: sepolicy: Label node for lavender dt2w
Signed-off-by: Sebita <kjjjnob.seba@gmail.com>
Change-Id: I3df604f9025a3517d19468e8fffc750dbfe479ba
2020-01-06 10:56:13 +01:00
dianlujitao
e427647713
sdm660-common: sepolicy: Label vendor.camera.aux.packageblacklist
Change-Id: I07b82e0ba4a8e16faf67c64e0ffe73a690b38064
Signed-off-by: Sebita <kjjjnob.seba@gmail.com>
2020-01-06 10:50:34 +01:00
Max Weffers
5d39827818
sdm660: parts: Rename hall prop to folio_daemon prop
*needed to prevent neverallow in user builds
2020-01-04 09:37:09 +01:00
Max Weffers
6bbcfb4c1d
sdm660: sepolicy: fix denials while fingerprint enrollment 2019-12-30 23:00:40 +01:00
Max Weffers
946a233a4b
sdm660: sepolicy: Add AuthSecret HAL service 2019-12-23 08:59:25 +01:00
Stylogey
25dadea83b
sdm660-common: XiaomiParts: Start folio_daemon only if a prop is set 2019-12-13 16:57:53 +01:00
Michael Bestas
559890d4f6
sdm660-common: sepolicy: Remove deprecated power HAL stats policies 2019-12-07 18:49:55 +01:00
Michael Bestas
f12fb26fcd
sdm660-common: sepolicy: Allow power off alarm app to set cpuset
* P blob compatibility

Change-Id: I3b8c58ab917dcbf2f142729feb5e6f6adcfc9fdd
2019-12-02 07:57:05 +01:00
Michael Bestas
ec75167d10
sdm660-common: sepolicy: Allow rmt_storage access sysfs_ssr
* P blob compatibility

Change-Id: Ib88c81c8cb4a19c7afd322cfef9b812c2f029a34
2019-12-02 07:57:05 +01:00
LuK1337
348b308650
sdm660-common: sepolicy: Address time_daemon denials
Change-Id: I83947a673ed19cfc20c130fb133d1957aa44d284
2019-12-02 07:56:49 +01:00
Michael Bestas
4f0e9000c9
sdm660-common: Build vendor variant of tinymix
* Avoid SELinux neverallows, vendor services should use vendor tools

Change-Id: I2a97658db9a31dd0403f1b62386db2987bd9749c
2019-12-01 10:27:53 +01:00
Nick Kralevich
160b13b9df
sdm660: folio_daemon: Add system_file_type in sepolicy
This file resides on /system, so must be annotated with the
system_file_type attribute.

Test: Policy compiles.
Change-Id: Ic834caefe1417465ac842ddce909e968511f45b2
2019-10-19 20:51:10 +02:00
Jeff Vander Stoep
c145e57b0f
sdm660: Move folio_daemon to system in sepolicy
Remove Treble violations.

Bug: 36867326
Bug: 62387246
Test: loaded on taimen, checked dmesg, and tested daemon with magnet
Change-Id: I4662b41206b94cae6ac9843b5dc7e1452003c63c
2019-10-19 20:50:52 +02:00
Jeff Vander Stoep
494ee17d12
sdm660: Add folio_daemon in sepolicy 2019-10-19 16:29:57 +02:00
Andrew Lehmer
f08faed4c3
sdm660: Add support for folio cases
Bug: 35243564
Test: Used magnet to wake and lock device. Also tested during suspend.
Change-Id: I4b819e12cc23a3d7a8ce048e208c15eac4f8d6c5
2019-10-19 16:29:57 +02:00
dianlujitao
9cea8c75c9
sdm660-common: Set sys.post_boot.parsed on vendor.post_boot.parsed changed
Change-Id: Ibb924cd28408d9688e18d64b5b22ab10f1fc5227
2019-10-15 16:31:29 +02:00
Max Weffers
f3b7c8bb63
sdm660: sepolicy: Start Q Bringup 2019-10-01 14:24:08 +02:00
Volodymyr Zhdanov
850c987c27
sdm660-common: remove input devices policies
* it's already fixed in system/sepolicy

Change-Id: If1bf165092df71cdc85a7a9118feb257e2bed350
2019-10-01 14:24:07 +02:00
Volodymyr Zhdanov
dfd6d14563
sdm660-common: sepolicy: add firmware labels
* Q sepolicy doesn't have labels for these root folders anymore

Change-Id: Ibc1f13968eb4de0868de149f1347ca07da1c581c
2019-09-27 17:27:20 +02:00
Max Weffers
8d090cc4db
sdm660-common: sepolicy: fix Camera denials for access camera data
* needed for clover oreo blobs
2019-08-20 23:11:46 +02:00
Hexdecimal16
aefda184e2
sdm660-common: sepolicy: address vibrator denial 2019-08-20 10:39:43 +02:00
Max Weffers
fab35d3231
sdm660-common: sepolicy: Grant XiaomiParts access to thermal file 2019-08-20 10:39:43 +02:00
Henrique Silva
88f57be2a9
sdm660-common: dirac: Address denials
Signed-off-by: Harsh Shandilya <msfjarvis@gmail.com>
2019-08-20 10:39:43 +02:00
Max Weffers
e20f8804d6
sdm660-common: Adress denials for Hall Switch 2019-08-20 10:39:43 +02:00
SagarMakhar
409cd433a0
sdm660-common: Add sepolicy for kcal
Signed-off-by: bablusss <baaswanthmadhav@gmail.com>
2019-08-20 10:39:43 +02:00
Max Weffers
15ec448fb0
sdm660: sepolicy: Fix denial for smart charging 2019-08-20 10:39:43 +02:00
Kevin F. Haggerty
d34b30b2e6
sdm660-common: Allow dnsmasq to getattr netd unix_stream_socket
* Noted upon starting wifi tether
* avc: denied { getattr } for path="socket:[11154]" dev="sockfs"
  ino=11154 scontext=u:r:dnsmasq:s0 tcontext=u:r:netd:s0
  tclass=unix_stream_socket permissive=0

Change-Id: I98afc740fda3eb87a627abc414525b05f6877e33
2019-08-15 15:31:32 +02:00
TheScarastic
71abd10485
sdm660-common: Add sepolicy rule for goodix script
Change-Id: Ic8b7dba6a5660c17f5db1c743e5d22f31ae1b1b3
2019-08-15 15:31:17 +02:00
Max Weffers
5bf9fe7f2c
sdm660-common: sepolicy: Grant power hal permission for dt2w 2019-08-15 15:31:17 +02:00
Max Weffers
782a520d58
sdm660: sepolicy: Fix more system_server denials 2019-08-15 15:31:17 +02:00
Max Weffers
6086052825
sdm660: sepolicy: Let fingerprint Hal setup properties 2019-08-15 15:31:17 +02:00
Max Weffers
4278ca6cf6
sdm660: sepolicy: Address rild denials 2019-08-15 15:31:17 +02:00
Max Weffers
7b049283ea
sdm660: sepolicy: Allow vendor_init to set props 2019-08-15 15:31:17 +02:00
Max Weffers
20f13a6298
sdm660: sepolicy: Label sys.listeners.registered as tee_listener_prop 2019-08-15 15:31:17 +02:00
Max Weffers
187b868fcc
sdm660: Add Hardware Info permssions and sepolicy rules 2019-08-15 15:31:17 +02:00
Max Weffers
1e1cbb13c4
sdm660-common: libinit: Set device specific changes via libinit
Change-Id: I9a2dea3291b76d185d9ecda524a4234b6ed25412
2019-08-15 15:31:07 +02:00
Ethan Chen
c0e0aee3a4
sdm660-common: Add basic USB HAL that reports no status change
Change-Id: I6d130d324753c03ac514c4500c5764bfa46941dc
Signed-off-by: SakilMondal <mondalsakil@gmail.com>
2019-08-15 15:27:20 +02:00
Artem Borisov
06d687c9db
sdm660-common: sepolicy: Resolve init_fingerprint denials
Change-Id: Id82f4c6440aeed6a7be6182792c40513102c9f28
Signed-off-by: Akhil Narang <akhilnarang.1999@gmail.com>
2019-08-14 10:04:14 +02:00
dianlujitao
50ae11d634
sdm660-common: sepolicy: Label RTC sysfs node
Change-Id: I637df23926d307de028eb30e523ebb8e92ed2b43
2019-08-14 10:04:14 +02:00
Subhajeet Muhuri
91a80aa4cc
sdm660-common: sepolicy: Address webview_zygote denials 2019-08-14 10:04:14 +02:00
Subhajeet Muhuri
84cbc85b66
sdm660-common: sepolicy: Label fingeprints extension 2019-08-14 10:04:14 +02:00
Subhajeet Muhuri
3dc8126a30
sdm660-common: sepolicy: Label battery_supply sysfs for hvdcp 2019-08-14 10:04:14 +02:00
GuaiYiHu
03a676c21c
sdm660-common: sepolicy: Clean up fingerprint sepolicy
Change-Id: I19f90ba121ca79ea9e676d066ea857ea6ab7a385
2019-08-14 10:04:14 +02:00
Henrique Silva
1de7f3c202
sdm660-common: sepolicy: Address debugfs_wlan denials
Signed-off-by: Akhil Narang <akhilnarang.1999@gmail.com>
Signed-off-by: Subhajeet Muhuri <kenny3fcb@gmail.com>
2019-08-14 10:04:14 +02:00
Subhajeet Muhuri
4c7cba649a
sdm660-common: sepolicy: Dontaudit few qti_init_shell neverallows 2019-08-14 10:04:14 +02:00
Subhajeet Muhuri
0e89ed5c61
sdm660-common: sepolicy: Address more vendor_init denials 2019-08-14 10:04:14 +02:00
Tom Cherry
f3aa8e3d2b
sdm660-common: sepolicy: Add restricted permissions to vendor_init
The core SEPolicy for vendor_init is being restricted to the proper
Treble restrictions.  Since this is a legacy device, it is tagged as a
data_between_core_and_vendor_violators and the needed permissions are
added to its device specific vendor_init.te

Bug: 62875318
Test: boot walleye without audits
Change-Id: I13aaa2278e71092d740216d3978dc720afafe8ea
Signed-off-by: Subhajeet Muhuri <kenny3fcb@gmail.com>
2019-08-14 10:04:13 +02:00
GuaiYiHu
36ef559156
sdm660-common: sepolicy: Lable gpu.stats.debug.level
Change-Id: I01e010a33a52abc42c9da3977503fabcb7c30455
2019-08-14 10:04:13 +02:00
GuaiYiHu
10c35314f7
sdm660-common: sepolicy: Label thermal-engine props
Change-Id: I1bf975bd6f20e56bfb4ff558d2a55f7304ceec6f
2019-08-14 10:04:13 +02:00
GuaiYiHu
d2ce22775d
sdm660-common: sepolicy: Address camera denials
Change-Id: I052adadca396fb104af49daec1d83047d0809416
2019-08-14 10:04:13 +02:00
GuaiYiHu
1ee97f41fc
sdm660-common: sepolicy: Clean up sepolicy
Change-Id: I19f90ba121ca79ea9e676d066ea857ea6ab7a385
2019-08-14 10:04:13 +02:00
GuaiYiHu
05085a02e2
sdm660: sepolicy: Address denials
Change-Id: I8fad5d60ca066b758c526f2027985b63662180cc
2019-08-14 10:04:13 +02:00
Max Weffers
cb1b743b8d
sdm660-common: Transform into common sdm660 tree 2019-08-14 10:04:10 +02:00
Dan Cashman
b1f434c446
wayne-common: Add BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIR
Move vendor policy to vendor and add a place for system extensions.
Also add such an extension: a labeling of the qti.ims.ext service.

Bug: 38151691
Bug: 62041272
Test: Policy binary identical before and after, except plat_service_contexts
has new service added.
Change-Id: Ie4e8527649787dcf2391b326daa80cf1c9bd9d2f

Change-Id: I1493c4c8876c4446a1de46b39942098bf49c79f8
2019-08-14 10:04:10 +02:00
Isaac Chen
c4214a9df8
wayne-common: Address denials for P
Signed-off-by: Isaac Chen <tingyi364@gmail.com>
2019-08-14 10:04:10 +02:00
dianlujitao
8ff49b15bd
wayne-common: Access mlipay hal via a binder service
* Untrusted apps are no longer allowed to directly access hwbinder on
   Pie, implement a system service as a middleware between mlipay hal
   and untrusted apps.
 * Xiaomi uses similar solution for MIUI on Pie.

Change-Id: Ie52376b1f7bcd84d219fe73bceb4bdd6cc2b9980
2019-08-14 10:04:10 +02:00
dianlujitao
63ec762eee
wayne-common: Support Alipay fingerprint payment
* IFAA manager is based on OnePlusOSS, but adapted for Xiaomi's mlipay
   interface.Also hardcode model detection to pass Alipay check.
 * vendor.xiaomi.hardware.mtdservice@1.0.so is not actually used, thus
   patchelf to drop it rather than shipping a blob.
 * Modify libmlipay.so to allow load firmware from vendor

Change-Id: Idf3d3a8d40245984767f4ef5f60f9fe584e69f21
2019-08-14 10:04:10 +02:00
Bruno Martins
5fd30f742d wayne-common: rootdir: Remove sensors init shell script
Change-Id: Ice50a9c83a708d7f8300978048cd00c71e88abc8
2019-07-01 14:15:04 +02:00
Isaac Chen
d6ed30131a wayne: sepolicy: Address IR denials
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-08-05 00:00:16 +00:00
Isaac Chen
3eebbc8ec1 wayne: sepolicy: Address btnvtool denial
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-31 00:00:10 +00:00
Isaac Chen
8f63059aea wayne: sepolicy: Address camera denials
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-31 00:00:10 +00:00
TheScarastic
80a669c55a wayne: sepolicy: Add sepolicy for goodix script
Change-Id: Ic8b7dba6a5660c17f5db1c743e5d22f31ae1b1b3
2018-07-31 00:00:10 +00:00
Isaac Chen
a59e765afb wayne: sepolicy: Initial denials
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-27 00:00:11 +00:00