Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

User/yerriswa/cic cloud mixins support #208

Open
wants to merge 135 commits into
base: r/ics3a/main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
135 commits
Select commit Hold shift + click to select a range
451f0c5
[CELADON] Follow uniform folder structure
sgnanase Jun 19, 2019
8e2c54c
clean sepolicy project
yjsun1 Jul 29, 2019
fdaa1ff
Merge pull request #10 from yjsun1/migration
lizhuanagzhi Jul 29, 2019
2fc4453
Enable storageproxyd service
swei22 Jul 17, 2019
127271e
Remove unused sepolicy for abota, bluetooth, boot-arch, wlan
swei22 Jul 19, 2019
f6a34db
remove sepolicy of set_storage
zhimincx Jul 16, 2019
e6c356e
Merge pull request #12 from swei22/master
lizhuanagzhi Jul 30, 2019
d62f9f9
Merge pull request #14 from chenyangyang1122/master
lizhuanagzhi Jul 30, 2019
33530c2
add sepolicy to enable VideoPlayback on celadon/migration for OAM-84018
lyjintel Aug 7, 2019
08c251b
Added missing sepolicy for thermal
ashish18590 Aug 1, 2019
a1a3416
Sepolicy: Adding rtc label for adapting other platform
gaofengx Aug 7, 2019
8718677
Sepolicy: Health HAL supports multi-platform
zhenhanintel Aug 7, 2019
a2f1978
debug-coredump: config related sepolicy for coredump
btian1 Aug 12, 2019
fa1d89d
Fix conflicts after enabling sw rendering
zjin7 Aug 8, 2019
6939965
device:intel:sepolicy: Adding sepolicy related changes for enabling d…
tanujtekriwal Aug 13, 2019
ab3c285
[Celadon_IVI] Sepolicy addition for SATA & NVME
taranpreetkaur0013 Aug 20, 2019
9244168
sepolicy: Add sepolicy for evs
saranyagopal1 Aug 19, 2019
be5c1d4
Add aaf sepolicy
chenlin3 Aug 20, 2019
a483584
add sepolicy for update_engine
xihua-chen Jul 16, 2019
dd32c02
Enable the default DRM
walterx-yan Aug 19, 2019
4a5cc2a
Label physical net devices under /sys with sysfs_net attribute
Bo-Tong Jul 31, 2019
267d029
[postinstall] Resolve neverallow issue
luo-heng Sep 26, 2019
0281c07
Add the permission to set the property service.adb.tcp.port
aiswaryacyriac Oct 1, 2019
c792224
Remove cp_ss
yang8621 Sep 10, 2019
4facd70
Add sepolicy setting for NN GPGPU HAL
feijiang1 Sep 28, 2019
9817b2d
Fix some avc errors
ceiba1985 Oct 16, 2019
d39f12f
fix media CTS error of testAllHardwareAcceleratedVideoCodecsPublishPe…
Kexiaox Oct 16, 2019
c53c668
fix media CTS error OAM-86928
Kexiaox Oct 17, 2019
4e689d3
[V2]Label physical net devices under /sys with sysfs_net attribute
Bo-Tong Oct 22, 2019
a22d1c1
Enable selinux for caas
ceiba1985 Nov 15, 2019
971b1af
Add required sepolicy for virgl
renchenglei Dec 1, 2019
29a01f5
sepolicy: Add sepolicy for USB gadget HAL
saranyagopal1 Nov 11, 2019
26baff6
Allow adb over network for user build
YadongQi Dec 11, 2019
6231db2
Fix the sepolicy permissive issue in sw launch
yhe39 Dec 26, 2019
6360664
Upgrading NN-Hal to 1.2
Nagamani71 Jan 21, 2020
d3405c9
Sepolicy Addition for file sharing
taranpreetkaur0013 Feb 25, 2020
a2ccb65
sepolicy: Add permissions for vsock
saranyagopal1 Apr 30, 2020
4d59682
Enable mounting of 9p share partition on fs
sgnanase May 4, 2020
de2d522
Adjust sepolicy change for vulkan
renchenglei May 14, 2020
66a1706
Add sepolicy for recovery UI
zhouji3x May 25, 2020
bad22c1
Add a new property for setting EDID all
Shao-Feng May 27, 2020
7d16c80
Add sepolicy for sensor mediation
JaikrishnaNemallapudi Jun 3, 2020
5fee60a
sepolicy: adb: dbc: Enabling Sepolicy for DbCTTY
prabhatchand Jun 9, 2020
e2d44aa
Fix sepolicy for sensor mediation HAL
JaikrishnaNemallapudi Jun 17, 2020
eb11884
Add sepolicy for hwcomposer and gralloc
renchenglei Jun 11, 2020
9ed051d
Add vendor property for hdmi audio device information
gkdeepa Jun 20, 2020
357997f
Add sepolicy for keybox tool and virtio serial rpmb
yang8621 Jun 1, 2020
ec01968
Remove NN HAL sepolicy
JeevakaPrabu Jul 6, 2020
f8056f4
sepolicy: Add permissions for adding usb-gadget through AAF
saranyagopal1 Jul 7, 2020
950dbd2
Adding AAF support for 9p/pm/gfx
vramyanaidu Jul 17, 2020
7ca0e6a
allow init to create a tmpfs symlink file
ceiba1985 Aug 14, 2020
220bed5
remove the AOSP evs sepolicy rules from intel sepolicy
ceiba1985 Aug 18, 2020
1a38230
Fix sepolicy errors
ceiba1985 Jun 2, 2020
37bd890
Fix issue in load modules
saranyagopal1 Sep 11, 2020
3239328
Enable selinux for android 11 on Celadon
ceiba1985 Sep 21, 2020
b087de5
Re-work sepolicy for graphic driver
renchenglei Sep 21, 2020
4290c92
Update file_contexts
ruanhongfu Sep 17, 2020
eeeb54c
Fix sepolicy issue that blocks CTS
saranyagopal1 Sep 25, 2020
7f66868
Add sepolicy for IA hwcomposer on CIV
renchenglei Sep 26, 2020
b6f6436
Fix sepolicy issue for SW rendering on Android R
renchenglei Oct 14, 2020
8eef71e
Add gatekeeper HAL sepolicy
yang8621 Oct 16, 2020
87c576f
Remove not used graphics vendor property
JeevakaPrabu Oct 30, 2020
63a4aff
Update persist.thermal property name
JeevakaPrabu Oct 20, 2020
404bda5
Add sepolicy for checkavx script
amritaintel Oct 21, 2020
689d5cd
Add sepolicies for use with Openvino 2020.4
JeevakaPrabu Sep 3, 2020
f761c1a
Sepolicy changes for ngraph usage
akodanka Oct 22, 2020
e761b0a
Adding sepolicy for screenshot module failure
rprajapx Oct 11, 2020
99119f7
provide rw permissions for sysfs
bkothapx Oct 9, 2020
9b632a2
CIV: Gpu service rule added in sepolicy
vdanix Oct 29, 2020
d76ea9f
Fix neverallow vendor violators
rvuyyurx Oct 6, 2020
c629ee6
sepolicy: Change role property to vendor namespace
saranyagopal1 Dec 5, 2018
596b409
Remove system writes vendor properties
kpatibax Nov 20, 2020
b9a72f1
remove data_between_core_and_vendor_violators in mesa.
yuanzhel Sep 4, 2019
6b3e71b
Remove not needed sepolicy causing ATS test case failure
JeevakaPrabu Sep 4, 2019
5dc938b
delete vold and ueventd from data_between_core_and_vendor_violators
ceiba1985 Sep 5, 2019
ac11b85
Sepolicy changes for using Power HAL AIDL
shwethabolumbu Dec 18, 2020
730989f
Add allocator & mapper 4.0 sepolicy
renchenglei Dec 16, 2020
f1bcca7
add read permission to sysfs
dyang23 Dec 23, 2020
60013da
Remove rule for dumpstate_dropbox and logsvc
bkothapx Nov 20, 2020
6a1a03c
Fix Wifi Enable issue on R on top of below change
bkothapx Dec 8, 2020
1951305
Add sepolicy for iris driver
renchenglei Jan 6, 2021
1373b98
add right sepolicy for audio property
gkdeepa Jan 20, 2021
4d471dd
Adding SELinux policy to fix CTS issue
mbegumx Jan 19, 2021
1555ff6
Rename vendor_property_contexts to fix VTS failures
SaliniVenate Jan 13, 2021
caef6ca
sepolicy for setting fixed performance scale factor
shwethabolumbu Feb 3, 2021
f5b7588
Add sepolicies to set wifi driver and firmware version property
JeevakaPrabu Feb 22, 2021
d0551c6
SEpolicy for ffs_mount script#1076
Feb 16, 2021
55fd8d4
Delete the property_context for persist.adb.tcp.port
SaliniVenate Jan 15, 2021
8376594
Remove not used psdapp
JeevakaPrabu Mar 29, 2021
eae27d8
Remove un-used sepolicy for Virtio GPU
renchenglei Mar 13, 2021
dddf68a
Declare the property type by using AOSP sepolicy macro
ceiba1985 May 27, 2021
d5c424a
Add the sepolicy for the vendor_graphics_gles and debugfs_graphics
yhe39 Jun 24, 2021
6dd1d15
Add right sepolicy for media_codecs property
k-mochi Jul 12, 2021
3f4e9d3
provide rw permissions for sysfs
bkothapx Jul 16, 2021
fe90725
support dedicated data partition
AlonsoChate Jul 29, 2021
5923f33
Add sepolicy for UIO in Hwc Vhal
renchenglei Aug 10, 2021
468f2bf
Added the sepolicy for Agent Service
shuangwan01 Aug 24, 2021
729cf92
Adding a vendor property to extract host_ip address vendor.intel.ipaddr
RajaniRanjan Aug 19, 2021
d3e9473
Add some sepolicy rules for PGP
ceiba1985 Jul 8, 2021
409d308
Add sepolicy rule for PGP
renchenglei Sep 1, 2021
df46f2f
Add sepolicy for vsock socket.
amritaintel Sep 2, 2021
79d4b8e
x86 vts_ltp_test_x86 test fix
vdanix Aug 16, 2021
5fb647c
The ltp test cases are failing because
rprajapx Aug 18, 2021
7b07d84
add sepolicy rules for sensors user build
RajaniRanjan Sep 4, 2021
55062c5
Add some sepolicy rules for Houdini
ceiba1985 Sep 22, 2021
b61b01c
Add sepolicy for Apk video playback
renchenglei Jul 21, 2021
05e59c3
Add sepolicy for video playback
renchenglei Sep 24, 2021
1beeb8d
Renamed usb related properties
tanujtekriwal Mar 18, 2021
9979dc2
Refine the file_contexts of block devices
ceiba1985 Jun 3, 2021
a379be5
Fix vendor sepolicy declaration
tanujtekriwal Sep 23, 2021
68900a1
Enable DRM clearkey auto start on boot
HawieLong Oct 14, 2021
686abde
Add sepolicy for keymaster
cyxlily Nov 1, 2021
45ddac9
Add sepolicy for mediasdk codec2.0
TianmiChen Nov 25, 2021
47cd2b6
Refine codec2.0 sepolicy
TianmiChen Jan 14, 2022
a97d113
for AOSP S (12.0) Houdini Sepolicy
danielphs Jan 26, 2022
9a1a290
Add the sepolicy for the SRIOV boot
yhe39 Feb 8, 2022
238adea
Add sepolicy for virtual ab ota
ceiba1985 Jan 19, 2022
804b24e
Fix the issue that system cannot boot up after factory reset
ceiba1985 Feb 25, 2022
b90dabc
Load sound modules depending on the property set.
padmashree9110 Mar 11, 2022
73d7eb3
upgrading [email protected] to [email protected] in Android_S
RajaniRanjan Mar 2, 2022
c71dd13
Add Vulkan to vendor_ hwcomposer object
weiwushx Mar 10, 2022
156aa17
Adding VHAL properties in sepolicy
gkdeepa Jun 18, 2021
fe67536
Add the sepolicy of sw codec for SRIOV mode
yhe39 Apr 26, 2022
6f8fa02
Add vulkan and libgallium_dri for mesa 22.0.3
lyintel Jun 21, 2022
8ad85c8
Keep separate type/context for aafd
prashanth-intel Jul 5, 2022
a50995f
Added Github Workflows
Jul 20, 2022
efc9501
Revert "upgrading [email protected] to [email protected] in Andro…
rrsenapati1 May 26, 2022
bdeea6f
reverting sensors sepolicy patch to fix neverallow failure
RajaniRanjan Jun 30, 2022
6dd8beb
upgrading [email protected] to [email protected]
RajaniRanjan Aug 25, 2022
842fb5c
Add Trusty metadata sepolicy
Sep 26, 2022
1e3ebbc
Remove debugfs related sepolicy rules
ceiba1985 Sep 26, 2022
a3416bf
Add a license file for intel sepolicy rules
ceiba1985 Nov 3, 2022
1c30b91
add sepolicy for rpc-services
YadongQi May 20, 2022
1f36b5b
Removing all the existing files to start fresh
yerriswa Dec 13, 2022
8fb076c
Moving Sepolicy to mixins to add mixins support to cic_cloud
yerriswa Dec 13, 2022
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 17 additions & 0 deletions .github/workflows/Runchecks.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
---
name: Run CheckApproval CheckBug CheckLint tasks

on:
pull_request:
types: [opened, synchronize, reopened, labeled]
branches: "**"
pull_request_review:
types: [submitted]
branches: "**"
jobs:
TriggerWorkfows:
uses: projectceladon/celadonworkflows/.github/workflows/Triggerall.yml@main
with:
PR_EVENT: ${{ github.event.action }}
PR_URL: https://github.com/${{github.repository}}/pull/${{ github.event.pull_request.number }}
PR_LABEL: ${{ github.event.label.name }}
176 changes: 176 additions & 0 deletions LICENSE
Original file line number Diff line number Diff line change
@@ -0,0 +1,176 @@
Apache License
Version 2.0, January 2022
http://www.apache.org/licenses/

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

1. Definitions.

"License" shall mean the terms and conditions for use, reproduction,
and distribution as defined by Sections 1 through 9 of this document.

"Licensor" shall mean the copyright owner or entity authorized by
the copyright owner that is granting the License.

"Legal Entity" shall mean the union of the acting entity and all
other entities that control, are controlled by, or are under common
control with that entity. For the purposes of this definition,
"control" means (i) the power, direct or indirect, to cause the
direction or management of such entity, whether by contract or
otherwise, or (ii) ownership of fifty percent (50%) or more of the
outstanding shares, or (iii) beneficial ownership of such entity.

"You" (or "Your") shall mean an individual or Legal Entity
exercising permissions granted by this License.

"Source" form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation
source, and configuration files.

"Object" form shall mean any form resulting from mechanical
transformation or translation of a Source form, including but
not limited to compiled object code, generated documentation,
and conversions to other media types.

"Work" shall mean the work of authorship, whether in Source or
Object form, made available under the License, as indicated by a
copyright notice that is included in or attached to the work
(an example is provided in the Appendix below).

"Derivative Works" shall mean any work, whether in Source or Object
form, that is based on (or derived from) the Work and for which the
editorial revisions, annotations, elaborations, or other modifications
represent, as a whole, an original work of authorship. For the purposes
of this License, Derivative Works shall not include works that remain
separable from, or merely link (or bind by name) to the interfaces of,
the Work and Derivative Works thereof.

"Contribution" shall mean any work of authorship, including
the original version of the Work and any modifications or additions
to that Work or Derivative Works thereof, that is intentionally
submitted to Licensor for inclusion in the Work by the copyright owner
or by an individual or Legal Entity authorized to submit on behalf of
the copyright owner. For the purposes of this definition, "submitted"
means any form of electronic, verbal, or written communication sent
to the Licensor or its representatives, including but not limited to
communication on electronic mailing lists, source code control systems,
and issue tracking systems that are managed by, or on behalf of, the
Licensor for the purpose of discussing and improving the Work, but
excluding communication that is conspicuously marked or otherwise
designated in writing by the copyright owner as "Not a Contribution."

"Contributor" shall mean Licensor and any individual or Legal Entity
on behalf of whom a Contribution has been received by Licensor and
subsequently incorporated within the Work.

2. Grant of Copyright License. Subject to the terms and conditions of
this License, each Contributor hereby grants to You a perpetual,
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
copyright license to reproduce, prepare Derivative Works of,
publicly display, publicly perform, sublicense, and distribute the
Work and such Derivative Works in Source or Object form.

3. Grant of Patent License. Subject to the terms and conditions of
this License, each Contributor hereby grants to You a perpetual,
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
(except as stated in this section) patent license to make, have made,
use, offer to sell, sell, import, and otherwise transfer the Work,
where such license applies only to those patent claims licensable
by such Contributor that are necessarily infringed by their
Contribution(s) alone or by combination of their Contribution(s)
with the Work to which such Contribution(s) was submitted. If You
institute patent litigation against any entity (including a
cross-claim or counterclaim in a lawsuit) alleging that the Work
or a Contribution incorporated within the Work constitutes direct
or contributory patent infringement, then any patent licenses
granted to You under this License for that Work shall terminate
as of the date such litigation is filed.

4. Redistribution. You may reproduce and distribute copies of the
Work or Derivative Works thereof in any medium, with or without
modifications, and in Source or Object form, provided that You
meet the following conditions:

(a) You must give any other recipients of the Work or
Derivative Works a copy of this License; and

(b) You must cause any modified files to carry prominent notices
stating that You changed the files; and

(c) You must retain, in the Source form of any Derivative Works
that You distribute, all copyright, patent, trademark, and
attribution notices from the Source form of the Work,
excluding those notices that do not pertain to any part of
the Derivative Works; and

(d) If the Work includes a "NOTICE" text file as part of its
distribution, then any Derivative Works that You distribute must
include a readable copy of the attribution notices contained
within such NOTICE file, excluding those notices that do not
pertain to any part of the Derivative Works, in at least one
of the following places: within a NOTICE text file distributed
as part of the Derivative Works; within the Source form or
documentation, if provided along with the Derivative Works; or,
within a display generated by the Derivative Works, if and
wherever such third-party notices normally appear. The contents
of the NOTICE file are for informational purposes only and
do not modify the License. You may add Your own attribution
notices within Derivative Works that You distribute, alongside
or as an addendum to the NOTICE text from the Work, provided
that such additional attribution notices cannot be construed
as modifying the License.

You may add Your own copyright statement to Your modifications and
may provide additional or different license terms and conditions
for use, reproduction, or distribution of Your modifications, or
for any such Derivative Works as a whole, provided Your use,
reproduction, and distribution of the Work otherwise complies with
the conditions stated in this License.

5. Submission of Contributions. Unless You explicitly state otherwise,
any Contribution intentionally submitted for inclusion in the Work
by You to the Licensor shall be under the terms and conditions of
this License, without any additional terms or conditions.
Notwithstanding the above, nothing herein shall supersede or modify
the terms of any separate license agreement you may have executed
with Licensor regarding such Contributions.

6. Trademarks. This License does not grant permission to use the trade
names, trademarks, service marks, or product names of the Licensor,
except as required for reasonable and customary use in describing the
origin of the Work and reproducing the content of the NOTICE file.

7. Disclaimer of Warranty. Unless required by applicable law or
agreed to in writing, Licensor provides the Work (and each
Contributor provides its Contributions) on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
implied, including, without limitation, any warranties or conditions
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
PARTICULAR PURPOSE. You are solely responsible for determining the
appropriateness of using or redistributing the Work and assume any
risks associated with Your exercise of permissions under this License.

8. Limitation of Liability. In no event and under no legal theory,
whether in tort (including negligence), contract, or otherwise,
unless required by applicable law (such as deliberate and grossly
negligent acts) or agreed to in writing, shall any Contributor be
liable to You for damages, including any direct, indirect, special,
incidental, or consequential damages of any character arising as a
result of this License or out of the use or inability to use the
Work (including but not limited to damages for loss of goodwill,
work stoppage, computer failure or malfunction, or any and all
other commercial damages or losses), even if such Contributor
has been advised of the possibility of such damages.

9. Accepting Warranty or Additional Liability. While redistributing
the Work or Derivative Works thereof, You may choose to offer,
and charge a fee for, acceptance of support, warranty, indemnity,
or other liability obligations and/or rights consistent with this
License. However, in accepting such obligations, You may act only
on Your own behalf and on Your sole responsibility, not on behalf
of any other Contributor, and only if You agree to indemnify,
defend, and hold each Contributor harmless for any liability
incurred by, or claims asserted against, such Contributor by reason
of your accepting any such warranty or additional liability.

END OF TERMS AND CONDITIONS
1 change: 1 addition & 0 deletions audio/surfaceflinger.te
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
allow surfaceflinger hal_graphics_allocator_default_tmpfs:file { read write map };
Empty file added cic_cloud/bootanim.te
Empty file.
1 change: 1 addition & 0 deletions cic_cloud/dumpstate.te
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
allow dumpstate proc_slabinfo:file r_file_perms;
14 changes: 14 additions & 0 deletions cic_cloud/file_contexts
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
/dev/dri(/.*)? u:object_r:gpu_device:s0
/android-entry u:object_r:rootfs:s0
/[^/]+\.img u:object_r:rootfs:s0
/ipc(/.*)? u:object_r:rootfs:s0
/cmdline u:object_r:rootfs:s0
/proc/cmdline u:object_r:proc_cmdline:s0
/SwiftShader.ini u:object_r:rootfs:s0

/(vendor|system/vendor)/bin/hw/android\.hardware\.sensors@[0-9]+.?[0-9]*-service.intel u:object_r:hal_sensors_default_exec:s0

# copy /system/etc to /etc instead of useing symbolic link
# Docker will remove the /etc link and create a directory to override some files
# such as /etc/hosts, /etc/hostname, etc.
/etc(/.*)? u:object_r:system_file:s0
5 changes: 5 additions & 0 deletions cic_cloud/genfs_contexts
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
#genfscon sysfs /devices/pci0000:00/0000:00:02.0/ u:object_r:sysfs_app_readable:s0


#genfscon binder / u:object_r:binderfs:s0
#genfscon proc /slabinfo u:object_r:proc_slabinfo:s0
26 changes: 26 additions & 0 deletions cic_cloud/init.te
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
allow init kernel:file write;
allow init binderfs:chr_file setattr;
allow init binderfs:dir search;
allow init binderfs:file r_file_perms;
#allow init system_file:lnk_file relabelto;
#allow init vendor_file:lnk_file relabelto;
#allow init rootfs:{ dir file lnk_file } relabelto;
#allow init vendor_file:dir relabelto;
allow init cgroup:dir relabelto;
allow init kernel:key search;

# binfmt_misc: mount at /proc/sys/fs/binfmt_misc
allow init proc:dir mounton;
allow init binfmt_miscfs:dir mounton;

# binfmt_misc: register types
allow init binfmt_miscfs:file write;

# write /dev/cpuctl/cpu.rt_period_us
#allow init cpuctl_device:file create_file_perms;

# restorecon /dev/__properties__
allow init device:dir relabelfrom;

# chown /proc/slabinfo
allow init proc_slabinfo:file setattr;
1 change: 1 addition & 0 deletions cic_cloud/netd.te
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
allow netd usermodehelper:file r_file_perms;
4 changes: 4 additions & 0 deletions cic_cloud/permissive.te
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
allow rootfs labeledfs:filesystem associate;
allow cgroup labeledfs:filesystem associate;
allow oemfs labeledfs:filesystem associate;
allow proc_cmdline labeledfs:filesystem associate;
1 change: 1 addition & 0 deletions cic_cloud/vendor_init.te
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
allow vendor_init file_contexts_file:file map;
1 change: 1 addition & 0 deletions graphics/adbd.te
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
allow adbd hal_graphics_allocator_default_tmpfs:file { read write };
4 changes: 4 additions & 0 deletions graphics/app.te
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
allow appdomain hal_graphics_allocator_default_tmpfs:file { read write map };
allow appdomain binderfs:dir search;
allow appdomain binderfs:chr_file rw_file_perms;
allow appdomain gpu_device:dir r_dir_perms;
3 changes: 3 additions & 0 deletions graphics/domain.te
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
allow domain binderfs:chr_file rw_file_perms;
allow domain gpu_device:dir r_dir_perms;
allow domain binderfs:dir search;
1 change: 1 addition & 0 deletions graphics/file.te
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
typeattribute hal_graphics_allocator_default_tmpfs mlstrustedobject;
3 changes: 3 additions & 0 deletions graphics/hal_graphics_composer_default.te
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
allow hal_graphics_composer_default rootfs:sock_file write;
allow hal_graphics_composer_default kernel:unix_stream_socket connectto;

3 changes: 3 additions & 0 deletions graphics/system_server.te
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
allow system_server hal_graphics_allocator_default_tmpfs:file { read write map };
allow system_server binderfs:dir search;
allow system_server shell_data_file:file map;
26 changes: 26 additions & 0 deletions media/mediacodec.policy
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
# Copyright (C) 2017 The Android Open Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

# Required by OMX
pselect6: 1
epoll_create1: 1
epoll_ctl: 1
vfork: 1
execve: 1
wait4: 1
epoll_pwait:1
dup3:1

# Required by libvpl
getcwd: 1
1 change: 1 addition & 0 deletions media/mediacodec.te
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
allow mediacodec hal_graphics_allocator_default_tmpfs:file { read write map };
1 change: 1 addition & 0 deletions media/mediaserver.te
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
allow mediaserver hal_graphics_allocator_default_tmpfs:file { read write map };
15 changes: 15 additions & 0 deletions sensor/sensor_hal_default.te
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
allow hal_sensors_default self:socket create_socket_perms;
allowxperm hal_sensors_default self:socket ioctl unpriv_sock_ioctls;
allow hal_sensors_default serial_device:chr_file rw_file_perms;

userdebug_or_eng(`
permissive hal_sensors_default;
dontaudit hal_sensors_default default_prop:file read;
dontaudit hal_sensors_default hal_sensors_default:tcp_socket { create read write connect name_connect getopt setopt };
')
#allowxperm hal_sensors_default self:can_socket ioctl {
# SIOCGIFINDEX
# SIOCSIFNAME
# SIOCSIFFLAGS
#};

2 changes: 2 additions & 0 deletions wifi/hal_wifi_default.te
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
# WiFi emulation
allow hal_wifi_default self:netlink_route_socket { create_socket_perms_no_ioctl nlmsg_read };