Commit graph

2260 commits

Author SHA1 Message Date
Jaihind Yadav
0ad82e0e41 Revert "sepolicy: priv_app is no longer client of hal_perf."
This reverts commit ccc837d327.

Change-Id: If69d4a4b27e7b6d69c2ee0dabd5d41d4c4429f98
2018-12-18 02:04:13 -08:00
Jaihind Yadav
672e3dbde7 sepolicy: removing legacy target dir.
this target is no longer would be supported on this compponent.
So removing it.

Change-Id: I70c96a029a476c8067182bdd6dbb0b25d683791a
2018-12-18 12:45:20 +05:30
qctecmdr Service
70e43bc400 Merge "Add macro for framework type detection module" 2018-12-17 01:09:00 -08:00
Jaihind Yadav
ccc837d327 sepolicy: priv_app is no longer client of hal_perf.
Due to newrestriction priv_app can't access cgroup.
And priv_app is client of hal_perf, so had to remove it.

Change-Id: Idb17f438e06bdd71df235072eec4973556ce09d0
2018-12-14 18:48:08 +05:30
Smita Ghosh
0f0c42fe37 Add OTA support for multiimgoem
update_engine needs rw access to each of the partitions that needs to
be updated by OTA.

Change-Id: Id3af536cebd2e280abf89443cb9ac445e009aa7d
2018-12-12 18:42:46 -08:00
David Ng
8546ead68d Add macro for framework type detection module
Add permissions needed for clients to use the
vendor framework detection library module.  All
native clients using the framework detection
module must use the macro for their domain.

The existing permission needs are empty
(already part of domain) but added placeholder
to allow any underlying mechanism changes that
may require new permissions.

Change-Id: I88de640608e673a77a357afce11af8cb4d01e2d9
2018-12-07 12:37:19 -08:00
Linux Build Service Account
4327d05bdd Merge "sepolicy: kernel.te: Add qipcrtr_socket permissions" into sepolicy.lnx.5.9 2018-12-06 09:15:08 -08:00
Chris Lew
e0eb6bb836 sepolicy: kernel.te: Add qipcrtr_socket permissions
Give kernel permissions to create qipcrtr_socket which is used for
diag and kernel qmi.

Change-Id: Id7911a882ea39b9dc84344f38466e845aef3dbd8
2018-12-04 16:30:52 -08:00
Eric Chang
9413225997 selinux: Add policy for rild to add IWlan HAL.
Change-Id: Ife3b1197be06593aae1eb031f79ca64c513d8b6e
2018-11-27 13:35:49 -08:00
Hemant Gupta
c21eb88d4b sepolicy : Address BT denials resulting in error popups
Address BT denials resulting in error popups.

Change-Id: Ifba5c183739663113dd58814fbf445ae51cefd77
2018-11-27 16:21:06 +05:30
Ravi Kumar Siddojigari
4106db5b4f sepolicy : cleanup and misc denials addressed .
as part of bringup addressed misc denials and code cleanup

Change-Id: Ifba5c183739663113dd58814fbf445ae51cefe77
2018-11-15 22:25:34 -08:00
Vara Prasad A V S G
1287d1c879 sepolicy : remove system_writes_vendor_properties_violators
As part of treble system /core services are not allowed  to
set vendor property .

if Property defined is part of system image then it can be set
or get by core/system services provided we define the property
as extended_core_property_type. So adding this to the property
that are added by vendor and used by core/system services.

Change-Id: I7ad8bc562be09126c082fc54f52499f5138fea5b
2018-11-15 03:41:05 -08:00
Siddeswar Aluganti
69f3ff2c7d Fix build errors.
Change-Id: If024d9253ad12fcbeab755f1e77421ec20f28b95
2018-11-14 14:37:31 -08:00
Siddeswar Aluganti
424bfd1ce2 Fix build error.
Change-Id: I96aef4e64d51c4d5f7bb10a1d9a91a468d230107
2018-11-13 15:25:23 -08:00
David Ng
f555172e7b Add JTAG console labeling (hvc0) and fix generic/vendor/test
Add console labeling for JTAG console device.  Debug builds only
as not expecting console via JTAG in a commercial configuration.

Fix generic/vendor/test policy pickup.

Change-Id: I03257ad59f7b4f41680da3942606dd40c147bcbf
2018-11-08 18:40:06 -08:00
mraja
b2fbfd7d3a sepolicy: following the AOSP model to label the nodes.
sdd node was labeled as ssd_Device for some target but ssd_block_device for other.
So making it unique across all target.

Change-Id: I1248585c0c6ab33fbc9daaa8d0ab8d6299ec2fb8
2018-11-02 18:17:29 +05:30
Ravi Kumar Siddojigari
ddf399906e sepolicy :[2/2] fix system_file_type and get_prop for coredomians.
As part of new AOSP restriction all the domains which are working
from system partation should have "system_file_type" attribute
else will lead to compile time failure .
For reading / setting any property  we should be using
following macros .
set_prop( domain, property_label)
get_prop( domain, property_label)

So addressing  these as part of new requirments .
Change-Id: Ie7a9c72994f3a1a62f8cf70d40a3a56d494a1726
2018-11-02 14:21:31 +05:30
Ravi Kumar Siddojigari
59906d1904 sepolicy : cleanup of duplicate rules #1
domain.te already had given access to

r_dir_file({domain - isolated_app}, sysfs_soc);
r_dir_file({domain - isolated_app}, sysfs_esoc);
r_dir_file({domain - isolated_app}, sysfs_ssr);
r_dir_file({domain - isolated_app}, sysfs_thermal);

so removing all the duplicate rules covering this
Change-Id: Ic74a8c62a81567dbe5bfc69f691bc2239565ba5f
2018-11-02 01:21:27 -07:00
Jaihind Yadav
f90c624e54 sepolicy: fix system_file_type and get_prop for coredomians.
As part of new AOSP restriction all the domains which are working
from system partation should have "system_file_type" attribute
else will lead to compile time failure .

For reading / setting any property  we should be using
following macros .
set_prop( domain, property_label)
get_prop( domain, property_label)

So addressing  these as part of new requirments .

Change-Id: I6ef373404640f285a57484024665a42f615ce863
2018-11-02 01:21:04 -07:00
Jaihind Yadav
fd253c8e33 sepolicy: changes needed to get the target boot to UI.
Adding the label to services/daemon which was not getting started due to
incorrect label and add the sepolicy rules to get the target to boot
 in enfrocing mode.

Change-Id: I12fc4bfe38153cd51fb2d9b869f05a06c9d2c61f
2018-11-01 15:47:55 -07:00
Jaihind Yadav
07a6077476 sepolicy: inital commit for seperation of generic to qva
restructuring dir sturcture.
    adding support of upcomming target.

Change-Id: I6b23e7c0c8bed79146b29c681c7ef1f5311e1234
2018-10-31 17:47:16 +05:30
Murtuza Raja
a6efa300ce Fix compilation errors for a new SP
-Remove violating sepolicy rules
-Several sepolicy rules are violating new neverallow rules
-Rename mediacodec to hal_omx_server

Change-Id: I92e46378092f14b7ceab9b946207f006ce0e2611
2018-10-09 11:42:28 +05:30
Tharun Kumar Merugu
7afc43d8da Sepolicy: Add sysfs L3 permissions to init_shell domain on SDM710
Cdsprpcd domain listens to L3 clock requests from CDSP and votes
for CPU L3 frequency via sysfs_devfreq_l3cdsp node. The change
allows init shell to modify l3-cdsp governor to userspace
facilitating Cdsprpcd daemon in voting for L3 clock on SDM710.

Change-Id: Icf8c4a3e6ff282e0204317a33dd79d1fa67bd804
2018-09-30 21:22:54 +05:30
Linux Build Service Account
6bc46b9a25 Merge "sepolicy: add domain for sysmonapp applications" 2018-09-29 00:24:20 -07:00
Linux Build Service Account
4919ce2c49 Merge "sepolicy: add policy file for USTA test app" 2018-09-27 19:04:02 -07:00
Tharun Kumar Merugu
3fd09c4fd0 sepolicy: add domain for sysmonapp applications
Add a domain with necessary permissions for sysmonapp applications
signed using the certificate provided.

Change-Id: Id61eb7e263cf83724305eda624fb06c2df5ac555
2018-09-27 17:19:31 +05:30
Shaikh Shadul
4919e7e29b sepolicy: add policy file for USTA test app
USTA is a system app which interacts with fastRPC to communicate
to SLPI. There are changes in fastRPC to access require DAC and MAC
permissions, required only by USTA test app. Adding separate domain
for USTA app.

Change-Id: I89c1beff1c10d341e678f7ae654dc16d2c184a83
2018-09-25 17:30:33 +05:30
Ravi Kumar Siddojigari
245caecf01 sepolicy : add permission to read “ ro.vendor.build.security_patch"
Compliance testing expected to check this property value and this
is public readable property so adding all domain read access.

Change-Id: I6bf54f8d3e36abff5d7be698b6af5517347fb733
2018-09-24 23:53:38 -07:00
Linux Build Service Account
7cfcfce1b5 Merge "sepolicy for all IGnss/ILocHidl services" 2018-09-24 14:15:49 -07:00
Baili Feng
f68d9350d9 sepolicy for all IGnss/ILocHidl services
Change-Id: I9fa8be7d18a9be27f4591ddadf91d80eb1460b24
CRs-Fixed: 2215791
2018-09-20 11:30:29 -07:00
Smita Ghosh
b4ab913dbe Add sepolicy rule for sysfs_ssr
Change-Id: I8f50fcda192bef3aaab534bc097f8b152fe8bc52
2018-09-20 05:40:34 -07:00
Hans Chang
90bfed3b79 Added msm8996 and files
Change-Id: I1a558eeb9d8b0c2fb39d1307581d6c4b2fbdb93a
Signed-off-by: Hans Chang <hansc@codeaurora.org>
2018-09-11 17:05:39 -07:00
Mukul Sharma
7097824b33 sepolicy: Add vendor wifi prop in vendor partition access
Due to never allow for wifi_prop, vendor process cannot
access the system wifi_prop property. But in certain
scenario other process need it. Hence add a support of
same.

Change-Id: I6648e0e038888e79bee5f987bc584ad126924a66
CRs-fixed: 2293118
2018-09-04 12:44:09 +05:30
Mao Jinlong
4145969d92 init_shell: Add set_prop policy to alarm_boot property
Init shell need to set alarm boot property to indicate that if the
boot-up is triggered by rtc alarm.

Change-Id: I0d692b1f92695b399e73021eb84bda2dda6142eb
2018-08-29 10:57:42 +08:00
Ramkumar Radhakrishnan
b3cb68136e sepolicy: Removal of hal_display_config attributes
1. Remove hal_display_config attributes and replace it with
   hal_graphics_composer.
2. Provide permissions to all hal_graphics_composer client to access
   hal_display_config service.

Change-Id: I6c91dbe8797d6ffe47f99e21b810f7ac72503f02
CRs-Fixed: 2287704
2018-08-27 16:39:42 -07:00
Aditya Nellutla
f9f6d1d504 sepolicy: White list vendor specific graphics properties
This change adds new graphics vendor properties and fixes
permissions to resolve sepolicy denials.

Change-Id: Ibcf25e680ccd9b56607f6520fe712a78b3f93a9d
2018-08-21 16:38:26 +05:30
Ramkumar Radhakrishnan
51f8af3330 sepolicy: Allow system graphics to access pmic secure_mode nodes
Change-Id: I9fc932d76f9eceb157c0b48cf1d666cde6b55e59
CRs-Fixed: 2289554
2018-08-13 10:49:49 -07:00
Kiran Gunda
ca6a427fa6 vendor: sdm845: add lcd_bias node for sepolicy
Add lcd_bias nodes for common sepolicy rules.

Change-Id: I32ef96235ca3091d28744d9fd0143d7e2fb1fcf6
Signed-off-by: Kiran Gunda <kgunda@codeaurora.org>
2018-08-11 15:19:44 +05:30
Ruthwar Ambeer
8c6e09b1b3 Allow rild to get qmuxd_socket create permissions.
This change is to add sepolicy rules to get create
permissions for qmux_socket.

Change-Id: Ifc9665d5451c1887a725a032807f225efefb4a10
CRs-Fixed: 2287953
2018-08-09 17:42:33 +05:30
Linux Build Service Account
f12882015a Merge "vendor: sdm845: add spmi devices file permission context to genfs_contexts" 2018-08-08 09:43:51 -07:00
Linux Build Service Account
05c41a75c5 Merge "sepolicy: Add sepolicies for LED sysfs nodes" 2018-08-07 22:09:37 -07:00
Abhishek Arpure
eae684795b Remove unused property "ro.build.software.version"
"ro.build.software.version" is not getting set anymore.
Its presence in property_context is causing VNDK failure.

Remove it to fix testVendorPropertyNamespace failure.

Change-Id: Icaf8c4e1195b10712208bb5a331572ce78243560
2018-08-06 15:15:55 +05:30
Linux Build Service Account
4db54b7b2f Merge "sepolicy: setting secontext to rtc node" 2018-08-03 04:05:30 -07:00
Linux Build Service Account
dd818b92c4 Merge "Sepolicy: Allow processes to access new restricted DSP device node" 2018-08-01 13:06:20 -07:00
Tharun Kumar Merugu
aec6e0f2ec Sepolicy: Allow processes to access new restricted DSP device node
Allow the known processes to offload to ADSP / SLPI using the new
device node.

Change-Id: Icaf8c4e1195b10711208bb5a331572ce78143560
2018-08-01 17:31:47 +05:30
Linux Build Service Account
7afdc18d5e Merge "sepolicy: Fix for rild vndk compliance" 2018-07-31 19:18:23 -07:00
Shshank Sharma
03e13e5fdc sepolicy: Fix for rild vndk compliance
CRs-Fixed: 2284930
Change-Id: Ie90f051a80b0aaf0eb0cd3b437eec439177054d1
2018-07-31 13:52:10 -07:00
Linux Build Service Account
0806a528fc Merge "sepolicy: Add permission to read BD address from modem NV" 2018-07-31 12:51:25 -07:00
Linux Build Service Account
77d4317950 Merge "sepolicy: Add property context for vendor GPU frequencies" 2018-07-31 12:51:24 -07:00
Jaihind Yadav
9b975284c7 sepolicy: setting secontext to rtc node
Change-Id: I6b7bb083d995e028bef17ccddc519cdb06cea377
2018-07-31 12:08:05 +05:30