Commit graph

3243 commits

Author SHA1 Message Date
Sean Tranchetti
c3e415cb69 sepolicy: allow netmgrd to access qmipriod properties
Allows netmgr to control starting/stopping the qmipriod daemon via
setting the relevant android properties.

Change-Id: I35d9af93ff565bddc4813eef8ad36db896d4a400
2020-03-27 14:30:00 -06:00
Sean Tranchetti
c373d9978c sepolicy: create initial sepolicy for qmipriod
Creates the initial sepolicy to allow for the qmipriod binary to be
launched on init, as well as access the needed resources.

Change-Id: Ib3c9d1b62148a370ff8bc80598dd550291b2c776
2020-03-27 14:29:14 -06:00
Sayali Lokhande
4d86cb2738 sepolicy : Allow kernel to search debugfs_mmc dir
Debugfs is failed to be initialized because of the denial below.
Add selinux policy to fix it.
avc: denied { search } for comm="kworker/0:1" name="mmc0"
dev="debugfs" ino=6562 scontext=u:r:kernel:s0
tcontext=u:object_r:debugfs_mmc:s0 tclass=dir permissive=0

CRs-Fixed: 2636489
Change-Id: I831a363d448b3efe11960c3937b04dbca80d37f3
2020-03-25 23:02:57 -07:00
qctecmdr
f2ce4398c2 Merge "Update telephony SELinux policies to avoid name collision." 2020-03-25 13:55:36 -07:00
Garik Badalyan
bb15e90b05 Update telephony SELinux policies to avoid name collision.
-Update telephony SELinux policies to avoid name collision
in future.
-Remove old unused telephony SELinux labels.

Change-Id: I60224d6a34d95c853b7ad32a17ecbce4b7b9b204
CRs-Fixed: 2644933
2020-03-23 13:27:33 -07:00
Sreelakshmi Gownipalli
51359b97ab diag: Add support for connecting to diag via unix sockets
Add support to connect to diag unix socket from diag vendor clients.

Change-Id: I65f8738e0473fe1bdbbf369a8f60e86e6c2f8284
2020-03-23 07:40:45 -07:00
Linux Build Service Account
9c613c7409 Merge "secpolicy: add HAL support for SPU" into sepolicy.lnx.6.0 2020-03-23 06:14:13 -07:00
Linux Build Service Account
5da10e3224 Merge "sepolicy: Enable secure_element 1.2 HAL service" into sepolicy.lnx.6.0 2020-03-23 06:14:12 -07:00
Linux Build Service Account
4118b742f5 Merge "sepolicy: Define new policy rule to read gpu model" into sepolicy.lnx.6.0 2020-03-23 06:13:12 -07:00
Liron Daniel
08e7c09ca3 secpolicy: add HAL support for SPU
Support v1.0 of SPU HAL which is served by vendor.qti.spu@1.0-server.
This is needed in order to support 3rd party spcom operations.

Change-Id: If2cc4f8b478fc3bceb78ad9becbdd5a1b9417266
2020-03-22 23:08:10 +02:00
Indranil
ec0008b8f6 sepolicy: Add rules for WFD App
-- add rules to enable WFD functionality

Change-Id: Ifa3936a96b42cd597e262173df4d19819d7a7d60
2020-03-20 12:05:29 -07:00
Linux Build Service Account
5d80ff03be Merge "Update device sepolicy rules for NN HAL 1.3" into sepolicy.lnx.6.0 2020-03-20 03:06:08 -07:00
Bhuvan Varshney
96b2bcba10 sepolicy: Enable secure_element 1.2 HAL service
secure_element HAL 1.2 service is required to be
invoked from the boot.

Added entry for secure_element HAL 1.2 service.

Change-Id: I8ba27a5521d5809dcdd6c8f6f7a63286cccc431d
2020-03-19 21:16:30 -07:00
kranthi
dbe56c1472 sepolicy: Define new policy rule to read gpu model
Add  a new file context label for gpu_model sysfs entry. allowed read
access to that entry.
Addressing the following denials :
type=1400 audit(0.0:62): avc: denied { read } for
name="gpu_model" dev="sysfs" ino=78734 scontext=u:r:mediaserver:s0
tcontext=u:object_r:vendor_sysfs_kgsl:s0 tclass=file permissive=0
type=1400 audit(0.0:88): avc: denied { read } for name="gpu_model"
dev="sysfs" ino=78734 scontext=u:r:platform_app:s0:c512,c768
tcontext=u:object_r:vendor_sysfs_kgsl:s0 tclass=file permissive=0 app=com.android.systemui
type=1400 audit(0.0:100): avc: denied { read }
for name="gpu_model" dev="sysfs" ino=78734 scontext=u:r:priv_app:s0:c512,c768
tcontext=u:object_r:vendor_sysfs_kgsl:s0 tclass=file permissive=0
app=com.android.launcher3

Change-Id: I9e1b9ffbb88ea62b4cc530564d811d7cfc640bbc
2020-03-19 14:16:40 +05:30
qctecmdr
44d5a4d12a Merge "sepolicy: Add sepolicy rules for qseecom hal" 2020-03-18 22:44:28 -07:00
qctecmdr
c2740d3582 Merge "sepolicy for imscmservice hal" 2020-03-18 22:44:28 -07:00
Alex Kuoch
1e2814c890 Update device sepolicy rules for NN HAL 1.3
Change-Id: Iaa6c1251cd3156887b58cf73ce565fb8a749af41
2020-03-18 14:42:41 -04:00
Shawn Shin
6c80bcc5f2 sepolicy: qcc: move QCC to system-ext partition
qdmastatsd renamed to qcc_trd and qdma renamed to qcc
vendor_ prefixed

CRs-fixed: 2605804
Change-Id: I55b699228bcf46de57c2dc019fac80bcc55424a1
2020-03-18 09:20:50 -07:00
Anmolpreet Kaur
0bf77a4ae8 sepolicy: Add sepolicy rules for qseecom hal
Add new policy for QSEECom HIDL implementation
which makes qseecom available to system processes.

Change-Id: I2d47148c7f9f01a01d7595575842b08585ea2907
2020-03-18 02:01:21 -07:00
Ayishwarya Narasimhan
0a530f0119 sepolicy for imscmservice hal
Change-Id: I673c43e91da3b66d685a994fe0718dbb1948bc35
2020-03-17 09:49:16 -07:00
qctecmdr
7f04ba192b Merge "sepolicy: Allow audio hal to access bluetooth property" 2020-03-17 03:38:00 -07:00
qctecmdr
047f367ee8 Merge "sepolicy: Add read dir permission to hal_bootctl.te" 2020-03-17 03:38:00 -07:00
Naval Saini
8778599f9d sepolicy: Allow audio hal to access bluetooth property
Allow audio hal to access(read) bluetooth persist property

CRs-Fixed: 2620572
Change-Id: I6663a262bfd41ca1de8af8f743e319133045fe17
2020-03-15 23:12:18 -07:00
qctecmdr
db681779a2 Merge "sepolicy: Allow RPMB service and recovery access bsg device driver nodes" 2020-03-13 05:21:51 -07:00
himta ram
320c36231c sepolicy: move the FM sepolicy rules to product
Created the new domain for FM.
Moved the FM sepolicy rules to product.

CRs-Fixed: 2641193
Change-Id: I3cfe84dbe93c108124475a3e3825f7f80b5f6e57
2020-03-13 05:03:36 -07:00
Linux Build Service Account
406b8c8f27 Merge "ims : add tipc socket permission rule" into sepolicy.lnx.6.0 2020-03-12 21:59:52 -07:00
Linux Build Service Account
8f46b09fe4 Merge "sepolicy: add policy for qseecom hal" into sepolicy.lnx.6.0 2020-03-12 21:59:52 -07:00
Linux Build Service Account
eefb643ced Merge "sepolicy: adding protected_hwservice attr to hwservice." into sepolicy.lnx.6.0 2020-03-12 21:58:52 -07:00
Linux Build Service Account
42a45deb47 Merge "sepolicy: add permissions for devfreq nodes on lahaina" into sepolicy.lnx.6.0 2020-03-12 21:58:51 -07:00
Linux Build Service Account
3e1af0ab46 Merge "sepolicy: WFD app sepolicy change" into sepolicy.lnx.6.0 2020-03-12 04:30:50 -07:00
Linux Build Service Account
18b5882707 Merge "atoll: Add sepolicy for gralloc and vulkan lib" into sepolicy.lnx.6.0 2020-03-12 04:30:39 -07:00
Linux Build Service Account
b465dbb1ae Merge "Sepolicy: Allow socket creation, permission to access IOP/servtracker." into sepolicy.lnx.6.0 2020-03-12 02:06:36 -07:00
Linux Build Service Account
d7beb87069 Merge "Adding Kill capability to perf hal service." into sepolicy.lnx.6.0 2020-03-11 19:00:38 -07:00
Amir Vajid
f5411bea95 sepolicy: add permissions for devfreq nodes on lahaina
Add permissions to access devfreq dcvs nodes on lahaina.

Change-Id: Idc5a192699a697cc8c2e7a2ae1119215a93b407f
2020-03-11 17:52:09 -07:00
Jaihind Yadav
6d99179f63 sepolicy: adding protected_hwservice attr to hwservice.
Change-Id: Ic929f39a894cc86572fb55c53bd4d1e1e82306d7
2020-03-11 05:43:21 -07:00
Linux Build Service Account
24fba3f75d Merge "sepolicy: Install modules to sys-ext partition" into sepolicy.lnx.6.0 2020-03-11 04:34:52 -07:00
Indranil
2835c026a5 sepolicy: Install modules to sys-ext partition
Change-Id: I8c91c1a45c3e932861fca2873a2eaa9652ac6d30
2020-03-10 23:04:46 -07:00
qctecmdr
3e01e5c665 Merge "sepolicy: add sepolicy label for charge_pump" 2020-03-10 20:35:04 -07:00
Linux Build Service Account
e5489dfaa0 Merge "sepolicy: give se policy permission to npu dcvs nodes" into sepolicy.lnx.6.0 2020-03-10 19:59:05 -07:00
Manoj Basapathi
bfa6c2ffe5 ims : add tipc socket permission rule
Change-Id: I688c50047a559d00386ec54093d665fffab853b3
2020-03-10 16:22:44 -07:00
Can Guo
6126a64578 sepolicy: Allow RPMB service and recovery access bsg device driver nodes
This change is to allow RPMB service and Android recovery access
storage bsg char device driver nodes.

Change-Id: I2441f2de6273c2d44a24d4be5cf8c8d58ec6fcf6
2020-03-09 23:19:47 -07:00
Lubin Yin
40209bf7a9 sepolicy: WFD app sepolicy change
Because of the system UID removal from WFD app, give permissions to wfd
app instead of system app

Change-Id: Ic56db7fec69e1b16e761162ef0393cabb375de50
2020-03-09 09:47:00 -07:00
Linux Build Service Account
1b462b2387 Merge "Revert "Revert "sepolicy: update SELinux rules for ims application""" into sepolicy.lnx.6.0 2020-03-09 06:23:09 -07:00
Linux Build Service Account
c2e52493fd Merge "update sepolicy for init.qcom.testscripts.sh" into sepolicy.lnx.6.0 2020-03-09 06:23:08 -07:00
Bharat Pawar
d3512e61be atoll: Add sepolicy for gralloc and vulkan lib
Change-Id: I4b5d99f73612c8599459dbbebb97f30c9e26a7aa
2020-03-09 02:58:52 -07:00
Smita Ghosh
07d473667a sepolicy: Add read dir permission to hal_bootctl.te
hal_bootctl needs read permission to sysfs_dt_firmware_android

Change-Id: I6e89b2db756d7070bc4b815cf15a6a4f241d137b
2020-03-05 17:06:08 -08:00
Wileen Chiu
106d993854 Revert "Revert "sepolicy: update SELinux rules for ims application""
This reverts commit 7a059d4202.

Change-Id: I3b5c615012bacc440362e23e343ab05db8d3253f
CRs-Fixed: 2616500
2020-03-05 10:12:46 -08:00
Linux Build Service Account
bd7360b0a8 Merge "sepolicy: Update path for qspmsvc" into sepolicy.lnx.6.0 2020-03-05 06:11:50 -08:00
Sai Manobhiram
317f328fc0 Sepolicy: Allow socket creation, permission to access IOP/servtracker.
Netlink Socket : Add a policy for allowing to create a socket from perf hal
and getting data
IOP : perf-hal needs access to IOP serivice.
ServcTracker: Perf-hal needs access to service tracker Hal.
Meminfo, KGSL_MEM : Accessing proc_meminfo and kgsl sys_fs nodes for reading data.

Change-Id: Ic12bf00bb8c9227221556c043d8169c4611f2b69
2020-03-04 15:44:44 +05:30
Sai Manobhiram
bac8a9c806 Adding Kill capability to perf hal service.
Adding permission to kill only the app domain from vendor.
For lito, atoll, trinket.

Change-Id: Id9377a993ca847aaa830d53a330aabad1db3cd17
2020-03-04 15:21:59 +05:30