Commit graph

3996 commits

Author SHA1 Message Date
Sandeep Singh
d22efe9d18 sepolicy: Add permission for cnss-daemon to write in persist folder
Add permission for cnss-daemon to create file in
/mnt/vendor/persist/wlan folder.

Change-Id: I11690dee5383e8555260a1c6bbfa266043ed395e
2022-01-05 15:07:28 +05:30
Jaihind Yadav
6fa6d80de3 remove read permission for untrusted app to read device info.
Change-Id: I6d04b70ad23a08176ab9fa2c559460a4e6009efa
2021-12-28 23:21:18 -08:00
PavanKumar S.R
98c49facc5 sepolicy: Fix avc denials for wakeup nodes
Label wakeup sysfs nodes listed by SuspendSepolicyTests.sh

Change-Id: Ie1276b0189c3ccec5b99d0cdb64ed84379c80f95
2021-12-06 13:46:08 +05:30
urevanth
02950739e3 atoll: Addressing the syntax error in "qva/vendor/atoll/genfs_contexts"
Change-Id: I18f6508e763b02ad1758dd549ad1325fda7eff5f
Signed-off-by: urevanth <quic_urevanth@quicinc.com>
2021-12-02 17:05:17 +05:30
Baowei Liu
639219bf3a sepolicy: Add create socket file permission for vendor_wcnss_service
cnss_cli use unix socket to communicate with cnss-daemon.
cnss-daemon need create unix socket server file when init.

Change-Id: Ibbe1eb1f418da17c0155a0663f6a94d8777ef80f
2021-11-30 00:24:53 -08:00
qctecmdr
f6efb39ffb Merge "sepolicy_vndr: Remove ffs_prop form recovery.te" 2021-11-24 21:12:56 -08:00
qctecmdr
c2dbc25d4e Merge "sepolicy: Add SE-Linux rules to access NFC properties" 2021-11-16 22:00:29 -08:00
Udipto Goswami
e7c14cfe10 sepolicy_vndr: Remove ffs_prop form recovery.te
The AOSP code already defines and gives permission
to this label. Further this is renames in latest code
to ffs_config_prop so referring the label here gives
compilation error.
Removing it since already the permissions are there.

Change-Id: I14154df9cf269e3524c80a539c97bcb77dd97fc0
Signed-off-by: Udipto Goswami <quic_ugoswami@quicinc.com>
2021-11-16 15:45:05 +05:30
Bhuvan Varshney
aa1eb500fd sepolicy: Add SE-Linux rules to access NFC properties
Add sepolicy rules to allow secure element HAL to
read NFC properties.

Change-Id: Icf2436b523d9854ad31ac56cb75b75b200b0bb2b
2021-11-12 10:13:09 +05:30
Himanshu Agrawal
c61c806e02 sepolicy_vndr: Compilation fix for S upgrade
Change-Id: Ie41b7cc0bb91d5d92480fafa9d44bcbe8b855343
2021-11-11 06:34:38 -08:00
qctecmdr
9021b7aa45 Merge "sepolicy_vndr: add policy for hostapd" 2021-11-02 02:30:04 -07:00
David Arellanes
a9d871dfb8 selinux attribute mlstrustedsubject added to qvrd_vndr
Change-Id: I0f93db13f2b2bff64cd54b324bce5d320b2430b9
2021-10-29 15:48:25 -07:00
qctecmdr
d3b3dd6472 Merge "sepolicy_vndr: suppress xdsp denial." 2021-10-21 02:43:29 -07:00
qctecmdr
a0b37c2922 Merge "sepolicy: sepolicy rules for accessing read_ahead_kb" 2021-10-17 23:19:41 -07:00
Sarthak Garg
c0420f57f3 sepolicy: sepolicy rules for accessing read_ahead_kb
Adding sepolicy rule to fix avc denials while accessing
read_ahead_kb node for vold.

Change-Id: I078b00b07b31a813a2151595e24332cfa2361901
Signed-off-by: Sarthak Garg <sartgarg@codeaurora.org>
2021-10-12 20:13:13 +05:30
Rui Wang
182ddd2394 sepolicy_vndr: suppress xdsp denial.
Change-Id: Ie33815a9fbf1b4b8ee7b7acdfdeae896805fae1c
2021-10-11 22:36:08 -07:00
Sauvik Saha
9e1dcf7de5 sepolicy_vndr: Fixing avc denial
* avc: denied { call } for comm="ims_rtp_daemon"
* scontext=u:r:vendor_hal_imsrtp:s0 tcontext=u:r:
* vtloopback_app:s0:c165,c256,c512,c768 tclass=binder permissive=0

Change-Id: Iec4288d24a3ca9559fa213eb7ffff75d67c777dd
2021-10-07 23:12:10 -07:00
Ashish Jain
e9e26698a5 se-policy: Added donot audit rule.
Added donot audit rule for dac override warning for perf serivce.

Change-Id: I975452c82c2fdd28fef1015e5eafca23ccfb7016
2021-10-04 11:04:41 +05:30
Abhinav Sohane
fedcf427f5 Sepolicy: Add sepolicy change to not audit for xdsp
Issue: AVC denials seen for hal_camera_default while accessing
       vendor_xdsp_service.
Fix: Addeddontaudit for hal_camera_defaiult to access
     vendor_xdsp_service.

CRs-Fixed: 3027156

Change-Id: I915389a2073e4774c00a1129d6ddf371681138c3
2021-09-29 17:40:06 +05:30
Swarn Singh
809262547f sepolicy_vndr: add policy for hostapd
This commit gives hostapd permissions rw_dir_perms to open, search, write,
add_name, remove_name in wifi data files.

Change-Id: Ifc39cd245da035512af89733b55f57e9ce608f00
CRs-Fixed: 3008412
2021-09-28 22:45:42 -07:00
Sauvik Saha
26c2f7d447 sepolicy_vndr: Fixing avc denials for loopback app
* [Kodiak]avc: denied { read } for name="u:object_r:
* vendor_ims_prop:s0" dev="tmpfs" ino=30786 scontext=u:r:
* platform_app:s0:c512,c768 tcontext=u:object_r:vendor_ims_prop:
* s0 tclass=file permissive=0 app=com.qti.vtloopback

Change-Id: I8b2658ff7fe8d18812aa45c9daa3a2906f7e942f
2021-09-28 14:32:03 +05:30
qctecmdr
a251aa73d3 Merge "sepolicy_vndr: Update sepolicy rule for mediatranscoder" 2021-09-24 02:24:58 -07:00
Sanjay Singh
19155d0f01 sepolicy_vndr: Update sepolicy rule for mediatranscoder
Allow mediatranscoder to access hal_allocator.

Change-Id: I62511ef6c48a4276845edebb04298d23ab927739
2021-09-23 23:16:43 -07:00
Kavya Nunna
90758a130c sepolicy_vndr: Add labels for wakeup sources for atoll and msmnile
Add a change to fix the avc denials for the wakeup source
used for pmic nodes.

Change-Id: Id836c0890e197d9d32b69fb0b3d9f3ca960a65f1
2021-09-23 22:02:37 -07:00
Gerald Dasal
80aa433441 sepolicy_vndr: Add sepolicy for ssg system service
mlid and ssgtzd need to be able to talk to service
apps as well as other vendor services.

Change-Id: Iaee709672f4dd83c428a047be17bb0c087a50215
2021-09-22 11:42:55 -07:00
qctecmdr
645b321192 Merge "NeuralNetworks: Modify nnhal to access adsp properties" 2021-09-19 22:37:32 -07:00
qctecmdr
617ddb988d Merge "sepolicy_vndr: khaje: sepolicy rules for perf-lm" 2021-09-17 03:14:52 -07:00
Malathi Gottam
cdfabfff36 sepolicy_vndr: dontaudit qti-media access to default prop
Vendor qti-media service is not making use of any of the properties
under default-prop, so suppress this access denial using dontaudit.

Change-Id: I860d2e534dcfbf05be733706b780fd4784c3467d
2021-09-16 22:39:03 +05:30
Aman Mehta
64a6d79aff sepolicy_vndr: khaje: sepolicy rules for perf-lm
Path correction for sepolicy rules

Change-Id: I12efeaa94fd5216626a33bc6bd3f05d0f6ed56d2
2021-09-16 20:34:35 +05:30
Rajashekar Adi
0bba91b894 NeuralNetworks: Modify nnhal to access adsp properties
Modify NNHAL sepolicy rules to read adsp properties.

Change-Id: I53ffab1e039a5a07fa58de53baddf6c962a92565
2021-09-15 16:52:09 +05:30
Arvind Kumar
976a3c7982 sepolicy: Add rules for init.qti.early_init.sh scripts
Add rules to allow execution of init.qti.early_init.sh

Change-Id: I8199a084a1913eb77123be04eecda4a3f5a85992
2021-09-15 01:58:05 -07:00
Vivek Arugula
ba1fe38dcc sepolicy: Add dontaudit for init.qcom.sensors.sh
This script file is used to move few files from vendor
    to data path. This doesn't read any properties
    within it explicitly.

Change-Id: I9bc986d30ca96371c9ffc1670cf220a5c2a5f920
2021-09-14 10:29:45 +05:30
xiaohuin
062c4adf81 sepolicy: rename hang_guard to qguard
change hang_guard to qguard.

Change-Id: I7122c99c702c2661c1cc9c33e0ddada7d9f4ab86
CRs-Fixed: 3005281
2021-09-09 20:17:28 -07:00
qctecmdr
f98e4b6f9d Merge "epolicy : add rule for tipc socket permission" 2021-09-09 08:13:23 -07:00
qctecmdr
b1a63c8d9c Merge "sepolicy_vndr: Add sepolicy changes for eID services" 2021-09-09 04:50:16 -07:00
Kaustubh Pandey
bd175d470b epolicy : add rule for tipc socket permission
Change-Id: I46790b52188de7a0502cd6b2768a2863297b4f88
Signed-off-by: Kaustubh Pandey <kapandey@codeaurora.org>
Acked-by: Anagh G <anaghg@qti.qualcomm.com>
2021-09-09 16:22:15 +05:30
dexili
8a2a0c462d sepolicy_vndr: Add sepolicy changes for eID services
Add sepolicy changes for eID services

Change-Id: I3fd5138df6dddeff98736eab82a8e9f487576402
2021-09-09 17:19:57 +08:00
Bipin Kumar
56c2153eed sepolicy_vndr: bengal: Add permission for khaje sysfs
Change-Id: I0bb4ae1600dce25c4da3dc4cddf7083f8229f2c6
2021-09-08 06:10:39 -07:00
Sharath Chandra Vurukala
76fc996cd8 sepolicy_vndr: dontaudit system_server search of proc shs dir
Dontaudit system_server search of the vendor proc shs directory.

Change-Id: I93b528f2680fd087b9c42cbe1beaae74c9703a61
Acked-by: Divyarajsinh Jhala <djhala@qti.qualcomm.com>
Signed-off-by: Sharath Chandra Vurukala <sharathv@codeaurora.org>
2021-09-08 02:49:12 -07:00
kranthi
5bfc9e2b16 sepolicy-vndr:Allowing applications to read gpubusy
type=1400 audit(0.0:4717): avc: denied { read } for name="gpubusy"
 dev="sysfs" ino=52014 scontext=u:r:untrusted_app_29:s0:c224,c256,c512,c768
 tcontext=u:object_r:vendor_sysfs_kgsl:s0 tclass=file permissive=0
 app=com.activision.callofduty.shooter

CRS-Fixed: 3027339

Change-Id: I93b00ef59e35c7336351234d6e41b34fb7b46c10
2021-09-07 21:45:31 -07:00
qctecmdr
95aa1ccbb1 Merge "sepolicy_vndr: Update sepolicy rule for mediatranscoder" 2021-09-07 09:04:15 -07:00
qctecmdr
eec30e15e3 Merge "sepolicy_vndr: Update sepolicy rule for mediatranscoder" 2021-09-07 04:22:10 -07:00
Sanjay Singh
e8c4018001 sepolicy_vndr: Update sepolicy rule for mediatranscoder
Allow mediatranscoder to access hal_allocator.

Change-Id: I808d317dab759961db810bc2bb12252989ae268b
2021-09-06 22:08:55 -07:00
Sanjay Singh
9c74a229b6 sepolicy_vndr: Update sepolicy rule for mediatranscoder
Allow mediatranscoder to access hal_allocator.

Change-Id: Ibf5a5b15a55391410f35c76f5ca0259636b70add
2021-09-03 11:20:12 +05:30
Sanjay Singh
8950ce727b sepolicy_vndr: Update sepolicy rule for mediatranscoder
Allow mediatranscoder to access hal_allocator.

Change-Id: If2f5d683a76dd08a81e34554ef04436ea9b2941c
2021-09-03 10:54:11 +05:30
Aman Mehta
c20fc6e1db sepolicy_vndr: khaje: sepolicy rules for perf-lm
Add sepolicy rules for perf-lm-gameopt

Change-Id: I5ef16a6ce522dfb8716209ba0c8577a6f63c6ce3
2021-08-31 16:46:35 +05:30
qctecmdr
1923e875f0 Merge "vpp: remove access to vendor_xdsp_device node." 2021-08-30 10:59:25 -07:00
qctecmdr
d7ee2be4ff Merge "sepolicy: Fix the AVC denials for system daemon" 2021-08-25 23:14:08 -07:00
qctecmdr
88063c9f14 Merge "sepolicy: revert of qvrd changes from: Selinux enabled for qvr_vndr." 2021-08-25 23:14:08 -07:00
qctecmdr
b9e489c364 Merge "Remove cdsp SE policy for lowirpcd daemon" 2021-08-25 19:10:28 -07:00