Commit graph

4416 commits

Author SHA1 Message Date
Vamana Murthi
2a0ce8f444 sepolicy rules to allow Gnss Hal to access RIL Srv
Change-Id: I58f8f71978ddca6e97811e7523a1966cc6f475f8
CRs-fixed: 3287913
2023-03-20 14:51:17 +05:30
vidyalak
f149500bed sm6150: support for vendor_boot and init_boot partition
Included vendor_boot and init_boot partition for AB OTA
In msmsteppe sepolicy changes.

Change-Id: I6f10642819de572e6f26e9b084188579ba5336bf
2023-03-17 10:56:18 +05:30
Tengfei Fan
b6acde700a sepolicy: Fix avc denials of remoteproc-wpss for wakeup nodes
Label wakeup sysfs nodes listed by SuspendSepolicyTests.sh

Change-Id: I382fb204eafeedf331b89aebfe74e0684ba2e12d
2023-03-13 14:34:40 +08:00
Vaishnavi AVS
31cb5eaa26 sepolicy_vndr: Add sepolicy rules for I2C wakeup nodes
Add sepolicy rules for I2C wakeup nodes to fix avc denials
and errors from suspend sepolicy scripts.

Change-Id: Ia8e1972b5699dd5a56b4079840da8866c5ff6bf5
2023-03-06 00:42:23 -08:00
Vaishnavi AVS
2199a340af sepolicy_vndr: Add sepolicy rules for UART wakeup nodes
Add sepolicy rules for UART wakeup nodes to fix avc denials
and errors from suspend sepolicy scripts.

Change-Id: Ic0e4a09b29f6adf55e3b9b825dbca4b7472a1736
2023-03-06 12:03:21 +05:30
Rakesh Kota
380fc2940e sepolicy_vndr: Add sepolicy rules for PON wakeup nodes on ravelin
Add sepolicy rules for PON wakeup nodes to fix errors
from suspend sepolicy scripts.

Change-Id: If291843654fb78c62d64aa23b759db9f7d4f4b96
2023-02-22 15:50:41 +05:30
Leela Sravani Atmakuri
9bbbddbefe sepolicy_vndr: Modify nativehaltestservice.te
CRs-Fixed: 3412497
External Impact: No

Change-Id: I04d2309db37d8e14506d2d4ba743ac1279247240
2023-02-21 02:31:05 -08:00
Udipto Goswami
aec146fc65 sepolicy_vndr: Add permission for USB HAL to access usb sysfs nodes
Adding permissions for for usb hal to access the
vendor_sysfs_usb_node. This is required to hal to perform error
recovery in host mode.

Change-Id: Ie7fff2ba54fd50864ab6be90e97d002be7ca10cc
Signed-off-by: Udipto Goswami <quic_ugoswami@quicinc.com>
2023-02-13 22:39:21 -08:00
Leela Sravani Atmakuri
11b5899b2b sepolicy_vndr: Add nativehaltestservice.te
CRs-Fixed: 3400283

Change-Id: I5688524048cb430a311939763b66f8a344095120
2023-02-08 02:24:25 -08:00
qctecmdr
483eed269a Merge "sepolicy_vndr: Add sepolicy rules to access RGB nodes on ravelin" 2023-02-02 05:16:53 -08:00
Arvind Kumar
4149ce8a88 parrot: Update sepolicy for OTA partitions to fix AVC denials.
Update sepolicy for OTA partitions to fix AVC denials
seen during OTA update.

Change-Id: I56bad41bef6e35df5a76ddd8ee4aeaa08f01e3ce
2023-01-31 10:52:04 +05:30
Rakesh Kota
86973c5b83 sepolicy_vndr: Add sepolicy rules to access RGB nodes on ravelin
Add label for led device node on ravelin platform.

Change-Id: I797de14c5e4c089625008a16f7df462c13415b6b
2023-01-20 12:59:36 +05:30
qctecmdr
fc030efab5 Merge "sepolicy_vndr: add sepolicy for spdaemon to use wake-lock" 2023-01-11 22:26:24 -08:00
sganda
67783127fa sepolicy_vndr: add sepolicy for spdaemon to use wake-lock
allow spdaemon daemon to access wake-lock sysfs nodes

Change-Id: I2af3b37387d2de35a37848a8aab667bf968423ed
Signed-off-by: sganda <quic_sganda@quicinc.com>
2023-01-11 15:51:28 +05:30
qctecmdr
bbcb88bf33 Merge "sepolicy_vndr: hal_trustedui: Add sepolicy rules to access touch nodes" 2023-01-11 01:55:00 -08:00
Akhil Budampati
840718ffec sepolicy_vndr: hal_trustedui: Add sepolicy rules to access touch nodes
Add sepolicy rules to access new trusted_touch_enable,
trusted_touch_type and trusted_touch_event nodes in TUI HAL

Change-Id: I0f516196e953514cf99926181528eecccc99022c
2023-01-11 09:51:56 +05:30
qctecmdr
145726016f Merge "sepolicy_vndr: Add QSPM related dontaudit rules for mediacodec" 2023-01-09 23:04:55 -08:00
sganda
11bfa34b4a sepolicy_vndr: add sepolicy for keymasterd for anorak
Keymaster daemon is given permissions to access spcom related files
and devices

Change-Id: Ic753bf9b93594d8e51a48e709dd938e249dcc963
Signed-off-by: sganda <quic_sganda@quicinc.com>
2023-01-03 20:38:57 +05:30
Sachu George
149bcb3606 sepolicy_vndr: Add QSPM related dontaudit rules for mediacodec
Added QSPM related dontaudit selinux rules for mediacodec to address
below denials.

SELinux : avc:  denied  { find } for interface=vendor.qti.qspmhal::IQspmhal
sid=u:r:mediacodec:s0 pid=1041 scontext=u:r:mediacodec:s0 tcontext=
u:object_r:vendor_hal_qspmhal_hwservice:s0 tclass=hwservice_manager permissive=0

Change-Id: I802d30646be36c6afba3a4c652d2d3201b7e0dad
2023-01-03 18:12:22 +05:30
qctecmdr
d65bf3f91c Merge "sepolicy_vndr: allow charger to read display properties" 2022-12-26 22:40:42 -08:00
qctecmdr
f53cb3d08f Merge "QGuard: add permission for black screen detector" 2022-12-23 00:24:42 -08:00
xiaohuin
5c24ca8f16 QGuard: add permission for black screen detector
1. add logger permission
2. add black screen detector permissions

Change-Id: I7416325a7a74cf82f317bc3334e0f45bd60d79cd
CRs-Fixed: 3367465
2022-12-23 15:47:48 +08:00
Devanshi Bansal
9f28b215d4 sepolicy_vndr: allow charger to read display properties
Change-Id: I1d9c503bcfe2fad1d816afb665790151c9a361d1
2022-12-20 20:56:19 -08:00
Kedi Xu
a8a8860cc6 sepolicy_vndr:Add qvrservice qipcrtr_socket permission
qvrservice need create qmi connection to sensor, so add
this permission.

Change-Id: I915fbe4b1b75c4768e0e731f4b9e4e32ff401c72
2022-12-18 23:31:52 -08:00
Sairam Bandikanti
8d7b080232 sepolicy: Allow qseecomd to register powerstate hal
Add rules to qseecomd to access powerstate hal.
The changes also includes adding new property
vendor.keymaster.quickboot and add access permission
to qseecomd. Using this property keymaster service
can be restarted on Hibernate-Exit.

Test:
 Confirmed from Boot-Up logs for Hibernate Entry registered.

Change-Id: I45a122b09b20dbfbd8654a4c7cc159ce06929053
2022-12-13 21:02:05 -08:00
qctecmdr
e9b1d96f5c Merge "sepolicy_vndr: Add selinux label for LED devices" 2022-12-06 23:46:45 -08:00
xuanpeng
4ddea154d9 sepolicy_vndr: Add selinux label for LED devices
Add label for LED devices for led hal and vibrator hal to access it
properly.

Change-Id: I0515724c146dba1def0a7d585e4bdac1eaae7b5c
2022-12-06 14:38:36 +08:00
qctecmdr
59cdbbeaaa Merge "sepolicy: Add sepolicy rules for PowerState HAL to access swap block" 2022-12-05 09:37:52 -08:00
Shyam Narwade
2dcac9c7e5 sepolicy: Add sepolicy rules for PowerState HAL to access swap block
Added sepolicy rules for PowerState HAL to call swapon and swapoff api for hibernation

Change-Id: Iafdc9fce55550e32a43400b209247e4714c263a4
2022-11-29 11:08:34 +05:30
qctecmdr
aebb6a98ba Merge "sepolicy: Add Sepolicy permission for charger and QG" 2022-11-22 23:04:30 -08:00
Manaf Meethalavalappu Pallikunhi
ba128925e9 sepolicy: Remove thermal-engine access to audio device node
Remove thermal-engine access to audio device node as it doesn't
require any audio device resources access.

Change-Id: I65826695c48ef139fe6678b78bd6a98c7757bef4
2022-11-21 23:58:02 -08:00
Arvind Kumar
9021da02e4 Add file contexts for new partition on Neo
Add file contexts for multiimgqti partition
to enable A/B OTA update on this partitions.

Change-Id: I6895cc3589bef81e3b46b35c087d9333bf86fbb9
2022-11-16 11:14:39 +05:30
qctecmdr
fec427e02d Merge "sepolicy_vndr: Add qvrservice access ADSP permision" 2022-11-15 01:17:09 -08:00
Umang Chheda
52d148c773 sepolicy: Add Sepolicy permission for charger and QG
Add Sepolicy nodes for charger and QG.

Change-Id: If1773395bc53457a91567d5aa9ddad41faa36834
2022-11-11 03:06:24 -08:00
qctecmdr
eff577b51d Merge "sepoliy_vndr: Handle fsck avc denials on bootup with SSD connected" 2022-11-07 23:41:18 -08:00
Udipto Goswami
c098533269 sepoliy_vndr: Handle fsck avc denials on bootup with SSD connected
Suppose an external SSD or pendrive with a corrupted file system
is connected to the DUT on bootup, in this case file systems
checker will run for checking these corruptions, however since
the usb nodes are created dynamically on runtime the fsck_untrusted
will not have permissions for this.
Also, the fsck is necessary for the internal storage and directories,
mounts created any external SSD can be ignored,
therefore adding dontaudit rules.

Following are the avc denials:

type=1400 audit(1661408631.839:117): avc: denied { search }
for comm="fsck.exfat" name="usb2" dev="sysfs" ino=146315
scontext=u:r:fsck_untrusted:s0
tcontext=u:object_r:vendor_sysfs_usb_node:s0 tclass=dir permissive=1

type=1400 audit(1661408631.839:118): avc: denied { read }
for comm="fsck.exfat" name="start" dev="sysfs" ino=146885
scontext=u:r:fsck_untrusted:s0
tcontext=u:object_r:vendor_sysfs_usb_node:s0 tclass=file permissive=1

type=1400 audit(1661408631.839:119): avc: denied { open }
for comm="fsck.exfat" path="/sys/devices/platform/soc/a600000.ssusb/
a600000.dwc3/xhci-hcd.2.auto/usb2/2-1/2-1:1.0/host1/target1:0:0/
1:0:0:0/block/sdi/sdi1/start" dev="sysfs" ino=146885
scontext=u:r:fsck_untrusted:s0
tcontext=u:object_r:vendor_sysfs_usb_node:s0 tclass=file permissive=1

type=1400 audit(1661408631.839:120): avc: denied { getattr } for
comm="fsck.exfat" path="/sys/devices/platform/soc/a600000.ssusb/
a600000.dwc3/xhci-hcd.2.auto/usb2/2-1/2-1:1.0/host1/target1:0:0/
1:0:0:0/block/sdi/sdi1/start" dev="sysfs" ino=146885
scontext=u:r:fsck_untrusted:s0
tcontext=u:object_r:vendor_sysfs_usb_node:s0 tclass=file permissive=1

Change-Id: If67b70c7fffc197bbd107f13fa3bb21b87d73a24
Signed-off-by: Udipto Goswami <quic_ugoswami@quicinc.com>
2022-11-07 14:35:37 +05:30
Kedi Xu
c083994bd2 sepolicy_vndr: Add qvrservice access ADSP permision
Change-Id: I15a6f400c94f7c7bbc6e3d379158a173bae950a1
2022-11-03 18:25:37 -07:00
Sonal Aggarwal
b598a80b5f sepolicy_vndr: Add label for rpmb device node of emmc type for neo
As neo_LA is emmc type device, the node /dev/mmcblk0rpmb is required
to be labelled in file contexts for neo.

Change-Id: I162a99e0b6863be208f000531ab576b2a21601da
2022-11-03 14:51:20 +05:30
qctecmdr
12bb0cd43c Merge "sepolicy_vndr: Add fan service for Anorak" 2022-10-31 05:44:43 -07:00
Minghao Zhang
c1aa3cd657 sepolicy_vndr: Add fan service for Anorak
Add fan service to control fan to run and stop as cooling device.

Change-Id: Ibdd81db8f34489796cfc66035b539b19b4016c91
2022-10-28 18:12:07 +08:00
Pavan Kumar M
5d6c0f3629 sepolicy : Add sysfs_net related path entries
VTS test fails when secontext entry for the driver path
is not present in genfs_context.

Update the secontexts for sysfs_net for anorak target

Change-Id: I528411d518bf7332f41e896411fec47389665e0d
CRs-Fixed: 3322587
2022-10-28 13:21:20 +05:30
qctecmdr
440267122c Merge "Allow domains to access dumpsys fd in debugutils" 2022-10-25 23:01:12 -07:00
Yuanfang Zhang
7ed184f888 sepolicy: add selabel for byte-cntr1 node
Add add selable for new node byte-cntr1.

Change-Id: I1c64a20841230a634de7d83e37723804d1b2ddde
2022-10-18 15:04:39 +08:00
Bulbul Dabi
100d8f3299 Allow domains to access dumpsys fd in debugutils
Allow all domains to use dumpsys fd in debugutils API

Change-Id: I7adf9b7d4d37b0aac4d371cdf2d499e3f7ed0f8e
2022-10-07 15:09:48 +05:30
qctecmdr
25e9e35c06 Merge "sepolicy_vndr: Add changes to enable power hint from video HAL" 2022-10-06 22:20:48 -07:00
Vala Zadeh
1a79994c5c sepolicy_vndr: Add IQtiRadioConfig
- Add IQtiRadioConfig to vendor_hal_telephony_service
  domain in vendor partition which is needed for RIL
  to connect to the service.

Change-Id: I00dfc42d78db1fb54e9186def0394ce1e7afa8b4
CRs-Fixed: 3162170
2022-09-28 02:58:59 -07:00
qctecmdr
ee1cca4cc1 Merge "sepolicy: Permission for init shell to update readahead." 2022-09-25 22:24:05 -07:00
Devanshi Bansal
0b70f0b7b5 sepolicy_vndr: Add permission for panel1 brightness node
Change-Id: Ida65ffd6046bd0f2c5d9fe836776d72524e40c00
2022-09-23 02:03:27 -07:00
Sai Manobhiram
a23a9cb882 sepolicy: Permission for init shell to update readahead.
Allow vendor_qti_init_shell to have permissions to
-    /sys/block/sd*

Change-Id: Ia08207abef0700c3a4d1615c83bdd9e680e07c7a
2022-09-21 03:31:27 -07:00
qctecmdr
3607a25194 Merge "sepolicy_vndr: Allow recovery to read sysfs to get mmc type for SDExpress" 2022-09-20 00:05:42 -07:00