Commit graph

1047 commits

Author SHA1 Message Date
Arun Kumar Neelakantam
8c8acc41ff sepolicy_vndr: add ssgtzd_opener socket sepolicy
ssgtzd_opener socket file is created to provide service registration
and adding sepolicy to access this socket

Change-Id: I06afa4e9e6857d6f13731eaf46d9acbc5e606224
2021-11-15 22:12:11 +05:30
Arun Kumar Neelakantam
5e19c5be0a sepolicy_vndr: trusteduilistener: add sepolicies
Add SEpolicies for new TrustedUI Listener daemon.

Change-Id: I87cd757a5df129352b7ab74d80bb2ecfd0ec99df
2021-11-11 00:28:52 +05:30
shrkum
5f861e159c Allow vendor_pd_mapper to open to /dev/kmsg
Change-Id:If9f89c010bfc8a888f6ad6e842a1f5c61e97b8af
2021-10-25 12:22:03 +05:30
qctecmdr
c075fdc753 Merge "sepolicy_vndr: Adding graphics libs" 2021-10-22 14:46:21 -07:00
kranthi
8871a4e3cf sepolicy-vndr:Allowing system process to read gpu model
type=1400 audit(0.0:307): avc: denied { read } for name=""gpu_model""
dev=""sysfs"" ino=111904 scontext=u:r:vendor_voiceui_app:s0
tcontext=u:object_r:vendor_sysfs_kgsl:s0 tclass=file permissive=0
app=com.qualcomm.qti.sva

Change-Id: If9f89c010bfc8a733f6ad6e842a1f5c61e97b8af
2021-10-22 04:02:03 -07:00
qctecmdr
453e7b1f20 Merge "sepolicy: Add sepolicy to access vendor_dmabuf_display_heap_device from mediacodec" 2021-10-15 09:53:00 -07:00
Weiyi Chen
fdc7fe4783 sepolicy: shsusrd permissions
Allows shsusrd to create and listen on unix domain socket,
operate on netlink route socket and connect to netmgrd socket.

Change-Id: I883dee4496e6ac420f4f8b149a8da25370460fa6
2021-10-13 15:32:40 -07:00
Vinay Pandurangi
f7fef315bb sepolicy: Add sepolicy to access vendor_dmabuf_display_heap_device from mediacodec
Change-Id: Ic7a557af5cf56a371cf8278a43ffa3ba071e73d0
2021-10-12 10:30:05 -07:00
qctecmdr
642992dd5c Merge "sepolicy_vndr: Add sepolicy for esoc node" 2021-10-08 16:20:34 -07:00
Sauvik Saha
ab1e149631 sepolicy_vndr: Fixing avc denial for waipio
* [Waipio] avc: denied { call } for comm="ims_rtp_daemon"
* scontext=u:r:vendor_hal_imsrtp:s0 tcontext=u:r:vtloopback_app:
* s0:c165,c256,c512,c768 tclass=binder permissive=0

Change-Id: I3de76b9c1b409aec882b6aa490a0801798d45a8d
2021-10-07 23:12:24 -07:00
kranthi
64d7ccb738 sepolicy_vndr: Adding graphics libs
Adding libgpudataproducer,libVkLayer_ADRENO_qprofiler,libq3dtools_esx

Change-Id: Iabfa7995bba351d4cd048f440836d9245adfb105
2021-10-07 04:52:54 -07:00
qctecmdr
36e9a3c8eb Merge "add policies for vendor location." 2021-09-30 07:13:07 -07:00
qctecmdr
74ecb27590 Merge "sepolicy_vndr: Allow shell to access tracefs instances" 2021-09-30 00:44:08 -07:00
Ashish Dhiman
499fb657e1 add policies for vendor location.
Change-Id: I064d192c91342b52ef28420259740484533cb23d
2021-09-28 17:31:36 +05:30
Naseer Ahmed
86b243d686 sepolicy: Add memtrack HAL
Change-Id: I96aba595b174dcdf8949e17cd13f97d1c76af1d4
2021-09-21 09:41:27 -07:00
Kamal Agrawal
b36b7d0e58
sepolicy_vndr: Allow shell to access tracefs instances
Add policy to allow shell to access tracefs instances.
Fix is for below error:
W ls : type=1400 audit(0.0:219): avc: denied { read } for
name="instances" dev="tracefs" ino=10789 scontext=u:r:shell:s0
tcontext=u:object_r:debugfs_tracing_instances:s0 tclass=dir
permissive=0

Change-Id: Ia508b90d648be8b61938e29792e3fab0d740ba87
2021-09-18 12:48:45 +05:30
Linux Build Service Account
e443daae7d Merge "Filecontext changed for vm-system mount" into sepolicy.vndr.lnx.12.0 2021-09-13 17:47:28 -07:00
qctecmdr
a2b712ff6b Merge "sepolicy: Add sepolicy to access demura heap device" 2021-09-10 10:28:56 -07:00
qctecmdr
cc3491aae5 Merge "sepolicy: Add rules for /dev/dma_heap/qcom,demura device" 2021-09-09 20:59:46 -07:00
Lakshmi Narayana Kalavala
d56c891c64 sepolicy: Add sepolicy to access demura heap device
Add read access permission for demura heap device for
hal_graphics_allocator_default module

Change-Id: I095f7d7453405879a58f2e66749fd27b8264a4f7
2021-09-09 17:12:23 -07:00
qctecmdr
975234aee7 Merge "sepolicy: rename hang_guard to qguard" 2021-09-09 03:56:13 -07:00
xiaohuin
59fd672884 sepolicy: rename hang_guard to qguard
change hang_guard to qguard

Change-Id: I6a11a7fbb0ab8d9682e89750bb111ebe9fc618fd
CRs-Fixed: 3005281
2021-09-09 03:10:51 -07:00
jiaoyuan
474a2276e5 Add policy for aide libs
Change-Id: I293ecb11f5e730120ce75b648a9f85e576de8875
2021-09-08 19:26:15 -07:00
appadura
297e3cb4d2 Filecontext changed for vm-system mount
On platform using qvirtmgr/qcrosvm, switch to using
same_process_hal_file label for vendor vm images as
they are loaded by system.

Change-Id: Id859e1114fdcd3e190fb006768226e47cec2db38
2021-09-07 19:28:38 -07:00
qctecmdr
6585b6e957 Merge "Add rules to define and use media performance class property" 2021-09-07 13:58:03 -07:00
Roopesh Nataraja
e1a866f79c sepolicy_vndr: Add selinux context for xbl_ramdump_[ab]
xbl_ramdump partition is being converted into A/B partition.
Add corresponding selinux rule to define context for this partition.

Change-Id: I6fd10a4f4675592b770f9b582d66dfd245cdc424
2021-09-07 09:56:02 -07:00
Roopesh Nataraja
9e757a7a64 Add rules to define and use media performance class property
Since QCV enforces common vendor image across chipsets from the
same family, create an internal property called
'ro.vendor.media_performance_class' to set the right value based
on chipset capability at run time. Assign this value to
'ro.odm.build.media_performance_class' in QCV init rc.

Change-Id: Ie6f4e36151cd65f078b4eb1e52d29b280c849c77
2021-09-07 09:48:25 -07:00
Patrick Daly
0fac5bfe50 sepolicy: Add rules for /dev/dma_heap/qcom,demura device
Define policy for qcom,demura device.

Change-Id: I1264329ecea1349f5fb78919644c02fd0bc552f2
2021-09-02 18:16:02 -07:00
qctecmdr
87981a774d Merge "sepolicy_vndr: allow rproc autopil bg scripts to access slpi" 2021-09-01 14:44:30 -07:00
Jun-Hyung Kwon
bfa84717ab sepolicy_vndr: allow rproc autopil bg scripts to access slpi
allow remoteproc autopil bg scripts to access slpi sysfs nodes

Change-Id: Ib2862a2a31e196d98124de66fbb3aa5e3e13f585
2021-09-01 13:20:10 -07:00
Roopesh Nataraja
d826b86b82 taro: Label sdf block as boot_block_device
This is a workaround to fix an update_engine crash
due to switching of LUNS between sde and sdf.

Change-Id: I8f3b87f8446928ed78b71182e930f06b6b1ea203
2021-09-01 09:02:21 -07:00
qctecmdr
df1748ad10 Merge "sepolicy_vndr: taro: Add esoc sysfs nodes" 2021-08-30 16:14:42 -07:00
qctecmdr
af9ac51900 Merge "sepolicy_vndr: Add sepolicy for ssg system service" 2021-08-24 09:11:59 -07:00
qctecmdr
811ce2217f Merge "Add sepolicy for perf qesdk client" 2021-08-23 12:35:31 -07:00
qctecmdr
1da2ca4cc2 Merge "sepolicy_vndr: dontaudit system_server search of proc shs dir" 2021-08-20 02:30:54 -07:00
qctecmdr
a88bf5bebc Merge "sepolicy_vndr: Fix sepolicy denials for write to proc/sys/kernel" 2021-08-19 17:49:15 -07:00
qctecmdr
85f9d5bb06 Merge "sepolicy_vndr: change vendor_qcc_trd to vendor_qcc_trd_2" 2021-08-19 13:35:57 -07:00
Rishabh Bhatnagar
babbf9878b sepolicy_vndr: Fix sepolicy denials for write to proc/sys/kernel
Add read/write permissions for init scripts to write to uclamp
default node /proc/sys/kernel/sched_util_uclamp_min_rt_default.
avc: denied { write } for comm="sh" name="sched_util_clamp_min_rt_default"
dev="proc" ino=187895 scontext=u:r:vendor_qti_init_shell:s0
tcontext=u:object_r:proc_sched:s0 tclass=file permissive=0

Change-Id: I2c59d74f0ea735a8658cb6414e713e8161a927c9
2021-08-19 11:59:10 -07:00
Bhargav Upperla
6dc9989950 Add sepolicy for perf qesdk client
Provide access to qesdk & perf-hal

Change-Id: I444093d77beab4db582ac408b1a25439b0633562
2021-08-18 20:53:46 -07:00
Gerald Dasal
bcb76b2ebc sepolicy_vndr: Add sepolicy for ssg system service
mlid and ssgtzd need to be able to talk to service
apps as well as other vendor services.

Change-Id: Iaee709672f4dd83c428a047be17bb0c087a50215
2021-08-18 16:43:43 -07:00
Subash Abhinov Kasiviswanathan
6cd53c182a sepolicy_vndr: dontaudit system_server search of proc shs dir
Dontaudit system_server search of the vendor proc shs directory.

Change-Id: Idd075963fa6e5babcff38720d1b3a72e08da5fcd
2021-08-18 15:56:38 -07:00
Phani Deepak Parasuramuni
cdd1fc2dac sepolicy_vndr: change vendor_qcc_trd to vendor_qcc_trd_2
vendor_qcc_trd type is only defined in LA.QSSI.12.0 se policies
and used in LA.VENDOR.1.0 se policies. But this creates a problem when
LA.VENDOR.1.0 is run with pure AOSP image. In pure AOSP image type definition
of vendor_qcc_trd will not be present and hence qcc-trd daemon is failing
is failing to start with following error:

type=1401 audit(1624551973.831:245): op=security_compute_sid
invalid_context="u:r:vendor_qcc_trd:s0" scontext=u:r:init:s0
tcontext=u:object_r:vendor_qcc_trd_exec:s0 tclass=process

Solution: Defining a new type 'vendor_qcc_trd_2' in vendor side
and adding the attribute 'vendor_qcc_trd' defined in QSSI SE policies.

Change-Id: I5c767a0d330cece2965acf101006e6998cbbef91
2021-08-18 15:28:22 -07:00
qctecmdr
951dbdb76a Merge "common: Add sepolicy for watchdog wakeup_enable" 2021-08-18 15:25:11 -07:00
Elliot Berman
b1aed60249 common: Add sepolicy for watchdog wakeup_enable
Add sepolicy permission for init to disable wakeup aware watchdog.

Change-Id: Ib78f2b4878a6645b3d42f3d96261375026032ce4
2021-08-17 10:28:38 -07:00
qctecmdr
e0904a477d Merge "sepolicy_vndr: Update lowirpcd to use the system heap" 2021-08-16 03:17:25 -07:00
Sauvik Saha
f4ba9d955c sepolicy_vndr: Fixing avc denials for loopback app
* denied { read } for name="u:object_r:vendor_ims_prop:s0"
* dev="tmpfs" ino=332 scontext=u:r:platform_app:s0:c512,c768
* tcontext=u:object_r:vendor_ims_prop:s0 tclass=file
* permissive=0 app=com.qti.vtloopback

Change-Id: I8b2658ff7fe8d18812aa45c9daa3a2906f7e942f
2021-08-13 18:47:51 -07:00
qctecmdr
cd7bdafc94 Merge "sepolicy_vndr: Add sepolicy for disable RC thread prop" 2021-08-13 00:23:55 -07:00
qctecmdr
78274a3646 Merge "sepolicy_vndr: remove unused cne te_macros" 2021-08-12 20:03:32 -07:00
qctecmdr
154cd72a23 Merge "sepolicy_vndr: add read access to vendor_slpi_sysfs nodes" 2021-08-12 17:37:17 -07:00
Jun-Hyung Kwon
8229c3388b sepolicy_vndr: add read access to vendor_slpi_sysfs nodes
add a rule to allow sensors_hal to read vendor_slpi_sysfs nodes

Change-Id: I2aa0ebd198a0fdbfac45b6dd37e727802f612903
2021-08-12 11:56:22 -07:00