Commit graph

1130 commits

Author SHA1 Message Date
PavanKumar S.R
7429a9fe29 sepolicy: Fix avc denials for wakeup nodes
Label wakeup sysfs nodes listed by SuspendSepolicyTests.sh

Change-Id: I06e43361959c6a1f99beece85dc7c51c0458e189
2022-05-04 10:44:29 +05:30
Naman Jain
d5cbbda6b0 vendor_modprobe: add new debugfs dir search permissions
Add dir search permissions in vendor_modprobe for new
debugfs labels debugfs_bootreceiver_tracing and debugfs_wifi_tracing.

Change-Id: I9f95cb0d623a5ebc80eb69cd135099f7b3b31085
2022-04-27 11:27:36 +05:30
qctecmdr
6c882d65bb Merge "sepolicy_vndr: Update context for /sys/class/kgsl/kgsl-3d0/perfcounter" 2022-04-20 13:26:57 -07:00
qctecmdr
e9d5e496c6 Merge "sepolicy: msmsteppe: Add vendor specific sepolicies for msmsteppe" 2022-04-19 05:14:41 -07:00
Zhenlin Lian
4508176307 sepolicy: msmsteppe: Add vendor specific sepolicies for msmsteppe
Change-Id: I75459b4c29ccb4ce34f5f888fbaf9039fc867048
2022-04-18 17:13:37 +05:30
qctecmdr
a683ea8594 Merge "sepolicy: add selinux label for LED devices" 2022-04-18 03:00:38 -07:00
qctecmdr
a2f4fa90c4 Merge "Enable sepolicies for anorak Change-Id: Ic2b4812ba4d8c7c8a83907fe6e12547348da9d85" 2022-04-15 03:58:27 -07:00
qctecmdr
c0f840d935 Merge "sepolicy_vndr: Correct paths for RGB nodes for parrot" 2022-04-14 15:35:05 -07:00
qctecmdr
d8ee5f04f1 Merge "sepolicy_vndr: Move qti-media file contexts to genfs" 2022-04-14 11:08:49 -07:00
Mohammed Mirza Mandayappurath Manzoor
8759fd85ec sepolicy_vndr: Update context for /sys/class/kgsl/kgsl-3d0/perfcounter
Shell permissions set in genfs_contexts for SELinux context applicable
for /sys/class/kgsl/kgsl-3d0/perfcounter is overridden if not set in
file_contexts.

Change-Id: I3eb818226abf497e1106af68ece9356bee0a3702
2022-04-11 11:10:07 -07:00
sasikumar maddineni
ebd9b412c3 Enable sepolicies for anorak
Change-Id: Ic2b4812ba4d8c7c8a83907fe6e12547348da9d85
2022-04-06 22:36:42 -07:00
Priyanka Gujjula
24bc99f79d sepolicy_vndr: Move qti-media file contexts to genfs
[1] sku version file contexts are loaded by early-
init phase and sku version node is created after
file contexts are loaded. The transistion time
from early init to post-fs is around ~2.5 seconds.
avc denied messages are observed when sku_version
is accessed as vendor file contexts are slow in
reporting.
[2] Hence, move file contexts to genfs as genfs
helps to track and label the node even if the
node is created afterwards.

Change-Id: Idcdebf0dbc5a4e9e97bddc9a5f4e3151f6a97d8b
2022-04-03 18:15:55 -07:00
Sridhar Kasukurthi
c2fd5acf47 sepolicy_vndr: Add policy for atfwd client
Add policy for atfwd daemon client

Change-Id: I0251b892ffdfbd02ba16b3dc08998581b1c45015
CRs-Fixed: 3164800
2022-03-31 21:49:28 -07:00
Jishnu Prakash
183bcd90c7 sepolicy_vndr: Correct paths for RGB nodes for parrot
Correct paths used in sepolicy rules for RGB LED nodes on PM6150L
for parrot.

Change-Id: Ibd3965ffc854a34e099c195cb4b687a2b262c9c5
2022-03-30 01:59:24 -07:00
Fenglin Wu
f47f650959 sepolicy: add selinux label for LED devices
Add LED devices path in genfs_contexts for it to get correct selinux
label.

Change-Id: Ieda247900e453e7ee692e47a4b2aa56eaa999fdd
2022-03-28 16:43:26 +08:00
jiaoyuan
3f754bc42e sp-hal: add new policy for libbitml_nsp_v2_skel.so
issue:snapcam app call libbitml_nsp_v2_skel.so has permission denied
fix:libbitml_nsp_v2_skel.so need to change to sp-hal, then system domain can
call vendor domain

Change-Id: Ia890bb74420d3c397ed7024d8ca83fe7b2cbdd56
2022-03-25 15:48:51 -07:00
qctecmdr
6b040fd37d Merge "dontaudit for default_prop policy" 2022-03-22 05:16:29 -07:00
jiaoyuan
d4b107e46b dontaudit for default_prop policy
Change-Id: I18d0ce1fb720220cfed590167c217fa483e49917
2022-03-22 14:50:55 +08:00
qctecmdr
431c8fc913 Merge "sepolicy_vndr : setting the secontext for spcom wakup nodes" 2022-03-21 22:56:41 -07:00
shrkum
4da82c2a38 sepolicy: Adding mmc1 type device.
Change-Id: Ia188c6cf4314acb80de790d597354d4348083f90
2022-03-21 15:58:48 +05:30
sasikumar maddineni
7f652a720a sepolicy_vndr : setting the secontext for spcom wakup nodes
Change-Id: I92c47c145f587c6de7f36ca232da14e074f2a54e
2022-03-17 00:00:04 -07:00
jiaoyuan
2fe1537c20 Snapcam: add new policy for snapcam
Change-Id: Iceed05e542813503a262e3c79dc12b5c9ba4f062
2022-03-10 15:18:43 +08:00
qctecmdr
c01b7afc4b Merge "sepolicy: add sys_module capability for hal_wifi_default" 2022-03-07 21:47:49 -08:00
Hu Wang
75d1426dfe sepolicy: add sys_module capability for hal_wifi_default
When enable AP with wlan2, wifi@1.0-service needs to create wlan2
iface if it is not exists. An avc denied message arises that warns
wifi@1.0-service lacks sys_module capability, but finally wlan2
iface is still created.

Fix the avc denied message by adding sys_module capability for
hal_wifi_default.

CRs-Fixed: 3138698
Change-Id: I24fe42a77c135b9a11710c530904eec34e2b5daf
2022-03-04 15:04:53 +08:00
Rohit Soneta
24ced1be5a sepolicy: Add rule for TUI HAL to access allocator HAL
Change-Id: I5b8e24bb63f3b0d458772991928111b8abf289ad
2022-03-03 22:52:42 -08:00
Jishnu Prakash
e35c14c91f sepolicy_vndr: Add sepolicy rules to access RGB nodes
Add sepolicy rules for RGB LED nodes on PM6150L to ensure correct
permissions for sysfs_leds.

Change-Id: I8d28a4466380c9b55defc0cabbdb9d26d9838e1d
2022-03-03 03:22:14 -08:00
qctecmdr
920922a571 Merge "Enable sepolicies for Neo Change-Id: I7fd754fb9b3554ef2fbc4fc0b6d7a6aaf45dc637" 2022-02-28 23:51:58 -08:00
sasikumar maddineni
69c2a84997 Enable sepolicies for Neo
Change-Id: I7fd754fb9b3554ef2fbc4fc0b6d7a6aaf45dc637
2022-02-22 12:41:12 +05:30
Arvind Kumar
35e9d83d49 Add rule to fix avc denial for qtidiagservices
Fix below denial for qtidiagservice
avc: denied { search } for comm="ti.diagservices" name="data"
dev="sda12" ino=380 scontext=u:r:qtidiagservices_app:s0
tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir
permissive=0

Change-Id: I25576aa296744a4e2173e132b7e381f3a9623230
2022-02-21 20:10:08 -08:00
Naman Jain
5ac9aa6834 sepolicy_vndr: Add sepolicy for ctl.vendor.console
Add property for ctl.vendor.console to fix avc denial issues, and
add permission for setprop.

Change-Id: I4e71c72f605ec8908eec2493d3c0ba1187aae1a4
2022-02-20 20:36:53 -08:00
Subash Abhinov Kasiviswanathan
87290b49ce rmnet: Update module related policies
Move all the netmgrd policies from qva to common.
Provide rmnet module sysfs read access to shsusrd.
Add the parameters belonging to all rmnet extended modules to rmnet context.

CRs-Fixed: 3134255
Change-Id: Icfa7965d8f3f2793ec0680db58c94146707652dd
2022-02-18 15:11:55 -07:00
qctecmdr
4efa21ca30 Merge "sepolicy_vndr: Add shell permission to /sys/class/kgsl/kgsl-3d0/perfcounter" 2022-02-16 17:10:46 -08:00
Mohammed Mirza Mandayappurath Manzoor
985bbf7e34 sepolicy_vndr: Add shell permission to /sys/class/kgsl/kgsl-3d0/perfcounter
Allow shell users to have permission to update sysfs node
/sys/class/kgsl/kgsl-3d0/perfcounter

Change-Id: I648b7f4b25e4c8c1644be5046677f41e7b5d2f8c
2022-02-11 16:46:25 -08:00
Subash Abhinov Kasiviswanathan
104ec4065b sepolicy_vndr: fix copyright markings
Change-Id: I95093537c84f89e9a79acc6286d93cc18e9a0772
2022-02-10 15:07:52 -07:00
qctecmdr
a503824f01 Merge "sepolicy: add labels to /sys/block/dev/sd*" 2022-02-09 04:25:42 -08:00
Divyanand Rangu
40f5a66461 sepolicy: add labels to /sys/block/dev/sd*
Adding a new label to /sys/block/dev/sd*
Allow vendor_qti_init_shell to have permissions to
update read_ahead_kb nodes of
 - /sys/block/ram*
 - /sys/block/loop*
 - /sys/block/sd*
 - /sys/block/zram0

Change-Id: I123fb7608b95c33ec15b6c5ad3f1e7dd471c6853
2022-02-08 16:13:33 +05:30
Sasi Kumar Maddineni
dd926ac309 parrot: Enable sepolicies needed for Parrot
Change-Id: I3fe6f3990b4314ee174abed475cf739737ee14f4
2022-02-07 22:21:16 -08:00
Abhinav Kannan
cd12194456 sepolicy_vndr: update policies for Spearhead
* Allow Spearhead to create and manage child processes. The child
  processes of Spearhead will manage a subset of Spearhead
  functionality
* Allow creation and management of FIFO file. The FIFO file is used
  to control the operation of Spearhead (ON / OFF) via filesystem

Change-Id: Ie2c715b2a777b4754ccb5c5be1eebf858b80ef27
2022-02-01 22:07:19 -08:00
Mukesh Ojha
ed154ce683 Add ufs rawdump device to avoid AVC denial
Change-Id: I053530b736531d6ace08063ce23f15ce0d0ecdcc
2022-01-31 23:32:17 -08:00
Jun-Hyung Kwon
c7bbef3acc sepolicy_vndr: add debug property for sensors
add debug property for sensors and restrict the use of it
only with userdebug/eng build

Change-Id: I72ec219cead1b122467f6bcde69f05294503f3cb
2022-01-31 00:32:12 -08:00
Jaihind Yadav
584e36bb1e making qvr, sxr, rild,graphics hal binderservice.
CTS test is failing due to binder call permission issue for dumpstate.

Change-Id: I34cf54c03ed30a63644194d20b31eb4b77a2dc53
2022-01-28 05:56:54 -08:00
Fei Mao
cf62862160 sepolicy_vndr: hal_trustedui: Add more sepolicy rules for touch
Add more sepolicy rules to access new trusted_touch_enable,
trusted_touch_type and trusted_touch_event nodes in TUI HAL.

Change-Id: I9592fb68dc3d38288b5b4ed6c5c118eefc1cf4fb
2022-01-24 17:59:23 -08:00
Ravi Kumar Siddojigari
989db96adb sepolicy_vndr: add kernel domain dir serach on debugfs_mmc
As the debugfs_mmc check is going to be done most of drivers
and will hit search denails .
So adding the permission to dir search .

Change-Id: I69751e34bcad90af9bfa4d98c89287258382fe7c
2022-01-20 21:13:02 -08:00
Jaihind Yadav
ea9aa9a0b9 sepoliy_vndr :labeling socid and granting the permission to the domains.
Soc_id and family are set to be global read .

Change-Id: I3f031918cec9aaec3cc626ec79d55cd64f190f69
2022-01-16 06:08:23 -08:00
qctecmdr
818aef7b52 Merge "Add WPSS subsystem to file_context" 2022-01-13 05:53:13 -08:00
qctecmdr
24444a146c Merge "Snapcam: change copyright for new file" 2022-01-13 02:24:58 -08:00
qctecmdr
8c22a2faf8 Merge "Camera: Add permission to access XDSP" 2022-01-12 19:53:06 -08:00
jiaoyuan
682cb08ae3 Snapcam: change copyright for new file
change copyright for new file

Change-Id: I9bf9b14667ced3fb760e75b4d9b397d4eb91efd5
2022-01-12 17:00:54 -08:00
qctecmdr
427bf9ba15 Merge "sepolicy_vndr: vendor-qti-testscripts: Allow reading vendor_usb_prop" 2022-01-12 00:03:15 -08:00
Mukesh Ojha
b34423cabd Add WPSS subsystem to file_context
While setting ssr recovery persist property avc denial error
is thrown and that could be due to wpss is not added
to the allowed list.

Add wpss subsystem to the list to overcome this.

Change-Id: Ie77539ccc5d44056f54fe7c006017438ee903eec
2022-01-10 22:17:00 -08:00