Commit graph

4237 commits

Author SHA1 Message Date
Mukesh Ojha
ed154ce683 Add ufs rawdump device to avoid AVC denial
Change-Id: I053530b736531d6ace08063ce23f15ce0d0ecdcc
2022-01-31 23:32:17 -08:00
Jun-Hyung Kwon
c7bbef3acc sepolicy_vndr: add debug property for sensors
add debug property for sensors and restrict the use of it
only with userdebug/eng build

Change-Id: I72ec219cead1b122467f6bcde69f05294503f3cb
2022-01-31 00:32:12 -08:00
Jaihind Yadav
584e36bb1e making qvr, sxr, rild,graphics hal binderservice.
CTS test is failing due to binder call permission issue for dumpstate.

Change-Id: I34cf54c03ed30a63644194d20b31eb4b77a2dc53
2022-01-28 05:56:54 -08:00
Fei Mao
cf62862160 sepolicy_vndr: hal_trustedui: Add more sepolicy rules for touch
Add more sepolicy rules to access new trusted_touch_enable,
trusted_touch_type and trusted_touch_event nodes in TUI HAL.

Change-Id: I9592fb68dc3d38288b5b4ed6c5c118eefc1cf4fb
2022-01-24 17:59:23 -08:00
Ravi Kumar Siddojigari
989db96adb sepolicy_vndr: add kernel domain dir serach on debugfs_mmc
As the debugfs_mmc check is going to be done most of drivers
and will hit search denails .
So adding the permission to dir search .

Change-Id: I69751e34bcad90af9bfa4d98c89287258382fe7c
2022-01-20 21:13:02 -08:00
qctecmdr
70594046d3 Merge "sepolicy : fix port-bridge denial" 2022-01-20 03:16:29 -08:00
qctecmdr
51208e6f53 Merge "sepolicy: allow qvrd to access sensors" 2022-01-19 03:42:38 -08:00
Kaustubh Pandey
c7bbcb21a0 sepolicy : fix port-bridge denial
add entry for sysfs node.
avc: denied { read } for comm="port-bridge" name="name" dev="sysfs" ino=99035
scontext=u:r:vendor_port-bridge:s0 tcontext=u:object_r:sysfs:s0 tclass=file
permissive=0

Change-Id: Ibd7593554a89932211c8438a56097209d25550ef
Signed-off-by: Kaustubh Pandey <quic_kapandey@quicinc.com>
Acked-by: Deepanshu Singh <deepansh@qti.qualcomm.com>
2022-01-17 23:09:04 +05:30
Jaihind Yadav
ea9aa9a0b9 sepoliy_vndr :labeling socid and granting the permission to the domains.
Soc_id and family are set to be global read .

Change-Id: I3f031918cec9aaec3cc626ec79d55cd64f190f69
2022-01-16 06:08:23 -08:00
Zhen Wang
eee51b1efc sepolicy: allow qvrd to access sensors
1. Allow qvrservice to access native sensor services
in system server via bind call.

2. Suppressing the dsp error messages.

Change-Id: I6492c379a8b63dcf0d5faec2426094b616924b67
2022-01-13 17:45:49 -08:00
qctecmdr
1a0404efb2 Merge "sepolicy: Add rule for hw gplaf node" 2022-01-13 08:06:31 -08:00
qctecmdr
818aef7b52 Merge "Add WPSS subsystem to file_context" 2022-01-13 05:53:13 -08:00
qctecmdr
24444a146c Merge "Snapcam: change copyright for new file" 2022-01-13 02:24:58 -08:00
qctecmdr
8c22a2faf8 Merge "Camera: Add permission to access XDSP" 2022-01-12 19:53:06 -08:00
jiaoyuan
682cb08ae3 Snapcam: change copyright for new file
change copyright for new file

Change-Id: I9bf9b14667ced3fb760e75b4d9b397d4eb91efd5
2022-01-12 17:00:54 -08:00
qctecmdr
427bf9ba15 Merge "sepolicy_vndr: vendor-qti-testscripts: Allow reading vendor_usb_prop" 2022-01-12 00:03:15 -08:00
Mukesh Ojha
b34423cabd Add WPSS subsystem to file_context
While setting ssr recovery persist property avc denial error
is thrown and that could be due to wpss is not added
to the allowed list.

Add wpss subsystem to the list to overcome this.

Change-Id: Ie77539ccc5d44056f54fe7c006017438ee903eec
2022-01-10 22:17:00 -08:00
Rajat Asthana
c39fecd714 fillmore: Move the sepolicy rule from file_contexts to genfs_contexts
The qfprom node is not accessible when it's path is added to file_contexts, so
removing it from feat_conf and adding to genfs_contexts, to access it.

Change-Id: Ib916eda6e26992d833c7ec49fa76de26555d73f9
2022-01-10 16:51:59 +05:30
Samyak Jain
40fdab9599 Add rule to allow access to sxr prop and use tcp/udp socket.
Change-Id: I14f6299355dfe23ec1cb7271cece4b4b3c17373c
2022-01-07 01:04:59 -08:00
qctecmdr
2f7c03656c Merge "sepolicy: Update sysfs_net for mhi" 2022-01-05 17:01:42 -08:00
qctecmdr
4db127d847 Merge "Neural Networks: Remove NNHAL-1.3 configuration" 2022-01-05 03:41:25 -08:00
Weiyi Chen
fc1301e654 sepolicy: Update sysfs_net for mhi
Update sysfs_net for mhi net device.

Change-Id: I71599ceccf5c47d4ef8c28dd9e82969821e0c925
2022-01-04 10:49:40 -08:00
PavanKumar S.R
e30aeb41dd sepolicy: Fix avc denials for wakeup nodes
Label wakeup sysfs nodes listed by SuspendSepolicyTests.sh

Change-Id: Ica4b5f08ce1f7cf9f9580083d9e3e577b5a6b51e
2022-01-03 10:59:47 +05:30
Jaihind Yadav
a120840ed3 remove read permission for untrusted app to read device info.
Change-Id: I6d04b70ad23a08176ab9fa2c559460a4e6009efa
2021-12-28 23:19:53 -08:00
Jack Pham
9a2475b08c sepolicy_vndr: vendor-qti-testscripts: Allow reading vendor_usb_prop
One particular script running under vendor-qti-testscripts context
requires calling `getprop persist.vendor.usb.enable_ftrace`. Add
permission for it to read vendor_usb_prop.

Change-Id: I06a477a166c7b3c6d97d4832478cc59c48790933
2021-12-28 10:05:57 -08:00
Anjaneya Prasad Musunuri
b1203c1f08 sepolicy_vndr: Suppress QMCS related denial errors in ENG builds
vold deamon tries to query the QMCS partition during bootup.
While this access is correctly denied, it results in errors.
For debug and ENG builds, suppress denial messages when the vold
context attempts to access the QMCS context.

Change-Id: Ibe9a153e5863ad13475bd777b221bbc8bbfb5893
2021-12-28 04:52:27 -08:00
Varun Garg
e43055c08f sepolicy: Add rule for hw gplaf node
Added rule for hw gplaf related node.

Change-Id: I61bd1d984a97c53e4e3a90ee242c9af101bbecad
2021-12-28 03:45:53 -08:00
Rajashekar Adi
b0b589b96c Neural Networks: Remove NNHAL-1.3 configuration
Remove NNHAL-1.3 configuration and references

Change-Id: I6041344fdd325151d78b78925de727146053463e
2021-12-22 22:37:13 +05:30
harshj
c851ed9854 sepolicy: allow perf-hal to access lplh nodes under /kernel/msm_performance
perf-hal needs to access launch perf lock hardening features nodes for controlling
enable, disable, and sending tunables.

Change-Id: Ia0e14d5075fe5dbb0ce724f93bcee533645472a5
Signed-off-by: harshj <quic_harshj@quicinc.com>
2021-12-20 18:48:41 +05:30
qctecmdr
82627160c1 Merge "Sepolicy: add sepolicy for snapcam jni so" 2021-12-19 17:49:18 -08:00
qctecmdr
ee6c82d0f0 Merge "fillmore: Add sepolicy rule to access the qfprom node" 2021-12-19 07:48:55 -08:00
qctecmdr
3b4e7e5fb4 Merge "sepolicy_vndr: add policies for Spearhead and DLSC" 2021-12-19 03:24:04 -08:00
Rajat Asthana
6a06b6c4ae fillmore: Add sepolicy rule to access the qfprom node
Change-Id: I4a53ac95f17c2a3956d75b7ddbcbd7c971d62d32
2021-12-16 21:26:21 -08:00
Conner Huff
bf39416682 sepolicy_vndr: add policies for Spearhead and DLSC
Spearhead framework is used for collecting data path stats
for debugging. DLSC is the agent that will collect stats
related to the network stack. For this framework to function
we need to define new SELinux policies to provide the
required access privileges.

Since Spearhead will only be enabled on userdebug
builds, move the Spearhead framework policy to
the test folder.

Change-Id: Icb29b7ffd73c255933d05fe7e5de31aa724e2b73
2021-12-16 21:29:31 -07:00
jiaoyuan
40ed4f8e49 Sepolicy: add sepolicy for snapcam jni so
change snapcam app from priv-app domain to own domain
add sepolicy for vendor_snapcam_app domain

Change-Id: I16eda6b773e2f1825f2e4af131e3980e51fa5354
2021-12-16 15:00:56 +08:00
Chinmay Patil
cc82340f1f sepolicy_vndr: Add libsoc helper for camera
-SCVE needs to read soc_id from runtime property to differentiate
 between targets having same lunch option
-Added libsoc helper for hal_camera

Change-Id: If5cef7f1c5cb89ee0bf4d0da83629a60c7d9d056
2021-12-15 03:59:54 -08:00
Pavan Kumar M
8f8a4d3ab1 sepolicy : Add sysfs_net related path entries
Update the secontexts for sysfs_net for filmore target

Change-Id: I8a8394b175811d701061ecb98bd84c65795d3a47
CRs-Fixed: 3092463
2021-12-13 13:11:26 +05:30
qctecmdr
798dd368b6 Merge "sepolicy: add selinux label for vibrator device" 2021-12-12 17:57:01 -08:00
Piyush Pradeep Jain
0eabdacb38 sepolicy_vndr: hal_trustedui: Add sepolicy rules to access touch nodes
Add sepolicy rules to access new trusted_touch_enable,
trusted_touch_type and trusted_touch_event nodes in TUI HAL

Change-Id: Id4c06bf7bc6cae867aeb999d25791093ef8ad8d3
2021-12-08 23:53:23 -08:00
qctecmdr
13c213a4fe Merge "Add vendor.qti.gnss.ILocAidlGnss" 2021-12-08 17:39:04 -08:00
Fenglin Wu
a39fd10855 sepolicy: add selinux label for vibrator device
Add vibrator device path in genfs_contexts for it to get correct selinux
label.

Change-Id: Icfe257fa039e3293e6c1abd231f12ae716f3a476
2021-12-08 14:47:32 +08:00
Malathi Gottam
85454ae238 sepolicy_vndr: allow mediacodec to access dma buf heaps
Allow mediacodec to access vendor DMA-BUF heaps.

Change-Id: I13233cecacf19f0c88143f8c8c715c78726da844
2021-12-07 21:48:03 -08:00
Pavan Kumar M
11e936be11 Add vendor.qti.gnss.ILocAidlGnss
- With recent dataconnection aidl changes,
  vendor.qti.gnss.ILocAidlGnss got removed.
  This change adds the declaration of
  ILOCAidlGnss.

Change-Id: I6be28868e8a53583b6d39e8e1b6c0c609b9a4f84
2021-12-07 10:21:30 +05:30
Suresh Koleti
3c8cf06dc8 Add IQtiRadio and IImsRadio in vendor
- Add IQtiRadio and IImsRadio in
  vendor_hal_telephony_service domain in vendor
  partition which is needed when GSI build is loaded.

Change-Id: I3a6d8a1486558db1622c2c447256024eed8773ae
CRs-Fixed: 3073450
2021-12-01 21:11:26 -08:00
Zube Molokwu
0be22d60ab sepolicy: Add sepolicy for IDisplayConfig AIDL
Adds sepolicy rule for IDisplayConfig AIDL in the case of GSI

Change-Id: I232839e30fc10f5dcc7195e1fbd59875e7947f25
2021-12-01 18:59:00 -08:00
qctecmdr
a064269dc1 Merge "sepolicy: agmsvc: allow access to adsp loader sysfs node" 2021-12-01 09:57:14 -08:00
qctecmdr
305c12bb23 Merge "qtidataservices_app : add getopt for udp socket" 2021-11-30 20:04:48 -08:00
Ramkumar Radhakrishnan
f8b50befef sepolicy: Add permission to access panel boot param node
Change-Id: Iad206bf924278d65cea4b35b107576e2442fae2a
2021-11-30 15:15:01 -08:00
qctecmdr
459de7a1b6 Merge "sepolicy: Fix avc denials for wakeup nodes" 2021-11-30 09:32:09 -08:00
qctecmdr
54e65312d9 Merge "add dataconnection aidl service permissions." 2021-11-29 10:09:22 -08:00