Jake Weinstein
5d67c870c3
common: sepolicy: Label ipebpsstriping170 for pinner
...
Change-Id: I75ffd066ff6a5989bb6bd735278f63c7d9e57ea6
2022-11-08 08:17:11 +00:00
Sandeep Singh
d9f6752cbb
common: sepolicy: Add permission for cnss-daemon to write in persist folder
...
Add permission for cnss-daemon to create file in
/mnt/vendor/persist/wlan folder.
Change-Id: I11690dee5383e8555260a1c6bbfa266043ed395e
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-06 14:51:27 +00:00
UtsavBalar1231
39942ef559
common: sepolicy: Allow flipendo to find vendor_hal_perf
...
This fixes ANDR-PERF-CLIENT-SYS not being accessed by flipendo
E SELinux : avc: denied { find } for interface=vendor.qti.hardware.perf::IPerf sid=u:r:flipendo:s0:c199,c256,c512,c768 pid=21903 scontext=u:r:flipendo:s0:c199,c256,c512,c768 tcontext=u:object_r:vendor_hal_perf_hwservice:s0 tclass=hwservice_manager permissive=0
E ANDR-PERF-CLIENT-SYS: IPerf:: Perf HAL Service 2.2 is not available.
Change-Id: I42a582864309f17e183e10baf04cbd01eba04913
Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-06 14:48:40 +00:00
Omkar Chandorkar
7a8a93d1a4
common: sepolicy: suppress harmless denials
...
- for cleaner avc logs
Change-Id: I55f0317e38e6a2fc74739db9993f59e628d099c3
Co-authored-by: UtsavBalar1231 <utsavabalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-05 17:33:25 +00:00
UtsavBalar1231
f50136a7a6
common: sepolicy: Allow init.qcom.usb.sh to create files in uvc.0 dir
...
During the UVC conifguration initialiation qcom USB script tries to create multiple folder and symlinks
so allow qcom USB script to succesfully create them without any denials.
This fixes:
W init.qcom.usb.s: type=1400 audit(0.0:10): avc: denied { write } for name="uvc.0" dev="configfs" ino=27535 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W init.qcom.usb.s: type=1400 audit(0.0:11): avc: denied { write } for name="uvc.0" dev="configfs" ino=27535 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir : type=1400 audit(0.0:12): avc: denied { write } for name="header" dev="configfs" ino=27537 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln : type=1400 audit(0.0:13): avc: denied { write } for name="fs" dev="configfs" ino=27546 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln : type=1400 audit(0.0:14): avc: denied { write } for name="ss" dev="configfs" ino=27547 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir : type=1400 audit(0.0:15): avc: denied { write } for name="uncompressed" dev="configfs" ino=27550 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir : type=1400 audit(0.0:16): avc: denied { write } for name="uncompressed" dev="configfs" ino=27550 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir : type=1400 audit(0.0:17): avc: denied { write } for name="mjpeg" dev="configfs" ino=27551 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir : type=1400 audit(0.0:18): avc: denied { write } for name="mjpeg" dev="configfs" ino=27551 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir : type=1400 audit(0.0:19): avc: denied { write } for name="h264" dev="configfs" ino=27552 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir : type=1400 audit(0.0:20): avc: denied { write } for name="h264" dev="configfs" ino=27552 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W mkdir : type=1400 audit(0.0:21): avc: denied { write } for name="header" dev="configfs" ino=27549 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln : type=1400 audit(0.0:22): avc: denied { write } for name="header" dev="configfs" ino=27549 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln : type=1400 audit(0.0:23): avc: denied { write } for name="header" dev="configfs" ino=27549 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln : type=1400 audit(0.0:24): avc: denied { write } for name="header" dev="configfs" ino=27549 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln : type=1400 audit(0.0:25): avc: denied { write } for name="fs" dev="configfs" ino=27556 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln : type=1400 audit(0.0:26): avc: denied { write } for name="hs" dev="configfs" ino=27557 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
W ln : type=1400 audit(0.0:27): avc: denied { write } for name="ss" dev="configfs" ino=27558 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:configfs:s0 tclass=dir permissive=0
Change-Id: Ic092fe1d6ea0d42f0d4939ac3a4241ec0063697d
Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-05 17:33:25 +00:00
UtsavBalar1231
522391750b
common: sepolicy: Allow init.qcom.post_boot.sh to set
...
watermark_scale_factor
- addresses
W init.qcom.post_: type=1400 audit(0.0:42): avc: denied { write } for name="watermark_scale_factor" dev="proc" ino=52566 scontext=u:r:vendor_qti_init_shell:s0 tcontext=u:object_r:proc_watermark_scale_factor:s0 tclass=file permissive=0
Change-Id: Ib79c0208e758f03df5ce6652322802354836d6a5
Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-05 17:33:25 +00:00
UtsavBalar1231
24cc0790bc
common: sepolicy: Allow init to modify read_ahead_kb and discard_max_bytes
...
Change-Id: Ie5eee0883558a489c8cda2e4418f7a7144bf1ae1
Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com>
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-05 17:33:25 +00:00
kocolin
574d2193e2
common: sepolicy: Label libipebpsstriping for pinner
...
Change-Id: I6806151eee833725e173903d03e9459839333565
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-11-05 17:33:25 +00:00
Himanshu Agrawal
97b4c0d232
common: sepolicy: Fix compilation issues for newer upgrade
...
Change-Id: I60686d0066a1aa099a7dffbca091c9a7e2bac7f8
2022-10-30 04:50:58 +00:00
Jake Weinstein
4cf4a266c1
common: sepolicy: Remove blank msmsteppe policies
...
Qualcomm removed them at
"removing some of the target dir from the component.", which
we reverted.
Change-Id: If2d407c03c112099b67bcd88d2ec4b31c0425642
2022-10-30 02:31:07 +09:00
PainKiller3
89e506c28a
sepolicy: Update paths for new sepolicy location
...
Change-Id: I4fa022c674cf031fa2c89fabad1f457ac3516132
2022-10-29 17:12:55 +00:00
Jyotiraditya Panda
4bd3d38ceb
sepolicy_vndr: lahaina: Fix rtc0 wakeup node label path.
...
Fixes:
W Binder:601_2: type=1400 audit(0.0:797): avc: denied { read } for name="wakeup15" dev="sysfs" ino=65223
scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=dir permissive=0
E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup15: Permission denied
Change-Id: I7e3d90eab1b0a7ad73d810221bf1c7aca3936883
Signed-off-by: Jyotiraditya Panda <jyotiraditya@aospa.co>
2022-10-29 11:58:28 +09:00
Jake Weinstein
9373746f3b
common: sepolicy: Remove waipio policies
...
These were added back at 'Revert "removing some of the target dir from the component."',
however, taro uses the taro directory.
Change-Id: Ide946d9db03f1f2ffbabab0203090238b18475f3
2022-10-29 11:58:28 +09:00
Omkar Chandorkar
717123bb4d
sepolicy_vndr: generic: allow tlocd to search for vendor_location_data_file
...
Change-Id: I7a6e3679e8b3c216e034f0897218898539337e42
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-29 11:58:28 +09:00
Omkar Chandorkar
4e2cc088a4
sepolicy_vndr: generic: address ims denials for legacy stack
...
Change-Id: Icd379fdefdeb8feabe7ec658cf8a4e8056b35e53
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-29 11:58:28 +09:00
Omkar Chandorkar
960bf8f349
Revert "Neural Networks: Remove NNHAL-1.3 configuration"
...
This reverts commit b0b589b96c18ed37c77479ece367c6b34af7c56b.
Change-Id: Ifadb4bc83d580735ba9be940f0e77057f9e70e68
2022-10-29 11:58:28 +09:00
Omkar Chandorkar
1c575c42d0
sepolicy_vndr: qva: allow vppservice to access ion_device
...
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Change-Id: I10edaf60af3682599b55d9877f7ef11e5aba9b81
2022-10-29 11:58:28 +09:00
Omkar Chandorkar
782b7e8229
sepolicy_vndr: qva: allow esepowermanager to access ion_device
...
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Change-Id: I16291a16ffac819960aeb681af9ecae1b48f4b61
2022-10-29 11:58:28 +09:00
Omkar Chandorkar
20d7c954dd
sepolicy_vndr: generic: add poweropt sepolicy for kona
...
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Change-Id: I8477b7455b12dfa783d7e646b92726e6dc91361a
2022-10-29 11:58:28 +09:00
Omkar Chandorkar
0e4a4ed479
sepolicy_vndr: qva: allow vendor_hal_qteeconnector to access ion_devices
...
- addresses
W qteeconnector@1: type=1400 audit(0.0:144): avc: denied { read } for name="ion" dev="tmpfs" ino=1280 scontext=u:r:vendor_hal_qteeconnector_qti:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=0
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Change-Id: I743a9efe95c4d56dd613722f6e61c200297a0b16
2022-10-29 11:58:28 +09:00
Omkar Chandorkar
1dbfe6c867
sepolicy_vndr: qva: allow netmgrd to modify rmnet module parameters
...
- addresses
W netmgrd : type=1400 audit(0.0:135): avc: denied { search } for name="parameters" dev="sysfs" ino=51272 scontext=u:r:vendor_netmgrd:s0 tcontext=u:object_r:vendor_sysfs_rmnet:s0 tclass=dir permissive=0
Change-Id: I88a99677ae3a1a0070111d1978c48d1cf43094e1
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-29 11:58:28 +09:00
Arian
8ede8d6ad2
sepolicy_vndr: qva: Update vendor property types
...
Change-Id: I93335f35c94250bc62defb36552ac5db2efbb98b
2022-10-29 11:58:28 +09:00
Foxtrot47
09af1dabaf
sepolicy_vndr: generic: Drop hbtp rule from msmnile
...
Change-Id: Ib14ff840d752713da5cd1ca72e6516d5359beb6a
2022-10-29 11:58:28 +09:00
chrisl7
df490c97ef
sepolicy: vndr: Remove hal_rcsservice to all platform
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: I140ee0b92bd1b47bb91e1c2df422e7e2b2676774
2022-10-29 11:58:28 +09:00
Arian
87fd803d2a
sepolicy_vndr: qva: Remove mediatranscoding sepolicy
...
commit [1] made the mediatranscoding type private.
Instead [2] was merged into android12-gsi which
moves the rule to system/sepolicy.
[1]: 63655462bb
[2]: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1880325
Change-Id: Ic6d9db21c437cbafe4d008eba9d67c5f3ce5842a
qva: Remove mediatranscoding sepolicy
Change-Id: Ie9818d52e997de166f8f9229369d2e29f78d8e95
2022-10-29 11:58:28 +09:00
MoetaYuko
3b251dd74c
sepolicy: Fix genfscon for kona
...
Change-Id: I4ed9e080904d7d2dbbb88a2da0aaffda37a0277b
2022-10-29 11:58:28 +09:00
Omkar Chandorkar
ae1f27b0b6
kona: fix compile
...
Change-Id: I18270f41c2d53ce2b3628ab4bc843e8560557ba3
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-29 11:58:28 +09:00
Jake Weinstein
5a5b143fcd
sepolicy: Add missing 8150-8350 policies from LA.UM.9.14
...
Change-Id: Ibdecba5a310e3a2af4bb54f625986c8126d9669a
2022-10-29 11:58:28 +09:00
Jake Weinstein
4649ff3ef3
sepolicy: Import 710/845 changes from LA.UM.9.14
...
Change-Id: I221bd822701b131828c7889def64f54106431e74
2022-10-29 07:33:03 +09:00
Jake Weinstein
6f4c4eb90d
common: sepolicy: Build custom policies
...
Moving to device/qcom/common so we don't need
to rebase so many changes going forward.
Change-Id: I0a51c45e0bd54fe14a0bf95e7460bcd9688705ca
2022-10-29 07:33:03 +09:00
Jaihind Yadav
62f8f7040b
Revert "removing legacy dir from the component."
...
This adds back support for 845 and 710
This reverts commit 033dcb081f233962f9a549910ffb796c943720c7.
Change-Id: I4198a69889b3b1bf6f352cc0a4e579cee2c633ac
2022-10-29 05:31:21 +09:00
Jake Weinstein
dcca525fb8
Revert "removing some of the target dir from the component."
...
This adds back SDM845, SM6125, SM8150, SM8250, SM8350,
and others.
This reverts commit 4346ce0d904984c5582d62cd9586a15abf2d62d5.
Change-Id: Idc0f96e28b4d47481d1281d34bf13859a45be1d8
2022-10-29 05:03:45 +09:00
Jake Weinstein
157b56fb51
common: remove stuff that either belongs in device or doesn't belong at all.
...
* Note: cryptfs_hw was removed so that devices can use their own.
Change-Id: I6f83ceb7b32a0f578ecdd1a9ad0b92211deace6b
2015-10-11 20:20:17 +00:00
Georgi Hristov
f52d033228
sepolicy: add policies for camera
...
Added security policies needed for camera daemon, for
domain transition, device policies
CRs-fixed: 569218
Change-Id: Ib7126a0465a88a629afee871d242e27ad8221a66
2014-04-17 03:27:48 -07:00
Harout Hedeshian
a5cb2cbe0b
sepolicy: Policies for IPV6 Tethering
...
Added security policies needed for IPV6 tethering functionality
to create, listen and read from sockets
CRs-fixed: 555006
Change-Id: I138005b9acf8a2ae7505ef34f7ba722105554cf2
2013-10-24 14:21:28 -06:00