summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2023-12-28sepolicy_vndr: Label QTI health AIDL serviceumineko-legacyBruno Martins
Change-Id: Ic49f0d4fa46ac4749e9bad3a9d4a780c54c3880e
2023-12-28sepolicy_vndr: legacy: Allow rild to binder call qtidataservices_appLuK1337
Change-Id: Ifa358020513c1a01554d4e715612b59ca1342f67
2023-12-28sepolicy_vndr: Remove duplicate bt_device type definitionLuK1337
Change-Id: I6b79865a3b21b887723ef603fbd3a10ddf0eda7b
2023-12-28sepolicy_vndr: isolated_app -> isolated_app_allLuK1337
Change-Id: I10b09afe41b927875d1f7c37d6fc18b75ae1250a
2023-12-28Remove vendor_service.Steven Moreland
We want to avoid associating types with where they can be used. Bug: 237115222 Test: build Change-Id: Iddc557b9eeef7acee16efa37ba832d2eb033cdc6
2023-06-13Add sepolicy for ISupplicantVendor aidltachibana-mr1-legacyJiani Liu
This commit adds required sepolicy changes to avoid avc denial for new vendor.qti.hardware.wifi.supplicant.ISupplicantVendor/default. Change-Id: Ie272772338299eb2c684b1c3683e062b12ca486b
2023-06-13sepolicy_vndr: Restrict access to /sys/devices/soc0/serial_numberMichael Bestas
Change-Id: I6254ef6e160ff0d3c3ce2e51f20f557e75826dff
2023-06-13sepolicy_vndr: legacy: Guard debugfs rulesMichael Bestas
Allow building with PRODUCT_SET_DEBUGFS_RESTRICTIONS set. Change-Id: I0d0703ea21f1f812c06247a3db2bc755e8904149
2023-06-13sepolicy_vndr: legacy: Allow qti_init_shell to set proc_watermark_scale_factorQuallenauge
Change-Id: I5e59fd91e723df95224e5738295c2b8007f6f053
2023-06-13sepolicy_vndr: qva: Label vppServiceMichael Bestas
Change-Id: I29b6b536ffa7b1e0f04daf27259643694097081d
2023-06-13sepolicy_vndr: lito: Label sdcard read_ahead_kbMichael Bestas
Change-Id: I2680a441d7aacba87aab786ed00bc09f0889df1e
2023-06-13sepolicy_vndr: bengal: Label emmc discard_max_bytes sysfsMichael Bestas
Change-Id: I358bf7ccf29dadcac53e646d51c7c9a476f5d023
2023-06-13sepolicy_vndr: qva: label bengal extconMichael Bestas
Change-Id: Ie9f50b544665a8b66b172f35c0f45c5404628595
2023-06-13sepolicy_vndr: Allow init to unmount bt_firmware_file/firmware_fileLuK1337
Change-Id: Iab72245735d39aabbdf4f3f40238b36cf1701452
2023-06-13sepolicy_vndr: kona: update sepolicy for KineticsXR controllersMeng Wang
Update sepolicy for KineticsXR controllers. Change-Id: I75a28dc44dfad25e0be8a470a30baa673f95a4b5
2023-06-13sepolicy_vndr: Add permission to usb wakeup node of host modePratham Pratap
Currently if the target is in host mode bus suspend and is woke up by connecting USB peripheral, system_suspend server tries to read or open or getattr /sys/devices/platform/soc/c440000.qcom,spmi/ spmi-0/spmi0-00/ c440000.qcom,spmi:qcom,pm6150@0:qcom,usb-pdphy@1700/ usbpd/usbpd0/ nodes, it gets a denial as the wakeup nodes are created dynamically,so when system_suspend tries to access the node it throws a denial since it never got the permissions for accessing the wakup nodes. Following is the denial: avc: denied { read } for comm="Binder:650_2" name="wakeup18" dev="sysfs" ino=66695 scontext=u:r:system_suspend:s0 tcontext=u:object_r:vendor_sysfs_usbpd_device:s0 tclass=dir permissive=0 Fix this by creating a new sepolicy file and providing system_suspend_server the permission of read to vendor_sysfs_usb_node. This would give permissions to sysfs_wakeup. Change-Id: Ib624a90dadabd27044090cc7df0c7eb90a92ec40
2023-06-13Revert "Add sepolicy rules to run imsdaemon on bengal"Michael Bestas
Bring back the old rules used by old blobs. This reverts commit 42ff8589e696ee22bdd158e9332eb1b14ebb3adb. Change-Id: I5986a6c59b7a72091e526586e2cba736c7fa36c4
2023-06-13sepolicy_vndr: bengal: Label discard_max_bytes sysfsMichael Bestas
Change-Id: I1cc993d353cf2966685a3276b4c97d86c7030326
2023-06-13sepolicy_vndr: bengal: Correct sysfs_wakeup pathsMichael Bestas
Include all possible wakeup paths Change-Id: I3d7a23abd7fb2668b51d1a51dc0a6bd316c0f379
2023-06-13sepolicy_vndr: Allow qti_init_shell to set proc_watermark_scale_factor.Quallenauge
Change-Id: I4a4812393c50ffec9d64dc1ad13514551c47985e
2023-06-13sepolicy_vndr: Add rules for init-qti-dcvs-shSaikumar Vutukuri
Change-Id: Idd7c3635afd8fa6539d6d4a447cbb0962aefd684
2023-06-13sepolicy_vndr: Allow getprop for persist.debug.trace propertyNaman Jain
Allow vendor init scripts to getprop persist.debug.trace property to fix avc denial issues. Change-Id: I739d8eb63d305b810af16dd2e31e5fead42037a7
2023-06-13sepolicy_vndr: legacy/qva: label extcon filesJohnnLee
Bug: 199748390 Test: boot with those files labeled 09-13 17:01:44.542 1865 1865 I auditd : type=1400 audit(0.0:5): avc: denied { read } for comm="android.ui" name="extcon3" dev="sysfs" ino=61612 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 Change-Id: Iabab1243ce7259d46040901a2a734b5962d281a5 Change-Id: Id46c9620b0607e66f6ae61b2c30ede1b6996320f
2023-06-13sepolicy_vndr: generic: Label more discard_max_bytes sysfsMichael Bestas
Change-Id: I43e2c93d5915157c7a87a8f0799c45a54e251040
2023-06-13sepolicy_vndr: kona/lito: Label additional sysfs_wakeupMichael Bestas
Change-Id: I3afe448cf9ea34ebcbf831d136af141cadc135bc
2023-06-13sepolicy_vndr: generic: Add audio wakeup nodes for litoMajorP93
* Can't have them in hardware/oplus/sepolicy/qti/vendor/genfs_contexts because it conflicts with generic/vendor/lahaina/genfs_contexts here. Change-Id: I0b5aadad34d6da72275c234fe0429446866d816c
2023-06-13sepolicy_vndr: generic: Allow init write to discard_max_bytesdianlujitao
Change-Id: If22a1fe0036f49d5cfb3f3c21cd9c44b96ac6ae8
2023-06-13sepolicy_vndr: generic: Add some misc wakeup nodes for msmnileMichael Bestas
* Can't have them in hardware/oplus/sepolicy/qti/vendor/genfs_contexts because it conflicts with generic/vendor/lahaina/genfs_contexts here. Change-Id: I542e7b542aec7a7270095c82bfbd0c22941dc9cd
2023-06-13sepolicy_vndr: generic: Add some misc wakeup nodes for konaMichael Bestas
* Can't have them in hardware/oplus/sepolicy/qti/vendor/genfs_contexts because it conflicts with generic/vendor/lahaina/genfs_contexts here. Change-Id: Ie8f2ea1024a93d4e3d908ddef3140d34da8c4bb2
2023-06-13Revert "Add fs_bpf rules for network stack."Michael Bestas
This reverts commit 82a20ed16ebd020e1e142ed27a13fde7b9a0926d. Reason for revert: Not needed on 13 and hits a neverallow. Change-Id: If66dd5dc6c12e41782ad9ef5058377caca08fa36
2023-06-13sepolicy_vndr: legacy: Add support for AIDL widevine halAlexander Martinz
Change-Id: I954c139b25304cf283276f71b05b98e67eb56ec7 Signed-off-by: Alexander Martinz <amartinz@shiftphones.com>
2023-06-13sepolicy_vndr: sdm845: label vbmeta_vendor_[ab]Alexander Martinz
Change-Id: I4977b2a09e0dd802cede610ee777f19ce61f203a Signed-off-by: Alexander Martinz <amartinz@shiftphones.com>
2023-06-13sepolicy_vndr: sdm845: label metadata partitionAlexander Martinz
If a sdm845 device launched with dynamic partitions, it has a metadata partition as well. [ 110.888321] audit: type=1400 audit(3941230.073:20): avc: denied { read } for pid=597 comm="fastbootd" name="sda8" dev="tmpfs" ino=14643 scontext=u:r:fastbootd:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0 [ 110.908854] fastbootd: [libfs_mgr]Failed to open '/dev/block/by-name/metadata': Permission denied Change-Id: I7897c0fec9b490c23111ff7cd08111757628fdf5 Signed-off-by: Alexander Martinz <amartinz@shiftphones.com>
2023-06-13sepolicy_vndr: legacy: Restore `generic` hal_usb rulesOnlyTomInSecond
Fixes usbpd related denials on SDM845. Change-Id: Id74a7d966dec9629dc28d5c2bfe4aa92a67d501a
2023-06-13sepolicy_vndr: hal_usb_qti: Make legacy rules more aligned with QVABruno Martins
Change-Id: If35e87a56efb3e7a82ed2f06bb4dcab8ec4a0e82
2023-06-13sepolicy_vndr: legacy: Allow init write to discard_max_bytesMichael Bestas
system/core/rootdir/init.rc 1110: write /dev/sys/block/by-name/userdata/queue/discard_max_bytes 134217728 1111: write /dev/sys/block/by-name/rootdisk/queue/discard_max_bytes 134217728 Fixes: avc: denied { write } for comm="init" name="discard_max_bytes" dev="sysfs" ino=55527 scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 Change-Id: I9db0cde703a2922171a96d8d99570741f487a3db
2023-06-13sepolicy_vndr: legacy: Add rule to set property for wlan driver/fw ver infoVinay Gannevaram
wlan driver/fw version are set at property at enforcing mode. Add rules to allow to set wlan driver/fw version info CRs-Fixed: 2460816 Change-Id: Ic0bb570cd53fe450512496c5864f432ce3219bbe
2023-06-13sepolicy_vndr: legacy: Allow dpm to read the slm propertyPavan Kumar M
Allow dpm to read the slm property to enable / disable slm. Change-Id: Ibe211c7421a92bf9b04ef75e03f9e8267a0e5695 CRs-Fixed: 2731396
2023-06-13sepolicy_vndr: legacy: allow apexd to write to sysfs_mmc_hostAlexander Martinz
As qualcomm relabels read_ahead_kb and friends as sysfs_mmc_host we explicitly need to grant apexd access to it or it will break. This results in eg GSIs to be unbootable. type=1400 audit(3799551.036:40): avc: denied { read write } for comm="apexd" name="read_ahead_kb" dev="sysfs" ino=81305 scontext=u:r:apexd:s0 tcontext=u:object_r:sysfs_mmc_host:s0 tclass=file permissive=0 Change-Id: Iea24b94318893e8526e06e24bc3308acba37b0cc Signed-off-by: Alexander Martinz <amartinz@shiftphones.com>
2023-06-13sepolicy_vndr: legacy: adding dontaudit for init_shellJaihind Yadav
Change-Id: Ia91078502b448221ad803674a003378e1f7a846c
2023-06-13sepolicy_vndr: legacy: Allow system graphics to access pmic secure_mode nodesRamkumar Radhakrishnan
Change-Id: I9fc932d76f9eceb157c0b48cf1d666cde6b55e59 CRs-Fixed: 2289554
2023-06-13sepolicy_vndr: legacy: Addition of sepolicy for cvphalsuchawla
Cvp is a new computer vision hardware which interacts with DSP and video driver. Adding new ion mem permission for cvp domains. Change-Id: I6c2118b15cf5ccc6505c80969c4090e3396238e4
2023-06-13sepolicy_vndr: legacy: Label older Neural Network HALsMichael Bestas
Change-Id: Ief59f77386ff98cc8070ee9de5fb5a9e514b039e
2023-06-13sepolicy_vndr: legacy: allow netmgrd to access qmipriod propertiesSean Tranchetti
Allows netmgr to control starting/stopping the qmipriod daemon via setting the relevant android properties. Change-Id: I35d9af93ff565bddc4813eef8ad36db896d4a400
2023-06-13sepolicy_vndr: legacy: add property to generic for loading shsusrd via netmgrSubash Abhinov Kasiviswanathan
Add property to generic sepolicy for loading shsusrd from netmgr. Fixes the following- [ 66.051992] type=1107 audit(1549.328:591): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.data.shsusr_load pid=921 uid=1001 gid=1001 scontext=u:r:vendor_netmgrd:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0' CRs-Fixed: 2575687 Change-Id: I32fb31a7f5e64c2095aee081fd855900be0d0701
2023-06-13sepolicy_vndr: legacy: Allow hal_perf_default access sysfs_kgsl_procMichael Bestas
* As seen on non-legacy sepolicy Change-Id: Ifec35f7ffb2452e930c40f9e59c95e64c7dfaff3
2023-06-13sepolicy_vndr: legacy: Added permission for Perf HAL to set proprichagar
Added permissions for Perf HAL to set property values CRs-Fixed: 2682965 Change-Id: I76c55c4cd46caee6896a302d2cea305c49283315
2023-06-13sepolicy_vndr: sdm845: label extcon filesJohnnLee
Bug: 199748390 Test: boot with those files labeled 09-13 17:01:44.542 1865 1865 I auditd : type=1400 audit(0.0:5): avc: denied { read } for comm="android.ui" name="extcon3" dev="sysfs" ino=61612 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 Change-Id: Iabab1243ce7259d46040901a2a734b5962d281a5 Change-Id: I96d7ab2bc6e153dea96d8366a16f7e8e5152f1c9
2023-06-13sepolicy_vndr: legacy: Add smcinvoke dev node as tee deviceAnmolpreet Kaur
Add smcinvoke dev node as tee device in file_contexts. This node has been moved from qssi to vendor for GSI check. Change-Id: I9ff2e94f8024f6b091afaa8e04381a3d808d9a2a
2023-06-13sepolicy_vndr: legacy: Allow sensors read sensors_propMichael Bestas
* As seen on non-legacy sepolicy Change-Id: I8b18879af9e8f5c962091161d9691f3f2673bfd9