Commit Graph

37 Commits

Author SHA1 Message Date
Kevin F. Haggerty
e98eb2f72a msm8953-common: sepolicy: Allow system_app to read /proc/pagetypeinfo
avc: denied { read } for name="pagetypeinfo" dev="proc" ino=4026543033
scontext=u:r:system_app:s0 tcontext=u:object_r:proc_pagetypeinfo:s0
tclass=file permissive=0

Change-Id: I16465eb9acca9ff64a755d47f86f4ff424ebe4de
2021-09-19 20:01:11 -03:00
Jarl-Penguin
40768c7e46 msm8953-common: sepolicy: Address fingerprint HAL denials
Signed-off-by: Jarl-Penguin <jarlpenguin@outlook.com>
Change-Id: I5decdc962117320dc432800f7a5b82fe66b45aee
2021-09-19 20:01:11 -03:00
Sonal Singh
d8e72e0b21 msm8953-common: sepolicy: Add sepolicy for battery health
Change-Id: I2092c760a81328ec4c93b4b47520213b65f0fa6e
2021-09-19 15:59:53 -03:00
Jeferson
7dc147b5d3 msm8953-common: Solve some init denials
Change-Id: Id3cb44112e0219dd9d003ab1bf5acbf5762f095c
2021-09-19 15:59:53 -03:00
Timi
c5eea592fa msm8953-common: sepolicy: silence fsck denials
* Don't audit dac_override, dac_read_search denials for fsck

Change-Id: I3883861b2bff61834718239522ec28f09b30e6c5
2021-09-19 15:59:15 -03:00
orgesified
84e29f9c37 msm8953-common: sepolicy: address kernel denial
avc: denied { create } for scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=socket permissive=0

Change-Id: I045d4f0c43814f607747ee938d82d147683fc805
2021-09-19 15:58:57 -03:00
Jeferson
18f0b938bd msm8953-common: Adress fsck_untrusted denials
[244457.303036] type=1400 audit(1624810115.905: 76046): avc: denied {read } for comm="fsck.exfat" uid=0 name="start" dev="sysfs" ino=41979
scontext=u: r:fsck_untrusted:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [244457.303320] type=1400 audit(1624810115.908:76047):
avc: denied { open } for comm="fsck.exfat" uid=0 path="/sys/devices/soc/c084000.sdhci/mmc_host/mmc1/mmc1:59b4/block/mmcblk1/mmcblk1p1/start" dev="sysfs" ino=41979 scontext=u:r:fsck_untrusted:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
[244457.303418] type=1400 audit(1624810115.908: 76048): avc: denied { getattr } for comm="fsck.exfat" uid=0 path="/sys/devices/soc/c084000.sdhci/mmc_host/mmc1/mmc1:59b4/block/mmcblk1/mmcblk1p1/start" dev="sysfs" ino=41979 scontext=u:r:fsck_untrusted:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1

Change-Id: I73a58794c00693c6a259f631a14638c7b18454d5
2021-09-19 15:58:35 -03:00
Aayush Gupta
8c1d3f5af3 msm8953-common: Allow thermal-engine r_dir_file perms for sysfs*
[    8.618801] type=1400 audit(69459649.586:21): avc: denied { read } for comm="thermal-engine" name="kgsl" dev="sysfs" ino=29020 scontext=u:r:thermal-engine:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
12-18 04:50:58.101   648   648 I auditd  : type=1400 audit(0.0:32): avc: denied { search } for uid=0 comm="thermal-engine" name="qpnp-vadc-10" dev="sysfs" ino=14445 scontext=u:r:thermal-engine:s0 tcontext=u:object_r:sysfs_vadc_dev:s0 tclass=dir permissive=0

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I09c8dbaf80ecb7a6a511cc83b934dcb3128b0e76
2021-06-20 19:11:01 -03:00
chingtzunglin
31c47c9320 msm8953-common: set selabel for metadata for vold to acess 2021-06-18 18:25:08 -03:00
Nolen Johnson
7278919e58 msm8953-common: Append vendor prefix to several properties
* Needed after `LA.UM.9.2.r1-02700-SDMxx0.0` merge.

* Also remove duplicated vendor_fm_prop, as its now in
  qcom/sepolicy.

Change-Id: Iea4145ae677b463f9370843d4db5c16d8862a6fe
2021-05-15 17:11:27 -03:00
Michael Bestas
e9d8ad8894 msm8953-common: sepolicy: Add vendor prefix to qcom_ims_prop
* qcom_ims_prop -> vendor_qcom_ims_prop
* Fixes build after device/qcom/sepolicy-legacy-um update

Change-Id: I8d1b736deaaf54ce012cf3e42a4c927d43326631
2021-05-15 17:11:27 -03:00
jeangraff30
6167b5e618 msm8953-common: Address laser denials
based https://github.com/LineageOS/android_device_motorola_griffin
2021-03-11 23:48:36 -03:00
Joshua Blanchard
e94b9e5b3e msm8953-common: sepolicy: Add rules for Moto ADSPD HAL
Change-Id: Ib3760a1dcece4428e5ed8adc9cae1ecc3e0f01b0
2021-03-10 22:47:48 -03:00
jeangraff30
591f5d58d9 msm8953-common: address denials 2021-03-05 15:28:17 +00:00
Soul Trace
b3153b9950 msm8953-common: sepolicy: address WLAN tethering denials
Fix reboot after 120 seconds on WLAN tethering enable.
Fix "target device is connected but no internet" issue.

Move ipacm-related sections from rootdir/etc/init.qcom.rc to data-ipa-cfg-mgr/ipacm/src/ipacm.rc
Make ipacm.rc look like vendor/qcom/opensource/data-ipa-cfg-mgr/ipacm/src/ipacm.rc but add
writepid /dev/cpuset/system-background/tasks to the service definition.
This let ipacm start after data decryption (it got killed on data decrypt and not respawned,
because was disabled).
This fixes following errors:
04-01 14:35:57.525   591 17586 W libc    : Unable to set property "ctl.interface_start" to "android.hardware.tetheroffload.config@1.0::IOffloadConfig/default": error code: 0x20
04-01 14:35:57.526  2665  3190 I ServiceManagement: getService: Trying again for android.hardware.tetheroffload.config@1.0::IOffloadConfig/default...
04-01 14:35:57.526   591 17586 E hwservicemanager: Failed to set property for starting android.hardware.tetheroffload.config@1.0::IOffloadConfig/default

Set wifi.active.interface context to exported_wifi_prop and allow hal_wifi_default to set it.
I don't know why context definition was not embedded to the contexts file, but now it is.
This fixes following errors:
[163263.846522] selinux: avc:  denied  { set } for property=wifi.active.interface pid=2733 uid=1010 gid=1010 scontext=u:r:hal_wifi_default:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=0

Signed-off-by: TheSync <repo-sync@outlook.com>
2021-03-05 15:28:17 +00:00
Markdarkness
c418c64651 msm8953-common: sepolicy: address hwservicemanager denials 2021-03-05 15:28:17 +00:00
Kevin F. Haggerty
580c7b4bae msm8953-common: sepolicy: Quiet priv_app opening sysfs_android_usb files
* Reading these is disallowed globally, no need to see logspam of
  open attempts

Change-Id: I4c0094097d39456c65720cbdfb949d14439ce5f4
2021-03-05 15:28:17 +00:00
Pranav
62dc805d7b msm8953-common: sepolicy: Don't audit hal_audio_default 2021-03-05 15:28:17 +00:00
Joshua Blanchard
3746c2f486 msm8953-common: sepolicy: Add missing rules for persist_audio_file
* Rules for persist_audio_file have been removed for legacy devices.

* Instead of labeling "/mnt/vendor/persist/audio", which is the default
  path for audio calibration, label "/mnt/vendor/persist/factory/audio"
  as this is where Moto devices store these calibration files anyway.

Change-Id: Ic27eb7f713e145a795cfec9de3c684fe9e2fc985
2021-03-05 15:28:17 +00:00
vivekachooz
e8ab5eac6f msm8953-common: sepolicy: Allow camera hal to access ubwc property
vendor.video.disable.ubwc prop fails to read without this.

Change-Id: Ic0bd8e5b4a56a7e7776d7c57d4260aae4d957f64
2021-03-05 15:28:16 +00:00
LuK1337
780672cea2 msm8953-common: sepolicy: Label /persist
Change-Id: I471c0d1fedb51eabc32b54ab35a9823db8efd034
2021-02-03 13:42:09 -03:00
Joshua Blanchard
afa5c28987 msm8953-common: persist_camera_prop -> vendor_persist_camera_prop
* Add vendor prefix to persist_camera_prop.

Change-Id: I228b4d1b1c7f0354b31c08ceb08202235f825acb
2021-02-03 13:42:09 -03:00
Jorge Lucas
d9313a152a msm8953-common: Add DTV Support
- Add hidl to manifest
- Fix Sepolicy
- Add proper permissions for /dev/isdbt
2021-01-31 18:24:25 -03:00
Jorge Lucas
2478e765f5 msm8953-common: camera: Adress denials 2021-01-31 18:24:25 -03:00
Jorge Lucas
baeea07419 msm8953-common: Camera: Allow persist_camera_prop for cameraserver 2021-01-31 18:24:25 -03:00
jeangraff30
5d7dcdfc69 msm8953: kang light hal from moto msm8937 tree 2021-01-31 18:24:06 -03:00
Vachounet
d92733b312 msm8953-common: Add homebutton perms and address denials
Signed-off-by: trpsl <trpsl755@gmail.com>
2021-01-03 21:39:10 -03:00
Joshua Blanchard
20bb266be8 msm8953-common: Give audio hal access to prox and spkr calibration data
* Speaker (and receiver) calibration files are located on persist
  partition. Grant audio permission to find and read these files.

* Moto's libspeakerbundle needs access to the proximity sensor,
  so allow it to find sensorservice so MotSpeakerHelperProximity
  can instantiate SensorManager.

Change-Id: I888a424fc1c42dea0f130adfc74e02e47927e2b8
2021-01-03 21:39:10 -03:00
Joshua Blanchard
42e6a9e1f8 msm8953-common: sepolicy: Allow camera to read and set calibration data
Change-Id: I9a3d852fd2ac4501f1b38c2660fef366e1f26e30
2021-01-03 21:39:10 -03:00
Aayush Gupta
a791807e4d msm8953-common: Address denials regarding to access sysfs_kgsl
[   45.239076] type=1400 audit(1601312101.298:24): avc: denied { search } for comm="DefaultPool5" name="kgsl-3d0" dev="sysfs" ino=29220 scontext=u:r:untrusted_app:s0:c151,c256,c512,c768 tcontext=u:object_r:sysfs_kgsl:s0 tclass=dir permissive=0 app=com.google.android.apps.maps

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I80c5de2d9687b3127922d5bc55c26461a797d0f9
2020-11-22 18:17:13 +01:00
jhenrique09
b71e1a0a79 msm8953-common: Fix portrait mode on moto cam
* Moto cam checks for hwrev prop to allow portrait mode
2020-11-19 20:50:32 +01:00
jeangraff30
c4b73d6758 msm8953-common: Update sepolicy 2020-11-16 03:49:48 +01:00
Erfan Abdi
6f64594d42 msm8953-common: Move egis_input sepolicy to genfs 2020-11-15 21:16:05 +01:00
trpsl
675d96b639 msm8953-common: Address Dolby denials
Co-authored-by: Rohan Hasabe <rohanhasabe8@gmail.com>
2020-11-15 21:16:05 +01:00
jeangraff30
d68a31c631 msm8953-common: sepolicy: Address light hal 2020-11-15 21:16:05 +01:00
jeangraff30
7535f9d5ae msm8953-common: Import sepolicy from sdm660 tree 2020-11-15 21:16:02 +01:00
jeangraff30
1220e128cd msm8953-common: Initial Common tree
* based on motorola sdm632-common

Co-authored-by: Jorg3Lucas <jorgelucas@pixelexperience.org>
2020-11-09 18:04:50 +01:00