Commit graph

187 commits

Author SHA1 Message Date
clarencelol
5514002bef sdm660-common: Cleanup sepolicy
* Fix neverallows

Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
Kunmun
10087c76b8 sdm660-common: sepolicy: Label more sepolicies for k4.19
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
Kyle Harrison
9730b3c65c sdm660-common: sepolicy: Fix exported_camera_prop denials
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
Anush02198
72d6549660 sdm660-common: Address some more denials
Signed-off-by: Anush02198 <Anush.4376@gmail.com>
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
Pulkit077
ea39254a1c sdm660-common: sepolicy: Allow gpuservice read graphics_config_prop
avc: denied { read } for comm="Binder:594_1" name="u:object_r:graphics_config_prop:s0" dev="tmpfs" ino=15716 scontext=u:r:gpuservice:s0 tcontext=u:object_r:graphics_config_prop:s0 tclass=file permissive=0

Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
clarencelol
f30354722b sdm660-common: sepolicy: Address more denials
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
pix106
f6c3a49bb9 sdm660-common: sepolicy: Cleanup after LA.UM.10.2.1.r1-03200-sdm660.0 merge
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:58:05 +01:00
pix106
a3055ff0ea sdm660-common: sepolicy: Label more camera props
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:58:05 +01:00
Inseob Kim
1b8a185822 sdm660-common: sepolicy: Attach vendor_property_type to properties
We are going to enforce that each property has an explicit owner, such
as system, vendor, or product. This attaches vendor_property_type to
properties defined under vendor sepolicy directories.

[Ratoriku: Adapted to xiaomi sdm660]

Bug: 159097992
Test: m selinux_policy && boot device
Change-Id: Ibed833cd9e5d786e82985ded6bc62abdf8cd9ded
Merged-In: Ibed833cd9e5d786e82985ded6bc62abdf8cd9ded
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
5d9ffeff77 sdm660-common: sepolicy: cleanup sepolicy/vendor/vendor_init.te
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
aea288de3b sdm660-common: sepolicy: cleanup sepolicy/vendor/tee.te
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
5d12996503 sdm660-common: sepolicy: cleanup sepolicy/vendor/system_server.te
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
5b91ac6f34 sdm660-common: sepolicy: cleanup sepolicy/vendor/system_app.te
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
34bcdb600a sdm660-common: sepolicy: cleanup sepolicy/vendor/property_contexts
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
85356b81c5 sdm660-common: sepolicy: drop some gmscore_app rules
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
e2366e40e8 sdm660-common: sepolicy: clean ssgtzd rules
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
3ecd23c72e Revert "sdm660-common: sepolicy: Address hal_camera_default diag_device denials"
This reverts commit 86a8976fed64394818e4f61787160aff822e122d.

Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
2c07bbc96e Revert "sdm660-common: sepolicy: Add permission to access proc_energy_aware file node"
This reverts commit 15d2b27649b63a2c3fde9a0a1db4f41d733e3c13.

Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
968d356efe sdm660-common: sepolicy: rework wakeup nodes
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
Max Weffers
bbc6ad98ce sdm660-common: sepolicy: Add Hardware Info permssions and sepolicy rules
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
d3dcfacce6 sdm660-common: sepolicy: label more camera props
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
f57c4848a5 Revert "sdm660-common: sepolicy: Fix Camera Denials"
This reverts commit c1713821ef3bd923c888f850559231fef0ddcfc7.
2022-02-16 20:55:38 +01:00
daniml3
56d437a773 sdm660-common: sepolicy: Allow hal_audio_default to interact with audio props
Signed-off-by: daniml3 <daniel@danielml.dev>
Change-Id: I573852e491e781ef60158ede160a7929a33d62a4
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:34 +01:00
Edwin Moquete
db5b05330d sdm660-common: sepolicy: Address healthd denials
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:34 +01:00
Edwin Moquete
65b5513c79 sdm660-common: sepolicy: Label some wakeup nodes
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:34 +01:00
clarencelol
1284e340a0 sdm660-common: sepolicy: Label wakeup nodes for 4.19
- also resolve arbitrary sysfs paths for system_suspend

Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:34 +01:00
clarencelol
4f5d077936 sdm660-common: sepolicy: Address some denials
* avc: denied { search } for name="data" dev="mmcblk0p69" ino=3072001 scontext=u:r:vendor_dataservice_app:s0 tcontext=u:object_r:system_data_file:s0:c512,c768 tclass=dir permissive=0

Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:34 +01:00
clarencelol
819130673b sdm660-common: sepolicy: Fix some PowerHAL denials
* Let powerhal reads and writes
* device_latency -> latency_device

Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
Rick Yiu
5183d7fb36 sdm660-common: sepolicy: Add permission to access proc_energy_aware file node
Energy aware feature control is previously done through debugfs,
which will be deprecated, so move the control to sysctl. Added
permisson for it, and removed the one unused.

[    1.460128] audit: type=1400 audit(2753763.033:8): avc:  denied  { write } for  pid=537 comm="init" name="energy_aware" dev="proc" ino=21663 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0

10-05 16:49:18.933   820   820 W NodeLooperThrea: type=1400 audit(0.0:1097): avc: denied { write } for name="energy_aware" dev="proc" ino=66567 scontext=u:r:hal_power_default:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0

10-05 17:00:15.726   822   822 W NodeLooperThrea: type=1400 audit(0.0:262): avc: denied { open } for path="/proc/sys/kernel/energy_aware" dev="proc" ino=51228 scontext=u:r:hal_power_default:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0

Bug: 141333728
Test: function works as expected
Change-Id: I2b4eda73bfa34824244e21d804b48eee49a71eae
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
DillerOFire
c825b9bdb8 sdm660-common: sepolicy: Allow kernel to create qipcrtr_socket
* Fixes modem crashes in user build

Change-Id: I1f69408dd1e0289ccd9bb0a6a39ffcc0f289fabd
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
pix106
cede39d305 Revert "sdm660-common: sepolicy: Label sys.use_fifo_ui and address system_server vendor_video_prop denial"
This reverts commit ee3fa3b300.
2021-12-31 07:51:33 +01:00
pix106
653c608694 Revert "sdm660-common: sepolicy: Address many sys_admin and kill denials"
This reverts commit d05ecaa812.
2021-12-31 07:51:33 +01:00
pix106
87ec9f49d1 Revert "sdm660-common: sepolicy: dontaudit netutils_wrapper sys_admin denials"
This reverts commit f475ccf892.
2021-12-31 07:51:33 +01:00
pix106
4c65fc4ecf sdm660-common: sepolicy: Clean SEPolicy after LA.UM.10.2.1.r1-02700-sdm660.0 merge
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
pix106
b6cfa81507 sdm660-common: sepolicy: drop netmgrd vendor_data_qmipriod_prop
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
clarencelol
ac362f97eb sdm660-common: sepolicy: Address denials
* init: Unable to set property 'persist.vendor.data.shsusr_load' from uid:1001 gid:1001 pid:971: SELinux permission check failed
* init: Unable to set property 'persist.vendor.data.offload_ko_load' from uid:1001 gid:1001 pid:971: SELinux permission check failed
* init: Unable to set property 'persist.vendor.data.qmipriod_load' from uid:1001 gid:1001 pid:971: SELinux permission check failed

Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
clarencelol
cdaf69248d sdm660-common: sepolicy: Address pixel powerstats rules
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
pix106
4dc2cf5d58 sdm660-common: sepolicy: Label some camera props
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
pix106
4a43432067 sdm660-common: sepolicy: Address hal_camera_default diag_device denials
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
iamehsangh
509307f0ec sdm660-common: sepolicy: Fix Camera Denials
W HwBinder: type=1400 audit(0.0:5750): avc: denied { open } for path="/dev/__properties__/u:object_r:vendor_video_prop:s0" dev="tmpfs" ino=17412 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:vendor_video_prop:s0 tclass=file permissive=0
E libc    : Access denied finding property "vendor.video.disable.ubwc"

W/CAM_cpp: type=1400 audit(0.0:5733): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=19517 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
E/libc    :Access denied finding property "ubwc.no.compression"

Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
pix106
0525c2a968 sdm660-common: sepolicy: Adress vendor_init fingerprint denials
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
Chitti Babu Theegala
c0b410af36 sdm660-common: sepolicy: adding proc-fs rw permission for hal_power_default
Change-Id: Ib8c69ca6ca9de3d54f352520412f508dcb1af079
Signed-off-by: Ratoriku <a1063021545@gmail.com>
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
Wei Wang
ffc9445207 sdm660-common: sepolicy: Allow PowerHAL to change sched for ADPF
Test: build
Bug: 177492680
Signed-off-by: Wei Wang <wvw@google.com>
Change-Id: I71d4f6e2d160caad03243295003743f27b4e1736
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
Jimmy Shiu
31a8b54659 sdm660-common: sepolicy: Allow PowerHAL to set sched
system_server also creates UI sometimes.
Ex: ANR Dialog, the Pointer Location in developer options.

Bug: 194775170
Test: build and enable Pointer Location debug option
Merged-In: Ife50e90d2899623d8a482ca79ae7c74aafae9a49
Change-Id: Ife50e90d2899623d8a482ca79ae7c74aafae9a49
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
Rick Yiu
4668e4c349 sdm660-common: sepolicy: Grant hal_power_default cgroup read file permission
It is a cross-platform need.

Bug: 176868402
Bug: 177780314
Test: build selinux_policy pass
Change-Id: If63b205921bd95d82c52e0193947ab8304c1e064
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
daniml3
96086b8408 sdm660-common: sepolicy: Solve radio denials
Signed-off-by: daniml3 <danimoral1001@gmail.com>
Change-Id: I78db6c6a557c76b9f6b3cc8f983cdc70a2a09ce7
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
Inseob Kim
57cca627b1 sdm660-common: sepolicy: Attach vendor_property_type to properties
We are going to enforce that each property has an explicit owner, such
as system, vendor, or product. This attaches vendor_property_type to
properties defined under vendor sepolicy directories.

Bug: 159097992
Test: m selinux_policy && boot device
Change-Id: Ibed833cd9e5d786e82985ded6bc62abdf8cd9ded
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
Ratoriku
a80975c3d7 sdm660-common: Switch to AIDL Light HAL
Signed-off-by: Ratoriku <a1063021545@gmail.com>
Change-Id: I2618bcb81902688b9b9b975f612c653707787202
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
Inseob Kim
abe3f86cf3 sdm660-common: sepolicy: Add contexts for exported telephony props
To remove bad context names, two contexts are added.

- telephony_config_prop
- telephony_status_prop

exported_radio_prop, exported2_radio_prop are removed. Cleaning up
exported3_radio_prop will be a follow-up task.

Bug: 152471138
Bug: 155844385
Test: boot and see no denials
Change-Id: Ica687a750af61f2d3386691ce6df220b180fb993
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:33 +01:00
Omar Hamad
825920e610 sdm660-common: sepolicy: unknown type exported_wifi_prop
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-12-31 07:51:32 +01:00