Kevin F. Haggerty
97ff0e6d32
msm8974-common: sepolicy: Label sysfs_net, resolve denials
...
* avc: denied { getattr } for path="/sys/devices/msm_sdcc.2/mmc_host/
mmc0/mmc0:0001/mmc0:0001:2/net/wlan0/phy80211" dev="sysfs"
ino=29873 scontext=u:r:hal_wifi_hostapd_default:s0
tcontext=u:object_r:sysfs_net:s0 tclass=lnk_file permissive=0
* avc: denied { read } for name="phy80211" dev="sysfs" ino=29823
scontext=u:r:hal_wifi_hostapd_default:s0
tcontext=u:object_r:sysfs_net:s0 tclass=lnk_file permissive=0
Change-Id: I6f40b8bdac2537b7000c02af6fac8277acb2a718
2018-11-29 19:17:52 -07:00
Kevin F. Haggerty
a7c4bcc98e
msm8974-common: sepolicy: Label our custom sensors service
...
Change-Id: I331abeac851cd92b32990ff797dff506dd67e503
2018-11-27 08:12:35 -07:00
Kevin F. Haggerty
4b1a3c2134
msm8974-common: sepolicy: Resolve hal_sensors_default denials
...
* avc: denied { read } for name="name" dev="sysfs" ino=26468i
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs:s0
tclass=file permissive=0
* avc: denied { read } for name="iio:device1" dev="tmpfs" ino=7276
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:iio_device:s0 tclass=chr_file permissive=0
* avc: denied { open } for name="iio:device0" dev="tmpfs" ino=7275
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:iio_device:s0 tclass=chr_file permissive=0
* avc: denied { search } for name="/" dev="mmcblk0p12" ino=2
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:efs_file:s0
tclass=dir permissive=0
* avc: denied { read } for name="gyro_cal_data" dev="mmcblk0p12"
ino=41 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:efs_file:s0 tclass=file permissive=0
* avc: denied { read } for name="shtc1_sensor" dev="tmpfs" ino=8378
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sensors_device:s0 tclass=chr_file permissive=1
* avc: denied { open } for name="shtc1_sensor" dev="tmpfs" ino=8378
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sensors_device:s0 tclass=chr_file permissive=1
Change-Id: Iad7e41e5e250eb1511d5838bd42b2b07843d220b
2018-11-27 08:12:35 -07:00
Kevin F. Haggerty
071111d64d
msm8974-common: sepolicy: Label sysfs_sec_* types, resolve denials
...
* Rename sysfs_sec type to sysfs_sec_key
* Add additional sysfs_sec_* types as appropriate
* avc: denied { read } for name="temp_adc" dev="sysfs" ino=10538
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=file permissive=1
* avc: denied { open } for name="temp_adc" dev="sysfs" ino=10538
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=file permissive=1
* avc: denied { write } for name="ir_send" dev="sysfs" ino=21339
scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_sec_ir:s0
tclass=file permissive=1
* avc: denied { write } for name="led_blink" dev="sysfs" ino=25722
scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_sec_led:s0
tclass=file permissive=1
* avc: denied { write } for name="brightness" dev="sysfs" ino=23467
scontext=u:r:system_server:s0
tcontext=u:object_r:sysfs_sec_touchkey:s0 tclass=file permissive=1
* avc: denied { setattr } for name="ir_send" dev="sysfs" ino=21339
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_ir:s0 tclass=file
permissive=1
* avc: denied { setattr } for name="hall_irq_ctrl" dev="sysfs"
ino=29565 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_key:s0
tclass=file permissive=1
* avc: denied { setattr } for name="epen_firm_update" dev="sysfs"
ino=23585 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_epen:s0
tclass=file permissive=1
* avc: denied { setattr } for name="cmd" dev="sysfs" ino=23756
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_tsp:s0
tclass=file permissive=1
* avc: denied { write } for name="wakeup_keys" dev="sysfs" ino=29568
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_key:s0
tclass=file permissive=1
* avc: denied { open } for name="wakeup_keys" dev="sysfs" ino=29568
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_key:s0
tclass=file permissive=1
* avc: denied { read } for name="input" dev="sysfs" ino=24012
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_tsp:s0
tclass=lnk_file permissive=0
* avc: denied { setattr } for name="waketime" dev="sysfs" ino=29035
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_bamdmux:s0
tclass=file permissive=0
* avc: denied { setattr } for name="led_r" dev="sysfs" ino=25719
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_led:s0
tclass=file permissive=0
* avc: denied { setattr } for name="usb_sel" dev="sysfs" ino=28162
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_switch:s0
tclass=file permissive=0
* avc: denied { setattr } for name="brightness" dev="sysfs" ino=23468
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_touchkey:s0
tclass=file permissive=0
* avc: denied { setattr } for name="temperature" dev="sysfs"
ino=10538 scontext=u:r:init:s0
tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=file
permissive=0
* avc: denied { setattr } for name="barcode_send" dev="sysfs"
ino=19231 scontext=u:r:init:s0
tcontext=u:object_r:sysfs_sec_barcode_emul:s0 tclass=file
permissive=0
Change-Id: I66b6d2aab875a2706f2730be9755e8d9805ffb6e
2018-11-27 08:12:28 -07:00
Kevin F. Haggerty
bb196ad94b
msm8974-common: sepolicy: Label sysfs_leds, resolve denials
...
* avc: denied { search } for name="leds" dev="sysfs" ino=7437
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1
* avc: denied { setattr } for name="led_r" dev="sysfs" ino=25718
scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file
permissive=1
Change-Id: I8840e28b3aa72e60d5c15cad66f043a36a15c771
2018-11-27 07:00:57 -07:00
Kevin F. Haggerty
0e66ee2593
msm8974-common: sepolicy: Label sysfs_batteryinfo, resolve denials
...
* avc: denied { setattr } for name="siop_level" dev="sysfs" ino=29912
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_batteryinfo:s0
tclass=file permissive=1
* avc: denied { search } for name="battery.95" dev="sysfs" ino=3264
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
* avc: denied { read } for name="batt_temp_adc" dev="sysfs" ino=28739
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
* avc: denied { open } for name="batt_temp_adc" dev="sysfs" ino=28739
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
Change-Id: Ie3098da96eeed27a9403e3c311fe011c1f359561
2018-11-27 06:50:04 -07:00
Kevin F. Haggerty
1357777a0f
msm8974-common: sepolicy: Label sysfs_input, resolve denials
...
* avc: denied { read write } for name="poll_delay" dev="sysfs"
ino=27687 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_input:s0
tclass=file permissive=1
* avc: denied { open } for name="poll_delay" dev="sysfs" ino=27687
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_input:s0 tclass=file
permissive=1
* avc: denied { search } for name="input" dev="sysfs" ino=13030
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_input:s0 tclass=dir permissive=0
* avc: denied { read } for name="input6" dev="sysfs" ino=26725
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_input:s0 tclass=dir permissive=0
* avc: denied { read } for name="device" dev="sysfs" ino=26717
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_input:s0 tclass=lnk_file permissive=0
* avc: denied { read write } for name="poll_delay" dev="sysfs"
ino=26946 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_input:s0 tclass=file permissive=0
Change-Id: Id46a02a44e773b99ff61f9a8ff18394c74c80f90
2018-11-27 06:41:19 -07:00
Kevin F. Haggerty
8d6d6a1f00
msm8974-common: sepolicy: Label sysfs_iio, resolve denials
...
* avc: denied { read } for name="devices" dev="sysfs" ino=7783
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_iio:s0 tclass=dir permissive=0
* avc: denied { open } for name="devices" dev="sysfs" ino=7783
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_iio:s0 tclass=dir permissive=0
* avc: denied { write } for name="length" dev="sysfs" ino=26482
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs_iio:s0
tclass=file permissive=0
* avc: denied { read } for name="iio:device1" dev="sysfs" ino=26489
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs_iio:s0
tclass=lnk_file permissive=0
* avc: denied { read } for name="iio:device0" dev="sysfs" ino=26350
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_iio:s0
tclass=lnk_file permissive=1
* avc: denied { setattr } for name="length" dev="sysfs" ino=26343
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_iio:s0 tclass=file
permissive=1
Change-Id: If9b3e9efe4f7c6eec3faf973e0b7aebd96d76ef3
2018-11-27 06:40:47 -07:00
Kevin F. Haggerty
4cea2fcca2
msm8974-common: sepolicy: More sysfs_graphics, resolve denials
...
* avc: denied { setattr } for name="brightness" dev="sysfs" ino=12913
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_graphics:s0
tclass=file permissive=1
* avc: denied { read } for name="window_type" dev="sysfs" ino=12710
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=file
permissive=1
* avc: denied { read } for name="window_type" dev="sysfs" ino=12710
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_graphics:s0 tclass=file permissive=0
* avc: denied { search } for name="panel" dev="sysfs" ino=12358
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_graphics:s0 tclass=dir permissive=0
Change-Id: I8597d7be6217816924a8fee854341e4f2fb18562
2018-11-26 22:18:08 -07:00
Kevin F. Haggerty
241d260828
msm8974-common: sepolicy: Update sysfs_mdnie, resolve denials
...
* avc: denied { setattr } for name="scenario" dev="sysfs" ino=12753
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_mdnie:s0 tclass=file
permissive=0
* avc: denied { search } for name="mdnie" dev="sysfs" ino=12743i
scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_mdnie:s0
tclass=dir permissive=0
Change-Id: I4a0530136d7d1e6ee8ede0733e70de813382372b
2018-11-26 21:00:04 -07:00
Kevin F. Haggerty
b14c7f0152
msm8974-common: sepolicy: Sort sysfs block of file_contexts sanely
...
Change-Id: I421f1c97db0f5c2919d99293d75d3f6e09f52340
2018-11-21 23:10:10 -07:00
Kevin F. Haggerty
a60dc07555
msm8974-common: sepolicy: Drop our mediaextractor additions
...
* LineageOS/android_system_sepolicy@2a67349574 covers this for us
Change-Id: I55a92c1580d4943f72f17ba8991fcbb5c8167c8d
2018-11-21 23:10:09 -07:00
Bruno Martins
7bf8dd9506
msm8974-common: Only include legacy QC sepolicy
...
* This has now turned into a separate repository (maintained only
for legacy devices, those that never got official Orea updates).
Change-Id: I981b452b697bc3610d7aa97b74ed182c6b70ca30
2018-10-21 08:25:19 -06:00
Kevin F. Haggerty
d766a7e028
msm8974-common: sepolicy: Resolve misc denials
...
avc: denied { chown } for capability=0 scontext=u:r:thermal-engine:s0
tcontext=u:r:thermal-engine:s0 tclass=capability permissive=0
avc: denied { find } for interface=android.hardware.camera.provider::ICameraProvider
pid=1315 scontext=u:r:mediaserver:s0 tcontext=u:object_r:hal_camera_hwservice:s0
tclass=hwservice_manager permissive=0
avc: denied { getattr } for pid=1940 comm="mount.ntfs"
path="/dev/block/mmcblk0p23" dev="tmpfs" ino=6957 scontext=u:r:vold:s0
tcontext=u:object_r:system_block_device:s0 tclass=blk_file permissive=0
avc: denied { read write } for pid=1370 comm="mm-qcamera-daem" name="rear_corever"
dev="sysfs" ino=24696 scontext=u:r:mm-qcamerad:s0 tcontext=u:object_r:sysfs:s0
tclass=file permissive=0
avc: denied { search } for pid=561 comm="mm-qcamera-daem" name="camera"
dev="sysfs" ino=24680 scontext=u:r:mm-qcamerad:s0
tcontext=u:object_r:sysfs_camera:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=1950 comm="mount.ntfs"
path="/dev/block/mmcblk0p24" dev="tmpfs" ino=8134 scontext=u:r:vold:s0
tcontext=u:object_r:cache_block_device:s0 tclass=blk_file permissive=0
avc: denied { getattr } for pid=1926 comm="fsck.ntfs" path="/dev/block"
dev="tmpfs" ino=6956 scontext=u:r:fsck_untrusted:s0
tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
avc: denied { getattr } for pid=1948 comm="mount.ntfs"
path="/dev/block/mmcblk0p12" dev="tmpfs" ino=8090 scontext=u:r:vold:s0
tcontext=u:object_r:efs_block_device:s0 tclass=blk_file permissive=0
avc: denied { read } for pid=339 comm="mediaserver" name="rear_camfw_load"
dev="sysfs" ino=24694 scontext=u:r:mediaserver:s0
tcontext=u:object_r:sysfs_camera:s0 tclass=file permissive=0
Change-Id: Ieb941d135d9f245f4a2bb9abb78e1b84bbef4b38
2018-03-31 09:25:48 -06:00
Kevin F. Haggerty
e405ae831d
msm8974-common: sepolicy: Allow mediaextractor r_file_perms to fuse:file
...
* This is necessary for the built-in music player to play files off
of fuse (NTFS, in our case, for the most part) volumes
Change-Id: Ib6fffb5c2b5c8c514979a7aabce949d82902b2d1
2018-03-18 17:23:30 -06:00
Kevin F. Haggerty
778c310204
msm8974-common: sepolicy: Add policy statements for power HAL
...
Change-Id: I5fbf737a2dddf4e70a1a51e23b2e06a153a6f769
2018-02-28 07:17:50 -07:00
Paul Keith
f159447f74
msm8974-common: Remove exfat and ntfs sepolicies
...
* They are labelled as vfat now
Change-Id: I1f1df3b7c1c294b2efb5ce9417838b9932eb08f1
2018-02-22 23:27:10 +01:00
Paul Keith
a6a77f987c
msm8974-common: Wire up mDNIe features
...
Change-Id: Ib5d2825bb50c90b6743157bd624e7156c6d5ad01
2018-02-22 23:27:10 +01:00
Paul Keith
d5d83cb89e
msm8974-common: Remove noatsecure
...
* Shims have been moved to a board flag, so we no longer need
noatsecure to make LD_SHIM_LIBS persist through services
Change-Id: I94b8c30e28e6dd297e0020ddfb46b2af21068721
2018-02-17 13:20:49 +00:00
Kevin F. Haggerty
4bb6449aad
msm8974-common: sepolicy: Allow hostapd to read wifi rfkill dev
...
avc: denied { read } for name="rfkill" dev="tmpfs" ino=8177
scontext=u:r:hostapd:s0 tcontext=u:object_r:wlan_device:s0
tclass=chr_file permissive=0
Change-Id: Iea5deec2736f0eac50aa30858889d51b86e58788
2018-02-16 17:15:39 -07:00
Kevin F. Haggerty
68b75f9105
msm8974-common: sepolicy: Import common sepolicy from klte-common
...
* The bulk of the device family policy was common and applicable
to all Samsung msm8974-devices. Move that common stuff here to
ease maintenance.
Change-Id: I86516adfb1b9c55a6959a7faf4ee424a4b3385c8
2018-02-03 15:07:03 -07:00
Christopher R. Palmer
ef32c33672
msm8974-common: Nuke our copy of SELinux policies
...
We now get the qcom-common SELinux policy. Get rid of our old policy
and add back config as we need it, rather than trying to merge the two.
Change-Id: I5ca5098c653f09c7901343d0ae71793f6eb21ab8
2014-11-23 05:21:07 +00:00
slayher
8eb37d439c
MSM8974: Initial Common repo commit.
2014-05-18 23:33:07 -04:00