Commit graph

66 commits

Author SHA1 Message Date
matteo0026
b0b25241c6 msm8226-common: Transition to consumerir HIDL hal 2020-05-16 16:22:24 +02:00
Roman Rihter
72b78959d0 msm8226-common: fix sepolicy build error 2020-04-23 12:19:36 +03:00
Roman Rihter
6dfa508910 msm8226-common: sepolicy bringup for Q (FINAL PART) 2020-04-22 22:11:59 +03:00
DJABhipHop
6bb52d5a0c msm8226-common: sepolicy: Fix even more errors
WiFi, Audio & Bluetooth now work 100%!!!!
2020-03-13 12:04:11 -04:00
RomanDesigner
a0c7e49b26 msm8226-common: sepolicy: Fix more errors 2020-03-11 11:11:11 +03:00
RomanDesigner
ec3ab6930e Fix sepolicy errors 2020-03-11 11:03:44 +03:00
RomanDesigner
6ab05867f2 msm8226-common: Allow init to mount firmware_file dirs 2020-03-11 10:57:11 +03:00
RomanDesigner
82721325fa msm8226-common: Remove non-needed allows 2020-03-11 10:47:13 +03:00
RomanDesigner
2f79cb53e0 Merge branch 'lineage-17.1' of github.com:S3NEO/android_device_samsung_msm8226-common into lineage-17.1 2020-03-10 18:33:25 +03:00
Mohammad Afaneh
1907fef93b [SQUASH] msm8226-common: bringup sepolicy to Q 2020-03-10 18:31:46 +03:00
RomanDesigner
adf16e831a msm8226-common: sepolicy: Add charger policy
* This is a copy of sepolicy/common/healthd.te file
2020-03-10 18:26:20 +03:00
RomanDesigner
b4bf3e8edd msm8226-common: sepolicy: Add charger policy
* This is a copy of sepolicy/common/healthd.te file
2020-02-29 18:51:49 +03:00
Arne Coucheron
ff6ff0911a msm8226-common: sepolicy: Resolve mediaprovider denial on external storage
Change-Id: I64ea2cef7c4dfad3f9ecbfb80727fc3a45e29ef8
2020-02-27 23:08:13 +03:00
Arne Coucheron
a25985218a msm8226-common: sepolicy: Fix wifi.active.interface denial
selinux: avc:  denied  { set } for property=wifi.active.interface pid=253 uid=0 gid=1010 scontext=u:r:hal_wifi_default:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=0

Change-Id: Ic06c5b6eb64a01ec5687e0a2dc778455ae0a7b59
2020-02-27 23:06:16 +03:00
RomanDesigner
6ca1b24cde msm8226-common: sepolicy: base bringup to Q 2020-02-27 22:48:32 +03:00
ripee
eba5589d67
msm8226-common: sepolicy: Define sysfs_disk_stat 2020-01-25 20:10:19 +03:00
RomanDesigner
631706483c
msm8226-common: sepolicy: Drop unknown sepolicy type 2020-01-05 18:41:48 +03:00
Bruno Martins
3b70fbcd31
msm8226-common: Binderize them all
* Switch to binderized HAL services as possible and update
   HIDL manifest accordingly.

 * Following considerations regarding those without any change:

   - Sensors left out of the game because wouldn't work
     otherwise.

Change-Id: Id50291488d655187aa013c51bdd6890dca010564
2020-01-05 12:27:24 +03:00
Francescodario Cuzzocrea
7ed21fcb70 msm8226-common: fix more sepolicy denials
Change-Id: If81bc788428fdbbcd2c16d80f76316082e2c607f
2020-01-04 21:28:02 +01:00
isbon
54973f5b87 msm8226-common : allow sec_touchkey in sepolicy
Change-Id: Id2eeb041f04bb6f3b0919f31d50c9c1279b2e318
2020-01-04 14:57:38 +01:00
BAProductions
a05beb8092 msm2886-commom: fix more sepolicy denial
Change-Id: Idb55755ced43fa48f12a9a7f1a7f7648f24cbd51
2020-01-03 17:58:59 +01:00
BAProductions
25a6078212 msm8226-common: use regex for brightness path 2020-01-03 17:58:04 +01:00
Francescodario Cuzzocrea
40cf4dda5e msm8226-common: add mdnie path to file_context 2020-01-03 17:57:48 +01:00
Francescodario Cuzzocrea
ffd3e6104b msm8226-common: allow livedisplay to handle screen power reduce
Change-Id: I7294f3449c0566e78f3d291d819fa8acd2294755
2019-12-15 21:16:30 +01:00
Francescodario Cuzzocrea
8296402cb4 msm8226-common: resolve sepolicy denials
Change-Id: Iea4bbd17a420a06d55658a4a52bdcabf14cf4d2c
2019-12-15 18:41:15 +01:00
Francescodario Cuzzocrea
ead4fb50ef msm8226-common: selinux: add backlight path for panel and button brightness to file_context
This fixes backlight dimming not working on enforcing builds

Change-Id: Ic0b99ddaa502727ac8e4f34ce2dcf3e3187c060d
2019-10-18 22:07:52 +02:00
PythonLimited
8bc870910c msm8226-common: update and cleanup sepolicy 2019-10-17 16:12:48 +02:00
Francescodario Cuzzocrea
d5a4d8d567 msm8226-common: fix offline charging 2019-10-16 12:32:04 +02:00
LuK1337
89e473a368 msm8226-common: hal_lineage_livedisplay_default -> hal_lineage_livedisplay_sysfs
Change-Id: If8954290c41913b7453a1cba4d67f7a63d08d2dd
2019-10-16 12:32:04 +02:00
Kevin F. Haggerty
1e8bba9944 msm8226-common: Build Samsung LiveDisplay service
Change-Id: I74d38aa0df3179bb00b942135e8ff055aa8a5658
2019-10-16 12:32:04 +02:00
Paul Keith
805d4f1785 msm8226-common: Build vendor.lineage.touch HAL from hardware/samsung
Change-Id: I6eca1e9875cb5793a3a45c6e77bc201946ebd897
2019-10-16 12:32:04 +02:00
Kevin F. Haggerty
417dc63a46 msm8226-common: sepolicy: Adapt to global sepolicy merges
* Several items merged globally caused duplicate definition of paths
  that were previously labeled here.

This reverts commit 27afbf1dc6.
This reverts commit 7fb5a8c6cb.
This partially reverts commit bb196ad94b.
This partially reverts commit c39a735ab5.

Change-Id: I901e5aa78058e1a465f110cde31fb7d76eaf3d51
2019-10-16 12:30:58 +02:00
Kevin F. Haggerty
84ae63a3cb msm8226-common: sepolicy: Eliminate qemu_hw_mainkeys_prop entries
* Specific definition of this is dropped from qcom/sepolicy-legacy

Change-Id: I429abf7dddd2de4443349366b932149f30b87206
2019-10-16 12:30:58 +02:00
Kevin F. Haggerty
a5d5045f45 msm8226-common: sepolicy: Clean up
* Group policy statements better
* Nuke unneeded allows

Change-Id: Ibc1fd4debe8c95005a6dd54e1428d6365248bd80
2019-10-16 12:30:55 +02:00
Kevin F. Haggerty
8c265a347e msm8226-common: sepolicy: Resolve init denials
* avc: denied { write } for name="enable_adaptive_lmk" dev="sysfs"
  ino=6724 scontext=u:r:init:s0
  tcontext=u:object_r:sysfs_lowmemorykiller:s0 tclass=file permissive=1
* avc: denied { open } for name="enable_adaptive_lmk" dev="sysfs"
  ino=6724 scontext=u:r:init:s0
  tcontext=u:object_r:sysfs_lowmemorykiller:s0 tclass=file
  permissive=1
* avc: denied { setattr } for name="firmware_path" dev="sysfs"
  ino=6423 scontext=u:r:init:s0
  tcontext=u:object_r:sysfs_wifi_writeable:s0 tclass=file
  permissive=1
* avc: denied { write } for name="l2" dev="sysfs" ino=29063
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_power:s0
  tclass=file permissive=1
* avc: denied { open } for name="l2" dev="sysfs" ino=29063
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_power:s0
  tclass=file permissive=1
* avc: denied { write } for name="enabled" dev="sysfs" ino=29716
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_thermal:s0
  tclass=file permissive=1
* avc: denied { write } for name="online" dev="sysfs" ino=5871
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0
  tclass=file permissive=1
* avc: denied { write } for name="boost_ms" dev="sysfs" ino=6652
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_cpu_boost:s0
  tclass=file permissive=1
* avc: denied { open } for name="boost_ms" dev="sysfs" ino=6652
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_cpu_boost:s0
  tclass=file permissive=1
* avc: denied { setattr } for name="min_pwrlevel" dev="sysfs"
  ino=19546 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_kgsl:s0
  tclass=file permissive=0
* avc: denied { setattr } for name="enabled" dev="sysfs" ino=23417
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_hal_pwr:s0
  tclass=file permissive=1
* avc: denied { setattr } for name="rear_camfw" dev="sysfs" ino=24404
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_camera:s0
  tclass=file permissive=1
* avc: denied { check_context } for scontext=u:r:init:s0
  tcontext=u:object_r:kernel:s0 tclass=security permissive=0

Change-Id: Id7f78abedea2209f84527b1b83259574d06a0900
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
db9de76b54 msm8226-common: sepolicy: Label sysfs_usb_storage_gadget, resolve denials
* avc: denied { setattr } for name="file" dev="sysfs" ino=23591
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_usb_storage_gadget:s0
  tclass=file permissive=1

Change-Id: Ia96e3634cbe1a85bb7da3f24ecfa3fbaaa55baad
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
7bdcdf733e msm8226-common: sepolicy: Label sysfs_usb_otg, resolve denials
* avc: denied { setattr } for name="booster" dev="sysfs" ino=23129
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_usb_otg:s0
  tclass=file permissive=1

Change-Id: Iffb33bd7647026107473fb63e82d942ad027f9f9
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
2a303c3bbc msm8226-common: sepolicy: Broaden sysfs_bluetooth_writable, resolve denials
Change-Id: Iff3645e36ece2126f3697bb0389394415be16529
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
8a2f7414d2 msm8226-common: sepolicy: Label sysfs_msmuart_file, resolve denials
* avc: denied { setattr } for name="clock" dev="sysfs" ino=18914
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msmuart_file:s0
  tclass=file permissive=1

Change-Id: Iaf5fe6791344dcf419242599eb6c9272c61cd707
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
d290aaa200 msm8226-common: sepolicy: Label sysfs_mmc_host, resolve denials
* avc: denied { write } for name="control" dev="sysfs" ino=25383
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_mmc_host:s0
  tclass=file permissive=1
* avc: denied { open } for name="control" dev="sysfs" ino=25383
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_mmc_host:s0
  tclass=file permissive=1

Change-Id: I876d025db9cf1fe67faeccca830ffd53dbf92904
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
695a6ac727 msm8226-common: sepolicy: Label sysfs_socinfo, resolve denials
* avc: denied { setattr } for name="soc_iddq" dev="sysfs" ino=5543
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_socinfo:s0 tclass=file
  permissive=0

Change-Id: Ife248a9cccea19b09b931525606cf4c34344fd9f
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
7973254314 msm8226-common: sepolicy: Label additional sysfs_io_sched_tuneable node
Change-Id: I2b416123c7d925443df20f518cb2a0bd02935229
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
3be1e28b19 msm8226-common: sepolicy: Resolve additional sensors HAL denials
* avc: denied { search } for name="sec-thermistor" dev="sysfs"
  ino=5485 scontext=u:r:hal_sensors_default:s0
  tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=dir permissive=0

Change-Id: I4d77e87b2662bca081cc5b934161347fed6a157d
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
c75b3abe8d msm8226-common: sepolicy: Label sysfs_sensors, resolve denials
* avc: denied { read } for name="ssp_sensor" dev="sysfs" ino=27809
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sensors:s0
  tclass=lnk_file permissive=1
* avc: denied { setattr } for name="temperature" dev="sysfs" ino=10861
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sensors:s0
  tclass=file permissive=0

Change-Id: I2e4a436704ed019af153da880d7becbde4b0ab11
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
5bc5db2267 msm8226-common: sepolicy: Label sysfs_msm_perf, resolve denials
* avc: denied { write } for name="suspend_enabled" dev="sysfs"
  ino=10567 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_perf:s0
  tclass=file permissive=1
* avc: denied { open } for name="suspend_enabled" dev="sysfs"
  ino=10567 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_perf:s0
  tclass=file permissive=1

Change-Id: I23d69f0442d126b2a6ac3aaeda5032856a4483f2
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
3d54b00d4e msm8226-common: sepolicy: Label sysfs_disk_stat nodes
* avc: denied { read } for name="stat" dev="sysfs" ino=26461
  scontext=u:r:storaged:s0 tcontext=u:object_r:sysfs:s0 tclass=file
  permissive=1

Change-Id: I4b7258d069801f542da8c7f5ca8242ea32f12bca
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
ee243b6985 msm8226-common: sepolicy: Label our custom sensors service
Change-Id: I331abeac851cd92b32990ff797dff506dd67e503
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
bb636ae3f5 msm8226-common: sepolicy: Resolve hal_sensors_default denials
* avc: denied { read } for name="name" dev="sysfs" ino=26468i
  scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs:s0
  tclass=file permissive=0
* avc: denied { read } for name="iio:device1" dev="tmpfs" ino=7276
  scontext=u:r:hal_sensors_default:s0
  tcontext=u:object_r:iio_device:s0 tclass=chr_file permissive=0
* avc: denied { open } for name="iio:device0" dev="tmpfs" ino=7275
  scontext=u:r:hal_sensors_default:s0
  tcontext=u:object_r:iio_device:s0 tclass=chr_file permissive=0
* avc: denied { search } for name="/" dev="mmcblk0p12" ino=2
  scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:efs_file:s0
  tclass=dir permissive=0
* avc: denied { read } for name="gyro_cal_data" dev="mmcblk0p12"
  ino=41 scontext=u:r:hal_sensors_default:s0
  tcontext=u:object_r:efs_file:s0 tclass=file permissive=0
* avc: denied { read } for name="shtc1_sensor" dev="tmpfs" ino=8378
  scontext=u:r:hal_sensors_default:s0
  tcontext=u:object_r:sensors_device:s0 tclass=chr_file permissive=1
* avc: denied { open } for name="shtc1_sensor" dev="tmpfs" ino=8378
  scontext=u:r:hal_sensors_default:s0
  tcontext=u:object_r:sensors_device:s0 tclass=chr_file permissive=1

Change-Id: Iad7e41e5e250eb1511d5838bd42b2b07843d220b
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
8d6fcd7628 msm8226-common: sepolicy: Label sysfs_sec_* types, resolve denials
* Rename sysfs_sec type to sysfs_sec_key
* Add additional sysfs_sec_* types as appropriate

* avc: denied { read } for name="temp_adc" dev="sysfs" ino=10538
  scontext=u:r:hal_sensors_default:s0
  tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=file permissive=1
* avc: denied { open } for name="temp_adc" dev="sysfs" ino=10538
  scontext=u:r:hal_sensors_default:s0
  tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=file permissive=1
* avc: denied { write } for name="ir_send" dev="sysfs" ino=21339
  scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_sec_ir:s0
  tclass=file permissive=1
* avc: denied { write } for name="led_blink" dev="sysfs" ino=25722
  scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_sec_led:s0
  tclass=file permissive=1
* avc: denied { write } for name="brightness" dev="sysfs" ino=23467
  scontext=u:r:system_server:s0
  tcontext=u:object_r:sysfs_sec_touchkey:s0 tclass=file permissive=1
* avc: denied { setattr } for name="ir_send" dev="sysfs" ino=21339
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_ir:s0 tclass=file
  permissive=1
* avc: denied { setattr } for name="hall_irq_ctrl" dev="sysfs"
  ino=29565 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_key:s0
  tclass=file permissive=1
* avc: denied { setattr } for name="epen_firm_update" dev="sysfs"
  ino=23585 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_epen:s0
  tclass=file permissive=1
* avc: denied { setattr } for name="cmd" dev="sysfs" ino=23756
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_tsp:s0
  tclass=file permissive=1
* avc: denied { write } for name="wakeup_keys" dev="sysfs" ino=29568
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_key:s0
  tclass=file permissive=1
* avc: denied { open } for name="wakeup_keys" dev="sysfs" ino=29568
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_key:s0
  tclass=file permissive=1
* avc: denied { read } for name="input" dev="sysfs" ino=24012
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_tsp:s0
  tclass=lnk_file permissive=0
* avc: denied { setattr } for name="waketime" dev="sysfs" ino=29035
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_bamdmux:s0
  tclass=file permissive=0
* avc: denied { setattr } for name="led_r" dev="sysfs" ino=25719
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_led:s0
  tclass=file permissive=0
* avc: denied { setattr } for name="usb_sel" dev="sysfs" ino=28162
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_switch:s0
  tclass=file permissive=0
* avc: denied { setattr } for name="brightness" dev="sysfs" ino=23468
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_touchkey:s0
  tclass=file permissive=0
* avc: denied { setattr } for name="temperature" dev="sysfs"
  ino=10538 scontext=u:r:init:s0
  tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=file
  permissive=0
* avc: denied { setattr } for name="barcode_send" dev="sysfs"
  ino=19231 scontext=u:r:init:s0
  tcontext=u:object_r:sysfs_sec_barcode_emul:s0 tclass=file
  permissive=0

Change-Id: I66b6d2aab875a2706f2730be9755e8d9805ffb6e
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
e03bb93d67 msm8226-common: sepolicy: Label sysfs_leds, resolve denials
* avc: denied { search } for name="leds" dev="sysfs" ino=7437
  scontext=u:r:hal_sensors_default:s0
  tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1
* avc: denied { setattr } for name="led_r" dev="sysfs" ino=25718
  scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file
  permissive=1

Change-Id: I8840e28b3aa72e60d5c15cad66f043a36a15c771
2019-10-12 10:26:47 +02:00