Commit Graph

7 Commits

Author SHA1 Message Date
Ivan Vecera
36b9a5cc3b sdm710-common: sepolicy: Allow cnd to read WiFi properties
Resolves:
W cnd     : type=1400 audit(0.0:99): avc: denied { read } for name="u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=21110 scontext=u:r:cnd:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=0

Signed-off-by: Ivan Vecera <ivan@cera.cz>
Change-Id: Id71c6840b3765e2d358c438931d678a78dd5352d
2022-08-19 15:24:16 +02:00
Ivan Vecera
f80cbb2df8 sdm710-common: sepolicy: Properly label slmadapter service and allow cnd to find it
Resolves:
E SELinux : avc:  denied  { find } for interface=vendor.qti.hardware.slmadapter::ISlmAdapter sid=u:r:cnd:s0 pid=975 scontext=u:r:cnd:s0 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager permissive=0

Signed-off-by: Ivan Vecera <ivan@cera.cz>
Change-Id: I5b27eee6a1f9a622962c7364b2bdabe92cf37254
2022-08-19 15:24:16 +02:00
Ivan Vecera
f028fbb5f2 sdm710-common: sepolicy: Allow cdsprpcd to access xdsp device
Allow cdsprpcd to offload ADSP/SLPI using the new
/dev/adsprpc-smd-secure device node.

Resolves:
avc: denied { read } for comm="cdsprpcd" name="adsprpc-smd-secure" dev="tmpfs" ino=19293 scontext=u:r:cdsprpcd:s0 tcontext=u:object_r:xdsp_device:s0 tclass=chr_file permissive=0

Signed-off-by: Ivan Vecera <ivan@cera.cz>
Change-Id: Idb48b5c543cc1342904bb9481e60f89c0120b222
2022-08-19 15:24:16 +02:00
Ivan Vecera
9c026b1496 sdm710-common: sepolicy: Allow bluetooth HAL to access WiFi vendor data
Resolves:
avc: denied { search } for name="mac_addr" dev="sda31" ino=6815767 scontext=u:r:hal_bluetooth_qti:s0 tcontext=u:object_r:wifi_vendor_data_file:s0 tclass=dir permissive=0

Signed-off-by: Ivan Vecera <ivan@cera.cz>
Change-Id: Iad4343a09c2466ff0341ab53e1c92e03fa775f73
2022-08-19 15:24:16 +02:00
Ivan Vecera
443acb15f8 sdm710-common: sepolicy: Fix sepolicy rule for hal_nfc_default
Commit 9cb034d ("sdm710-common: Initial sepolicy") incorrectly added
sepolicy rule to allow hal_power_default to create and access NFC
vendor data. Correct scontext is hal_nfc_default for this case.

Resolves:
avc: denied { search } for comm="nfc@1.2-service" name="nfc" dev="sda31" ino=6815807 scontext=u:r:hal_nfc_default:s0 tcontext=u:object_r:nfc_vendor_data_file:s0 tclass=dir permissive=0

Fixes: 9cb034d ("sdm710-common: Initial sepolicy")
Signed-off-by: Ivan Vecera <ivan@cera.cz>
Change-Id: I25b5c6f6b5f59230c23a5a632b6e45edea342d3e
2022-08-19 15:24:16 +02:00
Ivan Vecera
d469151b3f sdm710-common: sepolicy: Label additional data files used by FOD
Resolves:
avc: denied { open } for comm="qseecomd" path="/mnt/vendor/persist/goodix/caliParamsInfo.so" dev="sdf7" ino=223 scontext=u:r:tee:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
avc: denied { open } for comm="qseecomd" path="/mnt/vendor/persist/goodix/BMatrix.so" dev="sdf7" ino=224 scontext=u:r:tee:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=file permissive=0
avc: denied { open } for comm="qseecomd" path="/mnt/vendor/persist/goodix/ifaa_fplist" dev="sdf7" ino=215 scontext=u:r:tee:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=file permissive=0

Signed-off-by: Ivan Vecera <ivan@cera.cz>
Change-Id: If92b4dafc2186fc616db755882830aba162d5cd3
2022-08-19 15:24:16 +02:00
Sebastiano Barezzi
9cb034dc4e sdm710-common: Initial sepolicy
* From sdm845-common, cleaned up using sm8250-common one as reference

Change-Id: I9094d8593fba89c96cb2be3ee8a996b5cf4d3969
2022-06-13 23:08:39 +02:00