emufan4568
1f9b588765
sdm710-common: Allow wcnss_service to run shell
...
* avc: denied { execute_no_trans } for path="/vendor/bin/sh" dev="sda16" ino=247 scontext=u:r:wcnss_service:s0 tcontext=u:object_r:vendor_shell_exec:s0 tclass=file permissive=1
2023-06-17 17:04:00 +03:00
erikdrozina
19bb8c274d
sdm710-common: sepolicy: Label some RIL property
...
W libc : Unable to set property "ro.vendor.ril.svlte1x" to "false": error code: 0xb
W libc : Unable to set property "ro.vendor.ril.svdo" to "false": error code: 0xb
W libc : Unable to set property "ro.ril.supportLTE" to "1": error code: 0xb
Co-authored-by: Master <mhmdeveloperofficial@gmail.com>
2023-06-17 17:03:49 +03:00
dlwlrma123
40b0738403
sdm710-common: sepolicy: Give adbd sys_admin access
...
07-18 06:52:22.989 1406 3348 W AdbDebuggingManager: Read failed with count -1
07-18 06:52:22.990 1406 3348 E AdbDebuggingManager: Caught an exception opening the socket: java.io.IOException: Connection refused
07-18 06:52:23.042 2380 2380 D StatusBar: Received new disable state. Old: enaihbcrso.qingr | New: enaihbcrso.qingr
07-18 06:52:23.040 12342 12342 W adbd : type=1400 audit(0.0:728): avc: denied { sys_admin } for capability=21 scontext=u:r:adbd:s0 tcontext=u:r:adbd:s0 tclass=capability permissive=0
07-18 06:52:23.049 12342 12342 I adbd : persist.adb.watchdog set to ''
07-18 06:52:23.049 12342 12342 I adbd : persist.sys.test_harness set to ''
07-18 06:52:23.049 12342 12342 I adbd : adb watchdog timeout set to 600 seconds
07-18 06:52:23.050 12342 12342 I adbd : adbd started
07-18 06:52:23.050 12342 12344 I adbd : Waiting for persist.adb.tls_server.enable=1
07-18 06:52:23.050 12342 12346 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
07-18 06:52:23.051 12342 12346 I adbd : UsbFfsConnection constructed
07-18 06:52:23.051 12342 12348 I adbd : UsbFfs-monitor thread spawned
07-18 06:52:23.053 12342 12348 I adbd : USB event: FUNCTIONFS_BIND
07-18 06:52:23.086 1406 1697 W Looper : Slow dispatch took 207ms android.fg h=com.android.server.usb.UsbDeviceManager$UsbHandlerLegacy c=null m=13
2023-06-17 17:03:44 +03:00
Ultra119
229b7a415d
sdm710-common: sepolicy: Give QCOM TEE directory access to tmpfs
...
08-28 01:02:14.567 893 909 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x64000
08-28 01:02:14.568 893 909 D QSEECOMAPI: App is not loaded in QSEE
08-28 01:02:14.568 893 909 E QSEECOMAPI: Error::Cannot open the file /vendor/firmware_mnt/image/widevine.mdt errno = 2
08-28 01:02:14.568 893 909 E QSEECOMAPI: Error::Loading image failed with ret = -1
08-28 01:02:14.571 893 909 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x64000
08-28 01:02:14.571 893 909 D QSEECOMAPI: App is not loaded in QSEE
08-28 01:02:14.595 893 909 D QSEECOMAPI: Loaded image: APP id = 24
08-28 01:02:14.597 893 909 I QCOM-OEMCrypto: ---------------Widevine OEMCrypto configuration-----------------
08-28 01:02:14.597 893 909 I QCOM-OEMCrypto: TA-HLOS interface : QSEECOM
08-28 01:02:14.597 893 909 I QCOM-OEMCrypto: Crypto Engine SMMU Virtual Address : Yes
08-28 01:02:14.597 893 909 I QCOM-OEMCrypto: Measure elapsed time : No
08-28 01:02:14.597 893 909 I QCOM-OEMCrypto: Inplace decryption for clear buffer : Yes
08-28 01:02:14.597 893 909 I QCOM-OEMCrypto: Frame Assembly : Yes
08-28 01:02:14.597 893 909 I QCOM-OEMCrypto: Scratch buffer size : 4194304
08-28 01:02:14.597 893 909 I QCOM-OEMCrypto: Decrypt hash tests : No
08-28 01:02:14.597 893 909 I QCOM-OEMCrypto: Secure buffer tests : No
08-28 01:02:14.597 893 909 I QCOM-OEMCrypto: ----------------------------------------------------------------
08-28 01:02:14.598 624 633 D DrmLibTime: got the req here! ret=0
08-28 01:02:14.599 624 633 D DrmLibTime: command id, time_cmd_id = 770
08-28 01:02:14.599 624 633 D DrmLibTime: time_getutcsec starts!
08-28 01:02:14.599 624 633 D DrmLibTime: QSEE Time Listener: time_getutcsec
08-28 01:02:14.599 624 633 D DrmLibTime: QSEE Time Listener: get_utc_seconds
08-28 01:02:14.599 624 633 D DrmLibTime: QSEE Time Listener: time_get_modem_time
08-28 01:02:14.599 624 633 D DrmLibTime: QSEE Time Listener: Checking if ATS_MODEM is set or not.
08-28 01:02:14.599 624 633 D QC-time-services: Lib:time_genoff_operation: pargs->base = 13
08-28 01:02:14.599 624 633 D QC-time-services: Lib:time_genoff_operation: pargs->operation = 2
08-28 01:02:14.599 624 633 D QC-time-services: Lib:time_genoff_operation: pargs->ts_val = 0
08-28 01:02:14.599 624 633 D QC-time-services: Lib:time_genoff_operation: Send to server passed!!
08-28 01:02:14.599 726 1000 D QC-time-services: Daemon: Connection accepted:time_genoff
08-28 01:02:14.599 726 25387 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 2,value = 0
08-28 01:02:14.599 726 25387 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 2
08-28 01:02:14.599 726 25387 D QC-time-services: offset is: 1 for base: 13
08-28 01:02:14.599 624 633 E QC-time-services: Receive Passed == base = 13, unit = 1, operation = 2, result = 0
08-28 01:02:14.599 624 633 D DrmLibTime: QSEE Time Listener: ATS_MODEM is set. Try to retrieve it.
08-28 01:02:14.599 726 1000 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
08-28 01:02:14.599 726 1000 D QC-time-services: Daemon: Connection accepted:time_genoff
08-28 01:02:14.600 726 25388 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 1,value = 0
08-28 01:02:14.600 726 25388 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 1
08-28 01:02:14.600 726 25388 D QC-time-services: Daemon: genoff get for 13
08-28 01:02:14.600 726 25388 D QC-time-services: Daemon:Value read from QTimer mseconds = 25504420
08-28 01:02:14.600 726 25388 D QC-time-services: Daemon:Value read from RTC mseconds on boot = 14864938000
08-28 01:02:14.600 726 25388 D QC-time-services: Daemon:Value read from QTimer mseconds = 25504420
08-28 01:02:14.600 726 25388 D QC-time-services: Daemon:Value read from generic offset = 1646729299436
08-28 01:02:14.600 726 25388 D QC-time-services: Daemon:Delta read on boot mseconds = 14864929606
08-28 01:02:14.600 726 25388 D QC-time-services: Daemon:Final Time = 1661619733462
08-28 01:02:14.600 624 633 D DrmLibTime: QSEE Time Listener: Time GenOff - seconds: 1661619733
08-28 01:02:14.600 624 633 D DrmLibTime: time_getutcsec returns 0, sec = 1661619733; nsec = 0
08-28 01:02:14.600 624 633 D DrmLibTime: time_getutcsec finished!
08-28 01:02:14.600 624 633 D DrmLibTime: iotcl_continue_command finished! and return 0
08-28 01:02:14.600 624 633 D DrmLibTime: before calling ioctl to read the next time_cmd
08-28 01:02:14.601 726 1000 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
08-28 01:02:14.615 624 624 W qseecomd: type=1400 audit(0.0:880): avc: denied { read } for name="/" dev="tmpfs" ino=1039 scontext=u:r:tee:s0 tcontext=u:object_r:tmpfs:s0 tclass=dir permissive=0
2023-06-17 17:03:39 +03:00
Ultra119
712c0269bb
sdm710-common: sepolicy: Fix up libperfmgr crash on logs
...
W/libperfmgr(798): Failed to write to node: /proc/sys/kernel/sched_boost with value: 0, fd: -1
2023-06-17 17:03:33 +03:00
giasen
c69c3e3d54
fixup: sdm710-common: update power sepolicy from xiaomi-sdm845
...
- remove unwanted rc file
2022-11-12 15:09:34 +01:00
Chenyang Zhong
714988dc45
sdm710-common: sepolicy: allow apps to get aux camera prop
...
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
2022-05-22 18:49:02 +02:00
Giammarco Senatore
c5ecd8c189
Revert "sdm710-common: Address init denial"
...
This reverts commit e05b539a51
.
2022-01-04 22:07:15 +01:00
jjpprrrr
e05b539a51
sdm710-common: Address init denial
2021-11-25 20:05:41 +01:00
Chenyang Zhong
50bb739532
sdm710-common: sepolicy: allow system_server to get app_zygote pgid
...
avc: denied { getpgid } for scontext=u:r:system_server:s0 tcontext=u:r:app_zygote:s0:c512,c768 tclass=process permissive=0
Appeared during UiBench.
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
2021-11-12 16:17:06 +01:00
jjpprrrr
14ed563a24
sdm710-common: sepolicy: specify the owner of vendor props
...
vendor_fp_prop is public because apps like Alipay may access it
to enable biometrics payment authentication.
sdm710: Drop a neverallow
2021-10-30 12:58:35 +02:00
Chenyang Zhong
ed065abb05
sdm710-common: sepolicy: allow vendor_init to read persist_debug_prop
...
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
2021-10-20 22:42:05 +02:00
Giammarco Senatore
c2918e4349
sdm710-common: Add file_contexts for neuralnetworks hal
2021-08-18 13:16:08 +02:00
Giammarco Senatore
09cd80eeb5
sdm710-common: Go enforcing
...
- major cleanup
- sepolicy from xiaomi-sdm845-common
- label both goodix and fpc
- allystar GPS uart port and ontim nodes
2021-08-11 22:41:19 +02:00
Giammarco Senatore
f6f497c743
sdm710-common: Initial commonized tree
...
* minor cleanup in overlay and init rc
* drop dolby
2021-07-25 21:56:17 +02:00
Ethan Chen
4efd4900c5
kunlun2: Enable Pixel atrace HAL
...
Change-Id: I34691e5e909b6ca76dc97fd5c45328e3f80b67e1
Signed-off-by: Henrique Pereira <hlcpereira@pixelexperience.org>
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-17 18:48:16 +02:00
Giammarco Senatore
c119216557
kunlun2: Address some initial denials
...
- Nuke folder creation that breaks encryption
- Nuke permissivers and other creepy things
- Properly label light and fp HALs
- Address initial fingerprint denials
- Label camera zui prop
2021-07-17 18:11:00 +02:00
Bruno Martins
961898527d
sepolicy: Add thermal-engine rules
...
Signed-off-by: DennySPb <dennyspb@gmail.com>
Change-Id: I4ef5664b036d0cff81ebb39646276b208da4986b
2021-07-16 23:25:14 +02:00
DennySPb
37b5c61917
sepolicy: Fix camera properties for vendor build
...
Signed-off-by: DennySPb <dennyspb@gmail.com>
Change-Id: I9eda9aa87102c44400c4dfb48588835d6ecb834f
2021-07-16 22:07:31 +02:00
GiaSen
57e6de12d3
sepolicy: address some more denials
...
and nuke neverallows
2021-07-16 18:44:08 +02:00
Adam Shih
84460e3bdf
sepolicy: gmscore_app: suppress denials on firmware
...
Bug: 149543390
Bug: 149062700
Bug: 151195371
Test: boot with no gmscore_app avc error
Change-Id: I4c667b86863121529f7c3a24b9daf615260104c7
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:44:07 +02:00
Pig
be846c32da
sepolicy: ignore hardless QCOM denials
...
Change-Id: Ie8f74bde8aeedbd134b11307221c1f930ea4f5dc
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:44:07 +02:00
Ashwin R C
ec1d9ed563
sepolicy: Allow hal_audio_default to read audio_device
...
audio_hw_primary: pcm_open_prepare_helper: cannot open device '/dev/snd/pcmC0D0p': Permission denied
Change-Id: I8fb7ec2c269fca6b8bf21aacf521990e9279418d
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:44:06 +02:00
LuK1337
4652cba66e
sepolicy: Address hal_audio_default denials
...
Change-Id: I67b064ccf1d84ca4b891f1cdb4f4d6ecebdbce23
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:44:05 +02:00
LuK1337
1efea1f5bc
kunlun2: sepolicy: Address time_daemon denials
...
Change-Id: I83947a673ed19cfc20c130fb133d1957aa44d284
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:44:05 +02:00
LuK1337
2f47635396
kunlun2: sepolicy: Address qti_init_shell denials
...
Change-Id: I21807dc3ae7b7c073b3b06f1412ccc21a727b497
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:44:05 +02:00
LuK1337
7f69622f6f
sepolicy: Address kernel denials
...
Change-Id: Ie506bd769173d1c5780cfbf8b2740b5c5d66d8c5
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:44:05 +02:00
Scott Warner
933e39f1c8
sepolicy: Address hal_graphics_composer_default denials
...
Change-Id: Iff994cc69d8e11b746cda5a5517c0cf0deea8c86
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:43:59 +02:00
Scott Warner
047ebfb3ab
sepolicy: Address sensors denials
...
Change-Id: Iff842e7333fba5dd17cb3675caede95dd37e3780
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:42:51 +02:00
LuK1337
ff0ea35f8a
kunlun2: sepolicy: Address hal_sensors_default denials
...
Change-Id: I211841e7709e6e54edcce9951f5a52f7b7be6158
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:34:31 +02:00
LuK1337
cd50185651
sepolicy: rild: file->dir
...
Change-Id: I631cc080ad0dedecf24476bac84064575b809809
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:34:31 +02:00
LuK1337
da6ae287a6
sepolicy: Address rild denials
...
Change-Id: Ia081566c64e7cdc4007baab0de61ba8e62906a61
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 18:34:21 +02:00
Giammarco Senatore
dfbc4aeaba
kunlun2: Nuke neverallows
...
for real now
2021-07-16 18:33:17 +02:00
LuK1337
68d09ebf7f
Drop SSR blobs and set SSR restart_level in init.qcom.rc
...
Change-Id: I32fc08c9ad36b9c8ebfc019fc87a19eece18f0b4
Signed-off-by: DennySPb <dennyspb@gmail.com>
2021-07-16 17:54:58 +02:00
DennySPb
14f08dc1fe
Initial selinux policies
...
* convert existing one to vendor
2021-07-16 17:54:51 +02:00
Giammarco Senatore
38b77bd32e
kunlun2: Drop vendor_overlay and its hax
2021-07-11 17:06:19 +02:00
Giammarco Senatore
47f9cbc14b
kunlun2: Nuke neverallows
2021-05-14 15:13:34 +02:00
Georg Veichtlbauer
9e6425cf23
kunlun2: sepolicy: Allow changing read-ahead value in init
...
Change-Id: Id39212dcc9927192138b871a29f0bbafc85403ca
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2021-04-01 18:28:27 +02:00
Giammarco Senatore
e0a7933eff
kunlun2: addressed some denials
2021-02-15 15:41:06 +01:00
xyyx
ad74ced2e6
kunlun2: Address FM Radio denials
2021-02-15 15:41:06 +01:00
GiaSen
abdf28791a
kunlun2: sepolicy: cleanup and update
2021-01-02 21:05:16 +01:00
DennySPB
d4a7573cd1
kunlun2: Resolve power HAL denials on R
...
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2021-01-01 19:18:32 +01:00
SamarV-121
30666f3913
kunlun2: Import Pixel power AIDL HAL
...
Nuke Powerstats
2021-01-01 17:52:11 +01:00
GiaSen
2f07f5abc0
kunlun2: Go enforcing
...
Bind mount etc files because vendor_overlay/29/etc makes device to reboot to recovery
from pstore
vdc: Command: cryptfs enablefilecrypto Failed: Status(-8, EX_SERVICE_SPECIFIC): '0: '
2021-01-01 13:33:47 +01:00
SamarV-121
fcd478120d
kunlun2: power-libperfmgr: Convert to lenovo targets
...
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-05-22 11:29:29 +02:00
SamarV-121
2d90abaa7c
sdm710-common: Disable IOP and PERF HAL
...
* also revert 56f6504f61
, eb7a690439
, d5cb550169
* in the favour of power-libperfmgr
* also nuke all sepolicies for now
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-05-22 11:27:40 +02:00
GiaSen
d4b68133ed
kunlun2: nuke sepolicy again
2020-04-25 19:49:22 +02:00
SamarV-121
d660d30e22
kunlun2: sepolicy: Allow power hal to access tap to wake node
...
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-04-12 03:13:03 +05:30
SamarV-121
d5cc7b6ce3
kunlun2: Remove all useless stuffs
...
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-04-11 18:58:43 +05:30
SamarV-121
d07301de0a
sdm710-common: Import QTI Power HAL from Lineage
...
* 0db671a262
* https://github.com/LineageOS/android_hardware_lineage_interfaces/tree/lineage-17.1/power/1.0
* rootdir: Disable vendor.power-hal-1-0
* sepolicy: Lable android.hardware.power@1.2-service-qti
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-03-30 18:37:36 +05:30