Commit graph

37 commits

Author SHA1 Message Date
asmallbit
51b24b16b4
sdm710-common: sepolicy: Add SELinux policy for odrefresh
odrefresh: type=1400 audit(0.0:192095): avc: denied { open } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

Signed-off-by: Mikazuuu07 <irfn4566@gmail.com>
Signed-off-by: wulan17 <galihgustip@gmail.com>

Change-Id: I51eb0f55430673cce7e87882765aa335096c687d
2023-11-21 20:39:52 +02:00
boedhack99
22156aae16
sdm710-common: sepolicy: Allow odrefresh to kill
* avc: denied { kill } for comm=odrefresh capability=5
scontext=u:r:odrefresh:s0 tcontext=u:r:odrefresh:s0 tclass=capability
permissive=0

Change-Id: Id24f51e8570dcb32a6b35c57c8f4b6c2be626673
2023-11-21 20:38:20 +02:00
Aflaungos
c7fb8c20d2
sdm710-common: sepolicy: Add SELinux policy for flags_health_check
flags_health_ch: type=1400 audit(0.0:192095): avc: denied { open } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { open } for path=/dev/__properties__/u:object_r:ab_update_gki_prop:s0 dev=tmpfs ino=14631 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1

avc: denied { open } for path=/dev/__properties__/u:object_r:adbd_config_prop:s0 dev=tmpfs ino=14632 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:adbd_config_prop:s0 dev=tmpfs ino=14632 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1

Signed-off-by: Mikazuuu07 <irfn4566@gmail.com>
Signed-off-by: wulan17 <galihgustip@gmail.com>
2023-11-21 19:57:23 +02:00
iusmac
ca32a5f18f
sdm710-common: sepolicy: Adress IORap usap_pool denial
W FinalizerDaemon: type=1400 audit(0.0:532): avc: denied { getopt } for
path="/dev/socket/usap_pool_primary" scontext=u:rradios0
tcontext=u:r:zygote:s0 tclass=unix_stream_socket permissive=0
2023-06-26 23:37:59 +03:00
lupesoltec
d8f8c9232b
sdm710-common: sepolicy: Fix avc denials related to linkerconfig
avc: denied { kill } for comm="linkerconfig" capability=5
scontext=u:r:linkerconfig:s0 tcontext=u:r:linkerconfig:s0
tclass=capability permissive=0
2023-06-26 22:57:36 +03:00
Murat Kozan
ef80583f34
sdm710-common: sepolicy: Allow network_stack to read net psched
[   16.649254] type=1400 audit(1664029505.494:14): avc: granted { read } for comm=rkstack.process name=psched dev=proc ino=4026532010 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   16.649335] type=1400 audit(1664029505.494:15): avc: granted { read open } for comm=rkstack.process path=/proc/2172/net/psched dev=proc ino=4026532010 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[   16.649367] type=1400 audit(1664029505.494:16): avc: granted { getattr } for comm=rkstack.process path=/proc/2172/net/psched dev=proc ino=4026532010 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file

Change-Id: Iee08bc43122ca6aedce39fd2a27980c90a6b42f1
2023-06-26 22:56:30 +03:00
dlwlrma123
40b0738403
sdm710-common: sepolicy: Give adbd sys_admin access
07-18 06:52:22.989  1406  3348 W AdbDebuggingManager: Read failed with count -1
07-18 06:52:22.990  1406  3348 E AdbDebuggingManager: Caught an exception opening the socket: java.io.IOException: Connection refused
07-18 06:52:23.042  2380  2380 D StatusBar: Received new disable state. Old: enaihbcrso.qingr | New: enaihbcrso.qingr
07-18 06:52:23.040 12342 12342 W adbd    : type=1400 audit(0.0:728): avc: denied { sys_admin } for capability=21 scontext=u:r:adbd:s0 tcontext=u:r:adbd:s0 tclass=capability permissive=0
07-18 06:52:23.049 12342 12342 I adbd    : persist.adb.watchdog set to ''
07-18 06:52:23.049 12342 12342 I adbd    : persist.sys.test_harness set to ''
07-18 06:52:23.049 12342 12342 I adbd    : adb watchdog timeout set to 600 seconds
07-18 06:52:23.050 12342 12342 I adbd    : adbd started
07-18 06:52:23.050 12342 12344 I adbd    : Waiting for persist.adb.tls_server.enable=1
07-18 06:52:23.050 12342 12346 I adbd    : opening control endpoint /dev/usb-ffs/adb/ep0
07-18 06:52:23.051 12342 12346 I adbd    : UsbFfsConnection constructed
07-18 06:52:23.051 12342 12348 I adbd    : UsbFfs-monitor thread spawned
07-18 06:52:23.053 12342 12348 I adbd    : USB event: FUNCTIONFS_BIND
07-18 06:52:23.086  1406  1697 W Looper  : Slow dispatch took 207ms android.fg h=com.android.server.usb.UsbDeviceManager$UsbHandlerLegacy c=null m=13
2023-06-17 17:03:44 +03:00
Giammarco Senatore
c5ecd8c189
Revert "sdm710-common: Address init denial"
This reverts commit e05b539a51.
2022-01-04 22:07:15 +01:00
jjpprrrr
e05b539a51
sdm710-common: Address init denial 2021-11-25 20:05:41 +01:00
Chenyang Zhong
50bb739532
sdm710-common: sepolicy: allow system_server to get app_zygote pgid
avc: denied { getpgid } for scontext=u:r:system_server:s0 tcontext=u:r:app_zygote:s0:c512,c768 tclass=process permissive=0

Appeared during UiBench.

Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
2021-11-12 16:17:06 +01:00
DennySPb
14f08dc1fe
Initial selinux policies
* convert existing one to vendor
2021-07-16 17:54:51 +02:00
Giammarco Senatore
38b77bd32e
kunlun2: Drop vendor_overlay and its hax 2021-07-11 17:06:19 +02:00
Giammarco Senatore
47f9cbc14b
kunlun2: Nuke neverallows 2021-05-14 15:13:34 +02:00
Georg Veichtlbauer
9e6425cf23
kunlun2: sepolicy: Allow changing read-ahead value in init
Change-Id: Id39212dcc9927192138b871a29f0bbafc85403ca
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2021-04-01 18:28:27 +02:00
Giammarco Senatore
e0a7933eff
kunlun2: addressed some denials 2021-02-15 15:41:06 +01:00
xyyx
ad74ced2e6
kunlun2: Address FM Radio denials 2021-02-15 15:41:06 +01:00
GiaSen
abdf28791a kunlun2: sepolicy: cleanup and update 2021-01-02 21:05:16 +01:00
DennySPB
d4a7573cd1 kunlun2: Resolve power HAL denials on R
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2021-01-01 19:18:32 +01:00
SamarV-121
30666f3913 kunlun2: Import Pixel power AIDL HAL
Nuke Powerstats
2021-01-01 17:52:11 +01:00
GiaSen
2f07f5abc0 kunlun2: Go enforcing
Bind mount etc files because vendor_overlay/29/etc makes device to reboot to recovery

from pstore
vdc: Command: cryptfs enablefilecrypto Failed: Status(-8, EX_SERVICE_SPECIFIC): '0: '
2021-01-01 13:33:47 +01:00
SamarV-121
fcd478120d kunlun2: power-libperfmgr: Convert to lenovo targets
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-05-22 11:29:29 +02:00
SamarV-121
2d90abaa7c sdm710-common: Disable IOP and PERF HAL
* also revert 56f6504f61, eb7a690439, d5cb550169
 * in the favour of power-libperfmgr
 * also nuke all sepolicies for now
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-05-22 11:27:40 +02:00
GiaSen
d4b68133ed kunlun2: nuke sepolicy again 2020-04-25 19:49:22 +02:00
SamarV-121
d660d30e22 kunlun2: sepolicy: Allow power hal to access tap to wake node
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-04-12 03:13:03 +05:30
SamarV-121
d5cc7b6ce3 kunlun2: Remove all useless stuffs
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-04-11 18:58:43 +05:30
SamarV-121
d07301de0a sdm710-common: Import QTI Power HAL from Lineage
* 0db671a262
 * https://github.com/LineageOS/android_hardware_lineage_interfaces/tree/lineage-17.1/power/1.0
 * rootdir: Disable vendor.power-hal-1-0
 * sepolicy: Lable android.hardware.power@1.2-service-qti

Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-03-30 18:37:36 +05:30
Jake Weinstein
eb7a690439 sdm710-common: Enable UXE,IOP in perfconfigstore
Matches stock Qualcomm configuration and improves performance.
OnePlus disables this because of their framework features, which
we do not have.

Change-Id: I2b6e8c9ed59415bc7841bf244bd3dd9b5633088c
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-03-30 18:37:36 +05:30
SamarV-121
879aa5df81 sdm710-common: sepolicy: Address selinux denials
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-03-20 23:45:32 +05:30
SamarV-121
9934de7ac2 sdm710-common: Nuke sepolicy for now
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2019-11-27 11:48:54 +00:00
LuK1337
172e69cd0d sdm710-common: Make SELinux great again!
Change-Id: Id479e031b584b24f79377aa244add20903a42b02
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2019-10-12 09:41:10 +00:00
bgcngm
44ad53081b sdm710-common: Import and bind mount stock custom audio policy config
* The purpose is to apply the same BT A2DP fix that used to be
   applied in the individual device trees.
2019-09-26 01:14:55 +00:00
luca020400
fd9829737d sdm710-common: Import stub camera motor HAL 2019-09-21 14:53:31 +00:00
luca020400
3e5e42415f sdm710-common: sepolicy: Address neverallows 2019-09-09 14:44:27 +00:00
dianlujitao
4cb4078b40 sdm710-common: sepolicy: Allow system_server to read vendor camera props
Change-Id: I43a2404d9399a931b03e1d2c8589d0d4adb10fc3
2019-08-29 09:56:23 +00:00
LuK1337
8543dadc25 sdm710-common: Allow appdomain to get vendor_camera_prop
* Some apps rely on this and won't work properly if they
  can't read this property. See ~ Snapchat.

Change-Id: I737e28f038941e6d18b96ff512f29dbe0ad7b7e4
2019-08-29 09:56:08 +00:00
Bruno Martins
f8f10ac731 sdm710-common: Add a custom lights HAL
* This overrides stock liblights and fixes LCD backlight issues.
 * Also fix lights HAL denials

Change-Id: Iafa2ba2338932879b7a1dc480b50559e3328fd21
2019-08-29 09:49:47 +00:00
SamarV-121
9d212ba3f5 Init trees 2019-08-29 09:37:42 +00:00