iusmac
ca32a5f18f
sdm710-common: sepolicy: Adress IORap usap_pool denial
...
W FinalizerDaemon: type=1400 audit(0.0:532): avc: denied { getopt } for
path="/dev/socket/usap_pool_primary" scontext=u:rradios0
tcontext=u:r:zygote:s0 tclass=unix_stream_socket permissive=0
2023-06-26 23:37:59 +03:00
lupesoltec
d8f8c9232b
sdm710-common: sepolicy: Fix avc denials related to linkerconfig
...
avc: denied { kill } for comm="linkerconfig" capability=5
scontext=u:r:linkerconfig:s0 tcontext=u:r:linkerconfig:s0
tclass=capability permissive=0
2023-06-26 22:57:36 +03:00
Murat Kozan
ef80583f34
sdm710-common: sepolicy: Allow network_stack to read net psched
...
[ 16.649254] type=1400 audit(1664029505.494:14): avc: granted { read } for comm=rkstack.process name=psched dev=proc ino=4026532010 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 16.649335] type=1400 audit(1664029505.494:15): avc: granted { read open } for comm=rkstack.process path=/proc/2172/net/psched dev=proc ino=4026532010 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
[ 16.649367] type=1400 audit(1664029505.494:16): avc: granted { getattr } for comm=rkstack.process path=/proc/2172/net/psched dev=proc ino=4026532010 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file
Change-Id: Iee08bc43122ca6aedce39fd2a27980c90a6b42f1
2023-06-26 22:56:30 +03:00
dlwlrma123
40b0738403
sdm710-common: sepolicy: Give adbd sys_admin access
...
07-18 06:52:22.989 1406 3348 W AdbDebuggingManager: Read failed with count -1
07-18 06:52:22.990 1406 3348 E AdbDebuggingManager: Caught an exception opening the socket: java.io.IOException: Connection refused
07-18 06:52:23.042 2380 2380 D StatusBar: Received new disable state. Old: enaihbcrso.qingr | New: enaihbcrso.qingr
07-18 06:52:23.040 12342 12342 W adbd : type=1400 audit(0.0:728): avc: denied { sys_admin } for capability=21 scontext=u:r:adbd:s0 tcontext=u:r:adbd:s0 tclass=capability permissive=0
07-18 06:52:23.049 12342 12342 I adbd : persist.adb.watchdog set to ''
07-18 06:52:23.049 12342 12342 I adbd : persist.sys.test_harness set to ''
07-18 06:52:23.049 12342 12342 I adbd : adb watchdog timeout set to 600 seconds
07-18 06:52:23.050 12342 12342 I adbd : adbd started
07-18 06:52:23.050 12342 12344 I adbd : Waiting for persist.adb.tls_server.enable=1
07-18 06:52:23.050 12342 12346 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
07-18 06:52:23.051 12342 12346 I adbd : UsbFfsConnection constructed
07-18 06:52:23.051 12342 12348 I adbd : UsbFfs-monitor thread spawned
07-18 06:52:23.053 12342 12348 I adbd : USB event: FUNCTIONFS_BIND
07-18 06:52:23.086 1406 1697 W Looper : Slow dispatch took 207ms android.fg h=com.android.server.usb.UsbDeviceManager$UsbHandlerLegacy c=null m=13
2023-06-17 17:03:44 +03:00
Giammarco Senatore
c5ecd8c189
Revert "sdm710-common: Address init denial"
...
This reverts commit e05b539a51
.
2022-01-04 22:07:15 +01:00
jjpprrrr
e05b539a51
sdm710-common: Address init denial
2021-11-25 20:05:41 +01:00
Chenyang Zhong
50bb739532
sdm710-common: sepolicy: allow system_server to get app_zygote pgid
...
avc: denied { getpgid } for scontext=u:r:system_server:s0 tcontext=u:r:app_zygote:s0:c512,c768 tclass=process permissive=0
Appeared during UiBench.
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
2021-11-12 16:17:06 +01:00
DennySPb
14f08dc1fe
Initial selinux policies
...
* convert existing one to vendor
2021-07-16 17:54:51 +02:00
Giammarco Senatore
38b77bd32e
kunlun2: Drop vendor_overlay and its hax
2021-07-11 17:06:19 +02:00
Giammarco Senatore
47f9cbc14b
kunlun2: Nuke neverallows
2021-05-14 15:13:34 +02:00
Georg Veichtlbauer
9e6425cf23
kunlun2: sepolicy: Allow changing read-ahead value in init
...
Change-Id: Id39212dcc9927192138b871a29f0bbafc85403ca
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2021-04-01 18:28:27 +02:00
Giammarco Senatore
e0a7933eff
kunlun2: addressed some denials
2021-02-15 15:41:06 +01:00
xyyx
ad74ced2e6
kunlun2: Address FM Radio denials
2021-02-15 15:41:06 +01:00
GiaSen
abdf28791a
kunlun2: sepolicy: cleanup and update
2021-01-02 21:05:16 +01:00
DennySPB
d4a7573cd1
kunlun2: Resolve power HAL denials on R
...
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2021-01-01 19:18:32 +01:00
SamarV-121
30666f3913
kunlun2: Import Pixel power AIDL HAL
...
Nuke Powerstats
2021-01-01 17:52:11 +01:00
GiaSen
2f07f5abc0
kunlun2: Go enforcing
...
Bind mount etc files because vendor_overlay/29/etc makes device to reboot to recovery
from pstore
vdc: Command: cryptfs enablefilecrypto Failed: Status(-8, EX_SERVICE_SPECIFIC): '0: '
2021-01-01 13:33:47 +01:00
SamarV-121
fcd478120d
kunlun2: power-libperfmgr: Convert to lenovo targets
...
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-05-22 11:29:29 +02:00
SamarV-121
2d90abaa7c
sdm710-common: Disable IOP and PERF HAL
...
* also revert 56f6504f61
, eb7a690439
, d5cb550169
* in the favour of power-libperfmgr
* also nuke all sepolicies for now
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-05-22 11:27:40 +02:00
GiaSen
d4b68133ed
kunlun2: nuke sepolicy again
2020-04-25 19:49:22 +02:00
SamarV-121
d660d30e22
kunlun2: sepolicy: Allow power hal to access tap to wake node
...
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-04-12 03:13:03 +05:30
SamarV-121
d5cc7b6ce3
kunlun2: Remove all useless stuffs
...
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-04-11 18:58:43 +05:30
SamarV-121
d07301de0a
sdm710-common: Import QTI Power HAL from Lineage
...
* 0db671a262
* https://github.com/LineageOS/android_hardware_lineage_interfaces/tree/lineage-17.1/power/1.0
* rootdir: Disable vendor.power-hal-1-0
* sepolicy: Lable android.hardware.power@1.2-service-qti
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-03-30 18:37:36 +05:30
Jake Weinstein
eb7a690439
sdm710-common: Enable UXE,IOP in perfconfigstore
...
Matches stock Qualcomm configuration and improves performance.
OnePlus disables this because of their framework features, which
we do not have.
Change-Id: I2b6e8c9ed59415bc7841bf244bd3dd9b5633088c
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-03-30 18:37:36 +05:30
SamarV-121
879aa5df81
sdm710-common: sepolicy: Address selinux denials
...
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2020-03-20 23:45:32 +05:30
SamarV-121
9934de7ac2
sdm710-common: Nuke sepolicy for now
...
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2019-11-27 11:48:54 +00:00
LuK1337
172e69cd0d
sdm710-common: Make SELinux great again!
...
Change-Id: Id479e031b584b24f79377aa244add20903a42b02
Signed-off-by: SamarV-121 <samarvispute121@gmail.com>
2019-10-12 09:41:10 +00:00
bgcngm
44ad53081b
sdm710-common: Import and bind mount stock custom audio policy config
...
* The purpose is to apply the same BT A2DP fix that used to be
applied in the individual device trees.
2019-09-26 01:14:55 +00:00
luca020400
fd9829737d
sdm710-common: Import stub camera motor HAL
2019-09-21 14:53:31 +00:00
luca020400
3e5e42415f
sdm710-common: sepolicy: Address neverallows
2019-09-09 14:44:27 +00:00
dianlujitao
4cb4078b40
sdm710-common: sepolicy: Allow system_server to read vendor camera props
...
Change-Id: I43a2404d9399a931b03e1d2c8589d0d4adb10fc3
2019-08-29 09:56:23 +00:00
LuK1337
8543dadc25
sdm710-common: Allow appdomain to get vendor_camera_prop
...
* Some apps rely on this and won't work properly if they
can't read this property. See ~ Snapchat.
Change-Id: I737e28f038941e6d18b96ff512f29dbe0ad7b7e4
2019-08-29 09:56:08 +00:00
Bruno Martins
f8f10ac731
sdm710-common: Add a custom lights HAL
...
* This overrides stock liblights and fixes LCD backlight issues.
* Also fix lights HAL denials
Change-Id: Iafa2ba2338932879b7a1dc480b50559e3328fd21
2019-08-29 09:49:47 +00:00
SamarV-121
9d212ba3f5
Init trees
2019-08-29 09:37:42 +00:00