pix106
077a21d15e
sdm660-common: sepolicy: move system_app.te
2022-09-11 10:58:54 +02:00
pix106
5b7ba9c20b
sdm660-common: sepolicy: Address system_app sysfs_graphics denials
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-15 07:07:31 +02:00
iusmac
b0841be519
sdm660-common: sepolicy: Adress IORap usap_pool denial
...
W FinalizerDaemon: type=1400 audit(0.0:532): avc: denied { getopt } for path="/dev/socket/usap_pool_primary" scontext=u:rradios0 tcontext=u:r:zygote:s0 tclass=unix_stream_socket permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-15 06:36:18 +02:00
pix106
7f5c98e112
sdm660-common: Bring back folio daemon and userspace hall switcher
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:35 +01:00
pix106
5b91ac6f34
sdm660-common: sepolicy: cleanup sepolicy/vendor/system_app.te
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-16 20:55:38 +01:00
pix106
738dff294a
sdm660-common: sepolicy: Address many denials
...
sdm660-common: sepolicy: Address vendor_init persist_file read denial
avc: denied { read } for comm="init" name="persist" dev="mmcblk0p63" ino=47 scontext=u:r:vendor_init:s0 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0
sdm660-common: sepolicy: Address tee persist_file read denial
avc: denied { read } for comm="qseecomd" name="persist" dev="mmcblk0p63" ino=47 scontext=u:r:tee:s0 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0
sdm660-common: sepolicy: Address installd mnt_user_file denial
avc: denied { search } for comm="Binder:1018_6" name="0" dev="tmpfs" ino=5541 scontext=u:r:installd:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir permissive=0
sdm660-common: sepolicy: Address ssgtzd qipcrtr_socket denial
sdm660-common: sepolicy: Address platform_app denials
avc: denied { read } for comm="emui:screenshot" name="u:object_r:exported_audio_prop:s0" dev="tmpfs" ino=4254 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:exported_audio_prop:s0 tclass=file permissive=0 app=com.android.systemui
sdm660-common: sepolicy: Address init sysfs_graphics denial
avc: denied { read } for comm="init" name="device" dev="sysfs" ino=44569 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=lnk_file permissive=0
sdm660-common: sepolicy: Address system_app sysfs_graphics denials
avc: denied { write } for comm="settings.device" name="max_brightness" dev="sysfs" ino=44572 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=file permissive=0
avc: denied { open } for comm="settings.device" path="/sys/devices/platform/soc/800f000.qcom,spmi/spmi-0/spmi0-03/800f000.qcom,spmi:qcom,pm660l@3:qcom,leds@d000/leds/red/max_brightness" dev="sysfs" ino=44572 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=file permissive=0
sdm660-common: sepolicy: Address system_server sysfs_rtc denial
avc: denied { read } for comm="system_server" name="hctosys" dev="sysfs" ino=41512 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
sdm660-common: sepolicy: Address gmscore_app getattr denials
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/linkerconfig" dev="tmpfs" ino=3474 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:linkerconfig_file:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/persist" dev="mmcblk0p63" ino=47 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/init" dev="mmcblk0p63" ino=28 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:init_exec:s0 tclass=lnk_file permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/metadata" dev="mmcblk0p63" ino=32 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/postinstall" dev="mmcblk0p63" ino=48 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:postinstall_mnt_dir:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/vendor/firmware_mnt" dev="mmcblk0p58" ino=1 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:firmware_file:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/vendor/firmware" dev="mmcblk0p64" ino=1216 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:vendor_firmware_file:s0 tclass=dir permissive=0 app=com.google.android.gms
sdm660-common: sepolicy: Address vendor_mutualex create denial
avc: denied { create } for comm="mutualex" scontext=u:r:vendor_mutualex:s0 tcontext=u:r:vendor_mutualex:s0 tclass=qipcrtr_socket permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
OdSazib
b8c814713d
sdm660-common: DeviceSettings: Add earpiece gain
...
- Requires kernel support
Signed-off-by: OdSazib <odsazib@gmail.com>
Change-Id: If28b4dff421cbba5f17cd2ccfab02f2aa616a9f8
2021-07-22 13:21:03 +06:00
OdSazib
0a263a5716
sdm660-common: sepolicy: Update sepolicy for 4.19
2021-07-13 11:56:43 +06:00
OdSazib
478a2b33b6
sdm660-common: sepolicy: Rework sepolicy (No more neverallow)
...
- Thanks to LineageOS and our sdm660 community
Change-Id: I54c7d76260041b7c383428449e149aa35d51de9b3c
2021-05-18 05:03:51 +06:00
OdSazib
2135c18643
sdm660-common: DeviceSettings: Drop userspace hall switcher
...
* The sensor works as it is, hence not needed anymore
2021-02-03 23:05:50 +06:00
OdSazib
9a192b7de0
sdm660-common: sepolicy: Update sepolicy and cleanup
...
* Address some denials from android 11
* Fix video recording
* Sort in alphabetic order
Signed-off-by: OdSazib <odsazib@gmail.com>
2020-12-21 09:16:25 +06:00
OdSazib
9bd430ff9b
sdm660-common: XiaomiParts: Add Headphone & Mic Gain
...
* This is manually ported by me from Lavender tree on Corvus-Devices
* Thanks @StyloGey for reviewing the java code and giving me a better solution
* Original repo: https://github.com/Corvus-Devices/device_xiaomi_lavender.git
To get it working, you need these two commits in your kernel:
> c04d6d6e61
> 8e25ac3318
Signed-off-by: OdSazib <odsazib@gmail.com>
Change-Id: I1bb48ced1f23728daa2e5170647ce08a04347110
2020-10-19 11:36:06 +06:00
OdSazib
7580f5f636
sdm660-common: XiamiParts: Add FPS Info Overlay
...
* Ported from: https://github.com/Corvus-Devices/device_xiaomi_lavender.git
Signed-off-by: OdSazib <odsazib@gmail.com>
2020-10-19 11:36:06 +06:00
Dušan Uverić
3476f16be6
sdm660-common: XiaomiParts: add notification LED brightness slider
...
Signed-off-by: Dušan Uverić <dusan.uveric9@gmail.com>
Change-Id: I86851420cca27d34e36f8e385859c5be63545bba
2020-08-12 02:02:38 +06:00
Max Weffers
b0fa4e9f51
sdm660-common: sepolicy: Adress few denials
...
Change-Id: I45c7af8087a8495e4e7902d74f7811c2d40f5197
2020-08-12 02:02:38 +06:00
Max Weffers
5d39827818
sdm660: parts: Rename hall prop to folio_daemon prop
...
*needed to prevent neverallow in user builds
2020-01-04 09:37:09 +01:00
Stylogey
25dadea83b
sdm660-common: XiaomiParts: Start folio_daemon only if a prop is set
2019-12-13 16:57:53 +01:00
Max Weffers
f3b7c8bb63
sdm660: sepolicy: Start Q Bringup
2019-10-01 14:24:08 +02:00
Hexdecimal16
aefda184e2
sdm660-common: sepolicy: address vibrator denial
2019-08-20 10:39:43 +02:00
Max Weffers
fab35d3231
sdm660-common: sepolicy: Grant XiaomiParts access to thermal file
2019-08-20 10:39:43 +02:00
Max Weffers
e20f8804d6
sdm660-common: Adress denials for Hall Switch
2019-08-20 10:39:43 +02:00
SagarMakhar
409cd433a0
sdm660-common: Add sepolicy for kcal
...
Signed-off-by: bablusss <baaswanthmadhav@gmail.com>
2019-08-20 10:39:43 +02:00
GuaiYiHu
1ee97f41fc
sdm660-common: sepolicy: Clean up sepolicy
...
Change-Id: I19f90ba121ca79ea9e676d066ea857ea6ab7a385
2019-08-14 10:04:13 +02:00
GuaiYiHu
05085a02e2
sdm660: sepolicy: Address denials
...
Change-Id: I8fad5d60ca066b758c526f2027985b63662180cc
2019-08-14 10:04:13 +02:00
Dan Cashman
b1f434c446
wayne-common: Add BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIR
...
Move vendor policy to vendor and add a place for system extensions.
Also add such an extension: a labeling of the qti.ims.ext service.
Bug: 38151691
Bug: 62041272
Test: Policy binary identical before and after, except plat_service_contexts
has new service added.
Change-Id: Ie4e8527649787dcf2391b326daa80cf1c9bd9d2f
Change-Id: I1493c4c8876c4446a1de46b39942098bf49c79f8
2019-08-14 10:04:10 +02:00