boedhack99
641996465a
sdm660-common: sepolicy: Allow zygote to search adsprpdc file
...
Fixes:
avc: denied { search } for comm="main" name="/" dev="sde48" ino=2 scontext=u:r:zygote:s0 tcontext=u:object_r:adsprpcd_file:s0 tclass=dir permissive=0
avc: denied { search } for comm="usap64" name="/" dev="sde48" ino=2 scontext=u:r:zygote:s0 tcontext=u:object_r:adsprpcd_file:s0 tclass=dir permissive=0
Change-Id: Idd3df6ec46049d5691e298ac1d0851d7ab0bead3
Signed-off-by: Khusika Dhamar Gusti <mail@khusika.dev>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-08-25 10:04:35 +02:00
pix106
3a56beef55
sdm660-common: sepolicy: Label ro.audio.usb.period_us
...
Co-authored-by: Omar Hamad <etahamad@icloud.com>
2022-08-18 08:52:27 +02:00
pix106
998d8a03be
sdm660-common: sepolicy: address hal_bluetooth_qti diag_device chr_file denial
2022-08-08 22:52:29 +02:00
pix106
ce09f0e3af
sdm660-common: DeviceSettings: Adapt vibration control to QTI Haptics
...
* needs kernel support
2022-07-29 13:48:08 +02:00
Kevin F. Haggerty
1f7abf2f4e
sdm660-common: sepolicy: Allow system_app to read /proc/pagetypeinfo
...
avc: denied { read } for name="pagetypeinfo" dev="proc" ino=4026543033
scontext=u:r:system_app:s0 tcontext=u:object_r:proc_pagetypeinfo:s0
tclass=file permissive=0
Change-Id: I16465eb9acca9ff64a755d47f86f4ff424ebe4de
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-07-29 13:48:08 +02:00
pix106
fdf6fbbe8d
sdm660-common: sepolicy: rename 'bluetooth.te '
2022-07-29 13:48:08 +02:00
Adithya R
cff5bdbd3b
sdm660-common: sepolicy: Allow vendor_init to set ssr prop
...
E init : Do not have permissions to set 'persist.vendor.ssr.restart_level' to 'ALL_ENABLE' in property file '/vendor/build.prop': SELinux permission check failed
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-07-04 07:40:35 +02:00
pix106
ff88467668
sdm660-common: sepolicy: Address installd kill capability denial
...
11-19 18:40:50.303 14813 14813 W cp : type=1400 audit(0.0:45): avc: denied { kill } for capability=5 scontext=u:r:installd:s0 tcontext=u:r:installd:s0 tclass=capability permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-06-19 21:37:31 +02:00
pix106
99f4032d92
sdm660-common: sepolicy: Adress qti_init_shell persist_file denials
2022-06-19 21:37:26 +02:00
pix106
9f73958b59
sdm660-common: sepolicy: Address hal_audio_default persist_file denials
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-06-16 06:18:31 +02:00
pix106
8600a1d97f
sdm660-common: sepolicy: Address zygote unix_stream_socket denials
2022-06-16 06:18:31 +02:00
pix106
f8c33f55be
sdm660-common: sepolicy: allow hal_wifi_default to get persist_vendor_debug_wifi_prop props
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-06-06 17:58:45 +02:00
pix106
837f5ca200
sdm660-common: sepolicy: Address vendor_init persist_file denials
...
avc: denied { read } for comm="init" name="persist" dev="mmcblk0p13" ino=47 scontext=u:r:vendor_init:s0 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-06-06 17:52:42 +02:00
pix106
8193f9632b
Revert "sdm660-common: sepolicy: cleanup sepolicy/vendor/tee.te"
...
This reverts commit aea288de3b
.
2022-06-06 17:45:39 +02:00
Rahul Krishna
0bb3001be2
sem660-common: sepolicy: Label notification led nodes
...
* adapt to 4.19 sysfs path
Change-Id: Id4b74a3e61525810698ef0d4477856620c2a5490
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-06-06 12:41:59 +02:00
pix106
f5050df60f
sdm660-common: sepolicy: drop Mlipay sepolicy
2022-06-06 12:41:59 +02:00
Adithya R
dd6db97ea5
sdm660-common: drop IFAA/mliplay completely
...
* no one actually uses this
Signed-off-by: SparXFusion <s2234nadar@gmail.com>
Signed-off-by: faham1997 <nafidfaham08@gmail.com>
Signed-off-by: ImPrashantt <prashant33968@gmail.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-06-06 12:41:59 +02:00
Edwin Moquete
097c21d39f
sdm660-common: Update radio blobs from ginkgo
...
* Cleanup and disable ATFWD
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-15 10:25:30 +02:00
pix106
5b7ba9c20b
sdm660-common: sepolicy: Address system_app sysfs_graphics denials
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-15 07:07:31 +02:00
pix106
3b1238fc93
sdm660-common: sepolicy: Address vendor_pd_locater_dbg_prop denials
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-15 06:41:37 +02:00
pix106
89c611bb8d
sdm660-common: sepolicy: Label more camera props
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-15 06:37:16 +02:00
clarencelol
a26372805e
sdm660-common: sepolicy: Address hal_wifi_default denial
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-15 06:36:18 +02:00
iusmac
b0841be519
sdm660-common: sepolicy: Adress IORap usap_pool denial
...
W FinalizerDaemon: type=1400 audit(0.0:532): avc: denied { getopt } for path="/dev/socket/usap_pool_primary" scontext=u:rradios0 tcontext=u:r:zygote:s0 tclass=unix_stream_socket permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-15 06:36:18 +02:00
pix106
71a635149b
sdm660-common: sepolicy: address gmscore_app traced denial
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-07 18:10:19 +02:00
ChengYou Ho
523f856d9e
sdm660-common: sepolicy: Allow surfaceflinger to search hal_graphics_composer_default
...
[log]
avc: denied { search } dev="proc" scontext=u:r:surfaceflinger:s0
tcontext=u:r:hal_graphics_composer_default:s0 tclass=dir permissive=0
Bug: 154688047
Change-Id: Ia9735f2b938f57c37f741d6f0526cf29df180fcb
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-07 15:27:37 +02:00
pix106
b07ef1d515
sdm660-common: sepolicy: address hal_bluetooth_qti qipcrtr_socket denials
2022-05-07 15:27:37 +02:00
Demon Singur
81083ebf5c
sdm660-common: sepolicy: let camera hal access /data/misc files
...
Removed from system_sepolicy, but still needed by our old camera stack.
Solves the following denials.
denied { search } for pid=717 comm="CAM_AECAWB" name="camera" dev="sda17" ino=3121215 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:camera_data_file:s0 tclass=dir permissive=0
denied { search } for pid=717 comm="CAM_AECAWB" name="camera" dev="sda17" ino=3121215 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:camera_data_file:s0 tclass=dir permissive=0
Change-Id: I497bade68e6a5b2f60cd8ec90a97a81986d971af
Signed-off-by: Hadad <repo-sync@outlook.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-07 15:27:37 +02:00
pix106
7c4bba77a9
sdm660-common: sepolicy: Label more camera props
2022-05-07 15:27:37 +02:00
pix106
b802fbff4b
sdm660-common: sepolicy: fix sepolicy to use vendor_camera_prop
2022-05-06 23:52:59 +02:00
clarencelol
7c134c0715
sdm660-common: sepolicy: Address more denials
...
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-06 23:52:59 +02:00
clarencelol
ee42318baf
sdm660-common: sepolicy: Address some camera denials
...
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Co-authored-by: pix106 <sbordenave@gmail.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-06 23:52:59 +02:00
Kshitij Gupta
b6f2052cd7
sdm660-common: sepolicy: dontaudit untrusted_app to open ashmem_device
...
- Fixes scroll lag in many apps, such as Twitter:
W RenderThread: type=1400 audit(0.0:12371): avc: denied { open } for path=/dev/ashmem dev=tmpfs ino=10848 scontext=u:r:untrusted_app:s0:c123,c256,c512,c768 tcontext=u:object_r:ashmem_device:s0 tclass=chr_file permissive=0 app=com.twitter.android
- Apps are no longer allowed open access to /dev/ashmem, unless they
target API level < Q.
(8b12ff5f21
)
Change-Id: I6405786fea05891642d8437acafcd8c891d75912
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-05-06 23:52:59 +02:00
clarencelol
68b51b59ee
sdm660-common: Nuke powerstats HAL
...
* Powerstats are so buggy lmao, it keeps error android.hardware.power.stats@1.0-service.xiaomi_sdm660: Failed to getEnergyData
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:35 +01:00
pix106
ba258d8957
sdm660-common: clover: sepolicy: change dt2w path for 4.19
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:35 +01:00
Max Weffers
bfd5bb16ae
sdm660-common: clover: sepolicy: Label dt2w nodes
...
Co-authored-by: pix106 <sbordenave@gmail.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:35 +01:00
pix106
347bc3181e
sdm660-common: clover: sepolicy: Adress no fingerprint denials
...
avc: denied { mounton } for comm="init" path="/vendor/etc/permissions/android.hardware.fingerprint.xml" dev="mmcblk0p14" ino=513 scontext=u:r:init:s0 tcontext=u:object_r:vendor_configs_file:s0 tclass=file permissive=0
avc: denied { mounton } for comm="init" path="/vendor/framework/com.fingerprints.extension.jar" dev="mmcblk0p14" ino=651 scontext=u:r:init:s0 tcontext=u:object_r:vendor_framework_file:s0 tclass=file permissive=0
avc: denied { mounton } for comm="init" path="/vendor/etc/permissions/com.fingerprints.extension.xml" dev="mmcblk0p14" ino=546 scontext=u:r:init:s0 tcontext=u:object_r:vendor_configs_file:s0 tclass=file permissive=0
avc: denied { mounton } for comm="init" path="/vendor/app/FingerprintExtensionService/FingerprintExtensionService.apk" dev="mmcblk0p14" ino=20 scontext=u:r:init:s0 tcontext=u:object_r:vendor_app_file:s0 tclass=file permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:35 +01:00
pix106
8d5ad52d17
sdm660-common: clover: sepolicy: Address noril denials
...
avc: denied { mounton } for comm="init" path="/system/app/CarrierDefaultApp/CarrierDefaultApp.apk" dev="mmcblk0p13" ino=118 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
avc: denied { mounton } for comm="init" path="/system/product/app/messaging/messaging.apk" dev="mmcblk0p13" ino=2818 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
avc: denied { mounton } for comm="init" path="/system/product/priv-app/Dialer/Dialer.apk" dev="mmcblk0p13" ino=3324 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
avc: denied { mounton } for comm="init" path="/system/system_ext/priv-app/CarrierConfig/CarrierConfig.apk" dev="mmcblk0p13" ino=3648 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
avc: denied { mounton } for comm="init" path="/system/priv-app/CallLogBackup/CallLogBackup.apk" dev="mmcblk0p13" ino=2549 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
avc: denied { mounton } for comm="init" path="/system/priv-app/CellBroadcastLegacyApp/CellBroadcastLegacyApp.apk" dev="mmcblk0p13" ino=2555 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
avc: denied { mounton } for comm="init" path="/system/system_ext/priv-app/EmergencyInfo/EmergencyInfo.apk" dev="mmcblk0p13" ino=3666 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:35 +01:00
pix106
7f5c98e112
sdm660-common: Bring back folio daemon and userspace hall switcher
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:35 +01:00
clarencelol
dabe131677
sdm660-common: sepolicy: Recover back some wakeup nodes
...
* Got deleted in bfa5307238
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
clarencelol
dab63c3e87
sdm660-common: sepolicy: Fix neverallows
...
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
pix106
03af5cd52d
sdm660-common: sepolicy: Address hal_camera_default bootanim_system_prop denials
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
pix106
3a94fe2218
sdm660-common: sepolicy: Address hal_camera_default persist_camera_prop
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
Nolen Johnson
6738906339
sdm660-common: sepolicy: Allow hal_camera_default to set camera properties
...
Change-Id: I69f4d1039c3ccae4d21aaddb35d09ae575bd3979
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
pix106
f2daf4bd2f
sdm660-common: sepolicy: Clean camera props
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
clarencelol
4ad2b0e7e1
sdm660-common: sepolicy: Address pixel powerstats rules
...
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
pix106
e22941eedf
sdm660-common: sepolicy: Drop neverallows
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
clarencelol
e63aed4ff1
sdm660-common: sepolicy: Goodbye neverallows
...
* Drop some neverallows along the way
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
Adithya R
fbd91b6f05
sdm660-common: init: Add MIUI camera flag from stock
...
* Prebuilt libcameraservice sets this prop to 1 if the running camera
app is MIUI/ANX camera, and 0 otherwise
* This is needed to unlock all functions of MIUI/ANX camera in
the camera HAL, such as pro mode controls, beauty modes, portrait
depth slider and much more, and mainly fixes excess noise in
camera shots taken with our ultrawide lens
* We won't keep the prop enabled by default because as long as its
enabled, gcam/mods crash immediately on launch and we don't want
that. So let's retain the stock behaviour instead.
[clarencelol]: * avc: denied { set } for property=sys.camera.miui.apk pid=1008 uid=1047 gid=1005 scontext=u:object_r:system_prop:s0 tclass=property_service permissive=0
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
clarencelol
5514002bef
sdm660-common: Cleanup sepolicy
...
* Fix neverallows
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00
clarencelol
1426027286
sdm660-common: sepolicy: unknown type exported_audio_prop
...
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-02-21 06:52:18 +01:00