Commit graph

5 commits

Author SHA1 Message Date
OdSazib
5351cc35f9
sdm66-common: sepolicy: Fix labeling sysfs nodes for K4.19
- Address more denials and label some new nodes

Signed-off-by: OdSazib <odsazib@gmail.com>
2021-07-16 15:56:07 +06:00
OdSazib
478a2b33b6
sdm660-common: sepolicy: Rework sepolicy (No more neverallow)
- Thanks to LineageOS and our sdm660 community

Change-Id: I54c7d76260041b7c383428449e149aa35d51de9b3c
2021-05-18 05:03:51 +06:00
Aayush Gupta
8c68646954
sdm660-common: Allow qti_init_shell to start & stop ril-daemon
[    9.057234] type=1107 audit(71454275.676:6): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=ctl.stop$ril-daemon pid=1122 uid=0 gid=0 scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=property_service permissive=0'

Ref:
[0]: https://source.codeaurora.org/quic/la/device/qcom/sepolicy/commit/?h=LA.UM.9.2.1.r1-03800-sdm660.0&id=79488292273efa5ab89bc405a5f6ae4dec5d011d

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I5f062f8c6be56380b40a9428358c5f6c93dd71c8
2020-12-13 18:38:07 +06:00
Subhajeet Muhuri
4c7cba649a
sdm660-common: sepolicy: Dontaudit few qti_init_shell neverallows 2019-08-14 10:04:14 +02:00
Dan Cashman
b1f434c446
wayne-common: Add BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIR
Move vendor policy to vendor and add a place for system extensions.
Also add such an extension: a labeling of the qti.ims.ext service.

Bug: 38151691
Bug: 62041272
Test: Policy binary identical before and after, except plat_service_contexts
has new service added.
Change-Id: Ie4e8527649787dcf2391b326daa80cf1c9bd9d2f

Change-Id: I1493c4c8876c4446a1de46b39942098bf49c79f8
2019-08-14 10:04:10 +02:00
Renamed from sepolicy/qti_init_shell.te (Browse further)