| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
| |
CRs-Fixed: 2221880
Change-Id: I124d152c5b309dc708fd8a27905f55bd3c91259a
|
|
|
|
| |
Change-Id: Icd550bb4eb696ca3ca1fb8932b869fa25187831c
|
|
|
|
|
|
|
| |
While turning on SAP, conf file is created in /data/vendor/wifi/hostapd
. selinux permission is added to create files under the same path.
CRs-Fixed: 2195908
Change-Id: I20c7f806f5597e8e9d88118feaf340f54b286569
|
|
|
|
|
|
|
|
|
|
| |
system/sepolicy already defines wpa_data_file, Use that
instead of wifi_vendor_data_file
Note: wifi_vendor_data_file cannot be removed due to the
dependencies.This shall be taken subsequently.
Change-Id: I916724ed60162b2b32247f07cca9c1a69363c9fb
CRs-Fixed: 2195448
|
|
|
|
|
|
|
| |
allow sysfs_boot_adsp write permissions to
/sys/kernel/boot_adsp/boot node.
Change-Id: I370c6be54b0cad987fb679b66c3d8f8552c3c99a
|
|
|
|
|
|
| |
* These are not legacy platforms yet
Change-Id: I4709408d9817570f4832c5ad2a97efa74fa65127
|
|
|
|
|
|
|
| |
* Since this is not hosted in a vendor service anymore, this needs to be
listed as a regular service, not a hwservice.
Change-Id: Icc72d329f534e942c5873e6f7963c2b1072aee2d
|
|
|
|
|
|
|
|
|
|
| |
With this commit added sepolicy rule, so that
android.hardware.wifi@1.0-service support to write
on tombstones path.
i.e /data/vendor/tombstones/wifi
Change-Id: I53633c5291f27041f23726e3d8426eab1adcd664
CRs-Fixed: 2241490
|
|
|
|
| |
Change-Id: Ic06cb6002d816c477cf8eac5cb87fb882911193f
|
|
|
|
|
|
|
|
|
| |
* This commit was not proper and causes cnd denials.
We will be picking the upstream commits instead.
This reverts commit ac81139c2811a30219ebbf27d4788b7fd4b462c5.
Change-Id: Id5ddcae41a01c1d05d5c9985dcb2082a3e602f42
|
|
|
|
| |
Change-Id: I66e08c3bdbd595a69b89e30e1442c04a85be7ccc
|
|
|
|
|
|
| |
* This matches non-legacy QC sepolicies
Change-Id: If12de9ac506f6f4260c789d0bbe6bed83d064a40
|
|
|
|
|
|
|
|
| |
* This used to be defined in device/lineage/sepolicy, but had to be
removed in order not to conflict with device/qcom/sepolicy.
Add definition here as well.
Change-Id: Id915bea27263b224d1b25021dc189efc3a07a0dd
|
|
|
|
| |
Change-Id: Ia38a0bd984e9c53fdaae15a8d58281dfe901b168
|
|
|
|
| |
Change-Id: I35fe10f6b7adc5be7bbb611c2b908721d9b3bb5d
|
| |
|
|
|
|
|
|
| |
* Already defined now by system policies
Change-Id: I1cbdcc8ebd918bef7c5a4e22a57adbfa75878be0
|
|
|
|
| |
Change-Id: I91648b2b07340b9a061c04246f68d8dbdef0e008
|
|
|
|
|
|
| |
hal_vehicle is now in common AOSP global policy
Change-Id: I3f70868b3880caa0d5b88d1127aff2257f5dd967
|
|
|
|
|
|
|
| |
* Remove rules that cause build breakages
Change-Id: Iaefab105ed52178f3c7d356aa2782147df8d2fbf
Signed-off-by: Marco Zanin (B--B) <mrczn.bb@gmail.com>
|
|
|
|
| |
Change-Id: I7fe1bfd28117dc61354e65cf4c3ea2ff9880ae0a
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Addresses the following errors caught in a log:
E ANDR-PERF-TARGET-INIT: Inside InitializeTarget
W vendor.qti.hard: type=1400 audit(0.0:12): avc: denied { write } for name="property_service" dev="tmpfs" ino=14909 scontext=u:r:hal_perf_default:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
W vendor.qti.hard: type=1400 audit(0.0:13): avc: denied { write } for name="property_service" dev="tmpfs" ino=14909 scontext=u:r:hal_perf_default:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
W libc : Unable to set property "ro.min_freq_0" to "384000": connection failed; errno=13 (Permission denied)
W libc : Unable to set property "ro.min_freq_4" to "384000": connection failed; errno=13 (Permission denied)
Change-Id: I6de28c23fdb816faad0eaf45e8f4d793865d6eea
|
|
|
|
| |
Change-Id: I925ef41fa713e829b932cc502a6820ad9f8e3037
|
|
|
|
|
|
|
|
|
| |
* Turns out we need to use init.qcom.bt.sh instead of
running hci_qcomm_init directly, as that causes BT
to take longer than 10 seconds to enable on first time
it's enabled after boot
Change-Id: I0ee4a645d3828429b2deb0464f78090f49c9eb7b
|
|
|
|
|
|
| |
* Codeaurora strikes again with a wrong regex
Change-Id: Id1be8ab8c264f05d3c1ddd3c622495a220fd074f
|
|
|
|
|
|
|
| |
* Label additional nodes and add it as common rule, since it doesn't
apply only to msm8953.
Change-Id: I42b329d782795feed776b09d5c12d89be9bac868
|
|
|
|
|
|
| |
Do u even regex, br0?
Change-Id: If907448d394f967268c9f72051bec5a47220087b
|
|
|
|
| |
Change-Id: Ibff5485fcaebc181d9aa17fcea38cf4ae3146193
|
|
|
|
| |
Change-Id: I35e8bbffb44626c95f3d59adb4d97bc07da043a4
|
|
|
|
|
|
| |
* Partial cherry-pick of commit 3aaeeceb270dc6c8af8dd9a95fa8b9e33097ff50
Change-Id: Ifa500ca57dc71831074a39fb5b05246c12cd0d4c
|
|
|
|
| |
Change-Id: I3a9d988f75f64b45d1abb952b771a7e9bb30cac8
|
|
|
|
| |
Change-Id: Ibef3bd2704b8edbefb90085c7c246ab832646300
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Certain perfd optimizations depend on this ability.
Change-Id: Ib994cf879db73c02d8c79c8b7e6a8a855496c6be
sepolicy: perfd: fix signull permission
Commit 1a20a7fbc2 ("sepolicy: perf: allow checking for existence of
other processes (signull)") was implemented incorrectly. It granted
perfd only permissions to signull itself, not other processes. Fix
this, granting signull permissions to all processes by using the
'domain' attribute.
Change-Id: I5ea7c543ba5854550bb020382b43368d75244f32
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Qcom sepolicy only covers bt_qca6174, while our devices
uses bt_qca6174.91.
Label using a regex to make sure every case is covered.
This fixes the following denial.
avc: denied { write } for comm="hci_thread" name="state" dev="sysfs" ino=17919 scontext=u:r:bluetooth:s0 tcontext=u:object_r:sysfs:s0 tclass=file
And should also fix bluetooth.
Change-Id: Ice453dee8750e6c9ca6b1fe6cb20709c39958c7e
|
|
|
|
|
|
| |
* Label as sysfs_graphics like non-legacy sysfs
Change-Id: Iadccb98b26cc704e84ff4c85ee3eadc2fcc95f0c
|
|
|
|
| |
Change-Id: Ia282fc2cb3e70b407a5c7a0b045a4cb68dc80188
|
|
|
|
| |
Change-Id: If5cd58caad0c4f084764f21ab1fbb5c5b11be371
|
|
|
|
| |
Change-Id: I3d3c1c2d0c04f8dc77037cbf47ce7b1452fe8c33
|
|
|
|
|
|
|
| |
msmpeafowl: sdm670
msmskunk: sdm845
Change-Id: I1c71c14af53123cc7852cd7948ee66575323d239
|
|
|
|
| |
Change-Id: I44dcf57ec36e3ecd0674d84f8fe1f8a98ee71d28
|
|
|
|
| |
Change-Id: I9b5f18936b3b7dc362b81750b24af41810ea847e
|
|
|
|
| |
Change-Id: I11b65ea2a853b7b71652ef8bc4447bc554a8393a
|
|
|
|
| |
Change-Id: Id29dbfe25a979ff8257ba5f4f6fe94ec2c2b471c
|
|
|
|
| |
Change-Id: Ibf48ea3a61e3ff08feb2e24287dee39d2ebe3889
|
|
|
|
| |
Change-Id: I9a65a68b0de351cd072a4aa4b66f78a7b082d354
|
|
|
|
| |
Change-Id: I1696d40518a6193a335e4930e5b576b7dda86f0d
|
|
|
|
| |
Change-Id: If569ce1cb560a19123b1b7bfae5e10e653825f35
|
|
|
|
|
|
| |
* msm8916 perfd wants to write to "max_pwrlevel"
Change-Id: I86e9f7ac7cc82f3d8605d215aa39171b385ecc61
|
|
|
|
|
|
| |
* We applied this for mpdecision, perfd needs it too
Change-Id: Ib43f7575cefdeddcc02a3a6240c6f38aef18300d
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
hal_gnss_default uses data services API's to use data related
functionality for SUPL/E911 call. This was internally using
internet datagram sockets for IOCTL calls to retrieve interface
name leading to this denial. Since HAL is not supposed to have
this permission, use netlink route sockets instead to achieve
this functionality.
Fixes the following denial -
audit(0.0:94): avc: denied { create } for comm="Loc_hal_worker"
scontext=u:r:hal_gnss_default:s0 tcontext=u:r:hal_gnss_default:s0
tclass=udp_socket permissive=0
BUG:37730994
Change-Id: If358032ffcf870747d6bca4fa50fb45214d70f8c
|