summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* sepolicy: qva: Remove duplicate specification for qti.ims.extlineage-17.0theimpulson2019-10-281-1/+0
| | | | | | | | | *Warned on boot by SELinux 04-07 04:27:33.567 561 561 W SELinux : Multiple same specifications for qti.ims.ext. *Current Duplicate: https://github.com/LineageOS/android_device_qcom_sepolicy/blob/lineage-17.0/generic/private/service_contexts#L27 Change-Id: I81772ce4207cb6f24a6b94f6d160c1afa285dab4
* Merge tag 'LA.UM.8.1.r1-09500-sm8150.0' of ↵Michael Bestas2019-10-1895-133/+662
|\ | | | | | | | | | | | | | | | | | | | | https://source.codeaurora.org/quic/la/device/qcom/sepolicy into lineage-17.0 "LA.UM.8.1.r1-09500-sm8150.0" Conflicts: Android.mk Change-Id: I2aea726910b3b33582c5a4608bbe2fe59d5de1a4
| * Merge commit '4969e852def2de8160d7b4da28689aabaf746a48' into ↵V S Ganga VaraPrasad (VARA) Adabala2019-09-2380-132/+381
| |\ | | | | | | | | | | | | | | | sepolicy.lnx.5.9.r1-rel Change-Id: I5c8a382f178503d5d04f264aeb7109c3a74f0c8a
| | * Merge "sepolicy: update npu dcvs nodes"qctecmdr2019-09-181-1/+2
| | |\
| | | * sepolicy: update npu dcvs nodesSantosh Mardi2019-09-031-1/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Update sepolicy to give permission for split npu dcvs nodes monitoring traffic from NPU->LLCC->DDR. Change-Id: I2bc9f46d85bd3f383ac05205d859a84ca914a087
| | * | Merge "atoll: Added sepolicy rule to access qfprom node"qctecmdr2019-09-181-0/+3
| | |\ \
| | | * | atoll: Added sepolicy rule to access qfprom nodeChitti Babu Theegala2019-09-171-0/+3
| | | | | | | | | | | | | | | | | | | | Change-Id: I85f22a6737bd2ecaf5347ba14d6087833941e5c6
| | * | | Merge "Adjust sepolicy to allow connecting to thermal socket"qctecmdr2019-09-182-0/+5
| | |\ \ \
| | | * | | Adjust sepolicy to allow connecting to thermal socketKishore Sri venkata Ganesh Bolisetty2019-09-142-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | Change-Id: I9b0ac22bd7ff2e7de023bc517f4d2079a53be7a8
| | * | | | Merge "sepolicy: add sysfs_net related path entries"qctecmdr2019-09-181-0/+3
| | |\ \ \ \
| | | * | | | sepolicy: add sysfs_net related path entriesAyishwarya Narasimhan2019-09-161-0/+3
| | | |/ / / | | | | | | | | | | | | | | | | | | Change-Id: I93d461b653a90f59820c84606538d991581c4cfe
| | * | | | Merge "Sepolicy: Update the subsystem numbers."qctecmdr2019-09-181-7/+16
| | |\ \ \ \
| | | * | | | Sepolicy: Update the subsystem numbers.Keerthi Gowda Balehalli Satyanarayana2019-09-161-11/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Change-Id: I987e968d529773d4b0d98697bab13dfb18a2323b
| | | * | | | Sepolicy: Set genfs context for all subsystemsKeerthi Gowda Balehalli Satyanarayana2019-09-131-0/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ssr_setup needs permission to write RELATED to restart_level file of all subsystem to do SSR. Change-Id: I789b7db351cd6f36e08d8fb4753f23d6621672f9
| | * | | | | Merge "Sepolicy : Add dont audit for vendor_gles_data_file label"qctecmdr2019-09-182-14/+14
| | |\ \ \ \ \
| | | * | | | | Sepolicy : Add dont audit for vendor_gles_data_file labelRahul Janga2019-09-162-14/+14
| | | | |/ / / | | | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | System process cannot access vendor partition files. Change-Id: I7fd5805ac98319660c1e5f9fca3ae2137a49d0a0
| | * | | | | Merge "sepolicy: add support for limits-cdsp sepolicy context"qctecmdr2019-09-185-0/+20
| | |\ \ \ \ \
| | | * | | | | sepolicy: add support for limits-cdsp sepolicy contextManaf Meethalavalappu Pallikunhi2019-09-135-0/+20
| | | | |/ / / | | | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add limits_block_device file contexts for limits partitions and allow thermal-engine to access this partition. Add lmh-cdsp sysfs file to sysfs_thermal file context. Change-Id: I9c18c9d862f5e99ca36cb8c38acd98ac4f152ebf
| | * | | | | Merge "sepolicy-sensors : allow init daemon to set sensors_prop properties"qctecmdr2019-09-183-0/+7
| | |\ \ \ \ \
| | | * | | | | sepolicy-sensors : allow init daemon to set sensors_prop propertiesSandeep Neerudu2019-09-123-0/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Change-Id: I6b587a167538cc49c9049511f9448ec99c40b212
| | * | | | | | sepolicy: add rule for reading qfprom node.binzhang2019-09-161-0/+28
| | | |_|/ / / | | |/| | | | | | | | | | | | | | | | | | | | | | | | | Change-Id: I37e63fb286cdde6faa0f73ac4a1134ef76600701 CRs-Fixed: 2522474
| | * | | | | sepolicy: Add iuicc0 and iuicc1 devices for spdaemonAmandeep Virk2019-09-131-0/+2
| | | |/ / / | | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Define iuicc0 and iuicc1 devices so that spdaemon can open spcom channels to corresponding iuicc0 and iuicc1 applications on the Secure Processor. Change-Id: I3b343524fbb95a05f39c2a9a086815c096c4cfea
| | * | | | Merge "PreferredApps: Add iop-hal permissions for lmkd"qctecmdr2019-09-121-0/+2
| | |\ \ \ \
| | | * | | | PreferredApps: Add iop-hal permissions for lmkdBhargav Upperla2019-09-101-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This allows access to iop-hal client apis. (such as obtaining list of preferred apps at any given time) Change-Id: I7c051d87a67480b1d2f5610b029d121f34af6bb1
| | * | | | | Merge "sepolicy: add policy for qseecom hal"qctecmdr2019-09-125-0/+59
| | |\ \ \ \ \ | | | |_|/ / / | | |/| | | |
| | | * | | | sepolicy: add policy for qseecom halGaurav Kashyap2019-09-095-0/+59
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add new policy for QSEECom HIDL implementation which makes qseecom available to system processes. Change-Id: Iba0e74fcbd39c8af0aaa89d61d2ac0e5a76ac458
| | * | | | | Merge "sepolicy: allow sensor daemon to use wake-lock"qctecmdr2019-09-111-0/+2
| | |\ \ \ \ \
| | | * | | | | sepolicy: allow sensor daemon to use wake-lockJun-Hyung Kwon2019-09-101-0/+2
| | | | |/ / / | | | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | allow sscrpcd daemon to access wake-lock sysfs nodes Change-Id: I679b077480aea8d5eef9df0dd346bd65611ee000
| | * | | | | Merge "vendor_init: write permission for vendor_mpctl_prop"qctecmdr2019-09-111-0/+2
| | |\ \ \ \ \ | | | | |_|/ / | | | |/| | |
| | | * | | | vendor_init: write permission for vendor_mpctl_propChitti Babu Theegala2019-09-101-0/+2
| | | |/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | allow vendor_init to set vendor_mpctl_prop properties Change-Id: I493763d791937eeba94d860ade0325cf71897d9f
| | * | | | Merge "sepolicy : updated dpm property rules."qctecmdr2019-09-112-0/+6
| | |\ \ \ \
| | | * | | | sepolicy : updated dpm property rules.Manoj Basapathi2019-09-112-0/+6
| | | |/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | -Add rules to access dpm persist properties. CRs-Fixed: 2525295 Change-Id: I6b999f35d7af2f9969bf60ce54aee2d94d342560
| | * | | | Merge "Camera: Add permission for Post Proc service"qctecmdr2019-09-113-1/+6
| | |\ \ \ \
| | | * | | | Camera: Add permission for Post Proc serviceRama Krishna Nunna2019-09-093-1/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - New service added for Post Processor Change-Id: Ib55517449cee80dd4883a75d8ad9bfb0ed6e1ae1
| | * | | | | Merge "sepolicy: Add sepolicy rules for qvrservice."qctecmdr2019-09-111-1/+2
| | |\ \ \ \ \
| | | * | | | | sepolicy: Add sepolicy rules for qvrservice.Ashwani Jha2019-09-101-1/+2
| | | | |/ / / | | | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Sepolicy rules to give access to qvrservice external sensor nodes. Change-Id: If7ab208a626f601d429d6a370e2d2f73804a930d
| | * | | | | Merge "sepolicy: Define new policy rule to read gpu model"qctecmdr2019-09-1010-0/+22
| | |\ \ \ \ \
| | | * | | | | sepolicy: Define new policy rule to read gpu modelRahul Janga2019-09-1010-0/+22
| | | |/ / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add a new file context label for gpu_model sysfs entry. allowed read access to that entry. Addressing the following denials : type=1400 audit(9324.519:24): avc: denied { read } for comm="HwBinder:765_2" name="gpu_model" dev="sysfs" ino=44362 scontext=u:r:hal_graphics_allocator_default:s0 tcontext=u:object_r:sysfs_kgsl:s0 tclass=file permissive=0 type=1400 audit(9324.519:24): avc: denied { read } for comm="HwBinder:765_2" name="gpu_model" dev="sysfs" ino=44362 scontext=u:r:hal_graphics_allocator_default:s0 tcontext=u: object_r:sysfs_kgsl:s0 tclass=file permissive=0 type=1400 audit(9325.619:26): avc: denied { read } for comm= "BootAnimation" name="gpu_model" dev="sysfs" ino=44362 scontext=u:r:bootanim:s0 tcontext=u:object_r:sysfs_kgsl:s0 tclass=file permissive=0 type=1400 audit(1566811221.909:56): avc: denied { read } for comm="android.anim" name="gpu_model" dev="sysfs" ino=44362 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_kgsl:s0 tclass=file permissive=0 avc: denied { read } for name="gpu_model" dev="sysfs" ino=28656 scontext=u:r:location_app:s0:c74,c256,c512,c768 tcontext=u:object_r :sysfs_kgsl_gpu_model:s0 tclass=file permissive=0 avc: denied { read } for name="gpu_model" dev="sysfs" ino=28656 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r: sysfs_kgsl_gpu_model:s0 tclass=file permissive=0 Change-Id: Ice9dd15278495475615e494c35af065e7736ea93
| | * / / / / AGP: Perfhal adding permission to access QSPM and DisplayAbhimanyu Garg2019-09-101-0/+6
| | |/ / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Adding permission to access QSPM and Display HAL from perf HAL. Change-Id: I5415298d018298845aefdd9ca5a471af3a53958b
| | * | | | Merge "sepolicy: Allow qti-testscripts to be killed by lmkd"qctecmdr2019-09-091-0/+2
| | |\ \ \ \ | | | |/ / / | | |/| | |
| | | * | | sepolicy: Allow qti-testscripts to be killed by lmkdPatrick Daly2019-09-091-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | lmkd kills tasks with oom_score_adj >= 0 when the system is under memory pressure. Enhancements have been added to lmkd to support this behavior for processes started from shell as well. Change-Id: Ia28c3373d8b755f911337bb849262e5b654d5041
| | * | | | Merge "sepolicy: Add policy rule for ephemeral_app"qctecmdr2019-09-091-0/+2
| | |\ \ \ \
| | | * | | | sepolicy: Add policy rule for ephemeral_appRahul Janga2019-08-271-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add search permission for ephemeral_app context on venfor_gles_data _file label. Addressing the following denial: avc: denied { search } for name="gpu" dev="dm-0" ino=357 scontext=u:r:ephemeral_app:s0:c208,c256,c512, c768 tcontext=u:object_r:vendor_gles_data_file:s0 tclass=dir permissive=0 app=android.renderscript.cts Change-Id: I8c345fe6ea153babd6fbded79f41e4d6b75d8b90
| | * | | | | Merge "sepolicy: Add write perms to proc file system for legacy devices"qctecmdr2019-09-091-0/+3
| | |\ \ \ \ \
| | | * | | | | sepolicy: Add write perms to proc file system for legacy devicesVinay Gannevaram2019-09-091-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Provide Wi-Fi HAL read and write access to proc file system for legacy devices. Wi-Fi Hal needs access to proc file system in order to configure kernel tcp parameters for achieving higher peak throughputs. CRs-Fixed: 2520437 Change-Id: I96ef5dad8585f1426bc1c9460eec9ce02efaf6a8
| | * | | | | | Merge "sepolicy: adding vendor_persist_type attribute."qctecmdr2019-09-094-3/+11
| | |\ \ \ \ \ \ | | | |/ / / / / | | |/| | | | |
| | | * | | | | sepolicy: adding vendor_persist_type attribute.Jaihind Yadav2019-09-054-3/+11
| | | | |_|/ / | | | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | adding neverallow so that coredomain should not access persist file. Change-Id: If8ab44db78e08e347cb33239bf2544c22c362b5b
| | * | | | | Merge "sepolicy: Add policies for WFD contexts to access debug properties"qctecmdr2019-09-063-1/+5
| | |\ \ \ \ \
| | | * | | | | sepolicy: Add policies for WFD contexts to access debug propertiesIndranil2019-09-033-1/+5
| | | | |_|_|/ | | | |/| | | | | | | | | | | | | | | | | Change-Id: Ib3fbfa502ab5ce6e8a0263c3a43472e11abdb96c
| | * | | | | Merge "Sepolicy: Added rule to give binder call permission to hal_camera"qctecmdr2019-09-061-0/+28
| | |\ \ \ \ \