| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
| |
*Warned on boot by SELinux
04-07 04:27:33.567 561 561 W SELinux : Multiple same specifications for qti.ims.ext.
*Current Duplicate: https://github.com/LineageOS/android_device_qcom_sepolicy/blob/lineage-17.0/generic/private/service_contexts#L27
Change-Id: I81772ce4207cb6f24a6b94f6d160c1afa285dab4
|
|\
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
https://source.codeaurora.org/quic/la/device/qcom/sepolicy into lineage-17.0
"LA.UM.8.1.r1-09500-sm8150.0"
Conflicts:
Android.mk
Change-Id: I2aea726910b3b33582c5a4608bbe2fe59d5de1a4
|
| |\
| | |
| | |
| | |
| | |
| | | |
sepolicy.lnx.5.9.r1-rel
Change-Id: I5c8a382f178503d5d04f264aeb7109c3a74f0c8a
|
| | |\ |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Update sepolicy to give permission for split npu dcvs nodes
monitoring traffic from NPU->LLCC->DDR.
Change-Id: I2bc9f46d85bd3f383ac05205d859a84ca914a087
|
| | |\ \ |
|
| | | | |
| | | | |
| | | | |
| | | | | |
Change-Id: I85f22a6737bd2ecaf5347ba14d6087833941e5c6
|
| | |\ \ \ |
|
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Change-Id: I9b0ac22bd7ff2e7de023bc517f4d2079a53be7a8
|
| | |\ \ \ \ |
|
| | | |/ / /
| | | | | |
| | | | | |
| | | | | | |
Change-Id: I93d461b653a90f59820c84606538d991581c4cfe
|
| | |\ \ \ \ |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Change-Id: I987e968d529773d4b0d98697bab13dfb18a2323b
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
ssr_setup needs permission to write RELATED to restart_level
file of all subsystem to do SSR.
Change-Id: I789b7db351cd6f36e08d8fb4753f23d6621672f9
|
| | |\ \ \ \ \ |
|
| | | | |/ / /
| | | |/| | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
System process cannot access vendor partition files.
Change-Id: I7fd5805ac98319660c1e5f9fca3ae2137a49d0a0
|
| | |\ \ \ \ \ |
|
| | | | |/ / /
| | | |/| | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Add limits_block_device file contexts for limits partitions
and allow thermal-engine to access this partition.
Add lmh-cdsp sysfs file to sysfs_thermal file context.
Change-Id: I9c18c9d862f5e99ca36cb8c38acd98ac4f152ebf
|
| | |\ \ \ \ \ |
|
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
Change-Id: I6b587a167538cc49c9049511f9448ec99c40b212
|
| | | |_|/ / /
| | |/| | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Change-Id: I37e63fb286cdde6faa0f73ac4a1134ef76600701
CRs-Fixed: 2522474
|
| | | |/ / /
| | |/| | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Define iuicc0 and iuicc1 devices so that spdaemon can
open spcom channels to corresponding iuicc0 and iuicc1
applications on the Secure Processor.
Change-Id: I3b343524fbb95a05f39c2a9a086815c096c4cfea
|
| | |\ \ \ \ |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
This allows access to iop-hal client apis.
(such as obtaining list of preferred apps
at any given time)
Change-Id: I7c051d87a67480b1d2f5610b029d121f34af6bb1
|
| | |\ \ \ \ \
| | | |_|/ / /
| | |/| | | | |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Add new policy for QSEECom HIDL implementation which
makes qseecom available to system processes.
Change-Id: Iba0e74fcbd39c8af0aaa89d61d2ac0e5a76ac458
|
| | |\ \ \ \ \ |
|
| | | | |/ / /
| | | |/| | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
allow sscrpcd daemon to access wake-lock sysfs nodes
Change-Id: I679b077480aea8d5eef9df0dd346bd65611ee000
|
| | |\ \ \ \ \
| | | | |_|/ /
| | | |/| | | |
|
| | | |/ / /
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
allow vendor_init to set vendor_mpctl_prop properties
Change-Id: I493763d791937eeba94d860ade0325cf71897d9f
|
| | |\ \ \ \ |
|
| | | |/ / /
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
-Add rules to access dpm persist properties.
CRs-Fixed: 2525295
Change-Id: I6b999f35d7af2f9969bf60ce54aee2d94d342560
|
| | |\ \ \ \ |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
- New service added for Post Processor
Change-Id: Ib55517449cee80dd4883a75d8ad9bfb0ed6e1ae1
|
| | |\ \ \ \ \ |
|
| | | | |/ / /
| | | |/| | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Sepolicy rules to give access to qvrservice external sensor
nodes.
Change-Id: If7ab208a626f601d429d6a370e2d2f73804a930d
|
| | |\ \ \ \ \ |
|
| | | |/ / / /
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Add a new file context label for gpu_model sysfs entry. allowed read
access to that entry.
Addressing the following denials :
type=1400 audit(9324.519:24): avc: denied { read }
for comm="HwBinder:765_2" name="gpu_model" dev="sysfs"
ino=44362 scontext=u:r:hal_graphics_allocator_default:s0
tcontext=u:object_r:sysfs_kgsl:s0 tclass=file permissive=0
type=1400 audit(9324.519:24): avc: denied { read } for
comm="HwBinder:765_2" name="gpu_model" dev="sysfs" ino=44362
scontext=u:r:hal_graphics_allocator_default:s0 tcontext=u:
object_r:sysfs_kgsl:s0 tclass=file permissive=0
type=1400 audit(9325.619:26): avc: denied { read } for comm=
"BootAnimation" name="gpu_model" dev="sysfs" ino=44362
scontext=u:r:bootanim:s0 tcontext=u:object_r:sysfs_kgsl:s0
tclass=file permissive=0
type=1400 audit(1566811221.909:56): avc: denied { read } for
comm="android.anim" name="gpu_model" dev="sysfs" ino=44362
scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_kgsl:s0
tclass=file permissive=0
avc: denied { read } for name="gpu_model" dev="sysfs" ino=28656
scontext=u:r:location_app:s0:c74,c256,c512,c768 tcontext=u:object_r
:sysfs_kgsl_gpu_model:s0 tclass=file permissive=0
avc: denied { read } for name="gpu_model" dev="sysfs" ino=28656
scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:
sysfs_kgsl_gpu_model:s0 tclass=file permissive=0
Change-Id: Ice9dd15278495475615e494c35af065e7736ea93
|
| | |/ / / /
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Adding permission to access QSPM and Display HAL from perf HAL.
Change-Id: I5415298d018298845aefdd9ca5a471af3a53958b
|
| | |\ \ \ \
| | | |/ / /
| | |/| | | |
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
lmkd kills tasks with oom_score_adj >= 0 when the system is under memory
pressure. Enhancements have been added to lmkd to support this behavior
for processes started from shell as well.
Change-Id: Ia28c3373d8b755f911337bb849262e5b654d5041
|
| | |\ \ \ \ |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Add search permission for ephemeral_app context on venfor_gles_data
_file label.
Addressing the following denial:
avc: denied { search } for name="gpu" dev="dm-0"
ino=357 scontext=u:r:ephemeral_app:s0:c208,c256,c512,
c768 tcontext=u:object_r:vendor_gles_data_file:s0
tclass=dir permissive=0 app=android.renderscript.cts
Change-Id: I8c345fe6ea153babd6fbded79f41e4d6b75d8b90
|
| | |\ \ \ \ \ |
|
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
Provide Wi-Fi HAL read and write access to proc file system for
legacy devices. Wi-Fi Hal needs access to proc file system in
order to configure kernel tcp parameters for achieving higher
peak throughputs.
CRs-Fixed: 2520437
Change-Id: I96ef5dad8585f1426bc1c9460eec9ce02efaf6a8
|
| | |\ \ \ \ \ \
| | | |/ / / / /
| | |/| | | | | |
|
| | | | |_|/ /
| | | |/| | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
adding neverallow so that coredomain should not access persist file.
Change-Id: If8ab44db78e08e347cb33239bf2544c22c362b5b
|
| | |\ \ \ \ \ |
|
| | | | |_|_|/
| | | |/| | |
| | | | | | |
| | | | | | | |
Change-Id: Ib3fbfa502ab5ce6e8a0263c3a43472e11abdb96c
|
| | |\ \ \ \ \ |
|