summaryrefslogtreecommitdiffstats
path: root/msm8960
Commit message (Collapse)AuthorAgeFilesLines
* Use set_prop() macro for property setsMichael Bestas2018-01-211-3/+1
| | | | Change-Id: Id67a05f8ed718cad5856613c2700f4ce1e404cf0
* file_contexts: Adding context to block devicesRavi Kumar Siddojigari2016-10-131-0/+4
| | | | | | | Adding context to boot, recovery, cache and frp block device CRs-fixed: 904364 Change-Id: Ia487dc4f07d5af3111c969d2e1d649abe43aac6b
* Add sepolicies for logdumpd module.padarshr2016-07-281-0/+1
| | | | | | | | This change will add selinux rules to logdumpd module. It allows logdumpd to read logd (to get logcat logs), and write to 'logdump' partition. Change-Id: I7be2cb1f663286dcb132c40d1109c28e09fda52d
* Align SELinux policies to new release restrictionsDavid Ng2016-03-071-1/+1
| | | | | | Update multiple policies for new Android release. Change-Id: I7f486c210a14efcebcb83b5d750c4abd07c178e3
* msm8960: Add thermal daemon changes,rmt storage mount points and removed ↵Venumadhav Cheryala2015-11-017-6/+128
| | | | | | | | | | | | rmt_storage Thermal daemon requires mpdecision socket to be opened Add new socket for mpdecision. Add new property files for thermal. modemtst1,modemtst2,fsg will fail to mount with SElinux. add the partitions in file_context. Change-Id: I8ef5da0dc6090d60eb91561e52a77f85ac3ab8c8
* SELINUX: Add SELINUX permissions for gpsanallu2015-10-284-0/+37
| | | | | | | | GPS HLOS driver need to open gss device in order to start PIL loading for GSS device, hence need to enabled permissions for this device Change-Id: I5cb2d8a2cf8e754e9d9f8baa750745a69a3bca7d
* msm8960: Add selinux policy for mdp_arb in file contexts.Venumadhav Cheryala2015-10-091-0/+1
| | | | | | Add mdp_arb node in file context to bootup the ADP 8064 Change-Id: I03f2318935f2bacfaaba47305cdfd06f43579123
* Adding policies to address bootup denialsBiswajit Paul2015-07-222-1/+2
| | | | | | Addressing all the boot-up denials. Change-Id: Ia5c0f44934b935852e10d459c114ba636b94ced9
* Removing create/write permission from /data for all domains.Divya Sharma2015-06-261-6/+0
| | | | Change-Id: I5a4f66a8c29770d9bc2220a9302b8d6496f40ad5
* Replacing permissions with macrosAvijit Kanti Das2015-06-262-2/+0
| | | | | | | | Replacing all the permissions with macros Allow all domians except untrusted_app to access diag_device Restrict untrusted_app to access diag_device Change-Id: Ibad902746f25a23f10840fae3c0bac65b2ff74e0
* SEAndroid: Fixing few denialsSamir Mehta2014-11-2412-0/+52
| | | | | | | | | | | | | | | | | | | | | | This fixes the below issues 1. 744304 - SELinux Surf port Enumeration issue Files changed - mdm_helper.te - rild.te - file_contexts - file.te - rmt_storage.te - device.te 2. 751137 - WIFI is not turning ON Files Changed - wpa.te - system_server.te 3. Issues related to CTS testInitDomain and boot up denials for other domains. CRs-fixed: 744304 751137 Change-Id: I2785e85592a10468a667be363e6115e27b76707f
* Merge "Sepolicy: Fix camera & surface flinger denials"Linux Build Service Account2014-11-221-0/+5
|\
| * Sepolicy: Fix camera & surface flinger denialsSamir Mehta2014-11-141-0/+5
| | | | | | | | | | | | | | | | | | | | Device node were not proper /dev/msm_camera was labelled as audio_device which is wrong and /dev/msm_rotator as well as audio_device, so changing the label to appropriate to fix the false positive denials. Change-Id: I7b3ebbcb9999d794823ee7c0d7cad330d50be02e
* | sepolicy: Update policy for secure componentsDinesh K Garg2014-11-142-2/+7
|/ | | | | | | | | | | Playready stores license under /data/data/app_ms. All TZ apps including Playready would create their own directory under /data/misc/qsee. To get test apps working with older dir structure, userdebug mode build would have permision to create directory under /data/data. Test apps based on newer targets must move to new structure. Also add policies for secureUI. Change-Id: Ibc4412ca9e8e065d54263bb46333bd223dfb553d
* seandroid: Restructuring sepolicy codebaseAvijit Kanti Das2014-08-231-0/+2
Seandroid codebase is restructured using this gerrit All the sepolicies which are common acress all the chipsets needs to be kept inside common folder. And all the other policies which are specific to target, should be kept inside the folder with the chipset name i.e, all the policies specific to 8084 should be inside apq8084 folder. Change-Id: I14734e2d3b9d6a0846a2c99e942c8da9495fa6ab