Age | Commit message (Collapse) | Author |
|
Change-Id: I6f81ed23a6edf702effb01c393a845770fff1f11
|
|
Allow bootanim prop access for hal_graphics_composer_default.
Change-Id: Ic6d5c2b12a2cc03dfc9b2348b76a7ce9e7dfc2b9
|
|
QSSI sepolicy grants permissions for untrusted_app to be a client
of the qesd HAL. It is not allowed for all_untrusted_apps to find
protected hwservice, hence don't protect the hwservice.
Change-Id: I7fdfb16c0aa22da9793ac25856ffd45e197456fa
|
|
Change-Id: Ie9818d52e997de166f8f9229369d2e29f78d8e95
|
|
Change-Id: I6a2841822144af3bd0a16866f94556c16426575b
|
|
Change-Id: I3240841a18c887b85b20027abb5cfaef00bdaf46
|
|
Add selinux rules for drm clearkey services. Refine and extend drm
widevine service rules for future updates.
Change-Id: I4cada93265a8e469352a6ecba3c7b676b665c2d3
|
|
W libc : Access denied finding property "wifi.interface"
W cnd : type=1400 audit(0.0:22): avc: denied { read } for name="u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=26257 scontext=u:r:vendor_cnd:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=0
Change-Id: I6cf8ad4133ca3013d844d4ef3b2701de22f408b0
|
|
Change-Id: I93335f35c94250bc62defb36552ac5db2efbb98b
|
|
Change-Id: Ia6ef04a1e719806ff2ecfcfa56a41c89a311ff7b
|
|
Change-Id: I60686d0066a1aa099a7dffbca091c9a7e2bac7f8
|
|
Provide Wi-Fi HAL read and write access to proc file system.
Wi-Fi Hal needs access to proc file system in order to configure
kernel tcp parameters for achieving higher peak throughputs.
CRs-Fixed: 2491783
Change-Id: I36613f74aaa4adfc33e68442befcdb78af5edd5c
|
|
[ 9.346918] type=1400 audit(71454275.960:7): avc: denied { create } for comm="init" name="dpmwrapper" scontext=u:r:init:s0 tcontext=u:object_r:socket_device:s0 tclass=sock_file permissive=0
Ref:
[0]: https://source.codeaurora.org/quic/la/device/qcom/sepolicy/commit/?h=LA.UM.9.2.1.r1-03800-sdm660.0&id=79488292273efa5ab89bc405a5f6ae4dec5d011d
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I262b06821c0625978b3685d0666bd2cf599fbf98
|
|
* As seen on non-legacy
Change-Id: I54ede545836306d3a8d2181bb60e0667988228de
|
|
Resolve following read access for sysfs nodes
1 - devices/platform/soc/soc:qcom,cam-req-mgr/video4linux/video0.
2 - devices/platform/cam_sync/video4linux/video1.
CRs-Fixed: 2423140
Change-Id: I51d4edf3bbfcd05d6f52b2b4df6372a24df322a2
|
|
Similarly to non-legacy.
Change-Id: I00d4d5ebe7162ea2d60c47e893579cc4e741c393
|
|
Change-Id: I92bfabbb00be52aa7cebd489e9a79e1ab2176d73
|
|
Fixes:
warning: BOARD_PLAT_PRIVATE_SEPOLICY_DIR has been deprecated.
Use SYSTEM_EXT_PRIVATE_SEPOLICY_DIRS instead.
warning: BOARD_PLAT_PUBLIC_SEPOLICY_DIR has been deprecated.
Use SYSTEM_EXT_PUBLIC_SEPOLICY_DIRS instead.
Change-Id: I752602079de8ff4c5370fe3ec861b8746838d878
|
|
- BOARD_SEPOLICY_DIRS is deprecated and gives compile-time
errors when used in unison with a device using BOARD_VENDOR_SEPOLICY_DIRS
Ref:
[0]: https://github.com/LineageOS/android_system_sepolicy/commit/ec3ac470a98342c13c1fec8d46433c73b08531be
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Icefb062cc8cdef532b4310684d9a66afe97e49c4
|
|
Change-Id: I918f7a3eeff334cd4b5363e91aec41cadcbbd390
|
|
Change-Id: I18f6508e763b02ad1758dd549ad1325fda7eff5f
Signed-off-by: urevanth <quic_urevanth@quicinc.com>
|
|
cnss_cli use unix socket to communicate with cnss-daemon.
cnss-daemon need create unix socket server file when init.
Change-Id: Ibbe1eb1f418da17c0155a0663f6a94d8777ef80f
|
|
|
|
Change-Id: Ic4f02565d4f1076b6c08272c8a816fac4f2895ad
|
|
|
|
The AOSP code already defines and gives permission
to this label. Further this is renames in latest code
to ffs_config_prop so referring the label here gives
compilation error.
Removing it since already the permissions are there.
Change-Id: I14154df9cf269e3524c80a539c97bcb77dd97fc0
Signed-off-by: Udipto Goswami <quic_ugoswami@quicinc.com>
|
|
Add sepolicy rules to allow secure element HAL to
read NFC properties.
Change-Id: Icf2436b523d9854ad31ac56cb75b75b200b0bb2b
|
|
Change-Id: Ie41b7cc0bb91d5d92480fafa9d44bcbe8b855343
|
|
|
|
Change-Id: I0f93db13f2b2bff64cd54b324bce5d320b2430b9
|
|
Change-Id: I2a6ed3fcf04b0014aba6fe4b54dff6372d63c9f2
|
|
|
|
|
|
Adding sepolicy rule to fix avc denials while accessing
read_ahead_kb node for vold.
Change-Id: I078b00b07b31a813a2151595e24332cfa2361901
Signed-off-by: Sarthak Garg <sartgarg@codeaurora.org>
|
|
Change-Id: Ie33815a9fbf1b4b8ee7b7acdfdeae896805fae1c
|
|
* avc: denied { call } for comm="ims_rtp_daemon"
* scontext=u:r:vendor_hal_imsrtp:s0 tcontext=u:r:
* vtloopback_app:s0:c165,c256,c512,c768 tclass=binder permissive=0
Change-Id: Iec4288d24a3ca9559fa213eb7ffff75d67c777dd
|
|
Added donot audit rule for dac override warning for perf serivce.
Change-Id: I975452c82c2fdd28fef1015e5eafca23ccfb7016
|
|
Issue: AVC denials seen for hal_camera_default while accessing
vendor_xdsp_service.
Fix: Addeddontaudit for hal_camera_defaiult to access
vendor_xdsp_service.
CRs-Fixed: 3027156
Change-Id: I915389a2073e4774c00a1129d6ddf371681138c3
|
|
This commit gives hostapd permissions rw_dir_perms to open, search, write,
add_name, remove_name in wifi data files.
Change-Id: Ifc39cd245da035512af89733b55f57e9ce608f00
CRs-Fixed: 3008412
|
|
* [Kodiak]avc: denied { read } for name="u:object_r:
* vendor_ims_prop:s0" dev="tmpfs" ino=30786 scontext=u:r:
* platform_app:s0:c512,c768 tcontext=u:object_r:vendor_ims_prop:
* s0 tclass=file permissive=0 app=com.qti.vtloopback
Change-Id: I8b2658ff7fe8d18812aa45c9daa3a2906f7e942f
|
|
|
|
Allow mediatranscoder to access hal_allocator.
Change-Id: I62511ef6c48a4276845edebb04298d23ab927739
|
|
Add a change to fix the avc denials for the wakeup source
used for pmic nodes.
Change-Id: Id836c0890e197d9d32b69fb0b3d9f3ca960a65f1
|
|
mlid and ssgtzd need to be able to talk to service
apps as well as other vendor services.
Change-Id: Iaee709672f4dd83c428a047be17bb0c087a50215
|
|
|
|
Change-Id: I28726ad2f01b16c8534c27872d82abb598b80942
|
|
|
|
Vendor qti-media service is not making use of any of the properties
under default-prop, so suppress this access denial using dontaudit.
Change-Id: I860d2e534dcfbf05be733706b780fd4784c3467d
|
|
Path correction for sepolicy rules
Change-Id: I12efeaa94fd5216626a33bc6bd3f05d0f6ed56d2
|
|
Modify NNHAL sepolicy rules to read adsp properties.
Change-Id: I53ffab1e039a5a07fa58de53baddf6c962a92565
|