Kevin F. Haggerty
e98eb2f72a
msm8953-common: sepolicy: Allow system_app to read /proc/pagetypeinfo
...
avc: denied { read } for name="pagetypeinfo" dev="proc" ino=4026543033
scontext=u:r:system_app:s0 tcontext=u:object_r:proc_pagetypeinfo:s0
tclass=file permissive=0
Change-Id: I16465eb9acca9ff64a755d47f86f4ff424ebe4de
2021-09-19 20:01:11 -03:00
Jarl-Penguin
40768c7e46
msm8953-common: sepolicy: Address fingerprint HAL denials
...
Signed-off-by: Jarl-Penguin <jarlpenguin@outlook.com >
Change-Id: I5decdc962117320dc432800f7a5b82fe66b45aee
2021-09-19 20:01:11 -03:00
Sonal Singh
d8e72e0b21
msm8953-common: sepolicy: Add sepolicy for battery health
...
Change-Id: I2092c760a81328ec4c93b4b47520213b65f0fa6e
2021-09-19 15:59:53 -03:00
Jeferson
7dc147b5d3
msm8953-common: Solve some init denials
...
Change-Id: Id3cb44112e0219dd9d003ab1bf5acbf5762f095c
2021-09-19 15:59:53 -03:00
Timi
c5eea592fa
msm8953-common: sepolicy: silence fsck denials
...
* Don't audit dac_override, dac_read_search denials for fsck
Change-Id: I3883861b2bff61834718239522ec28f09b30e6c5
2021-09-19 15:59:15 -03:00
orgesified
84e29f9c37
msm8953-common: sepolicy: address kernel denial
...
avc: denied { create } for scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=socket permissive=0
Change-Id: I045d4f0c43814f607747ee938d82d147683fc805
2021-09-19 15:58:57 -03:00
Jeferson
18f0b938bd
msm8953-common: Adress fsck_untrusted denials
...
[244457.303036] type=1400 audit(1624810115.905: 76046): avc: denied {read } for comm="fsck.exfat" uid=0 name="start" dev="sysfs" ino=41979
scontext=u: r:fsck_untrusted:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [244457.303320] type=1400 audit(1624810115.908:76047):
avc: denied { open } for comm="fsck.exfat" uid=0 path="/sys/devices/soc/c084000.sdhci/mmc_host/mmc1/mmc1:59b4/block/mmcblk1/mmcblk1p1/start" dev="sysfs" ino=41979 scontext=u:r:fsck_untrusted:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
[244457.303418] type=1400 audit(1624810115.908: 76048): avc: denied { getattr } for comm="fsck.exfat" uid=0 path="/sys/devices/soc/c084000.sdhci/mmc_host/mmc1/mmc1:59b4/block/mmcblk1/mmcblk1p1/start" dev="sysfs" ino=41979 scontext=u:r:fsck_untrusted:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
Change-Id: I73a58794c00693c6a259f631a14638c7b18454d5
2021-09-19 15:58:35 -03:00
Aayush Gupta
8c1d3f5af3
msm8953-common: Allow thermal-engine r_dir_file perms for sysfs*
...
[ 8.618801] type=1400 audit(69459649.586:21): avc: denied { read } for comm="thermal-engine" name="kgsl" dev="sysfs" ino=29020 scontext=u:r:thermal-engine:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0
12-18 04:50:58.101 648 648 I auditd : type=1400 audit(0.0:32): avc: denied { search } for uid=0 comm="thermal-engine" name="qpnp-vadc-10" dev="sysfs" ino=14445 scontext=u:r:thermal-engine:s0 tcontext=u:object_r:sysfs_vadc_dev:s0 tclass=dir permissive=0
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com >
Change-Id: I09c8dbaf80ecb7a6a511cc83b934dcb3128b0e76
2021-06-20 19:11:01 -03:00
chingtzunglin
31c47c9320
msm8953-common: set selabel for metadata for vold to acess
2021-06-18 18:25:08 -03:00
Nolen Johnson
7278919e58
msm8953-common: Append vendor prefix to several properties
...
* Needed after `LA.UM.9.2.r1-02700-SDMxx0.0` merge.
* Also remove duplicated vendor_fm_prop, as its now in
qcom/sepolicy.
Change-Id: Iea4145ae677b463f9370843d4db5c16d8862a6fe
2021-05-15 17:11:27 -03:00
Michael Bestas
e9d8ad8894
msm8953-common: sepolicy: Add vendor prefix to qcom_ims_prop
...
* qcom_ims_prop -> vendor_qcom_ims_prop
* Fixes build after device/qcom/sepolicy-legacy-um update
Change-Id: I8d1b736deaaf54ce012cf3e42a4c927d43326631
2021-05-15 17:11:27 -03:00
jeangraff30
6167b5e618
msm8953-common: Address laser denials
...
based https://github.com/LineageOS/android_device_motorola_griffin
2021-03-11 23:48:36 -03:00
Joshua Blanchard
e94b9e5b3e
msm8953-common: sepolicy: Add rules for Moto ADSPD HAL
...
Change-Id: Ib3760a1dcece4428e5ed8adc9cae1ecc3e0f01b0
2021-03-10 22:47:48 -03:00
jeangraff30
591f5d58d9
msm8953-common: address denials
2021-03-05 15:28:17 +00:00
Soul Trace
b3153b9950
msm8953-common: sepolicy: address WLAN tethering denials
...
Fix reboot after 120 seconds on WLAN tethering enable.
Fix "target device is connected but no internet" issue.
Move ipacm-related sections from rootdir/etc/init.qcom.rc to data-ipa-cfg-mgr/ipacm/src/ipacm.rc
Make ipacm.rc look like vendor/qcom/opensource/data-ipa-cfg-mgr/ipacm/src/ipacm.rc but add
writepid /dev/cpuset/system-background/tasks to the service definition.
This let ipacm start after data decryption (it got killed on data decrypt and not respawned,
because was disabled).
This fixes following errors:
04-01 14:35:57.525 591 17586 W libc : Unable to set property "ctl.interface_start" to "android.hardware.tetheroffload.config@1.0::IOffloadConfig/default": error code: 0x20
04-01 14:35:57.526 2665 3190 I ServiceManagement: getService: Trying again for android.hardware.tetheroffload.config@1.0::IOffloadConfig/default...
04-01 14:35:57.526 591 17586 E hwservicemanager: Failed to set property for starting android.hardware.tetheroffload.config@1.0::IOffloadConfig/default
Set wifi.active.interface context to exported_wifi_prop and allow hal_wifi_default to set it.
I don't know why context definition was not embedded to the contexts file, but now it is.
This fixes following errors:
[163263.846522] selinux: avc: denied { set } for property=wifi.active.interface pid=2733 uid=1010 gid=1010 scontext=u:r:hal_wifi_default:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=0
Signed-off-by: TheSync <repo-sync@outlook.com >
2021-03-05 15:28:17 +00:00
Markdarkness
c418c64651
msm8953-common: sepolicy: address hwservicemanager denials
2021-03-05 15:28:17 +00:00
Kevin F. Haggerty
580c7b4bae
msm8953-common: sepolicy: Quiet priv_app opening sysfs_android_usb files
...
* Reading these is disallowed globally, no need to see logspam of
open attempts
Change-Id: I4c0094097d39456c65720cbdfb949d14439ce5f4
2021-03-05 15:28:17 +00:00
Pranav
62dc805d7b
msm8953-common: sepolicy: Don't audit hal_audio_default
2021-03-05 15:28:17 +00:00
Joshua Blanchard
3746c2f486
msm8953-common: sepolicy: Add missing rules for persist_audio_file
...
* Rules for persist_audio_file have been removed for legacy devices.
* Instead of labeling "/mnt/vendor/persist/audio", which is the default
path for audio calibration, label "/mnt/vendor/persist/factory/audio"
as this is where Moto devices store these calibration files anyway.
Change-Id: Ic27eb7f713e145a795cfec9de3c684fe9e2fc985
2021-03-05 15:28:17 +00:00
vivekachooz
e8ab5eac6f
msm8953-common: sepolicy: Allow camera hal to access ubwc property
...
vendor.video.disable.ubwc prop fails to read without this.
Change-Id: Ic0bd8e5b4a56a7e7776d7c57d4260aae4d957f64
2021-03-05 15:28:16 +00:00
LuK1337
780672cea2
msm8953-common: sepolicy: Label /persist
...
Change-Id: I471c0d1fedb51eabc32b54ab35a9823db8efd034
2021-02-03 13:42:09 -03:00
Joshua Blanchard
afa5c28987
msm8953-common: persist_camera_prop -> vendor_persist_camera_prop
...
* Add vendor prefix to persist_camera_prop.
Change-Id: I228b4d1b1c7f0354b31c08ceb08202235f825acb
2021-02-03 13:42:09 -03:00
Jorge Lucas
d9313a152a
msm8953-common: Add DTV Support
...
- Add hidl to manifest
- Fix Sepolicy
- Add proper permissions for /dev/isdbt
2021-01-31 18:24:25 -03:00
Jorge Lucas
2478e765f5
msm8953-common: camera: Adress denials
2021-01-31 18:24:25 -03:00
Jorge Lucas
baeea07419
msm8953-common: Camera: Allow persist_camera_prop for cameraserver
2021-01-31 18:24:25 -03:00
jeangraff30
5d7dcdfc69
msm8953: kang light hal from moto msm8937 tree
2021-01-31 18:24:06 -03:00
Vachounet
d92733b312
msm8953-common: Add homebutton perms and address denials
...
Signed-off-by: trpsl <trpsl755@gmail.com >
2021-01-03 21:39:10 -03:00
Joshua Blanchard
20bb266be8
msm8953-common: Give audio hal access to prox and spkr calibration data
...
* Speaker (and receiver) calibration files are located on persist
partition. Grant audio permission to find and read these files.
* Moto's libspeakerbundle needs access to the proximity sensor,
so allow it to find sensorservice so MotSpeakerHelperProximity
can instantiate SensorManager.
Change-Id: I888a424fc1c42dea0f130adfc74e02e47927e2b8
2021-01-03 21:39:10 -03:00
Joshua Blanchard
42e6a9e1f8
msm8953-common: sepolicy: Allow camera to read and set calibration data
...
Change-Id: I9a3d852fd2ac4501f1b38c2660fef366e1f26e30
2021-01-03 21:39:10 -03:00
Aayush Gupta
a791807e4d
msm8953-common: Address denials regarding to access sysfs_kgsl
...
[ 45.239076] type=1400 audit(1601312101.298:24): avc: denied { search } for comm="DefaultPool5" name="kgsl-3d0" dev="sysfs" ino=29220 scontext=u:r:untrusted_app:s0:c151,c256,c512,c768 tcontext=u:object_r:sysfs_kgsl:s0 tclass=dir permissive=0 app=com.google.android.apps.maps
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com >
Change-Id: I80c5de2d9687b3127922d5bc55c26461a797d0f9
2020-11-22 18:17:13 +01:00
jhenrique09
b71e1a0a79
msm8953-common: Fix portrait mode on moto cam
...
* Moto cam checks for hwrev prop to allow portrait mode
2020-11-19 20:50:32 +01:00
jeangraff30
c4b73d6758
msm8953-common: Update sepolicy
2020-11-16 03:49:48 +01:00
Erfan Abdi
6f64594d42
msm8953-common: Move egis_input sepolicy to genfs
2020-11-15 21:16:05 +01:00
trpsl
675d96b639
msm8953-common: Address Dolby denials
...
Co-authored-by: Rohan Hasabe <rohanhasabe8@gmail.com >
2020-11-15 21:16:05 +01:00
jeangraff30
d68a31c631
msm8953-common: sepolicy: Address light hal
2020-11-15 21:16:05 +01:00
jeangraff30
7535f9d5ae
msm8953-common: Import sepolicy from sdm660 tree
2020-11-15 21:16:02 +01:00
jeangraff30
1220e128cd
msm8953-common: Initial Common tree
...
* based on motorola sdm632-common
Co-authored-by: Jorg3Lucas <jorgelucas@pixelexperience.org >
2020-11-09 18:04:50 +01:00