sreeshankark
|
2983479930
|
sepolicy: qti: Fix many denials
avc: denied { sys_admin } for capability=21 scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:fsverity_init:s0 tcontext=u:r:fsverity_init:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:vendor_modprobe:s0 tcontext=u:r:vendor_modprobe:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:vendor_boringssl_self_test:s0 tcontext=u:r:vendor_boringssl_self_test:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:netutils_wrapper:s0 tcontext=u:r:netutils_wrapper:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:vendor_msm_irqbalanced:s0 tcontext=u:r:vendor_msm_irqbalanced:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:art_boot:s0 tcontext=u:r:art_boot:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:otapreopt_slot:s0 tcontext=u:r:otapreopt_slot:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:remount:s0 tcontext=u:r:remount:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:update_verifier:s0 tcontext=u:r:update_verifier:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:vendor_rfs_access:s0 tcontext=u:r:vendor_rfs_access:s0 tclass=capability
avc: denied { sys_admin } for capability=21 scontext=u:r:vendor_hal_usb_qti:s0 tcontext=u:r:vendor_hal_usb_qti:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:vendor_irsc_util:s0 tcontext=u:r:vendor_irsc_util:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:vendor_hal_perf_default:s0 tcontext=u:r:vendor_hal_perf_default:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:vendor_rmt_storage:s0 tcontext=u:r:vendor_rmt_storage:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:profcollectd:s0 tcontext=u:r:profcollectd:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:adbd:s0 tcontext=u:r:adbd:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:vendor_netmgrd:s0 tcontext=u:r:vendor_netmgrd:s0 tclass=capability permissive=0
avc: denied { sys_admin } for capability=21 scontext=u:r:vendor_dpmd:s0 tcontext=u:r:vendor_dpmd:s0 tclass=capability permissive=0
|
2023-10-30 20:55:08 +05:30 |
|
Albert Tang
|
6d5818a5e3
|
sepolicy: qti: Label new display and camera props
Change-Id: I4e410a65bc181d893f5118099af03ef764ccd6d4
|
2023-02-22 01:17:25 +01:00 |
|
Omkar Chandorkar
|
2f78330e8b
|
sepolicy: qti: Allow cnss-daemon to access bdwlan.bin
Change-Id: I96375359bf4be92849a7969c4dfa13e13886ff70
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
|
2022-10-22 10:41:13 +02:00 |
|
LuK1337
|
a746fb97aa
|
sepolicy: qti: Expose vendor_persist_engineer_file
This is necessary for camera_helper_app rules.
Change-Id: I2e675f21bc600e31334f35041de2be182f788b1d
|
2022-10-11 19:57:11 +02:00 |
|
LuK1337
|
082d65f8c4
|
sepolicy: qti: Move te_macros to public
This lets us use it everywhere.
Change-Id: I9ee699cdefd5fcfd1154fa927425f987ed148aaf
|
2022-10-03 20:30:38 +02:00 |
|
Alexander Koskovich
|
eb50d7c01c
|
Add initial QTI SEPolicy for Oplus
Change-Id: Ib06cada5e7031d1f95976bf48a6a8475a835c9a4
|
2022-07-11 09:35:09 +02:00 |
|