Charlotte D
edadce3968
change xiaomi -> lenovo
2018-11-18 18:01:38 +00:00
Isaac Chen
d5fe8be114
msm8937-common: sepolicy: Address more denials
...
* Also arrange sepolicies
2018-07-09 00:00:47 +08:00
Bruno Martins
848ee28b5a
msm8937-common: sepolicy: Allow rild to set radio props
2018-07-09 00:00:47 +08:00
Rashed Abdel-Tawab
b93a294b74
msm8937-common: Build QTI HIDL power 1.0 HAL
2018-07-09 00:00:45 +08:00
Bruno Martins
d761cec8e3
msm8937-common: sepolicy: Add debug rules for rmt_storage
...
Change-Id: Ie0c94ac657127b1653afbbb82b06789dfe34032d
2018-07-09 00:00:21 +08:00
Martijn Coenen
a85558ea52
msm8937-common: Add selinux/private/service_contexts.
...
This makes sure that the remaining binder services
for radio end up in plat_service_contexts.
That in turn allows us to enforce that servicemanager
will only serve services from plat_service_contexts
on FULL_TREBLE devices.
Bug: 36866029
Test: boot, verify radio services still work
Change-Id: Ib67b3a03e5599484c5c4fb27a0f323a37dd51636
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:21 +08:00
Isaac Chen
5478c86bac
msm8937-common: sepolicy: Address keylayout denial
...
05-30 07:55:45.151 987 987 W InputReader: type=1400 audit(0.0:10): avc: denied { read } for name="gf3208.idc" dev="mmcblk0p48" ino=1329 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=0
05-30 07:55:45.151 987 987 W InputReader: type=1400 audit(0.0:11): avc: denied { read } for name="gf3208.kl" dev="mmcblk0p48" ino=1333 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=0
05-30 07:55:45.199 987 987 W InputReader: type=1400 audit(0.0:12): avc: denied { read } for name="gpio-keys.kl" dev="mmcblk0p48" ino=1334 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=0
05-30 07:55:45.299 987 987 W InputReader: type=1400 audit(0.0:13): avc: denied { read } for name="ft5x06_720p.kl" dev="mmcblk0p48" ino=1332 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_file:s0 tclass=file permissive=0
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:21 +08:00
Isaac Chen
57f366a761
msm8937-common: sepolicy: Address cas HAL denial
...
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:21 +08:00
Isaac Chen
1a6dae3d38
msm8937-common: sepolicy: Address camera daemon denial
...
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:21 +08:00
Isaac Chen
724868de36
msm8937-common: sepolicy: Organize for treble compatibility
...
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:20 +08:00
Isaac Chen
3e93f804b6
msm8937-common: sepolicy: Initial O denial
...
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:20 +08:00
TheScarastic
265678c804
msm8937-common: Add custom biometrics
2018-06-29 00:02:43 +08:00
Darshan Manjrekar
70f1a47192
land: Address denials
2017-12-27 14:41:55 +05:30
Michael Bestas
9d7267d0be
land: Remove obsolete sepolicy rules
...
* They are not required after commits:
land: Update ril-daemon service
Grant netmgrd proper unix perms
Change-Id: I721a9935764f5003cf597095bbe3493dc8a6b0d1
2017-12-09 14:02:28 +05:30
Bruno Martins
f4645e088c
land: Grant rmt_storage proper unix perms
...
Do not grant DAC override permission which would allow this daemon
unix permissions to everything.
avc: denied { dac_override } for pid=2664 comm="rmt_storage" capability=1 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=0
Change-Id: Ib02b4aedab479f5ad8aca3a2100b5c489397002a
2017-12-09 14:02:28 +05:30
Prateek Chaubey
92c8318178
land: Address Bluetooth Denial
2017-12-09 13:58:06 +05:30
Prateek Chaubey
5320556c8e
land: address some denials
2017-08-07 10:40:05 +02:00
Prateek Chaubey
7069b2a85e
land: Fix Fingerprint
2017-08-07 10:38:52 +02:00
karthick111
4518d68489
land: Initial sepolicy
2017-08-07 10:35:24 +02:00