Francescodario Cuzzocrea
c749d17efe
msm8226-common: Configure the p2p_search_delay to 100 msec
2019-10-16 12:32:04 +02:00
Glen Kuhne
4810c16e5b
msm8226-common: Add p2p_no_group_iface=1 to p2p_supplicant_overlay
...
Configures wpa_supplicant to use p2p0 mgmt iface instead of dynamically
created p2p-p2p0-XYZ virtual interfaces for P2P group.
Bug: 65524423
Test: CtsVerifier WifiDirect
Test: Manual verification
Change-Id: I70582f114ab69684424aac41fbeb78fa7cc04847
Merged-In: Id9add59aa122adb7f39c80252061a8f5d3cc55cd
2019-10-16 12:32:04 +02:00
Roshan Pius
e05da8434e
msm8226-common: wpa_supplicant(hidl): Add support for starting HAL lazily
...
Bug: 72394251
Test: Able to start supplicant from framework using
ISupplicant.getService()
Change-Id: I19b8434e7241b9028e7dc86316ec9d5512affcca
2019-10-16 12:32:04 +02:00
Roshan Pius
53358075ee
msm8226-common: Don't start supplicant with interfaces
...
Framework will now add interface to supplicant (via HIDL) when it
needs to control an interface, so don't specify them in the startup
params.
Bug: 69426063
Test: Device boots up and able to connect to wifi.
Change-Id: I817d28093f8b982e3806c212babd888c0f5eb7c0
2019-10-16 12:32:04 +02:00
Jeff Vander Stoep
f8d387d38b
msm8226-common: wpa_supplicant: Move control sockets to /data/vendor
...
Treble compliance.
Bug: 70228425
Bug: 70393317
Test: complete wifi test in b/70393317
Test: verify sockets exist in /data/vendor/wifi/wpa/sockets
Change-Id: I0bfc3a351419f0a03498e79664949f353369bf1b
2019-10-16 12:32:04 +02:00
Jeff Vander Stoep
49f4349027
msm8226-common: wifi_supplicant: deprecate entropy.bin
...
Wpa_supplicant's random pool is not necessary on Android. Randomness
is already provided by the entropymixer service which ensures
sufficient entropy is maintained across reboots. Commit b410eb1913
'Initialize /dev/urandom earlier in boot' seeds /dev/urandom with
that entropy before either wpa_supplicant or hostapd are run.
Bug: 34980020
Test: Use wifi and wifi tethering on 8974 targets
Change-Id: Iaa2a8a42e4e3fd941c5be0f8fa691245cdb429e9
2019-10-16 12:32:04 +02:00
Jeff Johnson
bd514559fd
msm8226-common: wlan: Update supplicant services for new calling sequence
...
Change-Id: I9a2b5b2c27c8fd0e7b13e78cf02985c1c19db1b6
2019-10-16 12:32:04 +02:00
Michael Bestas
187c23c689
msm8226-common: Move wpa_supplicant overlays to vendor
...
Change-Id: I42e8994585615c15fb069166a79b86488e8acb25
2019-10-16 12:32:04 +02:00
Nolen Johnson
be0042899e
msm8226-common: Set TARGET_RECOVERY_DEVICE_DIRS
...
* In the previous commit, I failed to note that TWRP
also needs the AIO property set, so append local path
to TARGET_RECOVERY_DEVICE_DIRS to make both Lineage
Recovery and TWRP happy.
Change-Id: Ie1d8dfa252dad02787544a73e9d4ee1d44d30dbf
2019-10-16 12:32:04 +02:00
Nolen Johnson
dd6fece29d
msm8226-common: Set sys.usb.ffs.aio_compat in recovery as well
...
Change-Id: I36d76f74ceae3029f49c3cb564cd876bbb6b5b81
2019-10-16 12:32:04 +02:00
jrior001
3400a74693
msm8226-common: Disable network scan via TelephonyManager
...
Change-Id: I07ac2eee478d6edbc266447ef3209403a14285f1
2019-10-16 12:32:04 +02:00
LuK1337
89e473a368
msm8226-common: hal_lineage_livedisplay_default -> hal_lineage_livedisplay_sysfs
...
Change-Id: If8954290c41913b7453a1cba4d67f7a63d08d2dd
2019-10-16 12:32:04 +02:00
maxwen
a3f6581489
msm8226-common: Update overlay to hide sRGB toggle
...
* Now expected as an array in Settings package
Change-Id: I92a56abb0fc1379e4482d1889d04d8db6a14ea2b
2019-10-16 12:32:04 +02:00
dianlujitao
35700b0003
msm8226-common: Hide sRGB toggle in developer options
...
* This is only available on Nexus/Pixel devices and we don't even
support such color space.
Change-Id: I8343e4986d7dd8413bd8d36dfad0309a4c08026e
2019-10-16 12:32:04 +02:00
Kevin F. Haggerty
1e8bba9944
msm8226-common: Build Samsung LiveDisplay service
...
Change-Id: I74d38aa0df3179bb00b942135e8ff055aa8a5658
2019-10-16 12:32:04 +02:00
Paul Keith
805d4f1785
msm8226-common: Build vendor.lineage.touch HAL from hardware/samsung
...
Change-Id: I6eca1e9875cb5793a3a45c6e77bc201946ebd897
2019-10-16 12:32:04 +02:00
Bruno Martins
549cb6f5fb
msm8226-common: Enable B-services aging propagation
...
Change-Id: I4ac0525933bb421f7d025c5e4c6a1de0f083c46e
2019-10-16 12:32:04 +02:00
Michael Bestas
d87fe4a395
msm8226-common: add health HAL
...
Change-Id: Ib934ab27f49bd27ba0285db505d2b5fa198522ef
2019-10-16 12:32:04 +02:00
elektroschmock
483811c628
msm8226-common: manifest: Add OMX media HAL
...
Change-Id: Iebb280cc1a3f456662a1f4a0a8e95d2a3099b397
2019-10-16 12:32:04 +02:00
Paras Nagda
1c70bf2baf
msm8226-common: manifest: Add CAS HAL
...
Change-Id: I3d26b3c8c57425d2ee596f8efecaa2722b39551c
2019-10-16 12:32:04 +02:00
Ethan Chen
718accfed1
msm8226-common: Drop custom display flags
...
* TARGET_USES_OVERLAY and USE_OPENGL_RENDERER are largely deprecated
* Don't set triple buffering, it introduces latency
* Don't use custom VSYNC offsets
Change-Id: If2892c83726c3558a96b28a8404f49982ebb9ba0
[haggertk: Only triple offset aspect of this change is relevant to
this device family]
2019-10-16 12:31:17 +02:00
Kevin F. Haggerty
417dc63a46
msm8226-common: sepolicy: Adapt to global sepolicy merges
...
* Several items merged globally caused duplicate definition of paths
that were previously labeled here.
This reverts commit 27afbf1dc6
.
This reverts commit 7fb5a8c6cb
.
This partially reverts commit bb196ad94b
.
This partially reverts commit c39a735ab5
.
Change-Id: I901e5aa78058e1a465f110cde31fb7d76eaf3d51
2019-10-16 12:30:58 +02:00
Bruno Martins
d80cb2505f
msm8226-common: Allow media UID process to access CameraServiceProxy
...
* This fixes the following error on camera-in-mediaserver devices:
E CameraService_proxy: Calling UID: 1013 doesn't match expected camera service UID!
Change-Id: I185e34e8983b286436bfc0fe36cfdf260ef78170
2019-10-16 12:30:58 +02:00
Kevin F. Haggerty
84ae63a3cb
msm8226-common: sepolicy: Eliminate qemu_hw_mainkeys_prop entries
...
* Specific definition of this is dropped from qcom/sepolicy-legacy
Change-Id: I429abf7dddd2de4443349366b932149f30b87206
2019-10-16 12:30:58 +02:00
Kevin F. Haggerty
a5d5045f45
msm8226-common: sepolicy: Clean up
...
* Group policy statements better
* Nuke unneeded allows
Change-Id: Ibc1fd4debe8c95005a6dd54e1428d6365248bd80
2019-10-16 12:30:55 +02:00
Kevin F. Haggerty
8c265a347e
msm8226-common: sepolicy: Resolve init denials
...
* avc: denied { write } for name="enable_adaptive_lmk" dev="sysfs"
ino=6724 scontext=u:r:init:s0
tcontext=u:object_r:sysfs_lowmemorykiller:s0 tclass=file permissive=1
* avc: denied { open } for name="enable_adaptive_lmk" dev="sysfs"
ino=6724 scontext=u:r:init:s0
tcontext=u:object_r:sysfs_lowmemorykiller:s0 tclass=file
permissive=1
* avc: denied { setattr } for name="firmware_path" dev="sysfs"
ino=6423 scontext=u:r:init:s0
tcontext=u:object_r:sysfs_wifi_writeable:s0 tclass=file
permissive=1
* avc: denied { write } for name="l2" dev="sysfs" ino=29063
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_power:s0
tclass=file permissive=1
* avc: denied { open } for name="l2" dev="sysfs" ino=29063
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_power:s0
tclass=file permissive=1
* avc: denied { write } for name="enabled" dev="sysfs" ino=29716
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_thermal:s0
tclass=file permissive=1
* avc: denied { write } for name="online" dev="sysfs" ino=5871
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_devices_system_cpu:s0
tclass=file permissive=1
* avc: denied { write } for name="boost_ms" dev="sysfs" ino=6652
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_cpu_boost:s0
tclass=file permissive=1
* avc: denied { open } for name="boost_ms" dev="sysfs" ino=6652
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_cpu_boost:s0
tclass=file permissive=1
* avc: denied { setattr } for name="min_pwrlevel" dev="sysfs"
ino=19546 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_kgsl:s0
tclass=file permissive=0
* avc: denied { setattr } for name="enabled" dev="sysfs" ino=23417
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_hal_pwr:s0
tclass=file permissive=1
* avc: denied { setattr } for name="rear_camfw" dev="sysfs" ino=24404
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_camera:s0
tclass=file permissive=1
* avc: denied { check_context } for scontext=u:r:init:s0
tcontext=u:object_r:kernel:s0 tclass=security permissive=0
Change-Id: Id7f78abedea2209f84527b1b83259574d06a0900
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
db9de76b54
msm8226-common: sepolicy: Label sysfs_usb_storage_gadget, resolve denials
...
* avc: denied { setattr } for name="file" dev="sysfs" ino=23591
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_usb_storage_gadget:s0
tclass=file permissive=1
Change-Id: Ia96e3634cbe1a85bb7da3f24ecfa3fbaaa55baad
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
7bdcdf733e
msm8226-common: sepolicy: Label sysfs_usb_otg, resolve denials
...
* avc: denied { setattr } for name="booster" dev="sysfs" ino=23129
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_usb_otg:s0
tclass=file permissive=1
Change-Id: Iffb33bd7647026107473fb63e82d942ad027f9f9
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
2a303c3bbc
msm8226-common: sepolicy: Broaden sysfs_bluetooth_writable, resolve denials
...
Change-Id: Iff3645e36ece2126f3697bb0389394415be16529
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
8a2f7414d2
msm8226-common: sepolicy: Label sysfs_msmuart_file, resolve denials
...
* avc: denied { setattr } for name="clock" dev="sysfs" ino=18914
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msmuart_file:s0
tclass=file permissive=1
Change-Id: Iaf5fe6791344dcf419242599eb6c9272c61cd707
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
d290aaa200
msm8226-common: sepolicy: Label sysfs_mmc_host, resolve denials
...
* avc: denied { write } for name="control" dev="sysfs" ino=25383
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_mmc_host:s0
tclass=file permissive=1
* avc: denied { open } for name="control" dev="sysfs" ino=25383
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_mmc_host:s0
tclass=file permissive=1
Change-Id: I876d025db9cf1fe67faeccca830ffd53dbf92904
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
695a6ac727
msm8226-common: sepolicy: Label sysfs_socinfo, resolve denials
...
* avc: denied { setattr } for name="soc_iddq" dev="sysfs" ino=5543
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_socinfo:s0 tclass=file
permissive=0
Change-Id: Ife248a9cccea19b09b931525606cf4c34344fd9f
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
7973254314
msm8226-common: sepolicy: Label additional sysfs_io_sched_tuneable node
...
Change-Id: I2b416123c7d925443df20f518cb2a0bd02935229
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
3be1e28b19
msm8226-common: sepolicy: Resolve additional sensors HAL denials
...
* avc: denied { search } for name="sec-thermistor" dev="sysfs"
ino=5485 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=dir permissive=0
Change-Id: I4d77e87b2662bca081cc5b934161347fed6a157d
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
c75b3abe8d
msm8226-common: sepolicy: Label sysfs_sensors, resolve denials
...
* avc: denied { read } for name="ssp_sensor" dev="sysfs" ino=27809
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sensors:s0
tclass=lnk_file permissive=1
* avc: denied { setattr } for name="temperature" dev="sysfs" ino=10861
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sensors:s0
tclass=file permissive=0
Change-Id: I2e4a436704ed019af153da880d7becbde4b0ab11
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
5bc5db2267
msm8226-common: sepolicy: Label sysfs_msm_perf, resolve denials
...
* avc: denied { write } for name="suspend_enabled" dev="sysfs"
ino=10567 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_perf:s0
tclass=file permissive=1
* avc: denied { open } for name="suspend_enabled" dev="sysfs"
ino=10567 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_msm_perf:s0
tclass=file permissive=1
Change-Id: I23d69f0442d126b2a6ac3aaeda5032856a4483f2
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
3d54b00d4e
msm8226-common: sepolicy: Label sysfs_disk_stat nodes
...
* avc: denied { read } for name="stat" dev="sysfs" ino=26461
scontext=u:r:storaged:s0 tcontext=u:object_r:sysfs:s0 tclass=file
permissive=1
Change-Id: I4b7258d069801f542da8c7f5ca8242ea32f12bca
2019-10-16 12:30:30 +02:00
Kevin F. Haggerty
ee243b6985
msm8226-common: sepolicy: Label our custom sensors service
...
Change-Id: I331abeac851cd92b32990ff797dff506dd67e503
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
bb636ae3f5
msm8226-common: sepolicy: Resolve hal_sensors_default denials
...
* avc: denied { read } for name="name" dev="sysfs" ino=26468i
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs:s0
tclass=file permissive=0
* avc: denied { read } for name="iio:device1" dev="tmpfs" ino=7276
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:iio_device:s0 tclass=chr_file permissive=0
* avc: denied { open } for name="iio:device0" dev="tmpfs" ino=7275
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:iio_device:s0 tclass=chr_file permissive=0
* avc: denied { search } for name="/" dev="mmcblk0p12" ino=2
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:efs_file:s0
tclass=dir permissive=0
* avc: denied { read } for name="gyro_cal_data" dev="mmcblk0p12"
ino=41 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:efs_file:s0 tclass=file permissive=0
* avc: denied { read } for name="shtc1_sensor" dev="tmpfs" ino=8378
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sensors_device:s0 tclass=chr_file permissive=1
* avc: denied { open } for name="shtc1_sensor" dev="tmpfs" ino=8378
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sensors_device:s0 tclass=chr_file permissive=1
Change-Id: Iad7e41e5e250eb1511d5838bd42b2b07843d220b
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
8d6fcd7628
msm8226-common: sepolicy: Label sysfs_sec_* types, resolve denials
...
* Rename sysfs_sec type to sysfs_sec_key
* Add additional sysfs_sec_* types as appropriate
* avc: denied { read } for name="temp_adc" dev="sysfs" ino=10538
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=file permissive=1
* avc: denied { open } for name="temp_adc" dev="sysfs" ino=10538
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=file permissive=1
* avc: denied { write } for name="ir_send" dev="sysfs" ino=21339
scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_sec_ir:s0
tclass=file permissive=1
* avc: denied { write } for name="led_blink" dev="sysfs" ino=25722
scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs_sec_led:s0
tclass=file permissive=1
* avc: denied { write } for name="brightness" dev="sysfs" ino=23467
scontext=u:r:system_server:s0
tcontext=u:object_r:sysfs_sec_touchkey:s0 tclass=file permissive=1
* avc: denied { setattr } for name="ir_send" dev="sysfs" ino=21339
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_ir:s0 tclass=file
permissive=1
* avc: denied { setattr } for name="hall_irq_ctrl" dev="sysfs"
ino=29565 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_key:s0
tclass=file permissive=1
* avc: denied { setattr } for name="epen_firm_update" dev="sysfs"
ino=23585 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_epen:s0
tclass=file permissive=1
* avc: denied { setattr } for name="cmd" dev="sysfs" ino=23756
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_tsp:s0
tclass=file permissive=1
* avc: denied { write } for name="wakeup_keys" dev="sysfs" ino=29568
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_key:s0
tclass=file permissive=1
* avc: denied { open } for name="wakeup_keys" dev="sysfs" ino=29568
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_key:s0
tclass=file permissive=1
* avc: denied { read } for name="input" dev="sysfs" ino=24012
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_tsp:s0
tclass=lnk_file permissive=0
* avc: denied { setattr } for name="waketime" dev="sysfs" ino=29035
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_bamdmux:s0
tclass=file permissive=0
* avc: denied { setattr } for name="led_r" dev="sysfs" ino=25719
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_led:s0
tclass=file permissive=0
* avc: denied { setattr } for name="usb_sel" dev="sysfs" ino=28162
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_switch:s0
tclass=file permissive=0
* avc: denied { setattr } for name="brightness" dev="sysfs" ino=23468
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_sec_touchkey:s0
tclass=file permissive=0
* avc: denied { setattr } for name="temperature" dev="sysfs"
ino=10538 scontext=u:r:init:s0
tcontext=u:object_r:sysfs_sec_thermistor:s0 tclass=file
permissive=0
* avc: denied { setattr } for name="barcode_send" dev="sysfs"
ino=19231 scontext=u:r:init:s0
tcontext=u:object_r:sysfs_sec_barcode_emul:s0 tclass=file
permissive=0
Change-Id: I66b6d2aab875a2706f2730be9755e8d9805ffb6e
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
e03bb93d67
msm8226-common: sepolicy: Label sysfs_leds, resolve denials
...
* avc: denied { search } for name="leds" dev="sysfs" ino=7437
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=1
* avc: denied { setattr } for name="led_r" dev="sysfs" ino=25718
scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file
permissive=1
Change-Id: I8840e28b3aa72e60d5c15cad66f043a36a15c771
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
be05387f8f
msm8226-common: sepolicy: Label sysfs_batteryinfo, resolve denials
...
* avc: denied { setattr } for name="siop_level" dev="sysfs" ino=29912
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_batteryinfo:s0
tclass=file permissive=1
* avc: denied { search } for name="battery.95" dev="sysfs" ino=3264
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
* avc: denied { read } for name="batt_temp_adc" dev="sysfs" ino=28739
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
* avc: denied { open } for name="batt_temp_adc" dev="sysfs" ino=28739
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=file permissive=1
Change-Id: Ie3098da96eeed27a9403e3c311fe011c1f359561
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
e38fc5cd87
msm8226-common: sepolicy: Label sysfs_input, resolve denials
...
* avc: denied { read write } for name="poll_delay" dev="sysfs"
ino=27687 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_input:s0
tclass=file permissive=1
* avc: denied { open } for name="poll_delay" dev="sysfs" ino=27687
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_input:s0 tclass=file
permissive=1
* avc: denied { search } for name="input" dev="sysfs" ino=13030
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_input:s0 tclass=dir permissive=0
* avc: denied { read } for name="input6" dev="sysfs" ino=26725
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_input:s0 tclass=dir permissive=0
* avc: denied { read } for name="device" dev="sysfs" ino=26717
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_input:s0 tclass=lnk_file permissive=0
* avc: denied { read write } for name="poll_delay" dev="sysfs"
ino=26946 scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_input:s0 tclass=file permissive=0
Change-Id: Id46a02a44e773b99ff61f9a8ff18394c74c80f90
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
88813355e5
msm8226-common: sepolicy: Label sysfs_iio, resolve denials
...
* avc: denied { read } for name="devices" dev="sysfs" ino=7783
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_iio:s0 tclass=dir permissive=0
* avc: denied { open } for name="devices" dev="sysfs" ino=7783
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_iio:s0 tclass=dir permissive=0
* avc: denied { write } for name="length" dev="sysfs" ino=26482
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs_iio:s0
tclass=file permissive=0
* avc: denied { read } for name="iio:device1" dev="sysfs" ino=26489
scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:sysfs_iio:s0
tclass=lnk_file permissive=0
* avc: denied { read } for name="iio:device0" dev="sysfs" ino=26350
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_iio:s0
tclass=lnk_file permissive=1
* avc: denied { setattr } for name="length" dev="sysfs" ino=26343
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_iio:s0 tclass=file
permissive=1
Change-Id: If9b3e9efe4f7c6eec3faf973e0b7aebd96d76ef3
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
204b419f28
msm8226-common: sepolicy: More sysfs_graphics, resolve denials
...
* avc: denied { setattr } for name="brightness" dev="sysfs" ino=12913
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_graphics:s0
tclass=file permissive=1
* avc: denied { read } for name="window_type" dev="sysfs" ino=12710
scontext=u:r:init:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=file
permissive=1
* avc: denied { read } for name="window_type" dev="sysfs" ino=12710
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_graphics:s0 tclass=file permissive=0
* avc: denied { search } for name="panel" dev="sysfs" ino=12358
scontext=u:r:hal_sensors_default:s0
tcontext=u:object_r:sysfs_graphics:s0 tclass=dir permissive=0
Change-Id: I8597d7be6217816924a8fee854341e4f2fb18562
2019-10-12 10:26:47 +02:00
Francescodario Cuzzocrea
0c1635f670
msm8226-common: remove init.tefor P bringup
2019-10-12 10:26:47 +02:00
Shaikh Shadul
d030676d7b
msm8226-common: sensors: Tune binder buffer for sensors HIDL
...
Setting custom binder buffer size for sensors HIDL service.
Change-Id: I83ebdc77ed7aec0e25a975097358440681ca5f11
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
7e00ac6293
msm8226-common: sepolicy: Sort sysfs block of file_contexts sanely
...
Change-Id: I421f1c97db0f5c2919d99293d75d3f6e09f52340
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
2b530f0d8a
msm8226-common: sepolicy: Drop our mediaextractor additions
...
* LineageOS/android_system_sepolicy@2a67349574 covers this for us
Change-Id: I55a92c1580d4943f72f17ba8991fcbb5c8167c8d
2019-10-12 10:26:47 +02:00
Kevin F. Haggerty
5a72893d64
msm8226-common: Set TARGET_NEEDS_NETD_DIRECT_CONNECT_RULE to true
...
* Due to "specialness" in our RIL library, ConnectivityService
doesn't seem to appropriately add the relevant directly-
connected routes, meaning that IPv4 mobile data is inoperable
due to lack of a default route. Let's reenable the legacy netd
behavior to get our connectivity back.
Change-Id: I59f8476ab36db0fb79856f74346e62e0dd4abae0
2019-10-12 10:26:47 +02:00