| Commit message (Collapse) | Author | Age |
|
|
|
|
|
|
|
|
| |
* Solves the following denial.
avc: denied { set } for property=persist.net.doxlat pid=837 uid=1001 gid=1001 scontext=u:r:netmgrd:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1
* We need this again after having switched back to Oreo RIL in 4d1a575a1900797720c957c40898a1bdebecfe55
Change-Id: I30db8b7aa6017dfdea1c874f69b7b8b90bcc8800
|
|
|
|
|
|
|
| |
* Turns out we don't actually need to use this as /proc/mac_wifi and mac_bt can turn into normal mac address values just with hex dumping
* Remove bt_mac_prop as we can just set the mac path in vendor_prop.mk
Change-Id: I23665cdd5d39d5e090694cff5a63f55ecb9ea334
|
|
|
|
| |
Change-Id: Ibc6eed2018314e79f3f18749cedd9852c82a8a66
|
|
|
|
|
|
| |
This reverts commit 6b5e38c35a519487048cb66ce65086d4673e53bd.
Change-Id: I811a7c04d35e27d74057f310c05aab008d434aae
|
|
|
|
|
|
| |
* It would get disabled anyway when bootloader is unlocked, but this way makes safetynet pass even when unlocked
Change-Id: I2dfe641bf60e0409f290b7b31492df00568c9916
|
|
|
|
|
|
|
|
|
|
| |
* genfs_context cleanup after b5b41d341dd744c40d3908550daaafcee6fe7b4b in which it has randomly been imported from Marlin
* Slightly cleanup indentation
* Remove a lot of domains which were being used in genfs_context as most of it is already labelled differently in qcom common sepolicy and already addressed
* Remove violators where not needed
* Remove some old properties we're not using anymore
Change-Id: Ic72853dfaf71ba3f0596e75d1bdd5b5c93cd70be
|
|
|
|
|
|
|
|
|
| |
* Bin extracted from ZUI
* Add init.wlan.sh to check if the mac address in wlan_mac.bin is already correct, if not correct it
* Run both the bins on boot completed as wcg can't run earlier
* Label both the bins and address their denials
Change-Id: I7a8001465ec9c3d69bd228efa57dddfdd8e3c6f3
|
|
|
|
|
|
|
|
| |
* QCOM has moved to `vendor.post_boot.parsed` but our
blobs still use `sys.post_boot.parsed`.
Change-Id: I881f459aa10f1c55f8a7c3de87f36d42e000f47e
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
|
| |
Change-Id: Ib2e08d365f088e07d30df2c5dfc72660ca839d21
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
|
|
|
|
| |
Change-Id: I3e3668d77a7b65fd3572248ba98c980537ad1e25
|
|
|
|
|
|
|
| |
Solves the following denial.
denied { set } for property=persist.net.doxlat pid=837 uid=1001 gid=1001 scontext=u:r:netmgrd:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1
Change-Id: I30db8b7aa6017dfdea1c874f69b7b8b90bcc8800
|
|
|
|
|
|
|
|
|
|
| |
CAF renamed this prop to vendor.sys.listeners.registered, but our blobs
still use the old one, making enforcing boot to stall. Label it.
selinux: avc: denied { set } for property=sys.listeners.registered pid=568 uid=1000 gid=1000 scontext=u:r:tee:s0 tcontext=u:object_r:system_prop:s0 tclass=property_service permissive=0
init: Unable to set property 'sys.listeners.registered' to 'true' from uid:1000 gid:1000 pid:568: SELinux permission check failed
Change-Id: I43407d89df024b557dd4c06a4ac9d0ec8f37581e
|
|
|
|
| |
Signed-off-by: dd3boh <dade.garberi@gmail.com>
|
|
|
|
| |
Change-Id: I9dfa801f416d7346bcd6251b025172e8ec4ad90c
|
|
|
|
| |
Change-Id: I86ab87016e118cfff8b9debc9c38327326b9bc69
|
| |
|
| |
|
|
|