aboutsummaryrefslogtreecommitdiff
path: root/sepolicy/property_contexts (follow)
Commit message (Collapse)AuthorAge
* msm8996-common: sepolicy: Allow netmgrd to set persist.net.doxlatDemon Singur2019-05-16
| | | | | | | | | * Solves the following denial. avc: denied { set } for property=persist.net.doxlat pid=837 uid=1001 gid=1001 scontext=u:r:netmgrd:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1 * We need this again after having switched back to Oreo RIL in 4d1a575a1900797720c957c40898a1bdebecfe55 Change-Id: I30db8b7aa6017dfdea1c874f69b7b8b90bcc8800
* msm8996-common: Remove wcg_mac_toolDavide Garberi2019-05-16
| | | | | | | * Turns out we don't actually need to use this as /proc/mac_wifi and mac_bt can turn into normal mac address values just with hex dumping * Remove bt_mac_prop as we can just set the mac path in vendor_prop.mk Change-Id: I23665cdd5d39d5e090694cff5a63f55ecb9ea334
* msm8996-common: Correct BT mac address with non zui blobsDavide Garberi2019-05-15
| | | | Change-Id: Ibc6eed2018314e79f3f18749cedd9852c82a8a66
* Revert "msm8996-common: sepolicy: Label sys.post_boot.parsed"LuK13372019-05-15
| | | | | | This reverts commit 6b5e38c35a519487048cb66ce65086d4673e53bd. Change-Id: I811a7c04d35e27d74057f310c05aab008d434aae
* msm8996-common: Conditionally remove the OEM unlocking optionDavide Garberi2019-05-09
| | | | | | * It would get disabled anyway when bootloader is unlocked, but this way makes safetynet pass even when unlocked Change-Id: I2dfe641bf60e0409f290b7b31492df00568c9916
* msm8996-common: sepolicy: CleanupDavide Garberi2019-03-03
| | | | | | | | | | * genfs_context cleanup after b5b41d341dd744c40d3908550daaafcee6fe7b4b in which it has randomly been imported from Marlin * Slightly cleanup indentation * Remove a lot of domains which were being used in genfs_context as most of it is already labelled differently in qcom common sepolicy and already addressed * Remove violators where not needed * Remove some old properties we're not using anymore Change-Id: Ic72853dfaf71ba3f0596e75d1bdd5b5c93cd70be
* msm8996-common: Set the hardware wlan mac using wcg_mac_toolDavide Garberi2019-03-02
| | | | | | | | | * Bin extracted from ZUI * Add init.wlan.sh to check if the mac address in wlan_mac.bin is already correct, if not correct it * Run both the bins on boot completed as wcg can't run earlier * Label both the bins and address their denials Change-Id: I7a8001465ec9c3d69bd228efa57dddfdd8e3c6f3
* msm8996-common: sepolicy: Label sys.post_boot.parsedLuK13372018-09-30
| | | | | | | | * QCOM has moved to `vendor.post_boot.parsed` but our blobs still use `sys.post_boot.parsed`. Change-Id: I881f459aa10f1c55f8a7c3de87f36d42e000f47e Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: property_contexts: Label perf propsDavide Garberi2018-09-26
| | | | | Change-Id: Ib2e08d365f088e07d30df2c5dfc72660ca839d21 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: sepolicy: Label persist.camera. propertiesLuK13372018-09-25
| | | | Change-Id: I3e3668d77a7b65fd3572248ba98c980537ad1e25
* msm8996-common: sepolicy: label old doxlat propDemon Singur2018-09-25
| | | | | | | Solves the following denial. denied { set } for property=persist.net.doxlat pid=837 uid=1001 gid=1001 scontext=u:r:netmgrd:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1 Change-Id: I30db8b7aa6017dfdea1c874f69b7b8b90bcc8800
* msm8996-common: sepolicy: label old qseecomd ready propDemon Singur2018-09-25
| | | | | | | | | | CAF renamed this prop to vendor.sys.listeners.registered, but our blobs still use the old one, making enforcing boot to stall. Label it. selinux: avc: denied { set } for property=sys.listeners.registered pid=568 uid=1000 gid=1000 scontext=u:r:tee:s0 tcontext=u:object_r:system_prop:s0 tclass=property_service permissive=0 init: Unable to set property 'sys.listeners.registered' to 'true' from uid:1000 gid:1000 pid:568: SELinux permission check failed Change-Id: I43407d89df024b557dd4c06a4ac9d0ec8f37581e
* msm8996-common: Nuke the Nougat sepolicydd3boh2017-11-04
| | | | Signed-off-by: dd3boh <dade.garberi@gmail.com>
* sepolicy: Update for some new denialsBruno Martins2017-04-07
| | | | Change-Id: I9dfa801f416d7346bcd6251b025172e8ec4ad90c
* z2plus: update sepolicymnemonyc2017-01-08
| | | | Change-Id: I86ab87016e118cfff8b9debc9c38327326b9bc69
* Test some changes in sepolicyFedor9172016-11-10
|
* Initialising brunch based on davidevinavil device tree (CM14.0 branch)Fedor9172016-11-10
|
* Initial commitFedor9172016-10-26