- Apr 04, 2021
-
-
Joshua Blanchard authored
- IMotHealth is labeled in device/lineage/sepolicy now Change-Id: If70b06efe95a39506b108406a0fde3167bf18eaf
-
- Adapted for beckham's needs. Change-Id: I48803eeb72499fe8459805f6ef80ef5f868f431e
-
- Nov 01, 2020
-
-
Joshua Blanchard authored
* Drop platform_app r/w permissions on this directory and its files being appdomain now has all the permissions it needs which includes platform_app. Change-Id: I3e2e305da1e2c014613ea68675c31c534ee1f11b
-
- Oct 30, 2020
-
-
Joshua Blanchard authored
* Define the hal, but label only enough to appease ModServce. Change-Id: Ie5a459a2fde575361ddf4ebc0c47c98988350aeb
-
- Oct 28, 2020
-
-
Joshua Blanchard authored
* Do this by creating init.sys.beckham.rc which will run from /system during post-fs-data. This way the directory gets created and proper sepolicies are set and ModService is satisfied. * Update sepolicy accordingly * Also, change gbfirmware_file -> greybus_fw_data_file which is the same as the stock label. Change-Id: I8ee402e49dee8f95133634d57b48354a7b2acf43
-
Joshua Blanchard authored
* Most of these are already added to genfscon, but it seems this additional labeling in file_contexts is needed to address a crash; E AndroidRuntime: FATAL EXCEPTION: Greybus Dispatcher Change-Id: I61e87c3f948fc0e3adc93c9e01c00c668f3df660
-
Joshua Blanchard authored
* Speaker (and receiver) calibration files are located on persist partition. Grant audio permission to find and read these files. * Moto's libspeakerbundle needs access to the proximity sensor, so allow it to find sensorservice so MotSpeakerHelperProximity can instantiate SensorManager. Change-Id: I888a424fc1c42dea0f130adfc74e02e47927e2b8
-
- Oct 26, 2020
-
-
Joshua Blanchard authored
Change-Id: I258bd9279f0fd770e0e6339a4732e1d413b88619
-
Joshua Blanchard authored
* Make policy less generic and more specific to what we are defining. Move ModService to mods_app and define the attribute in public policy so it can be properly used across system vendor split within private and vendor policies. * Address mods_camd denials observed in logs * Add seinfo for ModService app * Allow ModService to read ro.boot.secure_hardware property Change-Id: I1bffe7e7b1ceb54bd91ce3f8b982cf94d9afe2ab Signed-off-by:
Joshua Blanchard <joshua.lee.bbg@gmail.com>
-
- Oct 25, 2020
-
-
* Moved from sdm660-common * Kanged from Nash: Seperate mods sepolicy from device Change-Id: I30a347a32d471b50631eea3e4fe0b71b869f896e Signed-off-by:
Joshua Blanchard <joshua.lee.bbg@gmail.com>
-