23 Commits

Author SHA1 Message Date
kamikaonashi
a8461456cd stone: sepolicy: drop ims, iqtiradio
this caused splash loop

Signed-off-by: Arijit78 <sahaarijit2007@gmail.com>
2024-08-21 04:37:22 +00:00
kamikaonashi
7591349103 stone: sepolicy: add rules for haptics change
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com>
2024-07-06 06:38:32 +00:00
kamikaonashi
47292224d5 stone: adress sepolicy denials
Co-Authored-By: Onett Boots <90538882+onettboots@users.noreply.github.com>
2024-05-07 22:58:32 +02:00
kamikaonashi
7d4c2f09c7 stone: drop duplicate vendor.camera.aux.packagelist 2024-05-07 22:47:27 +02:00
kamikaonashi
17e30d6474 sm6375-common: import XiaomiParts and adapt for stone
imported and adapted xiaomiparts from https://github.com/AlphaDroid-devices/device_xiaomi_sm8350-common/tree/alpha-13/parts

with thermal profiles, per app refresh rate, speaker cleaner
2024-05-07 22:40:18 +02:00
Andy | アンディ
3fbc1877d3 Revert "sm6375-common: Allow system_susped to read sysfs"
This reverts commit 779e212afd.
2023-09-08 15:44:25 +08:00
Andy | アンディ
8c3b9eb1f1 sm6375-common: sepolicy: Mark sys.fp.vendor as exported_system_prop 2023-09-08 15:12:50 +08:00
Andy | アンディ
3d09a3ae15 sm6375-common: sepolicy: Allow to set (ro.qc.sdk.audio. & persist.audio.fluence.)
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'ro.qc.sdk.audio.ssr' to 'false' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'ro.qc.sdk.audio.fluencetype' to 'fluence' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicecall' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicerec' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.speaker' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicecomm' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
2023-09-08 14:48:34 +08:00
Andy | アンディ
28f4765010 sm6375-common: sepolicy: Mark ro.factory_mode as exported_default_prop 2023-09-08 14:48:08 +08:00
Andy | アンディ
0c90175e1f sm6375-common: sepolicy: Mark wifi.pktlog.debug.0.chen as exported_system_prop 2023-09-08 14:47:38 +08:00
Andy | アンディ
2cf7bb4e17 sm6375-common: sepolicy: Don't audit odrefresh to killing process
07-07 10:07:50.071   754   754 I auditd  : type=1400 audit(0.0:9): avc: denied { kill } for comm="odrefresh" capability=5 scontext=u:r:odrefresh:s0 tcontext=u:r:odrefresh:s0 tclass=capability permissive=0
2023-09-07 14:27:35 +08:00
Andy | アンディ
779e212afd sm6375-common: Allow system_susped to read sysfs 2023-09-05 22:37:26 +08:00
Adithya R
ed057fb734 sm6375-common: sepolicy: Permissive recovery only in userdebug/eng
User builds do not allow permissive domains.

Change-Id: Idbf04be9c83fb2f33ac4c592306d790a7d10a36e
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:05:49 +07:00
chrisl7
863611c9ba sm6375-common: sepolicy: Label missing ro.boot definitions
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:45:26 +07:00
Zinadin Zidan
e5eb29b5b4 sm6375-common: sepolicy: Fix violations to pass VTS
******************************
5 violations found:
camera.                                 u:object_r:vendor_camera_prop:s0
ro.camera.                              u:object_r:vendor_camera_prop:s0
sys.boot.hwc                            u:object_r:vendor_camera_prop:s0
sys.fp.vendor                           u:object_r:vendor_fingerprint_prop:s0
wifi.interface                          u:object_r:wifi_hal_prop:s0
******************************
device/xiaomi/sm6375-common/sepolicy/vendor/property_contexts contains properties
which are not properly namespaced.
This is enforced by VTS, so please fix such offending properties.

Co-authored-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: Ib1065171df107306da27066b0d8d8c444dd3bfe5
2023-07-19 00:51:31 +07:00
chrisl7
1e554bd2a1 sm6375-common: Fix sys.fp.miui.token spam
07-18 21:53:34.773  1463  4222 W libc    : Access denied finding property sys.fp.miui.token
07-18 21:53:34.769  1463  1463 W /vendor/bin/hw/android.hardware.biometrics.fingerprint@2.3-service.xiaomi: type=1400 audit(0.0:274): avc: denied { read } for comm=504F5349582074696D65722031 name=u:object_r:system_prop:s0 dev=tmpfs ino=11254 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0

Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: Ia0d1629351bf9992115bbd26984d3714bfef0925
2023-07-18 23:27:02 +07:00
Peter Cai
140cb9d3b0 sm6375-common: sepolicy: Make recovery permissive
Change-Id: I5b273c9c10b7c69df82fdf1c5c341385abddfec2
2023-07-05 02:59:09 +07:00
nnippon99
546e0114a9 sm6375-common: sepolicy: address ro.miui.build.region denial
Signed-off-by: nnippon99 <adamayyad1999@hotmail.com>
2023-07-05 02:59:09 +07:00
nnippon99
26be43ff39 [SQUASH] sm6375-common: sepolicy: Address more denials
* This is a squash commit from nnippon99:thirteen

veux: Address some missing denials

veux: Address wcnss denials

veux: Set ro.product.mod_device correctly and label sepolicy for it
* Proper set ro.product.mod_device depending on variant
* This needed for MIUICamera to work

veux: Add support for MiuiCamera!

veux: sepolicy: allow last_kmsg and fix denial
W init    : type=1400 audit(0.0:7): avc: denied { setattr } for name="last_kmsg" dev="proc" ino=4026532174 scontext=u:r:init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0

W BootReceiver: cannot read last msg
W BootReceiver: java.io.FileNotFoundException: /proc/last_kmsg: open failed: EACCES (Permission denied)
W BootReceiver:	at libcore.io.IoBridge.open(IoBridge.java:574)
W BootReceiver:	at java.io.FileInputStream.<init>(FileInputStream.java:160)
W BootReceiver:	at android.os.FileUtils.readTextFile(FileUtils.java:637)
W BootReceiver:	at com.android.server.BootReceiver.logFsShutdownTime(BootReceiver.java:649)
W BootReceiver:	at com.android.server.BootReceiver.logBootEvents(BootReceiver.java:305)
W BootReceiver:	at com.android.server.BootReceiver.-$$Nest$mlogBootEvents(Unknown Source:0)
W BootReceiver:	at com.android.server.BootReceiver$1.run(BootReceiver.java:139)
W BootReceiver: Caused by: android.system.ErrnoException: open failed: EACCES (Permission denied)
W BootReceiver:	at libcore.io.Linux.open(Native Method)
W BootReceiver:	at libcore.io.ForwardingOs.open(ForwardingOs.java:563)
W BootReceiver:	at libcore.io.BlockGuardOs.open(BlockGuardOs.java:274)
W BootReceiver:	at libcore.io.IoBridge.open(IoBridge.java:560)
W BootReceiver:	... 6 more

veux: sepolicy: Fix logspam
* This is a SQUASH commit for multiple commits for fixing some logspam

veux: sepolicy: Label more sysfs wakeup nodes

veux: sepolicy: Label more graphics nodes
E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon3/name not found
E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon2/name not found
E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon1/name not found
E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon0/name not found

veux: sepolicy: address radio.qcriNvOpt hwservice denial

veux: sepolicy: Allow user apps to read proc/zoneinfo files

* E nightwatch-target: /proc/zoneinfo open: errno=13
* E nightwatch-target: sysmeminfo parse failed

* avc: denied { read } for name="zoneinfo" dev="proc" ino=4026531859 scontext=u:r:untrusted_app:s0:c61,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.facebook.katana

veux: sepolicy: Fix Build errors

veux: sepolicy: Resolve qemu_hw_prop denial

avc: denied { read } for name="u:object_r:qemu_hw_prop:s0" dev="tmpfs" ino=1316 scontext=u:r:system_app:s0 tcontext=u:object_r:qemu_hw_prop:s0 tclass=file permissive=0

veux: sepolicy: Fix isolated_app denial

avc: denied { setattr } for comm="CrUtilityMain" name="commands.json" dev="mmcblk0p42" ino=1251111 scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c153,c256,c512,c768 tclass=file permissive=0
avc: denied { setattr } for comm="CrUtilityMain" name="commands.json" dev="mmcblk0p42" ino=1251111 scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c153,c256,c512,c768 tclass=file permissive=0
avc: denied { setattr } for comm="CrUtilityMain" name="f2" dev="mmcblk0p42" ino=1251128 scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c153,c256,c512,c768 tclass=file permissive=0
avc: denied { setattr } for comm="CrUtilityMain" name="f2" dev="mmcblk0p42" ino=1251128 scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c153,c256,c512,c768 tclass=file permissive=0

veux: Label some radio property
W libc    : Unable to set property "ro.vendor.ril.svlte1x" to "false": error code: 0xb
W libc    : Unable to set property "ro.vendor.ril.svdo" to "false": error code: 0xb

veux: prop: set some props and fix log
W libc    : Unable to set property "ro.telephony.call_ring.multiple" to "false": error code: 0xb
W libc    : Unable to set property "ro.vendor.ril.svlte1x" to "false": error code: 0xb
W libc    : Unable to set property "ro.vendor.ril.svdo" to "false": error code: 0xb

veux: sepolicy: fix some denials
* Rearranges sepolicy/vendor/genfs_contexts properly too

W libc    : Access denied finding property "ro.miui.singlesim"
W libc    : Access denied finding property "ro.product.marketname"
W libc    : Access denied finding property "ro.miui.ui.version.code"
W libc    : Access denied finding property "ro.hardware.chipname"
W libc    : Access denied finding property "ro.vendor.aware_available"
W libc    : Access denied finding property "ro.vendor.gfx.32bit.target"

W libc    : Access denied finding property 'wifi.interface'

W binder:2540_3: type=1400 audit: avc: denied { open } for path="/dev/__properties__/u:object_r:vendor_aware_available_prop:s0" dev="tmpfs" ino=1946 scontext=u:r:system_app:s0 tcontext=u:object_r:vendor_aware_available_prop:s0 tclass=file permissive=0

E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup63 (../../devices/virtual/misc/msm_g711mlaw/wakeup63): Permission denied

E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup58 (../../devices/virtual/misc/msm_amrwb/wakeup58): Permission denied

veux: sepolicy: Allow perf hal to read graphics composer
W/perf@2.2-servic(882): type=1400 audit(0.0:120396): avc: denied { search } for name="880" dev="proc" ino=394316 scontext=u:r:vendor_hal_perf_default:s0 tcontext=u:r:hal_graphics_composer_default:s0 tclass=dir permissive=0

veux: sepolicy: fix denial
avc: denied { read } for comm="e2fsck" name="sde26" dev="tmpfs" ino=15571 scontext=u:r:fsck:s0 tcontext=u:object_r:vendor_custom_ab_block_device:s0 tclass=blk_file permissive=0
avc: denied { read write } for comm="e2fsck" name="sde26" dev="tmpfs" ino=15571 scontext=u:r:fsck:s0 tcontext=u:object_r:vendor_custom_ab_block_device:s0 tclass=blk_file permissive=0

veux: sepolicy: Fix avc denials related to vendor/toolbox.te
avc: denied { kill } for comm="mkswap" capability=5 scontext=u:r🧰s0 tcontext=u:r🧰s0 tclass=capability permissive=0

veux: sepolicy: Resolve system_app denial

veux: sepolicy: KANG missing entries from sm8350-common

Signed-off-by: nnippon99 <adamayyad1999@hotmail.com>
Change-Id: Ica2495d4c2833b0c0509db802115ca720cc7511a
2023-07-05 02:59:01 +07:00
daniml3
8dfc22528b sm6375-common: sepolicy: Silence system_suspend denials
Change-Id: I71ae8fbdbdb9101298e82de47aace1af72db8c55
2023-06-30 17:27:36 +07:00
Ivan Vecera
5edcc73369 sm6375-common: sepolicy: Allow system_app to access zram sysfs nodes
04-22 09:15:37.459 19569 19569 I auditd  : type=1400 audit(0.0:570): avc: denied { search } for comm="pool-2-thread-1" name="zram0" dev="sysfs" ino=48559 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0
04-22 09:15:37.459 19569 19569 I auditd  : type=1400 audit(0.0:571): avc: denied { search } for comm="pool-2-thread-1" name="zram0" dev="sysfs" ino=48559 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=0

Change-Id: Ib8ec06a46239cb6cd8739e888a9abdb88b753b77
2023-06-30 17:26:35 +07:00
Ramii Ahmed
9764d3d544 sm6375-common: add missing mlipay sepolicy from Xiaomi-SM8250 tree
up to HEAD:e2aab9679fea15a8ee0bbf5876bbeb140292e29c

Change-Id: Ic68fb82a72954d8eb94314e79733ac71fbaec221
2022-09-04 13:00:32 +00:00
Ramii Ahmed
4abebb1669 sm6375-common: initial SEPolicy
Co-authored-by: Cosmin Tanislav <demonsingur@gmail.com>
Co-authored-by: Arian <arian.kulmer@web.de>
Co-authored-by: ItsVixano <giovanniricca@protonmail.com>
Change-Id: I2ab2e0b5981ec8044c22caa3ff41ba094ccadf38
2022-09-04 12:59:40 +00:00