Commit Graph

120 Commits

Author SHA1 Message Date
Arijit78
04976e30ab stone: Remove duplicate entries from genfs_contexts
- Also update kernel link from crdroid in vendorsetup.sh

Signed-off-by: Arijit78 <sahaarijit2007@gmail.com>
2024-07-16 17:55:43 +00:00
kamikaonashi
7591349103 stone: sepolicy: add rules for haptics change
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com>
2024-07-06 06:38:32 +00:00
kamikaonashi
b88999e6c4 stone: sepolicy: fix fastcharge path denial
05-13 23:40:11.415  1395  1395 W binder:1395_1C: type=1400 audit(0.0:295): avc:  denied  { open } for  path="/sys/devices/platform/soc/4c84000.i2c/i2c-1/1-006a/power_supply/usb/quick_charge_type" dev="sysfs" ino=61529 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_sysfs_usb_supply:s0 tclass=file permissive=0
05-13 23:40:11.417  1395  8245 E BatteryService: Failed to read oem fast charger status path: /sys/class/power_supply/usb/quick_charge_type

Signed-off-by: Arijit78 <sahaarijit2007@gmail.com>
2024-05-17 12:06:09 +00:00
kamikaonashi
df8ffa36ab stone: sepolicy: fix fastcharge denial warning
W fastcharge@1.0-: type=1400 audit(0.0:74): avc:  denied  { execute_no_trans } for  path="/vendor/bin/sh" dev="dm-3" ino=269 scontext=u:r:hal_lineage_fastcharge_default:s0 tcontext=u:object_r:vendor_shell_exec:s0 tclass=file permissive=0

Signed-off-by: Arijit78 <sahaarijit2007@gmail.com>
2024-05-12 17:37:16 +00:00
kamikaonashi
60e7152649 [SQUASH] stone: fastcharge implementation
this commit contains following commits to introduce the fastcharge toggle for stone device that use this tree

they were renamed from sm8250-common to stone

 sm8250-common: add fastcharge implementation

 * Disabling fast charge may be useful for reducing the heat produced by
   the device while charging, or for extending the lifespan of the battery

 * This commit introduces the fastcharge HIDL, which writes in the node

              /sys/class/qcom-battery/restrict_chg

   0 or 1 depeding on user selection.
   0 means that fastcharge is enabled, while 1 means that fastcharge is
     disabled

Change-Id: I369ba9c437b3a83a88c2ce74d603b7d7ddd9cfbb
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
Signed-off-by: althafvly <althafvly@gmail.com>

6510782439

 sm8250-common: fastcharge: Make user setting persistent

Change-Id: I4ff051d6f9685e94022eab32035bfe86a65264b8
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>

e050f0dab0

 sm8250-common: fastcharge: Use pragma once

Change-Id: I9a9e193a6f66f045f41394d059af8b71778e8d72

ff8e5f6173

 sm8250-common: fastcharge: Migrate to blueprint

Change-Id: I200fd6c685183c98f0815b207adae5aa75a37238

4e0d22f486

sm8250-common: Build fastcharge implementation
Change-Id: I3e6994d2c2f419dc8ce98a060204fda3dd16df81

136d369c4e

sm8250-common: Sepolicy: Label FastCharge more general

7a619945ca

sm8250-common: Sepolicy: Fastcharge: Provide needed permissions

https: //github.com/kamikaonashi/device_xiaomi_sm8250-common/commit/298ff28a2ab9c04f953780958de6a8971a947c51

batterysecret hack
51ebc8de81

Co-Authored-By: Ivan Martynov <johnivan19999@gmail.com>
Co-Authored-By: Bruno Martins <1696148+bgcngm@users.noreply.github.com>
Co-Authored-By: Francescodario Cuzzocrea <bosconovic@gmail.com>
Co-Authored-By: Davide Garberi <dade.garberi@gmail.com>
Co-Authored-By: Mohammed Althaf Thayyil <me@althafvly.com>
Co-Authored-By: blazerpaul15 <107421375+blazerpaul15@users.noreply.github.com>
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com>
2024-05-12 17:34:11 +00:00
kamikaonashi
46ee13c7aa stone: sepolicy: label fastcharge node
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com>
2024-05-12 17:33:34 +00:00
TogoFire
5b6379c879 stone: sepolicy: add audioserver.te
to fix audio mods like dolby or viper4fx
2024-05-10 18:49:04 +02:00
kamikaonashi
05456f0cf1 stone:sepolicy: fix hal_lineage_health missmerge 2024-05-09 21:54:02 +02:00
kamikaonashi
71b4d645e0 stone: sepolicy: allow power_supply/usb 2024-05-09 21:53:26 +02:00
kamikaonashi
09a254d358 stone: sepolicy: allow HBM to write brightness
this fixes crash of settings when turning on HBM
2024-05-09 12:22:59 +02:00
kamikaonashi
99cf61a642 stone: !fixup ZRAM
forgot to add
2024-05-08 17:32:01 +02:00
thepriyanshujangid
a700e32f0c stone: sepolicy: Import missing adress for Leica Camera
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com>
2024-05-08 15:54:52 +02:00
kamikaonashi
897a00a844 stone: sepolicy: fix vendor_radio_prop is not set of
fixes:
Error: type "vendor_radio_prop" is not of set: "hwservice_manager_type"
2024-05-08 08:13:57 +02:00
nullptr03
4849edca13 stone: sepolicy: drop vendor_sysfs_charger_supply entry 2024-05-08 07:28:43 +02:00
kamikaonashi
17699aec4f stone: sepolicy: allow apps to read clock speeds 2024-05-07 23:13:46 +02:00
kamikaonashi
47292224d5 stone: adress sepolicy denials
Co-Authored-By: Onett Boots <90538882+onettboots@users.noreply.github.com>
2024-05-07 22:58:32 +02:00
kamikaonashi
7d4c2f09c7 stone: drop duplicate vendor.camera.aux.packagelist 2024-05-07 22:47:27 +02:00
kamikaonashi
fe6f00d73e sm6375-common: add missing lineage_health sepolicy file 2024-05-07 22:44:48 +02:00
kamikaonashi
17e30d6474 sm6375-common: import XiaomiParts and adapt for stone
imported and adapted xiaomiparts from https://github.com/AlphaDroid-devices/device_xiaomi_sm8350-common/tree/alpha-13/parts

with thermal profiles, per app refresh rate, speaker cleaner
2024-05-07 22:40:18 +02:00
Christopher
0596af0bbf sm6375-common: sepolicy: Allow user apps to read proc/zoneinfo files
* lacrima relies on proczone meminfo readings:
07-27 05:18:23.410 21585 21621 E nightwatch-target: /proc/zoneinfo open: errno=13
07-27 05:18:23.410 21585 21621 E nightwatch-target: sysmeminfo parse failed

after failing:
07-27 05:18:16.100 21127 21127 W Lacrima_startup: type=1400 audit(0.0:1546): avc: denied { read } for name="zoneinfo" dev="proc" ino=4026531859 scontext=u:r:untrusted_app:s0:c52,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.instagram.android
07-27 05:18:16.103 21127 21153 W MultiSignalANRDetectorLacrima: Pausing error state checks
07-27 05:18:16.103   894 21490 I sensors-hal: handle_indication_realtime:482,  SCHED_FIFO(10) for qmi_cbk
07-27 05:18:16.107  1254  1308 W statsd  : StatsPullerManager: Unknown tagId 10005
07-27 05:18:16.107  1254  1308 E statsd  : Stats puller failed for tag: 10005 at 30618177112118
07-27 05:18:16.107  1254  1308 W statsd  : StatsPullerManager: Unknown tagId 10038
07-27 05:18:16.107  1254  1308 E statsd  : Stats puller failed for tag: 10038 at 30618177112118
07-27 05:18:16.110  1254  2381 W statsd  : StatsPullerManager: Unknown tagId 10038
07-27 05:18:16.123  3738  4154 I DeviceStatusMonitor: DeviceStatusMonitor.handleBroadcast():123 onReceive() : Action = android.intent.action.SCREEN_ON
07-27 05:18:16.043 21188 21188 W AppInit5: type=1400 audit(0.0:1545): avc: denied { read } for name="zoneinfo" dev="proc" ino=4026531859 scontext=u:r:untrusted_app:s0:c61,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.facebook.katana
08-04 05:51:57.363 21059 21059 W am.android:mqtt: type=1400 audit(0.0:997): avc: denied { open } for path=/proc/zoneinfo dev=proc ino=4026531859 scontext=u:r:untrusted_app:s0:c52,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.instagram.android
08-04 05:50:25.297 20336 20336 W AppInit1: type=1400 audit(0.0:876): avc: denied { open } for path=/proc/zoneinfo dev=proc ino=4026531859 scontext=u:r:untrusted_app:s0:c108,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.facebook.katana
2024-05-07 21:32:40 +02:00
Andy | アンディ
9b7d5329de sm6375-common: sepolicy: Allow hal_health_default
Allow to read sysfs_usb, USB & Charger Supply, Battery info
2024-05-07 21:27:36 +02:00
Andy | アンディ
9a202f1a3b sm6375-common: Build Lineage Health 2023-09-14 15:20:14 +08:00
Andy | アンディ
3fbc1877d3 Revert "sm6375-common: Allow system_susped to read sysfs"
This reverts commit 779e212afd.
2023-09-08 15:44:25 +08:00
Andy | アンディ
37c363c2e7 sm6375-common: sepolicy: Remove hal_lineage_health_default & Unused code
Lineage Health Hal: This only available in LineageOS based rom, other rom based on AOSP will get sepolicy error while building
2023-09-08 15:17:36 +08:00
Andy | アンディ
6c04d0d309 sm6375-common: sepolicy: Allow to open kernels wakelock stats
09-07 08:10:08.332   628  2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup26 (../../devices/platform/soc/4c84000.i2c/i2c-1/1-006a/power_supply/usb/wakeup26): Permission denied

09-07 08:10:08.341   628  2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup40 (../../devices/platform/soc/soc:charger-manager/power_supply/battery/wakeup40): Permission denied
2023-09-08 15:13:19 +08:00
Andy | アンディ
8c3b9eb1f1 sm6375-common: sepolicy: Mark sys.fp.vendor as exported_system_prop 2023-09-08 15:12:50 +08:00
Andy | アンディ
039618f721 sm6375-common: sepolicy: Allow hal_fingerprint_default to search sysfs_leds
07-08 05:12:25.531  1390  1390 I auditd  : type=1400 audit(0.0:48): avc: denied { search } for comm="android.hardwar" name="5c1b000.qcom,cci0:qcom,camera-flash@0" dev="sysfs" ino=22785 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
f4814cc50a sm6375-common: sepolicy: Allow vendor_sensors to read huaqin_sysfs (file)
07-08 05:12:23.639   632   632 I auditd  : type=1400 audit(0.0:34): avc: denied { read } for comm="sscrpcd" name="pcba_config" dev="sysfs" ino=18246 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=file permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
3d09a3ae15 sm6375-common: sepolicy: Allow to set (ro.qc.sdk.audio. & persist.audio.fluence.)
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'ro.qc.sdk.audio.ssr' to 'false' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'ro.qc.sdk.audio.fluencetype' to 'fluence' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicecall' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicerec' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.speaker' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicecomm' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
2023-09-08 14:48:34 +08:00
Andy | アンディ
28f4765010 sm6375-common: sepolicy: Mark ro.factory_mode as exported_default_prop 2023-09-08 14:48:08 +08:00
Andy | アンディ
0c90175e1f sm6375-common: sepolicy: Mark wifi.pktlog.debug.0.chen as exported_system_prop 2023-09-08 14:47:38 +08:00
Andy | アンディ
2cf7bb4e17 sm6375-common: sepolicy: Don't audit odrefresh to killing process
07-07 10:07:50.071   754   754 I auditd  : type=1400 audit(0.0:9): avc: denied { kill } for comm="odrefresh" capability=5 scontext=u:r:odrefresh:s0 tcontext=u:r:odrefresh:s0 tclass=capability permissive=0
2023-09-07 14:27:35 +08:00
Andy | アンディ
f3a447da69 sm6375-common: Add DT2W Services
DT2W Services feature are finished now
2023-09-07 14:16:18 +08:00
Andy | アンディ
607a67ad90 sm6375-common: Remove unused code 2023-09-07 00:20:58 +08:00
Andy | アンディ
ba7b4bbe64 sm6375-common: sepolicy: Allow system_app
09-05 20:48:18.342  6384  6384 W com.android.settings: type=1400 audit(0.0:93): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_power_default:s0 tclass=binder permissive=0

09-05 20:48:18.382  6384  6384 W com.android.settings: type=1400 audit(0.0:94): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:system_suspend:s0 tclass=binder permissive=0

09-05 20:48:18.666  6384  6384 W com.android.settings: type=1400 audit(0.0:96): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:storaged:s0 tclass=binder permissive=0

09-05 20:48:18.673   593   593 E SELinux : avc:  denied  { find } for pid=6384 uid=1000 name=suspend_control scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_service:s0 tclass=service_manager permissive=0

09-05 20:48:18.674   593   593 E SELinux : avc:  denied  { find } for pid=6384 uid=1000 name=suspend_control_internal scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_internal_service:s0 tclass=service_manager permissive=0

09-05 20:48:18.695   593   593 E SELinux : avc:  denied  { find } for pid=6384 uid=1000 name=tracing.proxy scontext=u:r:system_app:s0 tcontext=u:object_r:tracingproxy_service:s0 tclass=service_manager permissive=0

09-05 20:48:18.702  6384  6384 W com.android.settings: type=1400 audit(0.0:97): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_lineage_health_default:s0 tclass=binder permissive=0
2023-09-06 09:43:38 +08:00
Andy | アンディ
779e212afd sm6375-common: Allow system_susped to read sysfs 2023-09-05 22:37:26 +08:00
chrisl7
af745fc21c sm6375-common: sepolicy: Set stflashtool prop correctly
06-22 19:23:59.519   608   608 I auditd  : type=1400 audit(0.0:17): avc: denied { read } for comm="STFlashTool" name="u:object_r:nfc_prop:s0" dev="tmpfs" ino=11923 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=file permissive=0
06-22 19:23:59.599     1     1 I auditd  : type=1107 audit(0.0:18): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=nfc.fw.dnld_force pid=608 uid=1027 gid=1027 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=property_service permissive=0'

Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:19:57 +07:00
chrisl7
ed5403c49b sm6375-common: sepolicy: Allow huaqin to search vendor_sensors
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:21): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:22): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:23): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:24): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:25): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:26): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:27): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:28): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:29): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:30): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:31): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:32): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:33): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:34): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:35): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:36): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:37): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:38): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:39): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:40): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:41): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:42): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:43): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:44): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:45): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:46): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:47): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:48): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:49): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:50): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:51): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:52): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:53): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:54): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:55): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:56): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:57): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:58): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:59): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:60): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0

Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:13:54 +07:00
Adithya R
ed057fb734 sm6375-common: sepolicy: Permissive recovery only in userdebug/eng
User builds do not allow permissive domains.

Change-Id: Idbf04be9c83fb2f33ac4c592306d790a7d10a36e
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:05:49 +07:00
chrisl7
9518ee5985 sm6375-common: sepolicy: Import missing sepolicy rules from MOOONSTONE
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: I4d86e532648c8dc5c6d3d85aeffd3203c5fbaf74
2023-08-25 22:48:22 +07:00
chrisl7
50080a9032 sm6375-common: sepolicy: Add missing sepolicy rules
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 22:41:37 +07:00
coduxer
49da079a94 sm6375-common: rootdir: Fix fingerprint goodix events
[1] - this fixing the goodix issue when long press the powerbutton due
annoying kernel events

Change-Id: I8d3e867de2f0c30a46c371a36b691cb9011bd519
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:49:49 +07:00
chrisl7
863611c9ba sm6375-common: sepolicy: Label missing ro.boot definitions
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:45:26 +07:00
chrisl7
c7a431eb87 sm6375-common: Switch to common hardware/xiaomi HAL sensors
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:44:21 +07:00
chrisl7
e937e5fe72 sm6375-common: sepolicy: Label AIDL STNFC
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:43:34 +07:00
chrisl7
8a2d4c45cc sm6375-common: sepolicy: Add vibrator sepolicy rules
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:43:19 +07:00
Arian
2c629fd249 sm6375-common: Add power HAL extension and use xiaomi-touch to handle dt2w
Change-Id: I5c65e0df255853eb2b3018a27ceb807c111bc4df
2023-08-14 06:59:02 +07:00
Arian
6a3993f4b5 sm6375-common: Switch to common qti vibrator aidl
Change-Id: I743c3ae426af9b94c35fe36c95c6bc5b31822605
2023-08-13 23:18:37 +07:00
boedhack99
d7a37267aa sm6375-common: sepolicy: Label different IR HAL for moonstone
* moonstone use lirc0

Change-Id: Id0ca60b64b2894238dc84909900e1d63b37cd44f
2023-07-25 00:03:37 +07:00
boedhack99
9e1cb65ef4 Revert "sm6375-common: Build source QTI vibrator service"
This reverts commit 46efe079a1.
2023-07-21 16:14:25 +07:00