Commit Graph

104 Commits

Author SHA1 Message Date
kamikaonashi
7d4c2f09c7 stone: drop duplicate vendor.camera.aux.packagelist 2024-05-07 22:47:27 +02:00
kamikaonashi
fe6f00d73e sm6375-common: add missing lineage_health sepolicy file 2024-05-07 22:44:48 +02:00
kamikaonashi
17e30d6474 sm6375-common: import XiaomiParts and adapt for stone
imported and adapted xiaomiparts from https://github.com/AlphaDroid-devices/device_xiaomi_sm8350-common/tree/alpha-13/parts

with thermal profiles, per app refresh rate, speaker cleaner
2024-05-07 22:40:18 +02:00
Christopher
0596af0bbf sm6375-common: sepolicy: Allow user apps to read proc/zoneinfo files
* lacrima relies on proczone meminfo readings:
07-27 05:18:23.410 21585 21621 E nightwatch-target: /proc/zoneinfo open: errno=13
07-27 05:18:23.410 21585 21621 E nightwatch-target: sysmeminfo parse failed

after failing:
07-27 05:18:16.100 21127 21127 W Lacrima_startup: type=1400 audit(0.0:1546): avc: denied { read } for name="zoneinfo" dev="proc" ino=4026531859 scontext=u:r:untrusted_app:s0:c52,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.instagram.android
07-27 05:18:16.103 21127 21153 W MultiSignalANRDetectorLacrima: Pausing error state checks
07-27 05:18:16.103   894 21490 I sensors-hal: handle_indication_realtime:482,  SCHED_FIFO(10) for qmi_cbk
07-27 05:18:16.107  1254  1308 W statsd  : StatsPullerManager: Unknown tagId 10005
07-27 05:18:16.107  1254  1308 E statsd  : Stats puller failed for tag: 10005 at 30618177112118
07-27 05:18:16.107  1254  1308 W statsd  : StatsPullerManager: Unknown tagId 10038
07-27 05:18:16.107  1254  1308 E statsd  : Stats puller failed for tag: 10038 at 30618177112118
07-27 05:18:16.110  1254  2381 W statsd  : StatsPullerManager: Unknown tagId 10038
07-27 05:18:16.123  3738  4154 I DeviceStatusMonitor: DeviceStatusMonitor.handleBroadcast():123 onReceive() : Action = android.intent.action.SCREEN_ON
07-27 05:18:16.043 21188 21188 W AppInit5: type=1400 audit(0.0:1545): avc: denied { read } for name="zoneinfo" dev="proc" ino=4026531859 scontext=u:r:untrusted_app:s0:c61,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.facebook.katana
08-04 05:51:57.363 21059 21059 W am.android:mqtt: type=1400 audit(0.0:997): avc: denied { open } for path=/proc/zoneinfo dev=proc ino=4026531859 scontext=u:r:untrusted_app:s0:c52,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.instagram.android
08-04 05:50:25.297 20336 20336 W AppInit1: type=1400 audit(0.0:876): avc: denied { open } for path=/proc/zoneinfo dev=proc ino=4026531859 scontext=u:r:untrusted_app:s0:c108,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.facebook.katana
2024-05-07 21:32:40 +02:00
Andy | アンディ
9b7d5329de sm6375-common: sepolicy: Allow hal_health_default
Allow to read sysfs_usb, USB & Charger Supply, Battery info
2024-05-07 21:27:36 +02:00
Andy | アンディ
9a202f1a3b sm6375-common: Build Lineage Health 2023-09-14 15:20:14 +08:00
Andy | アンディ
3fbc1877d3 Revert "sm6375-common: Allow system_susped to read sysfs"
This reverts commit 779e212afd.
2023-09-08 15:44:25 +08:00
Andy | アンディ
37c363c2e7 sm6375-common: sepolicy: Remove hal_lineage_health_default & Unused code
Lineage Health Hal: This only available in LineageOS based rom, other rom based on AOSP will get sepolicy error while building
2023-09-08 15:17:36 +08:00
Andy | アンディ
6c04d0d309 sm6375-common: sepolicy: Allow to open kernels wakelock stats
09-07 08:10:08.332   628  2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup26 (../../devices/platform/soc/4c84000.i2c/i2c-1/1-006a/power_supply/usb/wakeup26): Permission denied

09-07 08:10:08.341   628  2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup40 (../../devices/platform/soc/soc:charger-manager/power_supply/battery/wakeup40): Permission denied
2023-09-08 15:13:19 +08:00
Andy | アンディ
8c3b9eb1f1 sm6375-common: sepolicy: Mark sys.fp.vendor as exported_system_prop 2023-09-08 15:12:50 +08:00
Andy | アンディ
039618f721 sm6375-common: sepolicy: Allow hal_fingerprint_default to search sysfs_leds
07-08 05:12:25.531  1390  1390 I auditd  : type=1400 audit(0.0:48): avc: denied { search } for comm="android.hardwar" name="5c1b000.qcom,cci0:qcom,camera-flash@0" dev="sysfs" ino=22785 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
f4814cc50a sm6375-common: sepolicy: Allow vendor_sensors to read huaqin_sysfs (file)
07-08 05:12:23.639   632   632 I auditd  : type=1400 audit(0.0:34): avc: denied { read } for comm="sscrpcd" name="pcba_config" dev="sysfs" ino=18246 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=file permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
3d09a3ae15 sm6375-common: sepolicy: Allow to set (ro.qc.sdk.audio. & persist.audio.fluence.)
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'ro.qc.sdk.audio.ssr' to 'false' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'ro.qc.sdk.audio.fluencetype' to 'fluence' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicecall' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicerec' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.speaker' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicecomm' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
2023-09-08 14:48:34 +08:00
Andy | アンディ
28f4765010 sm6375-common: sepolicy: Mark ro.factory_mode as exported_default_prop 2023-09-08 14:48:08 +08:00
Andy | アンディ
0c90175e1f sm6375-common: sepolicy: Mark wifi.pktlog.debug.0.chen as exported_system_prop 2023-09-08 14:47:38 +08:00
Andy | アンディ
2cf7bb4e17 sm6375-common: sepolicy: Don't audit odrefresh to killing process
07-07 10:07:50.071   754   754 I auditd  : type=1400 audit(0.0:9): avc: denied { kill } for comm="odrefresh" capability=5 scontext=u:r:odrefresh:s0 tcontext=u:r:odrefresh:s0 tclass=capability permissive=0
2023-09-07 14:27:35 +08:00
Andy | アンディ
f3a447da69 sm6375-common: Add DT2W Services
DT2W Services feature are finished now
2023-09-07 14:16:18 +08:00
Andy | アンディ
607a67ad90 sm6375-common: Remove unused code 2023-09-07 00:20:58 +08:00
Andy | アンディ
ba7b4bbe64 sm6375-common: sepolicy: Allow system_app
09-05 20:48:18.342  6384  6384 W com.android.settings: type=1400 audit(0.0:93): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_power_default:s0 tclass=binder permissive=0

09-05 20:48:18.382  6384  6384 W com.android.settings: type=1400 audit(0.0:94): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:system_suspend:s0 tclass=binder permissive=0

09-05 20:48:18.666  6384  6384 W com.android.settings: type=1400 audit(0.0:96): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:storaged:s0 tclass=binder permissive=0

09-05 20:48:18.673   593   593 E SELinux : avc:  denied  { find } for pid=6384 uid=1000 name=suspend_control scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_service:s0 tclass=service_manager permissive=0

09-05 20:48:18.674   593   593 E SELinux : avc:  denied  { find } for pid=6384 uid=1000 name=suspend_control_internal scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_internal_service:s0 tclass=service_manager permissive=0

09-05 20:48:18.695   593   593 E SELinux : avc:  denied  { find } for pid=6384 uid=1000 name=tracing.proxy scontext=u:r:system_app:s0 tcontext=u:object_r:tracingproxy_service:s0 tclass=service_manager permissive=0

09-05 20:48:18.702  6384  6384 W com.android.settings: type=1400 audit(0.0:97): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_lineage_health_default:s0 tclass=binder permissive=0
2023-09-06 09:43:38 +08:00
Andy | アンディ
779e212afd sm6375-common: Allow system_susped to read sysfs 2023-09-05 22:37:26 +08:00
chrisl7
af745fc21c sm6375-common: sepolicy: Set stflashtool prop correctly
06-22 19:23:59.519   608   608 I auditd  : type=1400 audit(0.0:17): avc: denied { read } for comm="STFlashTool" name="u:object_r:nfc_prop:s0" dev="tmpfs" ino=11923 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=file permissive=0
06-22 19:23:59.599     1     1 I auditd  : type=1107 audit(0.0:18): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=nfc.fw.dnld_force pid=608 uid=1027 gid=1027 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=property_service permissive=0'

Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:19:57 +07:00
chrisl7
ed5403c49b sm6375-common: sepolicy: Allow huaqin to search vendor_sensors
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:21): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:22): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:23): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:24): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:25): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:26): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:27): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:28): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:29): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:30): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:31): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:32): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:33): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:34): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:35): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:36): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:37): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:38): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:39): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:40): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:41): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:42): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:43): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:44): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:45): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:46): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:47): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:48): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:49): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:50): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:51): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:52): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:53): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:54): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:55): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:56): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:57): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:58): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:59): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:60): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0

Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:13:54 +07:00
Adithya R
ed057fb734 sm6375-common: sepolicy: Permissive recovery only in userdebug/eng
User builds do not allow permissive domains.

Change-Id: Idbf04be9c83fb2f33ac4c592306d790a7d10a36e
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:05:49 +07:00
chrisl7
9518ee5985 sm6375-common: sepolicy: Import missing sepolicy rules from MOOONSTONE
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: I4d86e532648c8dc5c6d3d85aeffd3203c5fbaf74
2023-08-25 22:48:22 +07:00
chrisl7
50080a9032 sm6375-common: sepolicy: Add missing sepolicy rules
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 22:41:37 +07:00
coduxer
49da079a94 sm6375-common: rootdir: Fix fingerprint goodix events
[1] - this fixing the goodix issue when long press the powerbutton due
annoying kernel events

Change-Id: I8d3e867de2f0c30a46c371a36b691cb9011bd519
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:49:49 +07:00
chrisl7
863611c9ba sm6375-common: sepolicy: Label missing ro.boot definitions
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:45:26 +07:00
chrisl7
c7a431eb87 sm6375-common: Switch to common hardware/xiaomi HAL sensors
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:44:21 +07:00
chrisl7
e937e5fe72 sm6375-common: sepolicy: Label AIDL STNFC
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:43:34 +07:00
chrisl7
8a2d4c45cc sm6375-common: sepolicy: Add vibrator sepolicy rules
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:43:19 +07:00
Arian
2c629fd249 sm6375-common: Add power HAL extension and use xiaomi-touch to handle dt2w
Change-Id: I5c65e0df255853eb2b3018a27ceb807c111bc4df
2023-08-14 06:59:02 +07:00
Arian
6a3993f4b5 sm6375-common: Switch to common qti vibrator aidl
Change-Id: I743c3ae426af9b94c35fe36c95c6bc5b31822605
2023-08-13 23:18:37 +07:00
boedhack99
d7a37267aa sm6375-common: sepolicy: Label different IR HAL for moonstone
* moonstone use lirc0

Change-Id: Id0ca60b64b2894238dc84909900e1d63b37cd44f
2023-07-25 00:03:37 +07:00
boedhack99
9e1cb65ef4 Revert "sm6375-common: Build source QTI vibrator service"
This reverts commit 46efe079a1.
2023-07-21 16:14:25 +07:00
boedhack99
b973985d87 sm6375-common: sepolicy: Remove multiple contexts for haptics
* Duplicate
* Partially reverts commit f4ce238.

Change-Id: I3843b489481edb99cf430fce810da39bc88a2bc0
2023-07-19 17:27:43 +07:00
boedhack99
388f090589 sm6357-common: sepolicy: Update wakeup nodes wakelock
Change-Id: Ie5c608af641824585d96723b26cb8ec9b15483cb
2023-07-19 17:21:53 +07:00
Zinadin Zidan
e5eb29b5b4 sm6375-common: sepolicy: Fix violations to pass VTS
******************************
5 violations found:
camera.                                 u:object_r:vendor_camera_prop:s0
ro.camera.                              u:object_r:vendor_camera_prop:s0
sys.boot.hwc                            u:object_r:vendor_camera_prop:s0
sys.fp.vendor                           u:object_r:vendor_fingerprint_prop:s0
wifi.interface                          u:object_r:wifi_hal_prop:s0
******************************
device/xiaomi/sm6375-common/sepolicy/vendor/property_contexts contains properties
which are not properly namespaced.
This is enforced by VTS, so please fix such offending properties.

Co-authored-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: Ib1065171df107306da27066b0d8d8c444dd3bfe5
2023-07-19 00:51:31 +07:00
chrisl7
1e554bd2a1 sm6375-common: Fix sys.fp.miui.token spam
07-18 21:53:34.773  1463  4222 W libc    : Access denied finding property sys.fp.miui.token
07-18 21:53:34.769  1463  1463 W /vendor/bin/hw/android.hardware.biometrics.fingerprint@2.3-service.xiaomi: type=1400 audit(0.0:274): avc: denied { read } for comm=504F5349582074696D65722031 name=u:object_r:system_prop:s0 dev=tmpfs ino=11254 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0

Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: Ia0d1629351bf9992115bbd26984d3714bfef0925
2023-07-18 23:27:02 +07:00
boedhack99
90d3ab1fd7 sm6375-common: sepolicy: Add vendor prefix for GF_HAL debug
Change-Id: I832dbda12bd01fc8e8b1f6619dbf97887d8d96c6
2023-07-18 23:19:55 +07:00
boedhack99
f4ce238013 sm6375-common: sepolicy: Label vibrator rules
Change-Id: I2199d930b30e7e405d529c8e90453db3b9f4f15b
2023-07-18 23:17:33 +07:00
Arian
13842eff75 sm6375-common: sepolicy: Add vendor prefix to camera persist file type
Change-Id: Ia42113acb0fcf5667c0b89ecdd7def13681ca0be
Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
Signed-off-by: Jabiyeff <cebiyevanar@gmail.com>
Signed-off-by: HeroBuxx <herobuxx@gmail.com>
2023-07-18 03:56:17 +07:00
boedhack99
80eca2852a sm6375-common: sepolicy: Label f2player sepolicy rules
Change-Id: I4428234012b70c631f7fc1eb92c2c99c9c3dcaa8
2023-07-18 03:51:45 +07:00
Hridya Valsaraju
d51883bb09 sm6375-common: Set PRODUCT_SET_DEBUGFS_RESTRICTIONS
Starting with Android R launched devices, debugfs cannot be mounted in
production builds. In order to avoid accidental debugfs dependencies
from creeping in during development with userdebug/eng builds, the
build flag PRODUCT_SET_DEBUGFS_RESTRICTIONS can be set by vendors to
enforce additional debugfs restrictions for userdebug/eng builds. The
same flag will be used to enable sepolicy neveallow statements to
prevent new permissions added for debugfs access.

Test: build, boot
Bug: 184381659
Change-Id: I45e6f20c886d467a215c9466f3a09965ff897d7e
2023-07-11 00:14:09 +07:00
boedhack99
f7f83e7731 sm6375-common: Switch to source build sensors HAL
Change-Id: Ib0f45b7fc134a1eb71e71c6c54937b40a73625c0
2023-07-10 14:26:15 +07:00
boedhack99
1d45717c58 sm6375-common: sepolicy: Fix sepolicy to read more battery data
* taken from moonstone MIUI V14.0.3.0.TMPMIXM release-keys

Change-Id: I2b7ac396a1fa042ba60060fc3689f1828c575784
2023-07-09 14:04:51 +07:00
boedhack99
e8bc381d90 sm6375-common: sepolicy: Allow health HAL to access battery data
07-09 12:35:52.867   935   935 W health@2.1-serv: type=1400 audit(0.0:262): avc: denied { read } for name=type dev=sysfs ino=66924 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

Change-Id: Ifed1767cfe9f37899b1a1fe9d0e84025cf7b9bc7
2023-07-09 13:51:54 +07:00
boedhack99
e014f66444 sm6375-common: sepolicy: Resolve hwservice for nxpese
Change-Id: Id2f32169fb5b89eebe8730e1a61a47c8cd3ed889
2023-07-08 15:54:05 +07:00
boedhack99
466ff758f2 Revert "sm6375-common: sepolicy: Define nfc hwservice sepolicy"
This reverts commit 5d3611543e.
2023-07-08 15:44:49 +07:00
boedhack99
5d3611543e sm6375-common: sepolicy: Define nfc hwservice sepolicy
Change-Id: Ib0f5a3d792312c4eda5877947622edb7fa1ead6d
2023-07-08 15:43:46 +07:00
boedhack99
28c8ba1244 sm6375-common: sepolicy: Remove duplicate sepolicies
Change-Id: I97b78ba77e4f944fb34a561ac34e83b6f60f9a64
2023-07-08 02:31:00 +07:00