Commit Graph

423 Commits

Author SHA1 Message Date
kamikaonashi
2ffcba68c8 stone: unify common and device tree to stone tree
also drop veu/peux related stuff while we're at it
2024-05-07 20:57:13 +02:00
Andy | アンディ
716cae6be5 sm6375-common: Add check for lineage trust
This will check if the rom hardware interfaces including the packages
2023-09-14 15:20:16 +08:00
Andy | アンディ
9a202f1a3b sm6375-common: Build Lineage Health 2023-09-14 15:20:14 +08:00
Andy | アンディ
f89889da20 sm6375-common: properties: Correct SoC info 2023-09-12 17:34:51 +08:00
Andy | アンディ
bd7384a45f sm6375-common: properties: Move specific audio prop to system 2023-09-08 15:50:29 +08:00
Andy | アンディ
3fbc1877d3 Revert "sm6375-common: Allow system_susped to read sysfs"
This reverts commit 779e212afd.
2023-09-08 15:44:25 +08:00
Andy | アンディ
ec78e796fa sm6375-common: Merge device compatibility matrix from ROM vendors 2023-09-08 15:28:55 +08:00
boedhack99
b230ed2943 sm6375-common: wifi: Fix typo hostscan!
Change-Id: Ia631f993296ec5447a124359468529d3146dd79f
2023-09-08 15:18:51 +08:00
Andy | アンディ
37c363c2e7 sm6375-common: sepolicy: Remove hal_lineage_health_default & Unused code
Lineage Health Hal: This only available in LineageOS based rom, other rom based on AOSP will get sepolicy error while building
2023-09-08 15:17:36 +08:00
Andy | アンディ
6c04d0d309 sm6375-common: sepolicy: Allow to open kernels wakelock stats
09-07 08:10:08.332   628  2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup26 (../../devices/platform/soc/4c84000.i2c/i2c-1/1-006a/power_supply/usb/wakeup26): Permission denied

09-07 08:10:08.341   628  2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup40 (../../devices/platform/soc/soc:charger-manager/power_supply/battery/wakeup40): Permission denied
2023-09-08 15:13:19 +08:00
Andy | アンディ
8c3b9eb1f1 sm6375-common: sepolicy: Mark sys.fp.vendor as exported_system_prop 2023-09-08 15:12:50 +08:00
Andy | アンディ
039618f721 sm6375-common: sepolicy: Allow hal_fingerprint_default to search sysfs_leds
07-08 05:12:25.531  1390  1390 I auditd  : type=1400 audit(0.0:48): avc: denied { search } for comm="android.hardwar" name="5c1b000.qcom,cci0:qcom,camera-flash@0" dev="sysfs" ino=22785 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
f4814cc50a sm6375-common: sepolicy: Allow vendor_sensors to read huaqin_sysfs (file)
07-08 05:12:23.639   632   632 I auditd  : type=1400 audit(0.0:34): avc: denied { read } for comm="sscrpcd" name="pcba_config" dev="sysfs" ino=18246 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=file permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
3d09a3ae15 sm6375-common: sepolicy: Allow to set (ro.qc.sdk.audio. & persist.audio.fluence.)
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'ro.qc.sdk.audio.ssr' to 'false' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'ro.qc.sdk.audio.fluencetype' to 'fluence' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicecall' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicerec' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.speaker' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032     0     0 E init    : Do not have permissions to set 'persist.audio.fluence.voicecomm' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
2023-09-08 14:48:34 +08:00
Andy | アンディ
28f4765010 sm6375-common: sepolicy: Mark ro.factory_mode as exported_default_prop 2023-09-08 14:48:08 +08:00
Andy | アンディ
0c90175e1f sm6375-common: sepolicy: Mark wifi.pktlog.debug.0.chen as exported_system_prop 2023-09-08 14:47:38 +08:00
Andy | アンディ
2cf7bb4e17 sm6375-common: sepolicy: Don't audit odrefresh to killing process
07-07 10:07:50.071   754   754 I auditd  : type=1400 audit(0.0:9): avc: denied { kill } for comm="odrefresh" capability=5 scontext=u:r:odrefresh:s0 tcontext=u:r:odrefresh:s0 tclass=capability permissive=0
2023-09-07 14:27:35 +08:00
Andy | アンディ
f3a447da69 sm6375-common: Add DT2W Services
DT2W Services feature are finished now
2023-09-07 14:16:18 +08:00
Andy | アンディ
607a67ad90 sm6375-common: Remove unused code 2023-09-07 00:20:58 +08:00
Andy | アンディ
ba7b4bbe64 sm6375-common: sepolicy: Allow system_app
09-05 20:48:18.342  6384  6384 W com.android.settings: type=1400 audit(0.0:93): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_power_default:s0 tclass=binder permissive=0

09-05 20:48:18.382  6384  6384 W com.android.settings: type=1400 audit(0.0:94): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:system_suspend:s0 tclass=binder permissive=0

09-05 20:48:18.666  6384  6384 W com.android.settings: type=1400 audit(0.0:96): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:storaged:s0 tclass=binder permissive=0

09-05 20:48:18.673   593   593 E SELinux : avc:  denied  { find } for pid=6384 uid=1000 name=suspend_control scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_service:s0 tclass=service_manager permissive=0

09-05 20:48:18.674   593   593 E SELinux : avc:  denied  { find } for pid=6384 uid=1000 name=suspend_control_internal scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_internal_service:s0 tclass=service_manager permissive=0

09-05 20:48:18.695   593   593 E SELinux : avc:  denied  { find } for pid=6384 uid=1000 name=tracing.proxy scontext=u:r:system_app:s0 tcontext=u:object_r:tracingproxy_service:s0 tclass=service_manager permissive=0

09-05 20:48:18.702  6384  6384 W com.android.settings: type=1400 audit(0.0:97): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_lineage_health_default:s0 tclass=binder permissive=0
2023-09-06 09:43:38 +08:00
Andy | アンディ
779e212afd sm6375-common: Allow system_susped to read sysfs 2023-09-05 22:37:26 +08:00
Andy | アンディ
92da6c66ff sm6375-common: Reworking on NFC manifest 2023-09-05 22:37:26 +08:00
Andy | アンディ
7ac1c52300 sm6375-common: Set Board Vendor platform 2023-09-05 22:37:26 +08:00
REDGROUL
1c6aede45d sm6375-common: Update nfc interface 2023-09-05 22:37:26 +08:00
Andy | アンディ
d6dfa2b25f sm6375-common: Correct Architecture 2023-09-05 22:37:26 +08:00
chrisl7
af745fc21c sm6375-common: sepolicy: Set stflashtool prop correctly
06-22 19:23:59.519   608   608 I auditd  : type=1400 audit(0.0:17): avc: denied { read } for comm="STFlashTool" name="u:object_r:nfc_prop:s0" dev="tmpfs" ino=11923 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=file permissive=0
06-22 19:23:59.599     1     1 I auditd  : type=1107 audit(0.0:18): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=nfc.fw.dnld_force pid=608 uid=1027 gid=1027 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=property_service permissive=0'

Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:19:57 +07:00
chrisl7
ed5403c49b sm6375-common: sepolicy: Allow huaqin to search vendor_sensors
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:21): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:22): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:23): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125   614   614 I auditd  : type=1400 audit(0.0:24): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:25): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:26): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:27): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149   614   614 I auditd  : type=1400 audit(0.0:28): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:29): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:30): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:31): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169   614   614 I auditd  : type=1400 audit(0.0:32): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:33): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:34): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:35): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189   614   614 I auditd  : type=1400 audit(0.0:36): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:37): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:38): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:39): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209   614   614 I auditd  : type=1400 audit(0.0:40): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:41): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:42): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:43): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229   614   614 I auditd  : type=1400 audit(0.0:44): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:45): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:46): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:47): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249   614   614 I auditd  : type=1400 audit(0.0:48): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:49): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:50): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:51): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273   614   614 I auditd  : type=1400 audit(0.0:52): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:53): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:54): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:55): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293   614   614 I auditd  : type=1400 audit(0.0:56): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:57): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:58): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:59): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313   614   614 I auditd  : type=1400 audit(0.0:60): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0

Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:13:54 +07:00
Akash Srivastava
1fb81e7e84 sm6375-common: rootdir: Chown the cgroup.procs nodes
* Perf-hal tries to access the nodes but requires permissions as reflected in the logs
* 11-10 19:25:50.044  1055  1080 E ANDR-PERF-OPTSHANDLER: Cannot open/create foreground cgroup file

Signed-off-by: CHRISL7 <70589286+CHRISL7@users.noreply.github.com>
Change-Id: I730f8b8bc7cc2b17595cac6130deacbc346d008f
2023-08-25 23:11:29 +07:00
Vishalcj17
542594f725 sm6375-common: ueventd: Change permissions for /dev/diag
[1] - Add override

* Logs spam with error '-13' which basically translates to access
denied/invalid permission.

* Fix this by giving system read and write access.

Before in log:
Diag_Lib:  Diag_LSM_Init: Failed to open handle to diag driver, error
= 13

Change-Id: Ic06b0de0a729052593fb3c703362c5c199f9fd0b
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Signed-off-by: CHRISL7 <70589286+CHRISL7@users.noreply.github.com>
2023-08-25 23:09:51 +07:00
Arvind Kumar
ebefc7846e sm6375-common: rootdir: SoC change to support holi APQ
Change-Id: Iee1d338dfbc4475db4269da030ef7c2859fae7c2
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:07:05 +07:00
chrisl7
d0f2061390 sm6375-common: wifi: Update WCNSS to MOONSTONE
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:06:15 +07:00
Adithya R
ed057fb734 sm6375-common: sepolicy: Permissive recovery only in userdebug/eng
User builds do not allow permissive domains.

Change-Id: Idbf04be9c83fb2f33ac4c592306d790a7d10a36e
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 23:05:49 +07:00
chrisl7
c711db278c sm6375-common: Decommonize neuralnetworks
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: I1d774fd15d92c1963576d259e9d57a3d7b638527
2023-08-25 23:05:30 +07:00
chrisl7
923340df42 sm6375-common: Add missing blobs
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: I37781c92ce94c5ec37d7c24b1862bb5de7bed6cf
2023-08-25 23:01:42 +07:00
chrisl7
30690b8531 sm6375-common: rootdir: Update fstab to MOONSTONE
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: I23a25efb487b6e294164fd1678899444feccb079
2023-08-25 22:57:42 +07:00
chrisl7
9a955b7bd5 sm6375-common: overlay: Fix OEM fast charge sysfs node
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: If261f358d1bcabd544fbd665de1c7c4793d92c9c
2023-08-25 22:56:27 +07:00
chrisl7
67b337afc2 sm6375-common: Add libsoc_helper correctly
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 22:53:24 +07:00
chrisl7
ce285416ad sm6375-common: Add diag-router
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: I91d18ce5471e637ac846d1ffea8b44f5af84226b
2023-08-25 22:52:58 +07:00
chrisl7
9518ee5985 sm6375-common: sepolicy: Import missing sepolicy rules from MOOONSTONE
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: I4d86e532648c8dc5c6d3d85aeffd3203c5fbaf74
2023-08-25 22:48:22 +07:00
Alexander Koskovich
74f4a3d94e sm6375-common: init: Fix "Invalid section keyword found" on ueventd
Change-Id: I8a3eb3abea82feb5e1a92cc859cd6498ee68666e
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 22:45:07 +07:00
chrisl7
50080a9032 sm6375-common: sepolicy: Add missing sepolicy rules
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 22:41:37 +07:00
Adithya R
0d8ec8faf3 sm6375-common: Switch to armv8-2a dotprod
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 22:38:59 +07:00
chrisl7
21a052c217 sm6375-common: Rework Architecture definitions
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 22:38:45 +07:00
chrisl7
fa42f486e2 sm6375-common: Fix wifi symlinks 2023-08-25 22:38:06 +07:00
coduxer
49da079a94 sm6375-common: rootdir: Fix fingerprint goodix events
[1] - this fixing the goodix issue when long press the powerbutton due
annoying kernel events

Change-Id: I8d3e867de2f0c30a46c371a36b691cb9011bd519
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:49:49 +07:00
chrisl7
863611c9ba sm6375-common: sepolicy: Label missing ro.boot definitions
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:45:26 +07:00
chrisl7
bf452d4fb8 sm6375-common: Update doze overlay definition from qcom/common
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:44:55 +07:00
chrisl7
1934074295 sm6375-common: Build missing vendor variant packages
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:44:36 +07:00
chrisl7
c7a431eb87 sm6375-common: Switch to common hardware/xiaomi HAL sensors
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:44:21 +07:00
Adithya R
faf61ff748 sm6375-common: props: Enable ADB by default in non-user builds
User builds shouldn't have adb enabled by default.

Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
2023-08-25 20:44:04 +07:00