kamikaonashi
0f19893ac5
stone: sepolicy: fix Powerhal
...
allow powerhal to write, open and read
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com >
2024-08-03 02:44:16 +00:00
Sugakesshaa
9cdad36cf4
stone: added sepolicy for powerhal
...
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com >
2024-08-03 02:43:16 +00:00
Arijit78
04976e30ab
stone: Remove duplicate entries from genfs_contexts
...
- Also update kernel link from crdroid in vendorsetup.sh
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com >
2024-07-16 17:55:43 +00:00
kamikaonashi
7591349103
stone: sepolicy: add rules for haptics change
...
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com >
2024-07-06 06:38:32 +00:00
kamikaonashi
b88999e6c4
stone: sepolicy: fix fastcharge path denial
...
05-13 23:40:11.415 1395 1395 W binder:1395_1C: type=1400 audit(0.0:295): avc: denied { open } for path="/sys/devices/platform/soc/4c84000.i2c/i2c-1/1-006a/power_supply/usb/quick_charge_type" dev="sysfs" ino=61529 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_sysfs_usb_supply:s0 tclass=file permissive=0
05-13 23:40:11.417 1395 8245 E BatteryService: Failed to read oem fast charger status path: /sys/class/power_supply/usb/quick_charge_type
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com >
2024-05-17 12:06:09 +00:00
kamikaonashi
df8ffa36ab
stone: sepolicy: fix fastcharge denial warning
...
W fastcharge@1.0-: type=1400 audit(0.0:74): avc: denied { execute_no_trans } for path="/vendor/bin/sh" dev="dm-3" ino=269 scontext=u:r:hal_lineage_fastcharge_default:s0 tcontext=u:object_r:vendor_shell_exec:s0 tclass=file permissive=0
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com >
2024-05-12 17:37:16 +00:00
kamikaonashi
60e7152649
[SQUASH] stone: fastcharge implementation
...
this commit contains following commits to introduce the fastcharge toggle for stone device that use this tree
they were renamed from sm8250-common to stone
sm8250-common: add fastcharge implementation
* Disabling fast charge may be useful for reducing the heat produced by
the device while charging, or for extending the lifespan of the battery
* This commit introduces the fastcharge HIDL, which writes in the node
/sys/class/qcom-battery/restrict_chg
0 or 1 depeding on user selection.
0 means that fastcharge is enabled, while 1 means that fastcharge is
disabled
Change-Id: I369ba9c437b3a83a88c2ce74d603b7d7ddd9cfbb
Signed-off-by: Davide Garberi <dade.garberi@gmail.com >
Signed-off-by: althafvly <althafvly@gmail.com >
6510782439
sm8250-common: fastcharge: Make user setting persistent
Change-Id: I4ff051d6f9685e94022eab32035bfe86a65264b8
Signed-off-by: Davide Garberi <dade.garberi@gmail.com >
e050f0dab0
sm8250-common: fastcharge: Use pragma once
Change-Id: I9a9e193a6f66f045f41394d059af8b71778e8d72
ff8e5f6173
sm8250-common: fastcharge: Migrate to blueprint
Change-Id: I200fd6c685183c98f0815b207adae5aa75a37238
4e0d22f486
sm8250-common: Build fastcharge implementation
Change-Id: I3e6994d2c2f419dc8ce98a060204fda3dd16df81
136d369c4e
sm8250-common: Sepolicy: Label FastCharge more general
7a619945ca
sm8250-common: Sepolicy: Fastcharge: Provide needed permissions
https: //github.com/kamikaonashi/device_xiaomi_sm8250-common/commit/298ff28a2ab9c04f953780958de6a8971a947c51
batterysecret hack
51ebc8de81
Co-Authored-By: Ivan Martynov <johnivan19999@gmail.com >
Co-Authored-By: Bruno Martins <1696148+bgcngm@users.noreply.github.com >
Co-Authored-By: Francescodario Cuzzocrea <bosconovic@gmail.com >
Co-Authored-By: Davide Garberi <dade.garberi@gmail.com >
Co-Authored-By: Mohammed Althaf Thayyil <me@althafvly.com >
Co-Authored-By: blazerpaul15 <107421375+blazerpaul15@users.noreply.github.com >
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com >
2024-05-12 17:34:11 +00:00
kamikaonashi
46ee13c7aa
stone: sepolicy: label fastcharge node
...
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com >
2024-05-12 17:33:34 +00:00
TogoFire
5b6379c879
stone: sepolicy: add audioserver.te
...
to fix audio mods like dolby or viper4fx
2024-05-10 18:49:04 +02:00
kamikaonashi
05456f0cf1
stone:sepolicy: fix hal_lineage_health missmerge
2024-05-09 21:54:02 +02:00
kamikaonashi
71b4d645e0
stone: sepolicy: allow power_supply/usb
2024-05-09 21:53:26 +02:00
kamikaonashi
09a254d358
stone: sepolicy: allow HBM to write brightness
...
this fixes crash of settings when turning on HBM
2024-05-09 12:22:59 +02:00
kamikaonashi
99cf61a642
stone: !fixup ZRAM
...
forgot to add
2024-05-08 17:32:01 +02:00
thepriyanshujangid
a700e32f0c
stone: sepolicy: Import missing adress for Leica Camera
...
Signed-off-by: Arijit78 <sahaarijit2007@gmail.com >
2024-05-08 15:54:52 +02:00
kamikaonashi
897a00a844
stone: sepolicy: fix vendor_radio_prop is not set of
...
fixes:
Error: type "vendor_radio_prop" is not of set: "hwservice_manager_type"
2024-05-08 08:13:57 +02:00
nullptr03
4849edca13
stone: sepolicy: drop vendor_sysfs_charger_supply entry
2024-05-08 07:28:43 +02:00
kamikaonashi
17699aec4f
stone: sepolicy: allow apps to read clock speeds
2024-05-07 23:13:46 +02:00
kamikaonashi
47292224d5
stone: adress sepolicy denials
...
Co-Authored-By: Onett Boots <90538882+onettboots@users.noreply.github.com >
2024-05-07 22:58:32 +02:00
kamikaonashi
7d4c2f09c7
stone: drop duplicate vendor.camera.aux.packagelist
2024-05-07 22:47:27 +02:00
kamikaonashi
fe6f00d73e
sm6375-common: add missing lineage_health sepolicy file
2024-05-07 22:44:48 +02:00
kamikaonashi
17e30d6474
sm6375-common: import XiaomiParts and adapt for stone
...
imported and adapted xiaomiparts from https://github.com/AlphaDroid-devices/device_xiaomi_sm8350-common/tree/alpha-13/parts
with thermal profiles, per app refresh rate, speaker cleaner
2024-05-07 22:40:18 +02:00
Christopher
0596af0bbf
sm6375-common: sepolicy: Allow user apps to read proc/zoneinfo files
...
* lacrima relies on proczone meminfo readings:
07-27 05:18:23.410 21585 21621 E nightwatch-target: /proc/zoneinfo open: errno=13
07-27 05:18:23.410 21585 21621 E nightwatch-target: sysmeminfo parse failed
after failing:
07-27 05:18:16.100 21127 21127 W Lacrima_startup: type=1400 audit(0.0:1546): avc: denied { read } for name="zoneinfo" dev="proc" ino=4026531859 scontext=u:r:untrusted_app:s0:c52,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.instagram.android
07-27 05:18:16.103 21127 21153 W MultiSignalANRDetectorLacrima: Pausing error state checks
07-27 05:18:16.103 894 21490 I sensors-hal: handle_indication_realtime:482, SCHED_FIFO(10) for qmi_cbk
07-27 05:18:16.107 1254 1308 W statsd : StatsPullerManager: Unknown tagId 10005
07-27 05:18:16.107 1254 1308 E statsd : Stats puller failed for tag: 10005 at 30618177112118
07-27 05:18:16.107 1254 1308 W statsd : StatsPullerManager: Unknown tagId 10038
07-27 05:18:16.107 1254 1308 E statsd : Stats puller failed for tag: 10038 at 30618177112118
07-27 05:18:16.110 1254 2381 W statsd : StatsPullerManager: Unknown tagId 10038
07-27 05:18:16.123 3738 4154 I DeviceStatusMonitor: DeviceStatusMonitor.handleBroadcast():123 onReceive() : Action = android.intent.action.SCREEN_ON
07-27 05:18:16.043 21188 21188 W AppInit5: type=1400 audit(0.0:1545): avc: denied { read } for name="zoneinfo" dev="proc" ino=4026531859 scontext=u:r:untrusted_app:s0:c61,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.facebook.katana
08-04 05:51:57.363 21059 21059 W am.android:mqtt: type=1400 audit(0.0:997): avc: denied { open } for path=/proc/zoneinfo dev=proc ino=4026531859 scontext=u:r:untrusted_app:s0:c52,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.instagram.android
08-04 05:50:25.297 20336 20336 W AppInit1: type=1400 audit(0.0:876): avc: denied { open } for path=/proc/zoneinfo dev=proc ino=4026531859 scontext=u:r:untrusted_app:s0:c108,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.facebook.katana
2024-05-07 21:32:40 +02:00
Andy | アンディ
9b7d5329de
sm6375-common: sepolicy: Allow hal_health_default
...
Allow to read sysfs_usb, USB & Charger Supply, Battery info
2024-05-07 21:27:36 +02:00
Andy | アンディ
9a202f1a3b
sm6375-common: Build Lineage Health
2023-09-14 15:20:14 +08:00
Andy | アンディ
3fbc1877d3
Revert "sm6375-common: Allow system_susped to read sysfs"
...
This reverts commit 779e212afd .
2023-09-08 15:44:25 +08:00
Andy | アンディ
37c363c2e7
sm6375-common: sepolicy: Remove hal_lineage_health_default & Unused code
...
Lineage Health Hal: This only available in LineageOS based rom, other rom based on AOSP will get sepolicy error while building
2023-09-08 15:17:36 +08:00
Andy | アンディ
6c04d0d309
sm6375-common: sepolicy: Allow to open kernels wakelock stats
...
09-07 08:10:08.332 628 2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup26 (../../devices/platform/soc/4c84000.i2c/i2c-1/1-006a/power_supply/usb/wakeup26): Permission denied
09-07 08:10:08.341 628 2536 E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup40 (../../devices/platform/soc/soc:charger-manager/power_supply/battery/wakeup40): Permission denied
2023-09-08 15:13:19 +08:00
Andy | アンディ
8c3b9eb1f1
sm6375-common: sepolicy: Mark sys.fp.vendor as exported_system_prop
2023-09-08 15:12:50 +08:00
Andy | アンディ
039618f721
sm6375-common: sepolicy: Allow hal_fingerprint_default to search sysfs_leds
...
07-08 05:12:25.531 1390 1390 I auditd : type=1400 audit(0.0:48): avc: denied { search } for comm="android.hardwar" name="5c1b000.qcom,cci0:qcom,camera-flash@0" dev="sysfs" ino=22785 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=dir permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
f4814cc50a
sm6375-common: sepolicy: Allow vendor_sensors to read huaqin_sysfs (file)
...
07-08 05:12:23.639 632 632 I auditd : type=1400 audit(0.0:34): avc: denied { read } for comm="sscrpcd" name="pcba_config" dev="sysfs" ino=18246 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=file permissive=0
2023-09-08 14:48:34 +08:00
Andy | アンディ
3d09a3ae15
sm6375-common: sepolicy: Allow to set (ro.qc.sdk.audio. & persist.audio.fluence.)
...
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'ro.qc.sdk.audio.ssr' to 'false' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'ro.qc.sdk.audio.fluencetype' to 'fluence' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.voicecall' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.voicerec' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.speaker' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
07-08 05:12:16.032 0 0 E init : Do not have permissions to set 'persist.audio.fluence.voicecomm' to 'true' in property file '/vendor/build.prop': SELinux permission check failed
2023-09-08 14:48:34 +08:00
Andy | アンディ
28f4765010
sm6375-common: sepolicy: Mark ro.factory_mode as exported_default_prop
2023-09-08 14:48:08 +08:00
Andy | アンディ
0c90175e1f
sm6375-common: sepolicy: Mark wifi.pktlog.debug.0.chen as exported_system_prop
2023-09-08 14:47:38 +08:00
Andy | アンディ
2cf7bb4e17
sm6375-common: sepolicy: Don't audit odrefresh to killing process
...
07-07 10:07:50.071 754 754 I auditd : type=1400 audit(0.0:9): avc: denied { kill } for comm="odrefresh" capability=5 scontext=u:r:odrefresh:s0 tcontext=u:r:odrefresh:s0 tclass=capability permissive=0
2023-09-07 14:27:35 +08:00
Andy | アンディ
f3a447da69
sm6375-common: Add DT2W Services
...
DT2W Services feature are finished now
2023-09-07 14:16:18 +08:00
Andy | アンディ
607a67ad90
sm6375-common: Remove unused code
2023-09-07 00:20:58 +08:00
Andy | アンディ
ba7b4bbe64
sm6375-common: sepolicy: Allow system_app
...
09-05 20:48:18.342 6384 6384 W com.android.settings: type=1400 audit(0.0:93): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_power_default:s0 tclass=binder permissive=0
09-05 20:48:18.382 6384 6384 W com.android.settings: type=1400 audit(0.0:94): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:system_suspend:s0 tclass=binder permissive=0
09-05 20:48:18.666 6384 6384 W com.android.settings: type=1400 audit(0.0:96): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:storaged:s0 tclass=binder permissive=0
09-05 20:48:18.673 593 593 E SELinux : avc: denied { find } for pid=6384 uid=1000 name=suspend_control scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_service:s0 tclass=service_manager permissive=0
09-05 20:48:18.674 593 593 E SELinux : avc: denied { find } for pid=6384 uid=1000 name=suspend_control_internal scontext=u:r:system_app:s0 tcontext=u:object_r:system_suspend_control_internal_service:s0 tclass=service_manager permissive=0
09-05 20:48:18.695 593 593 E SELinux : avc: denied { find } for pid=6384 uid=1000 name=tracing.proxy scontext=u:r:system_app:s0 tcontext=u:object_r:tracingproxy_service:s0 tclass=service_manager permissive=0
09-05 20:48:18.702 6384 6384 W com.android.settings: type=1400 audit(0.0:97): avc: denied { call } for comm=4173796E635461736B202336 scontext=u:r:system_app:s0 tcontext=u:r:hal_lineage_health_default:s0 tclass=binder permissive=0
2023-09-06 09:43:38 +08:00
Andy | アンディ
779e212afd
sm6375-common: Allow system_susped to read sysfs
2023-09-05 22:37:26 +08:00
chrisl7
af745fc21c
sm6375-common: sepolicy: Set stflashtool prop correctly
...
06-22 19:23:59.519 608 608 I auditd : type=1400 audit(0.0:17): avc: denied { read } for comm="STFlashTool" name="u:object_r:nfc_prop:s0" dev="tmpfs" ino=11923 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=file permissive=0
06-22 19:23:59.599 1 1 I auditd : type=1107 audit(0.0:18): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=nfc.fw.dnld_force pid=608 uid=1027 gid=1027 scontext=u:r:stflashtool:s0 tcontext=u:object_r:nfc_prop:s0 tclass=property_service permissive=0'
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 23:19:57 +07:00
chrisl7
ed5403c49b
sm6375-common: sepolicy: Allow huaqin to search vendor_sensors
...
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:21): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:22): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:23): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.125 614 614 I auditd : type=1400 audit(0.0:24): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:25): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:26): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:27): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.149 614 614 I auditd : type=1400 audit(0.0:28): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:29): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:30): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:31): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.169 614 614 I auditd : type=1400 audit(0.0:32): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:33): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:34): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:35): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.189 614 614 I auditd : type=1400 audit(0.0:36): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:37): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:38): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:39): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.209 614 614 I auditd : type=1400 audit(0.0:40): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:41): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:42): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:43): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.229 614 614 I auditd : type=1400 audit(0.0:44): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:45): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:46): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:47): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.249 614 614 I auditd : type=1400 audit(0.0:48): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:49): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:50): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:51): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.273 614 614 I auditd : type=1400 audit(0.0:52): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:53): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:54): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:55): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.293 614 614 I auditd : type=1400 audit(0.0:56): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:57): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:58): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:59): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
08-22 22:20:05.313 614 614 I auditd : type=1400 audit(0.0:60): avc: denied { search } for comm="sscrpcd" name="interface" dev="sysfs" ino=18213 scontext=u:r:vendor_sensors:s0 tcontext=u:object_r:huaqin_sysfs:s0 tclass=dir permissive=0
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 23:13:54 +07:00
Adithya R
ed057fb734
sm6375-common: sepolicy: Permissive recovery only in userdebug/eng
...
User builds do not allow permissive domains.
Change-Id: Idbf04be9c83fb2f33ac4c592306d790a7d10a36e
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 23:05:49 +07:00
chrisl7
9518ee5985
sm6375-common: sepolicy: Import missing sepolicy rules from MOOONSTONE
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
Change-Id: I4d86e532648c8dc5c6d3d85aeffd3203c5fbaf74
2023-08-25 22:48:22 +07:00
chrisl7
50080a9032
sm6375-common: sepolicy: Add missing sepolicy rules
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 22:41:37 +07:00
coduxer
49da079a94
sm6375-common: rootdir: Fix fingerprint goodix events
...
[1] - this fixing the goodix issue when long press the powerbutton due
annoying kernel events
Change-Id: I8d3e867de2f0c30a46c371a36b691cb9011bd519
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 20:49:49 +07:00
chrisl7
863611c9ba
sm6375-common: sepolicy: Label missing ro.boot definitions
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 20:45:26 +07:00
chrisl7
c7a431eb87
sm6375-common: Switch to common hardware/xiaomi HAL sensors
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 20:44:21 +07:00
chrisl7
e937e5fe72
sm6375-common: sepolicy: Label AIDL STNFC
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 20:43:34 +07:00
chrisl7
8a2d4c45cc
sm6375-common: sepolicy: Add vibrator sepolicy rules
...
Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com >
2023-08-25 20:43:19 +07:00
Arian
2c629fd249
sm6375-common: Add power HAL extension and use xiaomi-touch to handle dt2w
...
Change-Id: I5c65e0df255853eb2b3018a27ceb807c111bc4df
2023-08-14 06:59:02 +07:00
Arian
6a3993f4b5
sm6375-common: Switch to common qti vibrator aidl
...
Change-Id: I743c3ae426af9b94c35fe36c95c6bc5b31822605
2023-08-13 23:18:37 +07:00