Commit Graph

74 Commits

Author SHA1 Message Date
Arian
2c629fd249 sm6375-common: Add power HAL extension and use xiaomi-touch to handle dt2w
Change-Id: I5c65e0df255853eb2b3018a27ceb807c111bc4df
2023-08-14 06:59:02 +07:00
Arian
6a3993f4b5 sm6375-common: Switch to common qti vibrator aidl
Change-Id: I743c3ae426af9b94c35fe36c95c6bc5b31822605
2023-08-13 23:18:37 +07:00
boedhack99
d7a37267aa sm6375-common: sepolicy: Label different IR HAL for moonstone
* moonstone use lirc0

Change-Id: Id0ca60b64b2894238dc84909900e1d63b37cd44f
2023-07-25 00:03:37 +07:00
boedhack99
9e1cb65ef4 Revert "sm6375-common: Build source QTI vibrator service"
This reverts commit 46efe079a1.
2023-07-21 16:14:25 +07:00
boedhack99
b973985d87 sm6375-common: sepolicy: Remove multiple contexts for haptics
* Duplicate
* Partially reverts commit f4ce238.

Change-Id: I3843b489481edb99cf430fce810da39bc88a2bc0
2023-07-19 17:27:43 +07:00
boedhack99
388f090589 sm6357-common: sepolicy: Update wakeup nodes wakelock
Change-Id: Ie5c608af641824585d96723b26cb8ec9b15483cb
2023-07-19 17:21:53 +07:00
Zinadin Zidan
e5eb29b5b4 sm6375-common: sepolicy: Fix violations to pass VTS
******************************
5 violations found:
camera.                                 u:object_r:vendor_camera_prop:s0
ro.camera.                              u:object_r:vendor_camera_prop:s0
sys.boot.hwc                            u:object_r:vendor_camera_prop:s0
sys.fp.vendor                           u:object_r:vendor_fingerprint_prop:s0
wifi.interface                          u:object_r:wifi_hal_prop:s0
******************************
device/xiaomi/sm6375-common/sepolicy/vendor/property_contexts contains properties
which are not properly namespaced.
This is enforced by VTS, so please fix such offending properties.

Co-authored-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: Ib1065171df107306da27066b0d8d8c444dd3bfe5
2023-07-19 00:51:31 +07:00
chrisl7
1e554bd2a1 sm6375-common: Fix sys.fp.miui.token spam
07-18 21:53:34.773  1463  4222 W libc    : Access denied finding property sys.fp.miui.token
07-18 21:53:34.769  1463  1463 W /vendor/bin/hw/android.hardware.biometrics.fingerprint@2.3-service.xiaomi: type=1400 audit(0.0:274): avc: denied { read } for comm=504F5349582074696D65722031 name=u:object_r:system_prop:s0 dev=tmpfs ino=11254 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0

Signed-off-by: chrisl7 <wandersonrodriguesf1@gmail.com>
Change-Id: Ia0d1629351bf9992115bbd26984d3714bfef0925
2023-07-18 23:27:02 +07:00
boedhack99
90d3ab1fd7 sm6375-common: sepolicy: Add vendor prefix for GF_HAL debug
Change-Id: I832dbda12bd01fc8e8b1f6619dbf97887d8d96c6
2023-07-18 23:19:55 +07:00
boedhack99
f4ce238013 sm6375-common: sepolicy: Label vibrator rules
Change-Id: I2199d930b30e7e405d529c8e90453db3b9f4f15b
2023-07-18 23:17:33 +07:00
Arian
13842eff75 sm6375-common: sepolicy: Add vendor prefix to camera persist file type
Change-Id: Ia42113acb0fcf5667c0b89ecdd7def13681ca0be
Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
Signed-off-by: Jabiyeff <cebiyevanar@gmail.com>
Signed-off-by: HeroBuxx <herobuxx@gmail.com>
2023-07-18 03:56:17 +07:00
boedhack99
80eca2852a sm6375-common: sepolicy: Label f2player sepolicy rules
Change-Id: I4428234012b70c631f7fc1eb92c2c99c9c3dcaa8
2023-07-18 03:51:45 +07:00
Hridya Valsaraju
d51883bb09 sm6375-common: Set PRODUCT_SET_DEBUGFS_RESTRICTIONS
Starting with Android R launched devices, debugfs cannot be mounted in
production builds. In order to avoid accidental debugfs dependencies
from creeping in during development with userdebug/eng builds, the
build flag PRODUCT_SET_DEBUGFS_RESTRICTIONS can be set by vendors to
enforce additional debugfs restrictions for userdebug/eng builds. The
same flag will be used to enable sepolicy neveallow statements to
prevent new permissions added for debugfs access.

Test: build, boot
Bug: 184381659
Change-Id: I45e6f20c886d467a215c9466f3a09965ff897d7e
2023-07-11 00:14:09 +07:00
boedhack99
f7f83e7731 sm6375-common: Switch to source build sensors HAL
Change-Id: Ib0f45b7fc134a1eb71e71c6c54937b40a73625c0
2023-07-10 14:26:15 +07:00
boedhack99
1d45717c58 sm6375-common: sepolicy: Fix sepolicy to read more battery data
* taken from moonstone MIUI V14.0.3.0.TMPMIXM release-keys

Change-Id: I2b7ac396a1fa042ba60060fc3689f1828c575784
2023-07-09 14:04:51 +07:00
boedhack99
e8bc381d90 sm6375-common: sepolicy: Allow health HAL to access battery data
07-09 12:35:52.867   935   935 W health@2.1-serv: type=1400 audit(0.0:262): avc: denied { read } for name=type dev=sysfs ino=66924 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

Change-Id: Ifed1767cfe9f37899b1a1fe9d0e84025cf7b9bc7
2023-07-09 13:51:54 +07:00
boedhack99
e014f66444 sm6375-common: sepolicy: Resolve hwservice for nxpese
Change-Id: Id2f32169fb5b89eebe8730e1a61a47c8cd3ed889
2023-07-08 15:54:05 +07:00
boedhack99
466ff758f2 Revert "sm6375-common: sepolicy: Define nfc hwservice sepolicy"
This reverts commit 5d3611543e.
2023-07-08 15:44:49 +07:00
boedhack99
5d3611543e sm6375-common: sepolicy: Define nfc hwservice sepolicy
Change-Id: Ib0f5a3d792312c4eda5877947622edb7fa1ead6d
2023-07-08 15:43:46 +07:00
boedhack99
28c8ba1244 sm6375-common: sepolicy: Remove duplicate sepolicies
Change-Id: I97b78ba77e4f944fb34a561ac34e83b6f60f9a64
2023-07-08 02:31:00 +07:00
boedhack99
70f3993c46 sm6375-common: sepolicy: Label st.nfc sepolicy rules
* moonstone use st.nfc hals

Change-Id: Id6cabcd114f1cde10b848df425686fc33b19f3fb
2023-07-08 02:19:48 +07:00
boedhack99
46efe079a1 sm6375-common: Build source QTI vibrator service
Change-Id: I72e89874d93af481ba0c84804c54903b8cd3133c
2023-07-05 02:59:09 +07:00
UtsavBalar1231
8618b9b7e9 sm6375-common: sepolicy: Allow hvdcp to write to /dev/kmsg
[   11.115803] type=1400 audit(1654349199.951:104): avc: denied { write } for comm=hvdcp_opti name=kmsg dev=tmpfs ino=11054 scontext=u:r:vendor_hvdcp:s0 tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0

Change-Id: I28ad2076bda1f336539fc850756c725394f403bf
2023-07-05 02:59:09 +07:00
Peter Cai
140cb9d3b0 sm6375-common: sepolicy: Make recovery permissive
Change-Id: I5b273c9c10b7c69df82fdf1c5c341385abddfec2
2023-07-05 02:59:09 +07:00
ghostrider-reborn
d49bf5fde6 sm6375-common: Define OEM fast charge sysfs node
* required for oem fast charger detection
 * this forces android to display "charging rapidly" whenever our
   proprietary 33w charger is connected, based on the value of
   this node (0/1)

Change-Id: I5094dfcd721a56e3ede62b16cdf187c898bdedf2
2023-07-05 02:59:09 +07:00
Jackeagle
1779f36fec sm6375-common: sepolicy: Address camera prop denials
E libc    : Access denied finding property "vendor.camera.aux.packagelist"
E libc    : Access denied finding property "vendor.camera.aux.packageblacklist"
2023-07-05 02:59:09 +07:00
Kshitij Gupta
ed151f16ad sm6375-common: sepolicy: dontaudit untrusted_app to open ashmem_device
- Fixes scroll lag in many apps, such as Twitter:
    W RenderThread: type=1400 audit(0.0:12371): avc: denied { open } for path=/dev/ashmem dev=tmpfs ino=10848 scontext=u:r:untrusted_app:s0:c123,c256,c512,c768 tcontext=u:object_r:ashmem_device:s0 tclass=chr_file permissive=0 app=com.twitter.android
- Apps are no longer allowed open access to /dev/ashmem, unless they
  target API level < Q.
  (8b12ff5f21)
2023-07-05 02:59:09 +07:00
nnippon99
784a053951 sm6375-common: sepolicy: fixup some_proses_hal_files
Signed-off-by: nnippon99 <adamayyad1999@hotmail.com>
2023-07-05 02:59:09 +07:00
nnippon99
c4ef298dd6 sm6375-common: sepolicy: label audio sysfs_wakeup node
E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup135 (../../devices/platform/soc/soc:qcom,msm-audio-apr/soc:qcom,msm-audio-apr:qcom,q6core-audio/soc:qcom,msm-audio-apr:qcom,q6core-audio:sound/Listen 2 Audio Service/wakeup/wakeup135): Permission denied

Signed-off-by: nnippon99 <adamayyad1999@hotmail.com>
2023-07-05 02:59:09 +07:00
nnippon99
5aba25ec6e sm6375-common: sepolicy: address qr code denial
Signed-off-by: nnippon99 <adamayyad1999@hotmail.com>
2023-07-05 02:59:09 +07:00
nnippon99
9721283f0e sm6375-common: sepolicy: fix MiuiCamera denial
avc: denied { read } for name="com.xiaomi.dcal.wu.data" dev="dm-32" ino=1379 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:vendor_camera_data_file:s0 tclass=file permissive=0 app=com.android.camera
Signed-off-by: nnippon99 <adamayyad1999@hotmail.com>
2023-07-05 02:59:09 +07:00
EndCredits
483962c2f1 sm6375-common: sepolicy: Allow perf hal to set { stop/irq_balance } props 2023-07-05 02:59:09 +07:00
Beru Hinode
f108a45c9e sm6375-common: sepolicy: Address a denial related to fast charge overlay
Signed-off-by: nnippon99 <adamayyad1999@hotmail.com>
2023-07-05 02:59:09 +07:00
nnippon99
546e0114a9 sm6375-common: sepolicy: address ro.miui.build.region denial
Signed-off-by: nnippon99 <adamayyad1999@hotmail.com>
2023-07-05 02:59:09 +07:00
nnippon99
e22b86c0c7 Revert "sepolicy: Make fastrpc_shell_3 publicly available"
This reverts commit 503d7c4cb5c60d1ea9ec0fbcdcfbb752faa71e13.

Change-Id: I0ec697cb8a26b9cf311bd96fb59edfdb6b0fe551
2023-07-05 02:59:09 +07:00
Arian
13fc1e36c2 sm6375-common: Move to common sensors multihal
Change-Id: Iba4df5ebb5d653cb2d3f68fce9e682d946d20935

Change-Id: I0cd62a7487b5b6188e95f318804fdb9ab7828822
2023-07-05 02:59:09 +07:00
Adithya R
75414e8a7b sm6375-common: Switch back to HWC for brightness control
Analysis of disassembled code in IDA revealed that the stock
libsdmcore is just writing the brightness to a custom sysfs node
in mi_display. Bind mount the real brightness node to that so it
gets written to the real node instead.

Change-Id: I3aa840e50b7a067667b949b0ba1f36d187602547
2023-07-05 02:59:09 +07:00
nnippon99
26be43ff39 [SQUASH] sm6375-common: sepolicy: Address more denials
* This is a squash commit from nnippon99:thirteen

veux: Address some missing denials

veux: Address wcnss denials

veux: Set ro.product.mod_device correctly and label sepolicy for it
* Proper set ro.product.mod_device depending on variant
* This needed for MIUICamera to work

veux: Add support for MiuiCamera!

veux: sepolicy: allow last_kmsg and fix denial
W init    : type=1400 audit(0.0:7): avc: denied { setattr } for name="last_kmsg" dev="proc" ino=4026532174 scontext=u:r:init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0

W BootReceiver: cannot read last msg
W BootReceiver: java.io.FileNotFoundException: /proc/last_kmsg: open failed: EACCES (Permission denied)
W BootReceiver:	at libcore.io.IoBridge.open(IoBridge.java:574)
W BootReceiver:	at java.io.FileInputStream.<init>(FileInputStream.java:160)
W BootReceiver:	at android.os.FileUtils.readTextFile(FileUtils.java:637)
W BootReceiver:	at com.android.server.BootReceiver.logFsShutdownTime(BootReceiver.java:649)
W BootReceiver:	at com.android.server.BootReceiver.logBootEvents(BootReceiver.java:305)
W BootReceiver:	at com.android.server.BootReceiver.-$$Nest$mlogBootEvents(Unknown Source:0)
W BootReceiver:	at com.android.server.BootReceiver$1.run(BootReceiver.java:139)
W BootReceiver: Caused by: android.system.ErrnoException: open failed: EACCES (Permission denied)
W BootReceiver:	at libcore.io.Linux.open(Native Method)
W BootReceiver:	at libcore.io.ForwardingOs.open(ForwardingOs.java:563)
W BootReceiver:	at libcore.io.BlockGuardOs.open(BlockGuardOs.java:274)
W BootReceiver:	at libcore.io.IoBridge.open(IoBridge.java:560)
W BootReceiver:	... 6 more

veux: sepolicy: Fix logspam
* This is a SQUASH commit for multiple commits for fixing some logspam

veux: sepolicy: Label more sysfs wakeup nodes

veux: sepolicy: Label more graphics nodes
E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon3/name not found
E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon2/name not found
E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon1/name not found
E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon0/name not found

veux: sepolicy: address radio.qcriNvOpt hwservice denial

veux: sepolicy: Allow user apps to read proc/zoneinfo files

* E nightwatch-target: /proc/zoneinfo open: errno=13
* E nightwatch-target: sysmeminfo parse failed

* avc: denied { read } for name="zoneinfo" dev="proc" ino=4026531859 scontext=u:r:untrusted_app:s0:c61,c257,c512,c768 tcontext=u:object_r:proc_zoneinfo:s0 tclass=file permissive=0 app=com.facebook.katana

veux: sepolicy: Fix Build errors

veux: sepolicy: Resolve qemu_hw_prop denial

avc: denied { read } for name="u:object_r:qemu_hw_prop:s0" dev="tmpfs" ino=1316 scontext=u:r:system_app:s0 tcontext=u:object_r:qemu_hw_prop:s0 tclass=file permissive=0

veux: sepolicy: Fix isolated_app denial

avc: denied { setattr } for comm="CrUtilityMain" name="commands.json" dev="mmcblk0p42" ino=1251111 scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c153,c256,c512,c768 tclass=file permissive=0
avc: denied { setattr } for comm="CrUtilityMain" name="commands.json" dev="mmcblk0p42" ino=1251111 scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c153,c256,c512,c768 tclass=file permissive=0
avc: denied { setattr } for comm="CrUtilityMain" name="f2" dev="mmcblk0p42" ino=1251128 scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c153,c256,c512,c768 tclass=file permissive=0
avc: denied { setattr } for comm="CrUtilityMain" name="f2" dev="mmcblk0p42" ino=1251128 scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c153,c256,c512,c768 tclass=file permissive=0

veux: Label some radio property
W libc    : Unable to set property "ro.vendor.ril.svlte1x" to "false": error code: 0xb
W libc    : Unable to set property "ro.vendor.ril.svdo" to "false": error code: 0xb

veux: prop: set some props and fix log
W libc    : Unable to set property "ro.telephony.call_ring.multiple" to "false": error code: 0xb
W libc    : Unable to set property "ro.vendor.ril.svlte1x" to "false": error code: 0xb
W libc    : Unable to set property "ro.vendor.ril.svdo" to "false": error code: 0xb

veux: sepolicy: fix some denials
* Rearranges sepolicy/vendor/genfs_contexts properly too

W libc    : Access denied finding property "ro.miui.singlesim"
W libc    : Access denied finding property "ro.product.marketname"
W libc    : Access denied finding property "ro.miui.ui.version.code"
W libc    : Access denied finding property "ro.hardware.chipname"
W libc    : Access denied finding property "ro.vendor.aware_available"
W libc    : Access denied finding property "ro.vendor.gfx.32bit.target"

W libc    : Access denied finding property 'wifi.interface'

W binder:2540_3: type=1400 audit: avc: denied { open } for path="/dev/__properties__/u:object_r:vendor_aware_available_prop:s0" dev="tmpfs" ino=1946 scontext=u:r:system_app:s0 tcontext=u:object_r:vendor_aware_available_prop:s0 tclass=file permissive=0

E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup63 (../../devices/virtual/misc/msm_g711mlaw/wakeup63): Permission denied

E android.system.suspend@1.0-service: Error opening kernel wakelock stats for: wakeup58 (../../devices/virtual/misc/msm_amrwb/wakeup58): Permission denied

veux: sepolicy: Allow perf hal to read graphics composer
W/perf@2.2-servic(882): type=1400 audit(0.0:120396): avc: denied { search } for name="880" dev="proc" ino=394316 scontext=u:r:vendor_hal_perf_default:s0 tcontext=u:r:hal_graphics_composer_default:s0 tclass=dir permissive=0

veux: sepolicy: fix denial
avc: denied { read } for comm="e2fsck" name="sde26" dev="tmpfs" ino=15571 scontext=u:r:fsck:s0 tcontext=u:object_r:vendor_custom_ab_block_device:s0 tclass=blk_file permissive=0
avc: denied { read write } for comm="e2fsck" name="sde26" dev="tmpfs" ino=15571 scontext=u:r:fsck:s0 tcontext=u:object_r:vendor_custom_ab_block_device:s0 tclass=blk_file permissive=0

veux: sepolicy: Fix avc denials related to vendor/toolbox.te
avc: denied { kill } for comm="mkswap" capability=5 scontext=u:r🧰s0 tcontext=u:r🧰s0 tclass=capability permissive=0

veux: sepolicy: Resolve system_app denial

veux: sepolicy: KANG missing entries from sm8350-common

Signed-off-by: nnippon99 <adamayyad1999@hotmail.com>
Change-Id: Ica2495d4c2833b0c0509db802115ca720cc7511a
2023-07-05 02:59:01 +07:00
Tri Vo
ffa3258380 sm6375-common: sepolicy: Neverallow app open access to /dev/ashmem
- Fixes scroll lag in apps such as twitter etc.

Apps are no longer allowed open access to /dev/ashmem, unless they
target API level < Q.

Bug: 113362644
Test: device boots, Chrome, instant apps work
Signed-off-by: Ahmad Rulim <personal@rulim34.dev>
2023-06-30 20:18:49 +07:00
Michael Bestas
465da3b8b8 sm6375-common: sepolicy: Remove duplicate wakeup nodes
Needed after I026cd6930459262c31c401e57444cfe2b60357b7

Change-Id: I0522bafab2605b3d0ab5a147154b32fa9ee3ce37
Signed-off-by: Ahmad Rulim <personal@rulim34.dev>
2023-06-30 20:18:17 +07:00
Ahmad Rulim
038874ac3c sm6375-common: sepolicy: Move vendor property context to vendor folder
Also label and rename camera prop

Signed-off-by: Ahmad Rulim <personal@rulim34.dev>
2023-06-30 20:17:41 +07:00
Michael Bestas
b58a74ac4f sm6375-common: sepolicy: Fix fingerprint labels
Also incorporate fix from 839b9cd5a2 (commitcomment-99088748)

Change-Id: I66188247ce9268929763236c0ac2fa483273f1cc
Signed-off-by: Ahmad Rulim <personal@rulim34.dev>
2023-06-30 20:16:57 +07:00
Ramii Ahmed
5764745153 sm6375-common: sepolicy: Label goodix debug fingerprint properties
* W libc    : Access denied finding property "gf.debug.dump_talog_data"
* W fingerprint@2.3: type=1400 audit(0.0:689): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=1797 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0

Signed-off-by: Ahmad Rulim <personal@rulim34.dev>
2023-06-30 20:14:29 +07:00
Ahmad Rulim
bb6f15f04a sm6375-common: sepolicy: Label more camera props
* W libc    : Access denied finding property "ro.camera.res.fmq.size"
  W libc    : Unable to set property "vendor.camera.sensor.rearMain.fuseID" to "sunn001206141BC64DB800000000000000000000000000000000000000000000": error code: 0x18
  W libc    : Unable to set property "vendor.camera.sensor.rearMain.fuseSnID" to "": error code: 0x18
  W libc    : Unable to set property "vendor.camera.sensor.frontMain.fuseID" to "sunn00321F160A011A1E0F1C0404080001252B81000000000000000000000000": error code: 0x18
  W libc    : Unable to set property "vendor.camera.sensor.frontMain.fuseSnID" to "": error code: 0x18
  W libc    : Unable to set property "vendor.camera.sensor.rearMacro.fuseID" to "ofil00220F1A4230373235394130000000000000000000000000000000000000": error code: 0x18
  W libc    : Unable to set property "vendor.camera.sensor.rearMacro.fuseSnID" to "": error code: 0x18
  W libc    : Unable to set property "vendor.camera.sensor.rearUltra.fuseID" to "aaca002217203553320202110E0B620000000000000000000000000000000000": error code: 0x18
  W libc    : Unable to set property "vendor.camera.sensor.rearUltra.fuseSnID" to "": error code: 0x18
  W provider@2.4-se: type=1400 audit(0.0:153): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=11118 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
  W /system/bin/init: type=1107 audit(0.0:144): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.camera.sensor.rearMain.fuseID pid=9788 uid=1047 gid=1005 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0'
  W /system/bin/init: type=1107 audit(0.0:145): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.camera.sensor.rearMain.fuseSnID pid=9788 uid=1047 gid=1005 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0'
  W /system/bin/init: type=1107 audit(0.0:146): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.camera.sensor.frontMain.fuseID pid=9788 uid=1047 gid=1005 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0'
  W /system/bin/init: type=1107 audit(0.0:147): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.camera.sensor.frontMain.fuseSnID pid=9788 uid=1047 gid=1005 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0'
  W /system/bin/init: type=1107 audit(0.0:148): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.camera.sensor.rearMacro.fuseID pid=9788 uid=1047 gid=1005 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=0'

Signed-off-by: Ahmad Rulim <personal@rulim34.dev>
2023-06-30 20:13:58 +07:00
Arian
b6fe0414f1 sm6375-common: sepolicy: Allow camera hal to read mnt_vendor_file
This is necessary to find the dualcamera calibration in persist

Change-Id: I89d5d7839e13aeb2f5373b8bdc2e03830407cfb0
Signed-off-by: Ahmad Rulim <personal@rulim34.dev>
2023-06-30 20:13:24 +07:00
Ahmad Rulim
1c21542d64 sm6375-common: sepolicy: Label soc:fpc1020/wakeup_enable
* W fingerprint@2.3: type=1400 audit(0.0:159): avc: denied { write } for name="wakeup_enable" dev="sysfs" ino=46603 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs_wakeup:s0 tclass=file permissive=0

Signed-off-by: Ahmad Rulim <personal@rulim34.dev>
2023-06-30 20:12:55 +07:00
Ahmad Rulim
33d14449b7 sm6375-common: Reformat sepolicy file
Signed-off-by: Ahmad Rulim <personal@rulim34.dev>
Change-Id: I863a8276214eb7c3060572ee3f0cfddcbf1e90e8
2023-06-30 17:49:14 +07:00
Kevin F. Haggerty
8c3313fca4 sm6375-common: sepolicy: Allow system_app to read /proc/pagetypeinfo
avc: denied { read } for name="pagetypeinfo" dev="proc" ino=4026543033
scontext=u:r:system_app:s0 tcontext=u:object_r:proc_pagetypeinfo:s0
tclass=file permissive=0

Change-Id: I16465eb9acca9ff64a755d47f86f4ff424ebe4de
2023-06-30 17:39:00 +07:00
UtsavBalar1231
be3cd0ee39 sm6375-common: sepolicy: Grant perms to mount tracefs when CONFIG_DEBUG_FS
avc:  denied  { mounton } for  pid=1 comm="init" path="/sys/kernel/tracing"
dev="tracefs" ino=1 scontext=u:r:init:s0 tcontext=u:object_r:debugfs_tracing_debug:s0 tclass=dir permissive=0

Change-Id: Ia71539ff4b622d5130f2051e8ae490f3b7a4722b
2023-06-30 17:37:45 +07:00
kleidione Freitas
a14c8f3254 sm6375-common: sepolicy: Add more genfs contexts label
Signed-off-by: kleidione <kleidione@gmail.com>
2023-06-30 17:35:37 +07:00