Commit graph

1029 commits

Author SHA1 Message Date
asmallbit
51b24b16b4
sdm710-common: sepolicy: Add SELinux policy for odrefresh
odrefresh: type=1400 audit(0.0:192095): avc: denied { open } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

Signed-off-by: Mikazuuu07 <irfn4566@gmail.com>
Signed-off-by: wulan17 <galihgustip@gmail.com>

Change-Id: I51eb0f55430673cce7e87882765aa335096c687d
2023-11-21 20:39:52 +02:00
boedhack99
22156aae16
sdm710-common: sepolicy: Allow odrefresh to kill
* avc: denied { kill } for comm=odrefresh capability=5
scontext=u:r:odrefresh:s0 tcontext=u:r:odrefresh:s0 tclass=capability
permissive=0

Change-Id: Id24f51e8570dcb32a6b35c57c8f4b6c2be626673
2023-11-21 20:38:20 +02:00
Shreedhan003
bc8800d6dc
sdm710-common: props: Move to system init: Do not have permissions to set 'persist.device_config.runtime_native_boot.iorap_readahead_enable' to 'true' in property file '/vendor/build.prop': SELinux permission check failed 2023-11-21 20:31:18 +02:00
tImIbreakdown
e4c27418ef
sdm710-common: sepolicy: allow tee to read persist_file link for qseecomd
* W qseecomd: type=1400 audit(0.0:26131): avc: denied { read } for name="persist" dev="mmcblk0p27" ino=43
  scontext=u:r:tee:s0 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0

Change-Id: If830be30b4f8c64c7d0260c0a009149e3aba8668
2023-11-21 20:20:00 +02:00
SebaUbuntu
60d42efd08
sdm710-common: sepolicy: Label logdump partition in qcom sepolicy
Change-Id: I9c0678257ad21480581b30431dfcf3a5cd215bfd
Signed-off-by: kaderbava <ksbava7325@gmail.com>
2023-11-21 20:13:59 +02:00
Randall Huang
20869d2170
sdm710-common: fstab: data=journal,commit=1 for /metadata
Since Ext4 doesn't implement "-o sync", it commits metadata at every 5 secs.
This may cause /metadata corruption.

Bug: 162883014
Change-Id: Icd38754bad1b1529d01165ea8c703c214d20bb4b
2023-11-21 20:10:25 +02:00
johnmart19
e4fb9c52d3
sdm710-common: Build android.hardware.media.omx
android.hardware.media.omx@1.0-service: Service not available yet

Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: popoA3M <pratyayaborborah@gmail.com>
2023-11-21 20:08:01 +02:00
b2a12a6340
sdm710-common: Update fstab, change logdump path 2023-11-21 20:03:48 +02:00
jonerlin
81e3fa278b
sdm710-common: Address avc denials while vendor_init access vendor_bluetooth_prop
* avc:  denied  { set } for  scontext=u:r:vendor_init:s0 tcontext=u:object_r:vendor_bluetooth_prop:s0 tclass=property_service
* avc:  denied  { set } for  scontext=u:r:vendor_init:s0 tcontext=u:object_r:vendor_bluetooth_prop:s0 tclass=property_service

Bug: 131149718
Test: Boot up and Turn On/Off Bluetooth
Change-Id: Ifd6bf0a35eafc2513901783b35deed45eed9dac6
2023-11-21 20:00:48 +02:00
Aflaungos
c7fb8c20d2
sdm710-common: sepolicy: Add SELinux policy for flags_health_check
flags_health_ch: type=1400 audit(0.0:192095): avc: denied { open } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { open } for path=/dev/__properties__/u:object_r:ab_update_gki_prop:s0 dev=tmpfs ino=14631 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1

avc: denied { open } for path=/dev/__properties__/u:object_r:adbd_config_prop:s0 dev=tmpfs ino=14632 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:adbd_config_prop:s0 dev=tmpfs ino=14632 scontext=u:r:flags_health_check:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1

Signed-off-by: Mikazuuu07 <irfn4566@gmail.com>
Signed-off-by: wulan17 <galihgustip@gmail.com>
2023-11-21 19:57:23 +02:00
Nippon
17e45ddf64
sdm710-common: sepolicy: Label more graphics nodes 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon3/name not found 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon2/name not found 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon1/name not found 04-18 19:38:42.837 1606 1606 E WiredAccessoryManager: file /sys/devices/platform/soc/soc:qcom,msm-ext-disp/extcon/extcon0/name not found
Signed-off-by: Cykeek <Cykeek@proton.me>
2023-11-21 19:52:12 +02:00
ShevT
a4b84e2a40
sdm710-common: sepolicy: Fix avc denials related to vdc
At reboot:
avc:  denied  { kill } for  comm="vdc" capability=5  scontext=u:r:vdc:s0 tcontext=u:r:vdc:s0 tclass=capability permissive=0

Change-Id: Id9387c43d48192d138370aad2033c5ebb61e2b35
2023-11-21 19:42:55 +02:00
ShevT
791b9834e0
sdm710-common: sepolicy: Fix avc denials related to debugfs_tracing_debug
Change-Id: I07967e3ad7d2b0ebedd2bf2f5b2727c935b67119
2023-11-21 19:42:21 +02:00
ShevT
0a16af1ebf
sdm710-common: sepolicy: Fix avc denials related to fsck
avc:  denied  { kill } for  comm="fsck.f2fs" capability=5  scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0

Change-Id: I8bb2548b6635a58d2bebf0a5f1994188bcf9e3be
2023-11-21 19:40:50 +02:00
LuK1337
52286472cf
sdm710-common: Build libprotobuf-cpp-lite-3.9.1-vendorcompat
Change-Id: I0aac742db9c2b4b3e48ee20158f19405863893c2
2023-11-21 19:33:05 +02:00
iusmac
b77a2922a2
sdm710-common: sepolicy: Address ueventd denials
W ueventd : type=1400 audit(0.0:9): avc: denied { read } for name="/" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
W ueventd : type=1400 audit(0.0:6): avc: denied { getattr } for path="/sys/kernel/debug/show_mem_notifier" dev="debugfs" ino=2235 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:7): avc: denied { getattr } for path="/sys/kernel/debug/fault_around_bytes" dev="debugfs" ino=2234 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:8): avc: denied { getattr } for path="/sys/kernel/debug/sleep_time" dev="debugfs" ino=13337 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:9): avc: denied { getattr } for path="/sys/kernel/debug/suspend_stats" dev="debugfs" ino=13336 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:10): avc: denied { getattr } for path="/sys/kernel/debug/sched_features" dev="debugfs" ino=12438 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs_sched_features:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:11): avc: denied { getattr } for path="/sys/kernel/debug/msm_apr_debug" dev="debugfs" ino=13320 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0

Change-Id: I11ad4ebd0d2d290c5bc601309aad4509d8bd7bc1
Signed-off-by: iusmac <iusico.maxim@libero.it>
2023-11-21 19:31:01 +02:00
baunilla
96c04024e2
sdm710-common: sepolicy: ueventd: Address debugfs denials
avc:  denied  { open } for  pid=412 comm="ueventd" path="/sys/kernel/debug" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { read } for  pid=412 comm="ueventd" name="/" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { relabelfrom } for  pid=412 comm="ueventd" name="ipc_logging" dev="debugfs" ino=3 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { getattr } for  pid=412 comm="ueventd" path="/sys/kernel/debug/show_mem_notifier" dev="debugfs" ino=17459 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1

avc:  denied  { getattr } for  pid=412 comm="ueventd" path="/sys/kernel/debug/wakeup_sources" dev="debugfs" ino=1048 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs_wakeup_sources:s0 tclass=file permissive=1

avc: denied  { relabelto } for  pid=411 comm="ueventd" name="ipc_logging" dev="debugfs" ino=3 scontext=u:r:ueventd:s0 tcontext=u:object_r:qti_debugfs:s0 tclass=dir permissive=1
Change-Id: Id2f04cc9d65dcc5a47fd5f14379d2630736efc0e
Signed-off-by: NFS86 <jarbull86@gmail.com>
2023-11-14 21:45:43 +02:00
Alessandro Astone
907d7e8b6c
sdm710-common: Build and enable fastbootd mode
Change-Id: I7f4246f3f583dcae7b3bfc0d3ae1cf4d577632cb
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
2023-11-12 10:42:15 +02:00
halibw
198d911563
sdm710-common: sepolicy: Allow init to relabelto logdump_partition
Change-Id: I8a3d2c1b0ae6163eb595310e779fa0e74c505da7
2023-11-12 10:37:06 +02:00
Davide Garberi
b0294cf40d
sdm710-common: Reserve size for system partition statically
* With the older flag the system space size was being chosen statically,
  this way only the reserved size for Gapps is static while the whole size
  is being dynamically chosen

Change-Id: Ib9a59ab429f725b2f571c8b1d74cec8bb6ab72dc
2023-11-02 11:30:27 +02:00
5d41efd453
sdm710-common: Drop KProfiles
This reverts commit f8e389999a.
2023-11-02 11:21:05 +02:00
Bruno Martins
a7bcd58d98
sm7325-common: Migrate to restructured sepolicy_vndr
The new folder structure now looks like this:

  device/qcom/sepolicy_vndr
  ├─ legacy-um (meant for sdm845 until sm8350)
  ├─ sm8450
  └─ sm8550

SEPolicy.mk placed in the root automatically redirects devices to the
proper subfolder.

Change-Id: I4ed1a06af779909d64172da294c4a99a3ae9ba0d
2023-11-02 11:21:05 +02:00
Adithya R
6654f22da7
sdm710-common: Switch to full IWLAN mode
[basamaryan: This is needed for Android U to fix RIL]

Signed-off-by: basamaryan <basam.aryan@gmail.com>
Change-Id: Ie3fa610f71077b4ee2af1b4d57bd0c30b34f30fa
2023-11-02 11:21:05 +02:00
COSMIC
f422cc4545
sdm710-common: Remove deleted hals from manifest *Fix: Unable to print HALs from new FCMs: no device HAL manifest. ERROR: No such device: No device manifest file from device or from update package
Co-Authored-by: COSMIC <rayavanindra@gmail.com>
2023-11-02 11:21:05 +02:00
Sakura桜
27ef678a6b
sdm710-common: Use AIDL WiFi service
Fix WiFi issue on Android U
2023-11-02 11:21:03 +02:00
giasen
549291d79f
sdm710-common: permissive selinux 2023-10-29 16:49:20 +02:00
TheStrechh
da66a65c9e
sdm710-common: fstab: add recovery label
* KeyError: '/recovery'
2023-10-29 14:57:50 +02:00
AmeChanRain
3f2c340233
sdm710-common: Drop BOARD_BUILD_SYSTEM_ROOT_IMAGE
* device/lenovo/sdm710-common/BoardConfig.mk:94: error: BOARD_BUILD_SYSTEM_ROOT_IMAGE is obsolete.

* Ref:
  05c0807f2f
2023-10-28 11:23:47 +03:00
bartcubbins
df268abe1a
sdm710-common: Provide android.frameworks.sensorservice@1.0 on vendor
F linker  : CANNOT LINK EXECUTABLE "/vendor/bin/mm-pp-dpps": library "android.frameworks.sensorservice@1.0.so" not found: needed by main executable
2023-10-28 11:17:15 +03:00
mvaisakh
ddbd3a0222
sdm710-common: Copy libprotobuf-cpp-full.so and libprotobuf-cpp-lite.so VNDK prebuilt blobs
* Also Build libprotobuf-cpp-lite-3.9.1-vendorcompat
2023-10-28 11:17:07 +03:00
giasen
945488d2a5
sdm710-common: Enable uncompressed apex 2023-10-28 11:16:54 +03:00
Demon000
63c205630e
sdm710-common: init: Add /boot to fstab
Build process errors out without this.

Traceback (most recent call last):
  File "build/make/tools/releasetools/ota_from_target_files", line 2455, in <module>
    main(sys.argv[1:])
  File "build/make/tools/releasetools/ota_from_target_files", line 2429, in main
    output_file=args[1])
  File "build/make/tools/releasetools/ota_from_target_files", line 1103, in WriteFullOTAPackage
    common.CheckSize(boot_img.data, "boot.img", target_info)
  File "/home/aicp-dev/rom/lineage-17.1/build/make/tools/releasetools/common.py", line 1190, in CheckSize
    p = info_dict["fstab"][mount_point]
KeyError: '/boot'

- also reformat and fix some fstab intendation

Change-Id: I30a396ea62e6e48420c0dd41533c156e90032929
2023-10-27 22:30:21 +03:00
Cyzi7777
e1cc9860f7
sdm710-common: Use fstab.qcom for TARGET_RECOVERY_FSTAB 2023-10-27 22:30:21 +03:00
Chenyang Zhong
30efc06094
sdm710-common: Move super_dummy build to Android.mk
Signed-off-by: Chenyang Zhong <zhongcy95@gmail.com>
2023-10-27 22:30:21 +03:00
me-cafebabe
29f1905334
sdm710-common: Use logdump as metadata partition and mount at the first stage
* logdump seems to be only contain factory logs which is of 2017 and useless for us.
* It's required for DSU
2023-10-27 22:30:21 +03:00
Sarthak Roy
deca8b38a0
sdm710-common: We dont build System as root in Retrofit Dynamic partitions
* build/make/core/config.mk:902: error: BOARD_BUILD_SYSTEM_ROOT_IMAGE cannot be true for devices with dynamic partitions.
2023-10-27 22:30:20 +03:00
P-Salik
860fcdd319
sdm710-common: AndroidBoard: Fix image paths
Signed-off-by: P-Salik <peersalik16@gmail.com>
2023-10-27 22:30:20 +03:00
Tim Zimmermann
59eb184cd4
sdm710-common: Flash dummy super image if needed
* Needed because stock does not use dynamic partitions so
  there's no existing metadata that could be used

Change-Id: Icbc828389465f3d4681ca8e4c3adec782540752e
2023-10-27 22:30:20 +03:00
Roker2
05959f652a
Revert "sdm710-common: releasetools: Fix on incremental updates"
This reverts commit 01254bd847.
2023-10-27 22:30:20 +03:00
me-cafebabe
ef2362021f
sdm710-common: Add system_ext product odm partitions 2023-10-27 22:30:20 +03:00
me-cafebabe
2a7017fc7a
sdm710-common: Specify a non-existent dt directory to avoid using dt fstab 2023-10-27 22:30:20 +03:00
me-cafebabe
ade32dd8dd
sdm710-common: Setup Retrofit Dynamic Partitions 2023-10-27 22:30:18 +03:00
Mathieu Chartier
97763d6310
sdm710-common: Always preopt extracted APKs 2023-10-12 19:01:31 +03:00
Nem1xx
7bd37cdae4
sdm710-common: Set correct TARGET_TAP_TO_WAKE_NODE path 2023-10-12 18:57:22 +03:00
Dakkshesh
f5a3af4e1e
sdm710-common: Grand extra permissions to cellboardcast reciver module
* This fixed:

07-03 16:06:56.231  1788  1981 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to ProcessRecord{c98b797 2313:com.android.systemui/u0a149} (pid=2313, uid=10149) requires android.permission.ACCESS_FINE_LOCATION due to sender android (uid 1001)
07-03 16:06:56.231  1788  1981 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to com.android.cellbroadcastreceiver.module/com.android.cellbroadcastreceiver.CellBroadcastReceiver requires android.permission.READ_PHONE_STATE due to sender android (uid 1001)
07-03 16:06:56.232  1788  1981 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to ProcessRecord{c98b797 2313:com.android.systemui/u0a149} (pid=2313, uid=10149) requires android.permission.ACCESS_FINE_LOCATION due to sender android (uid 1001)
07-03 16:06:56.233  1788  1981 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to com.android.cellbroadcastreceiver.module/com.android.cellbroadcastreceiver.CellBroadcastReceiver requires android.permission.ACCESS_FINE_LOCATION due to sender android (uid 1001)
07-03 16:06:56.233  1788  2760 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcastMultiplePermissions:1272 android.content.Context.sendBroadcastMultiplePermissions:2272 com.android.server.TelephonyRegistry.broadcastServiceStateChanged:3096 com.android.server.TelephonyRegistry.notifyServiceStateForPhoneId:1616 com.android.internal.telephony.ITelephonyRegistry$Stub.onTransact:492
07-03 16:06:56.233  1788  2760 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcastMultiplePermissions:1272 android.content.Context.sendBroadcastMultiplePermissions:2272 com.android.server.TelephonyRegistry.broadcastServiceStateChanged:3100 com.android.server.TelephonyRegistry.notifyServiceStateForPhoneId:1616 com.android.internal.telephony.ITelephonyRegistry$Stub.onTransact:492
07-03 16:06:56.234  1788  1981 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to com.android.cellbroadcastreceiver.module/com.android.cellbroadcastreceiver.CellBroadcastReceiver requires android.permission.READ_PHONE_STATE due to sender android (uid 1001)
07-03 16:06:56.235  1788  1981 W BroadcastQueue: Appop Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to ProcessRecord{c98b797 2313:com.android.systemui/u0a149} (pid=2313, uid=10149) excludes appop android:read_phone_state due to sender android (uid 1001)

Signed-off-by: EndCredits <endcredits@crepuscular-aosp.icu>
Signed-off-by: Dakkshesh <dakkshesh5@gmail.com>
2023-10-11 18:25:42 +03:00
--no-edit=Hemant Sachdeva
493734f9b0
sdm710-common: configs: Allow Phone app to READ_PHONE_STATE
* W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to com.google.android.cellbroadcastreceiver/com.android.cellbroadcastreceiver.CellBroadcastReceiver requires due to sender android (uid 1001) * W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 (has extras) } to ProcessRecord{c7b3bd5 2639:com.android.phone/1001} (pid=2639, uid=1001) requires due to sender android (uid 1001)

Signed-off-by: romgharti <romgharti@gmail.com>
2023-10-11 18:25:24 +03:00
Mudit200408
44971233da
sdm710-common: Enable fastcharge config 2023-10-07 21:39:07 +03:00
Adithya R
fee8733f29
sdm710-common: Disable ART debug and optimize dexpreopt
* don't include debug configs in art
 * use everything filter for dexpreopt (AOSPA/android_vendor_pa@ab5061c)
 * use non-debug dex2oat

Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
Signed-off-by: Jabiyeff <cebiyevanar@gmail.com>
2023-10-07 21:32:07 +03:00
Noah
5814309579
sdm710-common: Build Aperture camera
Signed-off-by: Noah113-Allen <kingfighter2958@gmail.com>
2023-10-07 21:28:55 +03:00
Mayur
2682cc4543
sdm710-common: props: Add sf threshold next vsync from Pixel Google implemented this in source and in Pixels as well since Q. Improves smoothness a little bit.
Signed-off-by: Mayur <ultramayur123@gmail.com>
Signed-off-by: Noah113-Allen <kingfighter2958@gmail.com>
2023-10-07 21:24:07 +03:00