Commit graph

57 commits

Author SHA1 Message Date
Tashfin Shakeer Rhythm
2de583c358 sdm660-common: rootdir: Do not set permissions for unused block paths
Our device only uses c0c4000.sdhci.

Signed-off-by: Tashfin Shakeer Rhythm <tashfinshakeerrhythm@gmail.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-06-24 08:20:03 +02:00
Mohammed Mirza Mandayappurath Manzoor
aea062f56e sdm660-common: rootdir: Set permissions for KGSL sysfs node
Some KGSL sysfs nodes need to be access controlled. Set proper
permissions for the same.

Change-Id: Idc7e2447d02742074873901c6539f2c6d9d25862
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-10-03 07:38:00 +02:00
Bavyasritha Alahari
ab118a0407 sdm660-common: rootdir: ueventd: Add msm_adsp_sleepmon dev
Provide permissions for msm_adsp_sleepmon dev

Change-Id: I8c2cd12ba4e0e06b2ffc46dbaff9423f9175fdb6
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
Chris Goldsworthy
d517c178e3 sdm660-common: rootdir: ueventd: Make all mem_buf VM files read-only for all
The mem_buf VM files under /dev/mem_buf_vm/ are only ever opened with
O_RDONLY permissions.  Additionally, processes not in the 'system'
group need to be able to open the mem_buf VM files.  Correspondingly,
make the permissions for all of these VM files 444.

Change-Id: Icfb2249c964ccc914db1c904274d9ff40d0f1535
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
Siddharth Gupta
b55ad3db3f sdm660-common: rootdir: ueventd: Add devcoredump sysfs nodes
This change adds the devcoredump sysfs nodes to the ueventd rc
which is used for ramdump collection of remoteprocs.

Change-Id: I7112a1196f343d4398245147d7bcf6650ed34707
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
Chris Goldsworthy
68e4339387 sdm660-common: rootdir: ueventd: Restrict permissions to DMA-BUF heap files to read-only
We currently set all heaps to have RWX permissions of 644. However,
libdmabufheap only opens the heap files as O_RDONLY. Reduce the
permissions to 444 accordingly.

Additionally, stop overriding the default permissions given to the
system, system-uncached and system-secure heaps (which all have RWX
perrmissions of 444).

Change-Id: Icc6159acc494ab169a6d04fd86732c1b126e7b15
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
pavanisr
dc06377327 sdm660-common: rootdir: ueventd: Add msm_audio_ion_cma dev
- to comply with device tree entry

Change-Id: I7fd62a60992352cae2d9fa63a6e2fca223e7848f
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
Patrick Daly
7e95f80cb9 sdm660-common: rootdir: ueventd: Add support for MEM-BUF VMs
The char devices under /dev/mem_buf_vm each represent a
Virtual Machine to which HLOS can transfer or share memory
using an ioctl.

Change-Id: If3546148204e3b1c389975d3ec9aabd265b03012
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
Siddharth Gupta
0db7144732 sdm660-common: rootdir: ueventd: Add permissions for remoteproc nodes
Add permissions for peripheral manager to be able to access remoteproc
nodes in order to boot modem.

Change-Id: I04ab76ef8e17c4b68c2662de57e26499201b8b3d
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
Ashish Jain
8eb5003e09 sdm660-common: rootdir: ueventd: Update ueventd rules and init rc for new audio drivers
Update uventd rules to move new audio drivers to audio group.
Update init rc to move audio sysfs node to audio group.

Change-Id: I9167b5be9825a797cb06e907f188a1490e12b96b
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
Chris Goldsworthy
e95c5905ba sdm660-common: rootdit: ueventd: Add support for DMA-BUF heaps
Give access to /dev/dma_heap, with the same permissions given to
/dev/ion.

Change-Id: I4516f8771a65ee799b0ad033c37368970221325c
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
clarencelol
efae553016 sdm660-common: rootdir: Update init.rc and init.sh
from LA.UM.9.2.1.r1-08000-sdm660.0

Signed-off-by: pix106 <sbordenave@gmail.com>
2022-03-26 11:56:34 +01:00
pix106
f394ee9312 sdm660-common: rootdir: set fingerprint permissions for fpc1020
Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
Subhajeet Muhuri
1da7c15388
sdm660-common: /sys/devices/soc -> /sys/devices/platform/soc
Signed-off-by: Subhajeet Muhuri <subhajeet.muhuri@aosip.dev>
2021-06-07 09:21:11 +06:00
OdSazib
e9bec8a155
sdm660-common: rootdir: Clean up init stuffs 2021-05-18 05:04:03 +06:00
OdSazib
0047cdbf79
sdm660-common: Update common tree and adapt changes
* Adjust with wayne-common
* Switch to standalone extract utils from pa
* Update FCM level to 3
* Move IR Blaster to device specific repo

Co-authored-by: Erfan Abdi <erfangplus@gmail.com>
Co-authored-by: Michael Bestas <mkbestas@lineageos.org>
Signed-off-by: OdSazib <odsazib@gmail.com>
2021-03-21 23:27:59 +06:00
Prerna Kalla
a012e566eb
sdm660-common: rootdir: add permission for /dev/sp_keymaster_ssr
Needed for keymasterd to register spcom server to catch ssr.

Change-Id: I30e4daac9b8b1d15c87e01929072b4d4804b6342
2021-03-07 01:51:46 +06:00
haran
73dd74a16f
sdm660-common: rootdir: Set permission for spidev7.1 IR node 2021-02-20 11:55:48 +06:00
Mohammad Asaad Akram
48a8e97d3e
sdm660-common: ueventd: Allow system permission for RPS sysfs node
Allow system permission for RPS sysfs nodes, so that cnss-daemon,
user space daemon can enable RPS(Receive packet steering) feature.

Change-Id: Iccebc347d959fc8ca35f28cb64e7bcf6b05f341a
CRs-Fixed: 2768237
2021-02-10 09:05:29 +06:00
Isaac J. Manjarres
07798a5cc5
sdm660-common: ueventd.qcom.rc: Add permissions to /dev/membuf
The Trusted UI HAL will need to access /dev/membuf, so allow
system access to /dev/membuf.

Change-Id: I906b856e153f44b11a8b8aa8456080e803495fec
2021-02-10 09:05:29 +06:00
Chris Lew
e34fffe157
sdm660-common: ueventd.qcom.rc: Add mhi diag pipe device rules
Add rule to set permissions for the mhi_*_pipe_4 pipe that sends and
receives diag traffic to external chipsets. These nodes should have rw
access for the system group so the diag-router appplication can access
it.

Change-Id: Ia83ea035d248482790f70cbce7d42b86238ebd11
2021-02-10 09:05:29 +06:00
OdSazib
bdd0d21f13
sdm660-common: Checkout rootdir and init stuffs from caf
* adapt with eas and cleanup unnecessary stuffs
* Fixed offline charging and usb functions

Signed-off-by: OdSazib <odsazib@gmail.com>
2021-02-08 14:06:33 +06:00
Ethan Chen
beb0438736
sdm660-common: Remove wigig components
Change-Id: If730bffdf749f30ddf0dfeec8ce769848b19b17e
2021-01-21 03:26:33 +06:00
OdSazib
653193fee0
sdm660-common: rootdir: Set permissions for nodes used by power HAL
* Reference:
   LineageOS/android_device_essential_mata@958fc78

Change-Id: I35ef4b2fcd83efaf10931f670801c6fc32339ea1
Signed-off-by: OdSazib <odsazib@gmail.com>
2020-12-22 20:57:05 +06:00
Ashish Jain
94677f5db6
sdm660-common: init: Update ueventd rules and init rc for new audio drivers
Update uventd rules to move new audio drivers to audio group.
Update init rc to move audio sysfs node to audio group.

Change-Id: I8e5230e04090b3555e32c0404401dddacea1cd15
2020-10-26 04:25:14 +06:00
Thomas (Wonyoung) Yun
a1008929de
sdm660-common: rootdir: Grant rw permission to hgsl node
qcom: User app needs to open /dev/hgsl node for doorbell enablement.

Change-Id: I9a83e76a441f4001f40ec805bd8081355aa1c79d
2020-10-26 04:25:14 +06:00
melia
3648c48235
qcom : device : Update static iuicc names in device
Update static iuicc names in device to handle dynamic iuicc names

Change-Id: I60f1de9ce14b79714762939dd9ee48c17a9ed123
2020-10-19 11:36:06 +06:00
Stylogey
0d5c6a79f6
sdm660-common: remove improvetouch related stuff
* Not host based touch processing isn't supported by the touchscreen.

Change-Id: Ibc841d8c36eda56e58184286676e1d710ff18392
2020-08-12 02:02:40 +06:00
Wang Han
7508218b60
sdm660-common: ueventd: Don't modify permissions of /dev/hw_random
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:

W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)

AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.

c78a463e87

Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
2020-08-12 02:02:37 +06:00
anirudhr
8d58eb9228
gave system permissions to kgsl-3d0 nodes
gave system permission to kgsl-3d0 nodes for qvrservice
to read and write into the nodes

Change-Id: I207eb9f4915cf538c0b47ce45acb182a7ce95789
2020-08-12 02:02:37 +06:00
Liron Daniel
75bef1e561
sdm660: ueventd.qcom.rc: Add permission to /dev/spu_hal_ssr
Needed for spu HAL service to register on spcom channel for ssr
notifications

Change-Id: I43f070bf9948d4330f9ae05f9d631f2681f75164
2020-02-27 17:01:37 +01:00
Max Weffers
42a78479fc
sdm660: ueventd: Update from from Mi A2 Android 10 release
jasmine-user-10-QKQ1.190910.002-V11.0.4.0.QDIMIXM-release-keys

Change-Id: I11280aa50fdbdd6451cc051d8d6d936f20ebccb3
2020-01-13 14:35:53 +01:00
Gidon Studinski
dd63456a82
common: init: expose /dev/wigig_sensing device node to user space
/dev/wigig_sensing is the entry point to an SPI kernel driver which is a
part of a remote sensing solution using 60GHz HW.

Change-Id: I1b538e0c58ae784997407f91a7647c2188ee7d58
2019-12-16 18:21:06 +01:00
Xiaojun Sang
42583ca43e
sdm660: add aud_pasthru_adsp access for audio
Change-Id: If4cb96e00ccfaff60b08c42d92370cb46fbb9a0e
2019-12-16 18:19:13 +01:00
Li Li
ab75a7b947
sdm660: ueventd.qcom.rc: set permissions for /dev/sp_nvm device
/dev_sp_nvm is used by sp_iar_lib to store CMAC values for spu
 firmware and application

Change-Id: I2ac5f29b66448a526cdbc6a1ccefd5f80066c170
Signed-off-by: Li Li <liil1@codeaurora.org>
2019-11-01 12:18:36 +01:00
Madhanraj Chelladurai
dcf98c87e2
sdm660: Add locSll library and add permissions to device node
Change-Id: Idacac778610699af0f01d65096092328bbe8ac1d
CRs-Fixed: 2413585
2019-10-04 18:53:18 +02:00
Vijayakumar Badiger
0fb9a6b06a
sdm660: gvm bringup changes
Add lcd density hab node permission

Change-Id: If9bfcbf21b0b3933cd2d0f567384de0c4685d044
2019-10-04 18:53:18 +02:00
Amandeep Virk
c2ba47c816
sdm660: qcom: devices: Add iuicc0 and iuicc1 devices
Add iuicc0 and iuicc1 devices that can be opened
by spdaemon to create iuicc0 and iuicc1 channels
respectively and interact with iuicc0 and iuicc1
applications respectively on the Secure Processor.

Change-Id: I2554616073553065416756e23c3e27f2f9c90021
2019-10-04 18:53:18 +02:00
Max Weffers
24d720206a
sdm660-common: Update ueventd from LA.UM.8.2.r1-04000-sdm660.0 2019-09-27 17:13:45 +02:00
Brian Duddie
3b630141b0
sdm660-common: rootdir: Run sensors daemon as system user instead of root
Grant capabilities and change file permissions to allow the sensors.qcom
daemon to start up as the system user/group, rather than running as
root.

Fixes: 63775281
Test: monitor logcat after reboot, confirm no file open errors. Run
QSensorTest, confirm all sensors provide sane data. Confirm that
IMU calibration can read + write its saved settings. Run sensors CTS.
Change-Id: Ib80ea21900d6af6cd34c82c4a63f50c7e0ac18ff
2019-08-15 15:31:17 +02:00
Max Weffers
0c7f0e00a8
sdm660: rootdir: Add missing permission for fpc fingerprint to ueventd
*cleanup order
2019-08-15 15:31:17 +02:00
Max Weffers
c9b398e327
sdm660-common: Update init files from LA.UM.7.2.r1-07400-sdm660.0 2019-08-15 15:27:20 +02:00
GuaiYiHu
c822db2bb2
sdm660-common: rootdir: Add missing changes from miui wayne
Change-Id: If267076b13874c37ee7020e0e7136c668c5aec16
2019-08-14 10:04:12 +02:00
Zhen Kong
f44951c36e
sdm660-common: ueventd.qcom.rc: set permissions of /dev/qce device
To support end-to-end DRM content playback with SG List feature,
android.hardware.drm@1.0-service needs to have access permission
to /dev/qce to map & unmap ION buffer virtual address with HW Crypto
Engine. So, set /dev/qce device permission 0660 and let it be
accessible by user "system" and group "drmrpc".

Change-Id: If9c0ed70acc2bb063344692374f51441fe84eff6
2019-08-14 10:04:11 +02:00
Saranya Chidura
9d39230981
sdm660-common: Set permissions of /dev/byte-cntr device
To support ODL to read data from QDSS, create a custom group
and set permission of byte-cntr device. And also set
permission to coresight-tmc-etr/block_size to enable
byte-cntr feature.

Change-Id: Ic80156667dd7511392d5970ddcbd0fdc43ffffca
Signed-off-by: Saranya Chidura <schidura@codeaurora.org>
2019-08-14 10:04:11 +02:00
Wang Han
6d7b0cda2d
sdm660-common: ueventd: Don't modify permissions of /dev/hw_random
This addresses an underlying problem since /dev/hw_random is used. The
issue is that EntropyMixer, which runs in system_server, needs to read
from /dev/hw_random, but thanks to our qualcomm ueventd, EntropyMixer
can never accress this node, resulting in warnings like this:

W EntropyMixer: Failed to add HW RNG output to entropy pool
W EntropyMixer: java.io.FileNotFoundException: /dev/hw_random (Permission denied)

AOSP ueventd handles this well, so just remove this line to get things
back to stage. This issue was never exposed because Google derps the
logging here, which is already fixed on Pie.

c78a463e87

Change-Id: I42c9aaa8f57306536e51c0a17febad57a5a77581
2019-08-14 10:04:11 +02:00
Vol Zhdanov
a4d2c45881
sdm660-common: rootdir: Add missing dynamic fps node
* otherwise sdm won't access it

Signed-off-by: adi8900 <adrianszymanski242@gmail.com>
Signed-off-by: PIPIPIG233666 <2212848813@qq.com>
Change-Id: I088d64b9ddd07bb2482ac3971d7c559e88043d0b
2019-08-14 10:04:11 +02:00
Sachin Mohan Gadag
0e50196347
sdm660-common: rootdir: Register audio service to system group to access cpu_dma_latency node
Change-Id: Ib832634d74f488ece0879fb05781646b1f4ee7a1
Signed-off-by: PIPIPIG233666 <2212848813@qq.com>
2019-08-14 10:04:11 +02:00
dianlujitao
617998fe55
sdm660-common: Update ueventd from LA.UM.7.2.r1-06900-sdm660.0 2019-08-14 10:04:11 +02:00
Ananth Raghavan Subramanian
abb8e2966e
sdm660-common: ueventd.qcom.rc: Memory offline nodes
Change permission of memory offline nodes so HAL can read

Change-Id: Iba5429d000632ae739548a667027efd53f121d5d
2019-08-14 10:04:11 +02:00