Commit graph

347 commits

Author SHA1 Message Date
pix106
8c0db09a36
Revert "sdm660-common: Use stock poweroff charging animation"
This reverts commit 9492d1fa58.
2024-02-09 09:55:12 +02:00
Max Weffers
4c9dac421a sdm660-common: sepolicy: Grant XiaomiParts access to thermal file
Signed-off-by: pix106 <sbordenave@gmail.com>
2024-01-14 17:19:23 +01:00
Sabar
964f9afff1 sdm660-common: sepolicy: Adjust sepolicy for qti thermal
Co-Authored-By: Clarence K <clarencekuiek@proton.me>
2024-01-14 17:19:23 +01:00
Sabar
cc7186d635 sdm660-common: Switch to QTI Thermal HAL 2024-01-14 17:19:23 +01:00
LuK1337
119e127a3e sdm660-common: sepolicy: isolated_app -> isolated_app_all
Change-Id: I10b09afe41b927875d1f7c37d6fc18b75ae1250a
    Signed-off-by: Immanuel Raj <iamimmanuelraj@gmail.com>
2024-01-14 17:19:23 +01:00
Chenyang Zhong
d19ed7ad06 sdm660-common: sepolicy: allow rild to call qtidataservices_app
avc: denied { call } for comm="DataModule-Loop" scontext=u:r:rild:s0 tcontext=u:r:qtidataservices_app:s0:c221,c256,c512,c768 tclass=binder permissive=0
Change-Id: Ibec0d6e78a823f3a90ec7e166f58dd6b2797db65
Signed-off-by: pix106 <sbordenave@gmail.com>
2024-01-14 17:19:21 +01:00
pix106
ad6391df93 sdm660-common: sepolicy: Drop iorapd_data_file type 2024-01-14 17:18:54 +01:00
pix106
30debb8651 Revert "sdm660-common: sepolicy: Allow system_server to set tethering properties"
This reverts commit 6a0750c77e.
2024-01-14 17:18:54 +01:00
Alcatraz323
c6e458cf31 sdm660-common: sepolicy: don't do anything on untrusted_app
Add untrusted_app_32
2024-01-14 17:18:54 +01:00
pix106
e7e2b335c0 sdm660-common: sepolicy: drop some dontaudit 2024-01-14 17:18:17 +01:00
Alcatraz323
0726c25be8 sdm660-common: correct fs inlinecrypt & label metadata context
* As https://source.android.com/docs/security/features/encryption/file-based said emmc_optimized is a inlinecrypt flavor and can only be applied on emmc 5.2 device which has not been released yet
* Apparently Xiaomi 660 is launched with emmc 5.1 5 years ago and never met the 5.2 spec
* Now really enables inlinecrypt hardware by adding it in mnt_flags
* Use AOSP recommended inlinecrypt_optimized
* Use lazytime for reducing meaningless io
* Label metadata partition

(pix106) i use logdump partition for metadata, not cust

Signed-off-by: pix106 <sbordenave@gmail.com>
2024-01-14 17:18:17 +01:00
Alcatraz323
14aa292b1a sdm660-common: sepolicy: don't do anything on untrusted_app
* allowing any extra permission for "untrustred_app" domain is DANGER
* the "untrustred_app" domain rule should ONLY be defined by aosp
* kill all don't audit except getopt for untrusted_app. it's a tool to show which app are evil, let it show in audit logs

Signed-off-by: pix106 <sbordenave@gmail.com>
2024-01-14 17:18:17 +01:00
pix106
bfa61a3f25 sdm660-common: Cleanup duplicated build recipe & sepolicy 2024-01-14 17:18:17 +01:00
Jaegeuk Kim
1d9c6314b2 sdm660-common: sepolicy: Allow ioctl to zram_swap for performance
This fixes permission denied when setting F2FS_PIN_FILE.

[   46.726131] init: [libfs_mgr]Failed to set pin_file for f2fs: /data/per_boot/zram_swap: Permission denied
[   46.726151] init: [libfs_mgr]Failure of zram backing device file for '/dev/block/zram0'
[   46.726341] type=1400 audit(1601025878.312:17): avc: denied { ioctl } for comm="init" path="/data/per_boot/zram_swap" dev="dm-9" ino=4868 ioctlcmd=0xf50d scontext=u:r:init:s0 tcontext=u:object_r:per_boot_file:s0 tclass=file permissive=0

Bug: 169311165
Signed-off-by: Jaegeuk Kim <jaegeuk@google.com>
Change-Id: I982f70556284ac55d659bae6aff93b84d71e67f0
Signed-off-by: pix106 <sbordenave@gmail.com>
2024-01-14 17:18:17 +01:00
Mimi Wu
29909175c0 sdm660-common: sepolicy: Allow toolbox to rm -rf /data/per_boot
Bug: 147469156
Test: flash full build and find avc errors gone
Change-Id: I22706c63fb13ea2aae0cd9fe8b92edc578fd459e
Signed-off-by: Mimi Wu <mimiwu@google.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2024-01-14 17:18:17 +01:00
Mimi Wu
d593cf85dd sdm660-common: sepolicy: Allow kernel to access /data/per_boot/zram_swap
type=1400 audit(1581485243.256:88): avc: denied { read } for comm="loop29" path="/data/per_boot/zram_swap" dev="dm-9" ino=9820 scontext=u:r:kernel:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=0

Bug: 147469156
Test: flash full build and find avc errors gone
Change-Id: I48d7684ce3b4ca1ada81011b1cab21007c758ba5
Signed-off-by: Mimi Wu <mimiwu@google.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2024-01-14 17:18:17 +01:00
Alcatraz323
e2a76a940f sdm660-common: sepolicy: fix denial for cnss_daemon update
Signed-off-by: pix106 <sbordenave@gmail.com>
2024-01-14 17:18:17 +01:00
Alcatraz323
66b12de781 sdm660-common: CloverParts: sepolicy change from "clover: sepolicy: address bunch of denials"
f2c0736e1d
2023-08-22 08:45:13 +02:00
Alcatraz323
ccab114cee sdm660-common: implement the switch to turn off charging ripple animation
* we may not want that animation when using a charge limiter

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-08-22 08:45:13 +02:00
Alcatraz323
9ab5292b0b sdm660-common: introduce my simple battery management system
* settings page located in Settings -> Battery
* soc-based step charger, jeita thermal charger switch (also done something in kernel)
* add a mode for user always connected with chagrging cable to limit battery around 40% - 60%
* add a switch for user to limit max charge at around 80%

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-08-22 08:45:13 +02:00
Alcatraz323
3bf23bb2d7 sdm660-common: sepolicy: allow system_app to access hall_dev
* 08-12 22:43:25.794  1674  1674 W settings.device: type=1400 audit(0.0:7): avc: denied { search } for name="parameters" dev="sysfs" ino=21188 scontext=u:r:system_app:s0 tcontext=u:object_r:hall_dev:s0 tclass=dir permissive=0

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-08-22 08:45:13 +02:00
pix106
1043c5332c Revert "sdm660-common: sepolicy: let camera hal access system_data_file"
This reverts commit a6984f5866.
2023-08-22 08:44:53 +02:00
pix106
62e1438a10 Revert "sdm660-common: sepolicy: address qti_init_shell proc_watermark_scale_factor denials"
This reverts commit fa6dfc8c13.
2023-08-22 08:44:53 +02:00
Alcatraz323
b8666f9e93 sdm660-common: sepolicy: reset QTI USB sepolicy to legacy ported version
* defined in July -> 8a6b2a503a

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-08-22 08:44:53 +02:00
pix106
345d455797 Revert "sdm660-common: sepolicy: address hal_usb_default sysfs_battery_supply denial"
This reverts commit b8fad83343.
2023-08-22 08:44:53 +02:00
pix106
a8a14b55c8 sdm660-common: sepolicy: cleaning (duplicate permissions, move file from subdir) 2023-08-22 08:44:53 +02:00
Alcatraz323
68c470f248 sdm660-common: sepolicy: address bunch of denials
* suppress bunch of capability denials, they are harmless and managed by aosp, if it should be fixed, aosp will do
* correct some typo

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-08-22 08:44:53 +02:00
Alcatraz323
713803ed1d sdm660-common: sepolicy: add CloverTenInchFrameworksPowerOverlay sepolicy
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-08-22 08:44:53 +02:00
pix106
fdf5e9ee02 sdm660-common: sepolicy: allow hal_capabilityconfigstore_qti_default access to vendor_cap_configstore_dbg_prop
This reverts commit 9b57c96055df0d86b029249c63b23a89f9cc1b4e.
2023-08-22 08:44:53 +02:00
Alcatraz323
5e4faf510c sdm660-common: proprietary: update CNE, DPM, IMS, QMI, RIL blobs
* LA.QSSI.13.0.r1-09700-qssi.0
* Honeywell/hon660/hon660:12/94.00.03/0037:user/release-keys
* sync Hidl manifest version with Hon660 and S62 Pro
* build hostapd_cli(though Android GUI interface does not need this to manage the ap client, we may want to control them from the shell, maybe)
* remove rmt_storage, tftp_server from rootdir script, they are self contained now
* the vendor.qti.tftp.rc is patched with 782ab1966f
* fix cnd denial

Co-authored-by: 1582130940 <1582130940@qq.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-08-22 08:44:53 +02:00
Alcatraz323
acc5b5cbb5 sdm660-common: proprietary: update Mlipay, HotwordEnrollment blobs
* mlipay from lavender QKQ1.190910.002 V12.5.7.0.QFGCNXM
* HotwordEnrollment from blueline-user 12 SP1A.210812.016.C2 8618562 release-keys
* add hotwordenrollment section title
* in order to make a no patched mlipay service, build mtdservice@1.0 hidl interface(not used anyway)

Co-authored-by: 1582130940 <1582130940@qq.com>
Co-authored-by: Sebastiano Barezzi <seba@sebaubuntu.dev>
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-08-22 08:44:53 +02:00
pix106
4c3df924f1 Revert "sdm660-common: sepolicy: allow hal_capabilityconfigstore_qti_default access to vendor_cap_configstore_dbg_prop"
This reverts commit 2b5dfda876.
2023-08-22 08:44:53 +02:00
Alcatraz323
aa160dff7d sdm660-common: sepolicy: cleanup mismatched file & fix bluetooh, fsck denial
* fsck_untrusted(fsck.exfat) is for external sd, and access for sysfs is neverallowed

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-08-22 08:44:53 +02:00
AdarshGrewal
e73b904a69 sdm660-common: sepolicy: Address cameraserver denial
avc: denied { write } for name="property_service" dev="tmpfs" ino=16815 scontext=u:r:cameraserver:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=0
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-06-24 08:20:03 +02:00
Shreedhan003
a6984f5866 sdm660-common: sepolicy: let camera hal access system_data_file
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-06-24 08:20:03 +02:00
pix106
a96be03c56 sdm660-common: sepolicy: label MACE_CPP_MIN_VLOG_LEVEL camera prop 2023-06-24 08:20:03 +02:00
pix106
b8fad83343 sdm660-common: sepolicy: address hal_usb_default sysfs_battery_supply denial 2023-06-24 08:20:03 +02:00
Sabar
20fa9c5207 Revert "sdm660-common: drop IFAA/mliplay completely"
This reverts commit dd6db97ea5.

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-06-24 08:20:03 +02:00
Sabar
8f353501a7 Revert "sdm660-common: sepolicy: drop Mlipay sepolicy"
This reverts commit f5050df60f.

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-06-24 08:20:03 +02:00
pix106
b941e52a77 sdm660-common: sepolicy: drop livedisplay sepolicy rule 2023-05-09 06:36:23 +02:00
sabarop
8c57947a57 sdm660-common: sepolicy: multiple address denials
Coauthored-by: pix106 <sbordenave@gmail.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-05-09 06:36:23 +02:00
Alcatraz323
7791443f94 sdm660-common: use QTI USB 1.3 HAL
* follows vendor/qcom/opensource/usb/vendor_product.mk
* enable full usb function
* partially ported sepolicy_vndr

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-04-02 13:44:41 +02:00
Alcatraz323
35342a285f sdm660-common: switch to android.hardware.usb@1.0-service.basic
* clean up for qti-1.3 working
* staging usb HAL is ACTUALLY SAME as basic 1.0 HAL, totally meaningless

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-04-02 13:44:41 +02:00
Alcatraz323
e9aa976c93 sdm660-common: sepolicy: address newly discovered denials
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-04-02 13:44:41 +02:00
Alcatraz323
1f8bba423f sdm660-common: sepolicy: address denial for hal_fingerprint_sdm660, hal_light_default
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-04-02 13:44:41 +02:00
sabarop
cb5d34ddf3 sdm660-common: Uprev fp to 2.3
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-03-23 19:32:12 +01:00
Stylogey
5182be1445 sdm660-common: DeviceSettings: Add USB fastcharge toggle
Co-authored-by: ronaxdevil <pratabidya.007@gmail.com>
Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
2023-03-23 19:32:12 +01:00
pix106
69d628f826 sdm660-common: sepolicy label /data/gf_data/auth_ratio_database.db 2023-03-20 07:18:06 +01:00
pix106
0d4fea2039 sdm660-common: sepolicy: allow init to ptrace hal_fingerprint_sdm660 process 2023-03-20 07:18:06 +01:00
minaripenguin
6a0750c77e sdm660-common: sepolicy: Allow system_server to set tethering properties
W libc    : Unable to set property "persist.device_config.tethering.bpf_net_maps_enable_java_bpf_map" to "0": error code: 0x18

E SettingsToPropertiesMapper: Unable to set property persist.device_config.tethering.bpf_net_maps_enable_java_bpf_map value '0'

E SettingsToPropertiesMapper: java.lang.RuntimeException: failed to set system property (check logcat for reason)

Signed-off-by: pix106 <sbordenave@gmail.com>
2023-03-20 07:18:06 +01:00