Fork from pix106's tree
sdm660-common: sepolicy: Address qti_init_shell kill denial avc: denied { kill } for comm="init.class_main" capability=5 scontext=u:r:qti_init_shell:s0 tcontext=u:r:qti_init_shell:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address hal_power_default kill and sys_admin denial avc: denied { sys_admin } for comm="android.hardwar" capability=21 scontext=u:r:hal_power_default:s0 tcontext=u:r:hal_power_default:s0 tclass=capability permissive=0 avc: denied { kill } for comm="android.hardwar" capability=5 scontext=u:r:hal_power_default:s0 tcontext=u:r:hal_power_default:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address vdc sys_admin denial avc: denied { sys_admin } for comm="vdc" capability=21 scontext=u:r:vdc:s0 tcontext=u:r:vdc:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address vold_prepare_subdirs sys_admin denial avc: denied { sys_admin } for comm="vold_prepare_su" capability=21 scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address fsck sys_admin denial avc: denied { sys_admin } for comm="e2fsck" capability=21 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0 sdm660-common: sepolicy: address toolbox sys_admin, kill denial avc: denied { sys_admin } for comm="mkswap" capability=21 scontext=u:r:toolbox:s0 tcontext=u:r:toolbox:s0 tclass=capability permissive=0 avc: denied { kill } for comm="mkswap" capability=5 scontext=u:r:toolbox:s0 tcontext=u:r:toolbox:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address ueventd kill and sys_admin denials avc: denied { sys_admin } for pid=460 comm="ueventd" capability=21 scontext=u:r:ueventd:s0 tcontext=u:r:ueventd:s0 tclass=capability permissive=0 avc: denied { kill } for comm="ueventd" capability=5 scontext=u:r:ueventd:s0 tcontext=u:r:ueventd:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address irsc_util sys_admin denial avc: denied { sys_admin } for comm="irsc_util" capability=21 scontext=u:r:irsc_util:s0 tcontext=u:r:irsc_util:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address rfs_access sys_admin denial avc: denied { sys_admin } for comm="tftp_server" capability=21 scontext=u:r:rfs_access:s0 tcontext=u:r:rfs_access:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address rmt_storage sys_admin denial avc: denied { sys_admin } for comm="rmt_storage" capability=21 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address vendor_pd_mapper sys_admin denial sdm660-common: sepolicy: Address vendor_modprobe sys_admin denial avc: denied { sys_admin } for comm="modprobe" capability=21 scontext=u:r:vendor_modprobe:s0 tcontext=u:r:vendor_modprobe:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address adbd sys_admin denial avc: denied { sys_admin } for comm="adbd" capability=21 scontext=u:r:adbd:s0 tcontext=u:r:adbd:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address vendor_dpmd sys_admin denial avc: denied { sys_admin } for comm="dpmd" capability=21 scontext=u:r:vendor_dpmd:s0 tcontext=u:r:vendor_dpmd:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address thermal-engine sys_admin denial avc: denied { sys_admin } for comm="thermal-engine" capability=21 scontext=u:r:thermal-engine:s0 tcontext=u:r:thermal-engine:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address usbd sys_admin denial avc: denied { sys_admin } for comm="usbd" capability=21 scontext=u:r:usbd:s0 tcontext=u:r:usbd:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address vendor_msm_irqbalanced sys_admin denial avc: denied { sys_admin } for comm="msm_irqbalance" capability=21 scontext=u:r:vendor_msm_irqbalanced:s0 tcontext=u:r:vendor_msm_irqbalanced:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address hal_wifi_supplicant_default sys_admin denial avc: denied { sys_admin } for comm="wpa_supplicant" capability=21 scontext=u:r:hal_wifi_supplicant_default:s0 tcontext=u:r:hal_wifi_supplicant_default:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address boringssl_self_test sys_admin denial avc: denied { sys_admin } for pid=460 comm="boringssl_self_" capability=21 scontext=u:r:boringssl_self_test:s0 tcontext=u:r:boringssl_self_test:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address vendor_boringssl_self_test sys_admin denial avc: denied { sys_admin } for pid=462 comm="boringssl_self_" capability=21 scontext=u:r:vendor_boringssl_self_test:s0 tcontext=u:r:vendor_boringssl_self_test:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address linkerconfig sys_admin denial avc: denied { sys_admin } for pid=459 comm="linkerconfig" capability=21 scontext=u:r:linkerconfig:s0 tcontext=u:r:linkerconfig:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address fsverity_init sys_admin denial avc: denied { sys_admin } for comm="fsverity_init" capability=21 scontext=u:r:fsverity_init:s0 tcontext=u:r:fsverity_init:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address migrate_legacy_obb_data sys_admin denial avc: denied { sys_admin } for comm="migrate_legacy_" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0 avc: denied { sys_admin } for comm="rm" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0 avc: denied { sys_admin } for comm="mkdir" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0 avc: denied { sys_admin } for comm="touch" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0 avc: denied { sys_admin } for comm="rm" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0 avc: denied { sys_admin } for comm="rmdir" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0 avc: denied { sys_admin } for comm="log" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address hvdcp sys_admin denial avc: denied { sys_admin } for comm="hvdcp_opti" capability=21 scontext=u:r:hvdcp:s0 tcontext=u:r:hvdcp:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address netmgrd sys_admin denial avc: denied { sys_admin } for comm="netmgrd" capability=21 scontext=u:r:netmgrd:s0 tcontext=u:r:netmgrd:s0 tclass=capability permissive=0 sdm660-common: sepolicy: Address adbroot sys_admin denial avc: denied { sys_admin } for comm="adb_root" capability=21 scontext=u:r:adbroot:s0 tcontext=u:r:adbroot:s0 tclass=capability permissive=0 Signed-off-by: pix106 <sbordenave@gmail.com> |
||
---|---|---|
biometrics | ||
bluetooth | ||
configs | ||
data-ipa-cfg-mgr | ||
DeviceDoze | ||
DeviceSettings | ||
gps | ||
ims | ||
init | ||
ir | ||
libhidl | ||
libqti-perfd-client | ||
libshims | ||
light | ||
org.ifaa.android.manager | ||
overlay | ||
overlay-lineage | ||
power-libperfmgr | ||
properties | ||
rootdir | ||
rro_overlays | ||
seccomp | ||
sepolicy | ||
usb | ||
vndk | ||
.clang-format | ||
Android.bp | ||
Android.mk | ||
BoardConfigCommon.mk | ||
compatibility_matrix.xml | ||
extract-files.sh | ||
framework_manifest.xml | ||
manifest.xml | ||
proprietary-files-ir.txt | ||
proprietary-files.txt | ||
README.md | ||
sdm660.mk | ||
setup-makefiles.sh | ||
update-sha1sums.py |
This repository contains device configuration for Xiaomi-SDM660 devices
Basic | Spec Sheet |
---|---|
CPU | Quad-core 1.84 GHz Qualcomm Kryo 260 LP |
CPU | Quad-core 2.20 GHz Qualcomm Kryo 260 HP |
Chipset | Qualcomm Snapdragon 660, SDM660 |
GPU | Adreno 512 |
ROM | 32/64/128GB |
RAM | 3/4/6GB |
Android | 8.1.0 |
Notes:
- Depends on: android_packages_resources_devicesettings from LineageOS
- Depends on: LA.QSSI.11.0.r1-09100-qssi.0 tag for vendor_codeaurora_telephony
- Depends on: LA.UM.9.6.2.r1-03600-89xx.0 tag for GPS and WFD
Currently Supported Devices:
- clover (MI PAD 4 /4 Plus)
- jason (Redmi Note 3)
- jasmine_sprout (MI A2)
- lavender (Redmi Note 7)
- platina (Mi 8 Lite)
- tulip (Redmi Note 6 Pro)
- wayne (MI 6X)
- whyred (Redmi Note 5)
Copyright
#
# Copyright (C) 2018 The LineageOS Project
# Copyright (C) 2018-2021 Xiaomi-SDM660 Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#