77 Commits

Author SHA1 Message Date
CrisBal
4f1bad3122 sepolicy: qti: Label Power Stats HAL
09-27 21:53:52.374   642   642 I hwservicemanager: Since android.hardware.power.stats@1.0::IPowerStats/default is not registered, trying to start it as a lazy HAL (if it's not configured to be a lazy HAL, it may be stuck starting or still starting).
09-27 21:53:52.374   642  4719 W libc    : Unable to set property "ctl.interface_start" to "android.hardware.power.stats@1.0::IPowerStats/default": error code: 0x20
09-27 21:53:52.374  4692  4692 I HidlServiceManagement: getService: Trying again for android.hardware.power.stats@1.0::IPowerStats/default...
09-27 21:53:52.374   642  4719 I hwservicemanager: Tried to start android.hardware.power.stats@1.0::IPowerStats/default as a lazy service, but was unable to. Usually this happens when a service is not installed, but if the service is intended to be used as a lazy service, then it may be configured incorrectly.
09-27 21:53:52.374  4692  4718 I SystemConfig: Reading permissions from /vendor/etc/permissions/android.hardware.se.omapi.ese.xml
09-27 21:53:52.375   642  4721 W libc    : Unable to set property "ctl.interface_start" to "android.hardware.power.stats@1.0::IPowerStats/default": error code: 0x20
09-27 21:53:52.375   642  4721 I hwservicemanager: Tried to start android.hardware.power.stats@1.0::IPowerStats/default as a lazy service, but was unable to. Usually this happens when a service is not installed, but if the service is intended to be used as a lazy service, then it may be configured incorrectly.
2023-10-31 19:00:36 +05:30
sreeshankark
5c2518eb11 sepolicy: qti: Allow hal_sensors_default to open & read oplus proc version
avc:  denied  { open } for  name="prjName" dev="proc" ino=4026531934 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:vendor_proc_oplus_version:s0 tclass=file permissive=0
avc:  denied  { open } for  name="engVersion" dev="proc" ino=4026531944 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:vendor_proc_oplus_version:s0 tclass=file permissive=0
avc:  denied  { read } for  name="prjName" dev="proc" ino=4026531934 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:vendor_proc_oplus_version:s0 tclass=file permissive=0
avc:  denied  { read } for  name="engVersion" dev="proc" ino=4026531944 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:vendor_proc_oplus_version:s0 tclass=file permissive=0
2023-10-31 18:59:28 +05:30
Sukrut4778
83dd99fa11 sepolicy: qti: dontaudit kernel rules
avc: denied { dac_override } for comm="kworker/u17:18" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
avc: denied { dac_override } for comm="kworker/u17:5" capability=1 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=0
2023-10-30 20:55:59 +05:30
sreeshankark
d64a040800 sepolicy: ati: Allow vendor_rmt_storage to open sysfs file 2023-10-30 20:55:59 +05:30
sreeshankark
80b8e19e99 sepolicy: qti: Allow hal_camera_default to open and getattr from vendor_system_prop file 2023-10-30 20:55:59 +05:30
sreeshankark
2983479930 sepolicy: qti: Fix many denials
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:hal_bootctl_default:s0 tcontext=u:r:hal_bootctl_default:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:fsverity_init:s0 tcontext=u:r:fsverity_init:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vendor_modprobe:s0 tcontext=u:r:vendor_modprobe:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vendor_boringssl_self_test:s0 tcontext=u:r:vendor_boringssl_self_test:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:netutils_wrapper:s0 tcontext=u:r:netutils_wrapper:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vendor_msm_irqbalanced:s0 tcontext=u:r:vendor_msm_irqbalanced:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:art_boot:s0 tcontext=u:r:art_boot:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:otapreopt_slot:s0 tcontext=u:r:otapreopt_slot:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:remount:s0 tcontext=u:r:remount:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:update_verifier:s0 tcontext=u:r:update_verifier:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vendor_rfs_access:s0 tcontext=u:r:vendor_rfs_access:s0 tclass=capability
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vendor_hal_usb_qti:s0 tcontext=u:r:vendor_hal_usb_qti:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vendor_irsc_util:s0 tcontext=u:r:vendor_irsc_util:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vendor_hal_perf_default:s0 tcontext=u:r:vendor_hal_perf_default:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vendor_rmt_storage:s0 tcontext=u:r:vendor_rmt_storage:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:profcollectd:s0 tcontext=u:r:profcollectd:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:adbd:s0 tcontext=u:r:adbd:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vendor_netmgrd:s0 tcontext=u:r:vendor_netmgrd:s0 tclass=capability permissive=0
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vendor_dpmd:s0 tcontext=u:r:vendor_dpmd:s0 tclass=capability permissive=0
2023-10-30 20:55:08 +05:30
sreeshankark
4ea2fd9b13 sepolicy: qti: Allow sys_admin permission for vdc
avc:  denied  { sys_admin } for  capability=21  scontext=u:r:vdc:s0 tcontext=u:r:vdc:s0 tclass=capability permissive=0
2023-10-27 18:52:42 +05:30
sreeshankark
10a876db6d sepolicy: qti: Allow hal_sensors_default to search vendor_proc_oplus_version
avc:  denied  { search } for  name="oplusVersion" dev="proc" ino=4026531933 scontext=u:r:hal_sensors_default:s0 tcontext=u:object_r:vendor_proc_oplus_version:s0 tclass=dir permissive=0
2023-10-27 18:50:38 +05:30
UtsavBalar1231
68c41c5489 sepolicy: qti: Grant perms to mount tracefs when CONFIG_DEBUG_FS
avc:  denied  { mounton } for  pid=1 comm="init" path="/sys/kernel/tracing" dev="tracefs" ino=1 scontext=u:r:init:s0 tcontext=u:object_r:debugfs_tracing_debug:s0 tclass=dir permissive=0
2023-10-27 18:50:38 +05:30
sreeshankark
182d42df95 sepolicy: qti: Allow fsck to get attribute from sysfs file
type=1400 audit(0.0:7): avc:  denied  { getattr } for  path="/sys/devices/platform/soc/1d84000.ufshc/host0/target0:0:0/0:0:0:0/block/sda/sda16/partition" dev="sysfs" ino=60454 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
2023-10-27 18:50:38 +05:30
ekkusa
e2dc36f2c6 sepolicy: qti: Address fsck denial
type=1400 audit(1662729171.862:3274): avc: denied { sys_admin } for comm="e2fsck" capability=21 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
type=1400 audit(0.0:9): avc:  denied  { kill } for  capability=5  scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
2023-10-27 18:50:38 +05:30
ekkusa
491aedd063 sepolicy: qti: dontaudit unnecessary fsck rules
[   10.299826] type=1400 audit(16083046.175:3142): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.299842] type=1400 audit(16083046.175:3143): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.299858] type=1400 audit(16083046.175:3144): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.299874] type=1400 audit(16083046.175:3145): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.299889] type=1400 audit(16083046.175:3146): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.299932] type=1400 audit(16083046.175:3147): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.299949] type=1400 audit(16083046.175:3148): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.299964] type=1400 audit(16083046.175:3149): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.299981] type=1400 audit(16083046.175:3150): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.299997] type=1400 audit(16083046.175:3151): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300012] type=1400 audit(16083046.175:3152): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300042] type=1400 audit(16083046.175:3153): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300059] type=1400 audit(16083046.175:3154): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300075] type=1400 audit(16083046.175:3155): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300090] type=1400 audit(16083046.175:3156): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300106] type=1400 audit(16083046.175:3157): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300121] type=1400 audit(16083046.175:3158): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300137] type=1400 audit(16083046.175:3159): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300250] type=1400 audit(16083046.179:3160): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300267] type=1400 audit(16083046.179:3161): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300284] type=1400 audit(16083046.179:3162): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300300] type=1400 audit(16083046.179:3163): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300315] type=1400 audit(16083046.179:3164): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300331] type=1400 audit(16083046.179:3165): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300346] type=1400 audit(16083046.179:3166): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300362] type=1400 audit(16083046.179:3167): avc: denied { dac_read_search } for comm="e2fsck" capability=2 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
[   10.300378] type=1400 audit(16083046.179:3168): avc: denied { dac_override } for comm="e2fsck" capability=1 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0
2023-10-27 18:50:38 +05:30
lupesoltec
91fd2326b1 sepolicy: qti: Fix avc denials related to linkerconfig
avc: denied { kill } for comm="linkerconfig" capability=5 scontext=u:r:linkerconfig:s0 tcontext=u:r:linkerconfig:s0 tclass=capability permissive=0
2023-10-27 18:49:56 +05:30
Immanuel Raj
af51a76c40 sepolicy: qti: : fix vdc denial
avc: denied { kill } for comm="vdc" capability=5 scontext=u:r:vdc:s0 tcontext=u:r:vdc:s0 tclass=capability permissive=0
2023-10-27 18:38:03 +05:30
ShevT
0a78993500 sepolicy: qti: allow init write to proc file
Fix:
avc: denied { write } for comm="init" name="dirty_background_bytes" dev="proc" ino=36058 scontext=u:r:init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0
avc: denied { write } for comm="init" name="dirty_bytes" dev="proc" ino=36059 scontext=u:r:init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=0
2023-10-27 18:38:03 +05:30
sreeshankark
802f874654 sepolicy: qti: allow hal_camera_default to read system_prop file
android.hardwar: type=1400 audit(0.0:16): avc:  denied  { read } for  name="u:object_r:system_prop:s0" dev="tmpfs" ino=10582 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=0
2023-10-27 18:36:53 +05:30
sreeshankark
244521b64e sepolicy: qti: allow vendor_rmt_storage to read sysfs file
rmt_storage: type=1400 audit(0.0:17): avc:  denied  { read } for  name="name" dev="sysfs" ino=58041 scontext=u:r:vendor_rmt_storage:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
2023-10-21 18:51:50 +05:30
Semavi Ulusoy
f0c534137e sepolicy: qti: allow vendor_hal_oplusSensor_default to search block_device
auditd: type=1400 audit(0.0:17): avc: denied { search } for comm="vendor.oplus.ha" name="block" dev="tmpfs" ino=14361 scontext=u:r:vendor_hal_oplusSensor_default:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
2023-10-21 18:46:18 +05:30
Nick Reuter
13fda71aba sepolicy: qti: Label SM4350 partitions
Change-Id: I8d04c70cade862cff2e3fa1148dfa6040db57f53
2023-04-18 15:10:28 +02:00
Michael Bestas
c94a7269fb sepolicy: qti: Resolve vl53l1 denials
Change-Id: If0fc75186bcce23f0b9cc82ae13c37a30f57a26e
2023-04-18 01:12:55 +02:00
Albert Tang
594bc58b61 sepolicy: qti: Add Oppo labels for SM4350
Change-Id: If77a747fdee65c22c6a491d58cf2d23fee639bd3
2023-04-17 14:13:30 -05:00
Albert Tang
d005182f10 sepolicy: qti: Label SM4350 charging sysfs path
Change-Id: Ie8d60494cb7eec9ec67b590d0ecd04663ce7a614
2023-04-17 14:13:22 -05:00
Bruno Martins
4a07f13820 sepolicy: qti: Remove duplicate lahaina wakeup nodes
Needed after I53aad29624e904b092c3cf73d498c735cf2f1b3e

Change-Id: I245c50c6e5c5d93a58cb4fe11e8e3aef3003ae29
2023-03-24 11:51:11 +00:00
Philipp Albrecht
d462ec583d sepolicy: qti: Label SM7250 charging sysfs path
Change-Id: I60fae0b8ec1ef8a3ee88de7a67db5718392539b6
2023-02-28 22:26:26 +01:00
KakatkarAkshay
fbde82d9fa sepolicy: qti: Label SM7250 vibrator node
Change-Id: I67155d9269269aac867eb4f8852b7f496a129ca0
2023-02-28 22:26:26 +01:00
LuK1337
ec719d5ded sepolicy: qti: Label SM7250 wakeup nodes
for i in $(realpath /sys/class/wakeup/*); do if ! echo "$(ls -dZ $i)" | grep -q sysfs_wakeup; then echo genfscon sysfs $(echo $i | sed -e 's|/sys||g' -e 's|wakeup/wakeup.|wakeup|g' -e 's|wakeup[0-9]*|wakeup|g') u:object_r:sysfs_wakeup:s0; fi; done | sort -u

Change-Id: I482a657cb6edfcef92d52981ce2cbe3a0e174a5f
2023-02-28 22:26:26 +01:00
KakatkarAkshay
608aee50e2 sepolicy: qti: Label vendor.oplus.hardware.cameraMDM@1.0-service
As seen on SM7250

Change-Id: I7e942a556b7f18fd30735ba8b4ab5e53ce679ca2
2023-02-28 22:26:26 +01:00
LuK1337
7f301f9342 sepolicy: qti: Label additional SM8350 wakeup nodes
Introduced in A13 kernel.

Change-Id: I7dbf6a8b54290222127513d62859ffe639dea3df
2023-02-22 01:17:25 +01:00
pjgowtham
2ba9d31401 sepolicy: qti: Label ST21 NFC
Change-Id: I98a2db0aed52c227737db88d4f40809970368737
2023-02-22 01:17:25 +01:00
Albert Tang
5dd007e2a4 sepolicy: qti: Label vendor.oplus.hardware.cwb hwservice
Change-Id: Ida57e20d1f733398c3da8673b9c6dd537cbc9205
2023-02-22 01:17:25 +01:00
Albert Tang
6d5818a5e3 sepolicy: qti: Label new display and camera props
Change-Id: I4e410a65bc181d893f5118099af03ef764ccd6d4
2023-02-22 01:17:25 +01:00
LuK1337
969b0f8955 sepolicy: qti: Label vendor.oplus.hardware.cameraextension hwservice
Spotted on OOS 13.

Change-Id: I7ce474a3c8b5356a24d5b60b940a79a5a2d80aa4
2023-02-20 13:09:38 +01:00
Michael Bestas
9f048526d5 sepolicy: qti: Remove duplicate wakeup nodes
Needed after I026cd6930459262c31c401e57444cfe2b60357b7

Change-Id: I0522bafab2605b3d0ab5a147154b32fa9ee3ce37
2023-01-19 16:21:33 +01:00
LuK1337
15d4c81836 sepolicy: qti: Add selinux rules for ams-tof
Change-Id: I003da0e0286fc1e6db13fe5db63d710a5d90015f
2023-01-14 13:17:55 +01:00
Edwin Moquete
7a9d685192 sepolicy: qti: Label additional SM8250 wakeup nodes
Introduced in A13 kernel.

Change-Id: Ie2f567b47a79d8eeb9839d840fb4a08f271256bd
2022-12-22 19:45:34 +01:00
LuK1337
68e353f71e sepolicy: qti: Add rules for stmvl53l1 TOF sensor
Change-Id: I45714c6389c8c60904e0f1094bfb79f701832676
2022-12-21 20:39:55 +01:00
LuK1337
99cfe97b5c sepolicy: qti: Label opproduct partition
Change-Id: If0a3209b07ba2dbddc404be98620fc3cd5867294
2022-12-01 11:45:58 +01:00
AnierinB
cc3c3cbf70 sepolicy: qti: Allow kernel to read vendor_file
There are two ways for the kernel to load iris5.fw. The first way is
via fw_get_filesystem_firmware(), which read iris5.fw directly from the
filesystem using filp_read(). The second way gets FW via ueventd, which
calls request_firmware().

Because the kernel unconditionally calls fw_get_filesystem_firmware()
for iris5, the first way always gets executed. However, the current
sepolicy denies read access to iris5.fw for the kernel, causing this way
to never work. The second way is used only on ioctl(), which would
likely be sent from HWC. Unlike the first way, the second way *does*
work as-is, and since HWC is always started when booting into Android,
we don't have to worry about the first way being broken.

However, HWC doesn't run offline charging mode, so we have to rely on
the first way for that case. Unfortunately, since the first way is
broken, offline charging fails to work properly as a result. As such, we
need to fix that denial to make the first way work again.

Change-Id: Iba43afc5dba1c64d8ced9f374bbf9f0457db3c92
2022-11-21 22:39:29 +00:00
LuK1337
188897b04e sepolicy: qti: Label vendor.nxp.nxpese::INxpEse
Change-Id: I450939fb61d9808e9994c91b6133046112e61dc0
2022-10-24 17:47:18 +02:00
LuK1337
cb0fb344ee sepolicy: qti: Label init.oplus.wifi.sh
As seen on SM8150.

Change-Id: I5908f54d76ddb7a8abc82dfd80311b0eca02fc50
2022-10-22 10:53:45 +02:00
Omkar Chandorkar
2f78330e8b sepolicy: qti: Allow cnss-daemon to access bdwlan.bin
Change-Id: I96375359bf4be92849a7969c4dfa13e13886ff70
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-22 10:41:13 +02:00
Omkar Chandorkar
159cbb52a0 sepolicy: qti: Allow hal_sensors_default to access touchpanel
- required on SM8150

Change-Id: I47360407af4e70b60be27c1f9af46f6db3ce5a5d
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-22 10:15:11 +02:00
Omkar Chandorkar
6c68312124 sepolicy: qti: Label oem_dycnvbk
- As seen on SM8150.

Change-Id: Ia12d1c3789aff80795dd026c7401f2e01f10134f
Signed-off-by: Omkar Chandorkar <gotenksIN@aospa.co>
2022-10-22 12:03:01 +05:30
LuK1337
a746fb97aa sepolicy: qti: Expose vendor_persist_engineer_file
This is necessary for camera_helper_app rules.

Change-Id: I2e675f21bc600e31334f35041de2be182f788b1d
2022-10-11 19:57:11 +02:00
LuK1337
c91027dc05 sepolicy: qti: Label vendor.oplus.hardware.cameraMDM@2.0-service
As seen on SM8150.

Change-Id: I92217d6a588bc8920aa2de048a3dca085cf7f1fe
2022-10-11 19:57:10 +02:00
LuK1337
e4a06d1d09 sepolicy: qti: Allow audio/sensors to handle ultrasound prox
Change-Id: I0c93de7578086ac97eb1ff3110c2bac6afba19c4
2022-10-11 19:57:10 +02:00
LuK1337
d25dfa3834 sepolicy: qti: Add rules for nxpnq330 NFC implementation
As seen on SM8150.

Change-Id: Id73e3ab1abd432d04dcfcc1d101d2a5985de2da0
2022-10-11 19:57:06 +02:00
LuK1337
8b0a3acf45 sepolicy: qti: Label {LOGO,oem_stanvbk} partitions
As seen on SM8150.

Change-Id: Ibd4ac7106de6e03dc24e88df945424525bb5c53c
2022-10-11 19:55:24 +02:00
LuK1337
009684123e sepolicy: qti: Label SM8150 vibrator sysfs path
Change-Id: I80836911f8b15fed6742b69e4ebe307bbdb796f2
2022-10-11 19:55:23 +02:00
LuK1337
f2de507d76 sepolicy: qti: Label SM8150 wakeup nodes
for i in $(realpath /sys/class/wakeup/*); do if ! echo "$(ls -dZ $i)" | grep -q sysfs_wakeup; then echo genfscon sysfs $(echo $i | sed -e 's|/sys||g' -e 's|wakeup/wakeup.|wakeup|g' -e 's|wakeup[0-9]*|wakeup|g') u:object_r:sysfs_wakeup:s0; fi; done | sort -u

Change-Id: I5473d60b40686d0085f291f46d882cac0390ff3d
2022-10-11 19:55:22 +02:00