Commit Graph

16 Commits

Author SHA1 Message Date
chaptsand
1676adbf85 sm8550-common: Move to Samsung health AIDL
Change-Id: I7ebd8fe18fdb288042ad87c29e48cbe6ce4e989c
2025-07-15 21:31:25 -03:00
Machad3x
79d2c1287f sm8550-common: sepolicy: Fix offline charging 2025-07-15 21:30:46 -03:00
Machad3x
8d912d2156 sm8550-common: sepolicy: Allow system_server to write to audioserver_tmpfs
This keep spamming.

W CachedAppOptimi: type=1400 audit(0.0:4729): avc:  denied  { write } for  dev="tmpfs" ino=12550 scontext=u:r:system_server:s0 tcontext=u:object_r:audioserver_tmpfs:s0 tclass=file permissive=0
2025-07-15 21:30:46 -03:00
romgharti
9d80421aab sm8550-common: sepolicy: window_service denial
E SELinux : avc:  denied  { find } for pid=5550 uid=10266 name=window scontext=u:r:untrusted_app_30:s0:c10,c257,c512,c768 tcontext=u:object_r:window_service:s0 tclass=service_manager permissive=0
2025-07-15 21:30:46 -03:00
Adithya R
41bb446a75 sm8550-common: sepolicy: Allow system_server to write to tmpfs and zygote tmpfs
This denial is hit frequently on some device(s):

W CachedAppOptimi: type=1400 audit(0.0:146): avc: denied { write } for dev="tmpfs" ino=3073 scontext=u:r:system_server:s0 tcontext=u:object_r:zygote_tmpfs:s0 tclass=file permissive=0

W CachedAppOptimi: type=1400 audit(0.0:7910): avc:  denied  { write } for  dev="tmpfs" ino=1108 scontext=u:r:system_server:s0 tcontext=u:object_r:tmpfs:s0 tclass=file permissive=0

Change-Id: I6a08aa2c042f2d10fdeeefcd1f5f65ac844adf11
2025-07-15 21:30:46 -03:00
Machad3x
50972758d9 sm8550-common: Address some binder call denials to system_app
W com.android.settings: type=1400 audit(0.0:4743): avc:  denied  { call } for  comm=4173796E635461736B20233130 scontext=u:r:system_app:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=binder permissive=0
W com.android.settings: type=1400 audit(0.0:4744): avc:  denied  { call } for  comm=4173796E635461736B20233130 scontext=u:r:system_app:s0 tcontext=u:r:hal_audio_default:s0 tclass=binder permissive=0
W com.android.settings: type=1400 audit(0.0:4745): avc:  denied  { call } for  comm=4173796E635461736B20233130 scontext=u:r:system_app:s0 tcontext=u:r:hal_camera_default:s0 tclass=binder permissive=0
W com.android.settings: type=1400 audit(0.0:4746): avc:  denied  { call } for  comm=4173796E635461736B20233130 scontext=u:r:system_app:s0 tcontext=u:r:vendor_hal_gnss_qti:s0 tclass=binder permissive=0
W com.android.settings: type=1400 audit(0.0:4747): avc:  denied  { call } for  comm=4173796E635461736B20233130 scontext=u:r:system_app:s0 tcontext=u:r:hal_health_default:s0 tclass=binder permissive=0
W com.android.settings: type=1400 audit(0.0:4748): avc:  denied  { call } for  comm=4173796E635461736B20233130 scontext=u:r:system_app:s0 tcontext=u:r:hal_memtrack_default:s0 tclass=binder permissive=0
W com.android.settings: type=1400 audit(0.0:4749): avc:  denied  { call } for  comm=4173796E635461736B20233130 scontext=u:r:system_app:s0 tcontext=u:r:hal_power_default:s0 tclass=binder permissive=0
2025-07-15 21:30:46 -03:00
Machad3x
44a9deba14 sm8550-common: sepolicy: Address Health HAL denials
02-08 08:14:53.013  1301  1301 W android.hardwar: type=1400 audit(0.0:5781): avc:  denied  { read } for  name="type" dev="sysfs" ino=131672 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

02-08 09:37:59.333  1312  1312 W android.hardwar: type=1400 audit(0.0:4052): avc:  denied  { open } for  path="/sys/devices/platform/soc/9c0000.qcom,qupv3_i2c_geni_se/9a0000.i2c/i2c-38/38-0066/max77705-charger/power_supply/max77705-charger/type" dev="sysfs" ino=132029 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

02-08 09:37:59.333  1312  1312 W android.hardwar: type=1400 audit(0.0:4053): avc:  denied  { open } for  path="/sys/devices/platform/soc/9c0000.qcom,qupv3_i2c_geni_se/9a0000.i2c/i2c-38/38-0057/power_supply/pca9481-charger/type" dev="sysfs" ino=122512 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

02-08 09:37:59.333  1312  1312 W android.hardwar: type=1400 audit(0.0:4054): avc:  denied  { open } for  path="/sys/devices/platform/soc/9c0000.qcom,qupv3_i2c_geni_se/9a0000.i2c/i2c-38/38-0066/max77705-charger/power_supply/max77705-otg/type" dev="sysfs" ino=132066 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

02-08 09:37:59.333  1312  1312 W android.hardwar: type=1400 audit(0.0:4055): avc:  denied  { open } for  path="/sys/devices/platform/soc/9c0000.qcom,qupv3_i2c_geni_se/994000.i2c/i2c-37/37-0038/power_supply/mfc-charger/type" dev="sysfs" ino=118249 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

02-08 09:37:59.333  1312  1312 W android.hardwar: type=1400 audit(0.0:4056): avc:  denied  { open } for  path="/sys/devices/platform/soc/9c0000.qcom,qupv3_i2c_geni_se/9a0000.i2c/i2c-38/38-0066/max77705-fuelgauge/power_supply/max77705-fuelgauge/type" dev="sysfs" ino=130125 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

02-08 09:37:59.337  1312  1312 W android.hardwar: type=1400 audit(0.0:4057): avc:  denied  { open } for  path="/sys/devices/platform/soc/9c0000.qcom,qupv3_i2c_geni_se/9a0000.i2c/i2c-38/38-0066/max77705-charger/power_supply/max77705-charger/type" dev="sysfs" ino=132029 scontext=u:r:hal_health_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
22
2025-07-15 21:30:46 -03:00
chaptsand
7f9b3e8c7d sm8550-common: sepolicy: Address more denials
Change-Id: Id833dcd57dc9d389ef57cc30b85897f9d98f3c56
2025-04-26 00:10:00 +08:00
chaptsand
9cfb921e7d sm8550-common: sepolicy: Allow hermesd to use wake_alarm capability
Fix an issue where the hermesd process is denied access to wake_alarm
by SELinux, causing authentication failures even with correct credentials.

When enters the wrong password 5 times, the device refuses to unlock even
after the correct password is provided.

avc: denied { wake_alarm } for capability=35 scontext=u:r:hermesd:s0
tcontext=u:r:hermesd:s0 tclass=capability2 permissive=0

Change-Id: I0461346ceb10ae482a30bf72429b2eca10ac091b
2025-04-26 00:10:00 +08:00
chaptsand
1b5b36123d sm8550-common: sepolicy: Label more wakeup nodes
Change-Id: Icb341c239db384c46e71c82faa2a04977b525057
2025-02-27 22:10:10 +08:00
Josip Kelecic
4649cac293 sm8550-common: add shim for libhypervintf
* Needed by camera, we don't use hyper HAL.

Co-authored-by: chaptsand <chaptsand@gmail.com>
Co-authored-by: pckotzer <thegamethis@outlook.com>
Change-Id: I823e9286fe2b8ad2320b83cca0e6f59707c30f5b
2024-12-30 21:14:58 +08:00
chaptsand
e8ab765331 sm8550-common: Work around keymint HAL to avoid conflicts with source built
Change-Id: Ie16c7052cb9e343adcafa4303ae62d606ce4585f
2024-12-30 17:21:40 +08:00
chaptsand
4e11f15052 sm8550-common: sepolicy: Label more wakeup nodes
Change-Id: I8f603d280b1b0dd5b97ab1db65547e7e1c68c069
2024-12-30 16:17:14 +08:00
chaptsand
883bc959e8 sm8550-common: sepolicy: Fix touchscreen sysfs selinux denied
Change-Id: Ia2524751d88341b9627d7d9698d1be017232defa
2024-09-19 16:02:54 +08:00
Bruno Martins
af42246aec sm8550-common: Build QTI health service
Change-Id: I929a51b8516e5b3265f08160d0055f7dae6ab2bf
2024-09-18 23:56:32 +08:00
chaptsand
34b23b3a8c sm8550-common: Initial enforcing sepolicy
Change-Id: If928cb2d9e24a6639df4e555492209722162ed05
2024-09-18 23:56:12 +08:00