diff --git a/proprietary-files.txt b/proprietary-files.txt index 1f99c16..a73f93b 100644 --- a/proprietary-files.txt +++ b/proprietary-files.txt @@ -892,46 +892,19 @@ vendor/lib64/libvideotxr.so vendor/lib64/qti.video.utils.videobufferlayout.so # Mlipay -vendor/bin/fidoca vendor/bin/mlipayd@1.1 -vendor/bin/mtd@1.3 -vendor/bin/tidad@1.2 -vendor/etc/init/vendor.xiaomi.hardware.mfidoca@1.0-service.rc vendor/etc/init/vendor.xiaomi.hardware.mlipay@1.1-service.rc -vendor/etc/init/vendor.xiaomi.hardware.mtdservice@1.3-service.rc -vendor/etc/init/vendor.xiaomi.hardware.tidaservice@1.2-service.rc -vendor/etc/vintf/manifest/manifest_vendor.xiaomi.hardware.mfidoca.xml vendor/etc/vintf/manifest/manifest_vendor.xiaomi.hardware.mlipay.xml -vendor/etc/vintf/manifest/manifest_vendor.xiaomi.hardware.mtdservice.xml -vendor/etc/vintf/manifest/manifest_vendor.xiaomi.hardware.tidaservice.xml -vendor/lib/libmfido.so vendor/lib/libmlipay.so vendor/lib/libmlipay@1.1.so -vendor/lib/libmt.so -vendor/lib/libtida@1.2.so -vendor/lib/vendor.xiaomi.hardware.mfidoca@1.0.so vendor/lib/vendor.xiaomi.hardware.mlipay@1.0.so vendor/lib/vendor.xiaomi.hardware.mlipay@1.1.so vendor/lib/vendor.xiaomi.hardware.mtdservice@1.0.so -vendor/lib/vendor.xiaomi.hardware.tidaservice@1.0.so -vendor/lib/vendor.xiaomi.hardware.tidaservice@1.1.so -vendor/lib/vendor.xiaomi.hardware.tidaservice@1.2.so -vendor/lib64/libmfido.so vendor/lib64/libmlipay.so vendor/lib64/libmlipay@1.1.so -vendor/lib64/libmt.so -vendor/lib64/libmt@1.3.so -vendor/lib64/libtida@1.2.so -vendor/lib64/vendor.xiaomi.hardware.mfidoca@1.0.so vendor/lib64/vendor.xiaomi.hardware.mlipay@1.0.so vendor/lib64/vendor.xiaomi.hardware.mlipay@1.1.so vendor/lib64/vendor.xiaomi.hardware.mtdservice@1.0.so -vendor/lib64/vendor.xiaomi.hardware.mtdservice@1.1.so -vendor/lib64/vendor.xiaomi.hardware.mtdservice@1.2.so -vendor/lib64/vendor.xiaomi.hardware.mtdservice@1.3.so -vendor/lib64/vendor.xiaomi.hardware.tidaservice@1.0.so -vendor/lib64/vendor.xiaomi.hardware.tidaservice@1.1.so -vendor/lib64/vendor.xiaomi.hardware.tidaservice@1.2.so # Modem manager vendor/bin/modemManager @@ -1192,8 +1165,6 @@ system_ext/etc/sysconfig/qti_whitelist_system_ext.xml vendor/bin/irsc_util vendor/bin/qmi-framework-tests/qmi_test_mt_client_init_instance vendor/bin/qmipriod -vendor/bin/qrtr-cfg -vendor/bin/qrtr-lookup vendor/bin/qrtr-ns vendor/etc/init/qmipriod.debug.rc vendor/etc/init/qmipriod.rc diff --git a/rootdir/etc/init.xiaomi_sm8450.rc b/rootdir/etc/init.xiaomi_sm8450.rc index 5947b87..b57894b 100644 --- a/rootdir/etc/init.xiaomi_sm8450.rc +++ b/rootdir/etc/init.xiaomi_sm8450.rc @@ -73,9 +73,6 @@ on post-fs-data # Create the directories used by the Wireless subsystem mkdir /data/vendor/mac_addr 0770 system wifi - # Create the directory used by qrtr-lookup - mkdir /data/vendor/qrtr 0775 system system - mkdir /data/vendor/thermal 0771 root system mkdir /data/vendor/thermal/config 0771 root system mkdir /data/vendor/perfspy 0775 camera camera @@ -155,8 +152,6 @@ on post-fs-data mkdir /mnt/vendor/persist/goodix 0770 system system on property:sys.boot_completed=1 - start qrtr-lookup - # Set thermal mode to mgame write /sys/devices/virtual/thermal/thermal_message/sconfig 20 @@ -182,13 +177,6 @@ on property:sys.boot_completed=1 && property:ro.build.type=user && property:ro.d chmod 0666 /sys/class/thermal/cooling_device49/cur_state chmod 0666 /sys/class/thermal/cooling_device50/cur_state -service qrtr-lookup /vendor/bin/qrtr-lookup - class core - user system - group system - disabled - oneshot - on property:vendor.audio.cit.spkcal.copy=true # 1.cal 3.newCreate diff --git a/sepolicy/vendor/file.te b/sepolicy/vendor/file.te index d39b409..38843a9 100644 --- a/sepolicy/vendor/file.te +++ b/sepolicy/vendor/file.te @@ -25,9 +25,6 @@ type vendor_ins_vendor_data_file, data_file_type, file_type; # Mac Address type vendor_mac_vendor_data_file, data_file_type, file_type, mlstrustedobject; -# Mlipay -type ta_data_file, data_file_type, file_type; - # Thermal type sys_thermal_wifi_limit, fs_type, sysfs_type; type sys_thermal_flash_state, fs_type, sysfs_type; diff --git a/sepolicy/vendor/file_contexts b/sepolicy/vendor/file_contexts index b1c7f9c..519d114 100644 --- a/sepolicy/vendor/file_contexts +++ b/sepolicy/vendor/file_contexts @@ -67,25 +67,11 @@ /vendor/bin/nv_mac u:object_r:vendor_wcnss_service_exec:s0 # Mlipay -/(vendor|system/vendor)/bin/fidoca u:object_r:hal_mfidoca_default_exec:s0 -/(vendor|system/vendor)/bin/mlipayd u:object_r:hal_mlipay_default_exec:s0 /(vendor|system/vendor)/bin/mlipayd@1.1 u:object_r:hal_mlipay_default_exec:s0 -/(vendor|system/vendor)/bin/mtd u:object_r:hal_mtdservice_default_exec:s0 -/(vendor|system/vendor)/bin/mtd@1.1 u:object_r:hal_mtdservice_default_exec:s0 -/(vendor|system/vendor)/bin/mtd@1.2 u:object_r:hal_mtdservice_default_exec:s0 -/(vendor|system/vendor)/bin/mtd@1.3 u:object_r:hal_mtdservice_default_exec:s0 -/(vendor|system/vendor)/bin/tidad u:object_r:hal_tidaservice_default_exec:s0 -/(vendor|system/vendor)/bin/tidad@1.1 u:object_r:hal_tidaservice_default_exec:s0 -/(vendor|system/vendor)/bin/tidad@1.2 u:object_r:hal_tidaservice_default_exec:s0 -/data/vendor/images(/.*)? u:object_r:ta_data_file:s0 -/mnt/vendor/persist/fdsd(/.*)? u:object_r:vendor_persist_drm_file:s0 # Modem /dev/smd8 u:object_r:vendor_radio_smd_device:s0 -# QRTR -/(vendor|system/vendor)/bin/qrtr-lookup u:object_r:vendor_qrtr_exec:s0 - # Sensors /(vendor|system/vendor)/bin/hw/android\.hardware\.sensors@2.1-service\.xiaomi-multihal u:object_r:hal_sensors_default_exec:s0 /(vendor|system/vendor)/bin/hw/vendor.xiaomi.sensor.communicate@1.0-service u:object_r:vendor_hal_sensorcommunicate_default_exec:s0 diff --git a/sepolicy/vendor/hal_mfidoca.te b/sepolicy/vendor/hal_mfidoca.te deleted file mode 100644 index a382bcf..0000000 --- a/sepolicy/vendor/hal_mfidoca.te +++ /dev/null @@ -1,26 +0,0 @@ -type hal_mfidoca_default, domain; -type hal_mfidoca_default_exec, exec_type, file_type, vendor_file_type; -type hal_mfidoca_hwservice, hwservice_manager_type; - -hal_attribute(mfidoca) -init_daemon_domain(hal_mfidoca_default) - -hwbinder_use(hal_mfidoca_default) -binder_call(hal_mfidoca_client, hal_mfidoca_server) -binder_call(hal_mfidoca_server, hal_mfidoca_client) - -add_hwservice(hal_mfidoca_server, hal_mfidoca_hwservice) -hal_server_domain(hal_mfidoca_default, hal_mfidoca) - -allow hal_mfidoca_default tee_device:chr_file rw_file_perms; -allow hal_mfidoca_default firmware_file:dir r_dir_perms; -allow hal_mfidoca_default firmware_file:file r_file_perms; -allow hal_mfidoca_default ion_device:chr_file rw_file_perms; -allow hal_mfidoca_default vendor_dmabuf_qseecom_heap_device:chr_file { ioctl open read }; -allow hal_mfidoca_default vendor_dmabuf_qseecom_ta_heap_device:chr_file { ioctl open read }; -allow hal_mfidoca_default hal_mtdservice_default:binder transfer; - -get_prop(hal_mfidoca_default, vendor_fp_prop) -get_prop(hal_mfidoca_default, vendor_system_prop) -set_prop(hal_mfidoca_default, vendor_payment_security_prop) - diff --git a/sepolicy/vendor/hal_mlipay.te b/sepolicy/vendor/hal_mlipay.te index 28143f8..ac64216 100644 --- a/sepolicy/vendor/hal_mlipay.te +++ b/sepolicy/vendor/hal_mlipay.te @@ -18,7 +18,6 @@ allow hal_mlipay_default firmware_file:file r_file_perms; allow hal_mlipay_default ion_device:chr_file rw_file_perms; allow hal_mlipay_default vendor_dmabuf_qseecom_heap_device:chr_file { ioctl open read }; allow hal_mlipay_default vendor_dmabuf_qseecom_ta_heap_device:chr_file { ioctl open read }; -allow hal_mlipay_default hal_mtdservice_default:binder transfer; get_prop(hal_mlipay_default, vendor_fp_prop) get_prop(hal_mlipay_default, vendor_system_prop) diff --git a/sepolicy/vendor/hal_mtdservice.te b/sepolicy/vendor/hal_mtdservice.te deleted file mode 100644 index ef5f255..0000000 --- a/sepolicy/vendor/hal_mtdservice.te +++ /dev/null @@ -1,53 +0,0 @@ -type hal_mtdservice_default, domain; -type hal_mtdservice_default_exec, exec_type, file_type, vendor_file_type; -type hal_mtdservice_hwservice, hwservice_manager_type; - -hal_attribute(mtdservice) - -init_daemon_domain(hal_mtdservice_default) - -hwbinder_use(hal_mtdservice_default) -binder_call(hal_mtdservice_client, hal_mtdservice_server) -binder_call(hal_mtdservice_server, hal_mtdservice_client) -binder_call(hal_mtdservice_default, hal_mlipay_default) -binder_call(hal_mtdservice_default, hal_mfidoca_default) - -add_hwservice(hal_mtdservice_server, hal_mtdservice_hwservice) -hal_server_domain(hal_mtdservice_default, hal_mtdservice) - -allow hal_mtdservice_default hal_mtdservice_hwservice:hwservice_manager add; -allow hal_mtdservice_default firmware_file:dir r_dir_perms; -allow hal_mtdservice_default firmware_file:file r_file_perms; -allow hal_mtdservice_default ion_device:chr_file rw_file_perms; -allow hal_mtdservice_default vendor_persist_drm_file:dir { create_dir_perms relabelto }; -allow hal_mtdservice_default vendor_persist_drm_file:file { create_file_perms relabelto }; -allow hal_mtdservice_default vendor_persist_file:dir r_dir_perms; -allow hal_mtdservice_default mnt_vendor_file:dir { create_dir_perms relabelfrom }; -allow hal_mtdservice_default proc:file r_file_perms; -allow hal_mtdservice_default tee_device:chr_file rw_file_perms; -allow hal_mtdservice_default system_data_file:dir getattr; -allow hal_mtdservice_default hal_mlipay_hwservice:hwservice_manager find; -allow hal_mtdservice_default hal_mfidoca_hwservice:hwservice_manager find; -allow hal_mtdservice_default platform_app:binder transfer; -allow hal_mtdservice_default system_app:binder transfer; -allow hal_mtdservice_default ta_data_file:file create_file_perms; -allow hal_mtdservice_default ta_data_file:dir rw_dir_perms; -allow hal_mtdservice_default vendor_hal_tui_comm_hwservice:hwservice_manager find; -allow hal_mtdservice_default vendor_hal_tui_comm_hwservice:binder { call transfer }; -allow hal_mtdservice_default vendor_hal_tui_comm_qti:binder { call transfer }; -allow hal_mtdservice_default sysfs:dir { open read }; -allow hal_mtdservice_default sysfs:file { open read write }; -allow hal_mtdservice_default vendor_qce_device:chr_file rw_file_perms; -allow hal_mtdservice_default vendor_sg_device:chr_file { open read }; -allow hal_mtdservice_default vendor_sg_device:chr_file { ioctl write }; -allow hal_mtdservice_default vendor_persist_data_file:dir getattr; -allow hal_mtdservice_default vendor_smcinvoke_device:chr_file { ioctl open read write }; -allow hal_mtdservice_default system_server:binder transfer; -allow hal_mtdservice_default block_device:dir r_dir_perms; -allow hal_mtdservice_default vendor_dmabuf_qseecom_heap_device:chr_file { ioctl open read }; -allow hal_mtdservice_default vendor_dmabuf_qseecom_ta_heap_device:chr_file { ioctl open read }; -type_transition hal_mtdservice mnt_vendor_file:dir vendor_persist_drm_file "fdsd"; - -get_prop(hal_mtdservice_default, vendor_system_prop) -get_prop(hal_mtdservice_default, vendor_cpuid_prop) -set_prop(hal_mtdservice_default, vendor_payment_security_prop) diff --git a/sepolicy/vendor/hal_secure_element.te b/sepolicy/vendor/hal_secure_element.te deleted file mode 100644 index d9f28dd..0000000 --- a/sepolicy/vendor/hal_secure_element.te +++ /dev/null @@ -1,3 +0,0 @@ -binder_call(hal_secure_element_default, hal_mtdservice_default) - -allow hal_secure_element_default hal_mtdservice_hwservice:hwservice_manager find; diff --git a/sepolicy/vendor/hal_tidaservice.te b/sepolicy/vendor/hal_tidaservice.te deleted file mode 100644 index 4d14d89..0000000 --- a/sepolicy/vendor/hal_tidaservice.te +++ /dev/null @@ -1,31 +0,0 @@ -type hal_tidaservice_default, domain; -type hal_tidaservice_default_exec, exec_type, file_type, vendor_file_type; -type hal_tidaservice_hwservice, hwservice_manager_type; - -hal_attribute(tidaservice) - -init_daemon_domain(hal_tidaservice_default) - -hwbinder_use(hal_tidaservice_default) -binder_call(hal_tidaservice_client, hal_tidaservice_server) -binder_call(hal_tidaservice_server, hal_tidaservice_client) -binder_call(hal_tidaservice_default, hal_mtdservice_default) - -add_hwservice(hal_tidaservice_server, hal_tidaservice_hwservice) -hal_server_domain(hal_tidaservice_default, hal_tidaservice) - -allow hal_tidaservice_client hal_tidaservice_hwservice:hwservice_manager find; -allow hal_tidaservice_default tee_device:chr_file rw_file_perms; -allow hal_tidaservice_default firmware_file:dir r_dir_perms; -allow hal_tidaservice_default firmware_file:file r_file_perms; -allow hal_tidaservice_default ion_device:chr_file rw_file_perms; -allow hal_tidaservice_default hal_mtdservice_hwservice:hwservice_manager find; -allow hal_tidaservice_default vendor_hal_tui_comm_hwservice:hwservice_manager find; -allow hal_tidaservice_default vendor_hal_tui_comm_hwservice:binder { call transfer }; -allow hal_tidaservice_default vendor_hal_tui_comm_qti:binder { call transfer }; -allow hal_tidaservice_default vendor_dmabuf_qseecom_heap_device:chr_file { ioctl open read }; -allow hal_tidaservice_default vendor_dmabuf_qseecom_ta_heap_device:chr_file { ioctl open read }; - -get_prop(hal_tidaservice_default, vendor_fp_prop) -get_prop(hal_tidaservice_default, vendor_system_prop) -get_prop(hal_tidaservice_default, vendor_payment_security_prop) diff --git a/sepolicy/vendor/hwservice_contexts b/sepolicy/vendor/hwservice_contexts index 12da6b9..933f25c 100644 --- a/sepolicy/vendor/hwservice_contexts +++ b/sepolicy/vendor/hwservice_contexts @@ -11,7 +11,4 @@ vendor.xiaomi.sensor.citsensorservice::ICitSensorService u:object_r:vendor_hal_c vendor.xiaomi.sensor.communicate::ISensorCommunicate u:object_r:vendor_hal_sensorcommunicate_hwservice:s0 # Mlipay -vendor.xiaomi.hardware.mfidoca::IFidoService u:object_r:hal_mfidoca_hwservice:s0 vendor.xiaomi.hardware.mlipay::IMlipayService u:object_r:hal_mlipay_hwservice:s0 -vendor.xiaomi.hardware.mtdservice::IMTService u:object_r:hal_mtdservice_hwservice:s0 -vendor.xiaomi.hardware.tidaservice::ITidaService u:object_r:hal_tidaservice_hwservice:s0