Snap for 11947112 from 5f01cd2856
to mainline-tzdata6-release
Change-Id: I15b058571185470de2d5ce987ce7526a95d5623b
This commit is contained in:
commit
13811d2a7f
21 changed files with 143 additions and 10 deletions
1
aoc/sepolicy/service.te
Normal file
1
aoc/sepolicy/service.te
Normal file
|
@ -0,0 +1 @@
|
||||||
|
type aocx, service_manager_type;
|
|
@ -1 +0,0 @@
|
||||||
type aocx, vndservice_manager_type;
|
|
1
gps/lsi/sepolicy/device.te
Normal file
1
gps/lsi/sepolicy/device.te
Normal file
|
@ -0,0 +1 @@
|
||||||
|
type vendor_gnss_device, dev_type;
|
|
@ -1 +1,5 @@
|
||||||
type vendor_gps_file, file_type, data_file_type;
|
type vendor_gps_file, file_type, data_file_type;
|
||||||
|
type sysfs_gps, sysfs_type, fs_type;
|
||||||
|
userdebug_or_eng(`
|
||||||
|
typeattribute vendor_gps_file mlstrustedobject;
|
||||||
|
')
|
||||||
|
|
|
@ -7,6 +7,4 @@
|
||||||
/vendor/bin/hw/swcnd u:object_r:swcnd_exec:s0
|
/vendor/bin/hw/swcnd u:object_r:swcnd_exec:s0
|
||||||
/vendor/bin/hw/spad u:object_r:spad_exec:s0
|
/vendor/bin/hw/spad u:object_r:spad_exec:s0
|
||||||
/vendor/bin/hw/android.hardware.gnss-service u:object_r:hal_gnss_default_exec:s0
|
/vendor/bin/hw/android.hardware.gnss-service u:object_r:hal_gnss_default_exec:s0
|
||||||
/vendor/bin/gnss_check\.sh u:object_r:gnss_check_exec:s0
|
/data/vendor/gps(/.*)? u:object_r:vendor_gps_file:s0
|
||||||
# keep only one rule and use eGNSS one
|
|
||||||
# /data/vendor/gps(/.*)? u:object_r:vendor_gps_file:s0
|
|
||||||
|
|
|
@ -31,3 +31,6 @@ set_prop(gnssd, vendor_gps_prop)
|
||||||
|
|
||||||
# Read RIL property
|
# Read RIL property
|
||||||
get_prop(gnssd, vendor_rild_prop)
|
get_prop(gnssd, vendor_rild_prop)
|
||||||
|
|
||||||
|
# Read modme state
|
||||||
|
allow gnssd sysfs_modem_state:file r_file_perms;
|
||||||
|
|
1
gps/lsi/sepolicy/property.te
Normal file
1
gps/lsi/sepolicy/property.te
Normal file
|
@ -0,0 +1 @@
|
||||||
|
vendor_internal_prop(vendor_gps_prop)
|
2
gps/lsi/sepolicy/property_contexts
Normal file
2
gps/lsi/sepolicy/property_contexts
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
vendor.gps. u:object_r:vendor_gps_prop:s0
|
||||||
|
persist.vendor.gps. u:object_r:vendor_gps_prop:s0
|
|
@ -22,4 +22,8 @@ allow hal_gnss_pixel hal_contexthub_service:service_manager find;
|
||||||
|
|
||||||
# Allow connect to gnss service
|
# Allow connect to gnss service
|
||||||
allow hal_gnss_pixel vendor_gps_file:dir create_dir_perms;
|
allow hal_gnss_pixel vendor_gps_file:dir create_dir_perms;
|
||||||
allow hal_gnss_pixel vendor_gps_file:fifo_file create_file_perms;
|
allow hal_gnss_pixel vendor_gps_file:fifo_file create_file_perms;
|
||||||
|
|
||||||
|
# Allow access ssrdump information
|
||||||
|
allow hal_gnss_pixel sscoredump_vendor_data_crashinfo_file:file r_file_perms;
|
||||||
|
allow hal_gnss_pixel sscoredump_vendor_data_crashinfo_file:dir r_dir_perms;
|
||||||
|
|
|
@ -19,7 +19,7 @@
|
||||||
|
|
||||||
#define GYOTAKU_DIRECTORY "/data/vendor/gyotaku/andlog"
|
#define GYOTAKU_DIRECTORY "/data/vendor/gyotaku/andlog"
|
||||||
#define GYOTAKU_ANDROID_LOG_PREFIX "android_"
|
#define GYOTAKU_ANDROID_LOG_PREFIX "android_"
|
||||||
|
#define GYOTAKU_ODPM_LOG_PREFIX "odpm_"
|
||||||
#define maxFileLogsNumber 30
|
#define maxFileLogsNumber 30
|
||||||
|
|
||||||
int main() {
|
int main() {
|
||||||
|
@ -30,6 +30,7 @@ int main() {
|
||||||
}
|
}
|
||||||
|
|
||||||
dumpLogs(GYOTAKU_DIRECTORY, outputDir.c_str(), maxFileLogsNumber, GYOTAKU_ANDROID_LOG_PREFIX);
|
dumpLogs(GYOTAKU_DIRECTORY, outputDir.c_str(), maxFileLogsNumber, GYOTAKU_ANDROID_LOG_PREFIX);
|
||||||
|
dumpLogs(GYOTAKU_DIRECTORY, outputDir.c_str(), maxFileLogsNumber, GYOTAKU_ODPM_LOG_PREFIX);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
3
recorder/recorder.mk
Normal file
3
recorder/recorder.mk
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/recorder/sepolicy/vendor
|
||||||
|
PRODUCT_PUBLIC_SEPOLICY_DIRS += device/google/gs-common/recorder/sepolicy/product/public
|
||||||
|
PRODUCT_PRIVATE_SEPOLICY_DIRS += device/google/gs-common/recorder/sepolicy/product/private
|
|
@ -0,0 +1,29 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIF+zCCA+OgAwIBAgIVAJFfB9eQ7J1w93C6aGBchm77ysA3MA0GCSqGSIb3DQEBCwUAMIGNMQsw
|
||||||
|
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNTW91bnRhaW4gVmlldzEU
|
||||||
|
MBIGA1UEChMLR29vZ2xlIEluYy4xEDAOBgNVBAsTB0FuZHJvaWQxKTAnBgNVBAMMIGNvbV9nb29n
|
||||||
|
bGVfYW5kcm9pZF9hcHBzX3JlY29yZGVyMB4XDTE5MDIxNTE1NDQxMloXDTQ5MDIxNTE1NDQxMlow
|
||||||
|
gY0xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1Nb3VudGFpbiBW
|
||||||
|
aWV3MRQwEgYDVQQKEwtHb29nbGUgSW5jLjEQMA4GA1UECxMHQW5kcm9pZDEpMCcGA1UEAwwgY29t
|
||||||
|
X2dvb2dsZV9hbmRyb2lkX2FwcHNfcmVjb3JkZXIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK
|
||||||
|
AoICAQCFSs/DqyyRbMD2mEHxxv+DDnV7V8j/RUB43aZXC11kKbLAD/E8/WxV+e9frFoXlzXepK4m
|
||||||
|
FliWHyLWNSUmFwVxl2JsrkxUJ4QWXIpw9azHkW9kO5r/VPTXCBAZn80qqaqHlzplHbflxLiQc+zv
|
||||||
|
lWEg7HJPBMMMFC3yCYfhLbDrriZdMnT4mHMLUo24TzO2znv7c7SDBWQ57lAsdRB0OX+N4DfBXvUR
|
||||||
|
QLUO9FazerGdcK58KHkxgo3ZHY3c2+efkfCkZUgu6HKLwA24O2e0/iYmC7vQTItGYCCyzbdlXDix
|
||||||
|
t0YgpsdcsOtVSJLwv6movtAX9JGsrGkvZR9Ffa52Vfc+vW0yqahHxVFJ5VD6UrrQpkWjonrsIbHb
|
||||||
|
RLQ05ZM735kd4NWrxgS0sDwdfvhmsj29Ag3q/cuIpG/+x37+vmTlMKggeqxSxoQ4RwGyZuvyb8PB
|
||||||
|
/lCf6r6bAYyr88oAs03ATz3RqRH38rkHmFp5Cdf488tw2Wj6vB/JqnfPN8woslle0hUIkqH7Ezna
|
||||||
|
0zF79yov7oePFdqr++khDHrrMQziwIk2PN+V0MLGQpmX5FF47Zmprtzvu52QN2f5rnKq2HSfBG0i
|
||||||
|
FqZ8/iAEnUsCngVObHaASPxXq1AKiy3iEJaLDjFhGbQk9mbj9o/RHb0kyorI3d90PU8ss8xNsUnm
|
||||||
|
pXa4sQIDAQABo1AwTjAMBgNVHRMEBTADAQH/MB0GA1UdDgQWBBRXxQfB1H79Hq56Ld1GUrRRfzWo
|
||||||
|
ojAfBgNVHSMEGDAWgBRXxQfB1H79Hq56Ld1GUrRRfzWoojANBgkqhkiG9w0BAQsFAAOCAgEARATw
|
||||||
|
47mgvvLpdLTPzjORUSLBWXS2WdH43o9tPBNOaLBVRWiua2OyMp8F+nbxm4y/3djGuXsn5S2F12jp
|
||||||
|
7xQZcBU4c21vF/ttio/spnnkPBnf0nKndTLoKt4Tpcxq4vnyqyXlBJHIybh+bbc6HVTYM6n8k4vw
|
||||||
|
KReUjEjCXAxZ8vWjTgSOAtDrHkaez3tOkACMFmRv+JP1zNG32chLG+8K0/pyLsnknloPAk02Btoc
|
||||||
|
t7FI4XKtS/9Z9oipMHfWg8fjI4vRXqiiAR4ctf9EgxcwHY/KVX8RJxsAXMgl65e7qGagbfTWCbHl
|
||||||
|
MnRnapjLKkvJKPiIbBx/xdgUoOxdugwL6XPfzg4THQzAiduCgxkDs/H3SQWem6VBZ57KSuudJsop
|
||||||
|
s5hb7GS2Hqb5F3YHAlSGQxvj37mDTzbuTH3paqzPwSgnqw0jnkGl//f2osw/mqfD5msDLk4UcmpQ
|
||||||
|
IeC10ofhF7hzaZOGwMg8VGzsMR5M154haxj6Y2NFEir6ylz/stPrelkwDvMIDgIororj2Bj7TkWu
|
||||||
|
+EABNAr8h9yTsJEvxayNMk96U+Rn2LKMZilJdf00SILpr6IFTD8uvRwLIHSCjSbd9C8kkAqbqKs4
|
||||||
|
VCg5HPLHjxyXgWOAK1IeqqnryaFPjLqa2RsG6UL+UtIjC6eWMsWOfvRRrpTU21mo2Koc0MI=
|
||||||
|
-----END CERTIFICATE-----
|
16
recorder/sepolicy/product/private/google_recorder_app.te
Normal file
16
recorder/sepolicy/product/private/google_recorder_app.te
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
app_domain(google_recorder_app)
|
||||||
|
net_domain(google_recorder_app)
|
||||||
|
|
||||||
|
get_prop(google_recorder_app, graphics_config_writable_prop)
|
||||||
|
|
||||||
|
allow google_recorder_app app_api_service:service_manager find;
|
||||||
|
allow google_recorder_app audioserver_service:service_manager find;
|
||||||
|
allow google_recorder_app mediaextractor_service:service_manager find;
|
||||||
|
allow google_recorder_app mediametrics_service:service_manager find;
|
||||||
|
allow google_recorder_app mediaserver_service:service_manager find;
|
||||||
|
|
||||||
|
allow google_recorder_app privapp_data_file:lnk_file r_file_perms;
|
||||||
|
allow google_recorder_app privapp_data_file:file execute;
|
||||||
|
|
||||||
|
# Library code may try to access default properties, but should be denied
|
||||||
|
dontaudit google_recorder_app default_prop:file read;
|
2
recorder/sepolicy/product/private/keys.conf
Normal file
2
recorder/sepolicy/product/private/keys.conf
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[@GOOGLERECORDER]
|
||||||
|
ALL : device/google/gs-common/recorder/sepolicy/product/private/certs/com_google_android_apps_recorder.x509.pem
|
27
recorder/sepolicy/product/private/mac_permissions.xml
Normal file
27
recorder/sepolicy/product/private/mac_permissions.xml
Normal file
|
@ -0,0 +1,27 @@
|
||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<policy>
|
||||||
|
|
||||||
|
<!--
|
||||||
|
|
||||||
|
* A signature is a hex encoded X.509 certificate or a tag defined in
|
||||||
|
keys.conf and is required for each signer tag.
|
||||||
|
* A signer tag may contain a seinfo tag and multiple package stanzas.
|
||||||
|
* A default tag is allowed that can contain policy for all apps not signed with a
|
||||||
|
previously listed cert. It may not contain any inner package stanzas.
|
||||||
|
* Each signer/default/package tag is allowed to contain one seinfo tag. This tag
|
||||||
|
represents additional info that each app can use in setting a SELinux security
|
||||||
|
context on the eventual process.
|
||||||
|
* When a package is installed the following logic is used to determine what seinfo
|
||||||
|
value, if any, is assigned.
|
||||||
|
- All signatures used to sign the app are checked first.
|
||||||
|
- If a signer stanza has inner package stanzas, those stanza will be checked
|
||||||
|
to try and match the package name of the app. If the package name matches
|
||||||
|
then that seinfo tag is used. If no inner package matches then the outer
|
||||||
|
seinfo tag is assigned.
|
||||||
|
- The default tag is consulted last if needed.
|
||||||
|
-->
|
||||||
|
<!-- Google Recorder app key -->
|
||||||
|
<signer signature="@GOOGLERECORDER" >
|
||||||
|
<seinfo value="GoogleRecorder" />
|
||||||
|
</signer>
|
||||||
|
</policy>
|
2
recorder/sepolicy/product/private/seapp_contexts
Normal file
2
recorder/sepolicy/product/private/seapp_contexts
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
# Google Recorder
|
||||||
|
user=_app isPrivApp=true seinfo=GoogleRecorder name=com.google.android.apps.recorder domain=google_recorder_app type=app_data_file levelFrom=all
|
1
recorder/sepolicy/product/public/google_recorder_app.te
Normal file
1
recorder/sepolicy/product/public/google_recorder_app.te
Normal file
|
@ -0,0 +1 @@
|
||||||
|
type google_recorder_app, domain;
|
1
recorder/sepolicy/vendor/google_recorder_app.te
vendored
Normal file
1
recorder/sepolicy/vendor/google_recorder_app.te
vendored
Normal file
|
@ -0,0 +1 @@
|
||||||
|
get_prop(google_recorder_app, vendor_audio_prop_restricted)
|
|
@ -34,6 +34,18 @@ int main(int argc, char *argv[])
|
||||||
char *line = NULL;
|
char *line = NULL;
|
||||||
size_t len = 0;
|
size_t len = 0;
|
||||||
FILE *ical_fd;
|
FILE *ical_fd;
|
||||||
|
const char *ical_override_cmd_prop[2] = {
|
||||||
|
[0] = "vendor.touch.gti0.ical.override.cmd",
|
||||||
|
[1] = "vendor.touch.gti1.ical.override.cmd",
|
||||||
|
};
|
||||||
|
const char *ical_override_result_prop[2] = {
|
||||||
|
[0] = "vendor.touch.gti0.ical.override.result",
|
||||||
|
[1] = "vendor.touch.gti1.ical.override.result",
|
||||||
|
};
|
||||||
|
const char *ical_write_history_prop[2] = {
|
||||||
|
[0] = "vendor.touch.gti0.ical.write.history",
|
||||||
|
[1] = "vendor.touch.gti1.ical.write.history",
|
||||||
|
};
|
||||||
const char *ical_state_prop[2] = {
|
const char *ical_state_prop[2] = {
|
||||||
[0] = "vendor.touch.gti0.ical.state",
|
[0] = "vendor.touch.gti0.ical.state",
|
||||||
[1] = "vendor.touch.gti1.ical.state",
|
[1] = "vendor.touch.gti1.ical.state",
|
||||||
|
@ -46,9 +58,16 @@ int main(int argc, char *argv[])
|
||||||
[0] = "/sys/devices/virtual/goog_touch_interface/gti.0/interactive_calibrate",
|
[0] = "/sys/devices/virtual/goog_touch_interface/gti.0/interactive_calibrate",
|
||||||
[1] = "/sys/devices/virtual/goog_touch_interface/gti.1/interactive_calibrate",
|
[1] = "/sys/devices/virtual/goog_touch_interface/gti.1/interactive_calibrate",
|
||||||
};
|
};
|
||||||
|
const char *ical_override_cmd_prop_path = ical_override_cmd_prop[0];
|
||||||
|
const char *ical_override_result_prop_path = ical_override_result_prop[0];
|
||||||
|
const char *ical_write_history_prop_path = ical_write_history_prop[0];
|
||||||
const char *ical_state_prop_path = ical_state_prop[0];
|
const char *ical_state_prop_path = ical_state_prop[0];
|
||||||
const char *ical_result_prop_path = ical_result_prop[0];
|
const char *ical_result_prop_path = ical_result_prop[0];
|
||||||
const char *ical_sysfs_path = ical_sysfs[0];
|
const char *ical_sysfs_path = ical_sysfs[0];
|
||||||
|
const char ical_override_all_cmd_prop_val[PROPERTY_VALUE_MAX] = "xxx";
|
||||||
|
char ical_override_cmd_prop_val[PROPERTY_VALUE_MAX] = "\0";
|
||||||
|
char ical_override_result_prop_val[PROPERTY_VALUE_MAX] = "\0";
|
||||||
|
char ical_write_history_prop_val[PROPERTY_VALUE_MAX] = "\0";
|
||||||
|
|
||||||
if (argc < 3) {
|
if (argc < 3) {
|
||||||
ALOGW("No target dev or command for interactive_calibrate sysfs.\n");
|
ALOGW("No target dev or command for interactive_calibrate sysfs.\n");
|
||||||
|
@ -60,11 +79,18 @@ int main(int argc, char *argv[])
|
||||||
if (strncmp(argv[1], "1", strlen(argv[1])) == 0 ||
|
if (strncmp(argv[1], "1", strlen(argv[1])) == 0 ||
|
||||||
strncmp(argv[1], "gti1", strlen(argv[1])) == 0 ||
|
strncmp(argv[1], "gti1", strlen(argv[1])) == 0 ||
|
||||||
strncmp(argv[1], "gti.1", strlen(argv[1])) == 0) {
|
strncmp(argv[1], "gti.1", strlen(argv[1])) == 0) {
|
||||||
|
ical_override_cmd_prop_path = ical_override_cmd_prop[1];
|
||||||
|
ical_override_result_prop_path = ical_override_result_prop[1];
|
||||||
|
ical_write_history_prop_path = ical_write_history_prop[1];
|
||||||
ical_state_prop_path = ical_state_prop[1];
|
ical_state_prop_path = ical_state_prop[1];
|
||||||
ical_result_prop_path = ical_result_prop[1];
|
ical_result_prop_path = ical_result_prop[1];
|
||||||
ical_sysfs_path = ical_sysfs[1];
|
ical_sysfs_path = ical_sysfs[1];
|
||||||
}
|
}
|
||||||
|
|
||||||
|
property_get(ical_override_cmd_prop_path, ical_override_cmd_prop_val, NULL);
|
||||||
|
property_get(ical_override_result_prop_path, ical_override_result_prop_val, "0 - -2147483648");
|
||||||
|
property_get(ical_write_history_prop_path, ical_write_history_prop_val, NULL);
|
||||||
|
|
||||||
property_set(ical_result_prop_path, "na");
|
property_set(ical_result_prop_path, "na");
|
||||||
property_set(ical_state_prop_path, "running");
|
property_set(ical_state_prop_path, "running");
|
||||||
if (access(ical_sysfs_path, F_OK | R_OK | W_OK)) {
|
if (access(ical_sysfs_path, F_OK | R_OK | W_OK)) {
|
||||||
|
@ -84,11 +110,25 @@ int main(int argc, char *argv[])
|
||||||
getline(&line, &len, ical_fd);
|
getline(&line, &len, ical_fd);
|
||||||
if (line != NULL) {
|
if (line != NULL) {
|
||||||
property_set(ical_state_prop_path, "read");
|
property_set(ical_state_prop_path, "read");
|
||||||
property_set(ical_result_prop_path, line);
|
if (strncmp(ical_override_cmd_prop_val,
|
||||||
ALOGI("read: %s => %s", ical_sysfs_path, line);
|
ical_write_history_prop_val,
|
||||||
|
strlen(ical_write_history_prop_path)) == 0 ||
|
||||||
|
strncasecmp(ical_override_cmd_prop_val,
|
||||||
|
ical_override_all_cmd_prop_val,
|
||||||
|
strlen(ical_override_all_cmd_prop_val)) == 0) {
|
||||||
|
property_set(ical_result_prop_path, ical_override_result_prop_val);
|
||||||
|
ALOGW("read(original): %s => %s",
|
||||||
|
ical_sysfs_path, line);
|
||||||
|
ALOGW("read(override): %s => %s",
|
||||||
|
ical_sysfs_path, ical_override_result_prop_val);
|
||||||
|
} else {
|
||||||
|
property_set(ical_result_prop_path, line);
|
||||||
|
ALOGI("read: %s => %s", ical_sysfs_path, line);
|
||||||
|
}
|
||||||
free(line);
|
free(line);
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
|
property_set(ical_write_history_prop_path, argv[2]);
|
||||||
property_set(ical_state_prop_path, argv[2]);
|
property_set(ical_state_prop_path, argv[2]);
|
||||||
fwrite(argv[2], 1, strlen(argv[2]), ical_fd);
|
fwrite(argv[2], 1, strlen(argv[2]), ical_fd);
|
||||||
ALOGI("write: %s => %s\n", argv[2], ical_sysfs_path);
|
ALOGI("write: %s => %s\n", argv[2], ical_sysfs_path);
|
||||||
|
|
|
@ -1,2 +0,0 @@
|
||||||
/vendor/bin/hw/android\.hardware\.input\.processor-reflector u:object_r:hal_input_processor_default_exec:s0
|
|
||||||
/vendor/bin/twoshay_touchflow u:object_r:twoshay_exec:s0
|
|
Loading…
Add table
Add a link
Reference in a new issue