Snap for 11915075 from 65a5fe99c1 to 24Q4-release

Change-Id: I6ce6d602f141226b3329bcb2f25d6ce7d80f474b
This commit is contained in:
Android Build Coastguard Worker 2024-06-01 01:02:10 +00:00
commit 47335ec131
12 changed files with 47 additions and 0 deletions

View file

@ -31,6 +31,9 @@
/dev/acd-aocx_inject[0-9]* u:object_r:aoc_device:s0
/dev/acd-aocx_tapout[0-9]* u:object_r:aoc_device:s0
/dev/acd-mc_headpos u:object_r:aoc_device:s0
/dev/acd-chre_bt_offload_ctl u:object_r:aoc_device:s0
/dev/acd-chre_bt_offload_data_tx u:object_r:aoc_device:s0
/dev/acd-chre_bt_offload_data_rx u:object_r:aoc_device:s0
# AoC vendor binaries
/vendor/bin/aocd u:object_r:aocd_exec:s0

View file

@ -1,2 +1,5 @@
# Audio
vendor_internal_prop(vendor_audio_prop)
# The property for Audio App
vendor_restricted_prop(vendor_audio_prop_restricted)

View file

@ -9,3 +9,6 @@ vendor.audiodump.encode.disable u:object_r:vendor_audio_prop:s0
vendor.audiodump.log.cca.updated u:object_r:vendor_audio_prop:s0
vendor.audiodump.cca.config u:object_r:vendor_audio_prop:s0
vendor.audio_hal.aidl.enable u:object_r:vendor_audio_prop:s0
# for audio app
persist.vendor.app.audio. u:object_r:vendor_audio_prop_restricted:s0

View file

@ -1,2 +1,5 @@
# Audio property
set_prop(vendor_init, vendor_audio_prop)
# Audio App property
set_prop(vendor_init, vendor_audio_prop_restricted)

View file

@ -0,0 +1,19 @@
# Specific build for fingerprint
type gyotaku_app, domain;
app_domain(gyotaku_app)
net_domain(gyotaku_app)
# For Gyotaku app common use
allow gyotaku_app app_api_service:service_manager find;
allow gyotaku_app privapp_data_file:lnk_file read;
allow gyotaku_app system_app_data_file:dir create_dir_perms;
allow gyotaku_app system_app_data_file:file create_file_perms;
# For getproperty isDebuggable use
get_prop(gyotaku_app, userdebug_or_eng_prop)
# For access /data/vendor/misc fingerprint use.
allow gyotaku_app vendor_misc_data_file:dir search;
allow gyotaku_app vendor_fingerprint_data_file:dir r_dir_perms;
allow gyotaku_app vendor_fingerprint_data_file:file r_file_perms;

View file

@ -0,0 +1,2 @@
# Gyotaku app
user=system seinfo=platform name=com.google.android.apps.internal.gyotaku domain=gyotaku_app type=system_app_data_file levelFrom=all

View file

@ -0,0 +1,5 @@
# Specific build for fingerprint
PRODUCT_PACKAGES_DEBUG += \
Gyotaku
BOARD_SEPOLICY_DIRS += device/google/gs-common/gyotaku_app/fingerprint

View file

@ -0,0 +1,2 @@
# Userdata Exp block device.
type userdata_exp_block_device, dev_type;

1
storage/sepolicy/e2fs.te Normal file
View file

@ -0,0 +1 @@
allow e2fs userdata_exp_block_device:blk_file rw_file_perms;

View file

@ -3,3 +3,4 @@
/dev/sg[0-9] u:object_r:sg_device:s0
/data/vendor/storage(/.*)? u:object_r:dump_storage_data_file:s0
/vendor/bin/sg_read_buffer u:object_r:sg_util_exec:s0
/dev/block/by-name/userdata_exp.* u:object_r:userdata_exp_block_device:s0

1
storage/sepolicy/fsck.te Normal file
View file

@ -0,0 +1 @@
allow fsck userdata_exp_block_device:blk_file rw_file_perms;

View file

@ -1,4 +1,8 @@
allow vold sysfs_scsi_devices_0000:file rw_file_perms;
# Access userdata_exp block device.
allow vold userdata_exp_block_device:blk_file rw_file_perms;
allowxperm vold userdata_exp_block_device:blk_file ioctl BLKSECDISCARD;
dontaudit vold dumpstate:fifo_file rw_file_perms;
dontaudit vold dumpstate:fd use ;