Snap for 11915075 from 65a5fe99c1
to 24Q4-release
Change-Id: I6ce6d602f141226b3329bcb2f25d6ce7d80f474b
This commit is contained in:
commit
47335ec131
12 changed files with 47 additions and 0 deletions
|
@ -31,6 +31,9 @@
|
|||
/dev/acd-aocx_inject[0-9]* u:object_r:aoc_device:s0
|
||||
/dev/acd-aocx_tapout[0-9]* u:object_r:aoc_device:s0
|
||||
/dev/acd-mc_headpos u:object_r:aoc_device:s0
|
||||
/dev/acd-chre_bt_offload_ctl u:object_r:aoc_device:s0
|
||||
/dev/acd-chre_bt_offload_data_tx u:object_r:aoc_device:s0
|
||||
/dev/acd-chre_bt_offload_data_rx u:object_r:aoc_device:s0
|
||||
|
||||
# AoC vendor binaries
|
||||
/vendor/bin/aocd u:object_r:aocd_exec:s0
|
||||
|
|
|
@ -1,2 +1,5 @@
|
|||
# Audio
|
||||
vendor_internal_prop(vendor_audio_prop)
|
||||
|
||||
# The property for Audio App
|
||||
vendor_restricted_prop(vendor_audio_prop_restricted)
|
||||
|
|
|
@ -9,3 +9,6 @@ vendor.audiodump.encode.disable u:object_r:vendor_audio_prop:s0
|
|||
vendor.audiodump.log.cca.updated u:object_r:vendor_audio_prop:s0
|
||||
vendor.audiodump.cca.config u:object_r:vendor_audio_prop:s0
|
||||
vendor.audio_hal.aidl.enable u:object_r:vendor_audio_prop:s0
|
||||
|
||||
# for audio app
|
||||
persist.vendor.app.audio. u:object_r:vendor_audio_prop_restricted:s0
|
||||
|
|
|
@ -1,2 +1,5 @@
|
|||
# Audio property
|
||||
set_prop(vendor_init, vendor_audio_prop)
|
||||
|
||||
# Audio App property
|
||||
set_prop(vendor_init, vendor_audio_prop_restricted)
|
||||
|
|
19
gyotaku_app/fingerprint/gyotaku_app.te
Normal file
19
gyotaku_app/fingerprint/gyotaku_app.te
Normal file
|
@ -0,0 +1,19 @@
|
|||
# Specific build for fingerprint
|
||||
type gyotaku_app, domain;
|
||||
|
||||
app_domain(gyotaku_app)
|
||||
net_domain(gyotaku_app)
|
||||
|
||||
# For Gyotaku app common use
|
||||
allow gyotaku_app app_api_service:service_manager find;
|
||||
allow gyotaku_app privapp_data_file:lnk_file read;
|
||||
allow gyotaku_app system_app_data_file:dir create_dir_perms;
|
||||
allow gyotaku_app system_app_data_file:file create_file_perms;
|
||||
|
||||
# For getproperty isDebuggable use
|
||||
get_prop(gyotaku_app, userdebug_or_eng_prop)
|
||||
|
||||
# For access /data/vendor/misc fingerprint use.
|
||||
allow gyotaku_app vendor_misc_data_file:dir search;
|
||||
allow gyotaku_app vendor_fingerprint_data_file:dir r_dir_perms;
|
||||
allow gyotaku_app vendor_fingerprint_data_file:file r_file_perms;
|
2
gyotaku_app/fingerprint/seapp_contexts
Normal file
2
gyotaku_app/fingerprint/seapp_contexts
Normal file
|
@ -0,0 +1,2 @@
|
|||
# Gyotaku app
|
||||
user=system seinfo=platform name=com.google.android.apps.internal.gyotaku domain=gyotaku_app type=system_app_data_file levelFrom=all
|
5
gyotaku_app/gyotaku_fingerprint.mk
Normal file
5
gyotaku_app/gyotaku_fingerprint.mk
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Specific build for fingerprint
|
||||
PRODUCT_PACKAGES_DEBUG += \
|
||||
Gyotaku
|
||||
|
||||
BOARD_SEPOLICY_DIRS += device/google/gs-common/gyotaku_app/fingerprint
|
2
storage/sepolicy/device.te
Normal file
2
storage/sepolicy/device.te
Normal file
|
@ -0,0 +1,2 @@
|
|||
# Userdata Exp block device.
|
||||
type userdata_exp_block_device, dev_type;
|
1
storage/sepolicy/e2fs.te
Normal file
1
storage/sepolicy/e2fs.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow e2fs userdata_exp_block_device:blk_file rw_file_perms;
|
|
@ -3,3 +3,4 @@
|
|||
/dev/sg[0-9] u:object_r:sg_device:s0
|
||||
/data/vendor/storage(/.*)? u:object_r:dump_storage_data_file:s0
|
||||
/vendor/bin/sg_read_buffer u:object_r:sg_util_exec:s0
|
||||
/dev/block/by-name/userdata_exp.* u:object_r:userdata_exp_block_device:s0
|
||||
|
|
1
storage/sepolicy/fsck.te
Normal file
1
storage/sepolicy/fsck.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow fsck userdata_exp_block_device:blk_file rw_file_perms;
|
|
@ -1,4 +1,8 @@
|
|||
allow vold sysfs_scsi_devices_0000:file rw_file_perms;
|
||||
|
||||
# Access userdata_exp block device.
|
||||
allow vold userdata_exp_block_device:blk_file rw_file_perms;
|
||||
allowxperm vold userdata_exp_block_device:blk_file ioctl BLKSECDISCARD;
|
||||
|
||||
dontaudit vold dumpstate:fifo_file rw_file_perms;
|
||||
dontaudit vold dumpstate:fd use ;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue