Snap for 12296955 from 1ae1d53973
to 24Q4-release
Change-Id: Ifdbe1caaecb247508051bcb86cccf0423535df84
This commit is contained in:
commit
dff8cf2015
7 changed files with 25 additions and 1 deletions
|
@ -384,7 +384,7 @@ ScopedAStatus BootControl::isSlotMarkedSuccessful(int32_t in_slot, bool* _aidl_r
|
|||
*_aidl_return = true;
|
||||
return ScopedAStatus::ok();
|
||||
}
|
||||
if (in_slot >= slots)
|
||||
if (in_slot < 0 || in_slot >= slots)
|
||||
return ScopedAStatus::fromServiceSpecificErrorWithMessage(
|
||||
INVALID_SLOT, (std::string("Invalid slot ") + std::to_string(in_slot)).c_str());
|
||||
|
||||
|
|
|
@ -22,6 +22,9 @@ neverallow mediacodec_google { file_type fs_type }:file execute_no_trans;
|
|||
neverallow mediacodec_google domain:{ udp_socket rawip_socket } *;
|
||||
neverallow mediacodec_google { domain userdebug_or_eng(`-su') }:tcp_socket *;
|
||||
|
||||
# Allow HAL to send trace packets to Perfetto
|
||||
userdebug_or_eng(`perfetto_producer(mediacodec_google)')
|
||||
|
||||
userdebug_or_eng(`
|
||||
allow mediacodec_google vendor_media_data_file:dir rw_dir_perms;
|
||||
allow mediacodec_google vendor_media_data_file:file create_file_perms;
|
||||
|
|
2
modem/radio_ext/sepolicy/grilservice_app.te
Normal file
2
modem/radio_ext/sepolicy/grilservice_app.te
Normal file
|
@ -0,0 +1,2 @@
|
|||
allow grilservice_app hal_radio_ext_service:service_manager find;
|
||||
binder_call(grilservice_app, hal_radio_ext)
|
|
@ -1 +1,9 @@
|
|||
# fix mkfs
|
||||
allow e2fs userdata_exp_block_device:blk_file rw_file_perms;
|
||||
allow e2fs efs_block_device:blk_file rw_file_perms;
|
||||
allow e2fs modem_userdata_block_device:blk_file rw_file_perms;
|
||||
allowxperm e2fs { persist_block_device efs_block_device modem_userdata_block_device }:blk_file ioctl {
|
||||
BLKSECDISCARD BLKDISCARD BLKPBSZGET BLKDISCARDZEROES BLKROGET
|
||||
};
|
||||
allow e2fs sysfs_scsi_devices_0000:dir r_dir_perms;
|
||||
allow e2fs sysfs_scsi_devices_0000:file r_file_perms;
|
||||
|
|
|
@ -1 +1,6 @@
|
|||
# fix fsck
|
||||
allow fsck userdata_exp_block_device:blk_file rw_file_perms;
|
||||
allow fsck efs_block_device:blk_file rw_file_perms;
|
||||
allow fsck modem_userdata_block_device:blk_file rw_file_perms;
|
||||
allow fsck sysfs_scsi_devices_0000:dir r_dir_perms;
|
||||
allow fsck sysfs_scsi_devices_0000:file r_file_perms;
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# ufs hagc
|
||||
allow vold sysfs_scsi_devices_0000:file rw_file_perms;
|
||||
|
||||
# Access userdata_exp block device.
|
||||
|
@ -6,3 +7,7 @@ allowxperm vold userdata_exp_block_device:blk_file ioctl BLKSECDISCARD;
|
|||
|
||||
dontaudit vold dumpstate:fifo_file rw_file_perms;
|
||||
dontaudit vold dumpstate:fd use ;
|
||||
|
||||
# fix idle-maint
|
||||
allow vold efs_block_device:blk_file { getattr };
|
||||
allow vold modem_userdata_block_device:blk_file { getattr };
|
||||
|
|
|
@ -1 +1,2 @@
|
|||
system_public_prop(vendor_gti_prop)
|
||||
typeattribute vendor_gti_prop touch_property_type;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue