Snap for 11908474 from 8e0546449d to 24Q3-release

Change-Id: Iccf4daa51f498c6e52eb3d217fb40829e42df992
This commit is contained in:
Android Build Coastguard Worker 2024-05-30 23:02:20 +00:00
commit f0d76fc142
8 changed files with 18 additions and 0 deletions

View file

@ -1,2 +1,5 @@
# Audio # Audio
vendor_internal_prop(vendor_audio_prop) vendor_internal_prop(vendor_audio_prop)
# The property for Audio App
vendor_restricted_prop(vendor_audio_prop_restricted)

View file

@ -9,3 +9,6 @@ vendor.audiodump.encode.disable u:object_r:vendor_audio_prop:s0
vendor.audiodump.log.cca.updated u:object_r:vendor_audio_prop:s0 vendor.audiodump.log.cca.updated u:object_r:vendor_audio_prop:s0
vendor.audiodump.cca.config u:object_r:vendor_audio_prop:s0 vendor.audiodump.cca.config u:object_r:vendor_audio_prop:s0
vendor.audio_hal.aidl.enable u:object_r:vendor_audio_prop:s0 vendor.audio_hal.aidl.enable u:object_r:vendor_audio_prop:s0
# for audio app
persist.vendor.app.audio. u:object_r:vendor_audio_prop_restricted:s0

View file

@ -1,2 +1,5 @@
# Audio property # Audio property
set_prop(vendor_init, vendor_audio_prop) set_prop(vendor_init, vendor_audio_prop)
# Audio App property
set_prop(vendor_init, vendor_audio_prop_restricted)

View file

@ -0,0 +1,2 @@
# Userdata Exp block device.
type userdata_exp_block_device, dev_type;

1
storage/sepolicy/e2fs.te Normal file
View file

@ -0,0 +1 @@
allow e2fs userdata_exp_block_device:blk_file rw_file_perms;

View file

@ -3,3 +3,4 @@
/dev/sg[0-9] u:object_r:sg_device:s0 /dev/sg[0-9] u:object_r:sg_device:s0
/data/vendor/storage(/.*)? u:object_r:dump_storage_data_file:s0 /data/vendor/storage(/.*)? u:object_r:dump_storage_data_file:s0
/vendor/bin/sg_read_buffer u:object_r:sg_util_exec:s0 /vendor/bin/sg_read_buffer u:object_r:sg_util_exec:s0
/dev/block/by-name/userdata_exp.* u:object_r:userdata_exp_block_device:s0

1
storage/sepolicy/fsck.te Normal file
View file

@ -0,0 +1 @@
allow fsck userdata_exp_block_device:blk_file rw_file_perms;

View file

@ -1,4 +1,8 @@
allow vold sysfs_scsi_devices_0000:file rw_file_perms; allow vold sysfs_scsi_devices_0000:file rw_file_perms;
# Access userdata_exp block device.
allow vold userdata_exp_block_device:blk_file rw_file_perms;
allowxperm vold userdata_exp_block_device:blk_file ioctl BLKSECDISCARD;
dontaudit vold dumpstate:fifo_file rw_file_perms; dontaudit vold dumpstate:fifo_file rw_file_perms;
dontaudit vold dumpstate:fd use ; dontaudit vold dumpstate:fd use ;