diff --git a/tracking_denials/bug_map b/tracking_denials/bug_map index cd2c30da..ec423849 100644 --- a/tracking_denials/bug_map +++ b/tracking_denials/bug_map @@ -2,7 +2,6 @@ battery_mitigation sysfs file b/364446534 bluetooth audio_config_prop file b/379226761 bluetooth audio_config_prop file b/379245675 -chre vendor_data_file dir b/301948771 dump_display sysfs file b/340722772 dump_modem sscoredump_vendor_data_coredump_file dir b/366115873 dump_modem sscoredump_vendor_data_logcat_file dir b/366115873 @@ -26,7 +25,6 @@ priv_app audio_config_prop file b/379246066 radio audio_config_prop file b/379227275 ramdump ramdump capability b/369538457 ramdump_app default_prop file b/386149238 -ramdump_app privapp_data_file lnk_file b/385977809 rfsd vendor_cbd_prop file b/317734418 shell sysfs_net file b/329380904 ssr_detector_app default_prop file b/350831964 @@ -50,4 +48,5 @@ vendor_init default_prop property_service b/366116214 vendor_init default_prop property_service b/369735133 vendor_init default_prop property_service b/369735170 zygote aconfig_storage_metadata_file dir b/383949055 +zygote media_config_prop file b/394433509 zygote zygote capability b/379591519 diff --git a/whitechapel/vendor/google/file.te b/whitechapel/vendor/google/file.te index db4d0570..616aad27 100644 --- a/whitechapel/vendor/google/file.te +++ b/whitechapel/vendor/google/file.te @@ -9,7 +9,6 @@ type vendor_dmd_log_file, file_type, data_file_type; type vendor_rfsd_log_file, file_type, data_file_type; type vendor_dump_log_file, file_type, data_file_type; type vendor_rild_log_file, file_type, data_file_type; -type vendor_sced_log_file, file_type, data_file_type; type vendor_telephony_log_file, file_type, data_file_type; # app data files diff --git a/whitechapel/vendor/google/file_contexts b/whitechapel/vendor/google/file_contexts index 196d0dd7..47124b7a 100644 --- a/whitechapel/vendor/google/file_contexts +++ b/whitechapel/vendor/google/file_contexts @@ -136,7 +136,6 @@ /(vendor|system/vendor)/bin/cbd u:object_r:cbd_exec:s0 /(vendor|system/vendor)/bin/hw/rild_exynos u:object_r:rild_exec:s0 /(vendor|system/vendor)/bin/rfsd u:object_r:rfsd_exec:s0 -/(vendor|system/vendor)/bin/sced u:object_r:sced_exec:s0 /(vendor|system/vendor)/bin/bipchmgr u:object_r:bipchmgr_exec:s0 # @@ -148,7 +147,6 @@ /data/vendor/log/rfsd(/.*)? u:object_r:vendor_rfsd_log_file:s0 /data/vendor/log/dump(/.*)? u:object_r:vendor_dump_log_file:s0 /data/vendor/log/rild(/.*)? u:object_r:vendor_rild_log_file:s0 -/data/vendor/log/sced(/.*)? u:object_r:vendor_sced_log_file:s0 /persist/sensorcal\.json u:object_r:sensors_cal_file:s0 diff --git a/whitechapel/vendor/google/genfs_contexts b/whitechapel/vendor/google/genfs_contexts index ec02ff21..2cdc2ace 100644 --- a/whitechapel/vendor/google/genfs_contexts +++ b/whitechapel/vendor/google/genfs_contexts @@ -352,3 +352,6 @@ genfscon sysfs /devices/platform/25f40000.etm u:object_r:sysfs_devices_cs_etm # BootControl genfscon sysfs /kernel/boot_control/blow_ar u:object_r:sysfs_bootctl:s0 + +# USB +genfscon sysfs /devices/platform/11110000.usb/11110000.dwc3/udc/11110000.dwc3/state u:object_r:sysfs_udc:s0 diff --git a/whitechapel/vendor/google/hal_usb_impl.te b/whitechapel/vendor/google/hal_usb_impl.te index cd2cbf89..f72412e6 100644 --- a/whitechapel/vendor/google/hal_usb_impl.te +++ b/whitechapel/vendor/google/hal_usb_impl.te @@ -30,3 +30,4 @@ get_prop(hal_usb_impl, vendor_usb_config_prop); # For monitoring usb sysfs attributes allow hal_usb_impl sysfs_wakeup:dir search; allow hal_usb_impl sysfs_wakeup:file r_file_perms; +allow hal_usb_impl sysfs_udc:file r_file_perms; diff --git a/whitechapel/vendor/google/init-display-sh.te b/whitechapel/vendor/google/init-display-sh.te index 54ff7d6e..7f64b782 100644 --- a/whitechapel/vendor/google/init-display-sh.te +++ b/whitechapel/vendor/google/init-display-sh.te @@ -8,3 +8,5 @@ allow init-display-sh vendor_toolbox_exec:file execute_no_trans; dontaudit init-display-sh proc_cmdline:file r_file_perms; +# Allow modprobe to log to kmsg. +allow init-display-sh kmsg_device:chr_file w_file_perms; diff --git a/whitechapel/vendor/google/modem_svc_sit.te b/whitechapel/vendor/google/modem_svc_sit.te index 467e8799..8f6c240f 100644 --- a/whitechapel/vendor/google/modem_svc_sit.te +++ b/whitechapel/vendor/google/modem_svc_sit.te @@ -45,7 +45,5 @@ allow modem_svc_sit modem_img_file:file r_file_perms; allow modem_svc_sit modem_img_file:lnk_file r_file_perms; # Allow modem_svc_sit to access socket for UMI -userdebug_or_eng(` - allow modem_svc_sit radio_vendor_data_file:sock_file { create unlink }; -') +allow modem_svc_sit radio_vendor_data_file:sock_file { create unlink write}; diff --git a/whitechapel/vendor/google/sced.te b/whitechapel/vendor/google/sced.te deleted file mode 100644 index 43292621..00000000 --- a/whitechapel/vendor/google/sced.te +++ /dev/null @@ -1,23 +0,0 @@ -type sced, domain; -type sced_exec, vendor_file_type, exec_type, file_type; -init_daemon_domain(sced) - -userdebug_or_eng(` -typeattribute sced vendor_executes_system_violators; - -hwbinder_use(sced) -binder_call(sced, dmd) -binder_call(sced, vendor_telephony_app) - -get_prop(sced, hwservicemanager_prop) -allow sced self:packet_socket create_socket_perms_no_ioctl; - -allow sced self:capability net_raw; -allow sced shell_exec:file rx_file_perms; -allow sced tcpdump_exec:file rx_file_perms; -allow sced vendor_shell_exec:file x_file_perms; -allow sced vendor_slog_file:dir create_dir_perms; -allow sced vendor_slog_file:file create_file_perms; -allow sced hidl_base_hwservice:hwservice_manager add; -allow sced hal_vendor_oem_hwservice:hwservice_manager { add find }; -') diff --git a/whitechapel/vendor/google/vendor_telephony_app.te b/whitechapel/vendor/google/vendor_telephony_app.te index 499764b2..b046e60b 100644 --- a/whitechapel/vendor/google/vendor_telephony_app.te +++ b/whitechapel/vendor/google/vendor_telephony_app.te @@ -12,7 +12,6 @@ allow vendor_telephony_app vendor_slog_file:file create_file_perms; allow vendor_telephony_app app_api_service:service_manager find; allow vendor_telephony_app hal_vendor_oem_hwservice:hwservice_manager find; binder_call(vendor_telephony_app, dmd) -binder_call(vendor_telephony_app, sced) userdebug_or_eng(` # Silent Logging