Snap for 13025264 from bc8263d2ff
to mainline-tzdata6-release
Change-Id: I24969d1f96f5749b1c73d0630e8b7156d5cce328
This commit is contained in:
commit
4f22836dba
9 changed files with 8 additions and 32 deletions
|
@ -2,7 +2,6 @@
|
|||
battery_mitigation sysfs file b/364446534
|
||||
bluetooth audio_config_prop file b/379226761
|
||||
bluetooth audio_config_prop file b/379245675
|
||||
chre vendor_data_file dir b/301948771
|
||||
dump_display sysfs file b/340722772
|
||||
dump_modem sscoredump_vendor_data_coredump_file dir b/366115873
|
||||
dump_modem sscoredump_vendor_data_logcat_file dir b/366115873
|
||||
|
@ -26,7 +25,6 @@ priv_app audio_config_prop file b/379246066
|
|||
radio audio_config_prop file b/379227275
|
||||
ramdump ramdump capability b/369538457
|
||||
ramdump_app default_prop file b/386149238
|
||||
ramdump_app privapp_data_file lnk_file b/385977809
|
||||
rfsd vendor_cbd_prop file b/317734418
|
||||
shell sysfs_net file b/329380904
|
||||
ssr_detector_app default_prop file b/350831964
|
||||
|
@ -50,4 +48,5 @@ vendor_init default_prop property_service b/366116214
|
|||
vendor_init default_prop property_service b/369735133
|
||||
vendor_init default_prop property_service b/369735170
|
||||
zygote aconfig_storage_metadata_file dir b/383949055
|
||||
zygote media_config_prop file b/394433509
|
||||
zygote zygote capability b/379591519
|
||||
|
|
1
whitechapel/vendor/google/file.te
vendored
1
whitechapel/vendor/google/file.te
vendored
|
@ -9,7 +9,6 @@ type vendor_dmd_log_file, file_type, data_file_type;
|
|||
type vendor_rfsd_log_file, file_type, data_file_type;
|
||||
type vendor_dump_log_file, file_type, data_file_type;
|
||||
type vendor_rild_log_file, file_type, data_file_type;
|
||||
type vendor_sced_log_file, file_type, data_file_type;
|
||||
type vendor_telephony_log_file, file_type, data_file_type;
|
||||
|
||||
# app data files
|
||||
|
|
2
whitechapel/vendor/google/file_contexts
vendored
2
whitechapel/vendor/google/file_contexts
vendored
|
@ -136,7 +136,6 @@
|
|||
/(vendor|system/vendor)/bin/cbd u:object_r:cbd_exec:s0
|
||||
/(vendor|system/vendor)/bin/hw/rild_exynos u:object_r:rild_exec:s0
|
||||
/(vendor|system/vendor)/bin/rfsd u:object_r:rfsd_exec:s0
|
||||
/(vendor|system/vendor)/bin/sced u:object_r:sced_exec:s0
|
||||
/(vendor|system/vendor)/bin/bipchmgr u:object_r:bipchmgr_exec:s0
|
||||
|
||||
#
|
||||
|
@ -148,7 +147,6 @@
|
|||
/data/vendor/log/rfsd(/.*)? u:object_r:vendor_rfsd_log_file:s0
|
||||
/data/vendor/log/dump(/.*)? u:object_r:vendor_dump_log_file:s0
|
||||
/data/vendor/log/rild(/.*)? u:object_r:vendor_rild_log_file:s0
|
||||
/data/vendor/log/sced(/.*)? u:object_r:vendor_sced_log_file:s0
|
||||
|
||||
/persist/sensorcal\.json u:object_r:sensors_cal_file:s0
|
||||
|
||||
|
|
3
whitechapel/vendor/google/genfs_contexts
vendored
3
whitechapel/vendor/google/genfs_contexts
vendored
|
@ -352,3 +352,6 @@ genfscon sysfs /devices/platform/25f40000.etm u:object_r:sysfs_devices_cs_etm
|
|||
|
||||
# BootControl
|
||||
genfscon sysfs /kernel/boot_control/blow_ar u:object_r:sysfs_bootctl:s0
|
||||
|
||||
# USB
|
||||
genfscon sysfs /devices/platform/11110000.usb/11110000.dwc3/udc/11110000.dwc3/state u:object_r:sysfs_udc:s0
|
||||
|
|
1
whitechapel/vendor/google/hal_usb_impl.te
vendored
1
whitechapel/vendor/google/hal_usb_impl.te
vendored
|
@ -30,3 +30,4 @@ get_prop(hal_usb_impl, vendor_usb_config_prop);
|
|||
# For monitoring usb sysfs attributes
|
||||
allow hal_usb_impl sysfs_wakeup:dir search;
|
||||
allow hal_usb_impl sysfs_wakeup:file r_file_perms;
|
||||
allow hal_usb_impl sysfs_udc:file r_file_perms;
|
||||
|
|
2
whitechapel/vendor/google/init-display-sh.te
vendored
2
whitechapel/vendor/google/init-display-sh.te
vendored
|
@ -8,3 +8,5 @@ allow init-display-sh vendor_toolbox_exec:file execute_no_trans;
|
|||
|
||||
dontaudit init-display-sh proc_cmdline:file r_file_perms;
|
||||
|
||||
# Allow modprobe to log to kmsg.
|
||||
allow init-display-sh kmsg_device:chr_file w_file_perms;
|
||||
|
|
4
whitechapel/vendor/google/modem_svc_sit.te
vendored
4
whitechapel/vendor/google/modem_svc_sit.te
vendored
|
@ -45,7 +45,5 @@ allow modem_svc_sit modem_img_file:file r_file_perms;
|
|||
allow modem_svc_sit modem_img_file:lnk_file r_file_perms;
|
||||
|
||||
# Allow modem_svc_sit to access socket for UMI
|
||||
userdebug_or_eng(`
|
||||
allow modem_svc_sit radio_vendor_data_file:sock_file { create unlink };
|
||||
')
|
||||
allow modem_svc_sit radio_vendor_data_file:sock_file { create unlink write};
|
||||
|
||||
|
|
23
whitechapel/vendor/google/sced.te
vendored
23
whitechapel/vendor/google/sced.te
vendored
|
@ -1,23 +0,0 @@
|
|||
type sced, domain;
|
||||
type sced_exec, vendor_file_type, exec_type, file_type;
|
||||
init_daemon_domain(sced)
|
||||
|
||||
userdebug_or_eng(`
|
||||
typeattribute sced vendor_executes_system_violators;
|
||||
|
||||
hwbinder_use(sced)
|
||||
binder_call(sced, dmd)
|
||||
binder_call(sced, vendor_telephony_app)
|
||||
|
||||
get_prop(sced, hwservicemanager_prop)
|
||||
allow sced self:packet_socket create_socket_perms_no_ioctl;
|
||||
|
||||
allow sced self:capability net_raw;
|
||||
allow sced shell_exec:file rx_file_perms;
|
||||
allow sced tcpdump_exec:file rx_file_perms;
|
||||
allow sced vendor_shell_exec:file x_file_perms;
|
||||
allow sced vendor_slog_file:dir create_dir_perms;
|
||||
allow sced vendor_slog_file:file create_file_perms;
|
||||
allow sced hidl_base_hwservice:hwservice_manager add;
|
||||
allow sced hal_vendor_oem_hwservice:hwservice_manager { add find };
|
||||
')
|
|
@ -12,7 +12,6 @@ allow vendor_telephony_app vendor_slog_file:file create_file_perms;
|
|||
allow vendor_telephony_app app_api_service:service_manager find;
|
||||
allow vendor_telephony_app hal_vendor_oem_hwservice:hwservice_manager find;
|
||||
binder_call(vendor_telephony_app, dmd)
|
||||
binder_call(vendor_telephony_app, sced)
|
||||
|
||||
userdebug_or_eng(`
|
||||
# Silent Logging
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue