diff --git a/tracking_denials/dmd.te b/tracking_denials/dmd.te deleted file mode 100644 index de764e70..00000000 --- a/tracking_denials/dmd.te +++ /dev/null @@ -1,5 +0,0 @@ -# b/205073232 -dontaudit dmd vendor_persist_config_default_prop:file { getattr }; -dontaudit dmd vendor_persist_config_default_prop:file { map }; -dontaudit dmd vendor_persist_config_default_prop:file { open }; -dontaudit dmd vendor_persist_config_default_prop:file { read }; diff --git a/tracking_denials/vcd.te b/tracking_denials/vcd.te deleted file mode 100644 index 66f5c0c9..00000000 --- a/tracking_denials/vcd.te +++ /dev/null @@ -1,5 +0,0 @@ -# b/205073025 -dontaudit vcd vendor_persist_config_default_prop:file { getattr }; -dontaudit vcd vendor_persist_config_default_prop:file { map }; -dontaudit vcd vendor_persist_config_default_prop:file { open }; -dontaudit vcd vendor_persist_config_default_prop:file { read }; diff --git a/tracking_denials/vendor_init.te b/tracking_denials/vendor_init.te index 6f615a22..c6a4b4d3 100644 --- a/tracking_denials/vendor_init.te +++ b/tracking_denials/vendor_init.te @@ -1,9 +1,4 @@ # b/205656950 dontaudit vendor_init thermal_link_device:file { create }; -# b/206045605 -dontaudit vendor_init vendor_modem_prop:file { getattr }; -dontaudit vendor_init vendor_modem_prop:file { map }; -dontaudit vendor_init vendor_modem_prop:file { open }; -dontaudit vendor_init vendor_modem_prop:file { read }; # b/207062206 dontaudit vendor_init proc_sched:file { write }; diff --git a/whitechapel_pro/dmd.te b/whitechapel_pro/dmd.te index c247bb46..1cb17dc7 100644 --- a/whitechapel_pro/dmd.te +++ b/whitechapel_pro/dmd.te @@ -20,6 +20,7 @@ allow dmd self:tcp_socket { create_socket_perms_no_ioctl listen accept bind }; set_prop(dmd, vendor_diag_prop) set_prop(dmd, vendor_slog_prop) set_prop(dmd, vendor_modem_prop) +get_prop(dmd, vendor_persist_config_default_prop) # Grant to access hwservice manager get_prop(dmd, hwservicemanager_prop) diff --git a/whitechapel_pro/property_contexts b/whitechapel_pro/property_contexts index 52416407..417f0e43 100644 --- a/whitechapel_pro/property_contexts +++ b/whitechapel_pro/property_contexts @@ -42,6 +42,7 @@ persist.vendor.ril. u:object_r:vendor_rild_prop:s0 vendor.ril. u:object_r:vendor_rild_prop:s0 vendor.radio.ril. u:object_r:vendor_rild_prop:s0 vendor.sys.rild_reset u:object_r:vendor_rild_prop:s0 +persist.vendor.radio. u:object_r:vendor_rild_prop:s0 ro.vendor.config.build_carrier u:object_r:vendor_carrier_prop:s0 persist.vendor.config. u:object_r:vendor_persist_config_default_prop:s0 diff --git a/whitechapel_pro/vcd.te b/whitechapel_pro/vcd.te index 211d3675..c5c229ee 100644 --- a/whitechapel_pro/vcd.te +++ b/whitechapel_pro/vcd.te @@ -4,6 +4,7 @@ userdebug_or_eng(` init_daemon_domain(vcd) get_prop(vcd, vendor_rild_prop); + get_prop(vcd, vendor_persist_config_default_prop); allow vcd serial_device:chr_file rw_file_perms; allow vcd radio_device:chr_file rw_file_perms; diff --git a/whitechapel_pro/vendor_init.te b/whitechapel_pro/vendor_init.te index 68ac08be..e2ec60fa 100644 --- a/whitechapel_pro/vendor_init.te +++ b/whitechapel_pro/vendor_init.te @@ -6,6 +6,7 @@ set_prop(vendor_init, vendor_cbd_prop) set_prop(vendor_init, vendor_ready_prop) get_prop(vendor_init, vendor_battery_profile_prop) set_prop(vendor_init, vendor_device_prop) +set_prop(vendor_init, vendor_modem_prop) allow vendor_init proc_dirty:file w_file_perms;