Snap for 9354090 from 24cfe388c5 to tm-qpr2-release

Change-Id: Id47d8082dcc6e0f6464bb0138d8887328bbbea8f
This commit is contained in:
Android Build Coastguard Worker 2022-12-01 00:03:22 +00:00
commit 73adfe41cf
5 changed files with 13 additions and 0 deletions

View file

@ -1,5 +1,7 @@
allow hal_health_default mnt_vendor_file:dir search;
allow hal_health_default persist_file:dir search;
allow hal_health_default persist_battery_file:file create_file_perms;
allow hal_health_default persist_battery_file:dir rw_dir_perms;
set_prop(hal_health_default, vendor_battery_defender_prop)

View file

@ -40,3 +40,6 @@ vendor_internal_prop(vendor_telephony_app_prop)
# Battery Mitigation
vendor_internal_prop(vendor_mitigation_ready_prop)
vendor_public_prop(vendor_brownout_reason_prop)
# Trusty storage FS ready
vendor_internal_prop(vendor_trusty_storage_prop)

View file

@ -110,3 +110,6 @@ vendor.config.debug. u:object_r:vendor_telephony_app_prop:
# Battery Mitigation
vendor.brownout.mitigation.ready u:object_r:vendor_mitigation_ready_prop:s0
vendor.brownout_reason u:object_r:vendor_brownout_reason_prop:s0
# Trusty
ro.vendor.trusty.storage.fs_ready u:object_r:vendor_trusty_storage_prop:s0

View file

@ -15,3 +15,5 @@ read_fstab(tee)
# storageproxyd starts before /data is mounted. It handles /data not being there
# gracefully. However, attempts to access /data trigger a denial.
dontaudit tee unlabeled:dir { search };
set_prop(tee, vendor_trusty_storage_prop)

View file

@ -41,3 +41,6 @@ set_prop(vendor_init, vendor_brownout_reason_prop)
# MM
allow vendor_init proc_watermark_scale_factor:file w_file_perms;
# Trusty storage FS ready
get_prop(vendor_init, vendor_trusty_storage_prop)