review sced
Bug: 196916111 Test: boot with sced started Change-Id: I9140b5bc0f7ad4efedbbbcf58f9e773e5246df74
This commit is contained in:
parent
5656f81f62
commit
dcf0597594
5 changed files with 24 additions and 26 deletions
|
@ -9,7 +9,6 @@ type vendor_cbd_log_file, file_type, data_file_type;
|
|||
type vendor_rfsd_log_file, file_type, data_file_type;
|
||||
type vendor_dump_log_file, file_type, data_file_type;
|
||||
type vendor_rild_log_file, file_type, data_file_type;
|
||||
type vendor_sced_log_file, file_type, data_file_type;
|
||||
type vendor_telephony_log_file, file_type, data_file_type;
|
||||
type vendor_vcd_log_file, file_type, data_file_type;
|
||||
|
||||
|
|
|
@ -119,7 +119,6 @@
|
|||
/(vendor|system/vendor)/bin/hw/lhd u:object_r:lhd_exec:s0
|
||||
/(vendor|system/vendor)/bin/hw/rild_exynos u:object_r:rild_exec:s0
|
||||
/(vendor|system/vendor)/bin/rfsd u:object_r:rfsd_exec:s0
|
||||
/(vendor|system/vendor)/bin/sced u:object_r:sced_exec:s0
|
||||
/(vendor|system/vendor)/bin/vcd u:object_r:vcd_exec:s0
|
||||
/(vendor|system/vendor)/bin/bipchmgr u:object_r:bipchmgr_exec:s0
|
||||
|
||||
|
@ -137,7 +136,6 @@
|
|||
/data/vendor/log/rfsd(/.*)? u:object_r:vendor_rfsd_log_file:s0
|
||||
/data/vendor/log/dump(/.*)? u:object_r:vendor_dump_log_file:s0
|
||||
/data/vendor/log/rild(/.*)? u:object_r:vendor_rild_log_file:s0
|
||||
/data/vendor/log/sced(/.*)? u:object_r:vendor_sced_log_file:s0
|
||||
/data/vendor/log/vcd(/.*)? u:object_r:vendor_vcd_log_file:s0
|
||||
|
||||
/persist/sensorcal\.json u:object_r:sensors_cal_file:s0
|
||||
|
|
|
@ -1,22 +0,0 @@
|
|||
type sced, domain;
|
||||
type sced_exec, vendor_file_type, exec_type, file_type;
|
||||
init_daemon_domain(sced)
|
||||
|
||||
userdebug_or_eng(`
|
||||
typeattribute sced vendor_executes_system_violators;
|
||||
|
||||
hwbinder_use(sced)
|
||||
binder_call(sced, dmd)
|
||||
|
||||
get_prop(sced, hwservicemanager_prop)
|
||||
allow sced self:packet_socket create_socket_perms_no_ioctl;
|
||||
|
||||
allow sced self:capability net_raw;
|
||||
allow sced shell_exec:file rx_file_perms;
|
||||
allow sced tcpdump_exec:file rx_file_perms;
|
||||
allow sced vendor_shell_exec:file x_file_perms;
|
||||
allow sced vendor_slog_file:dir create_dir_perms;
|
||||
allow sced vendor_slog_file:file create_file_perms;
|
||||
allow sced hidl_base_hwservice:hwservice_manager add;
|
||||
allow sced hal_vendor_oem_hwservice:hwservice_manager { add find };
|
||||
')
|
|
@ -1,6 +1,7 @@
|
|||
# Binaries
|
||||
/vendor/bin/dmd u:object_r:dmd_exec:s0
|
||||
/vendor/bin/modem_logging_control u:object_r:modem_logging_control_exec:s0
|
||||
/vendor/bin/sced u:object_r:sced_exec:s0
|
||||
|
||||
# Vendor Firmwares
|
||||
/vendor/firmware(/.*)? u:object_r:vendor_fw_file:s0
|
||||
|
@ -20,4 +21,4 @@
|
|||
/data/vendor/radio(/.*)? u:object_r:radio_vendor_data_file:s0
|
||||
|
||||
# Extra mount images
|
||||
/mnt/vendor/modem_img(/.*)? u:object_r:modem_img_file:s0
|
||||
/mnt/vendor/modem_img(/.*)? u:object_r:modem_img_file:s0
|
||||
|
|
22
whitechapel_pro/sced.te
Normal file
22
whitechapel_pro/sced.te
Normal file
|
@ -0,0 +1,22 @@
|
|||
type sced, domain;
|
||||
type sced_exec, vendor_file_type, exec_type, file_type;
|
||||
|
||||
userdebug_or_eng(`
|
||||
init_daemon_domain(sced)
|
||||
typeattribute sced vendor_executes_system_violators;
|
||||
|
||||
hwbinder_use(sced)
|
||||
binder_call(sced, dmd)
|
||||
|
||||
get_prop(sced, hwservicemanager_prop)
|
||||
allow sced self:packet_socket create_socket_perms_no_ioctl;
|
||||
|
||||
allow sced self:capability net_raw;
|
||||
allow sced shell_exec:file rx_file_perms;
|
||||
allow sced tcpdump_exec:file rx_file_perms;
|
||||
allow sced vendor_shell_exec:file x_file_perms;
|
||||
allow sced vendor_slog_file:dir create_dir_perms;
|
||||
allow sced vendor_slog_file:file create_file_perms;
|
||||
allow sced hidl_base_hwservice:hwservice_manager add;
|
||||
allow sced hal_vendor_oem_hwservice:hwservice_manager { add find };
|
||||
')
|
Loading…
Add table
Add a link
Reference in a new issue