diff --git a/whitechapel_pro/dmd.te b/whitechapel_pro/dmd.te index 1cb17dc7..76177b50 100644 --- a/whitechapel_pro/dmd.te +++ b/whitechapel_pro/dmd.te @@ -29,3 +29,4 @@ allow dmd hal_vendor_oem_hwservice:hwservice_manager { add find }; binder_call(dmd, hwservicemanager) binder_call(dmd, modem_diagnostic_app) binder_call(dmd, modem_logging_control) +binder_call(dmd, vendor_telephony_silentlogging_app) diff --git a/whitechapel_pro/sced.te b/whitechapel_pro/sced.te index 07c5fa01..2b08973a 100644 --- a/whitechapel_pro/sced.te +++ b/whitechapel_pro/sced.te @@ -7,6 +7,7 @@ userdebug_or_eng(` hwbinder_use(sced) binder_call(sced, dmd) + binder_call(sced, vendor_telephony_silentlogging_app) get_prop(sced, hwservicemanager_prop) allow sced self:packet_socket create_socket_perms_no_ioctl; diff --git a/whitechapel_pro/vendor_silentlogging_remote_app.te b/whitechapel_pro/vendor_silentlogging_remote_app.te index 427f44d3..885fb6a7 100644 --- a/whitechapel_pro/vendor_silentlogging_remote_app.te +++ b/whitechapel_pro/vendor_silentlogging_remote_app.te @@ -1,4 +1,13 @@ type vendor_silentlogging_remote_app, domain; app_domain(vendor_silentlogging_remote_app) +allow vendor_silentlogging_remote_app vendor_slog_file:dir create_dir_perms; +allow vendor_silentlogging_remote_app vendor_slog_file:file create_file_perms; + allow vendor_silentlogging_remote_app app_api_service:service_manager find; + +userdebug_or_eng(` +# Silent Logging Remote +dontaudit vendor_silentlogging_remote_app system_app_data_file:dir create_dir_perms; +dontaudit vendor_silentlogging_remote_app system_app_data_file:file create_file_perms; +') diff --git a/whitechapel_pro/vendor_telephony_silentlogging_app.te b/whitechapel_pro/vendor_telephony_silentlogging_app.te index 53d1cb66..583f408f 100644 --- a/whitechapel_pro/vendor_telephony_silentlogging_app.te +++ b/whitechapel_pro/vendor_telephony_silentlogging_app.te @@ -1,4 +1,21 @@ type vendor_telephony_silentlogging_app, domain; app_domain(vendor_telephony_silentlogging_app) +set_prop(vendor_telephony_silentlogging_app, vendor_modem_prop) +set_prop(vendor_telephony_silentlogging_app, vendor_slog_prop) + +allow vendor_telephony_silentlogging_app vendor_slog_file:dir create_dir_perms; +allow vendor_telephony_silentlogging_app vendor_slog_file:file create_file_perms; + allow vendor_telephony_silentlogging_app app_api_service:service_manager find; +allow vendor_telephony_silentlogging_app hal_vendor_oem_hwservice:hwservice_manager find; +binder_call(vendor_telephony_silentlogging_app, dmd) +binder_call(vendor_telephony_silentlogging_app, sced) + +userdebug_or_eng(` +# Silent Logging +dontaudit vendor_telephony_silentlogging_app system_app_data_file:dir create_dir_perms; +dontaudit vendor_telephony_silentlogging_app system_app_data_file:file create_file_perms; +dontaudit vendor_telephony_silentlogging_app default_prop:file { getattr open read map }; +allow vendor_telephony_silentlogging_app selinuxfs:file { read open }; +')