-----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO eKA7AJwJzAEjJsFAnNBunzzVHwfc6k7TkwCfc/FFP5sw/Z4oEgjDPAjjxMk00lw= =P00m -----END PGP SIGNATURE----- gpgsig -----BEGIN PGP SIGNATURE----- iQJLBAABCgA1FiEEHrBYPudH862glXQBzJUERRm+ZmkFAmdY7dcXHG1rYmVzdGFz QGxpbmVhZ2Vvcy5vcmcACgkQzJUERRm+ZmnQIg//RsMCsX8EXfSwirFmHcLqUgRl zr4r71c+SJderH03ME18EOtbsagw8MwPpV/U03cfE1AvKwv2UF0QhbkHyLn33YGm 4LAgG5WTaETGYrZf9hBxAA8SAokhYIsHyfSJ+wwJtGOf02QPlIamPZKS8mLsedCF oXFmuwqnIdzGAi8AvNWCZDejrgkUXyK8DVQ06C3+DDljvcuxWve0c2kBNA4xvoeE j2XKqK+DBX+IholRFaKAgtkN1wgreqaGPqK/j6KlAnIpTeeRLsTl/CRjE9Ir3idJ 9M2u11I0XSnJ4pP8JiY7JF2x+Wf5khIjB6sZgy754QnRbT71PZWRpypZIG69/rh5 2EWNBHBzQrodSIZoF7M5YnbrAiqVUFxeu5Z7eNaEMQborHKTve3GcG/GRt25AIxZ WLnyNZFbziGtkV5R4tM3N9NQZ6Uz3tmDgVzBhGZK2c7loKSUfEp5G+LwtyvqQvmC FuFKB1T7FTdDnr4cdJlAQ8gQOFq/P3ax1UnFNQrBSlgRG3T8Q83nphQYGMChyXc9 sp19jDw+B0JzGhfLQ53AJ60Al4wnUp+6eyVtiYgyM5zYnpLZsbVO1WqcjmwPJSo9 wxNlsUu1Qy85o0y74kAC307sjgyK6b+bRaib8nehfwsDn2OZcC356rOe6NGoPhOZ tQ338qQThGg6Ludofns= =lZku -----END PGP SIGNATURE----- Merge tag 'android-15.0.0_r6' into staging/lineage-22.0_merge-android-15.0.0_r6 Android 15.0.0 Release 6 (AP4A.241205.013) # -----BEGIN PGP SIGNATURE----- # # iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO # eKA7AJwJzAEjJsFAnNBunzzVHwfc6k7TkwCfc/FFP5sw/Z4oEgjDPAjjxMk00lw= # =P00m # -----END PGP SIGNATURE----- # gpg: Signature made Fri Dec 6 00:44:01 2024 EET # gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78 # gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal] # gpg: initial-contribution@android.com: Verified 2483 signatures in the past # 3 years. Encrypted 4 messages in the past 2 years. # gpg: WARNING: This key is not certified with sufficiently trusted signatures! # gpg: It is not certain that the signature belongs to the owner. # Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78 # By Wilson Sung (5) and others # Via Android Build Coastguard Worker (38) and others * tag 'android-15.0.0_r6': (52 commits) Make android.framework.stats-v2-ndk app reachable Allow fingerprint to access /dev/fth_fd Update SELinux error Change vendor_fingerprint_prop to vendor_restricted_prop Update SELinux error Move euiccpixel_app to vendor Allow systemui_app to set 'debug.tracing.desktop_mode_visible_tasks' system property storage: move storage related device type to common folder Move sepolicy about hal_radioext_default to gs-common Allow fingerprint to access sysfs_lhbm Update SELinux error Update sepolicy for nfc antenna selftest values Revert^2 "modem_svc: update sepolicy for UMI" Revert "modem_svc: update sepolicy for UMI" Update SELinux error modem_svc: update sepolicy for UMI fix bipchmgr sepolicy Label sysfs node power_mode as sysfs_display. Label frame_interval and expected_present_time as sysfs_display Grant the MDS assess the OemRil service AIDL interface. ... Conflicts: sepolicy/radio/radio.te sepolicy/tracking_denials/keys.conf sepolicy/vendor/genfs_contexts Change-Id: I5bc554da77b3317f17a838508e87c7fe84f14191
25 lines
881 B
Text
25 lines
881 B
Text
type sced, domain;
|
|
type sced_exec, vendor_file_type, exec_type, file_type;
|
|
|
|
userdebug_or_eng(`
|
|
init_daemon_domain(sced)
|
|
typeattribute sced vendor_executes_system_violators;
|
|
|
|
hwbinder_use(sced)
|
|
binder_call(sced, dmd)
|
|
binder_call(sced, vendor_telephony_silentlogging_app)
|
|
|
|
get_prop(sced, hwservicemanager_prop)
|
|
allow sced self:packet_socket create_socket_perms_no_ioctl;
|
|
|
|
allow sced self:capability net_raw;
|
|
allow sced shell_exec:file rx_file_perms;
|
|
allow sced tcpdump_exec:file rx_file_perms;
|
|
allow sced vendor_shell_exec:file x_file_perms;
|
|
allow sced vendor_slog_file:dir create_dir_perms;
|
|
allow sced vendor_slog_file:file create_file_perms;
|
|
allow sced hidl_base_hwservice:hwservice_manager add;
|
|
allow sced hal_vendor_oem_hwservice:hwservice_manager { add find };
|
|
add_service(sced, hal_vendor_tcpdump_service)
|
|
binder_call(sced, servicemanager)
|
|
')
|