device_google_zumapro/sepolicy/radio/sced.te
Michael Bestas 987c1bf308 Android 15.0.0 Release 6 (AP4A.241205.013)
-----BEGIN PGP SIGNATURE-----
 
 iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
 eKA7AJwJzAEjJsFAnNBunzzVHwfc6k7TkwCfc/FFP5sw/Z4oEgjDPAjjxMk00lw=
 =P00m
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQJLBAABCgA1FiEEHrBYPudH862glXQBzJUERRm+ZmkFAmdY7dcXHG1rYmVzdGFz
 QGxpbmVhZ2Vvcy5vcmcACgkQzJUERRm+ZmnQIg//RsMCsX8EXfSwirFmHcLqUgRl
 zr4r71c+SJderH03ME18EOtbsagw8MwPpV/U03cfE1AvKwv2UF0QhbkHyLn33YGm
 4LAgG5WTaETGYrZf9hBxAA8SAokhYIsHyfSJ+wwJtGOf02QPlIamPZKS8mLsedCF
 oXFmuwqnIdzGAi8AvNWCZDejrgkUXyK8DVQ06C3+DDljvcuxWve0c2kBNA4xvoeE
 j2XKqK+DBX+IholRFaKAgtkN1wgreqaGPqK/j6KlAnIpTeeRLsTl/CRjE9Ir3idJ
 9M2u11I0XSnJ4pP8JiY7JF2x+Wf5khIjB6sZgy754QnRbT71PZWRpypZIG69/rh5
 2EWNBHBzQrodSIZoF7M5YnbrAiqVUFxeu5Z7eNaEMQborHKTve3GcG/GRt25AIxZ
 WLnyNZFbziGtkV5R4tM3N9NQZ6Uz3tmDgVzBhGZK2c7loKSUfEp5G+LwtyvqQvmC
 FuFKB1T7FTdDnr4cdJlAQ8gQOFq/P3ax1UnFNQrBSlgRG3T8Q83nphQYGMChyXc9
 sp19jDw+B0JzGhfLQ53AJ60Al4wnUp+6eyVtiYgyM5zYnpLZsbVO1WqcjmwPJSo9
 wxNlsUu1Qy85o0y74kAC307sjgyK6b+bRaib8nehfwsDn2OZcC356rOe6NGoPhOZ
 tQ338qQThGg6Ludofns=
 =lZku
 -----END PGP SIGNATURE-----

Merge tag 'android-15.0.0_r6' into staging/lineage-22.0_merge-android-15.0.0_r6

Android 15.0.0 Release 6 (AP4A.241205.013)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ1IssQAKCRDorT+BmrEO
# eKA7AJwJzAEjJsFAnNBunzzVHwfc6k7TkwCfc/FFP5sw/Z4oEgjDPAjjxMk00lw=
# =P00m
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri Dec  6 00:44:01 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2483 signatures in the past
#      3 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Wilson Sung (5) and others
# Via Android Build Coastguard Worker (38) and others
* tag 'android-15.0.0_r6': (52 commits)
  Make android.framework.stats-v2-ndk app reachable
  Allow fingerprint to access /dev/fth_fd
  Update SELinux error
  Change vendor_fingerprint_prop to vendor_restricted_prop
  Update SELinux error
  Move euiccpixel_app to vendor
  Allow systemui_app to set 'debug.tracing.desktop_mode_visible_tasks' system property
  storage: move storage related device type to common folder
  Move sepolicy about hal_radioext_default to gs-common
  Allow fingerprint to access sysfs_lhbm
  Update SELinux error
  Update sepolicy for nfc antenna selftest values
  Revert^2 "modem_svc: update sepolicy for UMI"
  Revert "modem_svc: update sepolicy for UMI"
  Update SELinux error
  modem_svc: update sepolicy for UMI
  fix bipchmgr sepolicy
  Label sysfs node power_mode as sysfs_display.
  Label frame_interval and expected_present_time as sysfs_display
  Grant the MDS assess the OemRil service AIDL interface.
  ...

 Conflicts:
	sepolicy/radio/radio.te
	sepolicy/tracking_denials/keys.conf
	sepolicy/vendor/genfs_contexts

Change-Id: I5bc554da77b3317f17a838508e87c7fe84f14191
2024-12-11 03:41:42 +02:00

25 lines
881 B
Text

type sced, domain;
type sced_exec, vendor_file_type, exec_type, file_type;
userdebug_or_eng(`
init_daemon_domain(sced)
typeattribute sced vendor_executes_system_violators;
hwbinder_use(sced)
binder_call(sced, dmd)
binder_call(sced, vendor_telephony_silentlogging_app)
get_prop(sced, hwservicemanager_prop)
allow sced self:packet_socket create_socket_perms_no_ioctl;
allow sced self:capability net_raw;
allow sced shell_exec:file rx_file_perms;
allow sced tcpdump_exec:file rx_file_perms;
allow sced vendor_shell_exec:file x_file_perms;
allow sced vendor_slog_file:dir create_dir_perms;
allow sced vendor_slog_file:file create_file_perms;
allow sced hidl_base_hwservice:hwservice_manager add;
allow sced hal_vendor_oem_hwservice:hwservice_manager { add find };
add_service(sced, hal_vendor_tcpdump_service)
binder_call(sced, servicemanager)
')