mirror of
https://github.com/Evolution-X-Devices/device_google_gs201
synced 2026-02-01 05:38:17 +00:00
Bug: 208721677 Bug: 208909124 Test: do adb bugreport with no relevant error log Change-Id: Idbe125d76392a8c04b3fa5f475e0c3aa2f9a199c
73 lines
3.0 KiB
Plaintext
73 lines
3.0 KiB
Plaintext
allow hal_dumpstate_default vendor_rfsd_log_file:dir r_dir_perms;
|
|
allow hal_dumpstate_default vendor_rfsd_log_file:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default vendor_gps_file:dir r_dir_perms;
|
|
allow hal_dumpstate_default vendor_gps_file:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sysfs_chip_id:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sysfs_wlc:dir r_dir_perms;
|
|
allow hal_dumpstate_default sysfs_wlc:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sysfs_exynos_bts:dir r_dir_perms;
|
|
allow hal_dumpstate_default sysfs_exynos_bts_stats:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sysfs_aoc:dir r_dir_perms;
|
|
allow hal_dumpstate_default sysfs_aoc_dumpstate:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sscoredump_vendor_data_crashinfo_file:dir r_dir_perms;
|
|
allow hal_dumpstate_default sscoredump_vendor_data_crashinfo_file:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sysfs_thermal:dir r_dir_perms;
|
|
allow hal_dumpstate_default sysfs_thermal:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sysfs_wifi:dir r_dir_perms;
|
|
allow hal_dumpstate_default sysfs_wifi:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sysfs_batteryinfo:dir r_dir_perms;
|
|
allow hal_dumpstate_default sysfs_batteryinfo:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sysfs_acpm_stats:dir r_dir_perms;
|
|
allow hal_dumpstate_default sysfs_acpm_stats:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default radio_vendor_data_file:dir create_dir_perms;
|
|
allow hal_dumpstate_default radio_vendor_data_file:file create_file_perms;
|
|
|
|
allow hal_dumpstate_default modem_efs_file:dir search;
|
|
allow hal_dumpstate_default modem_efs_file:file r_file_perms;
|
|
allow hal_dumpstate_default modem_stat_data_file:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default logbuffer_device:chr_file r_file_perms;
|
|
|
|
allow hal_dumpstate_default citadeld_service:service_manager find;
|
|
allow hal_dumpstate_default citadel_updater:file execute_no_trans;
|
|
binder_call(hal_dumpstate_default, citadeld);
|
|
|
|
allow hal_dumpstate_default device:dir r_dir_perms;
|
|
allow hal_dumpstate_default aoc_device:chr_file rw_file_perms;
|
|
|
|
allow hal_dumpstate_default proc_f2fs:dir r_dir_perms;
|
|
allow hal_dumpstate_default proc_f2fs:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sysfs_scsi_devices_0000:dir r_dir_perms;
|
|
allow hal_dumpstate_default sysfs_scsi_devices_0000:file r_file_perms;
|
|
|
|
allow hal_dumpstate_default sysfs_touch:dir r_dir_perms;
|
|
allow hal_dumpstate_default sysfs_touch:file rw_file_perms;
|
|
|
|
allow hal_dumpstate_default vendor_displaycolor_service:service_manager find;
|
|
binder_call(hal_dumpstate_default, hal_graphics_composer_default);
|
|
vndbinder_use(hal_dumpstate_default)
|
|
|
|
userdebug_or_eng(`
|
|
allow hal_dumpstate_default mnt_vendor_file:dir search;
|
|
allow hal_dumpstate_default ramdump_vendor_mnt_file:dir search;
|
|
allow hal_dumpstate_default ramdump_vendor_mnt_file:file r_file_perms;
|
|
allow hal_dumpstate_default sysfs_bcl:dir r_dir_perms;
|
|
allow hal_dumpstate_default sysfs_bcl:file r_file_perms;
|
|
|
|
')
|
|
|
|
dontaudit hal_dumpstate_default sysfs_bcl:dir { open };
|
|
dontaudit hal_dumpstate_default sysfs_bcl:file { read };
|