Files
device_google_gs201/sepolicy/whitechapel_pro/init.te
Michael Bestas a770b611a1 Merge tag 'android-15.0.0_r20' into staging/lineage-22.2_merge-android-15.0.0_r20
Android 15.0.0 Release 20 (BP1A.250305.019)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ8eo7QAKCRDorT+BmrEO
# eN4GAJ4zBTRmknJtiHTlKaXFFCxh6RaE0QCfVZMelWDtp9SyAoTrojuN1flREII=
# =d0db
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Mar  5 03:29:17 2025 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [ultimate]

# By Nina Chen (9) and others
# Via Android Build Coastguard Worker (22) and others
* tag 'android-15.0.0_r20': (22 commits)
  modem_svc: move shared_modem_platform related sepolicy to gs-common
  Update SELinux error
  Allow tachyon service to make binder calls to GCA
  Update SELinux error
  Update SELinux error
  Revert "modem_svc: move shared_modem_platform related sepolicy t..."
  modem_svc: move shared_modem_platform related sepolicy to gs-common
  Update ldaf sensor device filename
  Update SELinux error
  Update SELinux error
  sepolicy: allow dump_power to read battery_history_device
  Update SELinux error
  sepolicy: allow dump_power to read debugfs
  Remove duplicate service entries
  Revert "Update SELinux error"
  Update SELinux error
  convert-to-ext4-sh.te: use su domain instead
  modem_svc: use shared_modem_platform to replace all modem_svc_sit
  Update SELinux error
  sepolicy: allow dumpstate to execute dump_power
  ...

 Conflicts:
	sepolicy/gs201-sepolicy.mk

Change-Id: Ie0faabb66c73c2e4da10f9f8f0a65fa49e68a7dc
2025-03-09 11:06:21 +02:00

33 lines
1.3 KiB
Plaintext

allow init modem_img_file:dir mounton;
allow init mnt_vendor_file:dir mounton;
allow init modem_img_file:filesystem { getattr mount relabelfrom };
allow init custom_ab_block_device:lnk_file relabelto;
# This is needed for chaining a boot partition vbmeta
# descriptor, where init will probe the boot partition
# to read the chained vbmeta in the first-stage, then
# relabel /dev/block/by-name/boot_[a|b] to block_device
# after loading sepolicy in the second stage.
allow init boot_block_device:lnk_file relabelto;
allow init persist_file:dir mounton;
allow init modem_efs_file:dir mounton;
allow init modem_userdata_file:dir mounton;
allow init ram_device:blk_file w_file_perms;
allow init sysfs_scsi_devices_0000:file w_file_perms;
# Workaround for b/193113005 that modem_img unlabeled after disable-verity
dontaudit init overlayfs_file:file rename;
dontaudit init overlayfs_file:chr_file unlink;
# /system_ext/bin/convert_to_ext4.sh is a script to convert an f2fs
# filesystem into an ext4 filesystem. This script is executed on
# debuggable devices only. As it is a one-shot script which
# has run in permissive mode since 2022, we transition to the
# su domain to avoid unnecessarily polluting security policy
# with rules which are never enforced.
# This script was added in b/239632964
userdebug_or_eng(`
domain_auto_trans(init, convert-to-ext4-sh_exec, su)
')