mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
Merge "Temporarily whitelisting system domains writing vendor props" into pi-dev
am: 35e267a41f
Change-Id: I7b66c72a1e0bde39a0f89488e9948837ee3be681
This commit is contained in:
@@ -11,6 +11,7 @@ allow ramoops shell_exec:file rx_file_perms;
|
||||
allow ramoops toolbox_exec:file rx_file_perms;
|
||||
|
||||
# Set the sys.ramoops.decrypted property
|
||||
typeattribute ramoops system_writes_vendor_properties_violators;
|
||||
set_prop(ramoops, ramoops_prop);
|
||||
|
||||
allow ramoops sysfs_pstore:file rw_file_perms;
|
||||
|
||||
1
sepolicy/vendor/bluetooth.te
vendored
1
sepolicy/vendor/bluetooth.te
vendored
@@ -1,3 +1,4 @@
|
||||
typeattribute bluetooth system_writes_vendor_properties_violators;
|
||||
set_prop(bluetooth, vendor_bluetooth_prop)
|
||||
set_prop(bluetooth, wc_prop)
|
||||
|
||||
|
||||
1
sepolicy/vendor/cameraserver.te
vendored
1
sepolicy/vendor/cameraserver.te
vendored
@@ -1,5 +1,6 @@
|
||||
allow cameraserver gpu_device:chr_file rw_file_perms;
|
||||
|
||||
typeattribute cameraserver system_writes_vendor_properties_violators;
|
||||
set_prop(cameraserver, camera_prop)
|
||||
|
||||
allow cameraserver sysfs_camera:file r_file_perms;
|
||||
|
||||
1
sepolicy/vendor/charger.te
vendored
1
sepolicy/vendor/charger.te
vendored
@@ -1 +1,2 @@
|
||||
typeattribute charger system_writes_vendor_properties_violators;
|
||||
set_prop(charger, public_vendor_system_prop)
|
||||
|
||||
1
sepolicy/vendor/gatekeeperd.te
vendored
1
sepolicy/vendor/gatekeeperd.te
vendored
@@ -1 +1,2 @@
|
||||
typeattribute gatekeeperd system_writes_vendor_properties_violators;
|
||||
set_prop(gatekeeperd, keymaster_prop)
|
||||
|
||||
1
sepolicy/vendor/healthd.te
vendored
1
sepolicy/vendor/healthd.te
vendored
@@ -1 +1,2 @@
|
||||
typeattribute healthd system_writes_vendor_properties_violators;
|
||||
set_prop(healthd, public_vendor_system_prop)
|
||||
|
||||
1
sepolicy/vendor/radio.te
vendored
1
sepolicy/vendor/radio.te
vendored
@@ -1,4 +1,5 @@
|
||||
get_prop(radio, ims_prop)
|
||||
typeattribute radio system_writes_vendor_properties_violators;
|
||||
userdebug_or_eng(`set_prop(radio, tel_mon_prop)')
|
||||
|
||||
allow radio qmuxd_socket:dir search;
|
||||
|
||||
1
sepolicy/vendor/surfaceflinger.te
vendored
1
sepolicy/vendor/surfaceflinger.te
vendored
@@ -3,4 +3,5 @@ dontaudit surfaceflinger vendor_file:file read;
|
||||
dontaudit surfaceflinger kernel:system module_request;
|
||||
allow surfaceflinger debugfs_ion:dir search;
|
||||
|
||||
typeattribute surfaceflinger system_writes_vendor_properties_violators;
|
||||
set_prop(surfaceflinger, public_vendor_system_prop)
|
||||
|
||||
1
sepolicy/vendor/system_app.te
vendored
1
sepolicy/vendor/system_app.te
vendored
@@ -3,6 +3,7 @@
|
||||
userdebug_or_eng(`set_prop(system_app, tel_mon_prop)')
|
||||
|
||||
# Needed by Settings app's CameraHalHdrplusPreferenceController
|
||||
typeattribute system_app system_writes_vendor_properties_violators;
|
||||
set_prop(system_app, camera_prop)
|
||||
|
||||
# read regulatory info
|
||||
|
||||
1
sepolicy/vendor/system_server.te
vendored
1
sepolicy/vendor/system_server.te
vendored
@@ -23,6 +23,7 @@ dontaudit system_server untrusted_app:file write;
|
||||
dontaudit system_server hal_audio_default:file write;
|
||||
dontaudit system_server appdomain:file write;
|
||||
|
||||
typeattribute system_server system_writes_vendor_properties_violators;
|
||||
set_prop(system_server, public_vendor_system_prop)
|
||||
|
||||
dontaudit system_server self:capability sys_module;
|
||||
|
||||
Reference in New Issue
Block a user