mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
denied { find } for
service=android.service.gatekeeper.IGateKeeperService pid=14914 uid=2000
scontext=u:r:dumpstate:s0 tcontext=u:object_r:gatekeeper_service:s0
tclass=service_manager
denied { call } for scontext=u:r:dumpstate:s0
tcontext=u:r:update_engine:s0 tclass=binder
denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:installd:s0
tclass=binder
denied { use } for path="pipe:[231372]" dev="pipefs" ino=231372
scontext=u:r:hal_audio_default:s0 tcontext=u:r:dumpstate:s0 tclass=fd
denied { call } for scontext=u:r:dumpstate:s0 tcontext=u:r:per_mgr:s0
tclass=binder
denied { read } for name="log" dev="debugfs" ino=32
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs:s0
tclass=file
denied { read } for name="rpm_master_stats" dev="debugfs" ino=16914
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs_rpm:s0
tclass=file
denied { read } for name="rpm_stats" dev="debugfs" ino=16912
scontext=u:r:hal_dumpstate_impl:s0 tcontext=u:object_r:debugfs_rpm:s0
tclass=file
denied { read } for comm="top" name="stat" dev="proc" ino=4026532075
scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc_stat:s0 tclass=file
Bug: 34784662
Bug: 38292576
Test: The above denials are no longer present in adb bugreport
Change-Id: I1def308765f818c04833e2127df1c9803ed2dc77
47 lines
1.9 KiB
Plaintext
47 lines
1.9 KiB
Plaintext
type hal_dumpstate_impl, domain, vendor_executes_system_violators;
|
|
hal_server_domain(hal_dumpstate_impl, hal_dumpstate)
|
|
|
|
type hal_dumpstate_impl_exec, exec_type, vendor_file_type, file_type;
|
|
init_daemon_domain(hal_dumpstate_impl)
|
|
|
|
# Execute dump scripts
|
|
allow hal_dumpstate_impl shell_exec:file rx_file_perms;
|
|
allow hal_dumpstate_impl toolbox_exec:file rx_file_perms;
|
|
|
|
userdebug_or_eng(`
|
|
# smlog_dump
|
|
domain_auto_trans(hal_dumpstate_impl, smlog_dump_exec, smlog_dump)
|
|
allow hal_dumpstate_impl modem_dump_file:dir create_dir_perms;
|
|
allow hal_dumpstate_impl modem_dump_file:file create_file_perms;
|
|
allow hal_dumpstate_impl radio_data_file:dir r_dir_perms;
|
|
allow hal_dumpstate_impl radio_vendor_data_file:dir r_dir_perms;
|
|
allow hal_dumpstate_impl netmgr_data_file:dir r_dir_perms;
|
|
allow hal_dumpstate_impl radio_data_file:file r_file_perms;
|
|
allow hal_dumpstate_impl radio_vendor_data_file:file r_file_perms;
|
|
allow hal_dumpstate_impl netmgr_data_file:file r_file_perms;
|
|
allow hal_dumpstate_impl debugfs_ipc:dir r_dir_perms;
|
|
allow hal_dumpstate_impl debugfs_ipc:file r_file_perms;
|
|
|
|
set_prop(hal_dumpstate_impl, modem_diag_prop)
|
|
')
|
|
|
|
allow hal_dumpstate_impl uio_device:chr_file rw_file_perms;
|
|
r_dir_file(hal_dumpstate_impl, sysfs_uio)
|
|
r_dir_file(hal_dumpstate_impl, sysfs_rmtfs)
|
|
r_dir_file(hal_dumpstate_impl, sysfs_msm_subsys)
|
|
|
|
allow hal_dumpstate_impl sysfs_thermal:dir search;
|
|
allow hal_dumpstate_impl sysfs_thermal:file r_file_perms;
|
|
|
|
allow hal_dumpstate_impl debugfs_ion:dir r_dir_perms;
|
|
allow hal_dumpstate_impl debugfs_ion:file r_file_perms;
|
|
allow hal_dumpstate_impl debugfs_rpm:file r_file_perms;
|
|
allow hal_dumpstate_impl debugfs_ipc:file r_file_perms;
|
|
allow hal_dumpstate_impl proc_stat:file r_file_perms;
|
|
|
|
# Access to files for dumping
|
|
allow hal_dumpstate_impl sysfs:dir r_dir_perms;
|
|
# rpm stat
|
|
# usb logs
|
|
userdebug_or_eng(`allow hal_dumpstate_impl debugfs_usb:file r_file_perms;')
|