mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
Denials:
denied { write ioctl open } for pid=847 comm="folio_daemon"
name="uinput" dev="tmpfs" ino=20677 scontext=u:r:folio_daemon:s0
tcontext=u:object_r:uhid_device:s0 tclass=chr_file
denied { search } for pid=1553 comm="rild" name="netmgr" dev="tmpfs"
ino=21012 scontext=u:r:rild:s0 tcontext=u:object_r:netmgrd_socket:s0
tclass=dir
denied { read write open } for pid=689 comm="qseecomd" name="sdd2"
dev="tmpfs" ino=18308 scontext=u:r:tee:s0
tcontext=u:object_r:ssd_block_device:s0 tclass=blk_file
denied { read write open } for pid=771 comm="rmt_storage" name="sdd15"
dev="tmpfs" ino=18347 scontext=u:r:rmt_storage:s0
tcontext=u:object_r:modem_block_device:s0 tclass=blk_file
denied { getattr } for comm="android.hardwar" path="/dev/block/sda7"
dev="tmpfs" ino=18138 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:modem_block_device:s0 tclass=blk_file
denied { getattr } for comm="android.hardwar" path="/dev/block/sda22"
dev="tmpfs" ino=18194 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:system_block_device:s0 tclass=blk_file
denied { getattr } for comm="android.hardwar" path="/dev/block/sda3"
dev="tmpfs" ino=18122 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:ab_block_device:s0 tclass=blk_file
denied { getattr } for comm="android.hardwar" path="/dev/block/sda9"
dev="tmpfs" ino=18146 scontext=u:r:hal_bootctl_default:s0
tcontext=u:object_r:boot_block_device:s0 tclass=blk_file
Bug: 34784662
Test: The above denials are no longer present
Change-Id: I0a31ed76665a660e658a1e9000e07a9d312fb985
27 lines
1.1 KiB
Plaintext
27 lines
1.1 KiB
Plaintext
# These are the permissions required to use the boot_control HAL implemented
|
|
# here: hardware/qcom/bootctrl/boot_control.c
|
|
|
|
# Getting and setting GPT attributes for the bootloader iterates over all the
|
|
# partition names in the block_device directory /dev/block/.../by-name
|
|
allow hal_bootctl block_device:dir r_dir_perms;
|
|
|
|
# Edit the attributes stored in the GPT.
|
|
allow hal_bootctl gpt_block_device:blk_file rw_file_perms;
|
|
allow hal_bootctl ab_block_device:blk_file getattr;
|
|
allow hal_bootctl boot_block_device:blk_file getattr;
|
|
allow hal_bootctl modem_block_device:blk_file getattr;
|
|
allow hal_bootctl system_block_device:blk_file getattr;
|
|
|
|
# Access /dev/sgN devices (generic SCSI) to write the
|
|
# A/B slot selection for the XBL partition. Allow also to issue a
|
|
# UFS_IOCTL_QUERY ioctl.
|
|
allow hal_bootctl sg_device:chr_file rw_file_perms;
|
|
allow hal_bootctl self:capability sys_admin;
|
|
|
|
# Read the sysfs to lookup what /dev/sgN device
|
|
# corresponds to the XBL partitions.
|
|
allow hal_bootctl sysfs:dir r_dir_perms;
|
|
|
|
# Write to the XBL devices.
|
|
allow hal_bootctl xbl_block_device:blk_file rw_file_perms;
|