summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorXin Li <delphij@google.com>2021-02-21 09:24:46 -0800
committerXin Li <delphij@google.com>2021-02-21 09:24:46 -0800
commitaa5a3e55d2d6c551c90c4a877a61d86614b437e7 (patch)
treecc9f7f7f1f5d73067e1e5659aaee9aa68cb6ea5d
parent5ef1d6bca9def16a654e09a77d816713c71b1ac3 (diff)
parent3c94f6cbded63a39b5adac6593e023b0b76199d6 (diff)
downloadredbull-sepolicy-temp_RQ2A.210305.007.tar.gz
Merge ab/7061308 into stage.temp_RQ2A.210305.007
Bug: 180401296 Merged-In: Idd7c182a425635c21ddd0900430b33c7c73404f3 Change-Id: I05465d1c76f21b11723484042b35e06409c20a9e
-rw-r--r--vendor/google/bug_map3
-rw-r--r--vendor/google/grilservice_app.te2
-rw-r--r--vendor/google/hal_wifi_ext.te7
-rw-r--r--vendor/google/logger_app.te1
-rw-r--r--vendor/google/pixelstats_vendor.te1
-rw-r--r--vendor/google/powerstatsservice.te2
-rw-r--r--vendor/google/twoshay.te1
7 files changed, 15 insertions, 2 deletions
diff --git a/vendor/google/bug_map b/vendor/google/bug_map
index 66acf90..b52f305 100644
--- a/vendor/google/bug_map
+++ b/vendor/google/bug_map
@@ -1,2 +1,5 @@
hal_health_default unlabeled file b/156200409
hvdcp unlabeled file b/161101902
+shell debugfs file b/175106535
+shell device_config_runtime_native_boot_prop file b/175106535
+shell sysfs file b/175106535
diff --git a/vendor/google/grilservice_app.te b/vendor/google/grilservice_app.te
index ef2430f..1d1ff57 100644
--- a/vendor/google/grilservice_app.te
+++ b/vendor/google/grilservice_app.te
@@ -4,6 +4,6 @@ app_domain(grilservice_app)
allow grilservice_app hal_radioext_hwservice:hwservice_manager find;
allow grilservice_app hal_wifi_ext_hwservice:hwservice_manager find;
-allow grilservice_app activity_service:service_manager find;
+allow grilservice_app app_api_service:service_manager find;
binder_call(grilservice_app, hal_radioext_default)
binder_call(grilservice_app, hal_wifi_ext)
diff --git a/vendor/google/hal_wifi_ext.te b/vendor/google/hal_wifi_ext.te
index c4f17fb..880f944 100644
--- a/vendor/google/hal_wifi_ext.te
+++ b/vendor/google/hal_wifi_ext.te
@@ -36,3 +36,10 @@ allow hal_wifi_ext updated_wifi_firmware_data_file:file create_file_perms;
# Allow wifi_ext to read the updated firmware files from app
allow hal_wifi_ext priv_app:fd use;
allow hal_wifi_ext privapp_data_file:file { read map };
+
+userdebug_or_eng(`
+# debugfs entries are only needed in user-debug or eng builds
+
+# Allow wifi hal to access wlan debugfs directories
+allow hal_wifi_ext debugfs_wlan:dir r_dir_perms;
+')
diff --git a/vendor/google/logger_app.te b/vendor/google/logger_app.te
index 5069ea3..9a6cbfd 100644
--- a/vendor/google/logger_app.te
+++ b/vendor/google/logger_app.te
@@ -13,4 +13,5 @@ userdebug_or_eng(`
set_prop(logger_app, vendor_tcpdump_log_prop)
set_prop(logger_app, vendor_modem_diag_prop)
set_prop(logger_app, vendor_wifi_sniffer_prop)
+ set_prop(logger_app, vendor_usb_prop)
')
diff --git a/vendor/google/pixelstats_vendor.te b/vendor/google/pixelstats_vendor.te
index 09169cc..9f3f892 100644
--- a/vendor/google/pixelstats_vendor.te
+++ b/vendor/google/pixelstats_vendor.te
@@ -1,3 +1,4 @@
allow pixelstats_vendor sysfs_typec_info:dir search;
allow pixelstats_vendor sysfs_typec_info:file r_file_perms;
allow pixelstats_vendor sysfs_batteryinfo:file rw_file_perms;
+allow pixelstats_vendor battery_history_device:chr_file r_file_perms;
diff --git a/vendor/google/powerstatsservice.te b/vendor/google/powerstatsservice.te
index af8e78b..c8f7445 100644
--- a/vendor/google/powerstatsservice.te
+++ b/vendor/google/powerstatsservice.te
@@ -4,7 +4,7 @@ type powerstatsservice_app, domain, coredomain;
userdebug_or_eng(`
app_domain(powerstatsservice_app)
binder_call(powerstatsservice_app, incidentd)
- allow powerstatsservice_app activity_service:service_manager find;
+ allow powerstatsservice_app app_api_service:service_manager find;
allow powerstatsservice_app incident_service:service_manager find;
hal_client_domain(powerstatsservice_app, hal_power_stats);
')
diff --git a/vendor/google/twoshay.te b/vendor/google/twoshay.te
index fc33822..d55a414 100644
--- a/vendor/google/twoshay.te
+++ b/vendor/google/twoshay.te
@@ -4,3 +4,4 @@ type twoshay_exec, exec_type, file_type, system_file_type;
init_daemon_domain(twoshay)
allow twoshay touch_offload_device:chr_file rw_file_perms;
+allow twoshay twoshay:capability sys_nice;