Commit 8c32d206 authored by Mark Stevens's avatar Mark Stevens
Browse files

update to duco/rk 3128-6003-6.0

parent 39818ba9
File mode changed from 100644 to 100755
......@@ -17,3 +17,7 @@ allow bootanim audio_device:dir r_dir_perms;
allow bootanim audio_device:chr_file rw_file_perms;
allow bootanim surfaceflinger_service:service_manager find;
allow bootanim mediaserver_service:service_manager find;
allow bootanim system_data_file:file r_file_perms;
File mode changed from 100644 to 100755
diff --git a/bootanim.te b/bootanim.te
index dd1e57a..c0b943c 100644
--- a/bootanim.te
+++ b/bootanim.te
@@ -17,3 +17,7 @@ allow bootanim audio_device:dir r_dir_perms;
allow bootanim audio_device:chr_file rw_file_perms;
allow bootanim surfaceflinger_service:service_manager find;
+
+allow bootanim mediaserver_service:service_manager find;
+
+allow bootanim system_data_file:file r_file_perms;
File mode changed from 100644 to 100755
File mode changed from 100644 to 100755
......@@ -20,6 +20,7 @@ allow fsck block_device:dir search;
allow fsck userdata_block_device:blk_file rw_file_perms;
allow fsck cache_block_device:blk_file rw_file_perms;
allow fsck dm_device:blk_file rw_file_perms;
allow fsck block_device:blk_file { getattr ioctl };
###
### neverallow rules
......
......@@ -37,6 +37,7 @@ allow healthd proc_sysrq:file rw_file_perms;
allow healthd self:capability sys_boot;
allow healthd healthd_service:service_manager { add find };
allow healthd system_data_file:file { open read };
# Healthd needs to tell init to continue the boot
# process when running in charger mode.
......
File mode changed from 100644 to 100755
......@@ -19,6 +19,7 @@ allow toolbox devpts:chr_file { read write getattr ioctl };
# device/<vendor>/<product>/sepolicy/file_contexts file.
allow toolbox block_device:dir search;
allow toolbox swap_block_device:blk_file rw_file_perms;
allow toolbox nvm_block_device:blk_file { open read write getattr };
# Only allow entry from init via the toolbox binary.
neverallow { domain -init } toolbox:process transition;
......
......@@ -14,6 +14,8 @@ allow wpa self:netlink_socket create_socket_perms;
allow wpa self:packet_socket create_socket_perms;
allow wpa wifi_data_file:dir create_dir_perms;
allow wpa wifi_data_file:file create_file_perms;
allow wpa system_data_file:file { read };
allow wpa radio_device:chr_file { open read };
unix_socket_send(wpa, system_wpa, system_server)
binder_use(wpa)
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment