summaryrefslogtreecommitdiff
Diffstat
-rw-r--r--common/bluetooth.mk3
-rw-r--r--common/core_amlogic.mk70
-rw-r--r--common/products/mbox/init.amlogic.ab.rc59
-rw-r--r--common/products/mbox/init.amlogic.rc78
-rw-r--r--common/products/mbox/product_mbox.mk7
-rw-r--r--common/products/tablet/init.amlogic.rc6
-rw-r--r--common/products/tv/init.amlogic.rc57
-rw-r--r--common/products/tv/product_tv.mk11
-rw-r--r--common/sepolicy/adbd.te1
-rw-r--r--common/sepolicy/app.te149
-rw-r--r--common/sepolicy/audioserver.te7
-rw-r--r--common/sepolicy/bluetooth.te1
-rw-r--r--common/sepolicy/bootanim.te3
-rw-r--r--common/sepolicy/bootvideo.te8
-rw-r--r--common/sepolicy/cameraserver.te1
-rw-r--r--common/sepolicy/device.te1
-rw-r--r--common/sepolicy/dex2oat.te1
-rw-r--r--common/sepolicy/drm_device.te2
-rw-r--r--common/sepolicy/drmserver.te8
-rw-r--r--common/sepolicy/droidvold.te38
-rw-r--r--common/sepolicy/dv_config.te4
-rw-r--r--common/sepolicy/file.te4
-rw-r--r--common/sepolicy/file_contexts222
-rw-r--r--common/sepolicy/firmload.te10
-rw-r--r--common/sepolicy/fsck.te15
-rwxr-xr-x[-rw-r--r--]common/sepolicy/genfs_contexts18
-rw-r--r--common/sepolicy/hal_camera_default.te5
-rw-r--r--common/sepolicy/hal_drm_default.te2
-rw-r--r--common/sepolicy/hal_dumpstate_impl.te9
-rw-r--r--common/sepolicy/hal_memtrack_default.te35
-rw-r--r--common/sepolicy/hal_tv_cec_default.te2
-rw-r--r--common/sepolicy/hal_wifi_default.te8
-rw-r--r--common/sepolicy/hdcp_rx22.te17
-rw-r--r--common/sepolicy/hdcp_tx22.te3
-rw-r--r--common/sepolicy/hdmi_cec.te14
-rw-r--r--common/sepolicy/hdmicecd.te15
-rw-r--r--common/sepolicy/hwservice.te3
-rw-r--r--common/sepolicy/hwservice_contexts1
-rw-r--r--common/sepolicy/hwservicemanager.te7
-rw-r--r--common/sepolicy/imageserver.te48
-rw-r--r--common/sepolicy/init.te158
-rw-r--r--common/sepolicy/installd.te8
-rw-r--r--common/sepolicy/kernel.te2
-rw-r--r--common/sepolicy/keystore.te3
-rw-r--r--common/sepolicy/lmkd.te2
-rw-r--r--common/sepolicy/logcat.te12
-rw-r--r--common/sepolicy/make_ext4fs.te19
-rw-r--r--common/sepolicy/mediacodec.te10
-rw-r--r--common/sepolicy/mediaserver.te48
-rw-r--r--common/sepolicy/netd.te5
-rw-r--r--common/sepolicy/platform_app.te48
-rw-r--r--common/sepolicy/ppp.te13
-rw-r--r--common/sepolicy/pppd.te42
-rw-r--r--common/sepolicy/pppoe_wrapper.te53
-rw-r--r--common/sepolicy/priv_app.te15
-rw-r--r--common/sepolicy/recovery.te34
-rw-r--r--common/sepolicy/remotecfg.te2
-rw-r--r--common/sepolicy/seapp_contexts38
-rw-r--r--common/sepolicy/servicemanager.te6
-rw-r--r--common/sepolicy/shell.te6
-rw-r--r--common/sepolicy/surfaceflinger.te6
-rw-r--r--common/sepolicy/system_app.te120
-rw-r--r--common/sepolicy/system_control.te25
-rw-r--r--common/sepolicy/system_server.te66
-rw-r--r--common/sepolicy/tee.te2
-rw-r--r--common/sepolicy/tvserver.te63
-rw-r--r--common/sepolicy/ueventd.te1
-rw-r--r--common/sepolicy/update_engine.te2
-rw-r--r--common/sepolicy/update_verifier.te4
-rw-r--r--common/sepolicy/usbpm.te9
-rw-r--r--common/sepolicy/vndservicemanager.te3
-rw-r--r--common/sepolicy/vold.te58
-rw-r--r--common/sepolicy/vold_ext.te27
-rw-r--r--common/sepolicy/webview_zygote.te2
-rw-r--r--common/sepolicy/wlan_fwloader.te10
-rw-r--r--common/sepolicy/zygote.te3
-rw-r--r--common/software.mk3
-rw-r--r--common/vndk/Android.mk57
-rw-r--r--p212/BoardConfig.mk6
-rw-r--r--p212/device.mk2
-rw-r--r--p212/fstab.amlogic5
-rw-r--r--p212/init.amlogic.board.rc16
-rw-r--r--p212/manifest.xml63
-rw-r--r--p212/system.prop81
-rw-r--r--p230/BoardConfig.mk5
-rw-r--r--p230/device.mk2
-rw-r--r--p230/fstab.AB.amlogic3
-rw-r--r--p230/fstab.AB.verity.amlogic3
-rw-r--r--p230/fstab.amlogic3
-rw-r--r--p230/fstab.amlogic.bak19
-rw-r--r--p230/fstab.verity.amlogic3
-rw-r--r--p230/init.amlogic.board.rc16
-rw-r--r--p230/manifest.xml63
-rw-r--r--p230/system.prop81
94 files changed, 987 insertions, 1322 deletions
diff --git a/common/sepolicy/imageserver.te b/common/sepolicy/imageserver.te
index 2807189..4f68d0e 100644
--- a/common/sepolicy/imageserver.te
+++ b/common/sepolicy/imageserver.te
@@ -1,42 +1,44 @@
type imageserver, domain;
-type imageserver_exec, exec_type, file_type;
+type imageserver_exec, exec_type, vendor_file_type, file_type;
typeattribute imageserver mlstrustedsubject;
init_daemon_domain(imageserver)
-allow imageserver shell_exec:file rx_file_perms;
-allow imageserver system_file:file execute_no_trans;
+allow imageserver vendor_file:file { execute };
-allow imageserver imageserver_service:service_manager add;
+#allow imageserver shell_exec:file rx_file_perms;
+#allow imageserver system_file:file execute_no_trans;
-allow imageserver imageserver_exec:file { entrypoint read };
+#allow imageserver imageserver_service:service_manager add;
-allow imageserver self:process execmem;
+#allow imageserver imageserver_exec:file { entrypoint read };
-binder_use(imageserver);
-binder_call(imageserver, binderservicedomain)
-binder_call(imageserver, appdomain)
-binder_service(imageserver)
+#allow imageserver self:process execmem;
-allow imageserver self:capability dac_override;
-allow imageserver self:capability dac_read_search;
+#binder_use(imageserver);
+#binder_call(imageserver, binderservicedomain)
+#binder_call(imageserver, appdomain)
+#binder_service(imageserver)
+
+#allow imageserver self:capability dac_override;
+#allow imageserver self:capability dac_read_search;
#allow imageserver appdomain:file { r_file_perms };
-allow imageserver fuse:dir r_dir_perms;
-allow imageserver fuse:file r_file_perms;
-allow imageserver app_data_file:file rw_file_perms;
+#allow imageserver fuse:dir r_dir_perms;
+#allow imageserver fuse:file r_file_perms;
+#allow imageserver app_data_file:file rw_file_perms;
#allow imageserver system_file:file execmod;
-allow imageserver app_data_file:dir search;
+#allow imageserver app_data_file:dir search;
-allow imageserver system_control_service:service_manager find;
+#allow imageserver system_control_service:service_manager find;
-allow imageserver { mnt_user_file storage_file }:dir { getattr search };
-allow imageserver { mnt_user_file storage_file }:lnk_file { getattr read };
-allow imageserver permission_service:service_manager find;
+#allow imageserver { mnt_user_file storage_file }:dir { getattr search };
+#allow imageserver { mnt_user_file storage_file }:lnk_file { getattr read };
+#allow imageserver permission_service:service_manager find;
-allow imageserver picture_device:chr_file { read write open ioctl };
-allow imageserver kernel:system module_request;
+#allow imageserver picture_device:chr_file { read write open ioctl };
+#allow imageserver kernel:system module_request;
-allow imageserver tmpfs:dir { getattr search };
+#allow imageserver tmpfs:dir { getattr search };