summaryrefslogtreecommitdiff
Diffstat
-rw-r--r--common/bluetooth.mk3
-rw-r--r--common/core_amlogic.mk70
-rw-r--r--common/products/mbox/init.amlogic.ab.rc59
-rw-r--r--common/products/mbox/init.amlogic.rc78
-rw-r--r--common/products/mbox/product_mbox.mk7
-rw-r--r--common/products/tablet/init.amlogic.rc6
-rw-r--r--common/products/tv/init.amlogic.rc57
-rw-r--r--common/products/tv/product_tv.mk11
-rw-r--r--common/sepolicy/adbd.te1
-rw-r--r--common/sepolicy/app.te149
-rw-r--r--common/sepolicy/audioserver.te7
-rw-r--r--common/sepolicy/bluetooth.te1
-rw-r--r--common/sepolicy/bootanim.te3
-rw-r--r--common/sepolicy/bootvideo.te8
-rw-r--r--common/sepolicy/cameraserver.te1
-rw-r--r--common/sepolicy/device.te1
-rw-r--r--common/sepolicy/dex2oat.te1
-rw-r--r--common/sepolicy/drm_device.te2
-rw-r--r--common/sepolicy/drmserver.te8
-rw-r--r--common/sepolicy/droidvold.te38
-rw-r--r--common/sepolicy/dv_config.te4
-rw-r--r--common/sepolicy/file.te4
-rw-r--r--common/sepolicy/file_contexts222
-rw-r--r--common/sepolicy/firmload.te10
-rw-r--r--common/sepolicy/fsck.te15
-rwxr-xr-x[-rw-r--r--]common/sepolicy/genfs_contexts18
-rw-r--r--common/sepolicy/hal_camera_default.te5
-rw-r--r--common/sepolicy/hal_drm_default.te2
-rw-r--r--common/sepolicy/hal_dumpstate_impl.te9
-rw-r--r--common/sepolicy/hal_memtrack_default.te35
-rw-r--r--common/sepolicy/hal_tv_cec_default.te2
-rw-r--r--common/sepolicy/hal_wifi_default.te8
-rw-r--r--common/sepolicy/hdcp_rx22.te17
-rw-r--r--common/sepolicy/hdcp_tx22.te3
-rw-r--r--common/sepolicy/hdmi_cec.te14
-rw-r--r--common/sepolicy/hdmicecd.te15
-rw-r--r--common/sepolicy/hwservice.te3
-rw-r--r--common/sepolicy/hwservice_contexts1
-rw-r--r--common/sepolicy/hwservicemanager.te7
-rw-r--r--common/sepolicy/imageserver.te48
-rw-r--r--common/sepolicy/init.te158
-rw-r--r--common/sepolicy/installd.te8
-rw-r--r--common/sepolicy/kernel.te2
-rw-r--r--common/sepolicy/keystore.te3
-rw-r--r--common/sepolicy/lmkd.te2
-rw-r--r--common/sepolicy/logcat.te12
-rw-r--r--common/sepolicy/make_ext4fs.te19
-rw-r--r--common/sepolicy/mediacodec.te10
-rw-r--r--common/sepolicy/mediaserver.te48
-rw-r--r--common/sepolicy/netd.te5
-rw-r--r--common/sepolicy/platform_app.te48
-rw-r--r--common/sepolicy/ppp.te13
-rw-r--r--common/sepolicy/pppd.te42
-rw-r--r--common/sepolicy/pppoe_wrapper.te53
-rw-r--r--common/sepolicy/priv_app.te15
-rw-r--r--common/sepolicy/recovery.te34
-rw-r--r--common/sepolicy/remotecfg.te2
-rw-r--r--common/sepolicy/seapp_contexts38
-rw-r--r--common/sepolicy/servicemanager.te6
-rw-r--r--common/sepolicy/shell.te6
-rw-r--r--common/sepolicy/surfaceflinger.te6
-rw-r--r--common/sepolicy/system_app.te120
-rw-r--r--common/sepolicy/system_control.te25
-rw-r--r--common/sepolicy/system_server.te66
-rw-r--r--common/sepolicy/tee.te2
-rw-r--r--common/sepolicy/tvserver.te63
-rw-r--r--common/sepolicy/ueventd.te1
-rw-r--r--common/sepolicy/update_engine.te2
-rw-r--r--common/sepolicy/update_verifier.te4
-rw-r--r--common/sepolicy/usbpm.te9
-rw-r--r--common/sepolicy/vndservicemanager.te3
-rw-r--r--common/sepolicy/vold.te58
-rw-r--r--common/sepolicy/vold_ext.te27
-rw-r--r--common/sepolicy/webview_zygote.te2
-rw-r--r--common/sepolicy/wlan_fwloader.te10
-rw-r--r--common/sepolicy/zygote.te3
-rw-r--r--common/software.mk3
-rw-r--r--common/vndk/Android.mk57
-rw-r--r--p212/BoardConfig.mk6
-rw-r--r--p212/device.mk2
-rw-r--r--p212/fstab.amlogic5
-rw-r--r--p212/init.amlogic.board.rc16
-rw-r--r--p212/manifest.xml63
-rw-r--r--p212/system.prop81
-rw-r--r--p230/BoardConfig.mk5
-rw-r--r--p230/device.mk2
-rw-r--r--p230/fstab.AB.amlogic3
-rw-r--r--p230/fstab.AB.verity.amlogic3
-rw-r--r--p230/fstab.amlogic3
-rw-r--r--p230/fstab.amlogic.bak19
-rw-r--r--p230/fstab.verity.amlogic3
-rw-r--r--p230/init.amlogic.board.rc16
-rw-r--r--p230/manifest.xml63
-rw-r--r--p230/system.prop81
94 files changed, 987 insertions, 1322 deletions
diff --git a/common/sepolicy/system_control.te b/common/sepolicy/system_control.te
index 8038edb..828b97b 100644
--- a/common/sepolicy/system_control.te
+++ b/common/sepolicy/system_control.te
@@ -1,12 +1,7 @@
type system_control, domain;
-type system_control_exec, exec_type, file_type;
+type system_control_exec, exec_type, vendor_file_type, file_type;
-allow system_control system_control_exec:file { entrypoint read };
-
-binder_use(system_control);
-binder_call(system_control, binderservicedomain)
-binder_call(system_control, system_server)
-binder_service(system_control)
+init_daemon_domain(system_control)
allow system_control vndbinder_device:chr_file { read write open ioctl };
allow system_control vndservicemanager:binder { call transfer };
@@ -24,7 +19,7 @@ allow system_control system_control:netlink_kobject_uevent_socket { create setop
allow system_control self:capability { net_admin };
-unix_socket_connect(system_control, vold, vold);
+#unix_socket_connect(system_control, vold, vold);
#unix_socket_connect(system_control, property, init);
# Property Service write
@@ -82,9 +77,9 @@ allow system_control graphics_device:dir r_dir_perms;
allow system_control sysfs_audio_cap:file {open getattr read};
allow system_control sysfs_xbmc:file rw_file_perms;
allow system_control app_data_file:file rw_file_perms;
-allow system_control system_control_service:service_manager add;
-allow system_control permission_service:service_manager find;
-allow system_control surfaceflinger_service:service_manager find;
+#allow system_control system_control_service:service_manager add;
+#allow system_control permission_service:service_manager find;
+#allow system_control surfaceflinger_service:service_manager find;
# Allow system_control to read /proc/pid for all processes
r_dir_file(system_control, domain)
r_dir_file(system_control, binderservicedomain)
@@ -99,9 +94,11 @@ allow system_control platform_app:dir { search };
allow system_control param_tv_file:dir { search read write open add_name remove_name rmdir };
allow system_control param_tv_file:file { create open read write setattr getattr lock unlink };
-allow system_control shell_exec:file { execute_no_trans execute open read getattr };
+#allow system_control shell_exec:file { execute_no_trans execute open read getattr };
allow system_control sysfs_digital_codec:file { read write };
-allow system_control system_file:file execute_no_trans;
+#allow system_control system_file:file execute_no_trans;
allow system_control env_device:blk_file { getattr read open write };
-allow system_control self:capability sys_nice; \ No newline at end of file
+allow system_control self:capability sys_nice;
+
+allow system_control system_app:binder { call };