Merge "[ALPS03881723] Workaround build error" into alps-trunk-p0.basic

Change-Id: Icbca2e3a8f9d7b91377b15de2bab913d213c109d
MTK-Commit-Id: d3da42caa59407e610b7763595c51ed443d72cbd
This commit is contained in:
Lili Lin 2020-01-18 09:36:05 +08:00 committed by Gerrit Code Review
commit 04af79e76b
9 changed files with 16 additions and 16 deletions

View File

@ -35,7 +35,7 @@ set_prop(ccci_mdinit, ctl_ril-daemon-d_prop)
set_prop(ccci_mdinit, ctl_ril-proxy_prop) set_prop(ccci_mdinit, ctl_ril-proxy_prop)
set_prop(ccci_mdinit, ril_active_md_prop) set_prop(ccci_mdinit, ril_active_md_prop)
set_prop(ccci_mdinit, mtk_md_prop) set_prop(ccci_mdinit, mtk_md_prop)
set_prop(ccci_mdinit, radio_prop) #set_prop(ccci_mdinit, radio_prop)
set_prop(ccci_mdinit, net_cdma_mdmstat) set_prop(ccci_mdinit, net_cdma_mdmstat)
#=============allow ccci_mdinit to get tel_switch_prop============== #=============allow ccci_mdinit to get tel_switch_prop==============
get_prop(ccci_mdinit, tel_switch_prop) get_prop(ccci_mdinit, tel_switch_prop)

View File

@ -21,7 +21,7 @@ set_prop(gsm0710muxd, ctl_rildaemon_prop)
set_prop(gsm0710muxd, ctl_ril-daemon-mtk_prop) set_prop(gsm0710muxd, ctl_ril-daemon-mtk_prop)
set_prop(gsm0710muxd, ctl_fusion_ril_mtk_prop) set_prop(gsm0710muxd, ctl_fusion_ril_mtk_prop)
set_prop(gsm0710muxd, gsm0710muxd_prop) set_prop(gsm0710muxd, gsm0710muxd_prop)
set_prop(gsm0710muxd, radio_prop) #set_prop(gsm0710muxd, radio_prop)
# allow set muxreport control properties # allow set muxreport control properties
set_prop(gsm0710muxd, ril_mux_report_case_prop) set_prop(gsm0710muxd, ril_mux_report_case_prop)

View File

@ -23,7 +23,7 @@ allow md_ctrl emd_device:chr_file { rw_file_perms };
allow md_ctrl eemcs_device:chr_file { rw_file_perms }; allow md_ctrl eemcs_device:chr_file { rw_file_perms };
# Needed to set vold.encryption.type # Needed to set vold.encryption.type
set_prop(md_ctrl, vold_prop) #set_prop(md_ctrl, vold_prop)
# Allow read to sys/kernel/ccci/* files # Allow read to sys/kernel/ccci/* files
allow md_ctrl sysfs_ccci:dir search; allow md_ctrl sysfs_ccci:dir search;

View File

@ -150,8 +150,8 @@ allow mediacodec surfaceflinger:fifo_file rw_file_perms;
# Operator: Whitney SQC # Operator: Whitney SQC
# Purpose: mediacodec use gpu # Purpose: mediacodec use gpu
allow mediacodec gpu_device:dir search; allow mediacodec gpu_device:dir search;
allow mediacodec debug_prop:property_service set; #allow mediacodec debug_prop:property_service set;
allow mediacodec system_prop:property_service set; #allow mediacodec system_prop:property_service set;
# Date : W18.01 # Date : W18.01
# Add for turn on SElinux in enforcing mode # Add for turn on SElinux in enforcing mode
@ -199,4 +199,4 @@ allow mediacodec graphics_device:dir search;
# Date : WK18.03 # Date : WK18.03
# Operation : MT6771 SQC # Operation : MT6771 SQC
# Purpose : Video SW decoder setprop for dex2oat thread 2 # Purpose : Video SW decoder setprop for dex2oat thread 2
allow mediacodec dalvik_prop:property_service set; #allow mediacodec dalvik_prop:property_service set;

View File

@ -33,8 +33,8 @@ allow mtk_hal_pq graphics_device:chr_file { read write open ioctl };
# Purpose : Allow property set # Purpose : Allow property set
allow mtk_hal_pq init:unix_stream_socket connectto; allow mtk_hal_pq init:unix_stream_socket connectto;
allow mtk_hal_pq property_socket:sock_file write; allow mtk_hal_pq property_socket:sock_file write;
allow mtk_hal_pq system_prop:property_service set; #allow mtk_hal_pq system_prop:property_service set;
allow mtk_hal_pq debug_prop:property_service set; #allow mtk_hal_pq debug_prop:property_service set;
# Purpose : Allow permission to get AmbientLux from hwservice_manager # Purpose : Allow permission to get AmbientLux from hwservice_manager
allow mtk_hal_pq fwk_sensor_hwservice:hwservice_manager find; allow mtk_hal_pq fwk_sensor_hwservice:hwservice_manager find;

View File

@ -22,9 +22,9 @@ allow rild cgroup:dir create_dir_perms;
# Property service # Property service
# allow set RIL related properties (radio./net./system./etc) # allow set RIL related properties (radio./net./system./etc)
set_prop(rild, radio_prop) #set_prop(rild, radio_prop)
set_prop(rild, net_radio_prop) #set_prop(rild, net_radio_prop)
set_prop(rild, system_radio_prop) #set_prop(rild, system_radio_prop)
set_prop(rild, persist_ril_prop) set_prop(rild, persist_ril_prop)
auditallow rild net_radio_prop:property_service set; auditallow rild net_radio_prop:property_service set;
auditallow rild system_radio_prop:property_service set; auditallow rild system_radio_prop:property_service set;

View File

@ -25,9 +25,9 @@ allow mtkrild cgroup:dir create_dir_perms;
# Property service # Property service
# allow set RIL related properties (radio./net./system./etc) # allow set RIL related properties (radio./net./system./etc)
set_prop(mtkrild, radio_prop) #set_prop(mtkrild, radio_prop)
set_prop(mtkrild, net_radio_prop) #set_prop(mtkrild, net_radio_prop)
set_prop(mtkrild, system_radio_prop) #set_prop(mtkrild, system_radio_prop)
set_prop(mtkrild, persist_ril_prop) set_prop(mtkrild, persist_ril_prop)
auditallow mtkrild net_radio_prop:property_service set; auditallow mtkrild net_radio_prop:property_service set;
auditallow mtkrild system_radio_prop:property_service set; auditallow mtkrild system_radio_prop:property_service set;

View File

@ -27,7 +27,7 @@ allow muxreport emd_device:chr_file { rw_file_perms };
# Allow read to sys/kernel/ccci/* files # Allow read to sys/kernel/ccci/* files
allow muxreport sysfs_ccci:dir search; allow muxreport sysfs_ccci:dir search;
allow muxreport sysfs_ccci:file r_file_perms; allow muxreport sysfs_ccci:file r_file_perms;
set_prop(muxreport, radio_prop) #set_prop(muxreport, radio_prop)
# Date : WK18.16 # Date : WK18.16
# Operation: P migration # Operation: P migration

View File

@ -28,7 +28,7 @@ allow nvram_daemon nvdata_device:blk_file rw_file_perms;
# Date : WK14.34 # Date : WK14.34
# Operation : Migration # Operation : Migration
# Purpose : the option is used to tell that if other processes can access nvram. # Purpose : the option is used to tell that if other processes can access nvram.
allow nvram_daemon system_prop:property_service set; #allow nvram_daemon system_prop:property_service set;
# Date : WK14.35 # Date : WK14.35
# Operation : chown folder and file permission # Operation : chown folder and file permission