update new sdk

This commit is contained in:
August 2020-07-15 19:27:51 +08:00
parent f33907443a
commit 744c72c133
1643 changed files with 83006 additions and 28021 deletions

View file

@ -0,0 +1,17 @@
type bg_kmsg, domain;
type bg_kmsg_exec, exec_type, file_type;
userdebug_or_eng(`
allow bg_kmsg self:capability dac_override;
allow bg_kmsg shell_exec:file rx_file_perms;
allow bg_kmsg system_file:file rx_file_perms;
allow bg_kmsg toolbox_exec:file rx_file_perms;
allow bg_kmsg misc_logd_file:file create_file_perms;
allow bg_kmsg misc_logd_file:dir rw_dir_perms;
allow bg_kmsg self:capability2 syslog;
allow bg_kmsg proc:file {read open};
allow bg_kmsg kernel:system syslog_mod;
')

8
android/system/sepolicy/public/crash_dump.te Normal file → Executable file
View file

@ -1,14 +1,6 @@
type crash_dump, domain;
type crash_dump_exec, exec_type, file_type;
allow crash_dump {
domain
-init
-crash_dump
-keystore
-logd
}:process { ptrace signal sigchld sigstop sigkill };
# crash_dump might inherit CAP_SYS_PTRACE from a privileged process,
# which will result in an audit log even when it's allowed to trace.
dontaudit crash_dump self:capability { sys_ptrace };

2
android/system/sepolicy/public/logpersist.te Normal file → Executable file
View file

@ -24,3 +24,5 @@ neverallow logpersist { app_data_file system_data_file }:dir_file_class_set writ
# -system_app # Smith.apk
# } logpersist:process transition;
neverallow * logpersist:process dyntransition;
allow logpersist self:capability { dac_override dac_read_search };