| allow hal_dumpstate_default sysfs_exynos_bts:dir search; |
| allow hal_dumpstate_default sysfs_exynos_bts_stats:file r_file_perms; |
| |
| allow hal_dumpstate_default sysfs_bcmdhd:dir search; |
| allow hal_dumpstate_default sysfs_bcmdhd:file r_file_perms; |
| |
| allow hal_dumpstate_default sysfs_memory:file r_file_perms; |
| allow hal_dumpstate_default sysfs_cpu:file r_file_perms; |
| |
| vndbinder_use(hal_dumpstate_default) |
| |
| allow hal_dumpstate_default vendor_gps_file:dir r_dir_perms; |
| allow hal_dumpstate_default vendor_gps_file:file r_file_perms; |
| |
| allow hal_dumpstate_default sysfs_wlc:dir search; |
| allow hal_dumpstate_default sysfs_wlc:file r_file_perms; |
| |
| allow hal_dumpstate_default shell_data_file:file getattr; |
| |
| allow hal_dumpstate_default radio_vendor_data_file:dir create_dir_perms; |
| allow hal_dumpstate_default radio_vendor_data_file:file create_file_perms; |
| |
| allow hal_dumpstate_default vendor_rfsd_log_file:dir r_dir_perms; |
| allow hal_dumpstate_default vendor_rfsd_log_file:file r_file_perms; |
| |
| # camera debugging dump file access |
| allow hal_dumpstate_default vendor_camera_data_file:dir r_dir_perms; |
| allow hal_dumpstate_default vendor_camera_data_file:file r_file_perms; |
| |
| allow hal_dumpstate_default vendor_log_file:dir search; |
| |
| allow hal_dumpstate_default vendor_usf_stats:file execute_no_trans; |
| allow hal_dumpstate_default vendor_usf_reg_edit:file execute_no_trans; |
| allow hal_dumpstate_default vendor_dumpsys:file execute_no_trans; |
| |
| allow hal_dumpstate_default sscoredump_vendor_data_crashinfo_file:dir r_dir_perms; |
| allow hal_dumpstate_default sscoredump_vendor_data_crashinfo_file:file r_file_perms; |
| |
| allow hal_dumpstate_default sysfs_acpm_stats:dir r_dir_perms; |
| allow hal_dumpstate_default sysfs_acpm_stats:file r_file_perms; |
| |
| allow hal_dumpstate_default sysfs_spi:dir search; |
| allow hal_dumpstate_default sysfs_spi:file rw_file_perms; |
| |
| allow hal_dumpstate_default device:dir r_dir_perms; |
| allow hal_dumpstate_default logbuffer_device:chr_file r_file_perms; |
| allow hal_dumpstate_default aoc_device:chr_file rw_file_perms; |
| |
| allow hal_dumpstate_default sysfs_wifi:dir search; |
| allow hal_dumpstate_default sysfs_wifi:file r_file_perms; |
| |
| # Touch sysfs interface |
| allow hal_dumpstate_default sysfs_touch:dir r_dir_perms; |
| allow hal_dumpstate_default sysfs_touch:file rw_file_perms; |
| allow hal_dumpstate_default proc_touch:file rw_file_perms; |
| |
| allow hal_dumpstate_default sysfs_thermal:dir r_dir_perms; |
| allow hal_dumpstate_default sysfs_thermal:file r_file_perms; |
| allow hal_dumpstate_default sysfs_thermal:lnk_file read; |
| |
| allow hal_dumpstate_default touch_context_service:service_manager find; |
| binder_call(hal_dumpstate_default, twoshay) |
| |
| # Modem logs |
| allow hal_dumpstate_default modem_efs_file:dir search; |
| allow hal_dumpstate_default modem_efs_file:file r_file_perms; |
| allow hal_dumpstate_default modem_stat_data_file:file r_file_perms; |
| allow hal_dumpstate_default vendor_slog_file:file r_file_perms; |
| |
| allow hal_dumpstate_default block_device:dir r_dir_perms; |
| |
| allow hal_dumpstate_default proc_f2fs:dir r_dir_perms; |
| allow hal_dumpstate_default proc_f2fs:file r_file_perms; |
| allow hal_dumpstate_default proc_touch:file rw_file_perms; |
| |
| allow hal_dumpstate_default sysfs_batteryinfo:dir search; |
| allow hal_dumpstate_default sysfs_batteryinfo:dir r_dir_perms; |
| allow hal_dumpstate_default sysfs_batteryinfo:file r_file_perms; |
| allow hal_dumpstate_default sysfs_chip_id:file r_file_perms; |
| |
| allow hal_dumpstate_default vendor_toolbox_exec:file execute_no_trans; |
| allow hal_dumpstate_default vendor_shell_exec:file execute_no_trans; |
| |
| allow hal_dumpstate_default sysfs_scsi_devices_0000:dir r_dir_perms; |
| allow hal_dumpstate_default sysfs_scsi_devices_0000:file r_file_perms; |
| |
| allow hal_dumpstate_default citadeld_service:service_manager find; |
| allow hal_dumpstate_default citadel_updater_exec:file execute_no_trans; |
| binder_call(hal_dumpstate_default, citadeld); |
| |
| allow hal_dumpstate_default vendor_displaycolor_service:service_manager find; |
| binder_call(hal_dumpstate_default, hal_graphics_composer_default); |
| |
| allow hal_dumpstate_default sysfs_vendor_sched:file read; |
| allow hal_dumpstate_default proc_vendor_sched:dir r_dir_perms; |
| allow hal_dumpstate_default proc_vendor_sched:file r_file_perms; |
| |
| userdebug_or_eng(` |
| allow hal_dumpstate_default mnt_vendor_file:dir search; |
| allow hal_dumpstate_default ramdump_vendor_mnt_file:dir search; |
| allow hal_dumpstate_default ramdump_vendor_mnt_file:file r_file_perms; |
| ') |
| |
| get_prop(hal_dumpstate_default, boottime_public_prop) |
| get_prop(hal_dumpstate_default, vendor_gps_prop) |
| set_prop(hal_dumpstate_default, vendor_modem_prop) |
| get_prop(hal_dumpstate_default, vendor_rild_prop) |
| |
| userdebug_or_eng(` |
| allow hal_dumpstate_default vendor_ion_debugfs:dir r_dir_perms; |
| allow hal_dumpstate_default vendor_ion_debugfs:file r_file_perms; |
| |
| allow hal_dumpstate_default vendor_page_pinner_debugfs:dir search; |
| allow hal_dumpstate_default vendor_page_pinner_debugfs:file r_file_perms; |
| |
| allow hal_dumpstate_default vendor_dri_debugfs:file r_file_perms; |
| allow hal_dumpstate_default vendor_dri_debugfs:dir search; |
| |
| allow hal_dumpstate_default vendor_pm_genpd_debugfs:file r_file_perms; |
| |
| allow hal_dumpstate_default vendor_usb_debugfs:dir r_dir_perms; |
| allow hal_dumpstate_default vendor_usb_debugfs:file r_file_perms; |
| |
| allow hal_dumpstate_default vendor_dmabuf_debugfs:file r_file_perms; |
| |
| allow hal_dumpstate_default vendor_regmap_debugfs:dir r_dir_perms; |
| allow hal_dumpstate_default vendor_regmap_debugfs:file r_file_perms; |
| |
| allow hal_dumpstate_default vendor_maxfg_debugfs:dir search; |
| allow hal_dumpstate_default vendor_maxfg_debugfs:file r_file_perms; |
| |
| allow hal_dumpstate_default vendor_charger_debugfs:dir r_dir_perms; |
| allow hal_dumpstate_default vendor_charger_debugfs:file r_file_perms; |
| |
| allow hal_dumpstate_default debugfs:dir r_dir_perms; |
| allow hal_dumpstate_default vendor_battery_debugfs:dir r_dir_perms; |
| allow hal_dumpstate_default vendor_battery_debugfs:file r_file_perms; |
| |
| allow hal_dumpstate_default vendor_votable_debugfs:dir r_dir_perms; |
| allow hal_dumpstate_default vendor_votable_debugfs:file r_file_perms; |
| |
| allow hal_dumpstate_default sysfs_bcl:dir r_dir_perms; |
| allow hal_dumpstate_default sysfs_bcl:file r_file_perms; |
| allow hal_dumpstate_default sysfs_bcl:lnk_file read; |
| allow hal_dumpstate_default tcpdump_vendor_data_file:dir create_dir_perms; |
| allow hal_dumpstate_default tcpdump_vendor_data_file:file create_file_perms; |
| allow hal_dumpstate_default debugfs_f2fs:dir r_dir_perms; |
| allow hal_dumpstate_default debugfs_f2fs:file r_file_perms; |
| |
| set_prop(hal_dumpstate_default, vendor_tcpdump_log_prop) |
| ') |
| |
| dontaudit hal_dumpstate_default vendor_ion_debugfs:dir r_dir_perms; |
| dontaudit hal_dumpstate_default vendor_ion_debugfs:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default vendor_page_pinner_debugfs:dir search; |
| dontaudit hal_dumpstate_default vendor_page_pinner_debugfs:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default vendor_dri_debugfs:file r_file_perms; |
| dontaudit hal_dumpstate_default vendor_dri_debugfs:dir search; |
| |
| dontaudit hal_dumpstate_default vendor_pm_genpd_debugfs:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default vendor_usb_debugfs:dir r_dir_perms; |
| dontaudit hal_dumpstate_default vendor_usb_debugfs:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default vendor_dmabuf_debugfs:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default vendor_regmap_debugfs:dir r_dir_perms; |
| dontaudit hal_dumpstate_default vendor_regmap_debugfs:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default vendor_maxfg_debugfs:dir search; |
| dontaudit hal_dumpstate_default vendor_maxfg_debugfs:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default vendor_charger_debugfs:dir r_dir_perms; |
| dontaudit hal_dumpstate_default vendor_charger_debugfs:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default debugfs:dir r_dir_perms; |
| dontaudit hal_dumpstate_default vendor_battery_debugfs:dir r_dir_perms; |
| dontaudit hal_dumpstate_default vendor_battery_debugfs:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default vendor_votable_debugfs:dir r_dir_perms; |
| dontaudit hal_dumpstate_default vendor_votable_debugfs:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default mnt_vendor_file:dir r_dir_perms; |
| dontaudit hal_dumpstate_default ramdump_vendor_mnt_file:dir search; |
| dontaudit hal_dumpstate_default ramdump_vendor_mnt_file:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default sysfs_bcl:dir r_dir_perms; |
| dontaudit hal_dumpstate_default sysfs_bcl:file r_file_perms; |
| |
| dontaudit hal_dumpstate_default rootfs:dir r_dir_perms; |
| |
| dontaudit hal_dumpstate_default tcpdump_vendor_data_file:dir create_dir_perms; |
| dontaudit hal_dumpstate_default tcpdump_vendor_data_file:file create_file_perms; |
| dontaudit hal_dumpstate_default vendor_tcpdump_log_prop:file r_file_perms; |