summaryrefslogtreecommitdiff
path: root/vendor
diff options
context:
space:
mode:
authorAdam Shih <adamshih@google.com>2021-07-05 09:50:03 +0800
committerAdam Shih <adamshih@google.com>2021-07-13 08:29:57 +0800
commit375055f0abc5963af2cc581ee0fbd3eb155f8c51 (patch)
tree5f6f8104f541f30070828832b991ad359461c63a /vendor
parentc8e6b9e74b9280d6a3bdec49637101200dce6b60 (diff)
downloadsunfish-sepolicy-375055f0abc5963af2cc581ee0fbd3eb155f8c51.tar.gz
sync codebase
Bug: 162370942 Test: build pass Change-Id: Ib6042e79d74dedae3b07c91769958f58e439f62b Merged-In: I4c2275e155bd71793d554e5d44d7833d4c4ab9da
Diffstat (limited to 'vendor')
-rw-r--r--vendor/google/bug_map10
-rw-r--r--vendor/google/file.te7
-rw-r--r--vendor/google/file_contexts68
-rw-r--r--vendor/google/genfs_contexts3
-rw-r--r--vendor/google/google_camera_app.te4
-rw-r--r--vendor/google/hal_camera_default.te2
-rw-r--r--vendor/google/hal_health_default.te1
-rw-r--r--vendor/google/hal_identity_citadel.te9
-rw-r--r--vendor/google/hal_sensors_default.te1
-rw-r--r--vendor/google/hwservice.te1
-rw-r--r--vendor/google/hwservice_contexts16
-rw-r--r--vendor/google/init-insmod-sh.te12
-rw-r--r--vendor/google/init.te7
-rw-r--r--vendor/google/init_qti_chg_policy.te7
-rw-r--r--vendor/google/logger_app.te1
-rw-r--r--vendor/google/modem_diagnostics.te1
-rw-r--r--vendor/google/pixelstats_vendor.te3
-rw-r--r--vendor/google/powerstatsservice.te10
-rw-r--r--vendor/google/property.te1
-rw-r--r--vendor/google/property_contexts3
-rw-r--r--vendor/google/ramdump.te37
-rw-r--r--vendor/google/seapp_contexts5
-rw-r--r--vendor/google/uv_exposure_reporter.te2
-rw-r--r--vendor/qcom/common/cnd.te1
-rw-r--r--vendor/qcom/common/file.te2
-rw-r--r--vendor/qcom/common/file_contexts11
-rw-r--r--vendor/qcom/common/hal_gnss_qti.te2
-rw-r--r--vendor/qcom/common/hal_neuralnetworks.te3
-rw-r--r--vendor/qcom/common/hvdcp.te2
-rw-r--r--vendor/qcom/common/hwservice.te2
-rw-r--r--vendor/qcom/common/hwservice_contexts4
-rw-r--r--vendor/qcom/common/init-qti-keymaster-sh.te37
-rw-r--r--vendor/qcom/common/mediatranscoding.te2
-rw-r--r--vendor/qcom/common/netmgrd.te1
-rw-r--r--vendor/qcom/common/property.te2
-rw-r--r--vendor/qcom/common/property_contexts6
-rw-r--r--vendor/qcom/common/qtelephony.te1
-rw-r--r--vendor/qcom/common/seapp_contexts4
-rw-r--r--vendor/qcom/common/sensors.te2
-rw-r--r--vendor/qcom/common/service.te1
-rw-r--r--vendor/qcom/common/service_contexts1
41 files changed, 185 insertions, 110 deletions
diff --git a/vendor/google/bug_map b/vendor/google/bug_map
index 660ff62..ed89df6 100644
--- a/vendor/google/bug_map
+++ b/vendor/google/bug_map
@@ -1,6 +1,12 @@
+cnd wifi_hal_prop file b/162700455
+google_camera_app selinuxfs file b/175910397
hal_health_default unlabeled file b/156200409
+hal_neuralnetworks_default default_prop file b/159570217
+hal_vibrator_default default_prop file b/162700134
+init_qti_chg_policy sysfs_charge file b/162702119
+pixelstats_vendor sysfs file b/161875858
+platform_app default_android_hwservice hwservice_manager b/156059972
shell debugfs file b/175106535
shell device_config_runtime_native_boot_prop file b/175106535
shell sysfs file b/175106535
-tee tee capability2 156045688
-platform_app default_android_hwservice hwservice_manager 156059972
+tee tee capability2 b/156045688
diff --git a/vendor/google/file.te b/vendor/google/file.te
index 8ac5b01..1e3a2de 100644
--- a/vendor/google/file.te
+++ b/vendor/google/file.te
@@ -9,11 +9,9 @@ type debugfs_batteryinfo, debugfs_type, fs_type;
type sysfs_chargelevel, sysfs_type, fs_type;
type sysfs_display, sysfs_type, fs_type;
type sysfs_touch, sysfs_type, fs_type;
-type sysfs_power_stats, sysfs_type, fs_type;
type sysfs_power_stats_ignore, sysfs_type, fs_type;
type sysfs_poweroff, sysfs_type, fs_type;
type sysfs_msm_boardid, fs_type, sysfs_type;
-type sysfs_iio_devices, fs_type, sysfs_type;
type sysfs_pixelstats, fs_type, sysfs_type;
type sysfs_wlc, sysfs_type, fs_type;
type sysfs_pstore, sysfs_type, fs_type;
@@ -47,5 +45,6 @@ type debugfs_ipa_data_stall_detection, debugfs_type, fs_type;
# Incremental file system driver
type vendor_incremental_module, vendor_file_type, file_type;
-# RamdumpFS
-allow ramdump_vendor_mnt_file self:filesystem associate;
+# Firmware mount
+type firmware_file, file_type, contextmount_type, vendor_file_type;
+allow firmware_file self:filesystem associate;
diff --git a/vendor/google/file_contexts b/vendor/google/file_contexts
index 5b0a6b0..45193da 100644
--- a/vendor/google/file_contexts
+++ b/vendor/google/file_contexts
@@ -16,14 +16,13 @@
/dev/battery_history u:object_r:battery_history_device:s0
# vendor binaries
-/vendor/bin/hw/android\.hardware\.atrace@1\.0-service.pixel u:object_r:hal_atrace_default_exec:s0
-/vendor/bin/hw/android\.hardware\.camera\.provider@2\.6-service-google u:object_r:hal_camera_default_exec:s0
-/vendor/bin/hw/android\.hardware\.contexthub@1\.1-service\.generic u:object_r:hal_contexthub_default_exec:s0
+/vendor/bin/hw/android\.hardware\.camera\.provider@2\.7-service-google u:object_r:hal_camera_default_exec:s0
+/vendor/bin/hw/android\.hardware\.contexthub@1\.2-service\.generic u:object_r:hal_contexthub_default_exec:s0
/vendor/bin/hw/android\.hardware\.dumpstate@1\.1-service\.sunfish u:object_r:hal_dumpstate_impl_exec:s0
/vendor/bin/hw/android\.hardware\.neuralnetworks@1\.0-service-paintbox u:object_r:hal_neuralnetworks_paintbox_exec:s0
/vendor/bin/hw/android\.hardware\.neuralnetworks@1\.2-service-noronha u:object_r:hal_neuralnetworks_darwinn_exec:s0
/vendor/bin/hw/android\.hardware\.power\.stats@1\.0-service\.pixel u:object_r:hal_power_stats_default_exec:s0
-/vendor/bin/hw/android\.hardware\.usb@1\.2-service\.sunfish u:object_r:hal_usb_impl_exec:s0
+/vendor/bin/hw/android\.hardware\.usb@1\.3-service\.sunfish u:object_r:hal_usb_impl_exec:s0
/vendor/bin/hw/android\.hardware\.vibrator@1\.3-service\.sunfish u:object_r:hal_vibrator_default_exec:s0
/vendor/bin/hw/hardware\.google\.light@1\.1-service u:object_r:hal_light_default_exec:s0
/vendor/bin/hw/vendor\.google\.radioext@1\.0-service u:object_r:hal_radioext_default_exec:s0
@@ -31,8 +30,8 @@
/vendor/bin/init\.ramoops\.sh u:object_r:ramoops_exec:s0
/vendor/bin/modem_svc u:object_r:modem_svc_exec:s0
/vendor/bin/ramoops u:object_r:ramoops_exec:s0
-/vendor/bin/ramdump u:object_r:ramdump_exec:s0
/vendor/bin/init\.radio\.sh u:object_r:init_radio_exec:s0
+/vendor/bin/init\.insmod\.sh u:object_r:init-insmod-sh_exec:s0
/vendor/bin/hw/vendor\.google\.wifi_ext@1\.0-service-vendor u:object_r:hal_wifi_ext_exec:s0
/vendor/bin/hw/vendor\.google\.wifi_ext@1\.0-service-vendor-lazy u:object_r:hal_wifi_ext_exec:s0
/vendor/bin/tcpdump_logger u:object_r:tcpdump_logger_exec:s0
@@ -44,6 +43,9 @@
/vendor/bin/init\.qti\.chg_policy\.sh u:object_r:init_qti_chg_policy_exec:s0
/vendor/bin/hw/android\.hardware\.graphics\.composer@2\.4-service-sm8150 u:object_r:hal_graphics_composer_default_exec:s0
+# Vendor firmware
+/vendor/firmware_mnt(/.*)? u:object_r:firmware_file:s0
+
/mnt/vendor/persist/battery(/.*)? u:object_r:persist_battery_file:s0
/mnt/vendor/persist/haptics(/.*)? u:object_r:persist_haptics_file:s0
@@ -61,5 +63,57 @@
# dev socket node
/dev/socket/diag_router u:object_r:diag_socket:s0
-#vendor_kernel_modules
-/vendor/lib/modules/.*\.ko u:object_r:vendor_kernel_modules:s0
+# vendor_kernel_modules
+/vendor/lib/modules/adsp_loader_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/apr_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/atomic64_test\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/bolero_cdc_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/br_netfilter\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/gspca_main\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/hdmi_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/lcd\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/lkdtm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/llcc_perfmon\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/machine_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/mbhc_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/mmc_test\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/mpq-adapter\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/mpq-dmx-hw-plugin\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/msm_11ad_proxy\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/msm-geni-ir\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/native_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/pinctrl_lpi_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/pinctrl_wcd_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/platform_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/q6_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/q6_notifier_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/q6_pdr_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/rdbg\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/rx_macro_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/snd_event_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/stub_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/swr_ctrl_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/swr_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/test_user_copy\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/torture\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/tx_macro_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/usf_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/va_macro_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wcd934x_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wcd937x_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wcd937x_slave_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wcd9xxx_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wcd_core_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wcd_spi_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wglink_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wil6210\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wlan\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wsa881x_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/wsa_macro_dlkm\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/heatmap\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/ftm5\.ko u:object_r:vendor_kernel_modules:s0
+/vendor/lib/modules/drv2624\.ko u:object_r:vendor_kernel_modules:s0
+
+# Vendor libs that are exposed to apps (those listed in /vendor/etc/public.libraries.txt
+# and their dependencies)
+/vendor/lib(64)?/vendor\.qti\.hardware\.dsp@1\.0\.so u:object_r:same_process_hal_file:s0
diff --git a/vendor/google/genfs_contexts b/vendor/google/genfs_contexts
index 399b01c..f2173b2 100644
--- a/vendor/google/genfs_contexts
+++ b/vendor/google/genfs_contexts
@@ -14,7 +14,6 @@ genfscon sysfs /devices/platform/soc/1d84000.ufshc/device_descriptor u:o
genfscon proc /sys/vm/swappiness u:object_r:proc_swappiness:s0
genfscon proc /fs/f2fs u:object_r:proc_f2fs:s0
genfscon proc /irq u:object_r:proc_irq:s0
-genfscon sysfs /bus/iio/devices u:object_r:sysfs_iio_devices:s0
# Touch
genfscon sysfs /devices/platform/soc/a84000.i2c/i2c-1/1-0049 u:object_r:sysfs_touch:s0
@@ -53,6 +52,8 @@ genfscon sysfs /devices/platform/soc/a8c000.i2c/i2c-2/2-0010/iio:device2
u:object_r:sysfs_power_stats:s0
# Not used by PowerStatsHal
+genfscon sysfs /devices/platform/soc/c440000.qcom,spmi/spmi-0/spmi0-00/c440000.qcom,spmi:qcom,pm6150@0:vadc@3100/iio:device0
+u:object_r:sysfs_power_stats_ignore:s0
genfscon sysfs /devices/platform/soc/c440000.qcom,spmi/spmi-0/spmi0-04/c440000.qcom,spmi:qcom,pm6150l@4:vadc@3100/iio:device1
u:object_r:sysfs_power_stats_ignore:s0
diff --git a/vendor/google/google_camera_app.te b/vendor/google/google_camera_app.te
index b04fc93..b275f42 100644
--- a/vendor/google/google_camera_app.te
+++ b/vendor/google/google_camera_app.te
@@ -29,7 +29,6 @@ allow google_camera_app app_api_service:service_manager find;
allow google_camera_app audioserver_service:service_manager find;
allow google_camera_app cameraserver_service:service_manager find;
allow google_camera_app drmserver_service:service_manager find;
-allow google_camera_app gpu_service:service_manager find;
allow google_camera_app mediaserver_service:service_manager find;
allow google_camera_app mediaextractor_service:service_manager find;
allow google_camera_app mediametrics_service:service_manager find;
@@ -37,9 +36,6 @@ allow google_camera_app mediadrmserver_service:service_manager find;
allow google_camera_app nfc_service:service_manager find;
allow google_camera_app radio_service:service_manager find;
-# Allow untrusted apps to interact with gpuservice
-binder_call(google_camera_app, gpuservice)
-
# gdbserver for ndk-gdb ptrace attaches to app process.
allow google_camera_app self:process ptrace;
diff --git a/vendor/google/hal_camera_default.te b/vendor/google/hal_camera_default.te
index 01c21bf..104b9fe 100644
--- a/vendor/google/hal_camera_default.te
+++ b/vendor/google/hal_camera_default.te
@@ -9,7 +9,7 @@ binder_call(hal_camera_default, sensor_service_server)
binder_call(sensor_service_server, hal_camera_default)
# For camera hal to talk with gralloc
-#hal_client_domain(hal_camera_default, hal_graphics_allocator)
+hal_client_domain(hal_camera_default, hal_graphics_allocator)
hal_client_domain(hal_camera_default, hal_graphics_composer)
#For camera hal to talk with ECOService.
diff --git a/vendor/google/hal_health_default.te b/vendor/google/hal_health_default.te
index d320e81..4adbaa1 100644
--- a/vendor/google/hal_health_default.te
+++ b/vendor/google/hal_health_default.te
@@ -4,7 +4,6 @@ r_dir_file(hal_health_default, sysfs_scsi_devices_0000)
set_prop(hal_health_default, vendor_shutdown_prop)
set_prop(hal_health_default, vendor_battery_defender_prop)
-allow hal_health_default fwk_stats_hwservice:hwservice_manager find;
allow hal_health_default fwk_stats_service:service_manager find;
binder_use(hal_health_default)
diff --git a/vendor/google/hal_identity_citadel.te b/vendor/google/hal_identity_citadel.te
deleted file mode 100644
index e29310c..0000000
--- a/vendor/google/hal_identity_citadel.te
+++ /dev/null
@@ -1,9 +0,0 @@
-type hal_identity_citadel, domain;
-type hal_identity_citadel_exec, exec_type, vendor_file_type, file_type;
-
-vndbinder_use(hal_identity_citadel)
-binder_call(hal_identity_citadel, citadeld)
-allow hal_identity_citadel citadeld_service:service_manager find;
-
-hal_server_domain(hal_identity_citadel, hal_identity)
-init_daemon_domain(hal_identity_citadel)
diff --git a/vendor/google/hal_sensors_default.te b/vendor/google/hal_sensors_default.te
index 5adebba..2f746ce 100644
--- a/vendor/google/hal_sensors_default.te
+++ b/vendor/google/hal_sensors_default.te
@@ -13,7 +13,6 @@ allow hal_sensors_default sysfs_leds:dir search;
allow hal_sensors_default sysfs_leds:file r_file_perms;
# For Suez metrics collection
-allow hal_sensors_default fwk_stats_hwservice:hwservice_manager find;
binder_call(hal_sensors_default, system_server);
allow hal_sensors_default fwk_stats_service:service_manager find;
binder_use(hal_sensors_default)
diff --git a/vendor/google/hwservice.te b/vendor/google/hwservice.te
index a8eb5f5..b8e9a67 100644
--- a/vendor/google/hwservice.te
+++ b/vendor/google/hwservice.te
@@ -3,4 +3,5 @@ type hal_darwinn_hwservice, hwservice_manager_type, vendor_hwservice_type;
type hal_radioext_hwservice, hwservice_manager_type, vendor_hwservice_type;
type hal_wifi_ext_hwservice, hwservice_manager_type, vendor_hwservice_type;
type hal_wlc_hwservice, hwservice_manager_type, vendor_hwservice_type;
+type hal_bluetooth_coexistence_hwservice, hwservice_manager_type, vendor_hwservice_type;
type hal_audiometricext_hwservice, hwservice_manager_type;
diff --git a/vendor/google/hwservice_contexts b/vendor/google/hwservice_contexts
index f7a6593..15c0e7f 100644
--- a/vendor/google/hwservice_contexts
+++ b/vendor/google/hwservice_contexts
@@ -1,7 +1,9 @@
-hardware.google.pixelstats::IPixelStats u:object_r:hal_pixelstats_hwservice:s0
-hardware.google.light::ILight u:object_r:hal_light_hwservice:s0
-vendor.google.darwinn.service::IDarwinnService u:object_r:hal_darwinn_hwservice:s0
-vendor.google.radioext::IRadioExt u:object_r:hal_radioext_hwservice:s0
-vendor.google.wifi_ext::IWifiExt u:object_r:hal_wifi_ext_hwservice:s0
-vendor.google.wireless_charger::IWirelessCharger u:object_r:hal_wlc_hwservice:s0
-vendor.google.audiometricext::IAudioMetricExt u:object_r:hal_audiometricext_hwservice:s0
+hardware.google.pixelstats::IPixelStats u:object_r:hal_pixelstats_hwservice:s0
+hardware.google.light::ILight u:object_r:hal_light_hwservice:s0
+hardware.google.bluetooth.bt_channel_avoidance::IBTChannelAvoidance u:object_r:hal_bluetooth_coexistence_hwservice:s0
+hardware.google.bluetooth.sar::IBluetoothSar u:object_r:hal_bluetooth_coexistence_hwservice:s0
+vendor.google.darwinn.service::IDarwinnService u:object_r:hal_darwinn_hwservice:s0
+vendor.google.radioext::IRadioExt u:object_r:hal_radioext_hwservice:s0
+vendor.google.wifi_ext::IWifiExt u:object_r:hal_wifi_ext_hwservice:s0
+vendor.google.wireless_charger::IWirelessCharger u:object_r:hal_wlc_hwservice:s0
+vendor.google.audiometricext::IAudioMetricExt u:object_r:hal_audiometricext_hwservice:s0
diff --git a/vendor/google/init-insmod-sh.te b/vendor/google/init-insmod-sh.te
index 851ad3f..5f0f6dd 100644
--- a/vendor/google/init-insmod-sh.te
+++ b/vendor/google/init-insmod-sh.te
@@ -1,4 +1,12 @@
# Allow insmod
+type init-insmod-sh, domain;
+type init-insmod-sh_exec, exec_type, vendor_file_type, file_type;
+
+init_daemon_domain(init-insmod-sh)
+
+allow init-insmod-sh self:capability sys_module;
+allow init-insmod-sh vendor_kernel_modules:system module_load;
+allow init-insmod-sh vendor_toolbox_exec:file execute_no_trans;
allow init-insmod-sh sysfs_msm_boot:file w_file_perms;
userdebug_or_eng(`
@@ -6,7 +14,9 @@ userdebug_or_eng(`
allow init-insmod-sh debugfs_wlan:dir search;
')
+set_prop(init-insmod-sh, vendor_device_prop)
+
dontaudit init-insmod-sh debugfs_ipc:dir search;
dontaudit init-insmod-sh debugfs_wlan:dir search;
dontaudit init-insmod-sh self:capability sys_admin;
-dontaudit init-insmod-sh proc_cmdline:file read;
+dontaudit init-insmod-sh proc_cmdline:file r_file_perms;
diff --git a/vendor/google/init.te b/vendor/google/init.te
index 5ed0eb9..cd16f4e 100644
--- a/vendor/google/init.te
+++ b/vendor/google/init.te
@@ -1,3 +1,7 @@
+# Allow init to mount firmware
+allow init firmware_file:dir mounton;
+allow init firmware_file:filesystem { getattr mount relabelfrom };
+
allow init boot_block_device:lnk_file relabelto;
allow init custom_ab_block_device:lnk_file relabelto;
@@ -8,3 +12,6 @@ recovery_only(`
allow init sysfs_thermal:file rw_file_perms;
allow init sysfs_poweroff:file w_file_perms;
')
+
+allow init per_boot_file:file ioctl;
+allowxperm init per_boot_file:file ioctl { F2FS_IOC_SET_PIN_FILE };
diff --git a/vendor/google/init_qti_chg_policy.te b/vendor/google/init_qti_chg_policy.te
index 44815ce..924d3d1 100644
--- a/vendor/google/init_qti_chg_policy.te
+++ b/vendor/google/init_qti_chg_policy.te
@@ -7,5 +7,12 @@ allow init_qti_chg_policy vendor_toolbox_exec:file rx_file_perms;
allow init_qti_chg_policy sysfs_batteryinfo:file create_file_perms;
allow init_qti_chg_policy sysfs_batteryinfo:dir r_dir_perms;
allow init_qti_chg_policy sysfs_contaminant:file create_file_perms;
+allow init_qti_chg_policy sysfs_wakeup:dir r_dir_perms;
+allow init_qti_chg_policy sysfs_wakeup:file getattr;
+allow init_qti_chg_policy sysfs_iio_devices:dir search;
+allow init_qti_chg_policy sysfs_power_stats_ignore:dir search;
+allow init_qti_chg_policy sysfs_power_stats_ignore:file r_file_perms;
+allow init_qti_chg_policy sysfs_power_stats:dir search;
+allow init_qti_chg_policy sysfs_power_stats:file r_file_perms;
set_prop(init_qti_chg_policy, vendor_hvdcp_opti_prop)
diff --git a/vendor/google/logger_app.te b/vendor/google/logger_app.te
index 18be9d3..41e705b 100644
--- a/vendor/google/logger_app.te
+++ b/vendor/google/logger_app.te
@@ -19,4 +19,5 @@ userdebug_or_eng(`
set_prop(logger_app, vendor_tcpdump_log_prop)
set_prop(logger_app, vendor_wifi_sniffer_prop)
set_prop(logger_app, vendor_usb_prop)
+ set_prop(logger_app, vendor_logging_prop)
')
diff --git a/vendor/google/modem_diagnostics.te b/vendor/google/modem_diagnostics.te
index 94eae79..6783d1e 100644
--- a/vendor/google/modem_diagnostics.te
+++ b/vendor/google/modem_diagnostics.te
@@ -9,6 +9,7 @@ userdebug_or_eng(`
allow modem_diagnostic_app surfaceflinger_service:service_manager find;
allow modem_diagnostic_app radio_service:service_manager find;
allow modem_diagnostic_app diag_device:chr_file rw_file_perms;
+ allow modem_diagnostic_app sysfs_esim:file r_file_perms;
allow modem_diagnostic_app ssr_log_file:dir r_dir_perms;
allow modem_diagnostic_app ssr_log_file:file r_file_perms;
diff --git a/vendor/google/pixelstats_vendor.te b/vendor/google/pixelstats_vendor.te
index 7498cfc..e6c178d 100644
--- a/vendor/google/pixelstats_vendor.te
+++ b/vendor/google/pixelstats_vendor.te
@@ -11,9 +11,6 @@ hwbinder_use(pixelstats_vendor)
allow pixelstats_vendor hal_pixelstats_hwservice:hwservice_manager find;
binder_call(pixelstats_vendor, pixelstats_system)
-allow pixelstats_vendor fwk_stats_hwservice:hwservice_manager find;
-binder_call(pixelstats_vendor, stats_service_server)
-
binder_use(pixelstats_vendor)
allow pixelstats_vendor fwk_stats_service:service_manager find;
diff --git a/vendor/google/powerstatsservice.te b/vendor/google/powerstatsservice.te
deleted file mode 100644
index af8e78b..0000000
--- a/vendor/google/powerstatsservice.te
+++ /dev/null
@@ -1,10 +0,0 @@
-# PowerStatsService app
-type powerstatsservice_app, domain, coredomain;
-
-userdebug_or_eng(`
- app_domain(powerstatsservice_app)
- binder_call(powerstatsservice_app, incidentd)
- allow powerstatsservice_app activity_service:service_manager find;
- allow powerstatsservice_app incident_service:service_manager find;
- hal_client_domain(powerstatsservice_app, hal_power_stats);
-')
diff --git a/vendor/google/property.te b/vendor/google/property.te
index 0940b1e..4687980 100644
--- a/vendor/google/property.te
+++ b/vendor/google/property.te
@@ -8,6 +8,7 @@ vendor_internal_prop(vendor_ramoops_prop)
vendor_internal_prop(vendor_shutdown_prop)
vendor_internal_prop(vendor_tcpdump_log_prop)
vendor_internal_prop(vendor_vibrator_prop)
+vendor_internal_prop(vendor_device_prop)
# vendor verbose logging property
vendor_internal_prop(vendor_logging_prop)
diff --git a/vendor/google/property_contexts b/vendor/google/property_contexts
index af2ee75..6fb2cd3 100644
--- a/vendor/google/property_contexts
+++ b/vendor/google/property_contexts
@@ -20,6 +20,9 @@ vendor.display.primary_blue u:object_r:vendor_display_prop:s
vendor.display.primary_white u:object_r:vendor_display_prop:s0
vendor.display.native_display_primaries_ready u:object_r:vendor_display_prop:s0
+vendor.all.modules.ready u:object_r:vendor_device_prop:s0
+vendor.all.devices.ready u:object_r:vendor_device_prop:s0
+
# battery
vendor.battery.defender. u:object_r:vendor_battery_defender_prop:s0
diff --git a/vendor/google/ramdump.te b/vendor/google/ramdump.te
deleted file mode 100644
index 0db625c..0000000
--- a/vendor/google/ramdump.te
+++ /dev/null
@@ -1,37 +0,0 @@
-type ramdump_exec, exec_type, vendor_file_type, file_type;
-type ramdump, domain;
-
-userdebug_or_eng(`
- init_daemon_domain(ramdump)
-
- set_prop(ramdump, vendor_ramdump_prop)
- get_prop(ramdump, public_vendor_default_prop)
-
- # f2fs set pin file requires sys_admin
- allow ramdump self:capability { sys_admin sys_rawio };
-
- allow ramdump ramdump_vendor_data_file:dir create_dir_perms;
- allow ramdump ramdump_vendor_data_file:file create_file_perms;
- allow ramdump proc_cmdline:file r_file_perms;
-
- allow ramdump block_device:dir search;
- allow ramdump misc_block_device:blk_file rw_file_perms;
- allow ramdump userdata_block_device:blk_file rw_file_perms;
-
- dontaudit ramdump metadata_file:dir search;
-
- r_dir_file(ramdump, sysfs_type)
-
- # To access statsd.
- hwbinder_use(ramdump)
- get_prop(ramdump, hwservicemanager_prop)
- allow ramdump fwk_stats_hwservice:hwservice_manager find;
- binder_call(ramdump, stats_service_server)
-
- # To implement fusefs (ramdumpfs) under /mnt/vendor/ramdump.
- allow ramdump fuse:filesystem relabelfrom;
- allow ramdump fuse_device:chr_file rw_file_perms;
- allow ramdump mnt_vendor_file:dir r_dir_perms;
- allow ramdump ramdump_vendor_mnt_file:dir { getattr mounton };
- allow ramdump ramdump_vendor_mnt_file:filesystem { mount unmount relabelfrom relabelto };
-')
diff --git a/vendor/google/seapp_contexts b/vendor/google/seapp_contexts
index 8326c40..2279b62 100644
--- a/vendor/google/seapp_contexts
+++ b/vendor/google/seapp_contexts
@@ -14,14 +14,11 @@ user=_app seinfo=platform name=com.google.googlecbrs domain=cbrs_setup_app type=
# Domain for Touch app
user=_app seinfo=platform name=com.google.touch.touchinspector domain=google_touch_app type=app_data_file levelFrom=user
-# Domain for power stats service
-user=_app isPrivApp=true seinfo=platform name=com.android.powerstatsservice domain=powerstatsservice_app type=app_data_file levelFrom=all
-
# Domain for Display
user=_app seinfo=platform name=com.android.hbmsvmanager domain=hbmsvmanager_app type=app_data_file levelFrom=all
# Domain for UvExposureReporter service
-user=_app seinfo=platform name=com.google.android.uvexposurereporter domain=uv_exposure_reporter type=app_data_file levelFrom=all
+user=_app isPrivApp=true name=com.google.android.uvexposurereporter domain=uv_exposure_reporter type=app_data_file levelFrom=all
# Domain for DeviceDropMonitor service
user=_app seinfo=platform name=com.google.android.devicedropmonitor domain=device_drop_monitor type=app_data_file levelFrom=all
diff --git a/vendor/google/uv_exposure_reporter.te b/vendor/google/uv_exposure_reporter.te
index 8aa682a..0d7ec6b 100644
--- a/vendor/google/uv_exposure_reporter.te
+++ b/vendor/google/uv_exposure_reporter.te
@@ -3,9 +3,7 @@ type uv_exposure_reporter, domain, coredomain;
app_domain(uv_exposure_reporter)
allow uv_exposure_reporter app_api_service:service_manager find;
-allow uv_exposure_reporter fwk_stats_hwservice:hwservice_manager find;
allow uv_exposure_reporter sysfs_msm_subsys:dir search;
allow uv_exposure_reporter sysfs_msm_subsys:file r_file_perms;
-binder_call(uv_exposure_reporter, stats_service_server);
allow uv_exposure_reporter fwk_stats_service:service_manager find;
binder_use(uv_exposure_reporter)
diff --git a/vendor/qcom/common/cnd.te b/vendor/qcom/common/cnd.te
index 473de1b..30acc21 100644
--- a/vendor/qcom/common/cnd.te
+++ b/vendor/qcom/common/cnd.te
@@ -20,6 +20,7 @@ allow cnd cnd_data_file:dir rw_dir_perms;
wakelock_use(cnd)
# To register cnd to hwbinder
add_hwservice(cnd, hal_datafactory_hwservice)
+add_hwservice(cnd, hal_mwqemadapter_hwservice)
userdebug_or_eng(`
allow cnd diag_device:chr_file rw_file_perms;
')
diff --git a/vendor/qcom/common/file.te b/vendor/qcom/common/file.te
index 33bb82e..23073eb 100644
--- a/vendor/qcom/common/file.te
+++ b/vendor/qcom/common/file.te
@@ -131,8 +131,6 @@ type sysfs_sectouch, sysfs_type, fs_type;
type vendor_tui_data_file, file_type, data_file_type;
type vendor_bt_data_file, file_type, data_file_type;
type sysfs_jpeg, fs_type, sysfs_type;
-type ramdump_vendor_data_file, file_type, data_file_type, mlstrustedobject;
-type ramdump_vendor_mnt_file, file_type, data_file_type, mlstrustedobject;
type sysfs_npu, fs_type, sysfs_type;
type vendor_ramdump_data_file, file_type, data_file_type;
type vendor_mdmhelperdata_data_file, file_type, data_file_type;
diff --git a/vendor/qcom/common/file_contexts b/vendor/qcom/common/file_contexts
index 38d8a33..3ed0ebf 100644
--- a/vendor/qcom/common/file_contexts
+++ b/vendor/qcom/common/file_contexts
@@ -67,6 +67,8 @@
/(vendor|system/vendor)/bin/hw/android\.hardware\.keymaster@3\.0-service-qti u:object_r:hal_keymaster_qti_exec:s0
/(vendor|system/vendor)/bin/hw/android\.hardware\.keymaster@4\.0-service-qti u:object_r:hal_keymaster_qti_exec:s0
/(vendor|system/vendor)/bin/hw/android\.hardware\.keymaster@4\.0-strongbox-service-qti u:object_r:hal_keymaster_qti_exec:s0
+/(vendor|system/vendor)/bin/hw/android\.hardware\.keymaster@4\.1-service-qti u:object_r:hal_keymaster_qti_exec:s0
+/(vendor|system/vendor)/bin/init\.qti\.keymaster\.sh u:object_r:init-qti-keymaster-sh_exec:s0
/(vendor|system/vendor)/bin/hw/android\.hardware\.gatekeeper@1\.0-service-qti u:object_r:hal_gatekeeper_qti_exec:s0
/(vendor|system/vendor)/bin/imsrcsd u:object_r:hal_rcsservice_exec:s0
/(vendor|system/vendor)/bin/hw/vendor\.qti\.hardware\.qteeconnector@1\.0-service u:object_r:hal_qteeconnector_qti_exec:s0
@@ -113,12 +115,6 @@
/mnt/vendor/persist/audio(/.*)? u:object_r:persist_audio_file:s0
###################################
-# ramdumpfs files
-#
-/mnt/vendor/ramdump(/.*)? u:object_r:ramdump_vendor_mnt_file:s0
-/ramdump(/.*)? u:object_r:ramdump_vendor_mnt_file:s0
-
-###################################
# adsp files
#
/(vendor|system/vendor)/dsp(/.*)? u:object_r:adsprpcd_file:s0
@@ -144,6 +140,8 @@
/vendor/lib(64)?/vendor\.qti\.hardware\.display\.mapperextensions@1\.1\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/hw/android\.hardware\.graphics\.mapper@3\.0-impl-qti-display\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/vendor\.qti\.hardware\.display\.mapper@3\.0\.so u:object_r:same_process_hal_file:s0
+/vendor/lib(64)?/hw/android\.hardware\.graphics\.mapper@4\.0-impl-qti-display\.so u:object_r:same_process_hal_file:s0
+/vendor/lib(64)?/vendor\.qti\.hardware\.display\.mapper@4\.0\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/libqdMetaData\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/libgralloc\.qti\.so u:object_r:same_process_hal_file:s0
/vendor/lib(64)?/lib_aion_buffer\.so u:object_r:same_process_hal_file:s0
@@ -268,7 +266,6 @@
/data/vendor/modem_fdr(/.*)? u:object_r:modem_fdr_file:s0
/data/vendor/mediadrm(/.*)? u:object_r:mediadrm_vendor_data_file:s0
/data/vendor/nnhal(/.*)? u:object_r:hal_neuralnetworks_data_file:s0
-/data/vendor/ramdump(/.*)? u:object_r:ramdump_vendor_data_file:s0
/data/vendor/ssrdump(/.*)? u:object_r:ramdump_vendor_data_file:s0
/data/vendor/ssrlog(/.*)? u:object_r:ssr_log_file:s0
/data/vendor/camera(/.*)? u:object_r:camera_vendor_data_file:s0
diff --git a/vendor/qcom/common/hal_gnss_qti.te b/vendor/qcom/common/hal_gnss_qti.te
index c4481a7..80abd2e 100644
--- a/vendor/qcom/common/hal_gnss_qti.te
+++ b/vendor/qcom/common/hal_gnss_qti.te
@@ -24,5 +24,7 @@ allow hal_gnss_qti location:unix_dgram_socket sendto;
allow hal_gnss_qti self:qipcrtr_socket create_socket_perms_no_ioctl;
+allow hal_gnss_qti location_data_file:dir r_dir_perms;
+
# Allow Gnss HAL to get updates from health hal
hal_client_domain(hal_gnss_qti, hal_health)
diff --git a/vendor/qcom/common/hal_neuralnetworks.te b/vendor/qcom/common/hal_neuralnetworks.te
index 1d20204..6ccdd39 100644
--- a/vendor/qcom/common/hal_neuralnetworks.te
+++ b/vendor/qcom/common/hal_neuralnetworks.te
@@ -17,3 +17,6 @@ r_dir_file(hal_neuralnetworks_default, sysfs_soc)
r_dir_file(hal_neuralnetworks_default, adsprpcd_file)
dontaudit hal_neuralnetworks_default vendor_display_prop:file read;
+
+# b/159570217 suppress warning related to zeroth.debuglog.logmask
+dontaudit hal_neuralnetworks_default default_prop:file { open read };
diff --git a/vendor/qcom/common/hvdcp.te b/vendor/qcom/common/hvdcp.te
index 7cdae50..9c1b7eb 100644
--- a/vendor/qcom/common/hvdcp.te
+++ b/vendor/qcom/common/hvdcp.te
@@ -7,7 +7,7 @@ allow hvdcp sysfs_batteryinfo:dir r_dir_perms;
allow hvdcp qg_device:chr_file rw_file_perms;
allow hvdcp self:capability2 wake_alarm;
allow hvdcp self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
-allow hvdcp kmsg_device:chr_file r_file_perms;
+allow hvdcp kmsg_device:chr_file rw_file_perms;
allow hvdcp mnt_vendor_file:dir r_dir_perms;
allow hvdcp persist_file:dir search;
allow hvdcp persist_hvdcp_file:dir search;
diff --git a/vendor/qcom/common/hwservice.te b/vendor/qcom/common/hwservice.te
index 39e009b..5f091a5 100644
--- a/vendor/qcom/common/hwservice.te
+++ b/vendor/qcom/common/hwservice.te
@@ -18,7 +18,7 @@ type hal_qdutils_disp_hwservice, hwservice_manager_type, vendor_hwservice_type;
type hal_sensorscalibrate_qti_hwservice, hwservice_manager_type, vendor_hwservice_type;
type vnd_atcmdfwd_hwservice, hwservice_manager_type, vendor_hwservice_type;
type hal_dataconnection_hwservice, hwservice_manager_type, vendor_hwservice_type;
-type hal_bluetooth_coexistence_hwservice, hwservice_manager_type, vendor_hwservice_type;
type hal_cacert_hwservice, hwservice_manager_type, vendor_hwservice_type;
type hal_capabilityconfigstore_qti_hwservice, hwservice_manager_type, vendor_hwservice_type;
type hal_qseecom_hwservice, hwservice_manager_type, protected_hwservice, vendor_hwservice_type;
+type hal_mwqemadapter_hwservice, hwservice_manager_type, protected_hwservice;
diff --git a/vendor/qcom/common/hwservice_contexts b/vendor/qcom/common/hwservice_contexts
index 2aecfbc..f275324 100644
--- a/vendor/qcom/common/hwservice_contexts
+++ b/vendor/qcom/common/hwservice_contexts
@@ -11,12 +11,11 @@ vendor.display.color::IDisplayColor u:object
vendor.display.config::IDisplayConfig u:object_r:hal_display_config_hwservice:s0
vendor.display.postproc::IDisplayPostproc u:object_r:hal_display_postproc_hwservice:s0
vendor.qti.hardware.display.mapper::IQtiMapper u:object_r:hal_graphics_mapper_hwservice:s0
-vendor.qti.hardware.bluetooth_sar::IBluetoothSar u:object_r:hal_bluetooth_coexistence_hwservice:s0
-vendor.qti.hardware.bt_channel_avoidance::IBTChannelAvoidance u:object_r:hal_bluetooth_coexistence_hwservice:s0
vendor.qti.hardware.qdutils_disp::IQdutilsDisp u:object_r:hal_qdutils_disp_hwservice:s0
vendor.qti.hardware.qteeconnector::IAppConnector u:object_r:hal_qteeconnector_hwservice:s0
vendor.qti.hardware.qteeconnector::IGPAppConnector u:object_r:hal_qteeconnector_hwservice:s0
vendor.qti.hardware.radio.am::IQcRilAudio u:object_r:hal_telephony_hwservice:s0
+vendor.qti.hardware.radio.internal.deviceinfo::IDeviceInfo u:object_r:hal_telephony_hwservice:s0
vendor.qti.hardware.radio.lpa::IUimLpa u:object_r:hal_telephony_hwservice:s0
vendor.qti.hardware.radio.qcrilhook::IQtiOemHook u:object_r:hal_telephony_hwservice:s0
vendor.qti.hardware.radio.qtiradio::IQtiRadio u:object_r:hal_telephony_hwservice:s0
@@ -37,3 +36,4 @@ vendor.qti.hardware.capabilityconfigstore::ICapabilityConfigStore u:object
vendor.qti.hardware.display.allocator::IQtiAllocator u:object_r:hal_graphics_allocator_hwservice:s0
vendor.qti.ims.callinfo::IService u:object_r:hal_imscallinfo_hwservice:s0
vendor.qti.hardware.qseecom::IQSEECom u:object_r:hal_qseecom_hwservice:s0
+vendor.qti.hardware.mwqemadapter::IMwqemAdapter u:object_r:hal_mwqemadapter_hwservice:s0
diff --git a/vendor/qcom/common/init-qti-keymaster-sh.te b/vendor/qcom/common/init-qti-keymaster-sh.te
new file mode 100644
index 0000000..f5a6c31
--- /dev/null
+++ b/vendor/qcom/common/init-qti-keymaster-sh.te
@@ -0,0 +1,37 @@
+# Copyright (c) 2020, The Linux Foundation. All rights reserved.
+
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions are
+# met:
+# * Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# * Redistributions in binary form must reproduce the above
+# copyright notice, this list of conditions and the following
+# disclaimer in the documentation and/or other materials provided
+# with the distribution.
+# * Neither the name of The Linux Foundation nor the names of its
+# contributors may be used to endorse or promote products derived
+# from this software without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
+# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
+# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
+# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
+# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
+# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
+# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+type init-qti-keymaster-sh, domain;
+type init-qti-keymaster-sh_exec, exec_type, vendor_file_type, file_type;
+
+init_daemon_domain(init-qti-keymaster-sh)
+
+# Set vendor.keymaster.strongbox.version to 40 or 41
+set_prop(init-qti-keymaster-sh, vendor_km_strongbox_version_prop);
+
+allow init-qti-keymaster-sh vendor_shell_exec:file rx_file_perms;
+allow init-qti-keymaster-sh vendor_toolbox_exec:file rx_file_perms;
diff --git a/vendor/qcom/common/mediatranscoding.te b/vendor/qcom/common/mediatranscoding.te
new file mode 100644
index 0000000..ab3f09d
--- /dev/null
+++ b/vendor/qcom/common/mediatranscoding.te
@@ -0,0 +1,2 @@
+get_prop(domain, vendor_display_prop)
+
diff --git a/vendor/qcom/common/netmgrd.te b/vendor/qcom/common/netmgrd.te
index 238a61b..4d53e7c 100644
--- a/vendor/qcom/common/netmgrd.te
+++ b/vendor/qcom/common/netmgrd.te
@@ -69,5 +69,6 @@ allow netmgrd self:netlink_xfrm_socket create_socket_perms_no_ioctl;
#Allow set persist.vendor.data.shsusr_load
#Allow set persist.vendor.data.perf_ko_load
#Allow set persist.vendor.data.qmipriod_load
+#Allow set persist.vendor.data.offload_ko_load
set_prop(netmgrd, vendor_radio_prop)
diff --git a/vendor/qcom/common/property.te b/vendor/qcom/common/property.te
index d232ac6..81b3b55 100644
--- a/vendor/qcom/common/property.te
+++ b/vendor/qcom/common/property.te
@@ -60,5 +60,5 @@ vendor_internal_prop(ctl_vendor_rmt_storage_prop)
vendor_internal_prop(vendor_wifi_version)
vendor_internal_prop(vendor_cnss_diag_prop)
vendor_internal_prop(vendor_modem_diag_prop)
-vendor_internal_prop(vendor_ramdump_prop)
vendor_restricted_prop(vendor_hvdcp_opti_prop)
+vendor_restricted_prop(vendor_km_strongbox_version_prop)
diff --git a/vendor/qcom/common/property_contexts b/vendor/qcom/common/property_contexts
index 89f0779..eebfb81 100644
--- a/vendor/qcom/common/property_contexts
+++ b/vendor/qcom/common/property_contexts
@@ -39,7 +39,6 @@ persist.vendor.bt.soc.scram_freqs u:object_r:vendor_bluetooth_prop
ro.vendor.audio.sdk.fluencetype u:object_r:vendor_audio_prop:s0
ro.vendor.ril. u:object_r:vendor_radio_prop:s0
-ro.boot.ramdump u:object_r:vendor_ramdump_prop:s0
# vendor display prop
vendor.gralloc.disable_ahardware_buffer u:object_r:vendor_display_prop:s0
@@ -51,7 +50,6 @@ vendor.debug.prerotation.disable u:object_r:vendor_display_prop:s
vendor.debug.egl.swapinterval u:object_r:vendor_display_prop:s0
ro.vendor.graphics.memory u:object_r:vendor_display_prop:s0
-vendor.debug.ramdump. u:object_r:vendor_ramdump_prop:s0
vendor.ims. u:object_r:qcom_ims_prop:s0
vendor.peripheral. u:object_r:vendor_per_mgr_state_prop:s0
vendor.sys.listeners.registered u:object_r:vendor_tee_listener_prop:s0
@@ -87,3 +85,7 @@ persist.vendor.data.shs_ko_load u:object_r:vendor_radio_prop:s0
persist.vendor.data.shsusr_load u:object_r:vendor_radio_prop:s0
persist.vendor.data.perf_ko_load u:object_r:vendor_radio_prop:s0
persist.vendor.data.qmipriod_load u:object_r:vendor_radio_prop:s0
+persist.vendor.data.offload_ko_load u:object_r:vendor_radio_prop:s0
+
+#keymaster strongbox service
+vendor.keymaster.strongbox.version u:object_r:vendor_km_strongbox_version_prop:s0
diff --git a/vendor/qcom/common/qtelephony.te b/vendor/qcom/common/qtelephony.te
index 315b1a2..29ce45f 100644
--- a/vendor/qcom/common/qtelephony.te
+++ b/vendor/qcom/common/qtelephony.te
@@ -7,6 +7,7 @@ add_hwservice(qtelephony, vnd_atcmdfwd_hwservice)
allow qtelephony app_api_service:service_manager find;
allow qtelephony hal_imsrtp_hwservice:hwservice_manager find;
+allow qtelephony hal_telephony_service:service_manager find;
allow qtelephony radio_service:service_manager find;
allow qtelephony sysfs_diag:dir search;
allow qtelephony sysfs_timestamp_switch:file r_file_perms;
diff --git a/vendor/qcom/common/seapp_contexts b/vendor/qcom/common/seapp_contexts
index c34496a..6b2ff84 100644
--- a/vendor/qcom/common/seapp_contexts
+++ b/vendor/qcom/common/seapp_contexts
@@ -29,3 +29,7 @@ user=_app seinfo=platform name=org.codeaurora.ims isPrivApp=true domain=qtelepho
#Add DeviceInfoHidlClient to vendor_qtelephony
user=_app seinfo=platform name=com.qualcomm.qti.devicestatisticsservice domain=qtelephony type=app_data_file levelFrom=all
+
+# QtiTelephonyService app
+user=_app seinfo=platform name=com.qualcomm.qti.telephonyservice domain=qtelephony type=app_data_file levelFrom=all
+
diff --git a/vendor/qcom/common/sensors.te b/vendor/qcom/common/sensors.te
index 95737d0..a423192 100644
--- a/vendor/qcom/common/sensors.te
+++ b/vendor/qcom/common/sensors.te
@@ -12,5 +12,7 @@ allow sensors self:qipcrtr_socket create;
allow sensors sensors_persist_file:dir rw_dir_perms;
r_dir_file(sensors, sysfs_msm_subsys)
allow sensors sysfs_ssr:file r_file_perms;
+allow sensors sensors_vendor_data_file:dir rw_dir_perms;
+allow sensors sensors_vendor_data_file:file create_file_perms;
dontaudit sensors sysfs_esoc:dir r_dir_perms;
diff --git a/vendor/qcom/common/service.te b/vendor/qcom/common/service.te
index c2ea2f6..c3aa9f1 100644
--- a/vendor/qcom/common/service.te
+++ b/vendor/qcom/common/service.te
@@ -4,3 +4,4 @@ type imsrcs_service, service_manager_type;
type improve_touch_service, service_manager_type;
type gba_auth_service, service_manager_type;
type qtitetherservice_service, service_manager_type;
+type hal_telephony_service, service_manager_type, vendor_service;
diff --git a/vendor/qcom/common/service_contexts b/vendor/qcom/common/service_contexts
new file mode 100644
index 0000000..405f768
--- /dev/null
+++ b/vendor/qcom/common/service_contexts
@@ -0,0 +1 @@
+vendor.qti.hardware.radio.ims.IImsRadio/default u:object_r:hal_telephony_service:s0