Merge "Temporarily whitelisting system domains writing vendor props" into pi-dev

This commit is contained in:
TreeHugger Robot
2018-05-22 05:04:40 +00:00
committed by Android (Google) Code Review
10 changed files with 10 additions and 0 deletions

View File

@@ -11,6 +11,7 @@ allow ramoops shell_exec:file rx_file_perms;
allow ramoops toolbox_exec:file rx_file_perms;
# Set the sys.ramoops.decrypted property
typeattribute ramoops system_writes_vendor_properties_violators;
set_prop(ramoops, ramoops_prop);
allow ramoops sysfs_pstore:file rw_file_perms;

View File

@@ -1,3 +1,4 @@
typeattribute bluetooth system_writes_vendor_properties_violators;
set_prop(bluetooth, vendor_bluetooth_prop)
set_prop(bluetooth, wc_prop)

View File

@@ -1,5 +1,6 @@
allow cameraserver gpu_device:chr_file rw_file_perms;
typeattribute cameraserver system_writes_vendor_properties_violators;
set_prop(cameraserver, camera_prop)
allow cameraserver sysfs_camera:file r_file_perms;

View File

@@ -1 +1,2 @@
typeattribute charger system_writes_vendor_properties_violators;
set_prop(charger, public_vendor_system_prop)

View File

@@ -1 +1,2 @@
typeattribute gatekeeperd system_writes_vendor_properties_violators;
set_prop(gatekeeperd, keymaster_prop)

View File

@@ -1 +1,2 @@
typeattribute healthd system_writes_vendor_properties_violators;
set_prop(healthd, public_vendor_system_prop)

View File

@@ -1,4 +1,5 @@
get_prop(radio, ims_prop)
typeattribute radio system_writes_vendor_properties_violators;
userdebug_or_eng(`set_prop(radio, tel_mon_prop)')
allow radio qmuxd_socket:dir search;

View File

@@ -3,4 +3,5 @@ dontaudit surfaceflinger vendor_file:file read;
dontaudit surfaceflinger kernel:system module_request;
allow surfaceflinger debugfs_ion:dir search;
typeattribute surfaceflinger system_writes_vendor_properties_violators;
set_prop(surfaceflinger, public_vendor_system_prop)

View File

@@ -3,6 +3,7 @@
userdebug_or_eng(`set_prop(system_app, tel_mon_prop)')
# Needed by Settings app's CameraHalHdrplusPreferenceController
typeattribute system_app system_writes_vendor_properties_violators;
set_prop(system_app, camera_prop)
# read regulatory info

View File

@@ -23,6 +23,7 @@ dontaudit system_server untrusted_app:file write;
dontaudit system_server hal_audio_default:file write;
dontaudit system_server appdomain:file write;
typeattribute system_server system_writes_vendor_properties_violators;
set_prop(system_server, public_vendor_system_prop)
dontaudit system_server self:capability sys_module;