am 357842b1
: Merge "Revert "Allow all domains access to /dev/qemu_trace.""
* commit '357842b109db31c85aebb8d1c9f70885fe1cb07c': Revert "Allow all domains access to /dev/qemu_trace."
This commit is contained in:
commit
8dea5006c5
21 changed files with 28 additions and 4 deletions
|
@ -77,13 +77,17 @@ TARGET_USERIMAGES_SPARSE_EXT_DISABLED := true
|
|||
|
||||
BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy
|
||||
BOARD_SEPOLICY_UNION += \
|
||||
adbd.te \
|
||||
app.te \
|
||||
bootanim.te \
|
||||
device.te \
|
||||
domain.te \
|
||||
file.te \
|
||||
file_contexts \
|
||||
mediaserver.te \
|
||||
qemud.te \
|
||||
rild.te \
|
||||
shell.te \
|
||||
surfaceflinger.te \
|
||||
system_server.te
|
||||
system_server.te \
|
||||
zygote.te
|
||||
|
|
1
target/board/generic/sepolicy/adbd.te
Normal file
1
target/board/generic/sepolicy/adbd.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow adbd qemu_device:chr_file rw_file_perms;
|
1
target/board/generic/sepolicy/app.te
Normal file
1
target/board/generic/sepolicy/app.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow appdomain qemu_device:chr_file rw_file_perms;
|
|
@ -1,2 +1,3 @@
|
|||
allow bootanim self:process execmem;
|
||||
allow bootanim ashmem_device:chr_file execute;
|
||||
allow bootanim qemu_device:chr_file rw_file_perms;
|
||||
|
|
|
@ -1,3 +1,2 @@
|
|||
# For /sys/qemu_trace files in the emulator.
|
||||
allow domain sysfs_writable:file rw_file_perms;
|
||||
allow domain qemu_device:chr_file rw_file_perms;
|
||||
|
|
1
target/board/generic/sepolicy/mediaserver.te
Normal file
1
target/board/generic/sepolicy/mediaserver.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow mediaserver qemu_device:chr_file rw_file_perms;
|
|
@ -1 +1,2 @@
|
|||
allow rild qemu_device:chr_file rw_file_perms;
|
||||
unix_socket_connect(rild, qemud, qemud)
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
allow surfaceflinger self:process execmem;
|
||||
allow surfaceflinger ashmem_device:chr_file execute;
|
||||
allow surfaceflinger qemu_device:chr_file rw_file_perms;
|
||||
|
|
|
@ -1 +1,2 @@
|
|||
unix_socket_connect(system_server, qemud, qemud)
|
||||
allow system_server qemu_device:chr_file rw_file_perms;
|
||||
|
|
1
target/board/generic/sepolicy/zygote.te
Normal file
1
target/board/generic/sepolicy/zygote.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow zygote qemu_device:chr_file rw_file_perms;
|
|
@ -59,11 +59,13 @@ TARGET_USERIMAGES_SPARSE_EXT_DISABLED := true
|
|||
|
||||
BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy
|
||||
BOARD_SEPOLICY_UNION += \
|
||||
adbd.te \
|
||||
bootanim.te \
|
||||
device.te \
|
||||
domain.te \
|
||||
file.te \
|
||||
file_contexts \
|
||||
mediaserver.te \
|
||||
qemud.te \
|
||||
rild.te \
|
||||
shell.te \
|
||||
|
|
|
@ -44,6 +44,8 @@ TARGET_USERIMAGES_SPARSE_EXT_DISABLED := true
|
|||
|
||||
BOARD_SEPOLICY_DIRS += build/target/board/generic_x86/sepolicy
|
||||
BOARD_SEPOLICY_UNION += \
|
||||
app.te \
|
||||
adbd.te \
|
||||
bootanim.te \
|
||||
device.te \
|
||||
domain.te \
|
||||
|
@ -51,8 +53,10 @@ BOARD_SEPOLICY_UNION += \
|
|||
file_contexts \
|
||||
healthd.te \
|
||||
installd.te \
|
||||
mediaserver.te \
|
||||
qemud.te \
|
||||
rild.te \
|
||||
shell.te \
|
||||
surfaceflinger.te \
|
||||
system_server.te
|
||||
system_server.te \
|
||||
zygote.te
|
||||
|
|
1
target/board/generic_x86/sepolicy/adbd.te
Normal file
1
target/board/generic_x86/sepolicy/adbd.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow adbd qemu_device:chr_file rw_file_perms;
|
1
target/board/generic_x86/sepolicy/app.te
Normal file
1
target/board/generic_x86/sepolicy/app.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow appdomain qemu_device:chr_file rw_file_perms;
|
1
target/board/generic_x86/sepolicy/bootanim.te
Normal file
1
target/board/generic_x86/sepolicy/bootanim.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow bootanim qemu_device:chr_file rw_file_perms;
|
|
@ -1,4 +1,3 @@
|
|||
# For /sys/qemu_trace files in the emulator.
|
||||
allow domain sysfs_writable:file rw_file_perms;
|
||||
allow domain cpuctl_device:dir search;
|
||||
allow domain qemu_device:chr_file rw_file_perms;
|
||||
|
|
1
target/board/generic_x86/sepolicy/mediaserver.te
Normal file
1
target/board/generic_x86/sepolicy/mediaserver.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow mediaserver qemu_device:chr_file rw_file_perms;
|
|
@ -1 +1,2 @@
|
|||
allow rild qemu_device:chr_file rw_file_perms;
|
||||
unix_socket_connect(rild, qemud, qemud)
|
||||
|
|
1
target/board/generic_x86/sepolicy/surfaceflinger.te
Normal file
1
target/board/generic_x86/sepolicy/surfaceflinger.te
Normal file
|
@ -0,0 +1 @@
|
|||
allow surfaceflinger qemu_device:chr_file rw_file_perms;
|
|
@ -1,2 +1,3 @@
|
|||
allow system_server self:process execmem;
|
||||
unix_socket_connect(system_server, qemud, qemud)
|
||||
allow system_server qemu_device:chr_file rw_file_perms;
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
allow zygote self:process execmem;
|
||||
allow zygote self:capability sys_nice;
|
||||
allow zygote qemu_device:chr_file rw_file_perms;
|
||||
|
|
Loading…
Reference in a new issue