2017-11-15 23:57:14 +01:00
|
|
|
# Creating files on sysfs is impossible so this isn't a threat
|
|
|
|
# Sometimes we have to write to non-existent files to avoid conditional
|
|
|
|
# init behavior. See b/35303861 for an example.
|
|
|
|
dontaudit vendor_init sysfs:dir write;
|
2019-08-02 00:57:47 +02:00
|
|
|
|
|
|
|
# TODO(b/140259336) We want to remove vendor_init in the long term but allow for now
|
|
|
|
allow vendor_init system_data_root_file:dir rw_dir_perms;
|
2020-10-28 21:56:23 +01:00
|
|
|
|
|
|
|
# Let vendor_init set service.adb.tcp.port.
|
|
|
|
set_prop(vendor_init, adbd_config_prop)
|
2021-03-29 19:19:12 +02:00
|
|
|
|
2021-10-08 14:13:46 +02:00
|
|
|
# Let vendor_init react to AVF device config changes
|
|
|
|
get_prop(vendor_init, device_config_virtualization_framework_native_prop)
|
|
|
|
|
2022-09-02 09:26:27 +02:00
|
|
|
# Let vendor_init use apex.<name>.ready to start services from vendor APEX
|
|
|
|
get_prop(vendor_init, apex_ready_prop)
|
|
|
|
|
2021-03-29 19:19:12 +02:00
|
|
|
# chown/chmod on devices, e.g. /dev/ttyHS0
|
|
|
|
allow vendor_init {
|
|
|
|
dev_type
|
|
|
|
-keychord_device
|
2023-03-23 01:31:35 +01:00
|
|
|
-vm_manager_device_type
|
2021-03-29 19:19:12 +02:00
|
|
|
-port_device
|
|
|
|
-lowpan_device
|
|
|
|
-hw_random_device
|
|
|
|
}:chr_file setattr;
|