2012-04-04 16:11:16 +02:00
|
|
|
type default_prop, property_type;
|
|
|
|
type shell_prop, property_type;
|
2013-11-01 18:45:03 +01:00
|
|
|
type debug_prop, property_type;
|
2015-06-24 08:24:17 +02:00
|
|
|
type persist_debug_prop, property_type;
|
2014-02-06 01:36:25 +01:00
|
|
|
type debuggerd_prop, property_type;
|
2014-06-19 16:27:02 +02:00
|
|
|
type dhcp_prop, property_type;
|
2014-11-18 23:36:23 +01:00
|
|
|
type fingerprint_prop, property_type;
|
2015-04-24 04:42:25 +02:00
|
|
|
type ffs_prop, property_type;
|
2012-04-04 16:11:16 +02:00
|
|
|
type radio_prop, property_type;
|
2014-06-19 16:27:02 +02:00
|
|
|
type net_radio_prop, property_type;
|
|
|
|
type system_radio_prop, property_type;
|
2012-04-04 16:11:16 +02:00
|
|
|
type system_prop, property_type;
|
|
|
|
type vold_prop, property_type;
|
2014-02-18 19:24:26 +01:00
|
|
|
type ctl_bootanim_prop, property_type;
|
2012-04-04 16:11:16 +02:00
|
|
|
type ctl_default_prop, property_type;
|
2014-06-18 15:20:36 +02:00
|
|
|
type ctl_dhcp_pan_prop, property_type;
|
2012-04-04 16:11:16 +02:00
|
|
|
type ctl_dumpstate_prop, property_type;
|
2014-02-18 19:24:26 +01:00
|
|
|
type ctl_fuse_prop, property_type;
|
|
|
|
type ctl_mdnsd_prop, property_type;
|
2012-04-04 16:11:16 +02:00
|
|
|
type ctl_rildaemon_prop, property_type;
|
2014-03-06 20:47:22 +01:00
|
|
|
type ctl_bugreport_prop, property_type;
|
2015-04-24 23:39:16 +02:00
|
|
|
type ctl_console_prop, property_type;
|
2012-11-28 02:34:54 +01:00
|
|
|
type audio_prop, property_type;
|
2014-06-12 21:47:22 +02:00
|
|
|
type logd_prop, property_type;
|
2015-06-09 20:01:04 +02:00
|
|
|
type restorecon_prop, property_type;
|
2013-01-23 23:02:43 +01:00
|
|
|
type security_prop, property_type;
|
2013-05-06 19:18:27 +02:00
|
|
|
type bluetooth_prop, property_type;
|
2014-06-18 15:20:36 +02:00
|
|
|
type pan_result_prop, property_type;
|
Enable SELinux on vold
This change enables SELinux security enforcement on vold.
For the vold.te file ONLY, this change is conceptually a revert of
77d4731e9d30c8971e076e2469d6957619019921 and
50e37b93ac97631dcac6961285b92af5026557af, with the following
additional changes:
1) Removal of "allow vold proc:file write;" and
"allow vold self:capability { sys_boot };". As of system/vold
change adfba3626e76c1931649634275d241b226cd1b9a, vold no longer
performs it's own reboots, so these capabilities are no longer
needed.
2) Addition of the powerctl property, which vold contacts to
tell init to reboot.
3) Removal of "allow vold kernel:system module_request;". As of
CTS commit f2cfdf5c057140d9442fcfeb4e4a648e8258b659, Android
devices no longer ship with loadable modules, hence we don't
require this rule.
4) Removal of "fsetid" from "self:capability". Any setuid / setgid
bits SHOULD be cleared if vold is able to change the permissions
of files. IMHO, it was a mistake to ever include this capability in
the first place.
Testing: As much as possible, I've tested filesystem related
functionality, including factory reset and device encryption.
I wasn't able to test fstrim functionality, which is a fairly
new feature. I didn't see any policy denials in dmesg. It's quite
possible I've missed something. If we experience problems, I
happy to roll back this change.
Bug: 9629920
Change-Id: I683afa0dffe9f28952287bfdb7ee4e0423c2e97a
2013-06-29 05:15:37 +02:00
|
|
|
type powerctl_prop, property_type;
|
2014-09-26 00:13:41 +02:00
|
|
|
type nfc_prop, property_type;
|
2014-09-04 14:44:49 +02:00
|
|
|
type dalvik_prop, property_type;
|
|
|
|
type config_prop, property_type;
|
2015-12-02 01:58:27 +01:00
|
|
|
|
|
|
|
allow property_type tmpfs:filesystem associate;
|