Grant kernel access to new "virtual_disk" file.
This is a special file that can be mounted as a loopback device to exercise adoptable storage code on devices that don't have valid physical media. For example, they may only support storage media through a USB OTG port that is being used for an adb connection. avc: denied { read } for path="/data/misc/vold/virtual_disk" dev="sda35" ino=508695 scontext=u:r:kernel:s0 tcontext=u:object_r:vold_data_file:s0 tclass=file permissive=0 Bug: 34903607 Change-Id: I84721ec0e9495189a7d850461875df1839826212
This commit is contained in:
parent
2224f30a24
commit
3f724c95a8
2 changed files with 5 additions and 2 deletions
|
@ -73,6 +73,9 @@ userdebug_or_eng(`
|
|||
allow kernel media_rw_data_file:dir create_dir_perms;
|
||||
allow kernel media_rw_data_file:file create_file_perms;
|
||||
|
||||
# Access to /data/misc/vold/virtual_disk.
|
||||
allow kernel vold_data_file:file read;
|
||||
|
||||
###
|
||||
### neverallow rules
|
||||
###
|
||||
|
|
|
@ -175,9 +175,9 @@ allow vold user_profile_data_file:dir create_dir_perms;
|
|||
allow vold misc_block_device:blk_file w_file_perms;
|
||||
|
||||
neverallow { domain -vold } vold_data_file:dir ~{ open create read getattr setattr search relabelto ioctl };
|
||||
neverallow { domain -vold } vold_data_file:notdevfile_class_set ~{ relabelto getattr };
|
||||
neverallow { domain -vold -kernel } vold_data_file:notdevfile_class_set ~{ relabelto getattr };
|
||||
neverallow { domain -vold -init } vold_data_file:dir *;
|
||||
neverallow { domain -vold -init } vold_data_file:notdevfile_class_set *;
|
||||
neverallow { domain -vold -init -kernel } vold_data_file:notdevfile_class_set *;
|
||||
neverallow { domain -vold -init } restorecon_prop:property_service set;
|
||||
|
||||
neverallow vold fsck_exec:file execute_no_trans;
|
||||
|
|
Loading…
Reference in a new issue