Allow reading of properties area, which is now created before init has switched contexts. Revisit this later - we should explicitly label the properties file.
This commit is contained in:
parent
0d76f4e5c2
commit
6261d6d823
4 changed files with 14 additions and 1 deletions
4
adbd.te
4
adbd.te
|
@ -23,6 +23,10 @@ unix_socket_connect(adbd, vold, vold)
|
||||||
# Talk to init via the property socket.
|
# Talk to init via the property socket.
|
||||||
unix_socket_connect(adbd, property, init)
|
unix_socket_connect(adbd, property, init)
|
||||||
|
|
||||||
|
# Read properties.
|
||||||
|
allow adbd kernel:fd use;
|
||||||
|
allow adbd tmpfs:file read;
|
||||||
|
|
||||||
# Perform binder IPC to surfaceflinger (screencap)
|
# Perform binder IPC to surfaceflinger (screencap)
|
||||||
# XXX Run screencap in a separate domain?
|
# XXX Run screencap in a separate domain?
|
||||||
binder_use(adbd)
|
binder_use(adbd)
|
||||||
|
|
4
shell.te
4
shell.te
|
@ -13,6 +13,10 @@ allow shell shell_data_file:dir create_dir_perms;
|
||||||
allow shell shell_data_file:file create_file_perms;
|
allow shell shell_data_file:file create_file_perms;
|
||||||
allow shell shell_data_file:file rx_file_perms;
|
allow shell shell_data_file:file rx_file_perms;
|
||||||
|
|
||||||
|
# Read properties.
|
||||||
|
allow shell kernel:fd use;
|
||||||
|
allow shell tmpfs:file read;
|
||||||
|
|
||||||
r_dir_file(shell, apk_data_file)
|
r_dir_file(shell, apk_data_file)
|
||||||
allow shell dalvikcache_data_file:file write;
|
allow shell dalvikcache_data_file:file write;
|
||||||
|
|
||||||
|
|
|
@ -97,6 +97,9 @@ allow $1 $1_tmpfs:file { read execute execmod };
|
||||||
define(`init_daemon_domain', `
|
define(`init_daemon_domain', `
|
||||||
domain_auto_trans(init, $1_exec, $1)
|
domain_auto_trans(init, $1_exec, $1)
|
||||||
tmpfs_domain($1)
|
tmpfs_domain($1)
|
||||||
|
# Read properties.
|
||||||
|
allow $1 kernel:fd use;
|
||||||
|
allow $1 tmpfs:file read;
|
||||||
')
|
')
|
||||||
|
|
||||||
#####################################
|
#####################################
|
||||||
|
|
|
@ -6,7 +6,6 @@ allow ueventd rootfs:file r_file_perms;
|
||||||
allow ueventd rootfs:file entrypoint;
|
allow ueventd rootfs:file entrypoint;
|
||||||
allow ueventd init:process sigchld;
|
allow ueventd init:process sigchld;
|
||||||
allow ueventd self:capability { chown mknod net_admin setgid fsetid };
|
allow ueventd self:capability { chown mknod net_admin setgid fsetid };
|
||||||
allow ueventd kernel:fd use;
|
|
||||||
allow ueventd device:file create_file_perms;
|
allow ueventd device:file create_file_perms;
|
||||||
allow ueventd device:chr_file rw_file_perms;
|
allow ueventd device:chr_file rw_file_perms;
|
||||||
allow ueventd sysfs:file rw_file_perms;
|
allow ueventd sysfs:file rw_file_perms;
|
||||||
|
@ -17,3 +16,6 @@ allow ueventd dev_type:lnk_file { create unlink };
|
||||||
allow ueventd dev_type:chr_file { create setattr unlink };
|
allow ueventd dev_type:chr_file { create setattr unlink };
|
||||||
allow ueventd dev_type:blk_file { create setattr unlink };
|
allow ueventd dev_type:blk_file { create setattr unlink };
|
||||||
allow ueventd self:netlink_kobject_uevent_socket *;
|
allow ueventd self:netlink_kobject_uevent_socket *;
|
||||||
|
# Read properties.
|
||||||
|
allow ueventd kernel:fd use;
|
||||||
|
allow ueventd tmpfs:file read;
|
||||||
|
|
Loading…
Reference in a new issue