Updated policy for external storage.
An upcoming platform release is redesigning how external storage works. At a high level, vold is taking on a more active role in managing devices that dynamically appear. This change also creates further restricted domains for tools doing low-level access of external storage devices, including sgdisk and blkid. It also extends sdcardd to be launchable by vold, since launching by init will eventually go away. For compatibility, rules required to keep AOSP builds working are marked with "TODO" to eventually remove. Slightly relax system_server external storage rules to allow calls like statfs(). Still neverallow open file descriptors, since they can cause kernel to kill us. Here are the relevant violations that this CL is designed to allow: avc: denied { search } for name="user" dev="tmpfs" ino=7441 scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir avc: denied { getattr } for path="/mnt/user/0" dev="tmpfs" ino=6659 scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir avc: denied { write } for name="user" dev="tmpfs" ino=6658 scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir avc: denied { add_name } for name="10" scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir avc: denied { create } for name="10" scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir avc: denied { setattr } for name="10" dev="tmpfs" ino=11348 scontext=u:r:zygote:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir avc: denied { search } for name="/" dev="tmpfs" ino=3131 scontext=u:r:zygote:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { getattr } for path="/storage" dev="tmpfs" ino=6661 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { getattr } for path="/storage/self" dev="tmpfs" ino=6659 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_user_file:s0 tclass=dir avc: denied { getattr } for path="/storage" dev="tmpfs" ino=6661 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { getattr } for path="/storage/self" dev="tmpfs" ino=11348 scontext=u:r:untrusted_app:s0:c522,c768 tcontext=u:object_r:mnt_user_file:s0 tclass=dir avc: denied { getattr } for path="/storage" dev="tmpfs" ino=6661 scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { read } for name="/" dev="tmpfs" ino=6661 scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { open } for name="/" dev="tmpfs" ino=6661 scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { search } for name="/" dev="tmpfs" ino=6661 scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { write } for name="data" dev="tmpfs" ino=11979 scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { add_name } for name="com.google.android.music" scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { create } for name="com.google.android.music" scontext=u:r:vold:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { use } for path="socket:[8297]" dev="sockfs" ino=8297 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=fd avc: denied { read write } for path="socket:[8297]" dev="sockfs" ino=8297 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=netlink_kobject_uevent_socket avc: denied { read } for path="pipe:[8298]" dev="pipefs" ino=8298 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=fifo_file avc: denied { write } for path="pipe:[8298]" dev="pipefs" ino=8298 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=fifo_file avc: denied { mounton } for path="/storage/emulated" dev="tmpfs" ino=8913 scontext=u:r:sdcardd:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { getattr } for path="/storage" dev="tmpfs" ino=7444 scontext=u:r:system_server:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { getattr } for path="/storage/self/primary" dev="tmpfs" ino=7447 scontext=u:r:system_server:s0 tcontext=u:object_r:storage_file:s0 tclass=lnk_file avc: denied { read } for name="primary" dev="tmpfs" ino=7447 scontext=u:r:system_server:s0 tcontext=u:object_r:storage_file:s0 tclass=lnk_file avc: denied { getattr } for path="/mnt/user" dev="tmpfs" ino=7441 scontext=u:r:system_server:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir avc: denied { read } for name="disk:179,128" dev="tmpfs" ino=3224 scontext=u:r:sgdisk:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file avc: denied { open } for path="/dev/block/vold/disk:179,128" dev="tmpfs" ino=3224 scontext=u:r:sgdisk:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file avc: denied { getattr } for path="/dev/block/vold/disk:179,128" dev="tmpfs" ino=3224 scontext=u:r:sgdisk:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file avc: denied { read } for name="/" dev="fuse" ino=0 scontext=u:r:vold:s0 tcontext=u:object_r:fuse:s0 tclass=dir avc: denied { open } for path="/storage/public:81F3-13EC" dev="fuse" ino=0 scontext=u:r:vold:s0 tcontext=u:object_r:fuse:s0 tclass=dir avc: denied { write } for name="data" dev="fuse" ino=2 scontext=u:r:vold:s0 tcontext=u:object_r:fuse:s0 tclass=dir avc: denied { add_name } for name="com.google.android.googlequicksearchbox" scontext=u:r:vold:s0 tcontext=u:object_r:fuse:s0 tclass=dir avc: denied { create } for name="com.google.android.googlequicksearchbox" scontext=u:r:vold:s0 tcontext=u:object_r:fuse:s0 tclass=dir avc: denied { getattr } for path="/dev/block/vold/public:179,129" dev="tmpfs" ino=16953 scontext=u:r:blkid:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file avc: denied { read } for name="public:179,129" dev="tmpfs" ino=16953 scontext=u:r:blkid:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file avc: denied { open } for path="/dev/block/vold/public:179,129" dev="tmpfs" ino=16953 scontext=u:r:blkid:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file avc: denied { ioctl } for path="/dev/block/vold/public:179,129" dev="tmpfs" ino=16953 scontext=u:r:blkid:s0 tcontext=u:object_r:vold_device:s0 tclass=blk_file avc: denied { use } for path="pipe:[3264]" dev="pipefs" ino=3264 scontext=u:r:sgdisk:s0 tcontext=u:r:vold:s0 tclass=fd avc: denied { use } for path="pipe:[3264]" dev="pipefs" ino=3264 scontext=u:r:sgdisk:s0 tcontext=u:r:vold:s0 tclass=fd avc: denied { search } for name="block" dev="tmpfs" ino=2494 scontext=u:r:sgdisk:s0 tcontext=u:object_r:block_device:s0 tclass=dir avc: denied { use } for path="pipe:[4200]" dev="pipefs" ino=4200 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=fd avc: denied { use } for path="pipe:[4200]" dev="pipefs" ino=4200 scontext=u:r:sdcardd:s0 tcontext=u:r:vold:s0 tclass=fd avc: denied { search } for name="/" dev="tmpfs" ino=3131 scontext=u:r:sdcardd:s0 tcontext=u:object_r:storage_file:s0 tclass=dir avc: denied { search } for name="media_rw" dev="tmpfs" ino=3127 scontext=u:r:sdcardd:s0 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir avc: denied { getattr } for path="pipe:[3648]" dev="pipefs" ino=3648 scontext=u:r:blkid:s0 tcontext=u:r:vold:s0 tclass=fifo_file avc: denied { use } for path="/dev/pts/12" dev="devpts" ino=15 scontext=u:r:fsck:s0 tcontext=u:r:vold:s0 tclass=fd avc: denied { use } for path="/dev/pts/12" dev="devpts" ino=15 scontext=u:r:fsck:s0 tcontext=u:r:vold:s0 tclass=fd avc: denied { use } for path="pipe:[4182]" dev="pipefs" ino=4182 scontext=u:r:fsck:s0 tcontext=u:r:vold:s0 tclass=fd Change-Id: Idf3b8561baecf7faa603fac5ababdcc5708288e1
This commit is contained in:
parent
ec4008ecb8
commit
f063f461a9
10 changed files with 131 additions and 23 deletions
9
app.te
9
app.te
|
@ -124,7 +124,14 @@ allow appdomain media_rw_data_file:file { read getattr };
|
|||
# Read and write /data/data/com.android.providers.telephony files passed over Binder.
|
||||
allow appdomain radio_data_file:file { read write getattr };
|
||||
|
||||
# Access SDcard via the fuse mount.
|
||||
# See visible storage
|
||||
allow appdomain storage_file:dir r_dir_perms;
|
||||
allow appdomain storage_file:file r_file_perms;
|
||||
allow appdomain mnt_user_file:dir r_dir_perms;
|
||||
# Follow the /storage/self/primary symlink
|
||||
allow appdomain mnt_user_file:lnk_file r_file_perms;
|
||||
|
||||
# Read/write visible storage
|
||||
allow appdomain fuse:dir create_dir_perms;
|
||||
allow appdomain fuse:file create_file_perms;
|
||||
|
||||
|
|
16
blkid.te
Normal file
16
blkid.te
Normal file
|
@ -0,0 +1,16 @@
|
|||
# blkid called from vold
|
||||
type blkid, domain;
|
||||
type blkid_exec, exec_type, file_type;
|
||||
|
||||
# Allowed read-only access to vold block devices to extract UUID/label
|
||||
allow blkid block_device:dir search;
|
||||
allow blkid vold_device:blk_file r_file_perms;
|
||||
|
||||
# Allow stdin/out back to vold
|
||||
allow blkid vold:fd use;
|
||||
allow blkid vold:fifo_file { read write getattr };
|
||||
|
||||
# Only allow entry from vold
|
||||
neverallow { domain -vold } blkid:process transition;
|
||||
neverallow domain blkid:process dyntransition;
|
||||
neverallow blkid { file_type fs_type -blkid_exec }:file entrypoint;
|
9
file.te
9
file.te
|
@ -83,6 +83,15 @@ type property_data_file, file_type, data_file_type;
|
|||
# /data/bootchart
|
||||
type bootchart_data_file, file_type, data_file_type;
|
||||
|
||||
# Mount locations managed by vold
|
||||
type mnt_media_rw_file, file_type;
|
||||
type mnt_user_file, file_type;
|
||||
type storage_file, file_type;
|
||||
|
||||
# Label for storage dirs which are just mount stubs
|
||||
type mnt_media_rw_stub_file, file_type;
|
||||
type storage_stub_file, file_type;
|
||||
|
||||
# /data/misc subdirectories
|
||||
type adb_keys_file, file_type, data_file_type;
|
||||
type audio_data_file, file_type, data_file_type;
|
||||
|
|
|
@ -42,7 +42,7 @@
|
|||
/dev/block(/.*)? u:object_r:block_device:s0
|
||||
/dev/block/dm-[0-9]+ u:object_r:dm_device:s0
|
||||
/dev/block/loop[0-9]* u:object_r:loop_device:s0
|
||||
/dev/block/vold/[0-9]+:[0-9]+ u:object_r:vold_device:s0
|
||||
/dev/block/vold/.+ u:object_r:vold_device:s0
|
||||
/dev/block/ram[0-9]* u:object_r:ram_device:s0
|
||||
/dev/bus/usb(.*)? u:object_r:usb_device:s0
|
||||
/dev/cam u:object_r:camera_device:s0
|
||||
|
@ -127,6 +127,7 @@
|
|||
/system(/.*)? u:object_r:system_file:s0
|
||||
/system/bin/e2fsck -- u:object_r:fsck_exec:s0
|
||||
/system/bin/fsck\.f2fs -- u:object_r:fsck_exec:s0
|
||||
/system/bin/fsck_msdos -- u:object_r:fsck_exec:s0
|
||||
/system/bin/toolbox -- u:object_r:toolbox_exec:s0
|
||||
/system/bin/toybox -- u:object_r:toolbox_exec:s0
|
||||
/system/bin/logcat -- u:object_r:logcat_exec:s0
|
||||
|
@ -171,6 +172,8 @@
|
|||
/system/bin/dex2oat u:object_r:dex2oat_exec:s0
|
||||
# patchoat executable has (essentially) the same requirements as dex2oat.
|
||||
/system/bin/patchoat u:object_r:dex2oat_exec:s0
|
||||
/system/bin/sgdisk u:object_r:sgdisk_exec:s0
|
||||
/system/bin/blkid u:object_r:blkid_exec:s0
|
||||
|
||||
#############################
|
||||
# Vendor files
|
||||
|
@ -270,3 +273,9 @@
|
|||
/mnt/asec/[^/]+/[^/]+\.zip u:object_r:asec_public_file:s0
|
||||
/mnt/asec/[^/]+/lib(/.*)? u:object_r:asec_public_file:s0
|
||||
/data/app-asec(/.*)? u:object_r:asec_image_file:s0
|
||||
|
||||
#############################
|
||||
# external storage
|
||||
/mnt/media_rw(/.*)? u:object_r:mnt_media_rw_file:s0
|
||||
/mnt/user(/.*)? u:object_r:mnt_user_file:s0
|
||||
/storage(/.*)? u:object_r:storage_file:s0
|
||||
|
|
15
fsck.te
15
fsck.te
|
@ -1,4 +1,4 @@
|
|||
# e2fsck or any other fsck program run by init.
|
||||
# Any fsck program run by init or vold
|
||||
type fsck, domain;
|
||||
type fsck_exec, exec_type, file_type;
|
||||
|
||||
|
@ -11,10 +11,15 @@ allow fsck tmpfs:chr_file { read write ioctl };
|
|||
# Inherit and use pty created by android_fork_execvp_ext().
|
||||
allow fsck devpts:chr_file { read write ioctl getattr };
|
||||
|
||||
# Run e2fsck on block devices.
|
||||
# Run fsck on certain block devices
|
||||
allow fsck block_device:dir search;
|
||||
allow fsck userdata_block_device:blk_file rw_file_perms;
|
||||
allow fsck cache_block_device:blk_file rw_file_perms;
|
||||
allow fsck vold_device:blk_file rw_file_perms;
|
||||
|
||||
# Allow stdin/out back to vold
|
||||
allow fsck vold:fd use;
|
||||
allow fsck vold:fifo_file { read write getattr };
|
||||
|
||||
###
|
||||
### neverallow rules
|
||||
|
@ -31,7 +36,7 @@ neverallow fsck {
|
|||
system_block_device
|
||||
}:blk_file no_rw_file_perms;
|
||||
|
||||
# Only allow entry from init via the e2fsck binary.
|
||||
neverallow { domain -init } fsck:process transition;
|
||||
# Only allow entry from init or vold via fsck binaries
|
||||
neverallow { domain -init -vold } fsck:process transition;
|
||||
neverallow domain fsck:process dyntransition;
|
||||
neverallow fsck { file_type fs_type -fsck_exec}:file entrypoint;
|
||||
neverallow fsck { file_type fs_type -fsck_exec }:file entrypoint;
|
||||
|
|
11
sdcardd.te
11
sdcardd.te
|
@ -1,11 +1,14 @@
|
|||
type sdcardd, domain;
|
||||
type sdcardd_exec, exec_type, file_type;
|
||||
|
||||
init_daemon_domain(sdcardd)
|
||||
init_daemon_domain(sdcardd) # TODO: deprecated in M
|
||||
|
||||
allow sdcardd cgroup:dir create_dir_perms;
|
||||
allow sdcardd fuse_device:chr_file rw_file_perms;
|
||||
allow sdcardd rootfs:dir mounton;
|
||||
allow sdcardd rootfs:dir mounton; # TODO: deprecated in M
|
||||
allow sdcardd mnt_media_rw_file:dir r_dir_perms;
|
||||
allow sdcardd storage_file:dir search;
|
||||
allow sdcardd storage_stub_file:dir { search mounton };
|
||||
allow sdcardd sdcard_type:filesystem { mount unmount };
|
||||
allow sdcardd self:capability { setuid setgid dac_override sys_admin sys_resource };
|
||||
|
||||
|
@ -21,3 +24,7 @@ allow sdcardd system_data_file:file r_file_perms;
|
|||
|
||||
# Read /data/.layout_version
|
||||
allow sdcardd install_data_file:file r_file_perms;
|
||||
|
||||
# Allow stdin/out back to vold
|
||||
allow sdcardd vold:fd use;
|
||||
allow sdcardd vold:fifo_file { read write getattr };
|
||||
|
|
16
sgdisk.te
Normal file
16
sgdisk.te
Normal file
|
@ -0,0 +1,16 @@
|
|||
# sgdisk called from vold
|
||||
type sgdisk, domain;
|
||||
type sgdisk_exec, exec_type, file_type;
|
||||
|
||||
# Allowed to read/write low-level partition tables
|
||||
allow sgdisk block_device:dir search;
|
||||
allow sgdisk vold_device:blk_file rw_file_perms;
|
||||
|
||||
# Allow stdin/out back to vold
|
||||
allow sgdisk vold:fd use;
|
||||
allow sgdisk vold:fifo_file { read write getattr };
|
||||
|
||||
# Only allow entry from vold
|
||||
neverallow { domain -vold } sgdisk:process transition;
|
||||
neverallow domain sgdisk:process dyntransition;
|
||||
neverallow sgdisk { file_type fs_type -sgdisk_exec }:file entrypoint;
|
|
@ -468,13 +468,22 @@ allow system_server cgroup:dir { remove_name rmdir };
|
|||
# /oem access
|
||||
r_dir_file(system_server, oemfs)
|
||||
|
||||
# Allow resolving per-user storage symlinks
|
||||
allow system_server { mnt_user_file storage_file }:dir { getattr search };
|
||||
allow system_server { mnt_user_file storage_file }:lnk_file { getattr read };
|
||||
|
||||
# Allow statfs() on storage devices, which happens fast enough that
|
||||
# we shouldn't be killed during unsafe removal
|
||||
allow system_server sdcard_type:dir { getattr search };
|
||||
|
||||
###
|
||||
### Neverallow rules
|
||||
###
|
||||
### system_server should NEVER do any of this
|
||||
|
||||
# Do not allow accessing SDcard files as unsafe ejection could
|
||||
# cause the kernel to kill the system_server.
|
||||
# Do not allow opening files from external storage as unsafe ejection
|
||||
# could cause the kernel to kill the system_server.
|
||||
neverallow system_server sdcard_type:dir { open read write };
|
||||
neverallow system_server sdcard_type:file rw_file_perms;
|
||||
|
||||
# system server should never be opening zygote spawned app data
|
||||
|
|
36
vold.te
36
vold.te
|
@ -4,6 +4,12 @@ type vold_exec, exec_type, file_type;
|
|||
|
||||
init_daemon_domain(vold)
|
||||
|
||||
# Switch to more restrictive domains when executing common tools
|
||||
domain_auto_trans(vold, sgdisk_exec, sgdisk);
|
||||
domain_auto_trans(vold, blkid_exec, blkid);
|
||||
domain_auto_trans(vold, sdcardd_exec, sdcardd);
|
||||
domain_auto_trans(vold, fsck_exec, fsck);
|
||||
|
||||
typeattribute vold mlstrustedsubject;
|
||||
allow vold self:process setfscreate;
|
||||
allow vold system_file:file x_file_perms;
|
||||
|
@ -13,10 +19,28 @@ auditallow vold block_device:blk_file create_file_perms;
|
|||
allow vold device:dir write;
|
||||
allow vold devpts:chr_file rw_file_perms;
|
||||
allow vold rootfs:dir mounton;
|
||||
allow vold sdcard_type:dir mounton;
|
||||
allow vold sdcard_type:filesystem { mount remount unmount };
|
||||
allow vold sdcard_type:dir create_dir_perms;
|
||||
allow vold sdcard_type:file create_file_perms;
|
||||
allow vold sdcard_type:dir mounton; # TODO: deprecated in M
|
||||
allow vold sdcard_type:filesystem { mount remount unmount }; # TODO: deprecated in M
|
||||
allow vold sdcard_type:dir create_dir_perms; # TODO: deprecated in M
|
||||
allow vold sdcard_type:file create_file_perms; # TODO: deprecated in M
|
||||
|
||||
# Manage locations where storage is mounted
|
||||
allow vold { mnt_media_rw_file storage_file sdcard_type }:dir create_dir_perms;
|
||||
allow vold { mnt_media_rw_file storage_file sdcard_type }:file create_file_perms;
|
||||
|
||||
# Newly created storage dirs are always treated as mount stubs to prevent us
|
||||
# from accidentally writing when the mount point isn't present.
|
||||
type_transition vold storage_file:dir storage_stub_file;
|
||||
type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
||||
|
||||
# Allow mounting of storage devices
|
||||
allow vold { mnt_media_rw_stub_file storage_stub_file }:dir { mounton create rmdir getattr setattr };
|
||||
allow vold sdcard_type:filesystem { mount unmount remount };
|
||||
|
||||
# Manage per-user primary symlinks
|
||||
allow vold mnt_user_file:dir create_dir_perms;
|
||||
allow vold mnt_user_file:lnk_file create_file_perms;
|
||||
|
||||
allow vold tmpfs:filesystem { mount unmount };
|
||||
allow vold tmpfs:dir create_dir_perms;
|
||||
allow vold tmpfs:dir mounton;
|
||||
|
@ -34,7 +58,7 @@ allow vold domain:{ file lnk_file } r_file_perms;
|
|||
allow vold domain:process { signal sigkill };
|
||||
allow vold self:capability { sys_ptrace kill };
|
||||
|
||||
# For blkid
|
||||
# For blkid and sgdisk
|
||||
allow vold shell_exec:file rx_file_perms;
|
||||
|
||||
# XXX Label sysfs files with a specific type?
|
||||
|
@ -78,7 +102,7 @@ allow vold ctl_fuse_prop:property_service set;
|
|||
allow vold asec_image_file:file create_file_perms;
|
||||
allow vold asec_image_file:dir rw_dir_perms;
|
||||
security_access_policy(vold)
|
||||
allow vold asec_apk_file:dir { rw_dir_perms setattr relabelfrom relabelto };
|
||||
allow vold asec_apk_file:dir { create_dir_perms mounton relabelfrom relabelto };
|
||||
allow vold asec_public_file:dir { relabelto setattr };
|
||||
allow vold asec_apk_file:file { r_file_perms setattr relabelfrom relabelto };
|
||||
allow vold asec_public_file:file { relabelto setattr };
|
||||
|
|
18
zygote.te
18
zygote.te
|
@ -48,13 +48,19 @@ security_access_policy(zygote)
|
|||
# /proc/cpuinfo with /system/lib/<ISA>/cpuinfo using a bind mount
|
||||
allow zygote proc_cpuinfo:file mounton;
|
||||
|
||||
# Setting up /storage/emulated.
|
||||
# Allow remounting rootfs as MS_SLAVE
|
||||
allow zygote rootfs:dir mounton;
|
||||
allow zygote sdcard_type:dir { write search setattr create add_name mounton };
|
||||
dontaudit zygote self:capability fsetid;
|
||||
allow zygote tmpfs:dir { write create add_name setattr mounton search };
|
||||
allow zygote tmpfs:filesystem mount;
|
||||
allow zygote labeledfs:filesystem remount;
|
||||
allow zygote sdcard_type:dir { write search setattr create add_name mounton }; # TODO: deprecated in M
|
||||
dontaudit zygote self:capability fsetid; # TODO: deprecated in M
|
||||
allow zygote tmpfs:dir { write create add_name setattr mounton search }; # TODO: deprecated in M
|
||||
allow zygote tmpfs:filesystem mount; # TODO: deprecated in M
|
||||
allow zygote labeledfs:filesystem remount; # TODO: deprecated in M
|
||||
|
||||
# Allowed to create user-specific storage source if started before vold
|
||||
allow zygote mnt_user_file:dir create_dir_perms;
|
||||
allow zygote mnt_user_file:lnk_file create_file_perms;
|
||||
# Allowed to mount user-specific storage into place
|
||||
allow zygote storage_file:dir { search mounton };
|
||||
|
||||
# Handle --invoke-with command when launching Zygote with a wrapper command.
|
||||
allow zygote zygote_exec:file rx_file_perms;
|
||||
|
|
Loading…
Reference in a new issue