Merge "Add exFAT support; unify behind "sdcard_type"."
am: ba89007178
Change-Id: I82151185ff4d1f7509cbba53fd3c992e5e2d7b2d
This commit is contained in:
commit
ff0369ad4c
9 changed files with 19 additions and 18 deletions
|
@ -93,9 +93,7 @@ neverallow { all_untrusted_apps -mediaprovider } { cache_file cache_recovery_fil
|
|||
# application un-installation.
|
||||
neverallow { all_untrusted_apps -mediaprovider } {
|
||||
fs_type
|
||||
-fuse # sdcard
|
||||
-sdcardfs # sdcard
|
||||
-vfat
|
||||
-sdcard_type
|
||||
file_type
|
||||
-app_data_file # The apps sandbox itself
|
||||
-media_rw_data_file # Internal storage. Known that apps can
|
||||
|
|
|
@ -19,6 +19,7 @@
|
|||
crossprofileapps_service
|
||||
e2fs
|
||||
e2fs_exec
|
||||
exfat
|
||||
exported_bluetooth_prop
|
||||
exported_config_prop
|
||||
exported_dalvik_prop
|
||||
|
|
|
@ -15,6 +15,7 @@
|
|||
bpfloader_exec
|
||||
cgroup_bpf
|
||||
crossprofileapps_service
|
||||
exfat
|
||||
exported2_config_prop
|
||||
exported2_default_prop
|
||||
exported2_radio_prop
|
||||
|
|
|
@ -238,6 +238,7 @@ genfscon debugfs /tracing/events/lowmemorykiller/
|
|||
|
||||
genfscon inotifyfs / u:object_r:inotify:s0
|
||||
genfscon vfat / u:object_r:vfat:s0
|
||||
genfscon exfat / u:object_r:exfat:s0
|
||||
genfscon debugfs / u:object_r:debugfs:s0
|
||||
genfscon fuse / u:object_r:fuse:s0
|
||||
genfscon configfs / u:object_r:configfs:s0
|
||||
|
|
|
@ -34,8 +34,8 @@ allow platform_app cache_file:file create_file_perms;
|
|||
# Direct access to vold-mounted storage under /mnt/media_rw
|
||||
# This is a performance optimization that allows platform apps to bypass the FUSE layer
|
||||
allow platform_app mnt_media_rw_file:dir r_dir_perms;
|
||||
allow platform_app vfat:dir create_dir_perms;
|
||||
allow platform_app vfat:file create_file_perms;
|
||||
allow platform_app sdcard_type:dir create_dir_perms;
|
||||
allow platform_app sdcard_type:file create_file_perms;
|
||||
|
||||
# com.android.systemui
|
||||
allow platform_app rootfs:dir getattr;
|
||||
|
|
|
@ -250,19 +250,12 @@ allow { appdomain -isolated_app -ephemeral_app } mnt_user_file:dir r_dir_perms;
|
|||
allow { appdomain -isolated_app -ephemeral_app } mnt_user_file:lnk_file r_file_perms;
|
||||
|
||||
# Read/write visible storage
|
||||
allow { appdomain -isolated_app -ephemeral_app } fuse:dir create_dir_perms;
|
||||
allow { appdomain -isolated_app -ephemeral_app } fuse:file create_file_perms;
|
||||
allow { appdomain -isolated_app -ephemeral_app } sdcardfs:dir create_dir_perms;
|
||||
allow { appdomain -isolated_app -ephemeral_app } sdcardfs:file create_file_perms;
|
||||
allow { appdomain -isolated_app -ephemeral_app } sdcard_type:dir create_dir_perms;
|
||||
allow { appdomain -isolated_app -ephemeral_app } sdcard_type:file create_file_perms;
|
||||
# This should be removed if sdcardfs is modified to alter the secontext for its
|
||||
# accesses to the underlying FS.
|
||||
allow { appdomain -isolated_app -ephemeral_app } { media_rw_data_file vfat }:dir create_dir_perms;
|
||||
allow { appdomain -isolated_app -ephemeral_app } { media_rw_data_file vfat }:file create_file_perms;
|
||||
|
||||
# Access OBBs (vfat images) mounted by vold (b/17633509)
|
||||
# File write access allowed for FDs returned through Storage Access Framework
|
||||
allow { appdomain -isolated_app -ephemeral_app } vfat:dir r_dir_perms;
|
||||
allow { appdomain -isolated_app -ephemeral_app } vfat:file rw_file_perms;
|
||||
allow { appdomain -isolated_app -ephemeral_app } media_rw_data_file:dir create_dir_perms;
|
||||
allow { appdomain -isolated_app -ephemeral_app } media_rw_data_file:file create_file_perms;
|
||||
|
||||
# Allow apps to use the USB Accessory interface.
|
||||
# http://developer.android.com/guide/topics/connectivity/usb/accessory.html
|
||||
|
|
|
@ -108,6 +108,7 @@ type mqueue, fs_type;
|
|||
type fuse, sdcard_type, fs_type, mlstrustedobject;
|
||||
type sdcardfs, sdcard_type, fs_type, mlstrustedobject;
|
||||
type vfat, sdcard_type, fs_type, mlstrustedobject;
|
||||
type exfat, sdcard_type, fs_type, mlstrustedobject;
|
||||
type debugfs, fs_type, debugfs_type;
|
||||
type debugfs_mmc, fs_type, debugfs_type;
|
||||
type debugfs_trace_marker, fs_type, debugfs_type, mlstrustedobject;
|
||||
|
|
|
@ -49,7 +49,14 @@ neverallow hal_configstore_server {
|
|||
}:{ file fifo_file sock_file } *;
|
||||
|
||||
# Should never need sdcard access
|
||||
neverallow hal_configstore_server { fuse sdcardfs vfat }:file *;
|
||||
neverallow hal_configstore_server {
|
||||
sdcard_type
|
||||
fuse sdcardfs vfat exfat # manual expansion for completeness
|
||||
}:dir ~getattr;
|
||||
neverallow hal_configstore_server {
|
||||
sdcard_type
|
||||
fuse sdcardfs vfat exfat # manual expansion for completeness
|
||||
}:file *;
|
||||
|
||||
# Do not permit access to service_manager and vndservice_manager
|
||||
neverallow hal_configstore_server *:service_manager *;
|
||||
|
|
|
@ -21,7 +21,6 @@ allow hal_telephony_server efs_file:file create_file_perms;
|
|||
allow hal_telephony_server vendor_shell_exec:file rx_file_perms;
|
||||
allow hal_telephony_server bluetooth_efs_file:file r_file_perms;
|
||||
allow hal_telephony_server bluetooth_efs_file:dir r_dir_perms;
|
||||
allow hal_telephony_server sdcard_type:dir r_dir_perms;
|
||||
|
||||
# property service
|
||||
set_prop(hal_telephony_server, radio_prop)
|
||||
|
|
Loading…
Reference in a new issue