76aab82cb3
This attribute is being actively removed from policy. Since attributes are not being versioned, partners must not be able to access and use this attribute. Move it from private and verify in the logs that rild and tee are not using these permissions. Bug: 38316109 Test: build and boot Marlin Test: Verify that rild and tee are not being granted any of these permissions. Change-Id: I31beeb5bdf3885195310b086c1af3432dc6a349b
41 lines
1.5 KiB
Text
41 lines
1.5 KiB
Text
# Domain for update_engine daemon.
|
|
type update_engine, domain, update_engine_common;
|
|
type update_engine_exec, exec_type, file_type;
|
|
|
|
net_domain(update_engine);
|
|
|
|
# Read/[write] to /proc/net/xt_qtaguid/ctrl and /dev/xt_qtaguid to tag network
|
|
# sockets.
|
|
allow update_engine qtaguid_proc:file rw_file_perms;
|
|
allow update_engine qtaguid_device:chr_file r_file_perms;
|
|
|
|
# Following permissions are needed for update_engine.
|
|
allow update_engine self:process { setsched };
|
|
allow update_engine self:capability { fowner sys_admin };
|
|
allow update_engine kmsg_device:chr_file w_file_perms;
|
|
allow update_engine update_engine_exec:file rx_file_perms;
|
|
wakelock_use(update_engine);
|
|
|
|
# Ignore these denials.
|
|
dontaudit update_engine kernel:process setsched;
|
|
|
|
# Allow using persistent storage in /data/misc/update_engine.
|
|
allow update_engine update_engine_data_file:dir { create_dir_perms };
|
|
allow update_engine update_engine_data_file:file { create_file_perms };
|
|
|
|
# Don't allow kernel module loading, just silence the logs.
|
|
dontaudit update_engine kernel:system module_request;
|
|
|
|
# Register the service to perform Binder IPC.
|
|
binder_use(update_engine)
|
|
add_service(update_engine, update_engine_service)
|
|
|
|
# Allow update_engine to call the callback function provided by priv_app.
|
|
binder_call(update_engine, priv_app)
|
|
|
|
# Read OTA zip file at /data/ota_package/.
|
|
allow update_engine ota_package_file:file r_file_perms;
|
|
allow update_engine ota_package_file:dir r_dir_perms;
|
|
|
|
# Use Boot Control HAL
|
|
hal_client_domain(update_engine, hal_bootctl)
|