Skip to content
Snippets Groups Projects
Commit 5871d1bc authored by Robin Lee's avatar Robin Lee
Browse files

resolved conflicts for merge of 51bfecf4 to lmp-dev-plus-aosp

Change-Id: I8ea400354e33a01d3223b4efced6db76ba00aed6
parents ca582ac9 51bfecf4
Branches
Tags
No related merge requests found
...@@ -53,6 +53,12 @@ allow { appdomain -isolated_app } app_data_file:notdevfile_class_set create_file ...@@ -53,6 +53,12 @@ allow { appdomain -isolated_app } app_data_file:notdevfile_class_set create_file
allow appdomain system_data_file:dir r_dir_perms; allow appdomain system_data_file:dir r_dir_perms;
allow appdomain system_data_file:file { execute execute_no_trans open execmod }; allow appdomain system_data_file:file { execute execute_no_trans open execmod };
# Keychain and user-trusted credentials
allow appdomain keychain_data_file:dir r_dir_perms;
allow appdomain keychain_data_file:file r_file_perms;
allow appdomain misc_user_data_file:dir r_dir_perms;
allow appdomain misc_user_data_file:file r_file_perms;
# Access to OEM provided data and apps # Access to OEM provided data and apps
allow appdomain oemfs:dir r_dir_perms; allow appdomain oemfs:dir r_dir_perms;
allow appdomain oemfs:file rx_file_perms; allow appdomain oemfs:file rx_file_perms;
......
...@@ -80,9 +80,11 @@ type adb_keys_file, file_type, data_file_type; ...@@ -80,9 +80,11 @@ type adb_keys_file, file_type, data_file_type;
type audio_data_file, file_type, data_file_type; type audio_data_file, file_type, data_file_type;
type bluetooth_data_file, file_type, data_file_type; type bluetooth_data_file, file_type, data_file_type;
type camera_data_file, file_type, data_file_type; type camera_data_file, file_type, data_file_type;
type keychain_data_file, file_type, data_file_type;
type keystore_data_file, file_type, data_file_type; type keystore_data_file, file_type, data_file_type;
type media_data_file, file_type, data_file_type; type media_data_file, file_type, data_file_type;
type media_rw_data_file, file_type, data_file_type, mlstrustedobject; type media_rw_data_file, file_type, data_file_type, mlstrustedobject;
type misc_user_data_file, file_type, data_file_type;
type net_data_file, file_type, data_file_type; type net_data_file, file_type, data_file_type;
type nfc_data_file, file_type, data_file_type; type nfc_data_file, file_type, data_file_type;
type radio_data_file, file_type, data_file_type, mlstrustedobject; type radio_data_file, file_type, data_file_type, mlstrustedobject;
......
...@@ -206,12 +206,14 @@ ...@@ -206,12 +206,14 @@
/data/misc/bluedroid/\.a2dp_data u:object_r:bluetooth_socket:s0 /data/misc/bluedroid/\.a2dp_data u:object_r:bluetooth_socket:s0
/data/misc/camera(/.*)? u:object_r:camera_data_file:s0 /data/misc/camera(/.*)? u:object_r:camera_data_file:s0
/data/misc/dhcp(/.*)? u:object_r:dhcp_data_file:s0 /data/misc/dhcp(/.*)? u:object_r:dhcp_data_file:s0
/data/misc/keychain(/.*)? u:object_r:keychain_data_file:s0
/data/misc/keystore(/.*)? u:object_r:keystore_data_file:s0 /data/misc/keystore(/.*)? u:object_r:keystore_data_file:s0
/data/misc/media(/.*)? u:object_r:media_data_file:s0 /data/misc/media(/.*)? u:object_r:media_data_file:s0
/data/misc/net(/.*)? u:object_r:net_data_file:s0 /data/misc/net(/.*)? u:object_r:net_data_file:s0
/data/misc/shared_relro(/.*)? u:object_r:shared_relro_file:s0 /data/misc/shared_relro(/.*)? u:object_r:shared_relro_file:s0
/data/misc/sms(/.*)? u:object_r:radio_data_file:s0 /data/misc/sms(/.*)? u:object_r:radio_data_file:s0
/data/misc/systemkeys(/.*)? u:object_r:systemkeys_data_file:s0 /data/misc/systemkeys(/.*)? u:object_r:systemkeys_data_file:s0
/data/misc/user(/.*)? u:object_r:misc_user_data_file:s0
/data/misc/vpn(/.*)? u:object_r:vpn_data_file:s0 /data/misc/vpn(/.*)? u:object_r:vpn_data_file:s0
/data/misc/wifi(/.*)? u:object_r:wifi_data_file:s0 /data/misc/wifi(/.*)? u:object_r:wifi_data_file:s0
/data/misc/wifi/sockets(/.*)? u:object_r:wpa_socket:s0 /data/misc/wifi/sockets(/.*)? u:object_r:wpa_socket:s0
......
...@@ -37,6 +37,12 @@ allow installd media_rw_data_file:file { getattr unlink }; ...@@ -37,6 +37,12 @@ allow installd media_rw_data_file:file { getattr unlink };
allow installd system_data_file:dir relabelfrom; allow installd system_data_file:dir relabelfrom;
allow installd media_rw_data_file:dir relabelto; allow installd media_rw_data_file:dir relabelto;
# Upgrade /data/misc/keychain for multi-user if necessary.
allow installd misc_user_data_file:dir create_dir_perms;
allow installd misc_user_data_file:file create_file_perms;
allow installd keychain_data_file:dir create_dir_perms;
allow installd keychain_data_file:file {r_file_perms unlink};
# Create /data/.layout_version.* file # Create /data/.layout_version.* file
type_transition installd system_data_file:file install_data_file; type_transition installd system_data_file:file install_data_file;
allow installd install_data_file:file create_file_perms; allow installd install_data_file:file create_file_perms;
......
...@@ -12,10 +12,16 @@ binder_service(system_app) ...@@ -12,10 +12,16 @@ binder_service(system_app)
allow system_app system_app_data_file:dir create_dir_perms; allow system_app system_app_data_file:dir create_dir_perms;
allow system_app system_app_data_file:file create_file_perms; allow system_app system_app_data_file:file create_file_perms;
# Read /data/misc/keychain subdirectory.
allow system_app keychain_data_file:dir r_dir_perms;
allow system_app keychain_data_file:file r_file_perms;
# Read and write to other system-owned /data directories, such as # Read and write to other system-owned /data directories, such as
# /data/system/cache and /data/misc/keychain. # /data/system/cache and /data/misc/user.
allow system_app system_data_file:dir create_dir_perms; allow system_app system_data_file:dir create_dir_perms;
allow system_app system_data_file:file create_file_perms; allow system_app system_data_file:file create_file_perms;
allow system_app misc_user_data_file:dir create_dir_perms;
allow system_app misc_user_data_file:file create_file_perms;
# Audit writes to these directories and files so we can identify # Audit writes to these directories and files so we can identify
# and possibly move these directories into their own type in the future. # and possibly move these directories into their own type in the future.
auditallow system_app system_data_file:dir { create setattr add_name remove_name rmdir rename }; auditallow system_app system_data_file:dir { create setattr add_name remove_name rmdir rename };
......
...@@ -173,6 +173,8 @@ allow system_server tun_device:chr_file rw_file_perms; ...@@ -173,6 +173,8 @@ allow system_server tun_device:chr_file rw_file_perms;
# Manage system data files. # Manage system data files.
allow system_server system_data_file:dir create_dir_perms; allow system_server system_data_file:dir create_dir_perms;
allow system_server system_data_file:notdevfile_class_set create_file_perms; allow system_server system_data_file:notdevfile_class_set create_file_perms;
allow system_server keychain_data_file:dir create_dir_perms;
allow system_server keychain_data_file:file create_file_perms;
# Manage /data/app. # Manage /data/app.
allow system_server apk_data_file:dir create_dir_perms; allow system_server apk_data_file:dir create_dir_perms;
......
...@@ -21,6 +21,9 @@ allow zygote appdomain:process { getpgid setpgid }; ...@@ -21,6 +21,9 @@ allow zygote appdomain:process { getpgid setpgid };
# Read system data. # Read system data.
allow zygote system_data_file:dir r_dir_perms; allow zygote system_data_file:dir r_dir_perms;
allow zygote system_data_file:file r_file_perms; allow zygote system_data_file:file r_file_perms;
# Read system security data.
allow zygote keychain_data_file:dir r_dir_perms;
allow zygote keychain_data_file:file r_file_perms;
# Write to /data/dalvik-cache. # Write to /data/dalvik-cache.
allow zygote dalvikcache_data_file:dir create_dir_perms; allow zygote dalvikcache_data_file:dir create_dir_perms;
allow zygote dalvikcache_data_file:file create_file_perms; allow zygote dalvikcache_data_file:file create_file_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment