Skip to content
Snippets Groups Projects
Commit 05e22631 authored by Nick Kralevich's avatar Nick Kralevich Committed by Android Git Automerger
Browse files

am aeb3eb7c: resolved conflicts for merge of dfee702c to klp-modular-dev-plus-aosp

* commit 'aeb3eb7c':
  DO NOT MERGE: Address system_server denials.
parents fc00a2b8 aeb3eb7c
No related branches found
No related tags found
No related merge requests found
...@@ -67,6 +67,9 @@ allow system_server self:netlink_kobject_uevent_socket create_socket_perms; ...@@ -67,6 +67,9 @@ allow system_server self:netlink_kobject_uevent_socket create_socket_perms;
# Use generic netlink sockets. # Use generic netlink sockets.
allow system_server self:netlink_socket create_socket_perms; allow system_server self:netlink_socket create_socket_perms;
# Use generic netlink sockets.
allow system_server self:netlink_socket create_socket_perms;
# Kill apps. # Kill apps.
allow system_server appdomain:process { sigkill signal }; allow system_server appdomain:process { sigkill signal };
...@@ -138,6 +141,10 @@ r_dir_file(system_server, inputflinger) ...@@ -138,6 +141,10 @@ r_dir_file(system_server, inputflinger)
allow system_server mediaserver:tcp_socket rw_socket_perms; allow system_server mediaserver:tcp_socket rw_socket_perms;
allow system_server mediaserver:udp_socket rw_socket_perms; allow system_server mediaserver:udp_socket rw_socket_perms;
# Use sockets received over binder from various services.
allow system_server mediaserver:tcp_socket rw_socket_perms;
allow system_server mediaserver:udp_socket rw_socket_perms;
# Check SELinux permissions. # Check SELinux permissions.
selinux_check_access(system_server) selinux_check_access(system_server)
...@@ -241,6 +248,9 @@ allow system_server cache_backup_file:file { relabelto relabelfrom }; ...@@ -241,6 +248,9 @@ allow system_server cache_backup_file:file { relabelto relabelfrom };
# LocalTransport creates and relabels /cache/backup # LocalTransport creates and relabels /cache/backup
allow system_server cache_backup_file:dir { relabelto relabelfrom create_dir_perms }; allow system_server cache_backup_file:dir { relabelto relabelfrom create_dir_perms };
# Access SDcard files passed via binder or sockets.
allow system_server sdcard_type:file { read write getattr };
# Allow system to talk to usb device # Allow system to talk to usb device
allow system_server usb_device:chr_file rw_file_perms; allow system_server usb_device:chr_file rw_file_perms;
allow system_server usb_device:dir r_dir_perms; allow system_server usb_device:dir r_dir_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment