diff --git a/private/bug_map b/private/bug_map index 73cd3b4ca39cb6ba2713f0d9d317c77b7c180cc4..8d646c5d9c7ab1d7106cc158f6ef21628e15c301 100644 --- a/private/bug_map +++ b/private/bug_map @@ -1,6 +1,4 @@ platform_app nfc_data_file dir 74331887 -priv_app sysfs dir 72749888 -priv_app sysfs_android_usb file 72749888 priv_app system_data_file dir 72811052 system_server crash_dump process 73128755 untrusted_app_25 system_data_file dir 72550646 diff --git a/private/priv_app.te b/private/priv_app.te index b13e3f6b7b42ee60f793815739e92d6e45024a70..709bc7bdbae662487dff61818a0f431c324df3f9 100644 --- a/private/priv_app.te +++ b/private/priv_app.te @@ -137,13 +137,15 @@ unix_socket_connect(priv_app, traced_producer, traced) # suppress denials for non-API accesses. dontaudit priv_app exec_type:file getattr; dontaudit priv_app device:dir read; +dontaudit priv_app net_dns_prop:file read; dontaudit priv_app proc:file read; dontaudit priv_app proc_interrupts:file read; dontaudit priv_app proc_modules:file read; dontaudit priv_app proc_stat:file read; dontaudit priv_app proc_version:file read; +dontaudit priv_app sysfs:dir read; +dontaudit priv_app sysfs_android_usb:file read; dontaudit priv_app wifi_prop:file read; -dontaudit priv_app net_dns_prop:file read; # allow privileged apps to use UDP sockets provided by the system server but not # modify them other than to connect