Skip to content
Snippets Groups Projects
Commit 6f108fd8 authored by Nick Kralevich's avatar Nick Kralevich Committed by Android (Google) Code Review
Browse files

Merge "Fix lock logspam and remove domain_deprecated rule" into oc-dev

parents c0e6cb58 4a580cca
No related branches found
No related tags found
No related merge requests found
...@@ -13,6 +13,9 @@ allow dex2oat dalvikcache_data_file:file write; ...@@ -13,6 +13,9 @@ allow dex2oat dalvikcache_data_file:file write;
allow dex2oat dalvikcache_data_file:lnk_file read; allow dex2oat dalvikcache_data_file:lnk_file read;
allow dex2oat installd:fd use; allow dex2oat installd:fd use;
# Acquire advisory lock on /system/framework/arm/*
allow dex2oat system_file:file lock;
# Read already open asec_apk_file file descriptors passed by installd. # Read already open asec_apk_file file descriptors passed by installd.
# Also allow reading unlabeled files, to allow for upgrading forward # Also allow reading unlabeled files, to allow for upgrading forward
# locked APKs. # locked APKs.
......
...@@ -71,7 +71,6 @@ auditallow { ...@@ -71,7 +71,6 @@ auditallow {
# System file accesses. # System file accesses.
allow domain_deprecated system_file:dir r_dir_perms; allow domain_deprecated system_file:dir r_dir_perms;
allow domain_deprecated system_file:file r_file_perms;
userdebug_or_eng(` userdebug_or_eng(`
auditallow { auditallow {
domain_deprecated domain_deprecated
...@@ -86,14 +85,6 @@ auditallow { ...@@ -86,14 +85,6 @@ auditallow {
-vold -vold
-zygote -zygote
} system_file:dir { open read ioctl lock }; # search getattr in domain } system_file:dir { open read ioctl lock }; # search getattr in domain
auditallow {
domain_deprecated
-appdomain
-rild
-surfaceflinger
-system_server
-zygote
} system_file:file { ioctl lock }; # read open getattr in domain
') ')
# Read files already opened under /data. # Read files already opened under /data.
......
...@@ -29,6 +29,9 @@ allow netd shell_exec:file rx_file_perms; ...@@ -29,6 +29,9 @@ allow netd shell_exec:file rx_file_perms;
allow netd system_file:file x_file_perms; allow netd system_file:file x_file_perms;
allow netd devpts:chr_file rw_file_perms; allow netd devpts:chr_file rw_file_perms;
# Acquire advisory lock on /system/etc/xtables.lock
allow netd system_file:file lock;
r_dir_file(netd, proc_net) r_dir_file(netd, proc_net)
# For /proc/sys/net/ipv[46]/route/flush. # For /proc/sys/net/ipv[46]/route/flush.
allow netd proc_net:file rw_file_perms; allow netd proc_net:file rw_file_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment