diff --git a/private/compat/26.0/26.0.ignore.cil b/private/compat/26.0/26.0.ignore.cil index 7e04f0765cef7a9755366529a3124ef011a9de27..96b3b078dc0bbb0d4fd10c10491e2c0060bfed3f 100644 --- a/private/compat/26.0/26.0.ignore.cil +++ b/private/compat/26.0/26.0.ignore.cil @@ -111,6 +111,7 @@ storaged_data_file sysfs_fs_ext4_features system_boot_reason_prop + system_lmk_prop system_net_netd_hwservice system_update_service test_boot_reason_prop diff --git a/private/compat/27.0/27.0.ignore.cil b/private/compat/27.0/27.0.ignore.cil index 6e4147e5dbb8723c8b6de0401b54b9785e58d198..2772cd729e3939f16e151d9dcc7ccaeab1903de2 100644 --- a/private/compat/27.0/27.0.ignore.cil +++ b/private/compat/27.0/27.0.ignore.cil @@ -97,6 +97,7 @@ statsdw_socket storaged_data_file system_boot_reason_prop + system_lmk_prop system_update_service test_boot_reason_prop time_prop diff --git a/private/compat/28.0/28.0.ignore.cil b/private/compat/28.0/28.0.ignore.cil index a8f6feca251ff538cb94c736e1463551d6bc9422..91ef8df4a7f373950d1ed46100fed15070b07431 100644 --- a/private/compat/28.0/28.0.ignore.cil +++ b/private/compat/28.0/28.0.ignore.cil @@ -11,6 +11,7 @@ llkd_tmpfs mnt_product_file overlayfs_file + system_lmk_prop time_prop timedetector_service timezonedetector_service diff --git a/private/property_contexts b/private/property_contexts index 37d442754b471884242d5c4dbc78f1b2ffa1813b..2726d84a6005d5abd021549eefb05e8872a4765e 100644 --- a/private/property_contexts +++ b/private/property_contexts @@ -73,6 +73,7 @@ sys.boot.reason u:object_r:system_boot_reason_prop:s0 sys.boot.reason.last u:object_r:last_boot_reason_prop:s0 pm. u:object_r:pm_prop:s0 test.sys.boot.reason u:object_r:test_boot_reason_prop:s0 +sys.lmk. u:object_r:system_lmk_prop:s0 # Boolean property set by system server upon boot indicating # if device owner is provisioned. diff --git a/public/lmkd.te b/public/lmkd.te index 472946ece09291baa6b87e8afc086308a5e97e18..a82e0a06834d990c12f526bb179e9d1ddf5a07b7 100644 --- a/public/lmkd.te +++ b/public/lmkd.te @@ -35,6 +35,9 @@ allow lmkd self:global_capability_class_set sys_nice; allow lmkd proc_zoneinfo:file r_file_perms; +# Set sys.lmk.* properties. +set_prop(lmkd, system_lmk_prop) + # live lock watchdog process allowed to look through /proc/ allow lmkd domain:dir { search open read }; allow lmkd domain:file { open read }; diff --git a/public/property.te b/public/property.te index d8d01bb9e70a01e3ffb9be03d8e8d73b45ba5d86..7e6c9399511211b9e41e022389d0e57f8b1595ee 100644 --- a/public/property.te +++ b/public/property.te @@ -35,6 +35,7 @@ type fingerprint_prop, property_type, core_property_type; type firstboot_prop, property_type; type hwservicemanager_prop, property_type; type last_boot_reason_prop, property_type; +type system_lmk_prop, property_type; type logd_prop, property_type, core_property_type; type logpersistd_logging_prop, property_type; type log_prop, property_type, log_property_type; @@ -381,6 +382,7 @@ compatible_property_only(` -firstboot_prop -hwservicemanager_prop -last_boot_reason_prop + -system_lmk_prop -log_prop -log_tag_prop -logd_prop