Skip to content
Snippets Groups Projects
Commit e5acc38f authored by Jeff Sharkey's avatar Jeff Sharkey Committed by Android (Google) Code Review
Browse files

Merge "drop_caches label, vold scratch space on expanded." into mnc-dev

parents aee12c37 c960596c
No related branches found
No related tags found
No related merge requests found
...@@ -6,6 +6,8 @@ type rootfs, fs_type; ...@@ -6,6 +6,8 @@ type rootfs, fs_type;
type proc, fs_type; type proc, fs_type;
# Security-sensitive proc nodes that should not be writable to most. # Security-sensitive proc nodes that should not be writable to most.
type proc_security, fs_type; type proc_security, fs_type;
# Type for /proc/sys/vm/drop_caches
type proc_drop_caches, fs_type;
# proc, sysfs, or other nodes that permit configuration of kernel usermodehelpers. # proc, sysfs, or other nodes that permit configuration of kernel usermodehelpers.
type usermodehelper, fs_type, sysfs_type; type usermodehelper, fs_type, sysfs_type;
type qtaguid_proc, fs_type, mlstrustedobject; type qtaguid_proc, fs_type, mlstrustedobject;
......
...@@ -267,6 +267,7 @@ ...@@ -267,6 +267,7 @@
/mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0
/mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0
/mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0
/mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0
# coredump directory for userdebug/eng devices # coredump directory for userdebug/eng devices
/cores(/.*)? u:object_r:coredump_file:s0 /cores(/.*)? u:object_r:coredump_file:s0
......
...@@ -20,6 +20,7 @@ genfscon proc /sys/kernel/randomize_va_space u:object_r:proc_security:s0 ...@@ -20,6 +20,7 @@ genfscon proc /sys/kernel/randomize_va_space u:object_r:proc_security:s0
genfscon proc /sys/kernel/usermodehelper u:object_r:usermodehelper:s0 genfscon proc /sys/kernel/usermodehelper u:object_r:usermodehelper:s0
genfscon proc /sys/net u:object_r:proc_net:s0 genfscon proc /sys/net u:object_r:proc_net:s0
genfscon proc /sys/vm/mmap_min_addr u:object_r:proc_security:s0 genfscon proc /sys/vm/mmap_min_addr u:object_r:proc_security:s0
genfscon proc /sys/vm/drop_caches u:object_r:proc_drop_caches:s0
genfscon proc /uid_cputime/show_uid_stat u:object_r:proc_uid_cputime_showstat:s0 genfscon proc /uid_cputime/show_uid_stat u:object_r:proc_uid_cputime_showstat:s0
genfscon proc /uid_cputime/remove_uid_range u:object_r:proc_uid_cputime_removeuid:s0 genfscon proc /uid_cputime/remove_uid_range u:object_r:proc_uid_cputime_removeuid:s0
......
...@@ -23,6 +23,4 @@ allow install_recovery cache_file:dir rw_dir_perms; ...@@ -23,6 +23,4 @@ allow install_recovery cache_file:dir rw_dir_perms;
allow install_recovery cache_file:file create_file_perms; allow install_recovery cache_file:file create_file_perms;
# Write to /proc/sys/vm/drop_caches # Write to /proc/sys/vm/drop_caches
# TODO: create a specific label for this file instead of allowing allow install_recovery proc_drop_caches:file w_file_perms;
# write for all /proc files.
allow install_recovery proc:file w_file_perms;
...@@ -41,8 +41,7 @@ recovery_only(` ...@@ -41,8 +41,7 @@ recovery_only(`
allow recovery exec_type:dir { create_dir_perms relabelfrom relabelto }; allow recovery exec_type:dir { create_dir_perms relabelfrom relabelto };
# Write to /proc/sys/vm/drop_caches # Write to /proc/sys/vm/drop_caches
# TODO: create more specific label? allow recovery proc_drop_caches:file w_file_perms;
allow recovery proc:file w_file_perms;
# Write to /sys/class/android_usb/android0/enable. # Write to /sys/class/android_usb/android0/enable.
# TODO: create more specific label? # TODO: create more specific label?
......
...@@ -144,8 +144,11 @@ allow vold metadata_block_device:blk_file rw_file_perms; ...@@ -144,8 +144,11 @@ allow vold metadata_block_device:blk_file rw_file_perms;
allow vold unencrypted_data_file:{ file lnk_file } create_file_perms; allow vold unencrypted_data_file:{ file lnk_file } create_file_perms;
allow vold unencrypted_data_file:dir create_dir_perms; allow vold unencrypted_data_file:dir create_dir_perms;
# Write to /proc/sys/vm/drop_caches
allow vold proc_drop_caches:file w_file_perms;
# Give vold a place where only vold can store files; everyone else is off limits # Give vold a place where only vold can store files; everyone else is off limits
allow vold vold_data_file:dir rw_dir_perms; allow vold vold_data_file:dir create_dir_perms;
allow vold vold_data_file:file create_file_perms; allow vold vold_data_file:file create_file_perms;
neverallow { domain -vold } vold_data_file:dir ~{ open create read getattr setattr search relabelto }; neverallow { domain -vold } vold_data_file:dir ~{ open create read getattr setattr search relabelto };
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment