Fix modem related avc errors

avc: denied { read } for name="u:object_r:vendor_modem_prop:s0" dev="tmpfs" ino=317 scontext=u:r:vendor_init:s0 tcontext=u:object_r:vendor_modem_prop:s0 tclass=file permissive=1
avc: denied { read } for comm="dmd" name="u:object_r:vendor_persist_config_default_prop:s0" dev="tmpfs" ino=319 scontext=u:r:dmd:s0 tcontext=u:object_r:vendor_persist_config_default_prop:s0 tclass=file permissive=1
avc: denied { read } for name="u:object_r:vendor_persist_config_default_prop:s0" dev="tmpfs" ino=319 scontext=u:r:vcd:s0 tcontext=u:object_r:vendor_persist_config_default_prop:s0 tclass=file permissive=1

Bug: 205073232
Bug: 205073025
Bug: 206045605
Change-Id: I3f76a138b4d6eeffb488fb5e5e15985ac6ef707d
This commit is contained in:
SalmaxChang 2021-11-22 12:03:05 +08:00 committed by Salmax Chang
parent 3dc2515efe
commit 5e2ac8ab48
7 changed files with 4 additions and 15 deletions

View file

@ -1,5 +0,0 @@
# b/205073232
dontaudit dmd vendor_persist_config_default_prop:file { getattr };
dontaudit dmd vendor_persist_config_default_prop:file { map };
dontaudit dmd vendor_persist_config_default_prop:file { open };
dontaudit dmd vendor_persist_config_default_prop:file { read };

View file

@ -1,5 +0,0 @@
# b/205073025
dontaudit vcd vendor_persist_config_default_prop:file { getattr };
dontaudit vcd vendor_persist_config_default_prop:file { map };
dontaudit vcd vendor_persist_config_default_prop:file { open };
dontaudit vcd vendor_persist_config_default_prop:file { read };

View file

@ -1,9 +1,4 @@
# b/205656950
dontaudit vendor_init thermal_link_device:file { create };
# b/206045605
dontaudit vendor_init vendor_modem_prop:file { getattr };
dontaudit vendor_init vendor_modem_prop:file { map };
dontaudit vendor_init vendor_modem_prop:file { open };
dontaudit vendor_init vendor_modem_prop:file { read };
# b/207062206
dontaudit vendor_init proc_sched:file { write };

View file

@ -20,6 +20,7 @@ allow dmd self:tcp_socket { create_socket_perms_no_ioctl listen accept bind };
set_prop(dmd, vendor_diag_prop)
set_prop(dmd, vendor_slog_prop)
set_prop(dmd, vendor_modem_prop)
get_prop(dmd, vendor_persist_config_default_prop)
# Grant to access hwservice manager
get_prop(dmd, hwservicemanager_prop)

View file

@ -42,6 +42,7 @@ persist.vendor.ril. u:object_r:vendor_rild_prop:s0
vendor.ril. u:object_r:vendor_rild_prop:s0
vendor.radio.ril. u:object_r:vendor_rild_prop:s0
vendor.sys.rild_reset u:object_r:vendor_rild_prop:s0
persist.vendor.radio. u:object_r:vendor_rild_prop:s0
ro.vendor.config.build_carrier u:object_r:vendor_carrier_prop:s0
persist.vendor.config. u:object_r:vendor_persist_config_default_prop:s0

View file

@ -4,6 +4,7 @@ userdebug_or_eng(`
init_daemon_domain(vcd)
get_prop(vcd, vendor_rild_prop);
get_prop(vcd, vendor_persist_config_default_prop);
allow vcd serial_device:chr_file rw_file_perms;
allow vcd radio_device:chr_file rw_file_perms;

View file

@ -6,6 +6,7 @@ set_prop(vendor_init, vendor_cbd_prop)
set_prop(vendor_init, vendor_ready_prop)
get_prop(vendor_init, vendor_battery_profile_prop)
set_prop(vendor_init, vendor_device_prop)
set_prop(vendor_init, vendor_modem_prop)
allow vendor_init proc_dirty:file w_file_perms;