Merge "[ALPS03943904] Act storagemanagerd as vold context" into alps-trunk-p0.basic

Change-Id: Iad441b1c1dae1037468921f9fb4ea0260abc0f67
MTK-Commit-Id: 773b91887f849e607c7a27d460eb8935e8e09c60
This commit is contained in:
Denis Hsu 2020-01-18 09:57:27 +08:00 committed by Gerrit Code Review
commit 756781b45f
2 changed files with 3 additions and 22 deletions

View File

@ -34,7 +34,7 @@
# storagemanager daemon
# it is used to mount all storages in meta/factory mode
/system/bin/storagemanagerd u:object_r:storagemanagerd_exec:s0
/system/bin/storagemanagerd u:object_r:vold_exec:s0
#MTK Bootanim
/system/bin/mtkbootanimation u:object_r:mtkbootanimation_exec:s0

View File

@ -4,28 +4,9 @@
# ==============================================
# Type Declaration
# ==============================================
type storagemanagerd, domain;
type storagemanagerd_exec, exec_type, file_type;
typeattribute storagemanagerd coredomain;
# Act as 'vold' context to mount storages
# ==============================================
# MTK Policy Rule
# ==============================================
init_daemon_domain(storagemanagerd)
#unix_socket_connect(storagemanagerd, vold, vold)
# storagemanagerd sends information back to dumpstate when "adb bugreport" is used
allow storagemanagerd dumpstate:fd use;
allow storagemanagerd dumpstate:unix_stream_socket { read write getattr };
# storagemanagerd information is written to shell owned bugreport files
allow storagemanagerd shell_data_file:file { write getattr };
# Why?
allow storagemanagerd dumpstate:unix_dgram_socket { read write };
# storagemanagerd can be invoked with logwrapper, so let it write to pty
allow storagemanagerd devpts:chr_file rw_file_perms;