blob: 2e616f363719fa1bb172d34211ea4ce53002d204 [file] [log] [blame]
Tom Cherry63492cd2017-11-15 14:57:14 -08001# Creating files on sysfs is impossible so this isn't a threat
2# Sometimes we have to write to non-existent files to avoid conditional
3# init behavior. See b/35303861 for an example.
4dontaudit vendor_init sysfs:dir write;
Paul Crowleyaed0f762019-08-01 15:57:47 -07005
6# TODO(b/140259336) We want to remove vendor_init in the long term but allow for now
7allow vendor_init system_data_root_file:dir rw_dir_perms;
Josh Gao0cac6fd2020-10-28 13:56:23 -07008
9# Let vendor_init set service.adb.tcp.port.
10set_prop(vendor_init, adbd_config_prop)
Andrew Walbrana995e842021-03-29 17:19:12 +000011
12# chown/chmod on devices, e.g. /dev/ttyHS0
13allow vendor_init {
14 dev_type
15 -keychord_device
16 -kvm_device
17 -port_device
18 -lowpan_device
19 -hw_random_device
20}:chr_file setattr;