Merge "[ALPS04325589] AEE: remove unuse rules" into alps-trunk-q0.basic

Change-Id: Ia92a7b6be46762af09a64e2c7e92607a1c734858
MTK-Commit-Id: e98481807b7d50c68a8e5bd8926df0dcf4398017
This commit is contained in:
Larry Liang 2020-01-18 10:09:48 +08:00 committed by Gerrit Code Review
commit 10cad58309
6 changed files with 14 additions and 15 deletions

View File

@ -391,8 +391,6 @@ allow aee_aedv sysfs_boot_mode:file r_file_perms;
#userdebug_or_eng(` #userdebug_or_eng(`
# allow aee_aedv debugfs_tracing_debug:file { r_file_perms write }; # allow aee_aedv debugfs_tracing_debug:file { r_file_perms write };
#') #')
# Purpose: allow aee_aedv self to sys_ptrace/dac_read_search/dac_override
#userdebug_or_eng(`allow aee_aedv self:capability { sys_ptrace dac_read_search dac_override };')
#Purpose: Allow aee_aedv to read /sys/mtk_memcfg/slabtrace #Purpose: Allow aee_aedv to read /sys/mtk_memcfg/slabtrace
allow aee_aedv proc_slabtrace:file r_file_perms; allow aee_aedv proc_slabtrace:file r_file_perms;

View File

@ -114,8 +114,8 @@ allow dumpstate debugfs_rcu:file r_file_perms;
# Purpose: Allow dumpstate to read /proc/msdc_debug # Purpose: Allow dumpstate to read /proc/msdc_debug
allow dumpstate proc_msdc_debug:file r_file_perms; allow dumpstate proc_msdc_debug:file r_file_perms;
# Purpose: Allow dumpstate to read /proc/pidmap # Purpose: Allow dumpstate to r/w /proc/pidmap
allow dumpstate proc_pidmap:file r_file_perms; allow dumpstate proc_pidmap:file rw_file_perms;
# Purpose: Allow dumpstate to read /sys/power/vcorefs/vcore_debug # Purpose: Allow dumpstate to read /sys/power/vcorefs/vcore_debug
allow dumpstate sysfs_vcore_debug:file r_file_perms; allow dumpstate sysfs_vcore_debug:file r_file_perms;
@ -128,3 +128,6 @@ allow dumpstate proc_slabtrace:file r_file_perms;
#Purpose: Allow dumpstate to read /proc/mtk_cmdq_debug/status #Purpose: Allow dumpstate to read /proc/mtk_cmdq_debug/status
allow dumpstate proc_cmdq_debug:file r_file_perms; allow dumpstate proc_cmdq_debug:file r_file_perms;
#Purpose: Allow dumpstate to read /proc/cpuhvfs/dbg_repo
allow dumpstate proc_dbg_repo:file r_file_perms;

View File

@ -70,6 +70,7 @@ type proc_pidmap, fs_type, proc_type;
type proc_kpageflags, fs_type, proc_type; type proc_kpageflags, fs_type, proc_type;
type proc_slabtrace, fs_type, proc_type; type proc_slabtrace, fs_type, proc_type;
type proc_cmdq_debug, fs_type, proc_type; type proc_cmdq_debug, fs_type, proc_type;
type proc_dbg_repo, fs_type, proc_type;
type sysfs_therm, fs_type, sysfs_type; type sysfs_therm, fs_type, sysfs_type;
type sysfs_fps, fs_type, sysfs_type; type sysfs_fps, fs_type, sysfs_type;
type sysfs_ccci, fs_type, sysfs_type; type sysfs_ccci, fs_type, sysfs_type;

View File

@ -37,6 +37,7 @@ genfscon proc /pidmap u:object_r:proc_pidmap:s0
genfscon proc /kpageflags u:object_r:proc_kpageflags:s0 genfscon proc /kpageflags u:object_r:proc_kpageflags:s0
genfscon proc /mtk_memcfg/slabtrace u:object_r:proc_slabtrace:s0 genfscon proc /mtk_memcfg/slabtrace u:object_r:proc_slabtrace:s0
genfscon proc /mtk_cmdq_debug/status u:object_r:proc_cmdq_debug:s0 genfscon proc /mtk_cmdq_debug/status u:object_r:proc_cmdq_debug:s0
genfscon proc /cpuhvfs/dbg_repo u:object_r:proc_dbg_repo:s0
genfscon iso9660 / u:object_r:iso9660:s0 genfscon iso9660 / u:object_r:iso9660:s0

View File

@ -110,12 +110,7 @@ allow aee_aed sysfs_vibrator:file w_file_perms;
# Purpose : make aee_aed can get specific process NE info # Purpose : make aee_aed can get specific process NE info
allow aee_aed domain:dir r_dir_perms; allow aee_aed domain:dir r_dir_perms;
allow aee_aed domain:{ file lnk_file } r_file_perms; allow aee_aed domain:{ file lnk_file } r_file_perms;
#allow aee_aed {
# domain
# -logd
# -keystore
# -init
#}:process ptrace;
allow aee_aed dalvikcache_data_file:dir r_dir_perms; allow aee_aed dalvikcache_data_file:dir r_dir_perms;
#allow aee_aed zygote_exec:file r_file_perms; #allow aee_aed zygote_exec:file r_file_perms;
#allow aee_aed init_exec:file r_file_perms; #allow aee_aed init_exec:file r_file_perms;
@ -135,10 +130,5 @@ allow aee_aed self:capability { sys_nice chown fowner kill };
# Purpose: Allow aee_aed to write /sys/kernel/debug/tracing/snapshot # Purpose: Allow aee_aed to write /sys/kernel/debug/tracing/snapshot
userdebug_or_eng(`allow aee_aed debugfs_tracing_debug:file { write open };') userdebug_or_eng(`allow aee_aed debugfs_tracing_debug:file { write open };')
# Purpose: Allow aee_aed self to sys_ptrace/dac_override/dac_read_search
#userdebug_or_eng(`
# allow aee_aed self:capability { sys_ptrace dac_override dac_read_search };
#')
# Purpose: Allow aee_aed to read/write /sys/kernel/debug/tracing/tracing_on # Purpose: Allow aee_aed to read/write /sys/kernel/debug/tracing/tracing_on
#userdebug_or_eng(` allow aee_aed debugfs_tracing:file { r_file_perms write };') #userdebug_or_eng(` allow aee_aed debugfs_tracing:file { r_file_perms write };')

View File

@ -92,3 +92,9 @@ allow aee_core_forwarder media_rw_data_file:file { create open write };
# scontext=u:r:aee_core_forwarder:s0 tcontext=u:r:aee_core_forwarder:s0 # scontext=u:r:aee_core_forwarder:s0 tcontext=u:r:aee_core_forwarder:s0
# tclass=capability permissive=0 # tclass=capability permissive=0
allow aee_core_forwarder self:capability sys_nice; allow aee_core_forwarder self:capability sys_nice;
# Purpose : allow aee_core_forwarder to access hwservicemanager_prop
get_prop(aee_core_forwarder, hwservicemanager_prop)
# Purpose : allow aee_core_forwarder to connect aee_aed socket
allow aee_core_forwarder aee_aed:unix_stream_socket connectto;