Merge "[ALPS03841705] modify aee_core_forwarder selinux rule" into alps-trunk-p0.basic

Change-Id: I4bad1d381c0ec3b1e76f1bc7a5ae7ae68ad8add9
MTK-Commit-Id: b01515bb610c7a0c60117c97d4f98b5c9f882071
This commit is contained in:
Larry Liang 2020-01-18 09:40:46 +08:00 committed by Gerrit Code Review
commit 2e97184a4b
5 changed files with 19 additions and 15 deletions

View File

@ -519,7 +519,6 @@
# #
/(system\/vendor|vendor)/bin/stp_dump3 u:object_r:stp_dump3_exec:s0 /(system\/vendor|vendor)/bin/stp_dump3 u:object_r:stp_dump3_exec:s0
/(system\/vendor|vendor)/bin/wmt_launcher u:object_r:mtk_wmt_launcher_exec:s0 /(system\/vendor|vendor)/bin/wmt_launcher u:object_r:mtk_wmt_launcher_exec:s0
/(system\/vendor|vendor)/bin/aee_core_forwarder u:object_r:aee_core_forwarder_exec:s0
/(system\/vendor|vendor)/bin/ccci_fsd u:object_r:ccci_fsd_exec:s0 /(system\/vendor|vendor)/bin/ccci_fsd u:object_r:ccci_fsd_exec:s0
/(system\/vendor|vendor)/bin/fuelgauged u:object_r:fuelgauged_exec:s0 /(system\/vendor|vendor)/bin/fuelgauged u:object_r:fuelgauged_exec:s0
/(system\/vendor|vendor)/bin/fuelgauged_nvram u:object_r:fuelgauged_nvram_exec:s0 /(system\/vendor|vendor)/bin/fuelgauged_nvram u:object_r:fuelgauged_nvram_exec:s0

View File

@ -22,7 +22,6 @@ allow kernel system_data_file:lnk_file r_file_perms;
# Operation : Migration # Operation : Migration
# Purpose : transit from kernel to aee_core_forwarder domain when executing aee_core_forwarder # Purpose : transit from kernel to aee_core_forwarder domain when executing aee_core_forwarder
typeattribute kernel system_executes_vendor_violators; typeattribute kernel system_executes_vendor_violators;
domain_auto_trans(kernel, aee_core_forwarder_exec, aee_core_forwarder)
# Date : WK14.43 # Date : WK14.43
# Operation : Migration # Operation : Migration

View File

@ -1,11 +1,11 @@
# ============================================== # ==============================================
# Policy File of /vendor/bin/aee_core_forwarder Executable File # Policy File of /system/bin/aee_core_forwarder Executable File
# ============================================== # ==============================================
# Type Declaration # Type Declaration
# ============================================== # ==============================================
type aee_core_forwarder_exec, exec_type, file_type, vendor_file_type; type aee_core_forwarder_exec, exec_type, file_type;
type aee_core_forwarder, domain; typeattribute aee_core_forwarder coredomain;
# ============================================== # ==============================================
# MTK Policy Rule # MTK Policy Rule
@ -13,18 +13,17 @@ type aee_core_forwarder, domain;
init_daemon_domain(aee_core_forwarder) init_daemon_domain(aee_core_forwarder)
#/data/core/zcorexxx.zip #/data/core/zcorexxx.zip
allow aee_core_forwarder aee_core_data_file:dir relabelto; #allow aee_core_forwarder aee_core_data_file:dir relabelto;
allow aee_core_forwarder aee_core_data_file:dir create_dir_perms; #allow aee_core_forwarder aee_core_data_file:dir create_dir_perms;
allow aee_core_forwarder aee_core_data_file:file create_file_perms; #allow aee_core_forwarder aee_core_data_file:file create_file_perms;
typeattribute aee_core_forwarder data_between_core_and_vendor_violators; #allow aee_core_forwarder system_data_file:dir { write relabelfrom create add_name };
allow aee_core_forwarder system_data_file:dir { write relabelfrom create add_name };
#mkdir /sdcard/mtklog/aee_exp and write /sdcard/mtklog/aee_exp/zcorexxx.zip #mkdir /sdcard/mtklog/aee_exp and write /sdcard/mtklog/aee_exp/zcorexxx.zip
allow aee_core_forwarder sdcard_type:dir create_dir_perms; allow aee_core_forwarder sdcard_type:dir create_dir_perms;
allow aee_core_forwarder sdcard_type:file create_file_perms; allow aee_core_forwarder sdcard_type:file create_file_perms;
allow aee_core_forwarder self:capability fsetid; allow aee_core_forwarder self:capability fsetid;
allow aee_core_forwarder aee_exp_data_file:dir create_dir_perms; #allow aee_core_forwarder aee_exp_data_file:dir create_dir_perms;
allow aee_core_forwarder aee_exp_data_file:file create_file_perms; #allow aee_core_forwarder aee_exp_data_file:file create_file_perms;
#mkdir(path, mode) #mkdir(path, mode)
#allow aee_core_forwarder self:capability dac_override; #allow aee_core_forwarder self:capability dac_override;
@ -64,7 +63,7 @@ dontaudit aee_core_forwarder untrusted_app:dir search;
# Purpose : access for pipefs # Purpose : access for pipefs
allow aee_core_forwarder kernel:fd use; allow aee_core_forwarder kernel:fd use;
# Purpose : read AEE persist property # Purpose : read AEE persist property
allow aee_core_forwarder persist_aee_prop:file r_file_perms; #allow aee_core_forwarder persist_aee_prop:file r_file_perms;
# Purpose: search root dir "/" # Purpose: search root dir "/"
allow aee_core_forwarder tmpfs:dir search; allow aee_core_forwarder tmpfs:dir search;
# Purpose : read /selinux_version # Purpose : read /selinux_version
@ -104,7 +103,7 @@ allow aee_core_forwarder media_rw_data_file:file { create open write };
# Purpose : type=1400 audit(0.0:6594): avc: denied { connectto } for # Purpose : type=1400 audit(0.0:6594): avc: denied { connectto } for
# path=00616E64726F69643A6165655F616564 scontext=u:r:aee_core_forwarder:s0 # path=00616E64726F69643A6165655F616564 scontext=u:r:aee_core_forwarder:s0
# tcontext=u:r:aee_aedv:s0 tclass=unix_stream_socket permissive=0 # tcontext=u:r:aee_aedv:s0 tclass=unix_stream_socket permissive=0
allow aee_core_forwarder aee_aedv:unix_stream_socket connectto; #allow aee_core_forwarder aee_aedv:unix_stream_socket connectto;
# Data : 2017/08/04 # Data : 2017/08/04
# Operation : fix sys_nice selinux warning # Operation : fix sys_nice selinux warning

View File

@ -11,7 +11,7 @@
# #
/system/bin/mobile_log_d u:object_r:mobile_log_d_exec:s0 /system/bin/mobile_log_d u:object_r:mobile_log_d_exec:s0
/system/bin/aee_core_forwarder u:object_r:aee_core_forwarder_exec:s0
/system/bin/mdlogger u:object_r:mdlogger_exec:s0 /system/bin/mdlogger u:object_r:mdlogger_exec:s0
/system/bin/emdlogger[0-9]+ u:object_r:emdlogger_exec:s0 /system/bin/emdlogger[0-9]+ u:object_r:emdlogger_exec:s0
/system/bin/netdiag u:object_r:netdiag_exec:s0 /system/bin/netdiag u:object_r:netdiag_exec:s0

View File

@ -0,0 +1,7 @@
# ==============================================
# Policy File of /system/bin/aee_core_forwarder Executable File
# ==============================================
# Type Declaration
# ==============================================
type aee_core_forwarder, domain;