[ALPS03825066] P migration selinux build failed fix

1. Mark polices which accessing proc/sysfs file system
    2. Add violator attribute to modules violate vendor/system rule.

MTK-Commit-Id: 3954cad7a1428cda694d8428c2235a78aa6e7cc8

Change-Id: I401ae5b87eb9a03f324bef83c6678149606b15a8
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
This commit is contained in:
Bo Ye 2020-01-18 09:29:36 +08:00
parent bbecfaa68b
commit 5849c224e3
83 changed files with 179 additions and 179 deletions

View File

@ -34,6 +34,7 @@ allow adbd adbd_data_file:file create_file_perms;
allow adbd qemu_pipe_device:chr_file rw_file_perms; allow adbd qemu_pipe_device:chr_file rw_file_perms;
# user load adb pull /data/aee_exp db # user load adb pull /data/aee_exp db
typeattribute adbd data_between_core_and_vendor_violators;
allow adbd aee_exp_data_file:dir r_dir_perms; allow adbd aee_exp_data_file:dir r_dir_perms;
allow adbd aee_exp_data_file:file r_file_perms; allow adbd aee_exp_data_file:file r_file_perms;

View File

@ -22,6 +22,7 @@ allow aee_aed mtd_device:chr_file rw_file_perms;
allow aee_aed RT_Monitor_device:chr_file r_file_perms; allow aee_aed RT_Monitor_device:chr_file r_file_perms;
#data/aee_exp #data/aee_exp
typeattribute aee_aed data_between_core_and_vendor_violators;
allow aee_aed aee_exp_data_file:dir create_dir_perms; allow aee_aed aee_exp_data_file:dir create_dir_perms;
allow aee_aed aee_exp_data_file:file create_file_perms; allow aee_aed aee_exp_data_file:file create_file_perms;
@ -43,7 +44,7 @@ set_prop(aee_aed, persist_aee_prop);
set_prop(aee_aed, debug_mtk_aee_prop); set_prop(aee_aed, debug_mtk_aee_prop);
# /proc/lk_env # /proc/lk_env
allow aee_aed proc_lk_env:file rw_file_perms; #allow aee_aed proc_lk_env:file rw_file_perms;
# Purpose: Allow aee_aedv to read /proc/pid/exe # Purpose: Allow aee_aedv to read /proc/pid/exe
allow aee_aed exec_type:file r_file_perms; allow aee_aed exec_type:file r_file_perms;

View File

@ -31,6 +31,7 @@ allow aee_aedv sdcard_type:dir create_dir_perms;
allow aee_aedv sdcard_type:file create_file_perms; allow aee_aedv sdcard_type:file create_file_perms;
#data/anr #data/anr
typeattribute aee_aedv data_between_core_and_vendor_violators;
allow aee_aedv anr_data_file:dir create_dir_perms; allow aee_aedv anr_data_file:dir create_dir_perms;
allow aee_aedv anr_data_file:file create_file_perms; allow aee_aedv anr_data_file:file create_file_perms;
@ -183,7 +184,6 @@ allow aee_aedv debugfs_page_owner_slim_debug:file { read open };
allow aee_aedv debugfs_ion_mm_heap:dir search; allow aee_aedv debugfs_ion_mm_heap:dir search;
allow aee_aedv debugfs_ion_mm_heap:file { read open }; allow aee_aedv debugfs_ion_mm_heap:file { read open };
allow aee_aedv debugfs_ion_mm_heap:lnk_file read; allow aee_aedv debugfs_ion_mm_heap:lnk_file read;
allow aee_aedv debugfs_ion_mm_heap:lnk_file read;
allow aee_aedv debugfs_cpuhvfs:dir search; allow aee_aedv debugfs_cpuhvfs:dir search;
allow aee_aedv debugfs_cpuhvfs:file { read open }; allow aee_aedv debugfs_cpuhvfs:file { read open };
allow aee_aedv debugfs_emi_mbw_buf:file { read open }; allow aee_aedv debugfs_emi_mbw_buf:file { read open };

View File

@ -16,6 +16,7 @@ init_daemon_domain(aee_core_forwarder)
allow aee_core_forwarder aee_core_data_file:dir relabelto; allow aee_core_forwarder aee_core_data_file:dir relabelto;
allow aee_core_forwarder aee_core_data_file:dir create_dir_perms; allow aee_core_forwarder aee_core_data_file:dir create_dir_perms;
allow aee_core_forwarder aee_core_data_file:file create_file_perms; allow aee_core_forwarder aee_core_data_file:file create_file_perms;
typeattribute aee_core_forwarder data_between_core_and_vendor_violators;
allow aee_core_forwarder system_data_file:dir { write relabelfrom create add_name }; allow aee_core_forwarder system_data_file:dir { write relabelfrom create add_name };
#mkdir /sdcard/mtklog/aee_exp and write /sdcard/mtklog/aee_exp/zcorexxx.zip #mkdir /sdcard/mtklog/aee_exp and write /sdcard/mtklog/aee_exp/zcorexxx.zip

View File

@ -3,6 +3,7 @@
# Read/Write NV # Read/Write NV
allow audiocmdservice_atci nvram_device:devfile_class_set rw_file_perms; allow audiocmdservice_atci nvram_device:devfile_class_set rw_file_perms;
typeattribute audiocmdservice_atci data_between_core_and_vendor_violators;
allow audiocmdservice_atci nvram_data_file:dir create_dir_perms; allow audiocmdservice_atci nvram_data_file:dir create_dir_perms;
allow audiocmdservice_atci nvram_data_file:{file lnk_file} create_file_perms; allow audiocmdservice_atci nvram_data_file:{file lnk_file} create_file_perms;
allow audiocmdservice_atci nvdata_file:dir create_dir_perms; allow audiocmdservice_atci nvdata_file:dir create_dir_perms;

View File

@ -16,7 +16,7 @@ allow audioserver ttySDIO_device:chr_file rw_file_perms;
# Data: WK14.44 # Data: WK14.44
# Operation : Migration # Operation : Migration
# Purpose : for low SD card latency issue # Purpose : for low SD card latency issue
allow audioserver sysfs_lowmemorykiller:file { read open }; #allow audioserver sysfs_lowmemorykiller:file { read open };
# Data: WK14.45 # Data: WK14.45
# Operation : Migration # Operation : Migration
@ -24,6 +24,7 @@ allow audioserver sysfs_lowmemorykiller:file { read open };
allow audioserver proc_mtkcooler:dir search; allow audioserver proc_mtkcooler:dir search;
allow audioserver proc_mtktz:dir search; allow audioserver proc_mtktz:dir search;
allow audioserver proc_thermal:dir search; allow audioserver proc_thermal:dir search;
typeattribute audioserver data_between_core_and_vendor_violators;
allow audioserver thermal_manager_data_file:file create_file_perms; allow audioserver thermal_manager_data_file:file create_file_perms;
allow audioserver thermal_manager_data_file:dir { rw_dir_perms setattr }; allow audioserver thermal_manager_data_file:dir { rw_dir_perms setattr };
@ -35,7 +36,7 @@ allow audioserver offloadservice_device:chr_file rw_file_perms;
# Date : WK16.17 # Date : WK16.17
# Operation : Migration # Operation : Migration
# Purpose: read/open sysfs node # Purpose: read/open sysfs node
allow audioserver sysfs_ccci:file r_file_perms; #allow audioserver sysfs_ccci:file r_file_perms;
# Date : WK16.18 # Date : WK16.18
# Operation : Migration # Operation : Migration
@ -45,7 +46,7 @@ allow audioserver tmpfs:dir search;
# Date : WK16.18 # Date : WK16.18
# Operation : Migration # Operation : Migration
# Purpose: access sysfs node # Purpose: access sysfs node
allow audioserver sysfs:file { open read write }; #allow audioserver sysfs:file { open read write };
allow audioserver sysfs_ccci:dir search; allow audioserver sysfs_ccci:dir search;
# Purpose: Dump debug info # Purpose: Dump debug info
@ -60,8 +61,6 @@ allow audioserver proc_ged:file {open read write ioctl getattr};
# Purpose: Allow to trigger AEE dump # Purpose: Allow to trigger AEE dump
allow audioserver aee_aed:unix_stream_socket connectto; allow audioserver aee_aed:unix_stream_socket connectto;
# Date : WK17.28 # Date : WK17.28
# Operation : MT6757 SQC # Operation : MT6757 SQC
# Purpose : Change thermal config # Purpose : Change thermal config

View File

@ -14,7 +14,7 @@ allow boot_logo_updater bootdevice_block_device:blk_file r_file_perms;
#To access file at /dev/logo #To access file at /dev/logo
allow boot_logo_updater logo_device:chr_file r_file_perms; allow boot_logo_updater logo_device:chr_file r_file_perms;
# To access file at /proc/lk_env # To access file at /proc/lk_env
allow boot_logo_updater proc_lk_env:file rw_file_perms; #allow boot_logo_updater proc_lk_env:file rw_file_perms;
# Date : WK16.25 # Date : WK16.25
# Operation : Global_Device/Uniservice Feature # Operation : Global_Device/Uniservice Feature

View File

@ -5,6 +5,7 @@
# Date : WK14.37 # Date : WK14.37
# Operation : Migration # Operation : Migration
# Purpose : for opetator # Purpose : for opetator
typeattribute bootanim data_between_core_and_vendor_violators;
allow bootanim custom_file:dir search; allow bootanim custom_file:dir search;
allow bootanim custom_file:file r_file_perms; allow bootanim custom_file:file r_file_perms;
allow bootanim bootani_prop:property_service set; allow bootanim bootani_prop:property_service set;

View File

@ -16,7 +16,6 @@ binder_call(cameraserver, mtk_hal_camera)
# call the graphics allocator hal # call the graphics allocator hal
binder_call(cameraserver, hal_graphics_allocator) binder_call(cameraserver, hal_graphics_allocator)
# ----------------------------------- # -----------------------------------
# Android O # Android O
# Purpose: Debugging # Purpose: Debugging
@ -24,13 +23,11 @@ binder_call(cameraserver, hal_graphics_allocator)
# Purpose: adb shell dumpsys media.camera --unreachable # Purpose: adb shell dumpsys media.camera --unreachable
allow cameraserver self:process { ptrace }; allow cameraserver self:process { ptrace };
# ----------------------------------- # -----------------------------------
# Purpose: property access # Purpose: property access
# ----------------------------------- # -----------------------------------
allow cameraserver mtkcam_prop:file { open read getattr }; allow cameraserver mtkcam_prop:file { open read getattr };
# Date : WK14.31 # Date : WK14.31
# Operation : Migration # Operation : Migration
# Purpose : camera devices access. # Purpose : camera devices access.
@ -40,11 +37,12 @@ allow cameraserver vpu_device:chr_file rw_file_perms;
allow cameraserver kd_camera_hw_device:chr_file rw_file_perms; allow cameraserver kd_camera_hw_device:chr_file rw_file_perms;
allow cameraserver seninf_device:chr_file rw_file_perms; allow cameraserver seninf_device:chr_file rw_file_perms;
allow cameraserver self:capability { setuid ipc_lock sys_nice }; allow cameraserver self:capability { setuid ipc_lock sys_nice };
allow cameraserver sysfs_wake_lock:file rw_file_perms; #allow cameraserver sysfs_wake_lock:file rw_file_perms;
allow cameraserver MTK_SMI_device:chr_file r_file_perms; allow cameraserver MTK_SMI_device:chr_file r_file_perms;
allow cameraserver camera_pipemgr_device:chr_file r_file_perms; allow cameraserver camera_pipemgr_device:chr_file r_file_perms;
allow cameraserver kd_camera_flashlight_device:chr_file rw_file_perms; allow cameraserver kd_camera_flashlight_device:chr_file rw_file_perms;
allow cameraserver lens_device:chr_file rw_file_perms; allow cameraserver lens_device:chr_file rw_file_perms;
typeattribute cameraserver data_between_core_and_vendor_violators;
allow cameraserver nvdata_file:dir { write search add_name }; allow cameraserver nvdata_file:dir { write search add_name };
allow cameraserver nvdata_file:file { read write getattr setattr open create }; allow cameraserver nvdata_file:file { read write getattr setattr open create };
allow cameraserver nvram_data_file:dir search; allow cameraserver nvram_data_file:dir search;
@ -52,9 +50,9 @@ allow cameraserver nvram_data_file:dir w_dir_perms;
allow cameraserver nvram_data_file:file create_file_perms; allow cameraserver nvram_data_file:file create_file_perms;
allow cameraserver nvram_data_file:lnk_file read; allow cameraserver nvram_data_file:lnk_file read;
allow cameraserver nvdata_file:lnk_file read; allow cameraserver nvdata_file:lnk_file read;
allow cameraserver proc:file { read ioctl open }; #allow cameraserver proc:file { read ioctl open };
allow cameraserver proc_meminfo:file { read getattr open }; #allow cameraserver proc_meminfo:file { read getattr open };
allow cameraserver sysfs:file { read write open }; #allow cameraserver sysfs:file { read write open };
# Date : WK14.34 # Date : WK14.34
# Operation : Migration # Operation : Migration
@ -146,7 +144,6 @@ allow cameraserver MAINAF_device:chr_file rw_file_perms;
allow cameraserver MAIN2AF_device:chr_file rw_file_perms; allow cameraserver MAIN2AF_device:chr_file rw_file_perms;
allow cameraserver SUBAF_device:chr_file rw_file_perms; allow cameraserver SUBAF_device:chr_file rw_file_perms;
# Data : WK14.38 # Data : WK14.38
# Operation : Migration # Operation : Migration
# Purpose : for boot animation. # Purpose : for boot animation.
@ -221,7 +218,7 @@ allow cameraserver surfaceflinger:file getattr;
# Data: WK14.44 # Data: WK14.44
# Operation : Migration # Operation : Migration
# Purpose : for low SD card latency issue # Purpose : for low SD card latency issue
allow cameraserver sysfs_lowmemorykiller:file { read open }; #allow cameraserver sysfs_lowmemorykiller:file { read open };
# Data: WK14.45 # Data: WK14.45
# Operation : Migration # Operation : Migration
@ -281,13 +278,11 @@ allow cameraserver mnt_user_file:lnk_file {read write};
# Purpose: Allow cameraserver to read binder from surfaceflinger # Purpose: Allow cameraserver to read binder from surfaceflinger
allow cameraserver surfaceflinger:fifo_file {read write}; allow cameraserver surfaceflinger:fifo_file {read write};
# Date : WK15.45 # Date : WK15.45
# Purpose : camera read/write /nvcfg/camera data # Purpose : camera read/write /nvcfg/camera data
allow cameraserver nvcfg_file:dir create_dir_perms; allow cameraserver nvcfg_file:dir create_dir_perms;
allow cameraserver nvcfg_file:file create_file_perms; allow cameraserver nvcfg_file:file create_file_perms;
# Date : WK15.46 # Date : WK15.46
# Operation : Migration # Operation : Migration
# Purpose : DPE Driver # Purpose : DPE Driver
@ -314,9 +309,10 @@ allow cameraserver gpu_device:dir search;
# Operation : Migration # Operation : Migration
# Purpose : Use file_type_auto_trans to specify label to avoid violated(never allow) # Purpose : Use file_type_auto_trans to specify label to avoid violated(never allow)
allow cameraserver property_socket:sock_file write; allow cameraserver property_socket:sock_file write;
allow cameraserver proc:file getattr; #allow cameraserver proc:file getattr;
allow cameraserver shell_exec:file { execute read getattr open}; allow cameraserver shell_exec:file { execute read getattr open};
domain_auto_trans(cameraserver, thermal_manager_exec, thermal_manager) domain_auto_trans(cameraserver, thermal_manager_exec, thermal_manager)
typeattribute cameraserver system_executes_vendor_violators;
allow cameraserver thermal_manager_exec:file { read getattr open execute}; allow cameraserver thermal_manager_exec:file { read getattr open execute};
allow cameraserver init:unix_stream_socket connectto; allow cameraserver init:unix_stream_socket connectto;
@ -327,7 +323,7 @@ allow cameraserver camera_rsc_device:chr_file rw_file_perms;
# Date : WK16.33 # Date : WK16.33
# Purpose: Allow to access ged for gralloc_extra functions # Purpose: Allow to access ged for gralloc_extra functions
allow cameraserver proc_ged:file {open read write ioctl getattr}; #allow cameraserver proc_ged:file {open read write ioctl getattr};
# Date : WK16.33 # Date : WK16.33
# Operation : Migration # Operation : Migration
@ -367,7 +363,7 @@ allow cameraserver camera_owe_device:chr_file rw_file_perms;
# Date : WK17.25 # Date : WK17.25
# Operation : Migration # Operation : Migration
allow cameraserver debugfs_tracing:file { write open }; #allow cameraserver debugfs_tracing:file { write open };
allow cameraserver nvram_data_file:dir { add_name write create}; allow cameraserver nvram_data_file:dir { add_name write create};
allow cameraserver nvram_data_file:file { write getattr setattr read create open }; allow cameraserver nvram_data_file:file { write getattr setattr read create open };
allow cameraserver debugfs_ion:dir search; allow cameraserver debugfs_ion:dir search;
@ -397,4 +393,4 @@ allow cameraserver camera_mfb_device:chr_file rw_file_perms;
# Operation : MT6771 SQC # Operation : MT6771 SQC
# Purpose: Allow permgr access # Purpose: Allow permgr access
allow cameraserver proc_perfmgr:dir {read search}; allow cameraserver proc_perfmgr:dir {read search};
allow cameraserver proc_perfmgr:file {open read ioctl}; #allow cameraserver proc_perfmgr:file {open read ioctl};

View File

@ -68,6 +68,7 @@ allow ccci_mdinit bootdevice_block_device:blk_file rw_file_perms;
set_prop(ccci_mdinit, ril_mux_report_case_prop) set_prop(ccci_mdinit, ril_mux_report_case_prop)
typeattribute ccci_mdinit data_between_core_and_vendor_violators;
allow ccci_mdinit mdlog_data_file:dir search; allow ccci_mdinit mdlog_data_file:dir search;
allow ccci_mdinit mdlog_data_file:file r_file_perms; allow ccci_mdinit mdlog_data_file:file r_file_perms;

View File

@ -25,5 +25,5 @@ allow cmddumper media_rw_data_file:dir { create_dir_perms };
allow cmddumper file_contexts_file:file { read getattr open }; allow cmddumper file_contexts_file:file { read getattr open };
# purpose: access /sys/devices/virtual/BOOT/BOOT/boot/boot_mode # purpose: access /sys/devices/virtual/BOOT/BOOT/boot/boot_mode
allow cmddumper sysfs:file { read open }; #allow cmddumper sysfs:file { read open };

View File

@ -4,4 +4,4 @@
# Date : WK16.33 # Date : WK16.33
# Purpose: Allow to access ged for gralloc_extra functions # Purpose: Allow to access ged for gralloc_extra functions
allow drmserver proc_ged:file {open read write ioctl getattr}; #allow drmserver proc_ged:file {open read write ioctl getattr};

View File

@ -9,6 +9,7 @@ set_prop(dumpstate, debug_bq_dump_prop);
allow dumpstate aed_device:chr_file { read getattr }; allow dumpstate aed_device:chr_file { read getattr };
# Purpose: data/dumpsys/* # Purpose: data/dumpsys/*
typeattribute dumpstate data_between_core_and_vendor_violators;
allow dumpstate aee_dumpsys_data_file:dir { w_dir_perms }; allow dumpstate aee_dumpsys_data_file:dir { w_dir_perms };
allow dumpstate aee_dumpsys_data_file:file { create_file_perms }; allow dumpstate aee_dumpsys_data_file:file { create_file_perms };
@ -35,19 +36,18 @@ allow dumpstate debugfs_page_owner_slim_debug:file { read open };
allow dumpstate debugfs_ion_mm_heap:dir search; allow dumpstate debugfs_ion_mm_heap:dir search;
allow dumpstate debugfs_ion_mm_heap:file { read open }; allow dumpstate debugfs_ion_mm_heap:file { read open };
allow dumpstate debugfs_ion_mm_heap:lnk_file read; allow dumpstate debugfs_ion_mm_heap:lnk_file read;
allow dumpstate debugfs_ion_mm_heap:lnk_file read;
allow dumpstate debugfs_cpuhvfs:dir search; allow dumpstate debugfs_cpuhvfs:dir search;
allow dumpstate debugfs_cpuhvfs:file { read open }; allow dumpstate debugfs_cpuhvfs:file { read open };
# Purpose: /sys/kernel/ccci/md_chn # Purpose: /sys/kernel/ccci/md_chn
allow dumpstate sysfs_ccci:dir search; allow dumpstate sysfs_ccci:dir search;
allow dumpstate sysfs_ccci:file { read open }; #allow dumpstate sysfs_ccci:file { read open };
# Purpose: leds status # Purpose: leds status
allow dumpstate sysfs_leds:lnk_file read; allow dumpstate sysfs_leds:lnk_file read;
# Purpose: /sys/module/lowmemorykiller/parameters/adj # Purpose: /sys/module/lowmemorykiller/parameters/adj
allow dumpstate sysfs_lowmemorykiller:file { read open }; #allow dumpstate sysfs_lowmemorykiller:file { read open };
allow dumpstate sysfs_lowmemorykiller:dir search; allow dumpstate sysfs_lowmemorykiller:dir search;
# Purpose: /dev/block/mmcblk0p10 # Purpose: /dev/block/mmcblk0p10
@ -69,7 +69,7 @@ allow dumpstate aee_aed:unix_stream_socket { read write ioctl };
# allow dumpstate config_gz:file read; # allow dumpstate config_gz:file read;
allow dumpstate sysfs_leds:dir r_dir_perms; allow dumpstate sysfs_leds:dir r_dir_perms;
allow dumpstate sysfs_leds:file r_file_perms; #allow dumpstate sysfs_leds:file r_file_perms;
# Purpose: 01-01 08:30:57.260 3070 3070 W aee_dumpstate: type=1400 audit(0.0:13196): avc: denied # Purpose: 01-01 08:30:57.260 3070 3070 W aee_dumpstate: type=1400 audit(0.0:13196): avc: denied
# { read } for name="SF_dump" dev="dm-0" ino=352257 scontext=u:r:dumpstate:s0 tcontext=u:object_r: # { read } for name="SF_dump" dev="dm-0" ino=352257 scontext=u:r:dumpstate:s0 tcontext=u:object_r:

View File

@ -8,6 +8,7 @@ allow em_svr misc_sd_device:chr_file { read open ioctl };
allow em_svr als_ps_device:chr_file { read ioctl open }; allow em_svr als_ps_device:chr_file { read ioctl open };
allow em_svr gsensor_device:chr_file { read ioctl open }; allow em_svr gsensor_device:chr_file { read ioctl open };
allow em_svr gyroscope_device:chr_file { read ioctl open }; allow em_svr gyroscope_device:chr_file { read ioctl open };
typeattribute em_svr data_between_core_and_vendor_violators;
allow em_svr nvram_data_file:dir { write read open add_name search }; allow em_svr nvram_data_file:dir { write read open add_name search };
allow em_svr nvram_data_file:file { write getattr setattr read create open }; allow em_svr nvram_data_file:file { write getattr setattr read create open };
allow em_svr nvram_data_file:lnk_file read; allow em_svr nvram_data_file:lnk_file read;
@ -15,30 +16,30 @@ allow em_svr nvdata_file:lnk_file read;
allow em_svr nvdata_file:dir { write read open add_name search }; allow em_svr nvdata_file:dir { write read open add_name search };
allow em_svr nvdata_file:file { write getattr setattr read create open }; allow em_svr nvdata_file:file { write getattr setattr read create open };
allow em_svr nvram_device:chr_file { open read write ioctl }; allow em_svr nvram_device:chr_file { open read write ioctl };
typeattribute em_svr system_executes_vendor_violators;
allow em_svr thermal_manager_exec:file { getattr execute read open execute_no_trans }; allow em_svr thermal_manager_exec:file { getattr execute read open execute_no_trans };
allow em_svr proc_mtkcooler:dir search; allow em_svr proc_mtkcooler:dir search;
allow em_svr proc_mtkcooler:file { read getattr open write }; #allow em_svr proc_mtkcooler:file { read getattr open write };
allow em_svr proc_thermal:dir search; allow em_svr proc_thermal:dir search;
allow em_svr proc_thermal:file { read getattr open write }; #allow em_svr proc_thermal:file { read getattr open write };
allow em_svr proc_mtktz:dir search; allow em_svr proc_mtktz:dir search;
allow em_svr proc_mtktz:file { read getattr open write }; #allow em_svr proc_mtktz:file { read getattr open write };
allow em_svr proc_slogger:file { read getattr open write }; #allow em_svr proc_slogger:file { read getattr open write };
allow em_svr proc_lk_env:file { read getattr open write ioctl}; #allow em_svr proc_lk_env:file { read getattr open write ioctl};
allow em_svr para_block_device:blk_file { read open }; allow em_svr para_block_device:blk_file { read open };
# Date: 2015/12/22 # Date: 2015/12/22
# Operation : M Migration # Operation : M Migration
# Purpose : Battery Log can change temperature # Purpose : Battery Log can change temperature
userdebug_or_eng(` userdebug_or_eng(`
allow em_svr proc_battery_cmd:dir search; allow em_svr proc_battery_cmd:dir search;
allow em_svr proc_battery_cmd:file { read getattr open write }; #allow em_svr proc_battery_cmd:file { read getattr open write };
') ')
# Date : WK16.33 # Date : WK16.33
# Purpose: Allow to access ged for gralloc_extra functions # Purpose: Allow to access ged for gralloc_extra functions
allow em_svr proc_ged:file {open read write ioctl getattr}; #allow em_svr proc_ged:file {open read write ioctl getattr};
# Date : WK17.42 # Date : WK17.42
# Purpose: Allow to query md log filter bin # Purpose: Allow to query md log filter bin
allow em_svr md_block_device:blk_file { read open }; allow em_svr md_block_device:blk_file { read open };

View File

@ -57,11 +57,11 @@ allow emdlogger storage_file:file { create_file_perms };
#permission for read boot mode #permission for read boot mode
#avc: denied { open } path="/sys/devices/virtual/BOOT/BOOT/boot/boot_mode" dev="sysfs" #avc: denied { open } path="/sys/devices/virtual/BOOT/BOOT/boot/boot_mode" dev="sysfs"
allow emdlogger sysfs:file { read open }; #allow emdlogger sysfs:file { read open };
# Allow read to sys/kernel/ccci/* files # Allow read to sys/kernel/ccci/* files
allow emdlogger sysfs_ccci:dir search; allow emdlogger sysfs_ccci:dir search;
allow emdlogger sysfs_ccci:file r_file_perms; #allow emdlogger sysfs_ccci:file r_file_perms;
# Allow read avc: denied { read } for name="mddb" dev="mmcblk0p25" ino=681 # Allow read avc: denied { read } for name="mddb" dev="mmcblk0p25" ino=681
# scontext=u:r:emdlogger:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 # scontext=u:r:emdlogger:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0

View File

@ -5,7 +5,6 @@
# Type Declaration # Type Declaration
# ============================================== # ==============================================
# ============================================== # ==============================================
# MTK Policy Rule # MTK Policy Rule
# ============================================== # ==============================================
@ -52,13 +51,12 @@ allow factory vmodem_device:chr_file rw_file_perms;
# Purpose: for nand project # Purpose: for nand project
allow factory mtd_device:dir search; allow factory mtd_device:dir search;
allow factory mtd_device:chr_file rw_file_perms; allow factory mtd_device:chr_file rw_file_perms;
allow factory mtd_device:chr_file rw_file_perms;
allow factory self:capability sys_resource; allow factory self:capability sys_resource;
allow factory pro_info_device:chr_file rw_file_perms; allow factory pro_info_device:chr_file rw_file_perms;
# Data: WK15.28 # Data: WK15.28
# Purpose: for mt-ramdump reset # Purpose: for mt-ramdump reset
allow factory proc_mrdump_rst:file w_file_perms; #allow factory proc_mrdump_rst:file w_file_perms;
#Date: WK15.31 #Date: WK15.31
#Purpose: define factory_data_file instead of system_data_file #Purpose: define factory_data_file instead of system_data_file
@ -75,6 +73,7 @@ allow factory factory_idle_state_prop:property_service set;
# Date: WK15.46 # Date: WK15.46
# Purpose: gps factory mode # Purpose: gps factory mode
typeattribute factory data_between_core_and_vendor_violators;
allow factory agpsd_data_file:dir search; allow factory agpsd_data_file:dir search;
allow factory apk_data_file:dir write; allow factory apk_data_file:dir write;
#allow factory gps_data_file:dir r_dir_perms; #allow factory gps_data_file:dir r_dir_perms;
@ -220,7 +219,7 @@ allow factory input_device:dir rw_dir_perms;
# Purpose: N Migration For ccci sysfs node # Purpose: N Migration For ccci sysfs node
# Allow read to sys/kernel/ccci/* files # Allow read to sys/kernel/ccci/* files
allow factory sysfs_ccci:dir search; allow factory sysfs_ccci:dir search;
allow factory sysfs_ccci:file r_file_perms; #allow factory sysfs_ccci:file r_file_perms;
# Date: WK16.18 # Date: WK16.18
# Purpose: N Migration For boot_mode # Purpose: N Migration For boot_mode
@ -228,7 +227,7 @@ allow factory sysfs_ccci:file r_file_perms;
# avc: denied { read } for name="boot_mode" dev="sysfs" ino=117 # avc: denied { read } for name="boot_mode" dev="sysfs" ino=117
# scontext=u:r:factory:s0 tcontext=u:object_r:sysfs:s0 # scontext=u:r:factory:s0 tcontext=u:object_r:sysfs:s0
# tclass=file permissive=0 # tclass=file permissive=0
allow factory sysfs:file rw_file_perms; #allow factory sysfs:file rw_file_perms;
# Date: WK16.30 # Date: WK16.30
#Purpose: For gps test #Purpose: For gps test
@ -259,7 +258,7 @@ allow factory flashlight_device:chr_file rw_file_perms;
# Date : WK16.48 # Date : WK16.48
# Purpose: For SmartPa speaker calibration # Purpose: For SmartPa speaker calibration
allow factory proc:dir search; allow factory proc:dir search;
allow factory proc:file {open read write}; #allow factory proc:file {open read write};
# Date: WK15.25 # Date: WK15.25
#Purpose: for unmount sdcardfs and stop services which are using data partition #Purpose: for unmount sdcardfs and stop services which are using data partition
@ -270,19 +269,19 @@ allow factory tmpfs:filesystem unmount;
allow factory sysfs:dir { read open }; allow factory sysfs:dir { read open };
allow factory sysfs_leds:dir search; allow factory sysfs_leds:dir search;
allow factory sysfs_leds:lnk_file read; allow factory sysfs_leds:lnk_file read;
allow factory sysfs_vibrator:file {open read write}; #allow factory sysfs_vibrator:file {open read write};
allow factory ion_device:chr_file { read open ioctl }; allow factory ion_device:chr_file { read open ioctl };
allow factory debugfs_ion:dir search; allow factory debugfs_ion:dir search;
allow factory proc:file ioctl; #allow factory proc:file ioctl;
# Date: WK17.27 # Date: WK17.27
# Purpose: STMicro NFC solution integration # Purpose: STMicro NFC solution integration
allow factory st21nfc_device:chr_file { open read getattr write ioctl }; allow factory st21nfc_device:chr_file { open read getattr write ioctl };
allow factory nfc_socket:dir search; allow factory nfc_socket:dir search;
allow factory vendor_file:file { getattr execute execute_no_trans read open }; #allow factory vendor_file:file { getattr execute execute_no_trans read open };
set_prop(factory,hwservicemanager_prop); set_prop(factory,hwservicemanager_prop);
hwbinder_use(factory); hwbinder_use(factory);
hal_client_domain(factory, hal_nfc); hal_client_domain(factory, hal_nfc);
allow factory debugfs_tracing:file { open write }; #allow factory debugfs_tracing:file { open write };
# Date : WK17.32 # Date : WK17.32
# Operation : O Migration # Operation : O Migration
@ -293,10 +292,9 @@ allow factory mtk_cmdq_device:chr_file { read ioctl open };
# Purpose: add selinux policy to stop 'ccci_fsd' for clear emmc in factory mode # Purpose: add selinux policy to stop 'ccci_fsd' for clear emmc in factory mode
set_prop(factory,ctl_ccci_fsd_prop); set_prop(factory,ctl_ccci_fsd_prop);
# Date : WK17.38 # Date : WK17.38
# Operation : O Migration # Operation : O Migration
# Purpose: Allow to access sysfs # Purpose: Allow to access sysfs
allow factory sysfs_therm:dir search; allow factory sysfs_therm:dir search;
allow factory sysfs_therm:file {open read write}; #allow factory sysfs_therm:file {open read write};

View File

@ -281,7 +281,7 @@
/dev/socket/soc_vt_svc(/.*)? u:object_r:soc_vt_svc_socket:s0 /dev/socket/soc_vt_svc(/.*)? u:object_r:soc_vt_svc_socket:s0
/dev/socket/soc_vt_tcv(/.*)? u:object_r:soc_vt_tcv_socket:s0 /dev/socket/soc_vt_tcv(/.*)? u:object_r:soc_vt_tcv_socket:s0
/dev/socket/sysctl(/.*)? u:object_r:sysctl_socket:s0 /dev/socket/sysctl(/.*)? u:object_r:sysctl_socket:s0
/dev/socket/vold(/.*)? u:object_r:vold_socket:s0 #/dev/socket/vold(/.*)? u:object_r:vold_socket:s0
/dev/socket/volte_vt(/.*)? u:object_r:volte_vt_socket:s0 /dev/socket/volte_vt(/.*)? u:object_r:volte_vt_socket:s0
/dev/socket/wpa_wlan0(/.*)? u:object_r:wpa_wlan0_socket:s0 /dev/socket/wpa_wlan0(/.*)? u:object_r:wpa_wlan0_socket:s0
/dev/stpant(/.*)? u:object_r:stpant_device:s0 /dev/stpant(/.*)? u:object_r:stpant_device:s0

View File

@ -53,6 +53,7 @@ allow fuelgauged self:netlink_route_socket { bind create getattr write nlmsg_rea
# Purpose : For fg daemon can access /data/FG folder # Purpose : For fg daemon can access /data/FG folder
file_type_auto_trans(fuelgauged, system_data_file, fuelgauged_file); file_type_auto_trans(fuelgauged, system_data_file, fuelgauged_file);
allow fuelgauged fuelgauged_file:file rw_file_perms; allow fuelgauged fuelgauged_file:file rw_file_perms;
typeattribute fuelgauged data_between_core_and_vendor_violators;
allow fuelgauged system_data_file:dir rw_dir_perms; allow fuelgauged system_data_file:dir rw_dir_perms;
# Data : WK16.21 # Data : WK16.21

View File

@ -27,6 +27,7 @@ init_daemon_domain(fuelgauged_nvram)
# Purpose : For fg daemon can access /data/FG folder # Purpose : For fg daemon can access /data/FG folder
file_type_auto_trans(fuelgauged_nvram, system_data_file, fuelgauged_nvram_file); file_type_auto_trans(fuelgauged_nvram, system_data_file, fuelgauged_nvram_file);
allow fuelgauged_nvram fuelgauged_nvram_file:file rw_file_perms; allow fuelgauged_nvram fuelgauged_nvram_file:file rw_file_perms;
typeattribute fuelgauged_nvram data_between_core_and_vendor_violators;
allow fuelgauged_nvram system_data_file:dir rw_dir_perms; allow fuelgauged_nvram system_data_file:dir rw_dir_perms;
# Data : WK16.21 # Data : WK16.21

View File

@ -26,6 +26,7 @@ allow fuelgauged_static kmsg_device:chr_file w_file_perms;
# Data : WK16.21 # Data : WK16.21
# Operation : New Feature # Operation : New Feature
# Purpose : For fg daemon can do nvram r/w to save car_tune_value # Purpose : For fg daemon can do nvram r/w to save car_tune_value
typeattribute fuelgauged_static data_between_core_and_vendor_violators;
allow fuelgauged_static nvdata_file:dir rw_dir_perms; allow fuelgauged_static nvdata_file:dir rw_dir_perms;
allow fuelgauged_static nvdata_file:file {rw_file_perms create_file_perms}; allow fuelgauged_static nvdata_file:file {rw_file_perms create_file_perms};
allow fuelgauged_static nvram_data_file:lnk_file rw_file_perms; allow fuelgauged_static nvram_data_file:lnk_file rw_file_perms;

View File

@ -21,6 +21,7 @@ allow kernel system_data_file:lnk_file r_file_perms;
# Date : WK14.31 # Date : WK14.31
# Operation : Migration # Operation : Migration
# Purpose : transit from kernel to aee_core_forwarder domain when executing aee_core_forwarder # Purpose : transit from kernel to aee_core_forwarder domain when executing aee_core_forwarder
typeattribute kernel system_executes_vendor_violators;
domain_auto_trans(kernel, aee_core_forwarder_exec, aee_core_forwarder) domain_auto_trans(kernel, aee_core_forwarder_exec, aee_core_forwarder)
# Date : WK14.43 # Date : WK14.43
@ -49,6 +50,7 @@ allow kernel proc_thermal:dir search;
# because wifi driver need to access nvram to get radio configuration. On Userdebug or Eng load, # because wifi driver need to access nvram to get radio configuration. On Userdebug or Eng load,
# factory engineers may need to update nvram by Egineer Mode, so we need to grant write permissions # factory engineers may need to update nvram by Egineer Mode, so we need to grant write permissions
# on Eng or Userdebug load # on Eng or Userdebug load
typeattribute kernel data_between_core_and_vendor_violators;
allow kernel nvram_data_file:dir search; allow kernel nvram_data_file:dir search;
allow kernel nvram_data_file:file r_file_perms; allow kernel nvram_data_file:file r_file_perms;
allow kernel nvram_data_file:lnk_file read; allow kernel nvram_data_file:lnk_file read;

View File

@ -10,5 +10,5 @@ allow keystore app_data_file:file write;
# Date : WK17.30 2017/07/25 # Date : WK17.30 2017/07/25
# Operation : keystore # Operation : keystore
# Purpose : Fix keystore boot selinux violation # Purpose : Fix keystore boot selinux violation
allow keystore debugfs_tracing:file write; #allow keystore debugfs_tracing:file write;
allow hal_keymaster_default debugfs_tracing:file write; allow hal_keymaster_default debugfs_tracing:file write;

View File

@ -36,7 +36,7 @@ allow mdlogger storage_file:file { create_file_perms };
# Allow read to sys/kernel/ccci/* files # Allow read to sys/kernel/ccci/* files
allow mdlogger sysfs_ccci:dir search; allow mdlogger sysfs_ccci:dir search;
allow mdlogger sysfs_ccci:file r_file_perms; #allow mdlogger sysfs_ccci:file r_file_perms;
# purpose: allow mdlogger to access storage in new version # purpose: allow mdlogger to access storage in new version
allow mdlogger media_rw_data_file:file { create_file_perms }; allow mdlogger media_rw_data_file:file { create_file_perms };

View File

@ -4,4 +4,4 @@
# Date : WK16.33 # Date : WK16.33
# Purpose: Allow to access ged for gralloc_extra functions # Purpose: Allow to access ged for gralloc_extra functions
allow mediaextractor proc_ged:file {open read write ioctl getattr}; #allow mediaextractor proc_ged:file {open read write ioctl getattr};

View File

@ -22,6 +22,7 @@ allow mediaserver lens_device:chr_file rw_file_perms;
# Purpose : Set audio driver permission to access SD card for debug purpose and accss NVRam. # Purpose : Set audio driver permission to access SD card for debug purpose and accss NVRam.
allow mediaserver sdcard_type:dir { w_dir_perms create }; allow mediaserver sdcard_type:dir { w_dir_perms create };
allow mediaserver sdcard_type:file create; allow mediaserver sdcard_type:file create;
typeattribute mediaserver data_between_core_and_vendor_violators;
allow mediaserver nvram_data_file:dir w_dir_perms; allow mediaserver nvram_data_file:dir w_dir_perms;
allow mediaserver nvram_data_file:file create_file_perms; allow mediaserver nvram_data_file:file create_file_perms;
allow mediaserver nvram_data_file:lnk_file read; allow mediaserver nvram_data_file:lnk_file read;
@ -304,6 +305,7 @@ allow mediaserver camera_tsf_device:chr_file rw_file_perms;
# Operation : N Migration # Operation : N Migration
# Purpose : add permission for thermal manager # Purpose : add permission for thermal manager
domain_auto_trans(mediaserver, thermal_manager_exec, thermal_manager) domain_auto_trans(mediaserver, thermal_manager_exec, thermal_manager)
typeattribute mediaserver system_executes_vendor_violators;
allow mediaserver thermal_manager_exec:file { read getattr open execute}; allow mediaserver thermal_manager_exec:file { read getattr open execute};
# Date : WK16.32 # Date : WK16.32
@ -345,7 +347,7 @@ allow mediaserver camera_owe_device:chr_file rw_file_perms;
# Date : WK17.27 # Date : WK17.27
# Operation : O Migration # Operation : O Migration
# Purpose : m4u Driver # Purpose : m4u Driver
allow mediaserver proc:file r_file_perms; #allow mediaserver proc:file r_file_perms;
# Date : WK17.29 # Date : WK17.29
# Operation : O Migration # Operation : O Migration

View File

@ -59,6 +59,7 @@ allow merged_hal_service init:unix_stream_socket connectto;
allow merged_hal_service property_socket:sock_file write; allow merged_hal_service property_socket:sock_file write;
allow merged_hal_service sysfs:file write; allow merged_hal_service sysfs:file write;
#allow merged_hal_service self:capability { fowner chown dac_override fsetid }; #allow merged_hal_service self:capability { fowner chown dac_override fsetid };
typeattribute merged_hal_service data_between_core_and_vendor_violators;
allow merged_hal_service system_data_file:dir create_file_perms; allow merged_hal_service system_data_file:dir create_file_perms;
allow merged_hal_service nvram_device:chr_file rw_file_perms; allow merged_hal_service nvram_device:chr_file rw_file_perms;
allow merged_hal_service pro_info_device:chr_file rw_file_perms; allow merged_hal_service pro_info_device:chr_file rw_file_perms;

View File

@ -39,6 +39,7 @@ allow meta_tst cache_block_device:blk_file rw_file_perms;
# Date: WK16.12 # Date: WK16.12
# Operation : Migration # Operation : Migration
# Purpose : for meta mode nvram # Purpose : for meta mode nvram
typeattribute meta_tst data_between_core_and_vendor_violators;
allow meta_tst nvram_data_file:dir create_dir_perms; allow meta_tst nvram_data_file:dir create_dir_perms;
allow meta_tst nvram_data_file:file create_file_perms; allow meta_tst nvram_data_file:file create_file_perms;
allow meta_tst nvram_data_file:lnk_file r_file_perms; allow meta_tst nvram_data_file:lnk_file r_file_perms;
@ -49,7 +50,6 @@ allow meta_tst nvram_device:chr_file rw_file_perms;
allow meta_tst nvram_device:blk_file rw_file_perms; allow meta_tst nvram_device:blk_file rw_file_perms;
allow meta_tst nvdata_device:blk_file rw_file_perms; allow meta_tst nvdata_device:blk_file rw_file_perms;
# Date: WK14.47 # Date: WK14.47
# Operation : Migration # Operation : Migration
# Purpose : for meta mode audio # Purpose : for meta mode audio
@ -63,7 +63,6 @@ set_prop(meta_tst, audiohal_prop);
allow meta_tst rtc_device:chr_file r_file_perms; allow meta_tst rtc_device:chr_file r_file_perms;
allow meta_tst MT_pmic_adc_cali_device:chr_file rw_file_perms; allow meta_tst MT_pmic_adc_cali_device:chr_file rw_file_perms;
# Date: WK14.45 # Date: WK14.45
# Operation : Migration # Operation : Migration
# Purpose : HDCP # Purpose : HDCP
@ -120,7 +119,6 @@ allow meta_tst FM50AF_device:chr_file rw_file_perms;
# Purpose : meta mode wifi # Purpose : meta mode wifi
allow meta_tst wmtWifi_device:chr_file w_file_perms; allow meta_tst wmtWifi_device:chr_file w_file_perms;
# Date: WK16.12 # Date: WK16.12
# Operation : Migration # Operation : Migration
# Purpose : meta mode BT # Purpose : meta mode BT
@ -157,8 +155,7 @@ allow meta_tst key_install_data_file:file create_file_perms;
# Date: WK14.51 # Date: WK14.51
# Purpose : set/get cryptfs cfg in sys env # Purpose : set/get cryptfs cfg in sys env
allow meta_tst misc_device:chr_file rw_file_perms; allow meta_tst misc_device:chr_file rw_file_perms;
allow meta_tst proc_lk_env:file rw_file_perms; #allow meta_tst proc_lk_env:file rw_file_perms;
# Purpose : FT_EMMC_OP_FORMAT_TCARD # Purpose : FT_EMMC_OP_FORMAT_TCARD
allow meta_tst block_device:blk_file getattr; allow meta_tst block_device:blk_file getattr;
@ -179,7 +176,6 @@ allow meta_tst self:process execmem;
allow meta_tst mtd_device:dir search; allow meta_tst mtd_device:dir search;
allow meta_tst mtd_device:chr_file rw_file_perms; allow meta_tst mtd_device:chr_file rw_file_perms;
# Date: WK15.38 # Date: WK15.38
# Purpose: M Migration for CCT linker fail # Purpose: M Migration for CCT linker fail
allow meta_tst sdcard_type:dir create_dir_perms; allow meta_tst sdcard_type:dir create_dir_perms;
@ -191,14 +187,14 @@ allow meta_tst storage_file:lnk_file read;
# Date: WK16.17 # Date: WK16.17
# Purpose: N Migration For ccci sysfs node # Purpose: N Migration For ccci sysfs node
allow meta_tst sysfs_ccci:dir search; allow meta_tst sysfs_ccci:dir search;
allow meta_tst sysfs_ccci:file r_file_perms; #allow meta_tst sysfs_ccci:file r_file_perms;
#Date: W16.17 #Date: W16.17
# Purpose: N Migration for meta_tst get com port type and uart port info # Purpose: N Migration for meta_tst get com port type and uart port info
# detail avc log: [ 11.751803] <1>.(1)[227:logd.auditd]type=1400 audit(1262304016.560:10): # detail avc log: [ 11.751803] <1>.(1)[227:logd.auditd]type=1400 audit(1262304016.560:10):
#avc: denied { read } for pid=203 comm="meta_tst" name="meta_com_type_info" dev= #avc: denied { read } for pid=203 comm="meta_tst" name="meta_com_type_info" dev=
#"sysfs" ino=11073 scontext=u:r:meta_tst:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 #"sysfs" ino=11073 scontext=u:r:meta_tst:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
allow meta_tst sysfs:file rw_file_perms; #allow meta_tst sysfs:file rw_file_perms;
#Date: W16.17 #Date: W16.17
# Purpose: N Migration For meta_tst load MD NVRAM database # Purpose: N Migration For meta_tst load MD NVRAM database
@ -259,7 +255,7 @@ allow meta_tst self:netlink_socket create_socket_perms_no_ioctl;
allow meta_tst self:rawip_socket create; allow meta_tst self:rawip_socket create;
allow meta_tst self:udp_socket create_socket_perms_no_ioctl; allow meta_tst self:udp_socket create_socket_perms_no_ioctl;
allow meta_tst self:rawip_socket create_socket_perms_no_ioctl; allow meta_tst self:rawip_socket create_socket_perms_no_ioctl;
allow meta_tst proc_ged:file r_file_perms; #allow meta_tst proc_ged:file r_file_perms;
allowxperm meta_tst self:udp_socket ioctl {SIOCSIFFLAGS SIOCGIFCONF SIOCIWFIRSTPRIV_08 SIOCIWFIRSTPRIV_09}; allowxperm meta_tst self:udp_socket ioctl {SIOCSIFFLAGS SIOCGIFCONF SIOCIWFIRSTPRIV_08 SIOCIWFIRSTPRIV_09};
allow meta_tst meta_tst:netlink_generic_socket { read write getattr bind create setopt }; allow meta_tst meta_tst:netlink_generic_socket { read write getattr bind create setopt };
@ -294,11 +290,11 @@ allow meta_tst system_data_file:lnk_file read;
allow meta_tst st21nfc_device:chr_file { open read write ioctl }; allow meta_tst st21nfc_device:chr_file { open read write ioctl };
allow meta_tst factory_data_file:sock_file { write unlink }; allow meta_tst factory_data_file:sock_file { write unlink };
allow meta_tst nfc_socket:dir search; allow meta_tst nfc_socket:dir search;
allow meta_tst vendor_file:file { getattr execute execute_no_trans read open }; #allow meta_tst vendor_file:file { getattr execute execute_no_trans read open };
set_prop(meta_tst,hwservicemanager_prop); set_prop(meta_tst,hwservicemanager_prop);
hwbinder_use(meta_tst); hwbinder_use(meta_tst);
hal_client_domain(meta_tst, hal_nfc); hal_client_domain(meta_tst, hal_nfc);
allow meta_tst debugfs_tracing:file { open write }; #allow meta_tst debugfs_tracing:file { open write };
# Date: W17.29 # Date: W17.29
# Purpose : Allow meta_tst to call vendor.mediatek.hardware.keymaster_attestation@1.0-service. # Purpose : Allow meta_tst to call vendor.mediatek.hardware.keymaster_attestation@1.0-service.
@ -308,7 +304,7 @@ hal_client_domain(meta_tst, mtk_hal_keyattestation)
# Operation : Android O migration # Operation : Android O migration
# Purpose : add sepolicy for accessing sysfs_leds # Purpose : add sepolicy for accessing sysfs_leds
allow meta_tst sysfs_leds:lnk_file read; allow meta_tst sysfs_leds:lnk_file read;
allow meta_tst sysfs_leds:file rw_file_perms; #allow meta_tst sysfs_leds:file rw_file_perms;
allow meta_tst sysfs_leds:dir r_dir_perms; allow meta_tst sysfs_leds:dir r_dir_perms;
# Date: WK17.43 # Date: WK17.43
@ -345,15 +341,15 @@ binder_call(meta_tst, mtk_hal_audio)
allow meta_tst mtk_hal_audio:binder call; allow meta_tst mtk_hal_audio:binder call;
allow meta_tst hal_audio_hwservice:hwservice_manager find; allow meta_tst hal_audio_hwservice:hwservice_manager find;
allow meta_tst mtk_audiohal_data_file:dir {read search open}; allow meta_tst mtk_audiohal_data_file:dir {read search open};
allow meta_tst proc:file {read open}; #allow meta_tst proc:file {read open};
allow meta_tst audio_device:chr_file rw_file_perms; allow meta_tst audio_device:chr_file rw_file_perms;
allow meta_tst audio_device:dir w_dir_perms; allow meta_tst audio_device:dir w_dir_perms;
allow meta_tst audiohal_prop:property_service set; allow meta_tst audiohal_prop:property_service set;
#Data:W1745 #Data:W1745
# Purpose : Allow meta_tst to open and read proc/bootprof # Purpose : Allow meta_tst to open and read proc/bootprof
allow meta_tst proc:file write; #allow meta_tst proc:file write;
allow meta_tst proc:file getattr; #allow meta_tst proc:file getattr;
# Date:W17.51 # Date:W17.51
# Operation : lbs hal # Operation : lbs hal

View File

@ -49,6 +49,7 @@ allow mnld lbs_hidl_service:unix_dgram_socket sendto;
allow mnld merged_hal_service:unix_dgram_socket sendto; allow mnld merged_hal_service:unix_dgram_socket sendto;
# Purpose : For access system data # Purpose : For access system data
typeattribute mnld data_between_core_and_vendor_violators;
allow mnld system_data_file:dir { write add_name }; allow mnld system_data_file:dir { write add_name };
allow mnld system_data_file:lnk_file read; allow mnld system_data_file:lnk_file read;
allow mnld bootdevice_block_device:blk_file rw_file_perms; allow mnld bootdevice_block_device:blk_file rw_file_perms;

View File

@ -1,14 +1,15 @@
#scp #scp
allow mobile_log_d sysfs_scp:file { open write }; #allow mobile_log_d sysfs_scp:file { open write };
allow mobile_log_d sysfs_scp:dir search; allow mobile_log_d sysfs_scp:dir search;
allow mobile_log_d scp_device:chr_file { read open }; allow mobile_log_d scp_device:chr_file { read open };
#sspm #sspm
allow mobile_log_d sysfs_sspm:file { open write }; #allow mobile_log_d sysfs_sspm:file { open write };
allow mobile_log_d sysfs_sspm:dir search; allow mobile_log_d sysfs_sspm:dir search;
allow mobile_log_d sspm_device:chr_file { read open }; allow mobile_log_d sspm_device:chr_file { read open };
#data/misc/mblog #data/misc/mblog
typeattribute mobile_log_d data_between_core_and_vendor_violators;
allow mobile_log_d logmisc_data_file:dir { relabelto create_dir_perms }; allow mobile_log_d logmisc_data_file:dir { relabelto create_dir_perms };
allow mobile_log_d logmisc_data_file:file create_file_perms; allow mobile_log_d logmisc_data_file:file create_file_perms;

View File

@ -17,6 +17,8 @@ type MPED_exec, exec_type, file_type, vendor_file_type;
init_daemon_domain(MPED) init_daemon_domain(MPED)
net_domain(MPED) net_domain(MPED)
typeattribute MPED data_between_core_and_vendor_violators;
# Date : WK15.29 # Date : WK15.29
# Operation : Feature Developing # Operation : Feature Developing
# Purpose : Setup Connection with GPS for sensor aiding data exchange # Purpose : Setup Connection with GPS for sensor aiding data exchange

View File

@ -34,6 +34,7 @@ allow mtk_agpsd mnt_user_file:dir create_dir_perms;
allow mtk_agpsd tmpfs:lnk_file create_file_perms; allow mtk_agpsd tmpfs:lnk_file create_file_perms;
allow mtk_agpsd storage_file:lnk_file create_file_perms; allow mtk_agpsd storage_file:lnk_file create_file_perms;
allow mtk_agpsd mnt_user_file:lnk_file create_file_perms; allow mtk_agpsd mnt_user_file:lnk_file create_file_perms;
typeattribute mtk_agpsd data_between_core_and_vendor_violators;
allow mtk_agpsd media_rw_data_file:dir { search write add_name read open }; allow mtk_agpsd media_rw_data_file:dir { search write add_name read open };
allow mtk_agpsd media_rw_data_file:file { create open append read getattr }; allow mtk_agpsd media_rw_data_file:file { create open append read getattr };

View File

@ -47,6 +47,7 @@ allow mtk_hal_audio nvdata_file:dir w_dir_perms;
allow mtk_hal_audio nvdata_file:file create_file_perms; allow mtk_hal_audio nvdata_file:file create_file_perms;
allow mtk_hal_audio sdcard_type:dir remove_name; allow mtk_hal_audio sdcard_type:dir remove_name;
allow mtk_hal_audio sdcard_type:file unlink; allow mtk_hal_audio sdcard_type:file unlink;
typeattribute mtk_hal_audio data_between_core_and_vendor_violators;
allow mtk_hal_audio system_data_file:lnk_file read; allow mtk_hal_audio system_data_file:lnk_file read;
# Date : WK14.34 # Date : WK14.34

View File

@ -34,6 +34,7 @@ userdebug_or_eng(`
') ')
# Logging for backward compatibility # Logging for backward compatibility
typeattribute mtk_hal_bluetooth data_between_core_and_vendor_violators;
allow mtk_hal_bluetooth bluetooth_data_file:dir ra_dir_perms; allow mtk_hal_bluetooth bluetooth_data_file:dir ra_dir_perms;
allow mtk_hal_bluetooth bluetooth_data_file:file create_file_perms; allow mtk_hal_bluetooth bluetooth_data_file:file create_file_perms;

View File

@ -29,7 +29,6 @@ vndbinder_use(mtk_hal_camera)
allow mtk_hal_camera hwservicemanager_prop:file { open read getattr }; allow mtk_hal_camera hwservicemanager_prop:file { open read getattr };
# ----------------------------------- # -----------------------------------
# Purpose: Allow camerahalserver to perform binder IPC to servers and callbacks. # Purpose: Allow camerahalserver to perform binder IPC to servers and callbacks.
# ----------------------------------- # -----------------------------------
@ -119,7 +118,6 @@ allow mtk_hal_camera CAM_CAL_DRV_device:chr_file rw_file_perms;
allow mtk_hal_camera CAM_CAL_DRV1_device:chr_file rw_file_perms; allow mtk_hal_camera CAM_CAL_DRV1_device:chr_file rw_file_perms;
allow mtk_hal_camera CAM_CAL_DRV2_device:chr_file rw_file_perms; allow mtk_hal_camera CAM_CAL_DRV2_device:chr_file rw_file_perms;
# ----------------------------------- # -----------------------------------
# Purpose: Other device drivers used by camera # Purpose: Other device drivers used by camera
# ----------------------------------- # -----------------------------------
@ -127,7 +125,6 @@ allow mtk_hal_camera ion_device:chr_file rw_file_perms;
allow mtk_hal_camera sw_sync_device:chr_file getattr; allow mtk_hal_camera sw_sync_device:chr_file getattr;
allow mtk_hal_camera MTK_SMI_device:chr_file r_file_perms; allow mtk_hal_camera MTK_SMI_device:chr_file r_file_perms;
# ----------------------------------- # -----------------------------------
# Purpose: Filesystem in Userspace (FUSE) # Purpose: Filesystem in Userspace (FUSE)
# - sdcard access (buffer dump for EM mode) # - sdcard access (buffer dump for EM mode)
@ -135,7 +132,6 @@ allow mtk_hal_camera MTK_SMI_device:chr_file r_file_perms;
allow mtk_hal_camera fuse:dir { search read write }; allow mtk_hal_camera fuse:dir { search read write };
allow mtk_hal_camera fuse:file rw_file_perms; allow mtk_hal_camera fuse:file rw_file_perms;
# ----------------------------------- # -----------------------------------
# Purpose: Storage access # Purpose: Storage access
# ----------------------------------- # -----------------------------------
@ -148,20 +144,16 @@ allow mtk_hal_camera nvram_data_file:file { write getattr setattr read create op
allow mtk_hal_camera nvram_device:chr_file rw_file_perms; allow mtk_hal_camera nvram_device:chr_file rw_file_perms;
allow mtk_hal_camera self:netlink_kobject_uevent_socket { create setopt bind }; allow mtk_hal_camera self:netlink_kobject_uevent_socket { create setopt bind };
## Date : WK14.XX-15.XX ## Date : WK14.XX-15.XX
## sdcard access - dump for debug ## sdcard access - dump for debug
allow mtk_hal_camera sdcard_type:dir { write add_name create }; allow mtk_hal_camera sdcard_type:dir { write add_name create };
allow mtk_hal_camera sdcard_type:file { append create getattr }; allow mtk_hal_camera sdcard_type:file { append create getattr };
# ----------------------------------- # -----------------------------------
# Purpose: property access # Purpose: property access
# ----------------------------------- # -----------------------------------
allow mtk_hal_camera mtkcam_prop:file { open read getattr }; allow mtk_hal_camera mtkcam_prop:file { open read getattr };
# ----------------------------------- # -----------------------------------
# Android O # Android O
# Purpose: Shell Debugging # Purpose: Shell Debugging
@ -171,7 +163,6 @@ allow mtk_hal_camera mtkcam_prop:file { open read getattr };
allow mtk_hal_camera shell:unix_stream_socket { read write }; allow mtk_hal_camera shell:unix_stream_socket { read write };
allow mtk_hal_camera shell:fifo_file write; allow mtk_hal_camera shell:fifo_file write;
# ----------------------------------- # -----------------------------------
# Android O # Android O
# Purpose: AEE Debugging # Purpose: AEE Debugging
@ -188,7 +179,6 @@ allow mtk_hal_camera dumpstate:fifo_file write;
allow mtk_hal_camera aee_exp_data_file:dir { w_dir_perms }; allow mtk_hal_camera aee_exp_data_file:dir { w_dir_perms };
allow mtk_hal_camera aee_exp_data_file:file { create_file_perms }; allow mtk_hal_camera aee_exp_data_file:file { create_file_perms };
# ----------------------------------- # -----------------------------------
# Android O # Android O
# Purpose: Debugging # Purpose: Debugging
@ -196,7 +186,6 @@ allow mtk_hal_camera aee_exp_data_file:file { create_file_perms };
# Purpose: libmemunreachable.so/GetUnreachableMemory() # Purpose: libmemunreachable.so/GetUnreachableMemory()
allow mtk_hal_camera self:process { ptrace }; allow mtk_hal_camera self:process { ptrace };
################################################################################ ################################################################################
# Date : WK14.XX-15.XX # Date : WK14.XX-15.XX
# Operation : Copy from Media server # Operation : Copy from Media server
@ -206,7 +195,6 @@ allow mtk_hal_camera nvdata_file:dir { write search add_name };
allow mtk_hal_camera nvdata_file:file { read write getattr setattr open create }; allow mtk_hal_camera nvdata_file:file { read write getattr setattr open create };
allow mtk_hal_camera proc_meminfo:file { read getattr open }; allow mtk_hal_camera proc_meminfo:file { read getattr open };
## Purpose : for low SD card latency issue ## Purpose : for low SD card latency issue
allow mtk_hal_camera sysfs_lowmemorykiller:file { read open }; allow mtk_hal_camera sysfs_lowmemorykiller:file { read open };
@ -224,6 +212,7 @@ allow mtk_hal_camera untrusted_app:dir search;
allow mtk_hal_camera offloadservice_device:chr_file rw_file_perms; allow mtk_hal_camera offloadservice_device:chr_file rw_file_perms;
## Purpose: for camera middleware dump image buffer to sdcard & audio frameworks dump ## Purpose: for camera middleware dump image buffer to sdcard & audio frameworks dump
typeattribute mtk_hal_camera data_between_core_and_vendor_violators;
allow mtk_hal_camera system_data_file:dir write; allow mtk_hal_camera system_data_file:dir write;
allow mtk_hal_camera storage_file:lnk_file {read write}; allow mtk_hal_camera storage_file:lnk_file {read write};
allow mtk_hal_camera mnt_user_file:dir {write read search}; allow mtk_hal_camera mnt_user_file:dir {write read search};
@ -260,7 +249,6 @@ allow mtk_hal_camera proc_ged:file {open read write ioctl getattr};
## Purpose: Allow to call hal_graphics_allocator binder. ## Purpose: Allow to call hal_graphics_allocator binder.
allow mtk_hal_camera system_data_file:lnk_file read; allow mtk_hal_camera system_data_file:lnk_file read;
allow mtk_hal_camera debugfs_tracing:file { write open }; allow mtk_hal_camera debugfs_tracing:file { write open };
## Purpose : camera3 IT/CTS ## Purpose : camera3 IT/CTS

View File

@ -29,6 +29,7 @@ allow mtk_hal_power sysfs_devices_system_cpu:file write;
allow mtk_hal_power debugfs_ged:dir search; allow mtk_hal_power debugfs_ged:dir search;
allow mtk_hal_power debugfs_ged:file { getattr open read write }; allow mtk_hal_power debugfs_ged:file { getattr open read write };
typeattribute mtk_hal_power data_between_core_and_vendor_violators;
allow mtk_hal_power system_data_file:dir { create write add_name }; allow mtk_hal_power system_data_file:dir { create write add_name };
# proc_thermal # proc_thermal

View File

@ -5,6 +5,7 @@
# Date : WK14.37 # Date : WK14.37
# Operation : Migration # Operation : Migration
# Purpose : for opetator # Purpose : for opetator
typeattribute mtkbootanimation data_between_core_and_vendor_violators;
allow mtkbootanimation custom_file:dir search; allow mtkbootanimation custom_file:dir search;
allow mtkbootanimation custom_file:file r_file_perms; allow mtkbootanimation custom_file:file r_file_perms;
allow mtkbootanimation bootani_prop:property_service set; allow mtkbootanimation bootani_prop:property_service set;
@ -16,12 +17,12 @@ allow mtkbootanimation qemu_pipe_device:chr_file rw_file_perms;
# Date : WK16.33 # Date : WK16.33
# Purpose: Allow to access ged for gralloc_extra functions # Purpose: Allow to access ged for gralloc_extra functions
allow mtkbootanimation proc_ged:file {open read write ioctl getattr}; #allow mtkbootanimation proc_ged:file {open read write ioctl getattr};
# Date : WK14.31 # Date : WK14.31
# Operation : Migration # Operation : Migration
# Purpose : access to sec mem proc interface. # Purpose : access to sec mem proc interface.
allow mtkbootanimation proc_secmem:file { read open}; #allow mtkbootanimation proc_secmem:file { read open};
# Date : WK14.36 # Date : WK14.36
# Operation : Migration # Operation : Migration
@ -52,4 +53,4 @@ allow mtkbootanimation guiext-server_service:service_manager find;
# Operation : Migration # Operation : Migration
# Purpose : FPSGO integration # Purpose : FPSGO integration
allow mtkbootanimation proc_perfmgr:dir {search read}; allow mtkbootanimation proc_perfmgr:dir {search read};
allow mtkbootanimation proc_perfmgr:file {open read ioctl}; #allow mtkbootanimation proc_perfmgr:file {open read ioctl};

View File

@ -45,6 +45,7 @@ allow rild bluetooth_efs_file:dir r_dir_perms;
# Allow access permission to dir/files # Allow access permission to dir/files
# (radio data/system data/proc/etc) # (radio data/system data/proc/etc)
typeattribute rild data_between_core_and_vendor_violators;
allow rild radio_data_file:dir rw_dir_perms; allow rild radio_data_file:dir rw_dir_perms;
allow rild radio_data_file:file create_file_perms; allow rild radio_data_file:file create_file_perms;
allow rild sdcard_type:dir r_dir_perms; allow rild sdcard_type:dir r_dir_perms;

View File

@ -52,6 +52,7 @@ allow mtkrild bluetooth_efs_file:dir r_dir_perms;
# Allow access permission to dir/files # Allow access permission to dir/files
# (radio data/system data/proc/etc) # (radio data/system data/proc/etc)
typeattribute mtkrild data_between_core_and_vendor_violators;
allow mtkrild radio_data_file:dir rw_dir_perms; allow mtkrild radio_data_file:dir rw_dir_perms;
allow mtkrild radio_data_file:file create_file_perms; allow mtkrild radio_data_file:file create_file_perms;
allow mtkrild sdcard_type:dir r_dir_perms; allow mtkrild sdcard_type:dir r_dir_perms;

View File

@ -1,7 +1,6 @@
# ============================================== # ==============================================
# Policy File of /vendor/bin/nvram_agent_binder Executable File # Policy File of /vendor/bin/nvram_agent_binder Executable File
# ============================================== # ==============================================
# Type Declaration # Type Declaration
# ============================================== # ==============================================
@ -18,7 +17,6 @@ init_daemon_domain(nvram_agent_binder)
# Purpose : ensure nvram user can access nvram file normally. # Purpose : ensure nvram user can access nvram file normally.
allow nvram_agent_binder nvram_agent_service:service_manager add; allow nvram_agent_binder nvram_agent_service:service_manager add;
# Date : WK14.43 # Date : WK14.43
# Operation : 2rd Selinux Migration # Operation : 2rd Selinux Migration
# Purpose : the role of nvram_agent_binder is same with nvram_daemon except property_set & exect permission # Purpose : the role of nvram_agent_binder is same with nvram_daemon except property_set & exect permission
@ -42,6 +40,7 @@ allow nvram_agent_binder init:unix_stream_socket connectto;
allow nvram_agent_binder property_socket:sock_file write; allow nvram_agent_binder property_socket:sock_file write;
allow nvram_agent_binder sysfs:file write; allow nvram_agent_binder sysfs:file write;
#allow nvram_agent_binder self:capability { fowner chown dac_override fsetid }; #allow nvram_agent_binder self:capability { fowner chown dac_override fsetid };
typeattribute nvram_agent_binder data_between_core_and_vendor_violators;
allow nvram_agent_binder system_data_file:dir create_file_perms; allow nvram_agent_binder system_data_file:dir create_file_perms;
# Purpose: for backup # Purpose: for backup
@ -57,7 +56,6 @@ allow nvram_agent_binder mtd_device:chr_file rw_file_perms;
#for nvram agent hidl #for nvram agent hidl
allow nvram_agent_binder hwservicemanager_prop:file r_file_perms; allow nvram_agent_binder hwservicemanager_prop:file r_file_perms;
#for nvram hidl client support #for nvram hidl client support
allow nvram_agent_binder sysfs:file { read open }; allow nvram_agent_binder sysfs:file { read open };
allow nvram_agent_binder system_data_file:lnk_file read; allow nvram_agent_binder system_data_file:lnk_file read;

View File

@ -70,6 +70,7 @@ allow nvram_daemon proc_lk_env:file rw_file_perms;
# Purpose: for workaround # Purpose: for workaround
# Todo: Remove this policy # Todo: Remove this policy
typeattribute nvram_daemon data_between_core_and_vendor_violators;
allow nvram_daemon system_data_file:dir write; allow nvram_daemon system_data_file:dir write;
# Purpose: property set # Purpose: property set

View File

@ -72,7 +72,7 @@ allow platform_app aee_aed:unix_stream_socket connectto;
# Date : WK17.31 # Date : WK17.31
# Operation : O Migration # Operation : O Migration
# Purpose : m4u Driver # Purpose : m4u Driver
allow platform_app proc:file r_file_perms; #allow platform_app proc:file r_file_perms;
# Date : WK17.44 # Date : WK17.44
# Operation : O Migration # Operation : O Migration

View File

@ -160,7 +160,7 @@ allow radio hal_nfc_hwservice:hwservice_manager find;
binder_call(radio, hal_nfc) binder_call(radio, hal_nfc)
binder_call(hal_nfc, radio) binder_call(hal_nfc, radio)
hwbinder_use(radio); hwbinder_use(radio);
allow radio debugfs_tracing:file write; #allow radio debugfs_tracing:file write;
#hal_client_domain(radio, hal_nfc) #hal_client_domain(radio, hal_nfc)
typeattribute radio halclientdomain; typeattribute radio halclientdomain;
typeattribute radio hal_nfc_client; typeattribute radio hal_nfc_client;

View File

@ -25,6 +25,7 @@ file_type_auto_trans(stp_dump3,system_data_file,stp_dump_data_file)
allow stp_dump3 self:netlink_socket { read write getattr bind create setopt }; allow stp_dump3 self:netlink_socket { read write getattr bind create setopt };
allow stp_dump3 self:netlink_generic_socket { read write getattr bind create setopt }; allow stp_dump3 self:netlink_generic_socket { read write getattr bind create setopt };
#allow stp_dump3 media_rw_data_file:sock_file { write create unlink setattr }; #allow stp_dump3 media_rw_data_file:sock_file { write create unlink setattr };
typeattribute stp_dump3 data_between_core_and_vendor_violators;
allow stp_dump3 media_rw_data_file:dir { add_name setattr }; allow stp_dump3 media_rw_data_file:dir { add_name setattr };
allow stp_dump3 media_rw_data_file:dir rmdir; allow stp_dump3 media_rw_data_file:dir rmdir;
allow stp_dump3 media_rw_data_file:dir { open read write create setattr getattr add_name remove_name search}; allow stp_dump3 media_rw_data_file:dir { open read write create setattr getattr add_name remove_name search};

View File

@ -10,7 +10,7 @@ allow surfaceflinger debug_prop:property_service set;
# Date : WK16.33 # Date : WK16.33
# Purpose: Allow to access ged for gralloc_extra functions # Purpose: Allow to access ged for gralloc_extra functions
allow surfaceflinger proc_ged:file {open read write ioctl getattr}; #allow surfaceflinger proc_ged:file {open read write ioctl getattr};
# Date : W16.42 # Date : W16.42
# Operation : Integration # Operation : Integration
@ -20,16 +20,16 @@ allow surfaceflinger gpu_device:dir search;
# Date : WK17.12 # Date : WK17.12
# Purpose: Fix bootup fail # Purpose: Fix bootup fail
allow surfaceflinger proc:file r_file_perms; #allow surfaceflinger proc:file r_file_perms;
#============= surfaceflinger ============== #============= surfaceflinger ==============
allow surfaceflinger debugfs_ion:dir search; allow surfaceflinger debugfs_ion:dir search;
#============= surfaceflinger ============== #============= surfaceflinger ==============
allow surfaceflinger debugfs_tracing:file write; #allow surfaceflinger debugfs_tracing:file write;
#============= surfaceflinger ============== #============= surfaceflinger ==============
allow surfaceflinger debugfs_tracing:file open; #allow surfaceflinger debugfs_tracing:file open;
# Date : WK17.30 # Date : WK17.30
# Operation : O Migration # Operation : O Migration
@ -56,7 +56,7 @@ allow surfaceflinger mtkbootanimation:file { read getattr open };
# Operation : Migration # Operation : Migration
# Purpose: Allow to access perfmgr # Purpose: Allow to access perfmgr
allow surfaceflinger proc_perfmgr:dir {read search}; allow surfaceflinger proc_perfmgr:dir {read search};
allow surfaceflinger proc_perfmgr:file {open read ioctl}; #allow surfaceflinger proc_perfmgr:file {open read ioctl};
# Date : WK17.43 # Date : WK17.43
# Operation : Debug # Operation : Debug

View File

@ -14,9 +14,10 @@ allow system_server wmtWifi_device:chr_file w_file_perms;
#allow system_server gps_data_file:dir rw_dir_perms; #allow system_server gps_data_file:dir rw_dir_perms;
# /proc access. # /proc access.
allow system_server proc:file w_file_perms; #allow system_server proc:file w_file_perms;
# /data/dontpanic access. # /data/dontpanic access.
typeattribute system_server data_between_core_and_vendor_violators;
allow system_server dontpanic_data_file:dir search; allow system_server dontpanic_data_file:dir search;
# /data/agps_supl access. # /data/agps_supl access.
@ -35,7 +36,7 @@ allow system_server zygote:binder impersonate;
allow system_server ctl_bootanim_prop:property_service set; allow system_server ctl_bootanim_prop:property_service set;
# After connected to DHCPv6, enabled 6to4 IPv6 AP to get property. # After connected to DHCPv6, enabled 6to4 IPv6 AP to get property.
allow system_server proc_net:file w_file_perms; #allow system_server proc_net:file w_file_perms;
r_dir_file(system_server, wide_dhcpv6_data_file) r_dir_file(system_server, wide_dhcpv6_data_file)
# For dumpsys. # For dumpsys.
@ -72,7 +73,7 @@ allow system_server sysfs_dcm:file rw_file_perms;
# Date : WK16.33 # Date : WK16.33
# Purpose: Allow to access ged for gralloc_extra functions # Purpose: Allow to access ged for gralloc_extra functions
allow system_server proc_ged:file {open read write ioctl getattr}; #allow system_server proc_ged:file {open read write ioctl getattr};
# Date : WK16.36 # Date : WK16.36
# Purpose: Allow to set property log.tag.WifiHW to control log level of WifiHW # Purpose: Allow to set property log.tag.WifiHW to control log level of WifiHW
@ -106,7 +107,7 @@ allow system_server ttyMT_device:chr_file rw_file_perms;
# Operation : thermal hal Feature developing # Operation : thermal hal Feature developing
# Purpose : thermal hal interface permission # Purpose : thermal hal interface permission
allow system_server proc_mtktz:dir search; allow system_server proc_mtktz:dir search;
allow system_server proc_mtktz:file r_file_perms; #allow system_server proc_mtktz:file r_file_perms;
# Date : WK16.46 # Date : WK16.46
# Operation: PowerManager set persist.meta.connecttype property # Operation: PowerManager set persist.meta.connecttype property
@ -204,7 +205,6 @@ allow system_server dhcp_data_file:file create_file_perms;
# Purpose : lbs hidl interface permission # Purpose : lbs hidl interface permission
hal_client_domain(system_server, mtk_hal_lbs) hal_client_domain(system_server, mtk_hal_lbs)
# Date : WK17.12 # Date : WK17.12
# Operation : MT6799 SQC # Operation : MT6799 SQC
# Purpose : Change thermal config # Purpose : Change thermal config
@ -215,4 +215,4 @@ allow system_server mtk_thermal_config_prop:property_service set;
# Operation : Migration # Operation : Migration
# Purpose : perfmgr permission # Purpose : perfmgr permission
allow system_server proc_perfmgr:dir {read search}; allow system_server proc_perfmgr:dir {read search};
allow system_server proc_perfmgr:file {open read ioctl}; #allow system_server proc_perfmgr:file {open read ioctl};

View File

@ -18,6 +18,7 @@ allow thermal_manager proc_thermal:dir search;
allow thermal_manager proc_mtkcooler:file rw_file_perms; allow thermal_manager proc_mtkcooler:file rw_file_perms;
allow thermal_manager proc_mtktz:file rw_file_perms; allow thermal_manager proc_mtktz:file rw_file_perms;
allow thermal_manager proc_thermal:file rw_file_perms; allow thermal_manager proc_thermal:file rw_file_perms;
typeattribute thermal_manager data_between_core_and_vendor_violators;
allow thermal_manager system_data_file:dir { write add_name }; allow thermal_manager system_data_file:dir { write add_name };
#allow thermal_manager self:capability { fowner chown fsetid dac_override }; #allow thermal_manager self:capability { fowner chown fsetid dac_override };
@ -32,7 +33,6 @@ allow thermal_manager mediaserver:fifo_file { read write };
#allow thermal_manager pq:fd use; #allow thermal_manager pq:fd use;
allow thermal_manager mediaserver:tcp_socket { read write }; allow thermal_manager mediaserver:tcp_socket { read write };
# Date : WK16.30 # Date : WK16.30
# Operation : Migration # Operation : Migration
# Purpose : Use file_type_auto_trans to specify label to avoid violated(never allow) # Purpose : Use file_type_auto_trans to specify label to avoid violated(never allow)

View File

@ -37,7 +37,9 @@ allow untrusted_app_25 sysfs_therm:file { getattr open read };
# Operation: Development RenderScript opt # Operation: Development RenderScript opt
# Purpose : Allow RenderScript Opt RS2CL to invoke standalone executable # Purpose : Allow RenderScript Opt RS2CL to invoke standalone executable
# properly for thermal tests at OEM/ODM. # properly for thermal tests at OEM/ODM.
typeattribute untrusted_app_25 system_executes_vendor_violators;
allow untrusted_app_25 vendor_file:file execute_no_trans; allow untrusted_app_25 vendor_file:file execute_no_trans;
typeattribute untrusted_app system_executes_vendor_violators;
allow untrusted_app vendor_file:file execute_no_trans; allow untrusted_app vendor_file:file execute_no_trans;
# Date : WK17.39 # Date : WK17.39

View File

@ -12,6 +12,7 @@ allow vold iso9660:filesystem unmount;
# Date : WK16.19 # Date : WK16.19
# Operation : Migration # Operation : Migration
# Purpose : dotrim for the mountpoints in fstab # Purpose : dotrim for the mountpoints in fstab
typeattribute vold data_between_core_and_vendor_violators;
allow vold nvdata_file:dir r_dir_perms; allow vold nvdata_file:dir r_dir_perms;
allow vold protect_f_data_file:dir r_dir_perms; allow vold protect_f_data_file:dir r_dir_perms;
allow vold protect_s_data_file:dir r_dir_perms; allow vold protect_s_data_file:dir r_dir_perms;

View File

@ -4,7 +4,7 @@
# Date : WK16.33 # Date : WK16.33
# Purpose: Allow to access ged for gralloc_extra functions # Purpose: Allow to access ged for gralloc_extra functions
allow zygote proc_ged:file {open read write ioctl getattr}; #allow zygote proc_ged:file {open read write ioctl getattr};
# Date : WK17.02 # Date : WK17.02
# Purpose: Allow to access gpu for memtrack functions # Purpose: Allow to access gpu for memtrack functions

View File

@ -100,13 +100,13 @@ allow aee_aed dumpstate:unix_stream_socket { read write ioctl };
allow aee_aed dumpstate:dir search; allow aee_aed dumpstate:dir search;
allow aee_aed dumpstate:file r_file_perms; allow aee_aed dumpstate:file r_file_perms;
allow aee_aed proc:file rw_file_perms; #allow aee_aed proc:file rw_file_perms;
allow aee_aed logdr_socket:sock_file write; allow aee_aed logdr_socket:sock_file write;
allow aee_aed logd:unix_stream_socket connectto; allow aee_aed logd:unix_stream_socket connectto;
# allow aee_aed system_ndebug_socket:sock_file write; mask for never allow rule # allow aee_aed system_ndebug_socket:sock_file write; mask for never allow rule
# vibrator # vibrator
allow aee_aed sysfs_vibrator:file w_file_perms; #allow aee_aed sysfs_vibrator:file w_file_perms;
# Data : 2017/03/22 # Data : 2017/03/22
# Operation : add NE flow rule for Android O # Operation : add NE flow rule for Android O
@ -133,4 +133,4 @@ allow aee_aed crash_dump:file r_file_perms;
# [ 217.196275] <0>.(0)[209:logd.auditd]type=1400 audit(1262304561.676:377): avc: denied { read } # [ 217.196275] <0>.(0)[209:logd.auditd]type=1400 audit(1262304561.676:377): avc: denied { read }
# for pid=1486 comm="aee_aed" name="atag,devinfo" dev="sysfs" ino=2349 scontext=u:r:aee_aed:s0 # for pid=1486 comm="aee_aed" name="atag,devinfo" dev="sysfs" ino=2349 scontext=u:r:aee_aed:s0
# tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 # tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
allow aee_aed sysfs:file r_file_perms; #allow aee_aed sysfs:file r_file_perms;

View File

@ -24,7 +24,6 @@ binder_call(audiocmdservice_atci, audioserver)
allow audiocmdservice_atci audioserver:dir w_dir_perms; allow audiocmdservice_atci audioserver:dir w_dir_perms;
allow audiocmdservice_atci audioserver_service:service_manager find; allow audiocmdservice_atci audioserver_service:service_manager find;
# Access to fuse file system # Access to fuse file system
allow audiocmdservice_atci sdcard_type:file create_file_perms; allow audiocmdservice_atci sdcard_type:file create_file_perms;
allow audiocmdservice_atci sdcard_type:dir w_dir_perms; allow audiocmdservice_atci sdcard_type:dir w_dir_perms;
@ -33,8 +32,6 @@ allow audiocmdservice_atci sdcard_type:dir w_dir_perms;
allow audiocmdservice_atci media_rw_data_file:dir create_dir_perms; allow audiocmdservice_atci media_rw_data_file:dir create_dir_perms;
allow audiocmdservice_atci media_rw_data_file:file create_file_perms; allow audiocmdservice_atci media_rw_data_file:file create_file_perms;
#To access the file at /dev/kmsg #To access the file at /dev/kmsg
allow audiocmdservice_atci kmsg_device:chr_file w_file_perms; allow audiocmdservice_atci kmsg_device:chr_file w_file_perms;
@ -48,4 +45,4 @@ allow radio audiocmdservice_atci_exec:file getattr;
#Android O porting #Android O porting
hwbinder_use(audiocmdservice_atci) hwbinder_use(audiocmdservice_atci)
get_prop(audiocmdservice_atci, hwservicemanager_prop); get_prop(audiocmdservice_atci, hwservicemanager_prop);
allow audiocmdservice_atci debugfs_tracing:file rw_file_perms; #allow audiocmdservice_atci debugfs_tracing:file rw_file_perms;

View File

@ -23,7 +23,7 @@ allow boot_logo_updater init:unix_stream_socket connectto;
allow boot_logo_updater property_socket:sock_file write; allow boot_logo_updater property_socket:sock_file write;
#allow boot_logo_updater self:capability dac_override; #allow boot_logo_updater self:capability dac_override;
# To access some boot_mode infornation # To access some boot_mode infornation
allow boot_logo_updater sysfs:file rw_file_perms; #allow boot_logo_updater sysfs:file rw_file_perms;
# To access directory /dev/block/mmcblk0 or /dev/block/sdc # To access directory /dev/block/mmcblk0 or /dev/block/sdc
allow boot_logo_updater block_device:dir search; allow boot_logo_updater block_device:dir search;
allow boot_logo_updater graphics_device:dir search; allow boot_logo_updater graphics_device:dir search;
@ -40,10 +40,10 @@ allow boot_logo_updater sysfs:dir read;
# sanity fail for ALPS03604686: # sanity fail for ALPS03604686:
# for path="/sys/firmware/devicetree/base/firmware/android/fstab" andfor name = "cmdline" and "mtdblock14" # for path="/sys/firmware/devicetree/base/firmware/android/fstab" andfor name = "cmdline" and "mtdblock14"
allow boot_logo_updater mtd_device:blk_file read; allow boot_logo_updater mtd_device:blk_file read;
allow boot_logo_updater proc:file read; #allow boot_logo_updater proc:file read;
allow boot_logo_updater sysfs:dir open; allow boot_logo_updater sysfs:dir open;
# for path="/proc/cmdline and ="/dev/block/mtdblock14" # for path="/proc/cmdline and ="/dev/block/mtdblock14"
allow boot_logo_updater proc:file open; #allow boot_logo_updater proc:file open;
allow boot_logo_updater system_data_file:dir write; allow boot_logo_updater system_data_file:dir write;
allow boot_logo_updater mtd_device:blk_file open; allow boot_logo_updater mtd_device:blk_file open;

View File

@ -42,10 +42,8 @@ allow bootanim surfaceflinger:fifo_file rw_file_perms;
allow bootanim gpu_device:dir search; allow bootanim gpu_device:dir search;
#============= bootanim ==============
#allow bootanim debugfs_tracing:file write;
#============= bootanim ============== #============= bootanim ==============
allow bootanim debugfs_tracing:file write; #allow bootanim debugfs_tracing:file open;
#============= bootanim ==============
allow bootanim debugfs_tracing:file open;

View File

@ -38,4 +38,5 @@ allow cmddumper media_rw_data_file:dir { create_dir_perms };
allow cmddumper file_contexts_file:file { read getattr open }; allow cmddumper file_contexts_file:file { read getattr open };
# purpose: access /sys/devices/virtual/BOOT/BOOT/boot/boot_mode # purpose: access /sys/devices/virtual/BOOT/BOOT/boot/boot_mode
allow cmddumper sysfs:file { read open }; #allow cmddumper sysfs:file { read open };

View File

@ -3,4 +3,4 @@
# ====================== # ======================
# =======drmserver====== # =======drmserver======
allow drmserver sysfs:file { read open }; #allow drmserver sysfs:file { read open };

View File

@ -14,7 +14,7 @@ allow dumpstate mnt_user_file:lnk_file read;
allow dumpstate storage_file:lnk_file read; allow dumpstate storage_file:lnk_file read;
# Purpose: timer_intval. this is neverallow # Purpose: timer_intval. this is neverallow
allow dumpstate sysfs:file r_file_perms; #allow dumpstate sysfs:file r_file_perms;
allow dumpstate app_data_file:dir search; allow dumpstate app_data_file:dir search;
allow dumpstate kmsg_device:chr_file r_file_perms; allow dumpstate kmsg_device:chr_file r_file_perms;

View File

@ -1,7 +1,6 @@
# ============================================== # ==============================================
# Policy File of /system/bin/em_svr Executable File # Policy File of /system/bin/em_svr Executable File
# ============================================== # ==============================================
# Type Declaration # Type Declaration
# ============================================== # ==============================================
@ -26,8 +25,8 @@ init_daemon_domain(em_svr)
# Date: W14.38 2014/09/17 # Date: W14.38 2014/09/17
# Operation : Migration # Operation : Migration
# Purpose : for em_svr # Purpose : for em_svr
allow em_svr proc:file write; #allow em_svr proc:file write;
allow em_svr sysfs:file write; #allow em_svr sysfs:file write;
allow em_svr shell_exec:file { read execute open getattr execute_no_trans }; allow em_svr shell_exec:file { read execute open getattr execute_no_trans };
allow em_svr system_file:file execute_no_trans; allow em_svr system_file:file execute_no_trans;
allow em_svr block_device:dir search; allow em_svr block_device:dir search;
@ -35,7 +34,7 @@ allow em_svr graphics_device:chr_file { read write open ioctl};
allow em_svr graphics_device:dir search; allow em_svr graphics_device:dir search;
allow em_svr radio_data_file:dir { search write add_name create }; allow em_svr radio_data_file:dir { search write add_name create };
allow em_svr radio_data_file:file { create write open read }; allow em_svr radio_data_file:file { create write open read };
allow em_svr sysfs_devices_system_cpu:file write; #allow em_svr sysfs_devices_system_cpu:file write;
#allow em_svr self:capability { dac_override sys_nice fowner chown fsetid }; #allow em_svr self:capability { dac_override sys_nice fowner chown fsetid };
allow em_svr self:process execmem; allow em_svr self:process execmem;
allow em_svr system_data_file:dir { write remove_name add_name relabelfrom create open }; allow em_svr system_data_file:dir { write remove_name add_name relabelfrom create open };
@ -43,7 +42,6 @@ allow em_svr kernel:system module_request;
allow em_svr sdcard_type:dir create_dir_perms; allow em_svr sdcard_type:dir create_dir_perms;
allow em_svr sdcard_type:file create_file_perms; allow em_svr sdcard_type:file create_file_perms;
# Date: 2015/08/09 # Date: 2015/08/09
# Operation : M Migration # Operation : M Migration
# Purpose : set policy for surfaceflinger_service # Purpose : set policy for surfaceflinger_service
@ -63,8 +61,8 @@ binder_call(em_svr, surfaceflinger)
# Purpose : add policy for desense/Power/Memory access system file # Purpose : add policy for desense/Power/Memory access system file
allow em_svr toolbox_exec:file { getattr execute read open execute_no_trans }; allow em_svr toolbox_exec:file { getattr execute read open execute_no_trans };
allow em_svr vendor_toolbox_exec:file { getattr }; allow em_svr vendor_toolbox_exec:file { getattr };
allow em_svr proc:file { open read }; #allow em_svr proc:file { open read };
allow em_svr sysfs:file { read }; #allow em_svr sysfs:file { read };
# Date: 2017/07/19 # Date: 2017/07/19
# Operation : O Migration # Operation : O Migration
@ -76,13 +74,12 @@ allow em_svr system_data_file:lnk_file { read };
# Purpose : add policy for system data file access # Purpose : add policy for system data file access
allow em_svr system_data_file:file open; allow em_svr system_data_file:file open;
# Date: 2017/07/13 # Date: 2017/07/13
# Operation: O Migration # Operation: O Migration
# Purpose: add policy for backlight file access # Purpose: add policy for backlight file access
allow em_svr sysfs_leds:dir search; allow em_svr sysfs_leds:dir search;
allow em_svr sysfs_leds:lnk_file read; allow em_svr sysfs_leds:lnk_file read;
allow em_svr sysfs:file open; #allow em_svr sysfs:file open;
# Date: WK1742 # Date: WK1742
# Purpose: add em_svr to access md log filter in sdcard # Purpose: add em_svr to access md log filter in sdcard

View File

@ -49,7 +49,7 @@ allow emdlogger storage_file:file { create_file_perms };
#permission for read boot mode #permission for read boot mode
#avc: denied { open } path="/sys/devices/virtual/BOOT/BOOT/boot/boot_mode" dev="sysfs" #avc: denied { open } path="/sys/devices/virtual/BOOT/BOOT/boot/boot_mode" dev="sysfs"
allow emdlogger sysfs:file { read open }; #allow emdlogger sysfs:file { read open };
# Allow read avc: denied { read } for name="mddb" dev="mmcblk0p25" ino=681 # Allow read avc: denied { read } for name="mddb" dev="mmcblk0p25" ino=681
# scontext=u:r:emdlogger:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 # scontext=u:r:emdlogger:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0

View File

@ -12,7 +12,6 @@ typeattribute factory coredomain;
# ============================================== # ==============================================
init_daemon_domain(factory) init_daemon_domain(factory)
allow factory property_socket:sock_file write; allow factory property_socket:sock_file write;
allow factory init:unix_stream_socket connectto; allow factory init:unix_stream_socket connectto;
allow factory kernel:system module_request; allow factory kernel:system module_request;
@ -24,7 +23,7 @@ allow factory sdcard_type:dir r_dir_perms;
### TBD, neverallowxperm on line 177 of system/sepolicy/public/domain.te ### TBD, neverallowxperm on line 177 of system/sepolicy/public/domain.te
#allow factory self:netlink_route_socket create_socket_perms; #allow factory self:netlink_route_socket create_socket_perms;
allow factory self:netlink_route_socket { bind create getattr write nlmsg_read read nlmsg_write }; allow factory self:netlink_route_socket { bind create getattr write nlmsg_read read nlmsg_write };
allow factory proc_net:file { read getattr open }; #allow factory proc_net:file { read getattr open };
allowxperm factory self:udp_socket ioctl priv_sock_ioctls; allowxperm factory self:udp_socket ioctl priv_sock_ioctls;
allowxperm factory self:udp_socket ioctl {SIOCGIFFLAGS SIOCGIWNWID}; allowxperm factory self:udp_socket ioctl {SIOCGIFFLAGS SIOCGIWNWID};
@ -32,7 +31,7 @@ allow factory self:process execmem;
allow factory self:tcp_socket create_stream_socket_perms; allow factory self:tcp_socket create_stream_socket_perms;
allow factory self:udp_socket create_socket_perms; allow factory self:udp_socket create_socket_perms;
allow factory sysfs_wake_lock:file rw_file_perms; #allow factory sysfs_wake_lock:file rw_file_perms;
allow factory system_data_file:dir w_dir_perms; allow factory system_data_file:dir w_dir_perms;
allow factory system_data_file:sock_file create_file_perms; allow factory system_data_file:sock_file create_file_perms;
allow factory system_file:file x_file_perms; allow factory system_file:file x_file_perms;

View File

@ -16,6 +16,7 @@ typeattribute kisd coredomain;
init_daemon_domain(kisd) init_daemon_domain(kisd)
allow kisd tee_device:chr_file {read write open ioctl}; allow kisd tee_device:chr_file {read write open ioctl};
typeattribute kisd data_between_core_and_vendor_violators;
allow kisd provision_file:dir {read write open ioctl add_name search remove_name}; allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
allow kisd provision_file:file {create read write open getattr unlink}; allow kisd provision_file:file {create read write open getattr unlink};
allow kisd system_file:file {execute_no_trans}; allow kisd system_file:file {execute_no_trans};

View File

@ -48,7 +48,7 @@ allow mdlogger file_contexts_file:file { read getattr open };
#permission for read boot mode #permission for read boot mode
#avc: denied { open } path="/sys/devices/virtual/BOOT/BOOT/boot/boot_mode" dev="sysfs" #avc: denied { open } path="/sys/devices/virtual/BOOT/BOOT/boot/boot_mode" dev="sysfs"
allow mdlogger sysfs:file { read open }; #allow mdlogger sysfs:file { read open };
# Allow read avc: denied { read } for name="mddb" dev="mmcblk0p25" ino=681 # Allow read avc: denied { read } for name="mddb" dev="mmcblk0p25" ino=681
# scontext=u:r:mdlogger:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 # scontext=u:r:mdlogger:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0

View File

@ -26,7 +26,7 @@ allow meta_tst self:tcp_socket { create connect setopt bind };
allow meta_tst self:tcp_socket { bind setopt listen accept read write }; allow meta_tst self:tcp_socket { bind setopt listen accept read write };
allow meta_tst self:udp_socket { create ioctl }; allow meta_tst self:udp_socket { create ioctl };
allow meta_tst self:capability { sys_boot ipc_lock }; allow meta_tst self:capability { sys_boot ipc_lock };
allow meta_tst sysfs_wake_lock:file rw_file_perms; #allow meta_tst sysfs_wake_lock:file rw_file_perms;
#allow meta_tst sysfs:file write; #allow meta_tst sysfs:file write;
allow meta_tst property_socket:sock_file w_file_perms; allow meta_tst property_socket:sock_file w_file_perms;
#allow meta_tst vold_socket:sock_file w_file_perms; #allow meta_tst vold_socket:sock_file w_file_perms;

View File

@ -60,10 +60,10 @@ allow mobile_log_d mmc_prop:file { getattr open };
allow mobile_log_d safemode_prop:file { getattr open }; allow mobile_log_d safemode_prop:file { getattr open };
#proc/ access #proc/ access
allow mobile_log_d proc:file r_file_perms; #allow mobile_log_d proc:file r_file_perms;
# boot_mdoe file access # boot_mdoe file access
allow mobile_log_d sysfs:file { open read }; #allow mobile_log_d sysfs:file { open read };
# purpose: allow MobileLog to access storage in N version # purpose: allow MobileLog to access storage in N version
allow mobile_log_d media_rw_data_file:file create_file_perms; allow mobile_log_d media_rw_data_file:file create_file_perms;
@ -71,6 +71,6 @@ allow mobile_log_d media_rw_data_file:dir create_dir_perms;
# access debugfs/tracing/instances/ # access debugfs/tracing/instances/
allow mobile_log_d debugfs_tracing:dir create_dir_perms; allow mobile_log_d debugfs_tracing:dir create_dir_perms;
allow mobile_log_d debugfs_tracing:file create_file_perms; #allow mobile_log_d debugfs_tracing:file create_file_perms;
allow mobile_log_d debugfs_tracing_instances:dir create_dir_perms; allow mobile_log_d debugfs_tracing_instances:dir create_dir_perms;
allow mobile_log_d debugfs_tracing_instances:file create_file_perms; #allow mobile_log_d debugfs_tracing_instances:file create_file_perms;

View File

@ -39,9 +39,9 @@ allow mtkbootanimation hal_graphics_allocator:fd use;
allow mtkbootanimation hal_graphics_composer:fd use; allow mtkbootanimation hal_graphics_composer:fd use;
# Read access to pseudo filesystems. # Read access to pseudo filesystems.
r_dir_file(mtkbootanimation, proc) #r_dir_file(mtkbootanimation, proc)
allow mtkbootanimation proc_meminfo:file r_file_perms; #allow mtkbootanimation proc_meminfo:file r_file_perms;
r_dir_file(mtkbootanimation, sysfs) #r_dir_file(mtkbootanimation, sysfs)
r_dir_file(mtkbootanimation, cgroup) r_dir_file(mtkbootanimation, cgroup)
# System file accesses. # System file accesses.
@ -89,7 +89,7 @@ allow mtkbootanimation gpu_device:dir search;
#============= bootanim ============== #============= bootanim ==============
allow mtkbootanimation debugfs_tracing:file write; #allow mtkbootanimation debugfs_tracing:file write;
#============= bootanim ============== #============= bootanim ==============
allow mtkbootanimation debugfs_tracing:file open; #allow mtkbootanimation debugfs_tracing:file open;

View File

@ -31,7 +31,7 @@ allow servicemanager thermalindicator:process { getattr };
typeattribute thermalindicator mlstrustedsubject; typeattribute thermalindicator mlstrustedsubject;
allow thermalindicator proc:dir {search getattr}; allow thermalindicator proc:dir {search getattr};
allow thermalindicator proc:file read; #allow thermalindicator proc:file read;
allow thermalindicator shell:dir search; allow thermalindicator shell:dir search;
allow thermalindicator platform_app:dir search; allow thermalindicator platform_app:dir search;
allow thermalindicator platform_app:file {open read getattr}; allow thermalindicator platform_app:file {open read getattr};

View File

@ -5,4 +5,4 @@
# volume manager # volume manager
#============= vold ============== #============= vold ==============
allow vold debugfs_tracing:file write; #allow vold debugfs_tracing:file write;

View File

@ -100,13 +100,13 @@ allow aee_aed dumpstate:unix_stream_socket { read write ioctl };
allow aee_aed dumpstate:dir search; allow aee_aed dumpstate:dir search;
allow aee_aed dumpstate:file r_file_perms; allow aee_aed dumpstate:file r_file_perms;
allow aee_aed proc:file rw_file_perms; #allow aee_aed proc:file rw_file_perms;
allow aee_aed logdr_socket:sock_file write; allow aee_aed logdr_socket:sock_file write;
allow aee_aed logd:unix_stream_socket connectto; allow aee_aed logd:unix_stream_socket connectto;
# allow aee_aed system_ndebug_socket:sock_file write; mask for never allow rule # allow aee_aed system_ndebug_socket:sock_file write; mask for never allow rule
# vibrator # vibrator
allow aee_aed sysfs_vibrator:file w_file_perms; #allow aee_aed sysfs_vibrator:file w_file_perms;
# Data : 2017/03/22 # Data : 2017/03/22
# Operation : add NE flow rule for Android O # Operation : add NE flow rule for Android O
@ -133,4 +133,4 @@ allow aee_aed crash_dump:file r_file_perms;
# [ 217.196275] <0>.(0)[209:logd.auditd]type=1400 audit(1262304561.676:377): avc: denied { read } # [ 217.196275] <0>.(0)[209:logd.auditd]type=1400 audit(1262304561.676:377): avc: denied { read }
# for pid=1486 comm="aee_aed" name="atag,devinfo" dev="sysfs" ino=2349 scontext=u:r:aee_aed:s0 # for pid=1486 comm="aee_aed" name="atag,devinfo" dev="sysfs" ino=2349 scontext=u:r:aee_aed:s0
# tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 # tcontext=u:object_r:sysfs:s0 tclass=file permissive=0
allow aee_aed sysfs:file r_file_perms; #allow aee_aed sysfs:file r_file_perms;

View File

@ -49,4 +49,4 @@ allow radio audiocmdservice_atci_exec:file getattr;
#Android O porting #Android O porting
hwbinder_use(audiocmdservice_atci) hwbinder_use(audiocmdservice_atci)
get_prop(audiocmdservice_atci, hwservicemanager_prop); get_prop(audiocmdservice_atci, hwservicemanager_prop);
allow audiocmdservice_atci debugfs_tracing:file rw_file_perms; #allow audiocmdservice_atci debugfs_tracing:file rw_file_perms;

View File

@ -23,7 +23,7 @@ allow boot_logo_updater init:unix_stream_socket connectto;
allow boot_logo_updater property_socket:sock_file write; allow boot_logo_updater property_socket:sock_file write;
#allow boot_logo_updater self:capability dac_override; #allow boot_logo_updater self:capability dac_override;
# To access some boot_mode infornation # To access some boot_mode infornation
allow boot_logo_updater sysfs:file rw_file_perms; #allow boot_logo_updater sysfs:file rw_file_perms;
# To access directory /dev/block/mmcblk0 or /dev/block/sdc # To access directory /dev/block/mmcblk0 or /dev/block/sdc
allow boot_logo_updater block_device:dir search; allow boot_logo_updater block_device:dir search;
allow boot_logo_updater graphics_device:dir search; allow boot_logo_updater graphics_device:dir search;

View File

@ -44,7 +44,7 @@ allow bootanim gpu_device:dir search;
#============= bootanim ============== #============= bootanim ==============
allow bootanim debugfs_tracing:file write; #allow bootanim debugfs_tracing:file write;
#============= bootanim ============== #============= bootanim ==============
allow bootanim debugfs_tracing:file open; #allow bootanim debugfs_tracing:file open;

View File

@ -38,4 +38,4 @@ allow cmddumper media_rw_data_file:dir { create_dir_perms };
allow cmddumper file_contexts_file:file { read getattr open }; allow cmddumper file_contexts_file:file { read getattr open };
# purpose: access /sys/devices/virtual/BOOT/BOOT/boot/boot_mode # purpose: access /sys/devices/virtual/BOOT/BOOT/boot/boot_mode
allow cmddumper sysfs:file { read open }; #allow cmddumper sysfs:file { read open };

View File

@ -3,4 +3,4 @@
# ====================== # ======================
# =======drmserver====== # =======drmserver======
allow drmserver sysfs:file { read open }; #allow drmserver sysfs:file { read open };

View File

@ -14,7 +14,7 @@ allow dumpstate mnt_user_file:lnk_file read;
allow dumpstate storage_file:lnk_file read; allow dumpstate storage_file:lnk_file read;
# Purpose: timer_intval. this is neverallow # Purpose: timer_intval. this is neverallow
allow dumpstate sysfs:file r_file_perms; #allow dumpstate sysfs:file r_file_perms;
allow dumpstate app_data_file:dir search; allow dumpstate app_data_file:dir search;
allow dumpstate kmsg_device:chr_file r_file_perms; allow dumpstate kmsg_device:chr_file r_file_perms;

View File

@ -26,8 +26,8 @@ init_daemon_domain(em_svr)
# Date: W14.38 2014/09/17 # Date: W14.38 2014/09/17
# Operation : Migration # Operation : Migration
# Purpose : for em_svr # Purpose : for em_svr
allow em_svr proc:file write; #allow em_svr proc:file write;
allow em_svr sysfs:file write; #allow em_svr sysfs:file write;
allow em_svr shell_exec:file { read execute open getattr execute_no_trans }; allow em_svr shell_exec:file { read execute open getattr execute_no_trans };
allow em_svr system_file:file execute_no_trans; allow em_svr system_file:file execute_no_trans;
allow em_svr block_device:dir search; allow em_svr block_device:dir search;
@ -35,7 +35,7 @@ allow em_svr graphics_device:chr_file { read write open ioctl};
allow em_svr graphics_device:dir search; allow em_svr graphics_device:dir search;
allow em_svr radio_data_file:dir { search write add_name create }; allow em_svr radio_data_file:dir { search write add_name create };
allow em_svr radio_data_file:file { create write open read }; allow em_svr radio_data_file:file { create write open read };
allow em_svr sysfs_devices_system_cpu:file write; #allow em_svr sysfs_devices_system_cpu:file write;
#allow em_svr self:capability { dac_override sys_nice fowner chown fsetid }; #allow em_svr self:capability { dac_override sys_nice fowner chown fsetid };
allow em_svr self:process execmem; allow em_svr self:process execmem;
allow em_svr system_data_file:dir { write remove_name add_name relabelfrom create open }; allow em_svr system_data_file:dir { write remove_name add_name relabelfrom create open };
@ -63,8 +63,8 @@ binder_call(em_svr, surfaceflinger)
# Purpose : add policy for desense/Power/Memory access system file # Purpose : add policy for desense/Power/Memory access system file
allow em_svr toolbox_exec:file { getattr execute read open execute_no_trans }; allow em_svr toolbox_exec:file { getattr execute read open execute_no_trans };
allow em_svr vendor_toolbox_exec:file { getattr }; allow em_svr vendor_toolbox_exec:file { getattr };
allow em_svr proc:file { open read }; #allow em_svr proc:file { open read };
allow em_svr sysfs:file { read }; #allow em_svr sysfs:file { read };
# Date: 2017/07/19 # Date: 2017/07/19
# Operation : O Migration # Operation : O Migration
@ -81,5 +81,5 @@ allow em_svr system_data_file:file open;
# Purpose: add policy for backlight file access # Purpose: add policy for backlight file access
allow em_svr sysfs_leds:dir search; allow em_svr sysfs_leds:dir search;
allow em_svr sysfs_leds:lnk_file read; allow em_svr sysfs_leds:lnk_file read;
allow em_svr sysfs:file open; #allow em_svr sysfs:file open;

View File

@ -49,7 +49,7 @@ allow emdlogger storage_file:file { create_file_perms };
#permission for read boot mode #permission for read boot mode
#avc: denied { open } path="/sys/devices/virtual/BOOT/BOOT/boot/boot_mode" dev="sysfs" #avc: denied { open } path="/sys/devices/virtual/BOOT/BOOT/boot/boot_mode" dev="sysfs"
allow emdlogger sysfs:file { read open }; #allow emdlogger sysfs:file { read open };
# Allow read avc: denied { read } for name="mddb" dev="mmcblk0p25" ino=681 # Allow read avc: denied { read } for name="mddb" dev="mmcblk0p25" ino=681
# scontext=u:r:emdlogger:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 # scontext=u:r:emdlogger:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0

View File

@ -24,7 +24,7 @@ allow factory sdcard_type:dir r_dir_perms;
### TBD, neverallowxperm on line 177 of system/sepolicy/public/domain.te ### TBD, neverallowxperm on line 177 of system/sepolicy/public/domain.te
#allow factory self:netlink_route_socket create_socket_perms; #allow factory self:netlink_route_socket create_socket_perms;
allow factory self:netlink_route_socket { bind create getattr write nlmsg_read read nlmsg_write }; allow factory self:netlink_route_socket { bind create getattr write nlmsg_read read nlmsg_write };
allow factory proc_net:file { read getattr open }; #allow factory proc_net:file { read getattr open };
allowxperm factory self:udp_socket ioctl priv_sock_ioctls; allowxperm factory self:udp_socket ioctl priv_sock_ioctls;
allowxperm factory self:udp_socket ioctl {SIOCGIFFLAGS SIOCGIWNWID}; allowxperm factory self:udp_socket ioctl {SIOCGIFFLAGS SIOCGIWNWID};
@ -32,7 +32,7 @@ allow factory self:process execmem;
allow factory self:tcp_socket create_stream_socket_perms; allow factory self:tcp_socket create_stream_socket_perms;
allow factory self:udp_socket create_socket_perms; allow factory self:udp_socket create_socket_perms;
allow factory sysfs_wake_lock:file rw_file_perms; #allow factory sysfs_wake_lock:file rw_file_perms;
allow factory system_data_file:dir w_dir_perms; allow factory system_data_file:dir w_dir_perms;
allow factory system_data_file:sock_file create_file_perms; allow factory system_data_file:sock_file create_file_perms;
allow factory system_file:file x_file_perms; allow factory system_file:file x_file_perms;

View File

@ -16,6 +16,7 @@ typeattribute kisd coredomain;
init_daemon_domain(kisd) init_daemon_domain(kisd)
allow kisd tee_device:chr_file {read write open ioctl}; allow kisd tee_device:chr_file {read write open ioctl};
typeattribute kisd data_between_core_and_vendor_violators;
allow kisd provision_file:dir {read write open ioctl add_name search remove_name}; allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
allow kisd provision_file:file {create read write open getattr unlink}; allow kisd provision_file:file {create read write open getattr unlink};
allow kisd system_file:file {execute_no_trans}; allow kisd system_file:file {execute_no_trans};

View File

@ -47,7 +47,7 @@ allow mdlogger file_contexts_file:file { read getattr open };
#permission for read boot mode #permission for read boot mode
#avc: denied { open } path="/sys/devices/virtual/BOOT/BOOT/boot/boot_mode" dev="sysfs" #avc: denied { open } path="/sys/devices/virtual/BOOT/BOOT/boot/boot_mode" dev="sysfs"
allow mdlogger sysfs:file { read open }; #allow mdlogger sysfs:file { read open };
# Allow read avc: denied { read } for name="mddb" dev="mmcblk0p25" ino=681 # Allow read avc: denied { read } for name="mddb" dev="mmcblk0p25" ino=681
# scontext=u:r:mdlogger:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 # scontext=u:r:mdlogger:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0

View File

@ -26,7 +26,7 @@ allow meta_tst self:tcp_socket { create connect setopt bind };
allow meta_tst self:tcp_socket { bind setopt listen accept read write }; allow meta_tst self:tcp_socket { bind setopt listen accept read write };
allow meta_tst self:udp_socket { create ioctl }; allow meta_tst self:udp_socket { create ioctl };
allow meta_tst self:capability { sys_boot ipc_lock }; allow meta_tst self:capability { sys_boot ipc_lock };
allow meta_tst sysfs_wake_lock:file rw_file_perms; #allow meta_tst sysfs_wake_lock:file rw_file_perms;
#allow meta_tst sysfs:file write; #allow meta_tst sysfs:file write;
allow meta_tst property_socket:sock_file w_file_perms; allow meta_tst property_socket:sock_file w_file_perms;
#allow meta_tst vold_socket:sock_file w_file_perms; #allow meta_tst vold_socket:sock_file w_file_perms;

View File

@ -60,10 +60,10 @@ allow mobile_log_d mmc_prop:file { getattr open };
allow mobile_log_d safemode_prop:file { getattr open }; allow mobile_log_d safemode_prop:file { getattr open };
#proc/ access #proc/ access
allow mobile_log_d proc:file r_file_perms; #allow mobile_log_d proc:file r_file_perms;
# boot_mdoe file access # boot_mdoe file access
allow mobile_log_d sysfs:file { open read }; #allow mobile_log_d sysfs:file { open read };
# purpose: allow MobileLog to access storage in N version # purpose: allow MobileLog to access storage in N version
allow mobile_log_d media_rw_data_file:file create_file_perms; allow mobile_log_d media_rw_data_file:file create_file_perms;
@ -71,6 +71,6 @@ allow mobile_log_d media_rw_data_file:dir create_dir_perms;
# access debugfs/tracing/instances/ # access debugfs/tracing/instances/
allow mobile_log_d debugfs_tracing:dir create_dir_perms; allow mobile_log_d debugfs_tracing:dir create_dir_perms;
allow mobile_log_d debugfs_tracing:file create_file_perms; #allow mobile_log_d debugfs_tracing:file create_file_perms;
allow mobile_log_d debugfs_tracing_instances:dir create_dir_perms; allow mobile_log_d debugfs_tracing_instances:dir create_dir_perms;
allow mobile_log_d debugfs_tracing_instances:file create_file_perms; #allow mobile_log_d debugfs_tracing_instances:file create_file_perms;

View File

@ -6,7 +6,7 @@ allow system_server zygote:binder impersonate;
# Property service. # Property service.
allow system_server ctl_bootanim_prop:property_service set; allow system_server ctl_bootanim_prop:property_service set;
# After connected to DHCPv6, enabled 6to4 IPv6 AP to get property. # After connected to DHCPv6, enabled 6to4 IPv6 AP to get property.
allow system_server proc_net:file w_file_perms; #allow system_server proc_net:file w_file_perms;
# Querying zygote socket. # Querying zygote socket.
allow system_server zygote:unix_stream_socket { getopt getattr }; allow system_server zygote:unix_stream_socket { getopt getattr };
# Date : WK16.36 # Date : WK16.36

View File

@ -31,7 +31,7 @@ allow servicemanager thermalindicator:process { getattr };
typeattribute thermalindicator mlstrustedsubject; typeattribute thermalindicator mlstrustedsubject;
allow thermalindicator proc:dir {search getattr}; allow thermalindicator proc:dir {search getattr};
allow thermalindicator proc:file read; #allow thermalindicator proc:file read;
allow thermalindicator shell:dir search; allow thermalindicator shell:dir search;
allow thermalindicator platform_app:dir search; allow thermalindicator platform_app:dir search;
allow thermalindicator platform_app:file {open read getattr}; allow thermalindicator platform_app:file {open read getattr};

View File

@ -5,4 +5,4 @@
# volume manager # volume manager
#============= vold ============== #============= vold ==============
allow vold debugfs_tracing:file write; #allow vold debugfs_tracing:file write;