[ALPS04325589] AEE: remove unuse rules

1. remove unuse rules
2. allow dumpstate to r/w /proc/msdc_debug
3. allow aee_core_forwarder to access hwservicemanager_prop
4. allow aee_core_forwarder to connect aee_aed socket

MTK-Commit-Id: a43676c734f74636df65e59cdcace017eca79706

Change-Id: I3c45ed83499c0079b38af34cf462dcd80fec501d
CR-Id: ALPS04325589
Feature: Android Exception Engine(AEE)
This commit is contained in:
mtk11285 2020-01-18 10:09:44 +08:00 committed by Weiwei Zhang (张炜玮)
parent 197aeeb5d1
commit 85b3620577
6 changed files with 14 additions and 15 deletions

View File

@ -391,8 +391,6 @@ allow aee_aedv sysfs_boot_mode:file r_file_perms;
#userdebug_or_eng(`
# allow aee_aedv debugfs_tracing_debug:file { r_file_perms write };
#')
# Purpose: allow aee_aedv self to sys_ptrace/dac_read_search/dac_override
#userdebug_or_eng(`allow aee_aedv self:capability { sys_ptrace dac_read_search dac_override };')
#Purpose: Allow aee_aedv to read /sys/mtk_memcfg/slabtrace
allow aee_aedv proc_slabtrace:file r_file_perms;

View File

@ -114,8 +114,8 @@ allow dumpstate debugfs_rcu:file r_file_perms;
# Purpose: Allow dumpstate to read /proc/msdc_debug
allow dumpstate proc_msdc_debug:file r_file_perms;
# Purpose: Allow dumpstate to read /proc/pidmap
allow dumpstate proc_pidmap:file r_file_perms;
# Purpose: Allow dumpstate to r/w /proc/pidmap
allow dumpstate proc_pidmap:file rw_file_perms;
# Purpose: Allow dumpstate to read /sys/power/vcorefs/vcore_debug
allow dumpstate sysfs_vcore_debug:file r_file_perms;
@ -128,3 +128,6 @@ allow dumpstate proc_slabtrace:file r_file_perms;
#Purpose: Allow dumpstate to read /proc/mtk_cmdq_debug/status
allow dumpstate proc_cmdq_debug:file r_file_perms;
#Purpose: Allow dumpstate to read /proc/cpuhvfs/dbg_repo
allow dumpstate proc_dbg_repo:file r_file_perms;

View File

@ -70,6 +70,7 @@ type proc_pidmap, fs_type, proc_type;
type proc_kpageflags, fs_type, proc_type;
type proc_slabtrace, fs_type, proc_type;
type proc_cmdq_debug, fs_type, proc_type;
type proc_dbg_repo, fs_type, proc_type;
type sysfs_therm, fs_type, sysfs_type;
type sysfs_fps, fs_type, sysfs_type;
type sysfs_ccci, fs_type, sysfs_type;

View File

@ -37,6 +37,7 @@ genfscon proc /pidmap u:object_r:proc_pidmap:s0
genfscon proc /kpageflags u:object_r:proc_kpageflags:s0
genfscon proc /mtk_memcfg/slabtrace u:object_r:proc_slabtrace:s0
genfscon proc /mtk_cmdq_debug/status u:object_r:proc_cmdq_debug:s0
genfscon proc /cpuhvfs/dbg_repo u:object_r:proc_dbg_repo:s0
genfscon iso9660 / u:object_r:iso9660:s0

View File

@ -110,12 +110,7 @@ allow aee_aed sysfs_vibrator:file w_file_perms;
# Purpose : make aee_aed can get specific process NE info
allow aee_aed domain:dir r_dir_perms;
allow aee_aed domain:{ file lnk_file } r_file_perms;
#allow aee_aed {
# domain
# -logd
# -keystore
# -init
#}:process ptrace;
allow aee_aed dalvikcache_data_file:dir r_dir_perms;
#allow aee_aed zygote_exec:file r_file_perms;
#allow aee_aed init_exec:file r_file_perms;
@ -135,10 +130,5 @@ allow aee_aed self:capability { sys_nice chown fowner kill };
# Purpose: Allow aee_aed to write /sys/kernel/debug/tracing/snapshot
userdebug_or_eng(`allow aee_aed debugfs_tracing_debug:file { write open };')
# Purpose: Allow aee_aed self to sys_ptrace/dac_override/dac_read_search
#userdebug_or_eng(`
# allow aee_aed self:capability { sys_ptrace dac_override dac_read_search };
#')
# Purpose: Allow aee_aed to read/write /sys/kernel/debug/tracing/tracing_on
#userdebug_or_eng(` allow aee_aed debugfs_tracing:file { r_file_perms write };')

View File

@ -92,3 +92,9 @@ allow aee_core_forwarder media_rw_data_file:file { create open write };
# scontext=u:r:aee_core_forwarder:s0 tcontext=u:r:aee_core_forwarder:s0
# tclass=capability permissive=0
allow aee_core_forwarder self:capability sys_nice;
# Purpose : allow aee_core_forwarder to access hwservicemanager_prop
get_prop(aee_core_forwarder, hwservicemanager_prop)
# Purpose : allow aee_core_forwarder to connect aee_aed socket
allow aee_core_forwarder aee_aed:unix_stream_socket connectto;