[ALPS04700799] Align keymanager sepolicy with p0.mp6

Align keymanager sepolicy with p0.mp6

MTK-Commit-Id: 24a187bc32e2be7663abb880c07659834d71f4b0

Change-Id: Ia98525be2155dcf3261633d1e6c25a775426068d
CR-Id: ALPS04700799
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
This commit is contained in:
Yifei Qiao 2020-01-18 10:17:31 +08:00
parent 8ae5f3bd2c
commit 9708912e27
13 changed files with 17 additions and 78 deletions

View File

@ -230,6 +230,8 @@ type vbmeta_block_device, dev_type;
type alarm_device, dev_type;
type mdp_device, dev_type;
type mrdump_device, dev_type;
type kb_block_device,dev_type;
type dkb_block_device,dev_type;
##########################
# Sensor common Devices Start

View File

@ -357,6 +357,10 @@ type sysfs_power_off_vol, fs_type, sysfs_type;
type sysfs_fg_disable, fs_type, sysfs_type;
type sysfs_dis_nafg, fs_type, sysfs_type;
# drm key manager
type provision_file, file_type, data_file_type;
type key_install_data_file, file_type, data_file_type;
# Date : WK18.16
# Purpose: Android Migration
type sysfs_mmcblk, fs_type, sysfs_type;
@ -367,4 +371,4 @@ type netd_socket, file_type, coredomain_socket;
# Date : WK19.27
# Purpose: Android Migration for SVP
type proc_m4u, fs_type, proc_type;
type proc_m4u, fs_type, proc_type;

View File

@ -65,6 +65,7 @@
/data/vendor/stp_dump(/.*)? u:object_r:stp_dump_data_file:s0
/data/vendor/mediadrm(/.*)? u:object_r:mediadrm_vendor_data_file:s0
/data/vendor/dipdebug(/.*)? u:object_r:aee_dipdebug_vendor_file:s0
/data/vendor/key_provisioning(/.*)? u:object_r:key_install_data_file:s0
# Misc data
#/data/misc/acdapi(/.*)? u:object_r:acdapi_data_file:s0
@ -479,6 +480,12 @@
/dev/block/platform/bootdevice/by-name/loader_ext(_[ab])? u:object_r:loader_ext_block_device:s0
/dev/block/platform/bootdevice/by-name/vbmeta(_system|_vendor)?(_[ab])? u:object_r:vbmeta_block_device:s0
# Key manager
/dev/block/platform/bootdevice/by-name/kb u:object_r:kb_block_device:s0
/dev/block/platform/bootdevice/by-name/dkb u:object_r:dkb_block_device:s0
/dev/kb u:object_r:kb_block_device:s0
/dev/dkb u:object_r:dkb_block_device:s0
# W19.23 Q new feature - Userdata Checkpoint
/dev/block/by-name/md_udc u:object_r:metadata_block_device:s0
@ -549,6 +556,7 @@
/(system\/vendor|vendor)/bin/thermalloadalgod u:object_r:thermalloadalgod_exec:s0
/(system\/vendor|vendor)/bin/lbs_hidl_service u:object_r:lbs_hidl_service_exec:s0
/(system\/vendor|vendor)/bin/meta_tst u:object_r:meta_tst_exec:s0
/(system\/vendor|vendor)/bin/kisd u:object_r:kisd_exec:s0
/(system\/vendor|vendor)/bin/fm_hidl_service u:object_r:fm_hidl_service_exec:s0
/(system\/vendor|vendor)/bin/wlan_assistant u:object_r:wlan_assistant_exec:s0

View File

@ -6,6 +6,7 @@
# Type Declaration
# ==============================================
type kisd ,domain;
type kisd_exec, exec_type, file_type, vendor_file_type;
typeattribute kisd mlstrustedsubject;
@ -18,7 +19,6 @@ init_daemon_domain(kisd)
allow kisd tee_device:chr_file {read write open ioctl};
allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
allow kisd provision_file:file {create read write open getattr unlink};
#allow kisd system_file:file {execute_no_trans};
allow kisd block_device:dir {read write open ioctl search};
allow kisd kb_block_device:blk_file {read write open ioctl getattr};
allow kisd dkb_block_device:blk_file {read write open ioctl getattr};
@ -26,6 +26,7 @@ allow kisd key_install_data_file:dir {write remove_name add_name};
allow kisd key_install_data_file:file {write getattr read create unlink open};
allow kisd key_install_data_file:dir search;
allow kisd mtd_device:chr_file { open read write };
allow kisd mtd_device:blk_file { open read write ioctl getattr};
allow kisd mtd_device:dir { search };
allow kisd kb_block_device:chr_file {read write open ioctl getattr};
allow kisd dkb_block_device:chr_file {read write open ioctl getattr};

View File

@ -25,7 +25,6 @@
/system/bin/aee_aed u:object_r:aee_aed_exec:s0
/system/bin/aee_aed64 u:object_r:aee_aed_exec:s0
/system/bin/aee_dumpstate u:object_r:dumpstate_exec:s0
/(system\/vendor|vendor)/bin/kisd u:object_r:kisd_exec:s0
/system/bin/lbs_dbg u:object_r:lbs_dbg_exec:s0
# google suggest that move aee_aedv_exec to platform @google_issue_id:64130120
@ -33,9 +32,6 @@
/(system\/vendor|vendor)/bin/aee_aedv64 u:object_r:aee_aedv_exec:s0
/vendor/bin/aeev u:object_r:aee_aedv_exec:s0
# kisd for Key Manager
/data/vendor/key_provisioning(/.*)? u:object_r:key_install_data_file:s0
# storagemanager daemon
# it is used to mount all storages in meta/factory mode
/system/bin/storagemanagerd u:object_r:vold_exec:s0

View File

@ -2,6 +2,4 @@
# MTK Policy Rule
# ==============================================
type kb_block_device,dev_type;
type dkb_block_device,dev_type;
type mtd_device, dev_type;

View File

@ -2,9 +2,5 @@
# MTK Policy Rule
# ==============================================
#for drm key install
type provision_file, file_type, data_file_type;
type key_install_data_file, file_type, data_file_type;
# lbs debug file
type lbs_dbg_data_file, file_type, data_file_type, core_data_file_type;

View File

@ -1,9 +0,0 @@
# ==============================================
# Policy File of /vendor/bin/kisd Executable File
# ==============================================
# Type Declaration
# ==============================================
type kisd ,domain;

View File

@ -22,7 +22,6 @@
/system/bin/audiocmdservice_atci u:object_r:audiocmdservice_atci_exec:s0
/system/bin/boot_logo_updater u:object_r:boot_logo_updater_exec:s0
/system/bin/meta_tst u:object_r:meta_tst_exec:s0
/(system\/vendor|vendor)/bin/kisd u:object_r:kisd_exec:s0
/system/bin/pre_meta u:object_r:pre_meta_exec:s0
/system/bin/factory u:object_r:factory_exec:s0
@ -30,9 +29,6 @@
/(system\/vendor|vendor)/bin/aee_aedv u:object_r:aee_aedv_exec:s0
/(system\/vendor|vendor)/bin/aee_aedv64 u:object_r:aee_aedv_exec:s0
# kisd for Key Manager
/data/vendor/key_provisioning(/.*)? u:object_r:key_install_data_file:s0
# storagemanager daemon
# it is used to mount all storages in meta/factory mode
/system/bin/storagemanagerd u:object_r:storagemanagerd_exec:s0

View File

@ -1,31 +0,0 @@
# ==============================================
# Policy File of /vendor/bin/kisd Executable File
# ==============================================
# Type Declaration
# ==============================================
type kisd_exec, exec_type, file_type, vendor_file_type;
typeattribute kisd mlstrustedsubject;
# ==============================================
# MTK Policy Rule
# ==============================================
init_daemon_domain(kisd)
allow kisd tee_device:chr_file {read write open ioctl};
allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
allow kisd provision_file:file {create read write open getattr unlink};
#allow kisd system_file:file {execute_no_trans};
allow kisd block_device:dir {read write open ioctl search};
allow kisd kb_block_device:blk_file {read write open ioctl getattr};
allow kisd dkb_block_device:blk_file {read write open ioctl getattr};
allow kisd key_install_data_file:dir {write remove_name add_name};
allow kisd key_install_data_file:file {write getattr read create unlink open};
allow kisd key_install_data_file:dir search;
allow kisd mtd_device:chr_file { open read write };
allow kisd mtd_device:dir { search };
allow kisd kb_block_device:chr_file {read write open ioctl getattr};
allow kisd dkb_block_device:chr_file {read write open ioctl getattr};

View File

@ -1,6 +0,0 @@
# ==============================================
# MTK Policy Rule
# ==============================================
type kb_block_device,dev_type;
type dkb_block_device,dev_type;

View File

@ -1,7 +0,0 @@
# ==============================================
# MTK Policy Rule
# ==============================================
#for drm key install
type provision_file, file_type, data_file_type;
type key_install_data_file, file_type, data_file_type;

View File

@ -1,9 +0,0 @@
# ==============================================
# Policy File of /vendor/bin/kisd Executable File
# ==============================================
# Type Declaration
# ==============================================
type kisd ,domain;