[Detail] Googles new commit
neverallow coredomain from writing vendor properties
cause build break
cdb1624c27
[Solution] Declare system_writes_vendor_properties_violators as workaround
MTK-Commit-Id: 2b19515d2d98945b0aadfbc9043352ae927497f3
Change-Id: I7be59b6811f6c75ea47da205be902417311fe1d0
CR-Id: ALPS03881723
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
60 lines
2.1 KiB
Plaintext
60 lines
2.1 KiB
Plaintext
# boot_mdoe file access
|
|
allow mobile_log_d sysfs_boot_mode:file { open read };
|
|
|
|
#proc/ access
|
|
#allow mobile_log_d proc:file r_file_perms;
|
|
allow mobile_log_d proc_kmsg:file r_file_perms;
|
|
allow mobile_log_d proc_cmdline:file r_file_perms;
|
|
allow mobile_log_d proc_atf_log:dir search;
|
|
allow mobile_log_d proc_atf_log:file r_file_perms;
|
|
allow mobile_log_d proc_gz_log:file r_file_perms;
|
|
allow mobile_log_d proc_last_kmsg:file r_file_perms;
|
|
allow mobile_log_d proc_bootprof:file r_file_perms;
|
|
allow mobile_log_d proc_pl_lk:file r_file_perms;
|
|
|
|
#scp
|
|
allow mobile_log_d sysfs_scp:file { open write };
|
|
allow mobile_log_d sysfs_scp:dir search;
|
|
allow mobile_log_d scp_device:chr_file { read open };
|
|
|
|
#sspm
|
|
allow mobile_log_d sysfs_sspm:file { open write };
|
|
allow mobile_log_d sysfs_sspm:dir search;
|
|
allow mobile_log_d sspm_device:chr_file { read open };
|
|
|
|
#data/misc/mblog
|
|
allow mobile_log_d logmisc_data_file:dir { relabelto create_dir_perms };
|
|
allow mobile_log_d logmisc_data_file:file create_file_perms;
|
|
|
|
#data/log_temp
|
|
allow mobile_log_d logtemp_data_file:dir { relabelto create_dir_perms };
|
|
allow mobile_log_d logtemp_data_file:file create_file_perms;
|
|
|
|
#data/data_tmpfs_log
|
|
allow mobile_log_d data_tmpfs_log_file:dir create_dir_perms;
|
|
allow mobile_log_d data_tmpfs_log_file:file create_file_perms;
|
|
|
|
#mobile itself property
|
|
typeattribute mobile_log_d system_writes_vendor_properties_violators;
|
|
set_prop(mobile_log_d, mobile_log_prop)
|
|
|
|
#Dat: 2017/02/14
|
|
#Purpose: allow set telephony Sensitive property
|
|
set_prop(mobile_log_d, mtk_telephony_sensitive_prop)
|
|
|
|
# Date: 2016/11/11
|
|
# purpose: allow MobileLog to access aee socket
|
|
allow mobile_log_d aee_aed:unix_stream_socket connectto;
|
|
|
|
# purpose: send log to com port
|
|
allow mobile_log_d ttyGS_device:chr_file { read write ioctl open };
|
|
|
|
# purpose: allow mobile_log_d to access persist.meta.connecttype
|
|
get_prop(mobile_log_d, meta_connecttype_prop);
|
|
|
|
# purpose: allow mobile_log_d to create socket
|
|
allow mobile_log_d port:tcp_socket { name_connect name_bind };
|
|
allow mobile_log_d mobile_log_d:tcp_socket { create connect setopt bind };
|
|
allow mobile_log_d mobile_log_d:tcp_socket { bind setopt listen accept read write };
|
|
allow mobile_log_d node:tcp_socket node_bind;
|