summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorShanshan Guo <Shanshan.Guo@mediatek.com>2020-02-13 11:59:39 +0800
committerShanshan Guo <Shanshan.Guo@mediatek.com>2020-02-13 11:59:39 +0800
commit4c072597d7a0c0decfc3a86126f7570b5e82e761 (patch)
tree0b907d1e9311d3151b1b4f773b88fb4e4d146d2a
parent4e4ba53b7464c36092ab0ab51ae2e7072529ec58 (diff)
downloaddevice_mediatek_wembley-sepolicy-4c072597d7a0c0decfc3a86126f7570b5e82e761.tar.gz
device_mediatek_wembley-sepolicy-4c072597d7a0c0decfc3a86126f7570b5e82e761.tar.bz2
device_mediatek_wembley-sepolicy-4c072597d7a0c0decfc3a86126f7570b5e82e761.zip
[ALPS04994589] SEPolicy: Modify neverallow rule for system_data_file
[Detail] aosp/1217340 add allow rule for apexd which belongs to init process. [Solution] Modify neverallow rule of system_data_file dir to exclude apexd. Change-Id: I3b57ee2e0a338c6427825467812b767abb696dcd CR-Id: ALPS04994589 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
-rw-r--r--plat_public/domain.te255
1 files changed, 129 insertions, 126 deletions
diff --git a/plat_public/domain.te b/plat_public/domain.te
index 1478421..cd362dd 100644
--- a/plat_public/domain.te
+++ b/plat_public/domain.te
@@ -147,132 +147,135 @@ full_treble_only(`
# allow hal_drm system_data_file:file { getattr read };
# hal_server_domain(merged_hal_service, hal_drm)
#
-# full_treble_only(`
-# neverallow ~{
-# init
-# installd
-# system_server
-# } system_data_file:{ chr_file blk_file sock_file fifo_file } *;
-#
-# neverallow init system_data_file:{ chr_file blk_file } ~{ relabelto };;
-#
-# neverallow init system_data_file:{ sock_file fifo_file } ~{ create getattr open read setattr relabelfrom unlink relabelto };
-#
-# neverallow installd system_data_file:{ chr_file blk_file } *;
-#
-# neverallow installd system_data_file:{ sock_file fifo_file } ~{ getattr relabelfrom unlink };
-#
-# neverallow system_server system_data_file:{ lnk_file sock_file fifo_file } ~create_file_perms;
-#
-# neverallow {
-# coredomain
-# -appdomain
-# -app_zygote
-# -init
-# -installd
-# -iorap_prefetcherd
-# -system_server
-# -toolbox
-# -vold
-# -vold_prepare_subdirs
-# } system_data_file:file ~r_file_perms;
-#
-# neverallow { appdomain app_zygote } system_data_file:file ~{ getattr read map };
-#
-# neverallow init system_data_file:file ~{ create getattr open read write setattr relabelfrom unlink map getattr relabelto };
-#
-# neverallow installd system_data_file:file ~{ getattr relabelfrom unlink };
-#
-# neverallow iorap_prefetcherd system_data_file:file ~{ open read };
-#
-# neverallow {
-# mediadrmserver
-# mediaextractor
-# mediaserver
-# } system_data_file:file ~{ read getattr };
-#
-# neverallow system_server system_data_file:file ~{ create_file_perms relabelfrom link };
-#
-# neverallow { toolbox vold_prepare_subdirs } system_data_file:file ~{ getattr unlink };
-#
-# neverallow vold system_data_file:file ~read;
-#
-# neverallow ~{
-# appdomain
-# app_zygote
-# init
-# installd
-# iorap_prefetcherd
-# logd
-# rs
-# runas
-# simpleperf_app_runner
-# system_server
-# tee
-# vold
-# webview_zygote
-# zygote
-# } system_data_file:lnk_file ~getattr;
-#
-# neverallow {
-# appdomain
-# app_zygote
-# logd
-# webview_zygote
-# } system_data_file:lnk_file ~r_file_perms;
-#
-# neverallow init system_data_file:lnk_file ~{ r_file_perms create setattr relabelfrom relabelto unlink };
-#
-# neverallow installd system_data_file:lnk_file ~{ create getattr read setattr unlink relabelfrom };
-#
-# neverallow iorap_prefetcherd system_data_file:lnk_file ~{ read open };
-#
-# neverallow rs system_data_file:lnk_file ~{ read };
-#
-# neverallow {
-# runas
-# simpleperf_app_runner
-# tee
-# } system_data_file:lnk_file ~{ read getattr };
-#
-# neverallow system_server system_data_file:lnk_file ~create_file_perms;
-#
-# neverallow ~{
-# init
-# installd
-# iorap_prefetcherd
-# system_server
-# toolbox
-# traced_probes
-# vold
-# vold_prepare_subdirs
-# zygote
-# } system_data_file:dir ~{ search getattr };
-#
-# neverallow init system_data_file:dir ~{
-# create search getattr open read setattr ioctl
-# mounton
-# relabelto
-# write add_name remove_name rmdir relabelfrom
-# };
-#
-# neverallow installd system_data_file:dir ~{ relabelfrom create_dir_perms };
-#
-# neverallow {
-# iorap_prefetcherd
-# traced_probes
-# } system_data_file:dir ~{ open read search getattr };
-#
-# neverallow system_server system_data_file:dir ~{ relabelfrom create_dir_perms };
-#
-# neverallow toolbox system_data_file:dir ~{ rmdir rw_dir_perms };
-#
-# neverallow vold system_data_file:dir ~{ create rw_dir_perms mounton setattr rmdir };
-#
-# neverallow vold_prepare_subdirs system_data_file:dir ~{ open read write add_name remove_name rmdir relabelfrom search getattr };
-#
-# neverallow zygote system_data_file:dir ~{ r_dir_perms mounton relabelto };
-# ')
+full_treble_only(`
+ neverallow ~{
+ init
+ installd
+ system_server
+ } system_data_file:{ chr_file blk_file sock_file fifo_file } *;
+
+ neverallow init system_data_file:{ chr_file blk_file } ~{ relabelto };;
+
+ neverallow init system_data_file:{ sock_file fifo_file } ~{ create getattr open read setattr relabelfrom unlink relabelto };
+
+ neverallow installd system_data_file:{ chr_file blk_file } *;
+
+ neverallow installd system_data_file:{ sock_file fifo_file } ~{ getattr relabelfrom unlink };
+
+ neverallow system_server system_data_file:{ lnk_file sock_file fifo_file } ~create_file_perms;
+
+ neverallow {
+ coredomain
+ -appdomain
+ -app_zygote
+ -init
+ -installd
+ -iorap_prefetcherd
+ -system_server
+ -toolbox
+ -vold
+ -vold_prepare_subdirs
+ } system_data_file:file ~r_file_perms;
+
+ neverallow { appdomain app_zygote } system_data_file:file ~{ getattr read map };
+
+ neverallow init system_data_file:file ~{ create getattr open read write setattr relabelfrom unlink map getattr relabelto };
+
+ neverallow installd system_data_file:file ~{ getattr relabelfrom unlink };
+
+ neverallow iorap_prefetcherd system_data_file:file ~{ open read };
+
+ neverallow {
+ mediadrmserver
+ mediaextractor
+ mediaserver
+ } system_data_file:file ~{ read getattr };
+
+ neverallow system_server system_data_file:file ~{ create_file_perms relabelfrom link };
+
+ neverallow { toolbox vold_prepare_subdirs } system_data_file:file ~{ getattr unlink };
+
+ neverallow vold system_data_file:file ~read;
+
+ neverallow ~{
+ appdomain
+ app_zygote
+ init
+ installd
+ iorap_prefetcherd
+ logd
+ rs
+ runas
+ simpleperf_app_runner
+ system_server
+ tee
+ vold
+ webview_zygote
+ zygote
+ } system_data_file:lnk_file ~getattr;
+
+ neverallow {
+ appdomain
+ app_zygote
+ logd
+ webview_zygote
+ } system_data_file:lnk_file ~r_file_perms;
+
+ neverallow init system_data_file:lnk_file ~{ r_file_perms create setattr relabelfrom relabelto unlink };
+
+ neverallow installd system_data_file:lnk_file ~{ create getattr read setattr unlink relabelfrom };
+
+ neverallow iorap_prefetcherd system_data_file:lnk_file ~{ read open };
+
+ neverallow rs system_data_file:lnk_file ~{ read };
+
+ neverallow {
+ runas
+ simpleperf_app_runner
+ tee
+ } system_data_file:lnk_file ~{ read getattr };
+
+ neverallow system_server system_data_file:lnk_file ~create_file_perms;
+
+ neverallow ~{
+ apexd
+ init
+ installd
+ iorap_prefetcherd
+ system_server
+ toolbox
+ traced_probes
+ vold
+ vold_prepare_subdirs
+ zygote
+ } system_data_file:dir ~{ search getattr };
+
+ neverallow apexd system_data_file:dir ~r_dir_perms;
+
+ neverallow init system_data_file:dir ~{
+ create search getattr open read setattr ioctl
+ mounton
+ relabelto
+ write add_name remove_name rmdir relabelfrom
+ };
+
+ neverallow installd system_data_file:dir ~{ relabelfrom create_dir_perms };
+
+ neverallow {
+ iorap_prefetcherd
+ traced_probes
+ } system_data_file:dir ~{ open read search getattr };
+
+ neverallow system_server system_data_file:dir ~{ relabelfrom create_dir_perms };
+
+ neverallow toolbox system_data_file:dir ~{ rmdir rw_dir_perms };
+
+ neverallow vold system_data_file:dir ~{ create rw_dir_perms mounton setattr rmdir };
+
+ neverallow vold_prepare_subdirs system_data_file:dir ~{ open read write add_name remove_name rmdir relabelfrom search getattr };
+
+ neverallow zygote system_data_file:dir ~{ r_dir_perms mounton relabelto };
+')
# Do not allow access to the generic vendor_data_file label. This is