Skip to content

Commit

Permalink
Add sepolicy denials for many GSIs
Browse files Browse the repository at this point in the history
  • Loading branch information
TTTT555 committed Feb 15, 2020
1 parent 59cf53a commit ac530d2
Show file tree
Hide file tree
Showing 14 changed files with 62 additions and 7 deletions.
2 changes: 1 addition & 1 deletion sepolicy/private/priv.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
allow system_app storaged:binder call;
allow storaged vendor_file:file { r_file_perms };
allow storaged vendor_file:file { rx_file_perms };

allow storaged sysfs:file { r_file_perms };
allow storaged sysfs_disk_stat:file { r_file_perms };
Expand Down
1 change: 1 addition & 0 deletions sepolicy/vendor/blkid_untrusted.te
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
allow blkid_untrusted vendor_file:file { rx_file_perms };
1 change: 1 addition & 0 deletions sepolicy/vendor/cameraserver.te
Original file line number Diff line number Diff line change
Expand Up @@ -70,4 +70,5 @@ allow cameraserver vendor_file:file { rx_file_perms };

allow cameraserver video_device:chr_file { rw_file_perms };
allow cameraserver hidl_allocator_hwservice:hwservice_manager { find };
allow cameraserver default_android_hwservice:hwservice_manager { find };

2 changes: 2 additions & 0 deletions sepolicy/vendor/hwservicemanager.te
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
allow hwservicemanager init:dir { r_dir_perms };
allow hwservicemanager init:file { r_file_perms };
2 changes: 1 addition & 1 deletion sepolicy/vendor/idmap.te
Original file line number Diff line number Diff line change
@@ -1 +1 @@
allow idmap vendor_file:file { read execute getattr };
allow idmap vendor_file:file { rx_file_perms };
35 changes: 34 additions & 1 deletion sepolicy/vendor/init.te
Original file line number Diff line number Diff line change
@@ -1,7 +1,40 @@
allow init sysfs:file setattr;
allow init debugfs:file write;
allow init proc:file { r_file_perms };
allow init system_file:file mounton;
allow init system_file:file { mounton execute_no_trans };
allow init platform_app:binder { call transfer };
allow init servicemanager:binder { call };
allow init hwservicemanager:binder { call };
allow init system_server:binder { call transfer };
allow init mediacodec:binder { call transfer };
allow init mediaserver_service:service_manager { add find };
allow init cameraserver_service:service_manager { add };
allow init hal_camera_hwservice:hwservice_manager { find };
allow init hidl_allocator_hwservice:hwservice_manager { find };
allow init thermal_socket:sock_file { rw_file_perms };
allow init thermal-engine:unix_stream_socket { connectto };
allow init video_device:chr_file { rw_file_perms };
allow init ion_device:chr_file { rw_file_perms };
allow init mm-qcamerad:unix_dgram_socket { sendto };
allow init hal_omx_hwservice:hwservice_manager { find };
allow init processinfo_service:service_manager { find };
allow init batterystats_service:service_manager { find };
allow init appops_service:service_manager { find };
allow init cameraproxy_service:service_manager { find };
allow init hal_lineage_camera_motor_hwservice:hwservice_manager { find };
allow init permission_service:service_manager { find };
allow init media_rw_data_file:file { x_file_perms };
allow init activity_service:service_manager { find };
allow init vendor_file:file { rx_file_perms };
allow init pmsg_device:chr_file { r_file_perms };
allow init mediaextractor_service:service_manager { find };
allow init mediaextractor:binder { call };
allow init drmserver_service:service_manager { find };
allow init drmserver:drmservice { openDecryptSession };
allow init audioserver_service:service_manager { find };
allow init audioserver:binder { call transfer };
allow init hidl_memory_hwservice:hwservice_manager { find };
allow init mediametrics_service:service_manager { find };


# required for LD_PRELOAD
Expand Down
1 change: 1 addition & 0 deletions sepolicy/vendor/location.te
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
allow location media_rw_data_file:file { rx_file_perms };
1 change: 1 addition & 0 deletions sepolicy/vendor/mediacodec.te
Original file line number Diff line number Diff line change
@@ -1 +1,2 @@
r_dir_file(mediacodec, firmware_file)
allow mediacodec init:binder { transfer };
1 change: 1 addition & 0 deletions sepolicy/vendor/platform_app.te
Original file line number Diff line number Diff line change
@@ -1 +1,2 @@
allow platform_app vendor_file:file { open read getattr };
allow platform_app init:binder { call transfer };
5 changes: 5 additions & 0 deletions sepolicy/vendor/servicemanager.te
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
allow servicemanager init:dir { search };
allow servicemanager init:file { r_file_perms };
allow servicemanager init:binder { transfer };
allow servicemanager init:process { getattr };
allow servicemanager init:binder { transfer };
2 changes: 1 addition & 1 deletion sepolicy/vendor/sgdisk.te
Original file line number Diff line number Diff line change
@@ -1 +1 @@
allow sgdisk vendor_file:file { open read getattr };
allow sgdisk vendor_file:file { rx_file_perms };
1 change: 1 addition & 0 deletions sepolicy/vendor/system_server.te
Original file line number Diff line number Diff line change
Expand Up @@ -11,3 +11,4 @@ allow system_server sysfs_sensors:dir { read open };
allow system_server sysfs_vibrator:file r_file_perms;
allow system_server vendor_file:file { execute open read write getattr };
allow system_server default_android_hwservice:hwservice_manager { find };
allow system_server init:binder { call };
10 changes: 9 additions & 1 deletion sepolicy/vendor/toolbox.te
Original file line number Diff line number Diff line change
@@ -1 +1,9 @@
allow toolbox vendor_file:file { read open getattr execute };
allow toolbox vendor_file:file { rx_file_perms };
allow toolbox init:fifo_file { rw_file_perms };
allow toolbox property_socket:sock_file { rw_file_perms };
allow toolbox init:unix_stream_socket { connectto };
allow toolbox cache_file:dir { r_dir_perms };
allow toolbox persist_file:dir { r_dir_perms };
allow toolbox proc_filesystems:file { r_file_perms };
allow toolbox vendor_overlay_file:dir { r_dir_perms };
allow toolbox vendor_configs_file:dir { mounton };
5 changes: 3 additions & 2 deletions sepolicy/vendor/vold.te
Original file line number Diff line number Diff line change
@@ -1,2 +1,3 @@
allow vold vendor_file:file { open read getattr };
allow vold_prepare_subdirs vendor_file:file { open read getattr };
allow vold vendor_file:file { rx_file_perms };
allow vold_prepare_subdirs vendor_file:file { rx_file_perms };

0 comments on commit ac530d2

Please sign in to comment.