Merge "selinux: Allow system_server to access files in iorapd dir." into rvc-dev

This commit is contained in:
TreeHugger Robot 2020-06-10 21:53:33 +00:00 committed by Android (Google) Code Review
commit 50f13cfc82
2 changed files with 16 additions and 0 deletions

View file

@ -46,6 +46,12 @@ allow iorapd system_file:file rx_file_perms;
allow iorapd iorap_inode2filename:process signull;
allow iorapd iorap_prefetcherd:process signull;
# Allowing system_server to check for the existence and size of files under iorapd
# dir without collecting any sensitive app data.
# This is used to predict if iorapd is doing prefetching or not.
allow system_server iorapd_data_file:dir { getattr open read search };
allow system_server iorapd_data_file:file getattr;
###
### neverallow rules
###
@ -59,6 +65,7 @@ neverallow {
domain
-init
-iorapd
-system_server
} iorapd_data_file:dir *;
neverallow {
@ -73,6 +80,7 @@ neverallow {
-kernel
-vendor_init
-iorapd
-system_server
} { iorapd_data_file }:notdevfile_class_set *;
# Only system_server and shell (for dumpsys) can interact with iorapd over binder

View file

@ -46,6 +46,12 @@ allow iorapd system_file:file rx_file_perms;
allow iorapd iorap_inode2filename:process signull;
allow iorapd iorap_prefetcherd:process signull;
# Allowing system_server to check for the existence and size of files under iorapd
# dir without collecting any sensitive app data.
# This is used to predict if iorapd is doing prefetching or not.
allow system_server iorapd_data_file:dir { getattr open read search };
allow system_server iorapd_data_file:file getattr;
###
### neverallow rules
###
@ -59,6 +65,7 @@ neverallow {
domain
-init
-iorapd
-system_server
} iorapd_data_file:dir *;
neverallow {
@ -73,6 +80,7 @@ neverallow {
-kernel
-vendor_init
-iorapd
-system_server
} { iorapd_data_file }:notdevfile_class_set *;
# Only system_server and shell (for dumpsys) can interact with iorapd over binder