Auditing init and ueventd access to chr device files.
am: 9e7a5b0a7c
Change-Id: Ice41f3c804a4dd0aad058e39a2a8a0bcff80eb5a
This commit is contained in:
commit
845a8e809e
4 changed files with 7 additions and 3 deletions
|
@ -83,6 +83,7 @@
|
|||
/dev/input(/.*) u:object_r:input_device:s0
|
||||
/dev/iio:device[0-9]+ u:object_r:iio_device:s0
|
||||
/dev/ion u:object_r:ion_device:s0
|
||||
/dev/keychord u:object_r:keychord_device:s0
|
||||
/dev/kmem u:object_r:kmem_device:s0
|
||||
/dev/log(/.*)? u:object_r:log_device:s0
|
||||
/dev/mem u:object_r:kmem_device:s0
|
||||
|
|
|
@ -10,6 +10,7 @@ type hwbinder_device, dev_type, mlstrustedobject;
|
|||
type block_device, dev_type;
|
||||
type camera_device, dev_type;
|
||||
type dm_device, dev_type;
|
||||
type keychord_device, dev_type;
|
||||
type loop_device, dev_type;
|
||||
type pmsg_device, dev_type, mlstrustedobject;
|
||||
type radio_device, dev_type;
|
||||
|
|
|
@ -308,13 +308,13 @@ allow init hw_random_device:chr_file r_file_perms;
|
|||
allow init device:file create_file_perms;
|
||||
|
||||
# Access character devices without a specific type,
|
||||
# e.g. /dev/keychord.
|
||||
# TODO: Move these devices into their own type unless they
|
||||
# are only ever accessed by init.
|
||||
# TODO: Remove this access and auditallow (b/33347297)
|
||||
allow init device:chr_file { rw_file_perms setattr };
|
||||
auditallow init device:chr_file { rw_file_perms setattr };
|
||||
|
||||
# keychord configuration
|
||||
allow init self:capability sys_tty_config;
|
||||
allow init keychord_device:chr_file rw_file_perms;
|
||||
|
||||
# Access device mapper for setting up dm-verity
|
||||
allow init dm_device:chr_file rw_file_perms;
|
||||
|
|
|
@ -8,6 +8,8 @@ allow ueventd kmsg_device:chr_file rw_file_perms;
|
|||
allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner };
|
||||
allow ueventd device:file create_file_perms;
|
||||
allow ueventd device:chr_file rw_file_perms;
|
||||
auditallow ueventd device:chr_file rw_file_perms;
|
||||
|
||||
r_dir_file(ueventd, sysfs_type)
|
||||
r_dir_file(ueventd, rootfs)
|
||||
allow ueventd sysfs:file w_file_perms;
|
||||
|
|
Loading…
Reference in a new issue