916bd874d6
This adds sepolicy rule to allow uncrypt module to write on OTA zip (for f2fs_pin_file functionality). Also, add a few dontaudit rules to suppress harmless denials. Denials: I uncrypt : type=1400 audit(0.0:177): avc: denied { write } for name="update.zip" dev="dm-10" ino=7727 scontext=u:r:uncrypt:s0 tcontext=u:object_r:ota_package_file:s0 tclass=file permissive=0 I uncrypt : type=1400 audit(0.0:175): avc: denied { search } for name="/" dev="sda9" ino=2 scontext=u:r:uncrypt:s0 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=0 I uncrypt : type=1400 audit(0.0:176): avc: denied { search } for name="gsi" dev="sda9" ino=19 scontext=u:r:uncrypt:s0 tcontext=u:object_r:gsi_metadata_file:s0 tclass=dir permissive=0 Bug: 158070965 Change-Id: I473c5ee218c32b481040ef85caca907a48aadee6
43 lines
1.3 KiB
Text
43 lines
1.3 KiB
Text
# uncrypt
|
|
type uncrypt, domain, mlstrustedsubject;
|
|
type uncrypt_exec, system_file_type, exec_type, file_type;
|
|
|
|
allow uncrypt self:global_capability_class_set { dac_override dac_read_search };
|
|
|
|
userdebug_or_eng(`
|
|
# For debugging, allow /data/local/tmp access
|
|
r_dir_file(uncrypt, shell_data_file)
|
|
')
|
|
|
|
# Read /cache/recovery/command
|
|
# Read /cache/recovery/uncrypt_file
|
|
allow uncrypt cache_file:dir search;
|
|
allow uncrypt cache_recovery_file:dir rw_dir_perms;
|
|
allow uncrypt cache_recovery_file:file create_file_perms;
|
|
|
|
# Read and write(for f2fs_pin_file) on OTA zip file at /data/ota_package/.
|
|
allow uncrypt ota_package_file:dir r_dir_perms;
|
|
allow uncrypt ota_package_file:file rw_file_perms;
|
|
|
|
# Write to /dev/socket/uncrypt
|
|
unix_socket_connect(uncrypt, uncrypt, uncrypt)
|
|
|
|
# Raw writes to block device
|
|
allow uncrypt self:global_capability_class_set sys_rawio;
|
|
allow uncrypt misc_block_device:blk_file w_file_perms;
|
|
allow uncrypt block_device:dir r_dir_perms;
|
|
|
|
# Access userdata block device.
|
|
allow uncrypt userdata_block_device:blk_file w_file_perms;
|
|
|
|
r_dir_file(uncrypt, rootfs)
|
|
|
|
# uncrypt reads /proc/cmdline
|
|
allow uncrypt proc_cmdline:file r_file_perms;
|
|
|
|
# Read files in /sys
|
|
r_dir_file(uncrypt, sysfs_dt_firmware_android)
|
|
|
|
# Suppress the denials coming from ReadDefaultFstab call.
|
|
dontaudit uncrypt gsi_metadata_file:dir search;
|
|
dontaudit uncrypt metadata_file:dir search;
|