summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAdam Shih <adamshih@google.com>2019-07-05 19:58:38 +0800
committerAdam Shih <adamshih@google.com>2019-07-08 13:08:46 +0800
commit54a5b0fc6c8be179ec12b7759fdaab9d7e268627 (patch)
tree79ed2a4fb17acd212ab0b69975bc58e3ee7fb76c
parentff737e820104f9adb62f6e4e1788429abfbfe7ec (diff)
downloadbonito-sepolicy-android10-dev.tar.gz
remove dumpstate citadel access error on user buildandroid10-dev
Bug: 132592593 Test: run cts android.security.cts.SELinuxHostTest#testNoBugreportDenials Change-Id: I6d2fa9aa3ce0ac9482a0138407ec09bf3a05720f Merged-In: I6d2fa9aa3ce0ac9482a0138407ec09bf3a05720f
-rw-r--r--vendor/qcom/common/dumpstate.te1
-rw-r--r--vendor/qcom/common/hal_dumpstate_impl.te20
2 files changed, 21 insertions, 0 deletions
diff --git a/vendor/qcom/common/dumpstate.te b/vendor/qcom/common/dumpstate.te
index e515e04c..f150518e 100644
--- a/vendor/qcom/common/dumpstate.te
+++ b/vendor/qcom/common/dumpstate.te
@@ -16,4 +16,5 @@ allow dumpstate debugfs_mmc:dir search;
allow dumpstate vendor_firmware_file:dir getattr;
allow dumpstate vendor_firmware_file:filesystem getattr;
+dontaudit dumpstate misc_logd_file:dir read;
dontaudit dumpstate kernel:system module_request;
diff --git a/vendor/qcom/common/hal_dumpstate_impl.te b/vendor/qcom/common/hal_dumpstate_impl.te
index d5e5918b..ea4d30d4 100644
--- a/vendor/qcom/common/hal_dumpstate_impl.te
+++ b/vendor/qcom/common/hal_dumpstate_impl.te
@@ -134,3 +134,23 @@ allow hal_dumpstate_impl debugfs_pmic:dir r_dir_perms;
allow hal_dumpstate_impl debugfs_pmic:file r_file_perms;
allow hal_dumpstate_impl dumpstate:fifo_file write;
+
+dontaudit hal_dumpstate_impl binder_device:chr_file rw_file_perms;
+dontaudit hal_dumpstate_impl vndbinder_device:chr_file rw_file_perms;
+dontaudit hal_dumpstate_impl property_socket:sock_file rw_file_perms;
+dontaudit hal_dumpstate_impl radio_vendor_data_file:dir r_dir_perms;
+dontaudit hal_dumpstate_impl radio_vendor_data_file:file r_file_perms;
+dontaudit hal_dumpstate_impl netmgr_data_file:dir r_dir_perms;
+dontaudit hal_dumpstate_impl netmgr_data_file:file r_file_perms;
+dontaudit hal_dumpstate_impl vendor_modem_diag_prop:file rw_file_perms;
+dontaudit hal_dumpstate_impl vendor_tcpdump_log_prop:file rw_file_perms;
+dontaudit hal_dumpstate_impl sysfs_usb_device:dir r_dir_perms;
+dontaudit hal_dumpstate_impl sysfs_usb_device:file r_file_perms;
+dontaudit hal_dumpstate_impl ssr_log_file:dir search;
+dontaudit hal_dumpstate_impl ssr_log_file:file r_file_perms;
+dontaudit hal_dumpstate_impl tcpdump_vendor_data_file:dir create_dir_perms;
+dontaudit hal_dumpstate_impl tcpdump_vendor_data_file:file create_file_perms;
+dontaudit hal_dumpstate_impl perfstatsd_exec:file rx_file_perms;
+dontaudit hal_dumpstate_impl perfstatsd_service:service_manager find;
+dontaudit hal_dumpstate_impl mpss_rfs_data_file:dir r_dir_perms;
+dontaudit hal_dumpstate_impl mpss_rfs_data_file:file r_file_perms;