Skip to content

Commit 31f3ea2

Browse files
haggertkbgcngm
authored andcommitted
sepolicy: Treat proc-based DT fstab the same and sys-based
* Older devices have a DT fstab in proc, so we need to expand our policy to make this first-class like the fancy, new, sys devices Change-Id: I3cfed1e8e9fdf8665f1348fa07fa42d4f37873e9
1 parent 2814cfc commit 31f3ea2

22 files changed

+38
-0
lines changed

prebuilts/api/30.0/private/compat/26.0/26.0.ignore.cil

+1
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,7 @@
133133
perfetto_exec
134134
perfetto_tmpfs
135135
perfetto_traces_data_file
136+
proc_dt_firmware_android
136137
property_info
137138
recovery_socket
138139
role_service

prebuilts/api/30.0/private/compat/27.0/27.0.ignore.cil

+1
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,7 @@
120120
perfetto_exec
121121
perfetto_tmpfs
122122
perfetto_traces_data_file
123+
proc_dt_firmware_android
123124
property_info
124125
recovery_socket
125126
role_service

prebuilts/api/30.0/private/compat/28.0/28.0.ignore.cil

+1
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,7 @@
108108
password_slot_metadata_file
109109
permissionmgr_service
110110
postinstall_apex_mnt_dir
111+
proc_dt_firmware_android
111112
recovery_socket
112113
role_service
113114
rollback_service

prebuilts/api/30.0/private/compat/29.0/29.0.ignore.cil

+1
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,7 @@
8888
ota_metadata_file
8989
ota_prop
9090
prereboot_data_file
91+
proc_dt_firmware_android
9192
art_apex_dir
9293
rebootescrow_hal_prop
9394
securityfs

prebuilts/api/30.0/private/genfs_contexts

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ genfscon proc /buddyinfo u:object_r:proc_buddyinfo:s0
77
genfscon proc /cmdline u:object_r:proc_cmdline:s0
88
genfscon proc /config.gz u:object_r:config_gz:s0
99
genfscon proc /diskstats u:object_r:proc_diskstats:s0
10+
genfscon proc /device-tree/firmware/android u:object_r:proc_dt_firmware_android:s0
1011
genfscon proc /filesystems u:object_r:proc_filesystems:s0
1112
genfscon proc /interrupts u:object_r:proc_interrupts:s0
1213
genfscon proc /iomem u:object_r:proc_iomem:s0

prebuilts/api/30.0/public/file.te

+1
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ type proc_cmdline, fs_type, proc_type;
2727
type proc_cpuinfo, fs_type, proc_type;
2828
type proc_dirty, fs_type, proc_type;
2929
type proc_diskstats, fs_type, proc_type;
30+
type proc_dt_firmware_android, fs_type, proc_type;
3031
type proc_extra_free_kbytes, fs_type, proc_type;
3132
type proc_filesystems, fs_type, proc_type;
3233
type proc_fs_verity, fs_type, proc_type;

prebuilts/api/30.0/public/init.te

+1
Original file line numberDiff line numberDiff line change
@@ -393,6 +393,7 @@ allow init {
393393
}:file w_file_perms;
394394

395395
allow init {
396+
proc_dt_firmware_android
396397
sysfs_dt_firmware_android
397398
sysfs_fs_ext4_features
398399
}:file r_file_perms;

prebuilts/api/30.0/public/ueventd.te

+3
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ allow ueventd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
2525
allow ueventd efs_file:dir search;
2626
allow ueventd efs_file:file r_file_perms;
2727

28+
# Read the legacy DT fstab
29+
r_dir_file(ueventd, proc_dt_firmware_android)
30+
2831
# Get SELinux enforcing status.
2932
r_dir_file(ueventd, selinuxfs)
3033

prebuilts/api/30.0/public/uncrypt.te

+3
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,9 @@ allow uncrypt proc_cmdline:file r_file_perms;
4141
# Read files in /sys
4242
r_dir_file(uncrypt, sysfs_dt_firmware_android)
4343

44+
# Read files in /proc
45+
r_dir_file(uncrypt, proc_dt_firmware_android)
46+
4447
# Suppress the denials coming from ReadDefaultFstab call.
4548
dontaudit uncrypt gsi_metadata_file:dir search;
4649
dontaudit uncrypt metadata_file:dir search;

prebuilts/api/30.0/public/update_engine_common.te

+3
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,9 @@ allow update_engine_common proc_cmdline:file r_file_perms;
5656
# Read files in /sys/firmware/devicetree/base/firmware/android/
5757
r_dir_file(update_engine_common, sysfs_dt_firmware_android)
5858

59+
# Read files in /proc/device-tree/firmware/android
60+
r_dir_file(update_engine_common, proc_dt_firmware_android)
61+
5962
# Needed because libdm reads sysfs to validate when a dm path is ready.
6063
r_dir_file(update_engine_common, sysfs_dm)
6164

prebuilts/api/30.0/public/vold.te

+3
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ allow vold {
1919
sysfs_fs_f2fs
2020
}:file w_file_perms;
2121

22+
# Read the legacy DT fstab
23+
r_dir_file(vold, proc_dt_firmware_android)
24+
2225
r_dir_file(vold, rootfs)
2326
r_dir_file(vold, metadata_file)
2427
allow vold {

private/compat/26.0/26.0.ignore.cil

+1
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,7 @@
133133
perfetto_exec
134134
perfetto_tmpfs
135135
perfetto_traces_data_file
136+
proc_dt_firmware_android
136137
property_info
137138
recovery_socket
138139
role_service

private/compat/27.0/27.0.ignore.cil

+1
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,7 @@
120120
perfetto_exec
121121
perfetto_tmpfs
122122
perfetto_traces_data_file
123+
proc_dt_firmware_android
123124
property_info
124125
recovery_socket
125126
role_service

private/compat/28.0/28.0.ignore.cil

+1
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,7 @@
108108
password_slot_metadata_file
109109
permissionmgr_service
110110
postinstall_apex_mnt_dir
111+
proc_dt_firmware_android
111112
recovery_socket
112113
role_service
113114
rollback_service

private/compat/29.0/29.0.ignore.cil

+1
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,7 @@
8888
ota_metadata_file
8989
ota_prop
9090
prereboot_data_file
91+
proc_dt_firmware_android
9192
art_apex_dir
9293
rebootescrow_hal_prop
9394
securityfs

private/genfs_contexts

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ genfscon proc /buddyinfo u:object_r:proc_buddyinfo:s0
77
genfscon proc /cmdline u:object_r:proc_cmdline:s0
88
genfscon proc /config.gz u:object_r:config_gz:s0
99
genfscon proc /diskstats u:object_r:proc_diskstats:s0
10+
genfscon proc /device-tree/firmware/android u:object_r:proc_dt_firmware_android:s0
1011
genfscon proc /filesystems u:object_r:proc_filesystems:s0
1112
genfscon proc /interrupts u:object_r:proc_interrupts:s0
1213
genfscon proc /iomem u:object_r:proc_iomem:s0

public/file.te

+1
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ type proc_cmdline, fs_type, proc_type;
2727
type proc_cpuinfo, fs_type, proc_type;
2828
type proc_dirty, fs_type, proc_type;
2929
type proc_diskstats, fs_type, proc_type;
30+
type proc_dt_firmware_android, fs_type, proc_type;
3031
type proc_extra_free_kbytes, fs_type, proc_type;
3132
type proc_filesystems, fs_type, proc_type;
3233
type proc_fs_verity, fs_type, proc_type;

public/init.te

+1
Original file line numberDiff line numberDiff line change
@@ -393,6 +393,7 @@ allow init {
393393
}:file w_file_perms;
394394

395395
allow init {
396+
proc_dt_firmware_android
396397
sysfs_dt_firmware_android
397398
sysfs_fs_ext4_features
398399
}:file r_file_perms;

public/ueventd.te

+3
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ allow ueventd self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
2525
allow ueventd efs_file:dir search;
2626
allow ueventd efs_file:file r_file_perms;
2727

28+
# Read the legacy DT fstab
29+
r_dir_file(ueventd, proc_dt_firmware_android)
30+
2831
# Get SELinux enforcing status.
2932
r_dir_file(ueventd, selinuxfs)
3033

public/uncrypt.te

+3
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,9 @@ allow uncrypt proc_cmdline:file r_file_perms;
4141
# Read files in /sys
4242
r_dir_file(uncrypt, sysfs_dt_firmware_android)
4343

44+
# Read files in /proc
45+
r_dir_file(uncrypt, proc_dt_firmware_android)
46+
4447
# Suppress the denials coming from ReadDefaultFstab call.
4548
dontaudit uncrypt gsi_metadata_file:dir search;
4649
dontaudit uncrypt metadata_file:dir search;

public/update_engine_common.te

+3
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,9 @@ allow update_engine_common proc_cmdline:file r_file_perms;
5656
# Read files in /sys/firmware/devicetree/base/firmware/android/
5757
r_dir_file(update_engine_common, sysfs_dt_firmware_android)
5858

59+
# Read files in /proc/device-tree/firmware/android
60+
r_dir_file(update_engine_common, proc_dt_firmware_android)
61+
5962
# Needed because libdm reads sysfs to validate when a dm path is ready.
6063
r_dir_file(update_engine_common, sysfs_dm)
6164

public/vold.te

+3
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ allow vold {
1919
sysfs_fs_f2fs
2020
}:file w_file_perms;
2121

22+
# Read the legacy DT fstab
23+
r_dir_file(vold, proc_dt_firmware_android)
24+
2225
r_dir_file(vold, rootfs)
2326
r_dir_file(vold, metadata_file)
2427
allow vold {

0 commit comments

Comments
 (0)