sepolicy: qti: Introduce rw_dir_file() macro and use wherever possible

Change-Id: Iec8a7f18c75a994032792421172fea92e9595af6
This commit is contained in:
LuK1337
2022-06-29 13:19:10 +02:00
parent 67c51391b7
commit 6f35c7a779
11 changed files with 21 additions and 32 deletions

View File

@@ -8,9 +8,7 @@ allow hal_fingerprint_default fingerprint_device:chr_file rw_file_perms;
allow hal_fingerprint_default graphics_device:chr_file rw_file_perms; allow hal_fingerprint_default graphics_device:chr_file rw_file_perms;
allow hal_fingerprint_default tee_device:chr_file rw_file_perms; allow hal_fingerprint_default tee_device:chr_file rw_file_perms;
allow hal_fingerprint_default vendor_proc_display:dir r_dir_perms; rw_dir_file(hal_fingerprint_default, vendor_proc_display)
allow hal_fingerprint_default vendor_proc_display:file rw_file_perms;
r_dir_file(hal_fingerprint_default, vendor_proc_fingerprint) r_dir_file(hal_fingerprint_default, vendor_proc_fingerprint)
get_prop(hal_fingerprint_default, system_oplus_project_prop) get_prop(hal_fingerprint_default, system_oplus_project_prop)

View File

@@ -1,2 +1 @@
allow hal_lineage_livedisplay_qti vendor_sysfs_graphics:dir r_dir_perms; rw_dir_file(hal_lineage_livedisplay_qti, vendor_sysfs_graphics)
allow hal_lineage_livedisplay_qti vendor_sysfs_graphics:file rw_file_perms;

View File

@@ -1,2 +1 @@
allow hal_lineage_powershare_default vendor_proc_wireless:dir r_dir_perms; rw_dir_file(hal_lineage_powershare_default, vendor_proc_wireless)
allow hal_lineage_powershare_default vendor_proc_wireless:file rw_file_perms;

View File

@@ -1,2 +1 @@
allow hal_lineage_touch_default vendor_proc_display:dir r_dir_perms; rw_dir_file(hal_lineage_touch_default, vendor_proc_display)
allow hal_lineage_touch_default vendor_proc_display:file rw_file_perms;

View File

@@ -1,2 +1 @@
allow hal_power_default vendor_proc_display:dir r_dir_perms; rw_dir_file(hal_power_default, vendor_proc_display)
allow hal_power_default vendor_proc_display:file rw_file_perms;

View File

@@ -1,10 +1,5 @@
allow hal_sensors_default ssc_interactive_device:chr_file rw_file_perms; allow hal_sensors_default ssc_interactive_device:chr_file rw_file_perms;
allow hal_sensors_default vendor_persist_engineer_file:dir r_dir_perms; rw_dir_file(hal_sensors_default, vendor_persist_engineer_file)
allow hal_sensors_default vendor_persist_engineer_file:file rw_file_perms; rw_dir_file(hal_sensors_default, vendor_sysfs_graphics)
rw_dir_file(hal_sensors_default, vendor_sysfs_sensor_fb)
allow hal_sensors_default vendor_sysfs_graphics:dir r_dir_perms;
allow hal_sensors_default vendor_sysfs_graphics:file rw_file_perms;
allow hal_sensors_default vendor_sysfs_sensor_fb:dir r_dir_perms;
allow hal_sensors_default vendor_sysfs_sensor_fb:file rw_file_perms;

View File

@@ -1,2 +1 @@
allow system_server vendor_proc_tri_state_key:dir r_dir_perms; rw_dir_file(system_server, vendor_proc_tri_state_key)
allow system_server vendor_proc_tri_state_key:file rw_file_perms;

8
sepolicy/qti/vendor/te_macros vendored Normal file
View File

@@ -0,0 +1,8 @@
#####################################
# rw_dir_file(domain, type)
# Allow the specified domain to read directories and rw files
# and symbolic links of the specified type.
define(`rw_dir_file', `
allow $1 $2:dir r_dir_perms;
allow $1 $2:{ file lnk_file } rw_file_perms;
')

View File

@@ -5,9 +5,7 @@ init_daemon_domain(tri-state-key-calibrate)
allow tri-state-key-calibrate vendor_toolbox_exec:file rx_file_perms; allow tri-state-key-calibrate vendor_toolbox_exec:file rx_file_perms;
allow tri-state-key-calibrate vendor_proc_tri_state_key:dir r_dir_perms;
allow tri-state-key-calibrate vendor_proc_tri_state_key:file w_file_perms;
allow tri-state-key-calibrate mnt_vendor_file:dir search; allow tri-state-key-calibrate mnt_vendor_file:dir search;
rw_dir_file(tri-state-key-calibrate, vendor_proc_tri_state_key)
r_dir_file(tri-state-key-calibrate, vendor_persist_engineer_file) r_dir_file(tri-state-key-calibrate, vendor_persist_engineer_file)

View File

@@ -1,6 +1,4 @@
allow vendor_rmt_storage vendor_proc_engineer:dir r_dir_perms;
allow vendor_rmt_storage vendor_proc_engineer:file rw_file_perms;
allow vendor_rmt_storage vendor_reserve_partition:blk_file rw_file_perms; allow vendor_rmt_storage vendor_reserve_partition:blk_file rw_file_perms;
rw_dir_file(vendor_rmt_storage, vendor_proc_engineer)
r_dir_file(vendor_rmt_storage, vendor_proc_oplus_version) r_dir_file(vendor_rmt_storage, vendor_proc_oplus_version)

View File

@@ -1,5 +1,2 @@
allow vendor_sensors vendor_persist_engineer_file:dir r_dir_perms; rw_dir_file(vendor_sensors, vendor_persist_engineer_file)
allow vendor_sensors vendor_persist_engineer_file:file rw_file_perms; rw_dir_file(vendor_sensors,vendor_sysfs_sensor_fb)
allow vendor_sensors vendor_sysfs_sensor_fb:dir r_dir_perms;
allow vendor_sensors vendor_sysfs_sensor_fb:file rw_file_perms;