Skip to content

Commit

Permalink
docs:README
Browse files Browse the repository at this point in the history
  • Loading branch information
Itsuwarii committed May 15, 2022
1 parent 3de6236 commit b149669
Show file tree
Hide file tree
Showing 161 changed files with 1,047 additions and 2,138 deletions.
2 changes: 1 addition & 1 deletion .gitignore
Original file line number Diff line number Diff line change
@@ -1 +1 @@
/out
out
14 changes: 14 additions & 0 deletions .idea/artifacts/SepolicyTools_jar.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 3 additions & 0 deletions META-INF/MANIFEST.MF
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Manifest-Version: 1.0
Main-Class: Gui.SepolicyToolsGUI

41 changes: 41 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
## 这是什么东西?

一个能格式化Selinux 政策的东西

## 这东西能干嘛?

美化Sepolicy~~(其实没什么用)~~

## 使用步骤:

1、烧一壶开水

2、[下载软件](https://github.com/succerseng/SepolicyTools/releases) SepolicyTools.jar

3、使用刚烧开的水烫洗茶杯

4、在终端运行

```sh
# 请先解压文件
# 进入解压得到的文件夹
# 打开终端
# 键入
java -jar SepolicyTools.jar --encoding=utf-8
```

5、用稍微凉了一点的水洗茶

6、选择您的sepolicy文件夹

7、现在可以开始泡茶啦

8、连接您的手机

9、请注意 不要泡太久

10、点击自动运行

接下来只需要等着程序执行完成~~崩溃~~

好了,您的茶快凉了,请尽快饮用吧
2 changes: 1 addition & 1 deletion sepolicy/BGW.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type BGW, domain;
type BGW_exec, exec_type, file_type;
type BGW, domain;
init_daemon_domain(BGW)
allow BGW stpwmt_device:chr_file { read write open };
allow BGW self:netlink_socket { read bind create write };
Expand Down
2 changes: 1 addition & 1 deletion sepolicy/GoogleOtaBinder.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type GoogleOtaBinder, domain;
type GoogleOtaBinder_exec, exec_type, file_type;
type GoogleOtaBinder, domain;
init_daemon_domain(GoogleOtaBinder)
binder_use(GoogleOtaBinder)
binder_service(GoogleOtaBinder)
Expand Down
2 changes: 1 addition & 1 deletion sepolicy/MtkCodecService.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type MtkCodecService, domain;
type MtkCodecService_exec, exec_type, file_type;
type MtkCodecService, domain;
init_daemon_domain(MtkCodecService)
binder_use(MtkCodecService)
allow MtkCodecService self:capability { setuid sys_nice };
Expand Down
15 changes: 4 additions & 11 deletions sepolicy/aal.te
Original file line number Diff line number Diff line change
@@ -1,11 +1,4 @@
type aal, domain;
type aal_exec, exec_type, file_type;
init_daemon_domain(aal)
binder_use(aal)
binder_service(aal)
binder_call(aal, binderservicedomain)
allow aal permission_service:service_manager { find };
allow aal graphics_device:dir search;
allow aal graphics_device:chr_file { read open ioctl };
allow aal aal_service:service_manager add;
allow aal aal_als_device:chr_file { read open ioctl };
type aal_service, service_manager_type;
allow system_server aal_service:service_manager find;
allow atci_service aal_service:service_manager { find };
allow aal aal_service:service_manager add;
2 changes: 1 addition & 1 deletion sepolicy/aee_core_forwarder.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type aee_core_forwarder, domain;
type aee_core_forwarder_exec, exec_type, file_type;
type aee_core_forwarder, domain;
init_daemon_domain(aee_core_forwarder)
allow aee_core_forwarder system_data_file:dir { write relabelfrom create add_name };
allow aee_core_forwarder sysfs_wake_lock:file { read write open };
Expand Down
2 changes: 1 addition & 1 deletion sepolicy/akmd09911.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type akmd09911, domain;
type akmd09911_exec, exec_type, file_type;
type akmd09911, domain;
init_daemon_domain(akmd09911)
file_type_auto_trans(akmd09911, system_data_file, msensor_data_file)
allow akmd09911 system_data_file:dir { create setattr };
Expand Down
2 changes: 1 addition & 1 deletion sepolicy/akmd09912.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type akmd09912, domain;
type akmd09912_exec, exec_type, file_type;
type akmd09912, domain;
init_daemon_domain(akmd09912)
file_type_auto_trans(akmd09912, system_data_file, msensor_data_file)
allow akmd09912 system_data_file:dir { create setattr };
Expand Down
2 changes: 1 addition & 1 deletion sepolicy/akmd8963.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type akmd8963, domain;
type akmd8963_exec, exec_type, file_type;
type akmd8963, domain;
init_daemon_domain(akmd8963)
file_type_auto_trans(akmd8963, system_data_file, msensor_data_file)
allow akmd8963 system_data_file:dir { create setattr };
Expand Down
2 changes: 1 addition & 1 deletion sepolicy/akmd8975.te
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
type akmd8975, domain;
type akmd8975_exec, exec_type, file_type;
type akmd8975, domain;
init_daemon_domain(akmd8975)
2 changes: 1 addition & 1 deletion sepolicy/ami304d.te
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
type ami304d, domain;
type ami304d_exec, exec_type, file_type;
type ami304d, domain;
init_daemon_domain(ami304d)
2 changes: 1 addition & 1 deletion sepolicy/atci_service.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type atci_service, domain;
type atci_service_exec, exec_type, file_type;
type atci_service, domain;
init_daemon_domain(atci_service)
file_type_auto_trans(atci_service, system_data_file, atci_data_file)
binder_use(atci_service)
Expand Down
2 changes: 1 addition & 1 deletion sepolicy/atcid.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type atcid, domain;
type atcid_exec, exec_type, file_type;
type atcid, domain;
init_daemon_domain(atcid)
allow atcid wmtWifi_device:chr_file { write open };
allow atcid viarild:unix_stream_socket connectto;
Expand Down
217 changes: 3 additions & 214 deletions sepolicy/atcp.te
Original file line number Diff line number Diff line change
@@ -1,214 +1,3 @@
type atcp, domain;
type atcp_exec, exec_type, file_type;
wakelock_use(atcp)
unix_socket_connect(atcp, property, init)
typeattribute atcp mlstrustedsubject;
init_daemon_domain(atcp)
dontaudit atcp untrusted_app:fd use;
dontaudit atcp isolated_app:fd use;
binder_use(atcp)
auditallow atcp system_radio_prop:property_service set;
auditallow atcp net_radio_prop:property_service set;
allow system_server atcp:fd use;
allow atcp zygote_exec:file { read getattr open execute execute_no_trans };
allow atcp wod_sim_socket:sock_file write;
allow atcp wod_action_socket:sock_file write;
allow atcp wmtWifi_device:chr_file { write open };
allow atcp volte_prop:property_service set;
allow atcp volte_imsa1_socket:sock_file write;
allow atcp volte_imcb:unix_stream_socket connectto;
allow atcp vmodem_device:chr_file { read write ioctl open };
allow atcp viarild:unix_stream_socket connectto;
allow atcp vfat:file create_file_perms;
allow atcp vfat:dir create_dir_perms;
allow atcp untrusted_app:dir search;
allow atcp tty_device:chr_file rw_file_perms;
allow atcp ttySDIO_device:chr_file { read write ioctl open };
allow atcp ttyGS_device:chr_file { read write open ioctl };
allow atcp ttyGS_device:chr_file { read write ioctl open };
allow atcp ttyGS_device:chr_file { open read write ioctl };
allow atcp tmpfs:lnk_file read;
allow atcp system_server:binder call;
allow atcp system_radio_prop:property_service set;
allow atcp system_prop:property_service set;
allow atcp system_file:file x_file_perms;
allow atcp system_file:file execute_no_trans;
allow atcp system_data_file:file r_file_perms;
allow atcp system_data_file:dir { write create open add_name relabelfrom };
allow atcp system_data_file:dir { relabelfrom create_dir_perms };
allow atcp system_data_file:dir r_dir_perms;
allow atcp sysfs_vcorefs_pwrctrl:file { open write };
allow atcp sysfs_scp:file { open write };
allow atcp sysfs_scp:dir search;
allow atcp sysfs:file write;
allow atcp storage_file:lnk_file read;
allow atcp storage_file:lnk_file create_file_perms;
allow atcp storage_file:file create_file_perms;
allow atcp storage_file:dir create_dir_perms;
allow atcp statusd:unix_stream_socket connectto;
allow atcp socket_device:sock_file write;
allow atcp shell_exec:file { read open };
allow atcp shell_exec:file { read execute open };
allow atcp shell_exec:file { read execute open execute_no_trans };
allow atcp shell_exec:file rx_file_perms;
allow atcp shell_exec:file execute_no_trans;
allow atcp shell_exec:file execute;
allow atcp servicemanager:binder call;
allow atcp self:udp_socket { create ioctl };
allow atcp self:udp_socket ioctl;
allow atcp self:udp_socket create;
allow atcp self:udp_socket connect;
allow atcp self:socket create_socket_perms;
allow atcp self:rawip_socket { getopt create };
allow atcp self:rawip_socket setopt;
allow atcp self:rawip_socket getopt;
allow atcp self:rawip_socket create;
allow atcp self:packet_socket { write ioctl setopt read getopt create };
allow atcp self:netlink_socket create_socket_perms;
allow atcp self:netlink_route_socket { write getattr setopt read bind create nlmsg_read };
allow atcp self:netlink_route_socket nlmsg_write;
allow atcp self:netlink_kobject_uevent_socket create_socket_perms;
allow atcp self:capability2 syslog;
allow atcp self:capability { setuid setgid };
allow atcp self:capability { setuid net_raw setgid };
allow atcp self:capability { setuid net_admin net_raw };
allow atcp self:capability { net_admin net_raw };
allow atcp self:capability sys_time;
allow atcp self:capability setuid;
allow atcp self:capability net_admin;
allow atcp self:capability fowner;
allow atcp self:capability dac_override;
allow atcp self:capability chown;
allow atcp sdcard_type:dir r_dir_perms;
allow atcp scp_device:chr_file { read open };
allow atcp rilproxy_atci_socket:sock_file write;
allow atcp rilproxy:unix_stream_socket connectto;
allow atcp rild_mal_socket:sock_file write;
allow atcp rild_mal_md2_socket:sock_file write;
allow atcp rild_mal_at_socket:sock_file write;
allow atcp rild_mal_at_md2_socket:sock_file write;
allow atcp rild_imsm_socket:sock_file write;
allow atcp rild_atci_socket:sock_file write;
allow atcp rild_atci_c2k_socket:sock_file write;
allow atcp ril_mux_report_case_prop:property_service set;
allow atcp ril_cdma_report_prop:property_service set;
allow atcp ril_active_md_prop:property_service set;
allow atcp radio_tmpfs:file write;
allow atcp radio_prop:property_service set;
allow atcp radio_device:chr_file rw_file_perms;
allow atcp radio_device:blk_file r_file_perms;
allow atcp radio_data_file:file create_file_perms;
allow atcp radio_data_file:dir rw_dir_perms;
allow atcp radio:fd use;
allow atcp qtaguid_proc:file { read getattr open };
allow atcp qemu_pipe_device:chr_file rw_file_perms;
allow atcp property_socket:sock_file write;
allow atcp proc_net:file write;
allow atcp proc_lk_env:file { open read write ioctl };
allow atcp proc_lk_env:file rw_file_perms;
allow atcp proc:file write;
allow atcp pq:binder call;
allow atcp platform_app_tmpfs:file write;
allow atcp platform_app:unix_stream_socket connectto;
allow atcp platform_app:fd use;
allow atcp platform_app:dir search;
allow atcp persist_service_atci_prop:property_service set;
allow atcp persist_ril_prop:property_service set;
allow atcp persist_mtklog_prop:property_service set;
allow atcp para_block_device:blk_file { read write open };
allow atcp netstats_service:service_manager find;
allow atcp netd_socket:sock_file write;
allow atcp netd:unix_stream_socket connectto;
allow atcp net_radio_prop:property_service set;
allow atcp net_data_file:file { read getattr open };
allow atcp net_data_file:dir search;
allow atcp mtkrild:unix_stream_socket connectto;
allow atcp mtkmal:unix_stream_socket connectto;
allow atcp mtd_device:dir search;
allow atcp mnt_user_file:lnk_file read;
allow atcp mnt_user_file:lnk_file create_file_perms;
allow atcp mnt_user_file:dir search;
allow atcp mnt_user_file:dir create_dir_perms;
allow atcp mnt_media_rw_file:lnk_file create_file_perms;
allow atcp mnt_media_rw_file:dir search;
allow atcp mnt_media_rw_file:dir create_dir_perms;
allow atcp mmcblk0_block_device:blk_file { read write open };
allow atcp mmcblk0_block_device:blk_file { open read write };
allow atcp misc_device:chr_file { read write open };
allow atcp misc2_device:chr_file { read write open };
allow atcp misc2_block_device:blk_file { read write open };
allow atcp mdlog_device:chr_file { read write open ioctl };
allow atcp mdlog_data_file:file { write read create open rename unlink getattr setattr append };
allow atcp mdlog_data_file:fifo_file { read write open create setattr };
allow atcp mdlog_data_file:dir { write search read create open rmdir remove_name add_name relabelto getattr };
allow atcp md32_device:chr_file { read open };
allow atcp mal_mfi_socket:sock_file write;
allow atcp logtemp_data_file:file create_file_perms;
allow atcp logtemp_data_file:dir { relabelto create_dir_perms };
allow atcp logmisc_data_file:file create_file_perms;
allow atcp logmisc_data_file:dir { relabelto create_dir_perms };
allow atcp logdr_socket:sock_file write;
allow atcp logd:unix_stream_socket connectto;
allow atcp log_device:chr_file { write open };
allow atcp log_device:chr_file r_file_perms;
allow atcp kernel:system syslog_mod;
allow atcp kernel:system module_request;
allow atcp init:unix_stream_socket connectto;
allow atcp gsm0710muxd_prop:property_service set;
allow atcp gsm0710muxd_device:chr_file { read write };
allow atcp gsm0710muxd_device:chr_file open;
allow atcp gpu_device:chr_file { read write open ioctl getattr };
allow atcp gps_device:chr_file rw_file_perms;
allow atcp fwmarkd_socket:sock_file write;
allow atcp fuse:file { write read create open rename unlink getattr setattr append };
allow atcp fuse:file { rename write getattr read create open unlink };
allow atcp fuse:file create_file_perms;
allow atcp fuse:dir { write search create rmdir add_name remove_name read open rename };
allow atcp fuse:dir { remove_name write search read remove_name open add_name create };
allow atcp fuse:dir create_dir_perms;
allow atcp epdg_wod:unix_stream_socket connectto;
allow atcp efs_file:file create_file_perms;
allow atcp efs_file:dir create_dir_perms;
allow atcp eemcs_device:chr_file { read write };
allow atcp eemcs_device:chr_file { read write ioctl open };
allow atcp eemcs_device:chr_file open;
allow atcp eemcs_device:chr_file ioctl;
allow atcp domain:file { read open };
allow atcp domain:dir search;
allow atcp dnsproxyd_socket:sock_file write;
allow atcp devpts:chr_file { read write open };
allow atcp devpts:chr_file { open read write ioctl };
allow atcp devpts:chr_file { getattr setattr };
allow atcp devpts:chr_file setattr;
allow atcp devpts:chr_file ioctl;
allow atcp devmap_device:chr_file { read ioctl open };
allow atcp device:lnk_file unlink;
allow atcp device:lnk_file create;
allow atcp device:dir write;
allow atcp device:dir remove_name;
allow atcp device:dir add_name;
allow atcp debug_prop:property_service set;
allow atcp debug_netlog_prop:property_service set;
allow atcp debug_mtklog_prop:property_service set;
allow atcp debug_mdlogger_prop:property_service set;
allow atcp data_tmpfs_log_file:file create_file_perms;
allow atcp data_tmpfs_log_file:dir create_dir_perms;
allow atcp ctl_volte_ua_prop:property_service set;
allow atcp ctl_volte_stack_prop:property_service set;
allow atcp ctl_volte_imcb_prop:property_service set;
allow atcp ctl_rildaemon_prop:property_service set;
allow atcp ctl_ril-daemon-mtk_prop:property_service set;
allow atcp ctl_muxreport-daemon_prop:property_service set;
allow atcp connectivity_service:service_manager find;
allow atcp cgroup:dir create_dir_perms;
allow atcp ccci_device:chr_file { read write ioctl open };
allow atcp bluetooth_efs_file:file r_file_perms;
allow atcp bluetooth_efs_file:dir r_dir_perms;
allow atcp block_device:dir search;
allow atcp audiocmdservice_atci:unix_stream_socket connectto;
allow atcp atcp_prop:property_service set;
allow atcp atci_service_socket:sock_file write;
allow atcp atci_service:unix_stream_socket connectto;
allow atcp atci_audio_socket:sock_file write;
allow atcp alarm_device:chr_file rw_file_perms;
allow atcp Vcodec_device:chr_file { read write open };
type atcp_prop, property_type;
allow untrusted_app atcp_prop:file { open read getattr };
allow atcp atcp_prop:property_service set;
2 changes: 1 addition & 1 deletion sepolicy/audiocmdservice_atci.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type audiocmdservice_atci, domain;
type audiocmdservice_atci_exec, exec_type, file_type;
type audiocmdservice_atci, domain;
init_daemon_domain(audiocmdservice_atci)
binder_use(audiocmdservice_atci)
binder_call(audiocmdservice_atci, mediaserver)
Expand Down
2 changes: 1 addition & 1 deletion sepolicy/autokd.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type autokd_exec, exec_type, file_type;
type autokd, domain;
type autokd_exec, exec_type, file_type;
init_daemon_domain(autokd)
file_type_auto_trans(autokd, system_data_file, autokd_data_file)
allow init self:tcp_socket create;
Expand Down
2 changes: 1 addition & 1 deletion sepolicy/batterywarning.te
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
type batterywarning, domain;
type batterywarning_exec, exec_type, file_type;
type batterywarning, domain;
init_daemon_domain(batterywarning)
binder_use(batterywarning)
allow batterywarning system_server:binder call;
Expand Down
Loading

0 comments on commit b149669

Please sign in to comment.