diff options
author | Davide Garberi <dade.garberi@gmail.com> | 2018-09-14 22:22:05 +0200 |
---|---|---|
committer | Davide Garberi <dade.garberi@gmail.com> | 2018-09-16 15:22:11 +0200 |
commit | 849a67f0b49aba827b642a8a1aca611d5a289f29 (patch) | |
tree | 3ad368dc3d1e0bb87a2879ac26543bc923061219 | |
parent | 4e7cfbca0e0367f6d9ffb84401da1213d6224413 (diff) |
msm8996: sepolicy: Address some denials
Change-Id: I8f4d9588573e48069d365b77b081f981b4948fbb
Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
-rw-r--r-- | sepolicy/atfwd.te | 1 | ||||
-rw-r--r-- | sepolicy/cnd.te | 4 | ||||
-rw-r--r-- | sepolicy/hal_audio_default.te | 4 | ||||
-rw-r--r-- | sepolicy/hal_gnss_qti.te | 1 | ||||
-rw-r--r-- | sepolicy/hal_imsrtp.te | 1 | ||||
-rw-r--r-- | sepolicy/hal_perf_default.te | 1 | ||||
-rw-r--r-- | sepolicy/hal_rcsservice.te | 1 | ||||
-rw-r--r-- | sepolicy/healthd.te | 1 | ||||
-rw-r--r-- | sepolicy/ims.te | 1 | ||||
-rw-r--r-- | sepolicy/init.te | 7 | ||||
-rw-r--r-- | sepolicy/location.te | 1 | ||||
-rw-r--r-- | sepolicy/netmgrd.te | 3 | ||||
-rw-r--r-- | sepolicy/qti_init_shell.te | 3 | ||||
-rw-r--r-- | sepolicy/system_server.te | 2 | ||||
-rw-r--r-- | sepolicy/tee.te | 1 | ||||
-rw-r--r-- | sepolicy/time_daemon.te | 1 | ||||
-rw-r--r-- | sepolicy/vendor_init.te | 1 | ||||
-rw-r--r-- | sepolicy/webview_zygote.te | 1 |
18 files changed, 35 insertions, 0 deletions
diff --git a/sepolicy/atfwd.te b/sepolicy/atfwd.te index 8588d58..d0eed5e 100644 --- a/sepolicy/atfwd.te +++ b/sepolicy/atfwd.te @@ -1 +1,2 @@ allow atfwd sysfs_msm_subsys:dir search; +allow atfwd sysfs_msm_subsys:file { open read }; diff --git a/sepolicy/cnd.te b/sepolicy/cnd.te index 83e7fe8..39e9d6b 100644 --- a/sepolicy/cnd.te +++ b/sepolicy/cnd.te @@ -1,2 +1,6 @@ allow cnd sysfs_msm_subsys:dir search; +allow cnd sysfs_msm_subsys:file { open read }; allow cnd sysfs_soc:dir search; +allow cnd default_android_hwservice:hwservice_manager add; +allow cnd system_data_file:dir read; +allow cnd system_data_file:file { getattr ioctl open read }; diff --git a/sepolicy/hal_audio_default.te b/sepolicy/hal_audio_default.te index c999ec5..3693662 100644 --- a/sepolicy/hal_audio_default.te +++ b/sepolicy/hal_audio_default.te @@ -1 +1,5 @@ allow hal_audio_default sysfs_soc:dir search; +allow hal_audio_default vendor_data_file:file { append getattr open read }; +allow hal_audio_default thermal_socket:sock_file write; +allow hal_audio_default thermal-engine:unix_stream_socket connectto; + diff --git a/sepolicy/hal_gnss_qti.te b/sepolicy/hal_gnss_qti.te index 2d58a8d..37a4083 100644 --- a/sepolicy/hal_gnss_qti.te +++ b/sepolicy/hal_gnss_qti.te @@ -1,2 +1,3 @@ allow hal_gnss_qti sysfs_msm_subsys:dir search; allow hal_gnss_qti sysfs_soc:dir search; +allow hal_gnss_qti sysfs_msm_subsys:file { open read }; diff --git a/sepolicy/hal_imsrtp.te b/sepolicy/hal_imsrtp.te index dde5fe0..1787976 100644 --- a/sepolicy/hal_imsrtp.te +++ b/sepolicy/hal_imsrtp.te @@ -1 +1,2 @@ allow hal_imsrtp sysfs_msm_subsys:dir search; +allow hal_imsrtp sysfs_msm_subsys:file { open read }; diff --git a/sepolicy/hal_perf_default.te b/sepolicy/hal_perf_default.te index 47b30f4..ae707c1 100644 --- a/sepolicy/hal_perf_default.te +++ b/sepolicy/hal_perf_default.te @@ -3,3 +3,4 @@ allow hal_perf_default hal_graphics_composer_default:process signull; allow hal_perf_default proc_kernel_sched:file rw_file_perms; allow hal_perf_default sysfs_msm_subsys:dir search; allow hal_perf_default sysfs_soc:dir search; +allow hal_perf_default hal_perf_default:capability dac_override; diff --git a/sepolicy/hal_rcsservice.te b/sepolicy/hal_rcsservice.te index 2992bec..9719d47 100644 --- a/sepolicy/hal_rcsservice.te +++ b/sepolicy/hal_rcsservice.te @@ -1 +1,2 @@ allow hal_rcsservice sysfs_msm_subsys:dir search; +allow hal_rcsservice sysfs_msm_subsys:file { open read }; diff --git a/sepolicy/healthd.te b/sepolicy/healthd.te new file mode 100644 index 0000000..93d2673 --- /dev/null +++ b/sepolicy/healthd.te @@ -0,0 +1 @@ +allow healthd sysfs:file { getattr open read }; diff --git a/sepolicy/ims.te b/sepolicy/ims.te index b547e65..c1848e6 100644 --- a/sepolicy/ims.te +++ b/sepolicy/ims.te @@ -1,3 +1,4 @@ allow ims sysfs_msm_subsys:dir search; +allow ims sysfs_msm_subsys:file { open read }; allow ims sysfs_soc:dir search; allow ims ctl_default_prop:property_service set; diff --git a/sepolicy/init.te b/sepolicy/init.te index bf04885..88d2f14 100644 --- a/sepolicy/init.te +++ b/sepolicy/init.te @@ -3,3 +3,10 @@ allow init debugfs_ipc:dir relabelfrom; allow init debugfs_ipc:file relabelfrom; allow init proc_kernel_sched:file write; allow init sysfs_scsi_devices_0000:dir write; +allow init { ion_device tee_device }:chr_file ioctl; +allow init { hal_fingerprint_hwservice hidl_base_hwservice }:hwservice_manager add; +allow init { sysfs sysfs_fingerprint }:file { open read write }; +allow init tee_device:chr_file write; +allow init hidl_base_hwservice:hwservice_manager add; +allow init sysfs_fingerprint:file { open read write }; +allow init system_server:binder call; diff --git a/sepolicy/location.te b/sepolicy/location.te index 1bcd2fe..ab3ba1f 100644 --- a/sepolicy/location.te +++ b/sepolicy/location.te @@ -1,3 +1,4 @@ allow location sysfs_msm_subsys:dir search; allow location sysfs_soc:dir search; allow location wcnss_prop:file r_file_perms; +allow location sysfs_msm_subsys:file { open read }; diff --git a/sepolicy/netmgrd.te b/sepolicy/netmgrd.te index 933aa83..f7f0051 100644 --- a/sepolicy/netmgrd.te +++ b/sepolicy/netmgrd.te @@ -1,4 +1,7 @@ allow netmgrd sysfs_msm_subsys:dir search; +allow netmgrd sysfs_msm_subsys:file { open read }; allow netmgrd sysfs_net:dir search; allow netmgrd sysfs_net:file rw_file_perms; allow netmgrd sysfs_soc:dir search; +allow netmgrd property_socket:sock_file write; +allow netmgrd init:unix_stream_socket connectto; diff --git a/sepolicy/qti_init_shell.te b/sepolicy/qti_init_shell.te index a78a8ba..a32d8ee 100644 --- a/sepolicy/qti_init_shell.te +++ b/sepolicy/qti_init_shell.te @@ -1 +1,4 @@ allow qti_init_shell sysfs:file write; +allow qti_init_shell vendor_radio_data_file:file { open read write }; +allow qti_init_shell vendor_radio_data_file:dir getattr; +allow qti_init_shell vfat:file getattr; diff --git a/sepolicy/system_server.te b/sepolicy/system_server.te index 74e97e7..d1bab44 100644 --- a/sepolicy/system_server.te +++ b/sepolicy/system_server.te @@ -6,6 +6,8 @@ allow system_server install_data_file:file getattr; allow system_server zygote:process getpgid; +allow system_server init:binder { call transfer }; + # /vendor/usr/keylayout r_dir_file(system_server, idc_file) # /vendor/usr/idc diff --git a/sepolicy/tee.te b/sepolicy/tee.te new file mode 100644 index 0000000..c42d6a3 --- /dev/null +++ b/sepolicy/tee.te @@ -0,0 +1 @@ +allow tee fingerprintd_data_file:file { open read }; diff --git a/sepolicy/time_daemon.te b/sepolicy/time_daemon.te index f7324a4..d586681 100644 --- a/sepolicy/time_daemon.te +++ b/sepolicy/time_daemon.te @@ -1,2 +1,3 @@ allow time_daemon sysfs_msm_subsys:dir search; allow time_daemon sysfs_soc:dir search; +allow time_daemon time_data_file:file { open read write }; diff --git a/sepolicy/vendor_init.te b/sepolicy/vendor_init.te new file mode 100644 index 0000000..e921f9c --- /dev/null +++ b/sepolicy/vendor_init.te @@ -0,0 +1 @@ +allow vendor_init proc_kernel_sched:file write; diff --git a/sepolicy/webview_zygote.te b/sepolicy/webview_zygote.te new file mode 100644 index 0000000..c8a7ec2 --- /dev/null +++ b/sepolicy/webview_zygote.te @@ -0,0 +1 @@ +allow webview_zygote zygote:unix_dgram_socket write; |