aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCosme Domínguez Díaz <cosme.ddiaz@gmail.com>2018-08-02 19:56:37 +0200
committerCosme Domínguez Díaz <cosme.ddiaz@gmail.com>2018-08-04 00:07:39 +0200
commit556263c3a4bb90ab7304ed846d55ab9a8bb12a9b (patch)
treec14e0e28654ec12bee2096a740303e00d2591f7c
parentbea53bae720ff0f8aa61099e1c04e718ec296973 (diff)
msm8996-common: Fix more SELinux denials.
-rw-r--r--sepolicy/priv_app.te35
1 files changed, 30 insertions, 5 deletions
diff --git a/sepolicy/priv_app.te b/sepolicy/priv_app.te
index 363a55f..800db6e 100644
--- a/sepolicy/priv_app.te
+++ b/sepolicy/priv_app.te
@@ -1,8 +1,33 @@
allow priv_app adsprpcd_file:filesystem getattr;
-allow priv_app device:dir open;
-allow priv_app proc_interrupts:file open;
-allow priv_app proc_modules:file r_file_perms;
+allow priv_app asec_apk_file:dir r_dir_perms;
+allow priv_app bt_firmware_file:dir r_dir_perms;
+allow priv_app cache_private_backup_file:dir r_dir_perms;
+allow priv_app cgroup:dir r_dir_perms;
+allow priv_app configfs:dir r_dir_perms;
+allow priv_app configfs:file r_file_perms;
+allow priv_app file_contexts_file:file r_file_perms;
+allow priv_app firmware_file:dir r_file_perms;
+allow priv_app hal_memtrack_default:binder call;
+allow priv_app hal_memtrack_hwservice:hwservice_manager find;
+allow priv_app hwservice_contexts_file:file r_file_perms;
+allow priv_app keylayout_file:dir r_file_perms;
+allow priv_app mac_perms_file:file r_file_perms;
+allow priv_app mnt_media_rw_file:dir r_dir_perms;
+allow priv_app nonplat_service_contexts_file:file r_file_perms;
+allow priv_app persist_file:dir r_dir_perms;
allow priv_app proc_stat:file r_file_perms;
-allow priv_app vendor_file:file rx_file_perms;
allow priv_app qemu_hw_mainkeys_prop:file r_file_perms;
-allow priv_app hal_memtrack_hwservice:hwservice_manager find;
+allow priv_app radio_data_file:dir r_dir_perms;
+allow priv_app seapp_contexts_file:file r_file_perms;
+allow priv_app sepolicy_file:file r_file_perms;
+allow priv_app service_contexts_file:file r_file_perms;
+allow priv_app system_app_data_file:dir r_dir_perms;
+allow priv_app vendor_file:file rx_file_perms;
+allow priv_app vndservice_contexts_file:file r_file_perms;
+
+r_dir_file(priv_app, sysfs_type)
+
+# Clean up logspam
+dontaudit priv_app device:dir read;
+dontaudit priv_app proc_interrupts:file read;
+dontaudit priv_app proc_modules:file read;