aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--sepolicy/audioserver.te3
-rw-r--r--sepolicy/cnd.te3
-rw-r--r--sepolicy/dpmd.te3
-rw-r--r--sepolicy/fingerprintd.te6
-rw-r--r--sepolicy/ims.te3
-rw-r--r--sepolicy/ipacm-diag.te3
-rw-r--r--sepolicy/location.te3
-rw-r--r--sepolicy/netmgrd.te5
-rw-r--r--sepolicy/priv_app.te2
-rw-r--r--sepolicy/qmuxd.te3
-rw-r--r--sepolicy/qti.te3
-rw-r--r--sepolicy/rild.te3
-rw-r--r--sepolicy/sensors.te3
-rw-r--r--sepolicy/surfaceflinger.te3
-rw-r--r--sepolicy/system_server.te12
-rw-r--r--sepolicy/thermal-engine.te4
-rw-r--r--sepolicy/time_daemon.te3
-rw-r--r--sepolicy/wcnss_filter.te1
-rw-r--r--sepolicy/wcnss_service.te3
19 files changed, 63 insertions, 6 deletions
diff --git a/sepolicy/audioserver.te b/sepolicy/audioserver.te
index 332b327..65a6bf3 100644
--- a/sepolicy/audioserver.te
+++ b/sepolicy/audioserver.te
@@ -1 +1,4 @@
set_prop(audioserver, diag_prop);
+allow audioserver diag_device:chr_file { read write };
+allow audioserver diag_device:chr_file open;
+allow audioserver diag_device:chr_file ioctl;
diff --git a/sepolicy/cnd.te b/sepolicy/cnd.te
index 8d25b5f..654dece 100644
--- a/sepolicy/cnd.te
+++ b/sepolicy/cnd.te
@@ -1,2 +1,5 @@
allow cnd diag_prop:property_service set;
get_prop(cnd, diag_prop);
+allow cnd diag_device:chr_file { read write };
+allow cnd diag_device:chr_file open;
+allow cnd diag_device:chr_file ioctl;
diff --git a/sepolicy/dpmd.te b/sepolicy/dpmd.te
index dad0de7..5a47688 100644
--- a/sepolicy/dpmd.te
+++ b/sepolicy/dpmd.te
@@ -1 +1,4 @@
get_prop(dpmd, diag_prop);
+allow dpmd diag_device:chr_file { read write };
+allow dpmd diag_device:chr_file open;
+allow dpmd diag_device:chr_file ioctl;
diff --git a/sepolicy/fingerprintd.te b/sepolicy/fingerprintd.te
index b505659..0a693bf 100644
--- a/sepolicy/fingerprintd.te
+++ b/sepolicy/fingerprintd.te
@@ -8,3 +8,9 @@ allow fingerprintd sysfs_fpc_irq:file rw_file_perms;
allow fingerprintd tee_device:chr_file rw_file_perms;
allow fingerprintd sysfs:file write;
allow fingerprintd vfat:file r_file_perms;
+allow fingerprintd system_data_file:dir { read write };
+allow fingerprintd system_data_file:dir { open remove_name };
+allow fingerprintd system_data_file:sock_file unlink;
+allow fingerprintd system_data_file:dir add_name;
+allow fingerprintd system_data_file:sock_file create;
+allow fingerprintd system_data_file:sock_file setattr;
diff --git a/sepolicy/ims.te b/sepolicy/ims.te
index 472504a..13f3f51 100644
--- a/sepolicy/ims.te
+++ b/sepolicy/ims.te
@@ -1,3 +1,6 @@
allow ims diag_prop:property_service set;
allow ims self:capability net_raw;
get_prop(ims, diag_prop);
+allow ims diag_device:chr_file { read write };
+allow ims diag_device:chr_file open;
+allow ims diag_device:chr_file ioctl;
diff --git a/sepolicy/ipacm-diag.te b/sepolicy/ipacm-diag.te
index db7fc42..d81b682 100644
--- a/sepolicy/ipacm-diag.te
+++ b/sepolicy/ipacm-diag.te
@@ -1,2 +1,5 @@
set_prop(ipacm-diag, diag_prop)
set_prop(ipacm-diag, system_prop)
+allow ipacm-diag diag_device:chr_file { read write };
+allow ipacm-diag diag_device:chr_file open;
+allow ipacm-diag diag_device:chr_file ioctl;
diff --git a/sepolicy/location.te b/sepolicy/location.te
index 756bb26..73d1f32 100644
--- a/sepolicy/location.te
+++ b/sepolicy/location.te
@@ -1 +1,4 @@
allow location permission_service:service_manager find;
+allow location diag_device:chr_file { read write };
+allow location diag_device:chr_file open;
+allow location diag_device:chr_file ioctl;
diff --git a/sepolicy/netmgrd.te b/sepolicy/netmgrd.te
index ab1140f..81c6213 100644
--- a/sepolicy/netmgrd.te
+++ b/sepolicy/netmgrd.te
@@ -1,5 +1,6 @@
type_transition netmgrd system_data_file:file netmgrd_data_file "log.txt";
-
allow netmgrd self:capability dac_override;
allow netmgrd netmgrd_data_file:file rw_file_perms;
-
+allow netmgrd diag_device:chr_file { read write };
+allow netmgrd diag_device:chr_file open;
+allow netmgrd diag_device:chr_file ioctl;
diff --git a/sepolicy/priv_app.te b/sepolicy/priv_app.te
index c2dfcc0..72e3223 100644
--- a/sepolicy/priv_app.te
+++ b/sepolicy/priv_app.te
@@ -1,4 +1,2 @@
allow priv_app device:dir r_dir_perms;
allow priv_app rfs_system_file:dir r_dir_perms;
-
-
diff --git a/sepolicy/qmuxd.te b/sepolicy/qmuxd.te
index 6f2f530..c0a40f4 100644
--- a/sepolicy/qmuxd.te
+++ b/sepolicy/qmuxd.te
@@ -1 +1,4 @@
set_prop(qmuxd, diag_prop)
+allow qmuxd diag_device:chr_file { read write };
+allow qmuxd diag_device:chr_file open;
+allow qmuxd diag_device:chr_file ioctl;
diff --git a/sepolicy/qti.te b/sepolicy/qti.te
index 09692b5..172211a 100644
--- a/sepolicy/qti.te
+++ b/sepolicy/qti.te
@@ -1 +1,4 @@
set_prop(qti, diag_prop)
+allow qti diag_device:chr_file { read write };
+allow qti diag_device:chr_file open;
+allow qti diag_device:chr_file ioctl;
diff --git a/sepolicy/rild.te b/sepolicy/rild.te
index 7093468..97e582b 100644
--- a/sepolicy/rild.te
+++ b/sepolicy/rild.te
@@ -1,4 +1,7 @@
allow rild nv_data_file:dir rw_dir_perms;
allow rild nv_data_file:file create_file_perms;
allow rild diag_prop:property_service set;
+allow rild diag_device:chr_file { read write };
get_prop(rild, diag_prop);
+allow rild diag_device:chr_file open;
+allow rild diag_device:chr_file ioctl;
diff --git a/sepolicy/sensors.te b/sepolicy/sensors.te
index 3f82807..899c77b 100644
--- a/sepolicy/sensors.te
+++ b/sepolicy/sensors.te
@@ -1 +1,4 @@
set_prop(sensors, diag_prop)
+allow sensors diag_device:chr_file { read write };
+allow sensors diag_device:chr_file open;
+allow sensors diag_device:chr_file ioctl;
diff --git a/sepolicy/surfaceflinger.te b/sepolicy/surfaceflinger.te
index 5dd9fdc..1b654f0 100644
--- a/sepolicy/surfaceflinger.te
+++ b/sepolicy/surfaceflinger.te
@@ -1 +1,4 @@
get_prop(surfaceflinger, diag_prop);
+allow surfaceflinger diag_device:chr_file { read write };
+allow surfaceflinger diag_device:chr_file open;
+allow surfaceflinger diag_device:chr_file ioctl;
diff --git a/sepolicy/system_server.te b/sepolicy/system_server.te
index 0cbb3e8..7c9fd5c 100644
--- a/sepolicy/system_server.te
+++ b/sepolicy/system_server.te
@@ -6,4 +6,14 @@ allow system_server sensors_persist_file:dir search;
allow system_server proc_stat:file r_file_perms;
allow system_server unlabeled:file unlink;
get_prop(system_server, diag_prop);
-
+allow system_server diag_device:chr_file { read write };
+allow system_server drmserver:process setsched;
+allow system_server keystore:process setsched;
+allow system_server mediacodec:process setsched;
+allow system_server mediadrmserver:process setsched;
+allow system_server mediaextractor:process setsched;
+allow system_server sdcardd:process setsched;
+allow system_server vold:process setsched;
+allow system_server zygote:process setsched;
+allow system_server diag_device:chr_file open;
+allow system_server diag_device:chr_file ioctl;
diff --git a/sepolicy/thermal-engine.te b/sepolicy/thermal-engine.te
index a101e5f..7565599 100644
--- a/sepolicy/thermal-engine.te
+++ b/sepolicy/thermal-engine.te
@@ -1,7 +1,9 @@
type_transition thermal-engine system_data_file:file thermal_data_file "decrypt.txt";
-
allow thermal-engine sysfs_kgsl:file r_file_perms;
allow thermal-engine system_data_file:dir w_dir_perms;
allow thermal-engine thermal_data_file:file create_file_perms;
allow thermal-engine sysfs_usb_supply:dir search;
allow thermal-engine sysfs_usb_supply:file r_file_perms;
+allow thermal-engine diag_device:chr_file { read write };
+allow thermal-engine diag_device:chr_file open;
+allow thermal-engine diag_device:chr_file ioctl;
diff --git a/sepolicy/time_daemon.te b/sepolicy/time_daemon.te
index 6bd661a..53503d9 100644
--- a/sepolicy/time_daemon.te
+++ b/sepolicy/time_daemon.te
@@ -1,2 +1,5 @@
allow time_daemon property_socket:sock_file write;
get_prop(time_daemon, diag_prop);
+allow time_daemon diag_device:chr_file { read write };
+allow time_daemon diag_device:chr_file open;
+allow time_daemon diag_device:chr_file ioctl;
diff --git a/sepolicy/wcnss_filter.te b/sepolicy/wcnss_filter.te
index aad7936..7de2b1c 100644
--- a/sepolicy/wcnss_filter.te
+++ b/sepolicy/wcnss_filter.te
@@ -1 +1,2 @@
get_prop(wcnss_filter, diag_prop);
+allow wcnss_filter diag_device:chr_file { ioctl open read write };
diff --git a/sepolicy/wcnss_service.te b/sepolicy/wcnss_service.te
index 2982cf8..32252f5 100644
--- a/sepolicy/wcnss_service.te
+++ b/sepolicy/wcnss_service.te
@@ -5,3 +5,6 @@ allow wcnss_service self:capability {
net_raw
};
get_prop(wcnss_service, diag_prop);
+allow wcnss_service diag_device:chr_file { read write };
+allow wcnss_service diag_device:chr_file open;
+allow wcnss_service diag_device:chr_file ioctl;