msm8953-common: Address laser denials
based https://github.com/LineageOS/android_device_motorola_griffin
This commit is contained in:
1
sepolicy/vendor/device.te
vendored
1
sepolicy/vendor/device.te
vendored
@@ -1,2 +1,3 @@
|
|||||||
type adspd_device, dev_type;
|
type adspd_device, dev_type;
|
||||||
type isdbt_device, dev_type;
|
type isdbt_device, dev_type;
|
||||||
|
type laser_device, dev_type;
|
||||||
|
|||||||
3
sepolicy/vendor/file_contexts
vendored
3
sepolicy/vendor/file_contexts
vendored
@@ -37,6 +37,7 @@
|
|||||||
/(mnt/vendor)/persist/camera(/.*)? u:object_r:persist_camera_file:s0
|
/(mnt/vendor)/persist/camera(/.*)? u:object_r:persist_camera_file:s0
|
||||||
/sys/devices/virtual/laser(/.*)? u:object_r:sysfs_sensor:s0
|
/sys/devices/virtual/laser(/.*)? u:object_r:sysfs_sensor:s0
|
||||||
/sys/devices/virtual/input/input4(/.*)? u:object_r:sysfs_sensor:s0
|
/sys/devices/virtual/input/input4(/.*)? u:object_r:sysfs_sensor:s0
|
||||||
|
/dev/laser u:object_r:laser_device:s0
|
||||||
|
|
||||||
/(vendor|system/vendor)/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-fpcservice u:object_r:hal_fingerprint_fpc_exec:s0
|
/(vendor|system/vendor)/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-fpcservice u:object_r:hal_fingerprint_fpc_exec:s0
|
||||||
/(vendor|system/vendor)/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service-ets u:object_r:hal_fingerprint_fpc_exec:s0
|
/(vendor|system/vendor)/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service-ets u:object_r:hal_fingerprint_fpc_exec:s0
|
||||||
@@ -52,6 +53,8 @@
|
|||||||
/sys/kernel/debug/rmt_storage(/.*)? u:object_r:debugfs_rmts:s0
|
/sys/kernel/debug/rmt_storage(/.*)? u:object_r:debugfs_rmts:s0
|
||||||
/sys/kernel/boot_wlan(/.*)? u:object_r:sysfs_wifi:s0
|
/sys/kernel/boot_wlan(/.*)? u:object_r:sysfs_wifi:s0
|
||||||
|
|
||||||
|
/(vendor|system/vendor)/bin/vl53l1_daemon u:object_r:vl53l1_exec:s0
|
||||||
|
|
||||||
/sys/devices/soc/soc:fpc_fpc1020(/.*)? u:object_r:sysfs_fingerprint:s0
|
/sys/devices/soc/soc:fpc_fpc1020(/.*)? u:object_r:sysfs_fingerprint:s0
|
||||||
/sys/devices/soc/0.et320(/.*)? u:object_r:sysfs_fingerprint:s0
|
/sys/devices/soc/0.et320(/.*)? u:object_r:sysfs_fingerprint:s0
|
||||||
/(mnt/vendor)/persist/egis(/.*)? u:object_r:fingerprint_data_file:s0
|
/(mnt/vendor)/persist/egis(/.*)? u:object_r:fingerprint_data_file:s0
|
||||||
|
|||||||
1
sepolicy/vendor/mm-qcamerad.te
vendored
1
sepolicy/vendor/mm-qcamerad.te
vendored
@@ -5,6 +5,7 @@ allow mm-qcamerad persist_file:dir { getattr open read search };
|
|||||||
allow mm-qcamerad persist_file:file { read open getattr };
|
allow mm-qcamerad persist_file:file { read open getattr };
|
||||||
allow mm-qcamerad property_socket:sock_file write;
|
allow mm-qcamerad property_socket:sock_file write;
|
||||||
allow mm-qcamerad mnt_vendor_file:file rw_file_perms;
|
allow mm-qcamerad mnt_vendor_file:file rw_file_perms;
|
||||||
|
allow mm-qcamerad laser_device:chr_file { ioctl open read write };
|
||||||
|
|
||||||
# TODO(b/36599434): Remove this once mm-qcamerad stops using Binder services
|
# TODO(b/36599434): Remove this once mm-qcamerad stops using Binder services
|
||||||
typeattribute mm-qcamerad binder_in_vendor_violators;
|
typeattribute mm-qcamerad binder_in_vendor_violators;
|
||||||
|
|||||||
12
sepolicy/vendor/mmi-laser-sh.te
vendored
Normal file
12
sepolicy/vendor/mmi-laser-sh.te
vendored
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
type mmi-laser-sh, domain;
|
||||||
|
type mmi-laser-sh_exec, exec_type, vendor_file_type, file_type;
|
||||||
|
init_daemon_domain(mmi-laser-sh)
|
||||||
|
|
||||||
|
allow mmi-laser-sh kmsg_device:chr_file { write open };
|
||||||
|
allow mmi-laser-sh persist_file:dir { search open read getattr };
|
||||||
|
allow mmi-laser-sh persist_file:file { open read getattr };
|
||||||
|
allow mmi-laser-sh vendor_shell_exec:file { entrypoint read getattr };
|
||||||
|
allow mmi-laser-sh sysfs:file { write getattr open };
|
||||||
|
allow mmi-laser-sh vendor_toolbox_exec:file { execute execute_no_trans getattr open read };
|
||||||
|
allow mmi-laser-sh mnt_vendor_file:file { getattr open read };
|
||||||
|
allow mmi-laser-sh mnt_vendor_file:dir search;
|
||||||
9
sepolicy/vendor/vl53l1.te
vendored
Normal file
9
sepolicy/vendor/vl53l1.te
vendored
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
type vl53l1, domain;
|
||||||
|
type vl53l1_exec, exec_type, vendor_file_type, file_type;
|
||||||
|
|
||||||
|
init_daemon_domain(vl53l1)
|
||||||
|
|
||||||
|
allow vl53l1 self:netlink_socket { create bind };
|
||||||
|
allow vl53l1 sysfs_sensor:dir r_dir_perms;
|
||||||
|
allow vl53l1 self:netlink_socket { read write };
|
||||||
|
allow vl53l1 sysfs_sensor:file { open read };
|
||||||
Reference in New Issue
Block a user