sanders: Update to match new qcom sepolicy
Change-Id: If6e58161489790ea7736dc1ec1fe11f2e2841b6c Signed-off-by: Erfan Abdi <erfangplus@gmail.com> Signed-off-by: therootlord <igor_cestari@hotmail.com>
This commit is contained in:
@@ -684,7 +684,7 @@ service vendor.per_proxy /vendor/bin/pm-proxy
|
|||||||
disabled
|
disabled
|
||||||
writepid /dev/cpuset/system-background/tasks
|
writepid /dev/cpuset/system-background/tasks
|
||||||
|
|
||||||
on property:init.svc.per_mgr=running
|
on property:init.svc.vendor.per_mgr=running
|
||||||
start vendor.per_proxy
|
start vendor.per_proxy
|
||||||
|
|
||||||
on property:sys.shutdown.requested=*
|
on property:sys.shutdown.requested=*
|
||||||
|
|||||||
4
sepolicy/vendor/file_contexts
vendored
4
sepolicy/vendor/file_contexts
vendored
@@ -105,7 +105,6 @@
|
|||||||
/dev/l3g4200d u:object_r:sensors_device:s0
|
/dev/l3g4200d u:object_r:sensors_device:s0
|
||||||
/dev/stml0xx_ms u:object_r:sensors_device:s0
|
/dev/stml0xx_ms u:object_r:sensors_device:s0
|
||||||
/dev/stml0xx_as u:object_r:sensors_device:s0
|
/dev/stml0xx_as u:object_r:sensors_device:s0
|
||||||
/data/misc/sensor(/.*)? u:object_r:sensors_data_file:s0
|
|
||||||
|
|
||||||
# WCNSS
|
# WCNSS
|
||||||
/sys/module/wcnsscore/parameters(/.*)? u:object_r:sysfs_wcnsscore:s0
|
/sys/module/wcnsscore/parameters(/.*)? u:object_r:sysfs_wcnsscore:s0
|
||||||
@@ -113,7 +112,6 @@
|
|||||||
/data/misc/perfd(/.*)? u:object_r:perfd_data_file:s0
|
/data/misc/perfd(/.*)? u:object_r:perfd_data_file:s0
|
||||||
/data/system/perfd(/.*)? u:object_r:perfd_data_file:s0
|
/data/system/perfd(/.*)? u:object_r:perfd_data_file:s0
|
||||||
/data/oemnvitems(/.*)? u:object_r:nv_data_file:s0
|
/data/oemnvitems(/.*)? u:object_r:nv_data_file:s0
|
||||||
/data/vendor/time(/.*)? u:object_r:time_data_file:s0
|
|
||||||
|
|
||||||
/system/vendor/bin/perfd u:object_r:perfd_exec:s0
|
/system/vendor/bin/perfd u:object_r:perfd_exec:s0
|
||||||
/system/vendor/bin/hw/android\.hardware\.power@1\.1-service-qti u:object_r:hal_power_default_exec:s0
|
/system/vendor/bin/hw/android\.hardware\.power@1\.1-service-qti u:object_r:hal_power_default_exec:s0
|
||||||
@@ -123,8 +121,6 @@
|
|||||||
|
|
||||||
/sys/kernel/debug/rmt_storage(/.*)? u:object_r:debugfs_rmt_storage:s0
|
/sys/kernel/debug/rmt_storage(/.*)? u:object_r:debugfs_rmt_storage:s0
|
||||||
|
|
||||||
/data/vendor/nfc(/.*)? u:object_r:nfc_data_file:s0
|
|
||||||
|
|
||||||
# Fingerprint custom hal
|
# Fingerprint custom hal
|
||||||
/(vendor|system/vendor)/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service_32 u:object_r:hal_fingerprint_default_exec:s0
|
/(vendor|system/vendor)/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service_32 u:object_r:hal_fingerprint_default_exec:s0
|
||||||
|
|
||||||
|
|||||||
2
sepolicy/vendor/hal_camera_default.te
vendored
2
sepolicy/vendor/hal_camera_default.te
vendored
@@ -1,4 +1,4 @@
|
|||||||
allow hal_camera_default gpu_device:dir r_dir_perms;
|
allow hal_camera_default gpu_device:dir r_dir_perms;
|
||||||
allow hal_camera_default gpu_device:file r_file_perms;
|
allow hal_camera_default gpu_device:file r_file_perms;
|
||||||
allow hal_camera_default hal_configstore_ISurfaceFlingerConfigs:hwservice_manager find;
|
allow hal_camera_default hal_configstore_ISurfaceFlingerConfigs:hwservice_manager find;
|
||||||
allow hal_camera_default hal_configstore_default:binder call;
|
allow hal_camera_default hal_configstore_default:binder call;
|
||||||
|
|||||||
2
sepolicy/vendor/per_mgr.te
vendored
2
sepolicy/vendor/per_mgr.te
vendored
@@ -1 +1 @@
|
|||||||
allow per_mgr self:capability net_raw;
|
allow vendor_per_mgr self:capability net_raw;
|
||||||
|
|||||||
5
sepolicy/vendor/peripheral_manager.te
vendored
5
sepolicy/vendor/peripheral_manager.te
vendored
@@ -1,5 +0,0 @@
|
|||||||
# binder_call(per_mgr, servicemanager);
|
|
||||||
allow per_mgr self:capability net_raw;
|
|
||||||
# allow per_mgr per_mgr_service_old:service_manager { add find };
|
|
||||||
# allow per_mgr servicemanager:binder { call transfer };
|
|
||||||
|
|
||||||
3
sepolicy/vendor/platform_app.te
vendored
3
sepolicy/vendor/platform_app.te
vendored
@@ -1,10 +1,7 @@
|
|||||||
get_prop(platform_app, camera_prop);
|
get_prop(platform_app, camera_prop);
|
||||||
get_prop(platform_app, qemu_hw_mainkeys_prop);
|
|
||||||
binder_call(platform_app, hal_sensors_default);
|
binder_call(platform_app, hal_sensors_default);
|
||||||
|
|
||||||
allow platform_app rootfs:dir getattr;
|
allow platform_app rootfs:dir getattr;
|
||||||
|
|
||||||
allow platform_app init:unix_stream_socket { read write };
|
allow platform_app init:unix_stream_socket { read write };
|
||||||
allow platform_app hal_sensors_default:unix_stream_socket { read write };
|
allow platform_app hal_sensors_default:unix_stream_socket { read write };
|
||||||
|
|
||||||
allow platform_app qemu_hw_mainkeys_prop:file {getattr open read};
|
|
||||||
|
|||||||
1
sepolicy/vendor/priv_app.te
vendored
1
sepolicy/vendor/priv_app.te
vendored
@@ -3,4 +3,3 @@ allow priv_app persist_file:filesystem getattr;
|
|||||||
allow priv_app proc_interrupts:file { open read getattr };
|
allow priv_app proc_interrupts:file { open read getattr };
|
||||||
allow priv_app proc_modules:file { open read getattr };
|
allow priv_app proc_modules:file { open read getattr };
|
||||||
get_prop(priv_app, adspd_prop);
|
get_prop(priv_app, adspd_prop);
|
||||||
get_prop(priv_app, qemu_hw_mainkeys_prop);
|
|
||||||
6
sepolicy/vendor/servicemanager.te
vendored
6
sepolicy/vendor/servicemanager.te
vendored
@@ -26,9 +26,9 @@ allow servicemanager esepmdaemon:dir search;
|
|||||||
allow servicemanager esepmdaemon:file { open read };
|
allow servicemanager esepmdaemon:file { open read };
|
||||||
allow servicemanager esepmdaemon:process getattr;
|
allow servicemanager esepmdaemon:process getattr;
|
||||||
|
|
||||||
allow servicemanager per_mgr:dir search;
|
allow servicemanager vendor_per_mgr:dir search;
|
||||||
allow servicemanager per_mgr:file { open read };
|
allow servicemanager vendor_per_mgr:file { open read };
|
||||||
allow servicemanager per_mgr:process getattr;
|
allow servicemanager vendor_per_mgr:process getattr;
|
||||||
allow servicemanager wcnss_service:process getattr;
|
allow servicemanager wcnss_service:process getattr;
|
||||||
|
|
||||||
allow servicemanager hal_gnss_qti:dir search;
|
allow servicemanager hal_gnss_qti:dir search;
|
||||||
|
|||||||
1
sepolicy/vendor/system_app.te
vendored
1
sepolicy/vendor/system_app.te
vendored
@@ -12,7 +12,6 @@ allow system_app init:unix_stream_socket { read write };
|
|||||||
allow system_app sysfs_homebutton:file write;
|
allow system_app sysfs_homebutton:file write;
|
||||||
|
|
||||||
get_prop(system_app, diag_prop);
|
get_prop(system_app, diag_prop);
|
||||||
get_prop(system_app, qemu_hw_mainkeys_prop);
|
|
||||||
binder_call(system_app, qtitetherservice_service);
|
binder_call(system_app, qtitetherservice_service);
|
||||||
binder_call(system_app, wificond);
|
binder_call(system_app, wificond);
|
||||||
|
|
||||||
|
|||||||
2
sepolicy/vendor/system_server.te
vendored
2
sepolicy/vendor/system_server.te
vendored
@@ -16,5 +16,3 @@ allow system_server init:unix_stream_socket write;
|
|||||||
allow system_server sensors_device:chr_file { ioctl open read };
|
allow system_server sensors_device:chr_file { ioctl open read };
|
||||||
|
|
||||||
allow system_server vendor_file:file { getattr open read execute };
|
allow system_server vendor_file:file { getattr open read execute };
|
||||||
|
|
||||||
get_prop(system_server, alarm_boot_prop)
|
|
||||||
|
|||||||
1
sepolicy/vendor/toolbox.te
vendored
1
sepolicy/vendor/toolbox.te
vendored
@@ -1,7 +1,6 @@
|
|||||||
set_prop(toolbox, diag_prop);
|
set_prop(toolbox, diag_prop);
|
||||||
set_prop(toolbox, hw_rev_prop);
|
set_prop(toolbox, hw_rev_prop);
|
||||||
set_prop(toolbox, touch_prop);
|
set_prop(toolbox, touch_prop);
|
||||||
get_prop(toolbox rmnet_mux_prop);
|
|
||||||
allow toolbox init:fifo_file { write getattr };
|
allow toolbox init:fifo_file { write getattr };
|
||||||
|
|
||||||
allow toolbox self:capability { chown dac_override };
|
allow toolbox self:capability { chown dac_override };
|
||||||
|
|||||||
1
sepolicy/vendor/untrusted_app_25.te
vendored
1
sepolicy/vendor/untrusted_app_25.te
vendored
@@ -5,6 +5,5 @@
|
|||||||
allow untrusted_app_25 init:unix_stream_socket { read write };
|
allow untrusted_app_25 init:unix_stream_socket { read write };
|
||||||
|
|
||||||
allow untrusted_app_25 proc_stat:file read;
|
allow untrusted_app_25 proc_stat:file read;
|
||||||
allow untrusted_app_25 qemu_hw_mainkeys_prop:file read;
|
|
||||||
allow untrusted_app_25 self:udp_socket ioctl;
|
allow untrusted_app_25 self:udp_socket ioctl;
|
||||||
allow untrusted_app_25 vold_exec:file read;
|
allow untrusted_app_25 vold_exec:file read;
|
||||||
|
|||||||
Reference in New Issue
Block a user