sanders: update to sepolicy
Signed-off-by: ronaxdevil <pratabidya.007@gmail.com>
This commit is contained in:
2
sepolicy/vendor/cameraserver.te
vendored
2
sepolicy/vendor/cameraserver.te
vendored
@@ -25,7 +25,7 @@ allow cameraserver media_rw_data_file:file { create read write open };
|
|||||||
allow cameraserver cameraserver:process { execmem };
|
allow cameraserver cameraserver:process { execmem };
|
||||||
|
|
||||||
####
|
####
|
||||||
allow cameraserver debug_prop:file { r_file_perms };
|
#allow cameraserver debug_prop:file { r_file_perms };
|
||||||
allow cameraserver debug_prop:property_service set;
|
allow cameraserver debug_prop:property_service set;
|
||||||
|
|
||||||
#######
|
#######
|
||||||
|
|||||||
2
sepolicy/vendor/fingerprintd.te
vendored
2
sepolicy/vendor/fingerprintd.te
vendored
@@ -8,5 +8,5 @@ allow fingerprintd sysfs_mmi_fp:file rw_file_perms;
|
|||||||
allow fingerprintd system_data_file:sock_file unlink;
|
allow fingerprintd system_data_file:sock_file unlink;
|
||||||
allow fingerprintd sysfs_fpc:dir r_dir_perms;
|
allow fingerprintd sysfs_fpc:dir r_dir_perms;
|
||||||
allow fingerprintd sysfs_fpc:file rw_file_perms;
|
allow fingerprintd sysfs_fpc:file rw_file_perms;
|
||||||
allow fingerprintd tee_device:chr_file { ioctl open read write };
|
#allow fingerprintd tee_device:chr_file { ioctl open read write };
|
||||||
allow fingerprintd uhid_device:chr_file rw_file_perms;
|
allow fingerprintd uhid_device:chr_file rw_file_perms;
|
||||||
|
|||||||
8
sepolicy/vendor/hal_camera_default.te
vendored
8
sepolicy/vendor/hal_camera_default.te
vendored
@@ -1,4 +1,4 @@
|
|||||||
allow hal_camera_default gpu_device:dir r_dir_perms;
|
#allow hal_camera_default gpu_device:dir r_dir_perms;
|
||||||
allow hal_camera_default gpu_device:file r_file_perms;
|
#allow hal_camera_default gpu_device:file r_file_perms;
|
||||||
allow hal_camera_default hal_configstore_ISurfaceFlingerConfigs:hwservice_manager find;
|
#allow hal_camera_default hal_configstore_ISurfaceFlingerConfigs:hwservice_manager find;
|
||||||
allow hal_camera_default hal_configstore_default:binder call;
|
#allow hal_camera_default hal_configstore_default:binder call;
|
||||||
|
|||||||
6
sepolicy/vendor/init.te
vendored
6
sepolicy/vendor/init.te
vendored
@@ -12,7 +12,7 @@ allow init system_data_file:file lock;
|
|||||||
allow init audio_device:chr_file { write ioctl };
|
allow init audio_device:chr_file { write ioctl };
|
||||||
allow init input_device:chr_file rw_file_perms;
|
allow init input_device:chr_file rw_file_perms;
|
||||||
allow init sensors_device:chr_file { write ioctl };
|
allow init sensors_device:chr_file { write ioctl };
|
||||||
allow init tee_device:chr_file { write ioctl };
|
#allow init tee_device:chr_file { write ioctl };
|
||||||
|
|
||||||
allow init servicemanager:binder { transfer call };
|
allow init servicemanager:binder { transfer call };
|
||||||
allow init system_server:binder { transfer call };
|
allow init system_server:binder { transfer call };
|
||||||
@@ -44,9 +44,9 @@ allow init self:netlink_route_socket { bind create getopt nlmsg_read read setopt
|
|||||||
|
|
||||||
allow init self:capability2 { block_suspend };
|
allow init self:capability2 { block_suspend };
|
||||||
|
|
||||||
allow init hal_sensors_hwservice:hwservice_manager find;
|
#allow init hal_sensors_hwservice:hwservice_manager find;
|
||||||
|
|
||||||
allow init { domain -lmkd -crash_dump }:process noatsecure;
|
#allow init { domain -lmkd -crash_dump }:process noatsecure;
|
||||||
|
|
||||||
#allow init hal_perf_hwservice:hwservice_manager find;
|
#allow init hal_perf_hwservice:hwservice_manager find;
|
||||||
allow init hidl_base_hwservice:hwservice_manager add;
|
allow init hidl_base_hwservice:hwservice_manager add;
|
||||||
|
|||||||
2
sepolicy/vendor/radio.te
vendored
2
sepolicy/vendor/radio.te
vendored
@@ -1,3 +1,3 @@
|
|||||||
allow radio system_app_data_file:dir getattr;
|
allow radio system_app_data_file:dir getattr;
|
||||||
#allow radio qmuxd_socket:sock_file write;
|
#allow radio qmuxd_socket:sock_file write;
|
||||||
allow radio vendor_file:file { getattr open read };
|
#allow radio vendor_file:file { getattr open read };
|
||||||
|
|||||||
2
sepolicy/vendor/system_server.te
vendored
2
sepolicy/vendor/system_server.te
vendored
@@ -12,7 +12,7 @@ allow system_server init:unix_stream_socket write;
|
|||||||
|
|
||||||
allow system_server sensors_device:chr_file { ioctl open read };
|
allow system_server sensors_device:chr_file { ioctl open read };
|
||||||
|
|
||||||
allow system_server vendor_file:file { getattr read };
|
#allow system_server vendor_file:file { getattr read };
|
||||||
|
|
||||||
allow system_server sysfs:file getattr;
|
allow system_server sysfs:file getattr;
|
||||||
allow system_server thermal_service:service_manager find;
|
allow system_server thermal_service:service_manager find;
|
||||||
|
|||||||
Reference in New Issue
Block a user