sanders: Fix moar denials
This commit is contained in:
@@ -1 +1,2 @@
|
|||||||
allow cnd system_wpa_socket:sock_file { unlink };
|
allow cnd system_wpa_socket:sock_file { unlink };
|
||||||
|
allow cnd diag_device:chr_file { read write };
|
||||||
|
|||||||
4
sepolicy/ims.te
Normal file
4
sepolicy/ims.te
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
allow ims debug_prop:property_service set;
|
||||||
|
get_prop(ims, debug_prop);
|
||||||
|
allow ims self:capability net_raw;
|
||||||
|
allow ims diag_device:chr_file { read write };
|
||||||
@@ -33,7 +33,7 @@ allow init netd:unix_stream_socket connectto;
|
|||||||
allow init self:netlink_socket { read write getattr connect };
|
allow init self:netlink_socket { read write getattr connect };
|
||||||
|
|
||||||
allow init debugfs:file write;
|
allow init debugfs:file write;
|
||||||
allow init persist_file:filesystem { getattr mount relabelfrom relabelto };
|
allow init persist_file:filesystem { getattr mount relabelfrom relabelto unmount };
|
||||||
|
|
||||||
allow init self:capability sys_nice;
|
allow init self:capability sys_nice;
|
||||||
|
|
||||||
|
|||||||
@@ -1 +1,3 @@
|
|||||||
allow kernel hw_block_device:blk_file rw_file_perms;
|
allow kernel hw_block_device:blk_file rw_file_perms;
|
||||||
|
allow kernel vfat:file open;
|
||||||
|
allow kernel self:socket create;
|
||||||
|
|||||||
@@ -3,6 +3,7 @@ binder_use(mm-qcamerad);
|
|||||||
binder_call(mm-qcamerad, binderservicedomain);
|
binder_call(mm-qcamerad, binderservicedomain);
|
||||||
binder_call(mm-qcamerad, appdomain);
|
binder_call(mm-qcamerad, appdomain);
|
||||||
binder_call(mm-qcamerad, hal_sensors_default);
|
binder_call(mm-qcamerad, hal_sensors_default);
|
||||||
|
set_prop(mm-qcamerad, camera_prop);
|
||||||
|
|
||||||
allow servicemanager mm-qcamerad:dir { search };
|
allow servicemanager mm-qcamerad:dir { search };
|
||||||
allow servicemanager mm-qcamerad:file { read open };
|
allow servicemanager mm-qcamerad:file { read open };
|
||||||
|
|||||||
@@ -1 +1,2 @@
|
|||||||
get_prop(qti, diag_prop)
|
get_prop(qti, diag_prop)
|
||||||
|
allow qti diag_device:chr_file { read write };
|
||||||
|
|||||||
@@ -1,3 +1,4 @@
|
|||||||
allow rfs_access self:capability net_raw;
|
allow rfs_access self:capability net_raw;
|
||||||
allow rfs_access persist_file:file { getattr open read rename setattr unlink write };
|
allow rfs_access persist_file:file { getattr open read rename setattr unlink write };
|
||||||
|
allow rfs_access vendor_tombstone_data_file:dir search;
|
||||||
|
|
||||||
|
|||||||
@@ -2,6 +2,7 @@ get_prop(surfaceflinger, diag_prop);
|
|||||||
allow surfaceflinger perfd_data_file:sock_file write;
|
allow surfaceflinger perfd_data_file:sock_file write;
|
||||||
allow surfaceflinger perfd_data_file:dir search;
|
allow surfaceflinger perfd_data_file:dir search;
|
||||||
allow surfaceflinger perfd:unix_stream_socket connectto;
|
allow surfaceflinger perfd:unix_stream_socket connectto;
|
||||||
|
allow surfaceflinger diag_device:chr_file { read write };
|
||||||
|
|
||||||
binder_call(surfaceflinger, hwservicemanager)
|
binder_call(surfaceflinger, hwservicemanager)
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user