sanders: Fix moar denials

This commit is contained in:
jhenrique09
2018-01-23 12:42:46 -02:00
committed by therootlord
parent 2081af0064
commit 46660b7702
8 changed files with 12 additions and 1 deletions

View File

@@ -1 +1,2 @@
allow cnd system_wpa_socket:sock_file { unlink };
allow cnd diag_device:chr_file { read write };

4
sepolicy/ims.te Normal file
View File

@@ -0,0 +1,4 @@
allow ims debug_prop:property_service set;
get_prop(ims, debug_prop);
allow ims self:capability net_raw;
allow ims diag_device:chr_file { read write };

View File

@@ -33,7 +33,7 @@ allow init netd:unix_stream_socket connectto;
allow init self:netlink_socket { read write getattr connect };
allow init debugfs:file write;
allow init persist_file:filesystem { getattr mount relabelfrom relabelto };
allow init persist_file:filesystem { getattr mount relabelfrom relabelto unmount };
allow init self:capability sys_nice;

View File

@@ -1 +1,3 @@
allow kernel hw_block_device:blk_file rw_file_perms;
allow kernel vfat:file open;
allow kernel self:socket create;

View File

@@ -3,6 +3,7 @@ binder_use(mm-qcamerad);
binder_call(mm-qcamerad, binderservicedomain);
binder_call(mm-qcamerad, appdomain);
binder_call(mm-qcamerad, hal_sensors_default);
set_prop(mm-qcamerad, camera_prop);
allow servicemanager mm-qcamerad:dir { search };
allow servicemanager mm-qcamerad:file { read open };

View File

@@ -1 +1,2 @@
get_prop(qti, diag_prop)
allow qti diag_device:chr_file { read write };

View File

@@ -1,3 +1,4 @@
allow rfs_access self:capability net_raw;
allow rfs_access persist_file:file { getattr open read rename setattr unlink write };
allow rfs_access vendor_tombstone_data_file:dir search;

View File

@@ -2,6 +2,7 @@ get_prop(surfaceflinger, diag_prop);
allow surfaceflinger perfd_data_file:sock_file write;
allow surfaceflinger perfd_data_file:dir search;
allow surfaceflinger perfd:unix_stream_socket connectto;
allow surfaceflinger diag_device:chr_file { read write };
binder_call(surfaceflinger, hwservicemanager)