sdm660-common: sepolicy: address bunch of denials
* suppress bunch of capability denials, they are harmless and managed by aosp, if it should be fixed, aosp will do * correct some typo Signed-off-by: pix106 <sbordenave@gmail.com>
This commit is contained in:
parent
92ce6a3c67
commit
68c470f248
10 changed files with 20 additions and 4 deletions
1
sepolicy/private/odrefresh.te
Normal file
1
sepolicy/private/odrefresh.te
Normal file
|
@ -0,0 +1 @@
|
|||
dontaudit odrefresh self:capability { kill sys_admin };
|
1
sepolicy/private/profcollectd.te
Normal file
1
sepolicy/private/profcollectd.te
Normal file
|
@ -0,0 +1 @@
|
|||
dontaudit profcollectd self:capability sys_admin;
|
5
sepolicy/vendor/dontaudit.te
vendored
5
sepolicy/vendor/dontaudit.te
vendored
|
@ -3,10 +3,12 @@
|
|||
dontaudit untrusted_app ashmem_device:chr_file open;
|
||||
|
||||
dontaudit adbd self:capability sys_admin;
|
||||
dontaudit blkid self:capability sys_admin;
|
||||
dontaudit blkid_untrusted self:capability sys_admin;
|
||||
dontaudit crash_dump self:capability sys_admin;
|
||||
dontaudit extra_free_kbytes self:capability sys_admin;
|
||||
dontaudit fsck self:capability sys_admin;
|
||||
dontaudit hal_usb_default self:capability sys_admin;
|
||||
dontaudit hal_wifi_supplicant_default self:capability sys_admin;
|
||||
dontaudit installd self:capability kill;
|
||||
dontaudit irsc_util self:capability sys_admin;
|
||||
|
@ -18,7 +20,8 @@ dontaudit thermal-engine self:capability sys_admin;
|
|||
dontaudit toolbox self:capability { kill sys_admin };
|
||||
dontaudit ueventd self:capability sys_admin;
|
||||
dontaudit usbd self:capability sys_admin;
|
||||
dontaudit vdc self:capability sys_admin;
|
||||
dontaudit vdc self:capability { kill sys_admin };
|
||||
dontaudit vendor_dpmd self:capability sys_admin;
|
||||
dontaudit vendor_init-qti-dcvs-sh self:capability sys_admin;
|
||||
dontaudit vendor_modprobe self:capability sys_admin;
|
||||
dontaudit vendor_msm_irqbalanced self:capability sys_admin;
|
||||
|
|
1
sepolicy/vendor/file.te
vendored
1
sepolicy/vendor/file.te
vendored
|
@ -2,6 +2,7 @@ type ir_dev_file, file_type;
|
|||
type public_adsprpcd_file, file_type;
|
||||
type sysfs_fingerprint, fs_type, sysfs_type;
|
||||
type sysfs_touchpanel, fs_type, sysfs_type;
|
||||
type sysfs_emmc_host, fs_type, sysfs_type;
|
||||
type thermal_data_file, file_type, data_file_type;
|
||||
type sysfs_info, fs_type, sysfs_type;
|
||||
|
||||
|
|
3
sepolicy/vendor/file_contexts
vendored
3
sepolicy/vendor/file_contexts
vendored
|
@ -5,6 +5,9 @@
|
|||
/(vendor|system/vendor)/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.3-service\.xiaomi_sdm660 u:object_r:hal_fingerprint_sdm660_exec:s0
|
||||
/(vendor|system/vendor)/bin/init\.goodix\.sh u:object_r:hal_fingerprint_sdm660_exec:s0
|
||||
|
||||
# Block
|
||||
/sys/devices/platform/soc/c0c4000.sdhci/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mq/0/nr_tags(/.*)? u:object_r:sysfs_emmc_host:s0
|
||||
|
||||
# Camera
|
||||
/data/misc/camera u:object_r:camera_data_file:s0
|
||||
|
||||
|
|
2
sepolicy/vendor/hal_dpmQmiMgr.te
vendored
2
sepolicy/vendor/hal_dpmQmiMgr.te
vendored
|
@ -1 +1 @@
|
|||
allow hal_dpmQmiMgr sysfs:file { open read };
|
||||
allow hal_dpmQmiMgr sysfs:file { open read };
|
||||
|
|
2
sepolicy/vendor/hvdcp.te
vendored
2
sepolicy/vendor/hvdcp.te
vendored
|
@ -1,2 +1,2 @@
|
|||
allow hvdcp vendor_sysfs_hvdcp:file r_file_perms;
|
||||
allow hvdcp sysfs:file { open read getattr };
|
||||
allow hvdcp sysfs:file { open read getattr };
|
||||
|
|
3
sepolicy/vendor/init.te
vendored
3
sepolicy/vendor/init.te
vendored
|
@ -18,10 +18,11 @@ allow init bt_firmware_file:filesystem { getattr };
|
|||
allow init apex_metadata_file:lnk_file { read };
|
||||
|
||||
# Vibrator
|
||||
allow init sysfs_leds: file { rw_file_perms };
|
||||
allow init sysfs_leds:file { rw_file_perms };
|
||||
|
||||
allow init sysfs:file { setattr };
|
||||
allow init debugfs_tracing_debug:dir { mounton };
|
||||
allow init sysfs_emmc_host:file rw_file_perms;
|
||||
|
||||
allow init system_file:file mounton;
|
||||
allow init {
|
||||
|
|
4
sepolicy/vendor/system_app.te
vendored
4
sepolicy/vendor/system_app.te
vendored
|
@ -19,6 +19,10 @@ allow system_app sysfs_zram:dir search;
|
|||
allow system_app sysfs_zram:file r_file_perms;
|
||||
allow system_app zygote:unix_stream_socket { getopt };
|
||||
|
||||
# neverallow and harmless
|
||||
dontaudit system_app time_daemon:unix_stream_socket { connectto };
|
||||
|
||||
get_prop(system_app, system_prop);
|
||||
set_prop(system_app, system_prop);
|
||||
get_prop(system_app, qemu_hw_prop);
|
||||
hal_client_domain(system_app, hal_mlipay);
|
||||
|
|
2
sepolicy/vendor/vold.te
vendored
2
sepolicy/vendor/vold.te
vendored
|
@ -1,3 +1,5 @@
|
|||
allow vold sysfs_mmc_host:file write;
|
||||
allow vold sysfs_mmc_host:file create_file_perms;
|
||||
allow vold vendor_apex_file:file { getattr };
|
||||
allow vold mnt_vendor_file:dir { ioctl open read };
|
||||
allow vold cache_block_device:blk_file { getattr };
|
Loading…
Reference in a new issue