sdm660-common: sepolicy: Address more denials

Signed-off-by: clarencelol <clarencekuiek@icloud.com>
Signed-off-by: pix106 <sbordenave@gmail.com>
This commit is contained in:
clarencelol 2021-05-28 18:04:47 +08:00 committed by pix106
parent bd2a22a4ba
commit f30354722b
8 changed files with 16 additions and 1 deletions

View file

@ -0,0 +1 @@
get_prop(bootanim, userspace_reboot_exported_prop)

1
sepolicy/private/fsck.te Normal file
View file

@ -0,0 +1 @@
allow fsck self:capability { kill };

View file

@ -1 +1,3 @@
allow init property_type:file { append create getattr map open read relabelto rename setattr unlink write }; allow init property_type:file { append create getattr map open read relabelto rename setattr unlink write };
allow init iorapd_data_file:file { getattr };
allow init hwservicemanager:binder { call transfer };

View file

@ -0,0 +1 @@
allow kernel self:capability { kill };

View file

@ -0,0 +1,4 @@
get_prop(platform_app, exported_camera_prop)
# Allow systemui to read audio prop
get_prop(platform_app, exported_audio_prop)

View file

@ -1,2 +1,6 @@
# Allow system_server to set persist_camera_prop # Allow system_server to set persist_camera_prop
get_prop(system_server, vendor_persist_camera_prop) get_prop(system_server, vendor_persist_camera_prop)
get_prop(system_server, userspace_reboot_config_prop)
get_prop(system_server, userspace_reboot_exported_prop)

View file

@ -1,3 +1,5 @@
binder_call(cameraserver, mediacodec); binder_call(cameraserver, mediacodec);
get_prop(cameraserver, vendor_persist_camera_prop) get_prop(cameraserver, vendor_persist_camera_prop)
get_prop(cameraserver, vendor_video_prop) get_prop(cameraserver, vendor_video_prop)
set_prop(cameraserver, camera_prop)
binder_call(cameraserver, mediacodec)

View file

@ -11,7 +11,7 @@ r_dir_file(hal_power_stats_default, sysfs_power_stats)
# The following folders are incidentally accessed by hal_power_stats_default and are not needed. # The following folders are incidentally accessed by hal_power_stats_default and are not needed.
dontaudit hal_power_stats_default sysfs_power_stats_ignore:dir r_dir_perms; dontaudit hal_power_stats_default sysfs_power_stats_ignore:dir r_dir_perms;
dontaudit hal_power_stats_default sysfs_power_stats_ignore:file r_file_perms; dontaudit hal_power_stats_default sysfs_power_stats_ignore:file r_file_perms;
dontaudit hal_power_stats_default sysfs:file read; dontaudit hal_power_stats_default sysfs:file { open read };
vndbinder_use(hal_power_stats) vndbinder_use(hal_power_stats)
add_service(hal_power_stats_server, power_stats_service) add_service(hal_power_stats_server, power_stats_service)