klte-common: sepolicy updates

* Full rewrite is probably best, but this is good for now

Change-Id: I4ef137ffd16892ffa562dffd9e4a88d69f4a780d
This commit is contained in:
Kevin F. Haggerty 2016-10-16 17:04:44 -06:00 committed by Kevin Haggerty
parent c6102245b7
commit 41b04289c2
10 changed files with 23 additions and 3 deletions

7
sepolicy/cameraserver.te Normal file
View File

@ -0,0 +1,7 @@
allow cameraserver camera_socket:sock_file write;
allow cameraserver init:unix_stream_socket connectto;
allow cameraserver property_socket:sock_file write;
allow cameraserver sysfs_camera:dir search;
allow cameraserver sysfs_camera:file { open read };
allow cameraserver system_file:file execmod;

View File

@ -41,9 +41,6 @@
/efs/gyro_cal_data u:object_r:sensors_efs_file:s0
/efs/prox_cal u:object_r:sensors_efs_file:s0
# Thermal
/system/bin/thermal-engine u:object_r:thermal-engine_exec:s0
# WiFi
/data/.cid.info u:object_r:wifi_data_file:s0
/data/.wifiver.info u:object_r:wifi_data_file:s0

View File

@ -11,3 +11,4 @@ allow fingerprintd tee_device:chr_file rw_file_perms;
allow fingerprintd firmware_file:dir r_dir_perms;
allow fingerprintd firmware_file:file r_file_perms;
allow fingerprintd vfat:file { getattr open read };

View File

@ -1,3 +1,4 @@
allow mediaserver cameraproxy_service:service_manager find;
allow mediaserver sensorservice_service:service_manager find;
allow mediaserver sysfs_camera:dir search;
allow mediaserver sysfs_camera:file { getattr open read };

3
sepolicy/mpdecision.te Normal file
View File

@ -0,0 +1,3 @@
# neverallow is hit for the below rule
#allow mpdecision self:capability sys_ptrace;
allow mpdecision system_data_file:sock_file write;

3
sepolicy/platform_app.te Normal file
View File

@ -0,0 +1,3 @@
allow platform_app fuseblk:dir { open read remove_name search write };
allow platform_app fuseblk:file { getattr unlink write };

3
sepolicy/priv_app.te Normal file
View File

@ -0,0 +1,3 @@
allow priv_app device:dir { open read };
allow priv_app fuseblk:dir { add_name open read search read write };
allow priv_app fuseblk:file { create getattr open read write };

View File

@ -2,3 +2,5 @@ allow ueventd sysfs_camera:file rw_file_perms;
allow ueventd sysfs_sec:file rw_file_perms;
allow ueventd sysfs_vibeamp:file rw_file_perms;
allow ueventd vcs_device:chr_file create_file_perms;
allow ueventd vfat:dir search;
allow ueventd vfat:file { getattr open read };

View File

@ -0,0 +1,3 @@
# These are safe for an untrusted_app -- they are the external SD card
allow untrusted_app fuseblk:dir search;
allow untrusted_app fuseblk:file { getattr read };