sepolicy: Add access policy for charger files
Add charger.te file and add policy for charger script to access charger devices. while at it add sepolicy rules for hvdcp_opti. Change-Id: Ib14d5baad3415e3044732177c73b3e64d4f8fdc4
This commit is contained in:
parent
2f2f78bca5
commit
5722ea2a85
5 changed files with 44 additions and 1 deletions
37
legacy/vendor/common/charger.te
vendored
Normal file
37
legacy/vendor/common/charger.te
vendored
Normal file
|
@ -0,0 +1,37 @@
|
||||||
|
# Copyright (c) 2019, The Linux Foundation. All rights reserved.
|
||||||
|
#
|
||||||
|
# Redistribution and use in source and binary forms, with or without
|
||||||
|
# modification, are permitted provided that the following conditions are
|
||||||
|
# met:
|
||||||
|
# * Redistributions of source code must retain the above copyright
|
||||||
|
# notice, this list of conditions and the following disclaimer.
|
||||||
|
# * Redistributions in binary form must reproduce the above
|
||||||
|
# copyright notice, this list of conditions and the following
|
||||||
|
# disclaimer in the documentation and/or other materials provided
|
||||||
|
# with the distribution.
|
||||||
|
# * Neither the name of The Linux Foundation nor the names of its
|
||||||
|
# contributors may be used to endorse or promote products derived
|
||||||
|
# from this software without specific prior written permission.
|
||||||
|
#
|
||||||
|
# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
|
||||||
|
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||||
|
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
|
||||||
|
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
|
||||||
|
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||||
|
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||||
|
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
||||||
|
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
||||||
|
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||||
|
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
||||||
|
# IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
allow charger self:capability2 wake_alarm;
|
||||||
|
r_dir_file(charger, sysfs_battery_supply)
|
||||||
|
r_dir_file(charger, sysfs_usb_supply)
|
||||||
|
|
||||||
|
allow charger {
|
||||||
|
sysfs_battery_supply
|
||||||
|
sysfs_usb_supply
|
||||||
|
}:file w_file_perms;
|
||||||
|
|
||||||
|
dontaudit charger device:dir r_dir_perms;
|
||||||
|
dontaudit charger self:capability sys_admin;
|
2
legacy/vendor/common/hvdcp.te
vendored
2
legacy/vendor/common/hvdcp.te
vendored
|
@ -71,6 +71,6 @@ allow hvdcp mnt_vendor_file:dir search;
|
||||||
allow hvdcp persist_hvdcp_file:dir rw_dir_perms;
|
allow hvdcp persist_hvdcp_file:dir rw_dir_perms;
|
||||||
allow hvdcp persist_hvdcp_file:file create_file_perms;
|
allow hvdcp persist_hvdcp_file:file create_file_perms;
|
||||||
|
|
||||||
get_prop(hvdcp, hvdcp_opti_prop)
|
set_prop(hvdcp, hvdcp_opti_prop)
|
||||||
|
|
||||||
wakelock_use(hvdcp)
|
wakelock_use(hvdcp)
|
||||||
|
|
3
legacy/vendor/common/init_shell.te
vendored
3
legacy/vendor/common/init_shell.te
vendored
|
@ -234,15 +234,18 @@ allow qti_init_shell fm_qsoc_patches_exec:file rx_file_perms;
|
||||||
allow qti_init_shell {
|
allow qti_init_shell {
|
||||||
sysfs_battery_supply
|
sysfs_battery_supply
|
||||||
sysfs_usb_supply
|
sysfs_usb_supply
|
||||||
|
sysfs_usbpd_device
|
||||||
}:dir r_dir_perms;
|
}:dir r_dir_perms;
|
||||||
|
|
||||||
allow qti_init_shell {
|
allow qti_init_shell {
|
||||||
sysfs_battery_supply
|
sysfs_battery_supply
|
||||||
sysfs_usb_supply
|
sysfs_usb_supply
|
||||||
|
sysfs_usbpd_device
|
||||||
}:file rw_file_perms;
|
}:file rw_file_perms;
|
||||||
|
|
||||||
allow qti_init_shell sysfs_battery_supply:file setattr;
|
allow qti_init_shell sysfs_battery_supply:file setattr;
|
||||||
allow qti_init_shell sysfs_usb_supply:file setattr;
|
allow qti_init_shell sysfs_usb_supply:file setattr;
|
||||||
|
allow qti_init_shell sysfs_usbpd_device:file setattr;
|
||||||
|
|
||||||
allow qti_init_shell sysfs_fm:file rw_file_perms;
|
allow qti_init_shell sysfs_fm:file rw_file_perms;
|
||||||
|
|
||||||
|
|
1
legacy/vendor/sdm710/file_contexts
vendored
1
legacy/vendor/sdm710/file_contexts
vendored
|
@ -147,6 +147,7 @@
|
||||||
# FBE
|
# FBE
|
||||||
/(vendor|system/vendor)/bin/init.qti.qseecomd.sh u:object_r:init-qti-fbe-sh_exec:s0
|
/(vendor|system/vendor)/bin/init.qti.qseecomd.sh u:object_r:init-qti-fbe-sh_exec:s0
|
||||||
|
|
||||||
|
/vendor/bin/init.qti.chg_policy.sh u:object_r:qti_init_shell_exec:s0
|
||||||
##################################
|
##################################
|
||||||
# same process HAL libs
|
# same process HAL libs
|
||||||
/vendor/lib(64)?/hw/gralloc\.sdm710\.so u:object_r:same_process_hal_file:s0
|
/vendor/lib(64)?/hw/gralloc\.sdm710\.so u:object_r:same_process_hal_file:s0
|
||||||
|
|
2
legacy/vendor/sdm845/file_contexts
vendored
2
legacy/vendor/sdm845/file_contexts
vendored
|
@ -91,6 +91,8 @@
|
||||||
# FBE
|
# FBE
|
||||||
/(vendor|system/vendor)/bin/init.qti.qseecomd.sh u:object_r:init-qti-fbe-sh_exec:s0
|
/(vendor|system/vendor)/bin/init.qti.qseecomd.sh u:object_r:init-qti-fbe-sh_exec:s0
|
||||||
|
|
||||||
|
/vendor/bin/init.qti.chg_policy.sh u:object_r:qti_init_shell_exec:s0
|
||||||
|
|
||||||
# Same process file
|
# Same process file
|
||||||
/vendor/lib(64)?/hw/gralloc\.sdm845\.so u:object_r:same_process_hal_file:s0
|
/vendor/lib(64)?/hw/gralloc\.sdm845\.so u:object_r:same_process_hal_file:s0
|
||||||
/vendor/lib(64)?/hw/vulkan\.sdm845\.so u:object_r:same_process_hal_file:s0
|
/vendor/lib(64)?/hw/vulkan\.sdm845\.so u:object_r:same_process_hal_file:s0
|
||||||
|
|
Loading…
Reference in a new issue