summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authortilaksidduram <tilaksidduram@gmail.com>2015-11-21 13:07:00 +0530
committertilaksidduram <tilaksidduram@gmail.com>2015-11-21 13:07:00 +0530
commitb9382656be8e21727ba646340ca95255c7cda65d (patch)
tree37379401ba31ba1bbed806c3e09fc696f62b8057
parentbf09a17aaeaa177a582d749d8c8d41db55b90927 (diff)
downloaddevice_samsung_n7100-b9382656be8e21727ba646340ca95255c7cda65d.zip
device_samsung_n7100-b9382656be8e21727ba646340ca95255c7cda65d.tar.gz
device_samsung_n7100-b9382656be8e21727ba646340ca95255c7cda65d.tar.bz2
n7100: Update sepolicy for M
-rw-r--r--sepolicy/bluetooth.te2
-rw-r--r--sepolicy/device.te1
-rw-r--r--sepolicy/file.te2
-rw-r--r--sepolicy/gpsd.te3
-rw-r--r--sepolicy/mediaserver.te3
-rw-r--r--sepolicy/netd.te2
-rw-r--r--sepolicy/nfc.te3
-rw-r--r--sepolicy/rild.te2
-rw-r--r--sepolicy/servicemanager.te1
-rw-r--r--sepolicy/shared_relro.te1
-rw-r--r--sepolicy/system_server.te3
-rw-r--r--sepolicy/untrusted_app.te5
-rw-r--r--sepolicy/vold.te1
-rw-r--r--sepolicy/wpa.te1
-rw-r--r--sepolicy/wpa_supplicant.te11
-rw-r--r--sepolicy/zygote.te1
16 files changed, 39 insertions, 3 deletions
diff --git a/sepolicy/bluetooth.te b/sepolicy/bluetooth.te
index 7106722..d2dd05f 100644
--- a/sepolicy/bluetooth.te
+++ b/sepolicy/bluetooth.te
@@ -2,3 +2,5 @@ allow bluetooth firmware_exynos:dir { read open search };
allow bluetooth firmware_exynos:file { read open };
allow bluetooth bluetooth_efs_file:dir search;
allow bluetooth bluetooth_efs_file:file read;
+allow bluetooth sysfs:file write;
+allow bluetooth efs_device_file:dir search;
diff --git a/sepolicy/device.te b/sepolicy/device.te
index ef8edbe..4d1980c 100644
--- a/sepolicy/device.te
+++ b/sepolicy/device.te
@@ -12,6 +12,7 @@ type rfkill_device, dev_type;
# MFC device
type mfc_device, dev_type;
+type hpd_device, dev_type;
# Fm radio device
type fm_radio_device, dev_type;
diff --git a/sepolicy/file.te b/sepolicy/file.te
index 6ada8e6..a5fb225 100644
--- a/sepolicy/file.te
+++ b/sepolicy/file.te
@@ -10,4 +10,6 @@ type sensors_data_file, file_type, data_file_type;
# Display sysfs
type sysfs_display, fs_type, sysfs_type;
+type efs_device_file, file_type;
+
diff --git a/sepolicy/gpsd.te b/sepolicy/gpsd.te
index 309ab1a..9d588f3 100644
--- a/sepolicy/gpsd.te
+++ b/sepolicy/gpsd.te
@@ -1,7 +1,8 @@
allow gpsd rild:unix_stream_socket connectto;
allow gpsd system_data_file:dir { add_name write };
-allow gpsd system_data_file:file { create write lock open };
+#allow gpsd system_data_file:file { create write lock open };
allow gpsd system_data_file:fifo_file { create read write open setattr };
+allow gpsd system_data_file:dir { read write setattr open add_name };
allow gpsd sysfs_wake_lock:file { read write open };
allow gpsd servicemanager:binder call;
allow gpsd system_server:binder call;
diff --git a/sepolicy/mediaserver.te b/sepolicy/mediaserver.te
index 8d43cdb..0cfdc9c 100644
--- a/sepolicy/mediaserver.te
+++ b/sepolicy/mediaserver.te
@@ -1,3 +1,6 @@
allow mediaserver camera_data_file:file write;
allow mediaserver mfc_device:chr_file { read write ioctl open };
allow mediaserver ump_device:chr_file { read write ioctl open };
+
+# Bluetooth audio
+allow mediaserver bluetooth:unix_stream_socket { connectto };
diff --git a/sepolicy/netd.te b/sepolicy/netd.te
index ee1496b..30d6940 100644
--- a/sepolicy/netd.te
+++ b/sepolicy/netd.te
@@ -1 +1,3 @@
allow netd self:capability fsetid;
+allow netd init:tcp_socket { read write getopt };
+allow netd log_device:chr_file { open write };
diff --git a/sepolicy/nfc.te b/sepolicy/nfc.te
index 6a6e324..e1f83cb 100644
--- a/sepolicy/nfc.te
+++ b/sepolicy/nfc.te
@@ -1 +1,2 @@
-allow nfc firmware_exynos:dir search;
+allow nfc firmware_camera:dir { search };
+allow nfc log_device:chr_file { write };
diff --git a/sepolicy/rild.te b/sepolicy/rild.te
index 061742a..32f520c 100644
--- a/sepolicy/rild.te
+++ b/sepolicy/rild.te
@@ -1,3 +1,3 @@
allow rild self:process execmem;
-allow rild system_data_file:dir { write remove_name add_name setattr };
+#allow rild system_data_file:dir { write remove_name add_name setattr };
allow rild system_data_file:file { write create unlink setattr };
diff --git a/sepolicy/servicemanager.te b/sepolicy/servicemanager.te
index 3b3bda8..4f5475d 100644
--- a/sepolicy/servicemanager.te
+++ b/sepolicy/servicemanager.te
@@ -1,4 +1,5 @@
allow servicemanager gpsd:dir search;
allow servicemanager gpsd:file { read open };
allow servicemanager gpsd:process getattr;
+allow servicemanager log_device:chr_file { open write };
diff --git a/sepolicy/shared_relro.te b/sepolicy/shared_relro.te
new file mode 100644
index 0000000..f7f75b3
--- /dev/null
+++ b/sepolicy/shared_relro.te
@@ -0,0 +1 @@
+allow shared_relro log_device:chr_file { write };
diff --git a/sepolicy/system_server.te b/sepolicy/system_server.te
index f18517d..4b700e5 100644
--- a/sepolicy/system_server.te
+++ b/sepolicy/system_server.te
@@ -4,4 +4,7 @@ allow system_server sensors_data_file:file { read open };
allow system_server uhid_device:chr_file { read write ioctl open };
allow system_server ump_device:chr_file { read write ioctl open };
allow system_server gpsd:binder transfer;
+allow system_server dex2oat_exec:file { execute execute_no_trans read open };
+allow system_server system_file:file { execmod };
+allow system_server self:capability sys_module;
diff --git a/sepolicy/untrusted_app.te b/sepolicy/untrusted_app.te
index adaf51a..a937288 100644
--- a/sepolicy/untrusted_app.te
+++ b/sepolicy/untrusted_app.te
@@ -1,2 +1,7 @@
allow untrusted_app ump_device:chr_file { open read write ioctl };
+allow untrusted_app block_device:dir { open read search };
+allow untrusted_app kernel:system { module_request };
+allow untrusted_app firmware_camera:dir { read getattr open };
+allow untrusted_app firmware_camera:file getattr;
+allow untrusted_app firmware_mfc:file getattr;
diff --git a/sepolicy/vold.te b/sepolicy/vold.te
index 8068d38..1418d7a 100644
--- a/sepolicy/vold.te
+++ b/sepolicy/vold.te
@@ -1,2 +1,3 @@
allow vold efs_file:dir { read getattr open ioctl };
+allow vold boot_block_device:blk_file { read write open ioctl getattr };
diff --git a/sepolicy/wpa.te b/sepolicy/wpa.te
index 4f5ef08..b44a49c 100644
--- a/sepolicy/wpa.te
+++ b/sepolicy/wpa.te
@@ -1 +1,2 @@
allow wpa rfkill_device:chr_file { read open };
+allow wpa log_device:chr_file { open write };
diff --git a/sepolicy/wpa_supplicant.te b/sepolicy/wpa_supplicant.te
new file mode 100644
index 0000000..98fdc25
--- /dev/null
+++ b/sepolicy/wpa_supplicant.te
@@ -0,0 +1,11 @@
+allow wpa init:unix_dgram_socket { read write };
+
+# logwrapper used with wpa_supplicant
+allow wpa devpts:chr_file { read write };
+
+allow wpa wpa_socket:unix_dgram_socket { read write };
+allow wpa_socket system_server:unix_dgram_socket sendto;
+
+allow wpa_socket wifi_data_file:sock_file unlink;
+allow wpa rfkill_device:chr_file rw_file_perms;
+allow wpa log_device:chr_file { open };
diff --git a/sepolicy/zygote.te b/sepolicy/zygote.te
new file mode 100644
index 0000000..05c4d7d
--- /dev/null
+++ b/sepolicy/zygote.te
@@ -0,0 +1 @@
+allow zygote log_device:chr_file { open };