aboutsummaryrefslogtreecommitdiff
path: root/sepolicy
diff options
context:
space:
mode:
authornailyk-fr <nailyk_git@nailyk.fr>2017-02-04 21:05:51 +0100
committernailyk-fr <nailyk_git@nailyk.fr>2017-02-21 20:13:22 +0100
commit67ab8dadec98b22862fcb9f68d944649d6c176ab (patch)
tree8011d03d86c6319ec9f74b78ae145af97517c352 /sepolicy
parent40f4a8d2bc4b231de451985a9d04156b43214e53 (diff)
shinano-common: sepolicies: Rework for new vendors
Change-Id: Id559336a2e89951c1c17f7e9bce5b0c23ce162b9
Diffstat (limited to 'sepolicy')
-rw-r--r--sepolicy/idd.te2
-rw-r--r--sepolicy/workarounds.te64
2 files changed, 66 insertions, 0 deletions
diff --git a/sepolicy/idd.te b/sepolicy/idd.te
index e9f6a0d..218bc0c 100644
--- a/sepolicy/idd.te
+++ b/sepolicy/idd.te
@@ -10,4 +10,6 @@ allow iddd iddd_file:dir rw_file_perms;
type_transition iddd system_data_file:file iddd_file;
+type credmgr, domain;
type credmgr_exec, exec_type, file_type;
+init_daemon_domain(credmgr);
diff --git a/sepolicy/workarounds.te b/sepolicy/workarounds.te
new file mode 100644
index 0000000..1a776d3
--- /dev/null
+++ b/sepolicy/workarounds.te
@@ -0,0 +1,64 @@
+#============= credmgr ==============
+allow credmgr iddd:unix_dgram_socket sendto;
+allow credmgr iddd_file:sock_file write;
+allow credmgr secd_data_file:file { write getattr setattr read lock open };
+allow credmgr self:capability dac_override;
+allow credmgr socket_device:sock_file write;
+allow credmgr suntrold:unix_stream_socket connectto;
+allow credmgr tad:unix_stream_socket connectto;
+allow credmgr tad_socket:sock_file write;
+allow credmgr tee_device:chr_file { read write open ioctl };
+
+#============= iddd ==============
+allow iddd default_prop:property_service set;
+allow iddd iddd_file:dir { remove_name search add_name };
+allow iddd iddd_file:file { rename create };
+allow iddd init:unix_stream_socket connectto;
+allow iddd property_socket:sock_file write;
+allow iddd iddd_file:file unlink;
+allow iddd iddd_file:sock_file { write create unlink setattr };
+allow iddd logd:unix_stream_socket connectto;
+allow iddd logdr_socket:sock_file write;
+allow iddd self:netlink_socket { write bind create };
+allow iddd system_file:file execute_no_trans;
+
+#============= mediaserver ==============
+allow mediaserver credmgr:unix_stream_socket connectto;
+allow mediaserver socket_device:sock_file write;
+
+#============= suntrold ==============
+allow suntrold self:capability dac_override;
+allow suntrold socket_device:dir add_name;
+allow suntrold socket_device:sock_file { create setattr };
+allow suntrold tad:unix_stream_socket connectto;
+allow suntrold tad_socket:sock_file write;
+allow suntrold tee_device:chr_file { read write ioctl open };
+
+#============= system_server ==============
+allow system_server ta_data_file:file { read open };
+
+#============= ta_qmi ==============
+allow ta_qmi self:capability { setuid setgid };
+
+#============= tad ==============
+allow tad block_device:blk_file { read write ioctl open };
+allow tad iddd:unix_dgram_socket sendto;
+allow tad iddd_file:sock_file write;
+
+#============= thermanager ==============
+allow thermanager sysfs_battery_supply:dir search;
+allow thermanager sysfs_battery_supply:file { read write open };
+
+
+
+
+#============= init ==============
+allow init block_device:blk_file setattr;
+allow init debugfs:dir mounton;
+allow init self:socket { read bind create write ioctl };
+allow init smem_log_device:chr_file { write ioctl };
+allow init socket_device:sock_file { create unlink setattr };
+
+#============= taimport ==============
+allow taimport ta_data_file:file unlink;
+