summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--private/priv_app.te2
-rw-r--r--vendor/google/google_camera_app.te2
-rw-r--r--vendor/qcom/common/bootanim.te2
-rw-r--r--vendor/qcom/common/cdsprpcd.te4
-rw-r--r--vendor/qcom/common/hal_camera_default.te2
-rw-r--r--vendor/qcom/common/hal_graphics_composer_default.te2
-rw-r--r--vendor/qcom/common/hal_imsrtp.te2
-rw-r--r--vendor/qcom/common/hal_radioext_default.te2
-rw-r--r--vendor/qcom/common/hal_rcsservice.te2
-rw-r--r--vendor/qcom/common/hal_sensors_default.te2
-rw-r--r--vendor/qcom/common/ims.te2
-rw-r--r--vendor/qcom/common/kernel.te3
-rw-r--r--vendor/qcom/common/platform_app.te1
-rw-r--r--vendor/qcom/common/rild.te2
-rw-r--r--vendor/qcom/common/surfaceflinger.te1
-rw-r--r--vendor/qcom/common/system_app.te5
-rw-r--r--vendor/qcom/common/system_server.te2
-rw-r--r--vendor/qcom/common/untrusted_app.te1
-rw-r--r--vendor/qcom/common/untrusted_app_27.te2
19 files changed, 40 insertions, 1 deletions
diff --git a/private/priv_app.te b/private/priv_app.te
index 408a352..b9253ae 100644
--- a/private/priv_app.te
+++ b/private/priv_app.te
@@ -1,3 +1,5 @@
dontaudit priv_app sysfs:file read;
dontaudit priv_app zygote:dir search;
dontaudit priv_app mnt_vendor_file:dir search;
+allow priv_app app_data_file:dir search;
+allow priv_app vendor_default_prop:file read;
diff --git a/vendor/google/google_camera_app.te b/vendor/google/google_camera_app.te
index 6520084..1f70ef0 100644
--- a/vendor/google/google_camera_app.te
+++ b/vendor/google/google_camera_app.te
@@ -42,3 +42,5 @@ allow google_camera_app system_app_data_file:file { read write getattr };
allow google_camera_app hal_paintbox_hwservice:hwservice_manager find;
binder_call(google_camera_app, easel)
allow google_camera_app easel_device:chr_file rw_file_perms;
+
+allow google_camera_app vendor_default_prop:file read;
diff --git a/vendor/qcom/common/bootanim.te b/vendor/qcom/common/bootanim.te
index 0125ef0..7cec260 100644
--- a/vendor/qcom/common/bootanim.te
+++ b/vendor/qcom/common/bootanim.te
@@ -9,4 +9,6 @@ dontaudit bootanim system_data_file:dir read;
# TODO(b/37205419): Remove upon resolution
dontaudit bootanim kernel:system module_request;
+allow bootanim vendor_default_prop:file read;
+
get_prop(bootanim, vendor_display_prop)
diff --git a/vendor/qcom/common/cdsprpcd.te b/vendor/qcom/common/cdsprpcd.te
index ab1f819..33f5610 100644
--- a/vendor/qcom/common/cdsprpcd.te
+++ b/vendor/qcom/common/cdsprpcd.te
@@ -13,4 +13,6 @@ allow cdsprpcd ion_device:chr_file r_file_perms;
r_dir_file(cdsprpcd, sysfs_devfreq)
allow cdsprpcd sysfs_devfreq_l3cdsp:dir r_dir_perms;
-allow cdsprpcd sysfs_devfreq_l3cdsp:file rw_file_perms; \ No newline at end of file
+allow cdsprpcd sysfs_devfreq_l3cdsp:file rw_file_perms;
+
+allow cdsprpcd system_file:dir read;
diff --git a/vendor/qcom/common/hal_camera_default.te b/vendor/qcom/common/hal_camera_default.te
index bee51fe..53911fd 100644
--- a/vendor/qcom/common/hal_camera_default.te
+++ b/vendor/qcom/common/hal_camera_default.te
@@ -34,3 +34,5 @@ binder_call(hal_camera_default, easel)
dontaudit hal_camera_default kernel:system module_request;
dontaudit hal_camera_default vendor_display_prop:file r_file_perms;
+
+allow hal_camera_default persist_file:file read;
diff --git a/vendor/qcom/common/hal_graphics_composer_default.te b/vendor/qcom/common/hal_graphics_composer_default.te
index 50815e2..0b0e27a 100644
--- a/vendor/qcom/common/hal_graphics_composer_default.te
+++ b/vendor/qcom/common/hal_graphics_composer_default.te
@@ -55,3 +55,5 @@ dontaudit hal_graphics_composer_default vendor_display_prop:file r_file_perms;
#allow composer access hal_light
hal_client_domain(hal_graphics_composer_default, hal_light);
allow hal_graphics_composer_default hal_light_hwservice:hwservice_manager find;
+
+allow hal_graphics_composer_default diag_device:chr_file { read write };
diff --git a/vendor/qcom/common/hal_imsrtp.te b/vendor/qcom/common/hal_imsrtp.te
index 1ad890c..d5578e7 100644
--- a/vendor/qcom/common/hal_imsrtp.te
+++ b/vendor/qcom/common/hal_imsrtp.te
@@ -32,3 +32,5 @@ get_prop(hal_imsrtp, ims_prop)
binder_call(hal_imsrtp, radio)
dontaudit hal_imsrtp kernel:system module_request;
+
+allow hal_imsrtp diag_device:chr_file { read write };
diff --git a/vendor/qcom/common/hal_radioext_default.te b/vendor/qcom/common/hal_radioext_default.te
index 795d823..127f6cb 100644
--- a/vendor/qcom/common/hal_radioext_default.te
+++ b/vendor/qcom/common/hal_radioext_default.te
@@ -22,3 +22,5 @@ userdebug_or_eng(`
allow hal_radioext_default modem_stat_data_file:file create_file_perms;
dontaudit hal_radioext_default kernel:system module_request;
+
+allow hal_radioext_default radio_vendor_data_file:dir search;
diff --git a/vendor/qcom/common/hal_rcsservice.te b/vendor/qcom/common/hal_rcsservice.te
index 13c4b13..bf488ab 100644
--- a/vendor/qcom/common/hal_rcsservice.te
+++ b/vendor/qcom/common/hal_rcsservice.te
@@ -42,3 +42,5 @@ allow hal_rcsservice self:capability net_bind_service;
set_prop(hal_rcsservice, ctl_vendor_imsrcsservice_prop)
dontaudit hal_rcsservice kernel:system module_request;
+
+allow hal_rcsservice diag_device:chr_file { read write };
diff --git a/vendor/qcom/common/hal_sensors_default.te b/vendor/qcom/common/hal_sensors_default.te
index c5bc960..8857f85 100644
--- a/vendor/qcom/common/hal_sensors_default.te
+++ b/vendor/qcom/common/hal_sensors_default.te
@@ -25,3 +25,5 @@ dontaudit hal_sensors_default kernel:system module_request;
r_dir_file(hal_sensors_default, sysfs_batteryinfo)
r_dir_file(hal_sensors_default, adsprpcd_file)
+
+allow hal_sensors_default diag_device:chr_file { read write };
diff --git a/vendor/qcom/common/ims.te b/vendor/qcom/common/ims.te
index 5d0cd9e..611034c 100644
--- a/vendor/qcom/common/ims.te
+++ b/vendor/qcom/common/ims.te
@@ -35,3 +35,5 @@ allow ims hal_cne_hwservice:hwservice_manager find;
binder_call(ims, cnd)
dontaudit ims kernel:system module_request;
+
+allow ims diag_device:chr_file { read write };
diff --git a/vendor/qcom/common/kernel.te b/vendor/qcom/common/kernel.te
index 8a47572..c552187 100644
--- a/vendor/qcom/common/kernel.te
+++ b/vendor/qcom/common/kernel.te
@@ -11,3 +11,6 @@ allow kernel vendor_file:file r_file_perms;
allow kernel debugfs_ipc:dir search;
allow kernel persist_file:dir search;
+
+allow kernel debugfs_wlan:dir search;
+allow kernel self:socket create;
diff --git a/vendor/qcom/common/platform_app.te b/vendor/qcom/common/platform_app.te
index d268a1c..a418697 100644
--- a/vendor/qcom/common/platform_app.te
+++ b/vendor/qcom/common/platform_app.te
@@ -5,3 +5,4 @@ allow platform_app persist_sensors_file:file r_file_perms;
# To find and bind hal_wlc
allow platform_app hal_wlc_hwservice:hwservice_manager find;
allow platform_app hal_wlc:binder call;
+allow platform_app vendor_default_prop:file read;
diff --git a/vendor/qcom/common/rild.te b/vendor/qcom/common/rild.te
index e82e1a3..12e9e0d 100644
--- a/vendor/qcom/common/rild.te
+++ b/vendor/qcom/common/rild.te
@@ -30,3 +30,5 @@ set_prop(rild, vendor_radio_prop)
allow rild proc_qtaguid_stat:file r_file_perms;
hal_server_domain(rild, hal_secure_element)
+
+allow rild socket_device:dir write;
diff --git a/vendor/qcom/common/surfaceflinger.te b/vendor/qcom/common/surfaceflinger.te
index 79c6a9d..feb10af 100644
--- a/vendor/qcom/common/surfaceflinger.te
+++ b/vendor/qcom/common/surfaceflinger.te
@@ -3,3 +3,4 @@ dontaudit surfaceflinger kernel:system module_request;
dontaudit surfaceflinger vendor_default_prop:file read;
userdebug_or_eng(`get_prop(surfaceflinger, vendor_display_prop)')
allow surfaceflinger debugfs_ion:dir search;
+allow surfaceflinger vendor_display_prop:file read;
diff --git a/vendor/qcom/common/system_app.te b/vendor/qcom/common/system_app.te
index 98d25c7..79dfd9c 100644
--- a/vendor/qcom/common/system_app.te
+++ b/vendor/qcom/common/system_app.te
@@ -1,3 +1,8 @@
typeattribute system_app system_writes_vendor_properties_violators;
set_prop(system_app, vendor_bluetooth_prop)
+
+allow system_app fs_bpf:dir search;
+allow system_app proc_pagetypeinfo:file read;
+allow system_app sysfs_zram:dir search;
+allow system_app vendor_default_prop:file read;
diff --git a/vendor/qcom/common/system_server.te b/vendor/qcom/common/system_server.te
index 16c0c92..35690ba 100644
--- a/vendor/qcom/common/system_server.te
+++ b/vendor/qcom/common/system_server.te
@@ -12,3 +12,5 @@ allow system_server wlan_device:chr_file rw_file_perms;
dontaudit system_server self:capability sys_module;
dontaudit system_server vendor_display_prop:file r_file_perms;
+
+allow system_server vendor_default_prop:file read;
diff --git a/vendor/qcom/common/untrusted_app.te b/vendor/qcom/common/untrusted_app.te
new file mode 100644
index 0000000..a80c059
--- /dev/null
+++ b/vendor/qcom/common/untrusted_app.te
@@ -0,0 +1 @@
+allow untrusted_app vendor_default_prop:file read;
diff --git a/vendor/qcom/common/untrusted_app_27.te b/vendor/qcom/common/untrusted_app_27.te
new file mode 100644
index 0000000..48b33a4
--- /dev/null
+++ b/vendor/qcom/common/untrusted_app_27.te
@@ -0,0 +1,2 @@
+allow untrusted_app_27 cache_file:lnk_file read;
+allow untrusted_app_27 vendor_default_prop:file read;