Merge "sepolicy: add persist file access for hvdcp"
This commit is contained in:
		
				
					committed by
					
						
						Gerrit - the friendly Code Review server
					
				
			
			
				
	
			
			
			
					commit
					3fea7ba91a
				
			
							
								
								
									
										1
									
								
								qva/vendor/common/file.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										1
									
								
								qva/vendor/common/file.te
									
									
									
									
										vendored
									
									
								
							@@ -49,6 +49,7 @@ type qdma_socket, file_type, mlstrustedobject;
 | 
			
		||||
type sysfs_npu, fs_type, sysfs_type;
 | 
			
		||||
 | 
			
		||||
type vendor_persist_mmi_file, file_type, vendor_persist_type;
 | 
			
		||||
type persist_hvdcp_file, file_type, vendor_persist_type;
 | 
			
		||||
 | 
			
		||||
#File type by mmi
 | 
			
		||||
type vendor_mmi_socket, file_type;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								qva/vendor/common/file_contexts
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								qva/vendor/common/file_contexts
									
									
									
									
										vendored
									
									
								
							@@ -135,7 +135,7 @@
 | 
			
		||||
/mnt/vendor/persist/qti_fp(/.*)?      u:object_r:persist_qti_fp_file:s0
 | 
			
		||||
/mnt/vendor/persist/FTM_AP(/.*)?      u:object_r:vendor_persist_mmi_file:s0
 | 
			
		||||
/mnt/vendor/persist/vpp(/.*)?         u:object_r:persist_vpp_file:s0
 | 
			
		||||
 | 
			
		||||
/mnt/vendor/persist/hvdcp_opti(/.*)?  u:object_r:persist_hvdcp_file:s0
 | 
			
		||||
 | 
			
		||||
# same-process HAL files and their dependencies
 | 
			
		||||
#
 | 
			
		||||
 
 | 
			
		||||
@@ -1,4 +1,4 @@
 | 
			
		||||
# Copyright (c) 2018, The Linux Foundation. All rights reserved.
 | 
			
		||||
# Copyright (c) 2018-2019, The Linux Foundation. All rights reserved.
 | 
			
		||||
#
 | 
			
		||||
# Redistribution and use in source and binary forms, with or without
 | 
			
		||||
# modification, are permitted provided that the following conditions are
 | 
			
		||||
@@ -56,12 +56,12 @@ allow hvdcp {
 | 
			
		||||
    sysfs_spmi_dev
 | 
			
		||||
}:lnk_file r_file_perms;
 | 
			
		||||
 | 
			
		||||
allow hvdcp self:capability { setgid setuid };
 | 
			
		||||
allow hvdcp self:capability2 wake_alarm;
 | 
			
		||||
allow hvdcp kmsg_device:chr_file rw_file_perms;
 | 
			
		||||
allow hvdcp cgroup:dir { create add_name };
 | 
			
		||||
userdebug_or_eng(`allow hvdcp kmsg_device:chr_file rw_file_perms;')
 | 
			
		||||
allow hvdcp self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
 | 
			
		||||
allow hvdcp sysfs_battery_supply:file setattr;
 | 
			
		||||
allow hvdcp sysfs_usb_supply:file setattr;
 | 
			
		||||
allow hvdcp sysfs_usbpd_device:file setattr;
 | 
			
		||||
 | 
			
		||||
allow hvdcp mnt_vendor_file:dir search;
 | 
			
		||||
allow hvdcp persist_hvdcp_file:dir rw_dir_perms;
 | 
			
		||||
allow hvdcp persist_hvdcp_file:file create_file_perms;
 | 
			
		||||
 | 
			
		||||
wakelock_use(hvdcp)
 | 
			
		||||
		Reference in New Issue
	
	Block a user