Add vendor prefix to below selinux attributes

- ssr_diag
- per_mgr
- pd_mapper
- ssr_setup
- subsystem_ramdump

Change-Id: I8fc13dd5ebb912f318def6d35ad0f9083d6472fe
This commit is contained in:
Smita Ghosh
2018-06-01 12:16:52 -07:00
committed by Gerrit - the friendly Code Review server
parent 292669470b
commit 5eb1d86002
15 changed files with 80 additions and 80 deletions

View File

@@ -80,12 +80,12 @@
/vendor/bin/thermal-engine u:object_r:thermal-engine_exec:s0
/vendor/bin/sensors.qcom u:object_r:sensors_exec:s0
/vendor/bin/sensors.qti u:object_r:sensors_exec:s0
/vendor/bin/ssr_setup u:object_r:ssr_setup_exec:s0
/vendor/bin/ssr_diag u:object_r:ssr_diag_exec:s0
/vendor/bin/pm-service u:object_r:per_mgr_exec:s0
/vendor/bin/pm-proxy u:object_r:per_proxy_exec:s0
/vendor/bin/ssr_setup u:object_r:vendor_ssr_setup_exec:s0
/vendor/bin/ssr_diag u:object_r:vendor_ssr_diag_exec:s0
/vendor/bin/pm-service u:object_r:vendor_per_mgr_exec:s0
/vendor/bin/pm-proxy u:object_r:vendor_per_proxy_exec:s0
/vendor/bin/qseecomd u:object_r:tee_exec:s0
/vendor/bin/subsystem_ramdump u:object_r:subsystem_ramdump_exec:s0
/vendor/bin/subsystem_ramdump u:object_r:vendor_subsystem_ramdump_exec:s0
/vendor/bin/adsprpcd u:object_r:adsprpcd_exec:s0
/vendor/bin/cdsprpcd u:object_r:cdsprpcd_exec:s0
/vendor/bin/irsc_util u:object_r:irsc_util_exec:s0
@@ -101,7 +101,7 @@
/vendor/bin/loc_launcher u:object_r:location_exec:s0
/vendor/bin/lowi-server u:object_r:location_exec:s0
/vendor/bin/xtra-daemon u:object_r:location_exec:s0
/vendor/bin/pd-mapper u:object_r:pd_mapper_exec:s0
/vendor/bin/pd-mapper u:object_r:vendor_pd_mapper_exec:s0
/vendor/bin/imsqmidaemon u:object_r:ims_exec:s0
/vendor/bin/imsdatadaemon u:object_r:ims_exec:s0
/vendor/bin/ims_rtp_daemon u:object_r:hal_imsrtp_exec:s0

View File

@@ -12,8 +12,8 @@ vndbinder_use(hal_gnss_qti)
allow hal_gnss_qti sysfs_soc:dir r_dir_perms;
allow hal_gnss_qti sysfs_soc:file r_file_perms;
binder_call(hal_gnss_qti, per_mgr)
allow hal_gnss_qti per_mgr_service:service_manager find;
binder_call(hal_gnss_qti, vendor_per_mgr)
allow hal_gnss_qti vendor_per_mgr_service:service_manager find;
# /data/vendor/location
allow hal_gnss_qti location_data_file:fifo_file { open read setattr write };

View File

@@ -1,15 +1,15 @@
type pd_mapper, domain;
type vendor_pd_mapper, domain;
type pd_mapper_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(pd_mapper);
type vendor_pd_mapper_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(vendor_pd_mapper);
allow pd_mapper self:capability { setgid setpcap setuid net_bind_service };
allow vendor_pd_mapper self:capability { setgid setpcap setuid net_bind_service };
allow pd_mapper firmware_file:dir r_dir_perms;
allow pd_mapper firmware_file:file r_file_perms;
allow vendor_pd_mapper firmware_file:dir r_dir_perms;
allow vendor_pd_mapper firmware_file:file r_file_perms;
allow pd_mapper self:socket create_socket_perms;
allowxperm pd_mapper self:socket ioctl IPC_ROUTER_IOCTL_BIND_CONTROL_PORT;
allow vendor_pd_mapper self:socket create_socket_perms;
allowxperm vendor_pd_mapper self:socket ioctl IPC_ROUTER_IOCTL_BIND_CONTROL_PORT;
allow pd_mapper sysfs_data:file r_file_perms;
get_prop(pd_mapper, vendor_pd_locater_dbg_prop)
allow vendor_pd_mapper sysfs_data:file r_file_perms;
get_prop(vendor_pd_mapper, vendor_pd_locater_dbg_prop)

View File

@@ -1,12 +1,12 @@
# Policy for /system/bin/pm-proxy
type per_proxy, domain;
type per_proxy_exec, exec_type, vendor_file_type, file_type;
type vendor_per_proxy, domain;
type vendor_per_proxy_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(per_proxy)
init_daemon_domain(vendor_per_proxy)
allow per_proxy per_mgr_service:service_manager find;
allow vendor_per_proxy vendor_per_mgr_service:service_manager find;
r_dir_file(per_proxy, sysfs_ssr)
r_dir_file(vendor_per_proxy, sysfs_ssr)
vndbinder_use(per_proxy)
binder_call(per_proxy, per_mgr)
vndbinder_use(vendor_per_proxy)
binder_call(vendor_per_proxy, vendor_per_mgr)

View File

@@ -1,32 +1,32 @@
# Policy for pm-service and pm-proxy
type per_mgr, domain;
type per_mgr_exec, exec_type, vendor_file_type, file_type;
type vendor_per_mgr, domain;
type vendor_per_mgr_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(per_mgr);
init_daemon_domain(vendor_per_mgr);
add_service(per_mgr, per_mgr_service)
add_service(vendor_per_mgr, vendor_per_mgr_service)
vndbinder_use(per_mgr)
binder_call(per_mgr, hal_gnss)
binder_call(per_mgr, per_proxy)
binder_call(per_mgr, wcnss_service)
binder_call(per_mgr, rild)
vndbinder_use(vendor_per_mgr)
binder_call(vendor_per_mgr, hal_gnss)
binder_call(vendor_per_mgr, vendor_per_proxy)
binder_call(vendor_per_mgr, wcnss_service)
binder_call(vendor_per_mgr, rild)
allow per_mgr self:capability net_bind_service;
allow vendor_per_mgr self:capability net_bind_service;
allow per_mgr firmware_file:file r_file_perms;
allow per_mgr firmware_file:dir search;
allow vendor_per_mgr firmware_file:file r_file_perms;
allow vendor_per_mgr firmware_file:dir search;
allow per_mgr self:socket create_socket_perms;
allowxperm per_mgr self:socket ioctl msm_sock_ipc_ioctls;
allow per_mgr ssr_device:chr_file { open read };
allow vendor_per_mgr self:socket create_socket_perms;
allowxperm vendor_per_mgr self:socket ioctl msm_sock_ipc_ioctls;
allow vendor_per_mgr ssr_device:chr_file { open read };
# Needed by libmdmdetect to figure out the system configuration
r_dir_file(per_mgr, sysfs_esoc)
r_dir_file(vendor_per_mgr, sysfs_esoc)
# Needed by libmdmdetect to get subsystem info and to check their states
r_dir_file(per_mgr, sysfs_ssr)
allow per_mgr sysfs_data:file r_file_perms;
r_dir_file(vendor_per_mgr, sysfs_ssr)
allow vendor_per_mgr sysfs_data:file r_file_perms;
# Set the peripheral state property
set_prop(per_mgr, per_mgr_state_prop);
set_prop(vendor_per_mgr, vendor_per_mgr_state_prop);

View File

@@ -15,7 +15,7 @@ type keymaster_prop, property_type;
type modem_diag_prop, property_type;
type msm_irqbalance_prop, property_type;
type net_rmnet_prop, property_type;
type per_mgr_state_prop, property_type;
type vendor_per_mgr_state_prop, property_type;
type post_boot_prop, property_type;
type vendor_dataqti_prop, property_type;
type ramdump_prop, property_type;

View File

@@ -47,7 +47,7 @@ sys.qcom.thermalcfg u:object_r:thermal_prop:s0
sys.time.set u:object_r:sys_time_prop:s0
vendor.usb. u:object_r:vendor_usb_prop:s0
persist.vendor.usb. u:object_r:vendor_usb_prop:s0
vendor.peripheral. u:object_r:per_mgr_state_prop:s0
vendor.peripheral. u:object_r:vendor_per_mgr_state_prop:s0
vendor.ims. u:object_r:ims_prop:s0
wc_transport. u:object_r:wc_prop:s0
ctl.vendor.imsrcsservice u:object_r:ctl_vendor_imsrcsservice_prop:s0

View File

@@ -1,4 +1,4 @@
binder_call(rild, per_mgr)
binder_call(rild, vendor_per_mgr)
vndbinder_use(rild)
@@ -7,7 +7,7 @@ unix_socket_connect(rild, netmgrd, netmgrd)
allow rild vendor_file:file { execute_no_trans lock ioctl };
allow rild per_mgr_service:service_manager find;
allow rild vendor_per_mgr_service:service_manager find;
add_hwservice(rild, vnd_ims_radio_hwservice)
add_hwservice(rild, vnd_qcrilhook_hwservice)

View File

@@ -1,4 +1,4 @@
type ssr_diag, domain;
type ssr_diag_exec, exec_type, vendor_file_type, file_type;
type vendor_ssr_diag, domain;
type vendor_ssr_diag_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(ssr_diag);
init_daemon_domain(vendor_ssr_diag);

View File

@@ -1,16 +1,16 @@
type ssr_setup, domain;
type ssr_setup_exec, exec_type, vendor_file_type, file_type;
type vendor_ssr_setup, domain;
type vendor_ssr_setup_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(ssr_setup);
init_daemon_domain(vendor_ssr_setup);
# Required to discover esoc's
r_dir_file(ssr_setup, sysfs_esoc)
r_dir_file(vendor_ssr_setup, sysfs_esoc)
# Required to enable/disable ssr
r_dir_file(ssr_setup, sysfs_ssr)
allow ssr_setup sysfs_ssr:lnk_file w_file_perms;
allow ssr_setup sysfs_ssr_toggle:file rw_file_perms;
r_dir_file(vendor_ssr_setup, sysfs_ssr)
allow vendor_ssr_setup sysfs_ssr:lnk_file w_file_perms;
allow vendor_ssr_setup sysfs_ssr_toggle:file rw_file_perms;
allow ssr_setup sysfs_data:file r_file_perms;
allow vendor_ssr_setup sysfs_data:file r_file_perms;
get_prop(ssr_setup, vendor_ssr_prop)
get_prop(vendor_ssr_setup, vendor_ssr_prop)

View File

@@ -1,20 +1,20 @@
type subsystem_ramdump_exec, exec_type, vendor_file_type, file_type;
type vendor_subsystem_ramdump_exec, exec_type, vendor_file_type, file_type;
userdebug_or_eng(`
type subsystem_ramdump, domain;
type vendor_subsystem_ramdump, domain;
init_daemon_domain(subsystem_ramdump);
init_daemon_domain(vendor_subsystem_ramdump);
allow subsystem_ramdump device:dir r_dir_perms;
allow subsystem_ramdump ramdump_device:chr_file r_file_perms;
allow vendor_subsystem_ramdump device:dir r_dir_perms;
allow vendor_subsystem_ramdump ramdump_device:chr_file r_file_perms;
r_dir_file(subsystem_ramdump, sysfs_type);
r_dir_file(vendor_subsystem_ramdump, sysfs_type);
allow subsystem_ramdump ramdump_vendor_data_file:dir rw_dir_perms;
allow subsystem_ramdump ramdump_vendor_data_file:file create_file_perms;
allow vendor_subsystem_ramdump ramdump_vendor_data_file:dir rw_dir_perms;
allow vendor_subsystem_ramdump ramdump_vendor_data_file:file create_file_perms;
set_prop(subsystem_ramdump, ssr_prop);
set_prop(vendor_subsystem_ramdump, ssr_prop);
allow subsystem_ramdump vendor_mdmhelperdata_data_file:dir r_dir_perms;
allow subsystem_ramdump vendor_mdmhelperdata_data_file:file r_file_perms;
allow vendor_subsystem_ramdump vendor_mdmhelperdata_data_file:dir r_dir_perms;
allow vendor_subsystem_ramdump vendor_mdmhelperdata_data_file:file r_file_perms;
')

View File

@@ -2,12 +2,12 @@
## peripheral_manager
## Allow clients to interact with peripheral
## manager
define(`use_per_mgr', `
define(`use_vendor_per_mgr', `
vndbinder_use($1);
binder_call(per_mgr, $1);
binder_call($1, per_mgr);
allow $1 per_mgr_service:service_manager find;
get_prop($1, per_mgr_state_prop);
binder_call(vendor_per_mgr, $1);
binder_call($1, vendor_per_mgr);
allow $1 vendor_per_mgr_service:service_manager find;
get_prop($1, vendor_per_mgr_state_prop);
')
#####################################

View File

@@ -1,2 +1,2 @@
type qdisplay_service, vndservice_manager_type;
type per_mgr_service, vndservice_manager_type;
type vendor_per_mgr_service, vndservice_manager_type;

View File

@@ -1,2 +1,2 @@
display.qservice u:object_r:qdisplay_service:s0
vendor.qcom.PeripheralManager u:object_r:per_mgr_service:s0
vendor.qcom.PeripheralManager u:object_r:vendor_per_mgr_service:s0

View File

@@ -5,9 +5,9 @@ init_daemon_domain(wcnss_service)
net_domain(wcnss_service)
vndbinder_use(wcnss_service)
binder_call(wcnss_service, per_mgr)
binder_call(wcnss_service, vendor_per_mgr)
allow wcnss_service per_mgr_service:service_manager find;
allow wcnss_service vendor_per_mgr_service:service_manager find;
allow wcnss_service vendor_shell_exec:file rx_file_perms;
allow wcnss_service vendor_toolbox_exec:file rx_file_perms;