diff options
| author | Jan Engelmohr <jan.engelmohr@mailbox.tu-dresden.de> | 2016-08-16 00:02:57 +0200 |
|---|---|---|
| committer | Jan Engelmohr <jan.engelmohr@mailbox.tu-dresden.de> | 2016-08-16 00:02:57 +0200 |
| commit | 27d23ae4b8ba7e4bbd34a06f8c2e17ac8fa535bf (patch) | |
| tree | ddad3e769e79b3222c61bb0f0e208c9993ca378f /sepolicy/mtkrild.te | |
set up mt6753 device tree
Diffstat (limited to 'sepolicy/mtkrild.te')
| -rwxr-xr-x | sepolicy/mtkrild.te | 90 |
1 files changed, 90 insertions, 0 deletions
diff --git a/sepolicy/mtkrild.te b/sepolicy/mtkrild.te new file mode 100755 index 0000000..72e138a --- /dev/null +++ b/sepolicy/mtkrild.te @@ -0,0 +1,90 @@ +# ============================================== +# Policy File of /system/bin/mtkrild Executable File + + +# ============================================== +# Type Declaration +# ============================================== + +type mtkrild_exec , exec_type, file_type; +type mtkrild ,domain; + + +# ============================================== +# MTK Policy Rule +# ============================================== + +init_daemon_domain(mtkrild) +net_domain(mtkrild) +allow mtkrild self:netlink_route_socket nlmsg_write; +allow mtkrild kernel:system module_request; +unix_socket_connect(mtkrild, property, init) +allow mtkrild self:capability { setuid net_admin net_raw }; +allow mtkrild alarm_device:chr_file rw_file_perms; +allow mtkrild cgroup:dir create_dir_perms; +allow mtkrild radio_device:chr_file rw_file_perms; +allow mtkrild radio_device:blk_file r_file_perms; +allow mtkrild mtd_device:dir search; +allow mtkrild efs_file:dir create_dir_perms; +allow mtkrild efs_file:file create_file_perms; +allow mtkrild shell_exec:file rx_file_perms; +allow mtkrild bluetooth_efs_file:file r_file_perms; +allow mtkrild bluetooth_efs_file:dir r_dir_perms; +allow mtkrild radio_data_file:dir rw_dir_perms; +allow mtkrild radio_data_file:file create_file_perms; +allow mtkrild sdcard_type:dir r_dir_perms; +allow mtkrild system_data_file:dir r_dir_perms; +allow mtkrild system_data_file:file r_file_perms; +allow mtkrild system_file:file x_file_perms; +allow mtkrild proc:file write; +allow mtkrild proc_net:file write; +allow mtkrild eemcs_device:chr_file { read write }; +allow mtkrild eemcs_device:chr_file open; +allow mtkrild eemcs_device:chr_file ioctl; + +# property service +allow mtkrild radio_prop:property_service set; +allow mtkrild net_radio_prop:property_service set; +allow mtkrild system_radio_prop:property_service set; +allow mtkrild persist_ril_prop:property_service set; +auditallow mtkrild net_radio_prop:property_service set; +auditallow mtkrild system_radio_prop:property_service set; +allow mtkrild ril_cdma_report_prop:property_service set; + +# Read/Write to uart driver (for GPS) +allow mtkrild gps_device:chr_file rw_file_perms; + +allow mtkrild tty_device:chr_file rw_file_perms; + +# Allow mtkrild to create and use netlink sockets. +allow mtkrild self:netlink_socket create_socket_perms; +allow mtkrild self:netlink_kobject_uevent_socket create_socket_perms; + +# Access to wake locks +wakelock_use(mtkrild) + +allow mtkrild self:socket create_socket_perms; +allow mtkrild Vcodec_device:chr_file { read write open }; +allow mtkrild devmap_device:chr_file { read ioctl open }; +allow mtkrild devpts:chr_file { read write open }; +allow mtkrild self:capability dac_override; + +allow mtkrild ccci_device:chr_file { read write ioctl open }; +allow mtkrild devpts:chr_file ioctl; +allow mtkrild misc_device:chr_file { read write open }; +allow mtkrild platformblk_device:blk_file { read write open }; +allow mtkrild proc_lk_env:file rw_file_perms; +allow mtkrild sysfs_vcorefs_pwrctrl:file { open write }; +allow mtkrild ril_active_md_prop:property_service set; +allow mtkrild ril_mux_report_case_prop:property_service set; +allow mtkrild ctl_muxreport-daemon_prop:property_service set; +allow mtkrild persist_service_atci_prop:property_service set; +allow mtkrild block_device:dir search; +allow mtkrild platformblk_device:dir search; +allow mtkrild platform_app:fd use; +allow mtkrild radio:fd use; +allow mtkrild radio_tmpfs:file write; + +# For emulator +allow mtkrild qemu_pipe_device:chr_file rw_file_perms; +allow mtkrild socket_device:sock_file write; |
