aboutsummaryrefslogtreecommitdiff
path: root/sepolicy/ccci_mdinit.te
diff options
context:
space:
mode:
Diffstat (limited to 'sepolicy/ccci_mdinit.te')
-rw-r--r--sepolicy/ccci_mdinit.te86
1 files changed, 86 insertions, 0 deletions
diff --git a/sepolicy/ccci_mdinit.te b/sepolicy/ccci_mdinit.te
new file mode 100644
index 0000000..af256e7
--- /dev/null
+++ b/sepolicy/ccci_mdinit.te
@@ -0,0 +1,86 @@
+# ==============================================
+# Policy File of /system/binccci_mdinit Executable File
+
+
+# ==============================================
+# Type Declaration
+# ==============================================
+
+type ccci_mdinit_exec , exec_type, file_type;
+type ccci_mdinit ,domain;
+
+# ==============================================
+# Android Policy Rule
+# ==============================================
+
+# ==============================================
+# NSA Policy Rule
+# ==============================================
+
+# ==============================================
+# MTK Policy Rule
+# ==============================================
+
+#permissive ccci_mdinit;
+init_daemon_domain(ccci_mdinit)
+#unconfined_domain(ccci_mdinit)
+wakelock_use(ccci_mdinit)
+#=============allow ccci_mdinit to start gsm0710muxd==============
+allow ccci_mdinit ctl_gsm0710muxd_prop:property_service set;
+#=============allow ccci_mdinit to start emcsmdlogger==============
+allow ccci_mdinit ctl_mdlogger_prop:property_service set;
+
+unix_socket_connect(ccci_mdinit, property, init)
+#allow ccci_mdinit ctl_mdlogger_prop:property_service set;
+allow ccci_mdinit { ctl_mdlogger_prop ctl_emdlogger1_prop ctl_emdlogger2_prop ctl_dualmdlogger_prop }:property_service set;
+
+#allow ccci_mdinit ctl_gsm0710muxd_prop:property_service set;
+allow ccci_mdinit { ctl_gsm0710muxd_prop ctl_gsm0710muxd-s_prop ctl_gsm0710muxd-d_prop ctl_gsm0710muxdmd2_prop}:property_service set;
+
+#allow ccci_mdinit ctl_ril-daemon-mtk_prop:property_service set;
+allow ccci_mdinit { ctl_rildaemon_prop ctl_ril-daemon-mtk_prop ctl_ril-daemon-s_prop ctl_ril-daemon-d_prop ctl_ril-daemon-md2_prop }:property_service set;
+
+allow ccci_mdinit ril_active_md_prop:property_service set;
+allow ccci_mdinit mtk_md_prop:property_service set;
+allow ccci_mdinit radio_prop:property_service set;
+
+allow ccci_mdinit { ctl_ccci_fsd_prop ctl_ccci2_fsd_prop }:property_service set;
+allow ccci_mdinit { ctl_ccci_rpcd_prop ctl_ccci2_rpcd_prop }:property_service set;
+
+allow ccci_mdinit ccci_device:chr_file rw_file_perms;
+allow ccci_mdinit ccci_monitor_device:chr_file rw_file_perms;
+
+# TODO: Do not allow write access to all of /sys
+allow ccci_mdinit sysfs:file write;
+
+allow ccci_mdinit nvram_data_file:dir rw_dir_perms;
+allow ccci_mdinit nvram_data_file:file create_file_perms;
+allow ccci_mdinit nvram_data_file:lnk_file read;
+allow ccci_mdinit nvdata_file:dir rw_dir_perms;
+allow ccci_mdinit nvdata_file:file create_file_perms;
+allow ccci_mdinit nvram_device:chr_file rw_file_perms;
+
+allow ccci_mdinit protect_f_data_file:dir rw_dir_perms;
+allow ccci_mdinit protect_f_data_file:file create_file_perms;
+
+allow ccci_mdinit protect_s_data_file:dir rw_dir_perms;
+allow ccci_mdinit protect_s_data_file:file create_file_perms;
+allow ccci_mdinit platformblk_device:blk_file { read write open };
+
+allow ccci_mdinit ril_mux_report_case_prop:property_service set;
+
+allow ccci_mdinit mdlog_data_file:dir search;
+allow ccci_mdinit mdlog_data_file:file { read open };
+allow ccci_mdinit platformblk_device:dir search;
+
+allow ccci_mdinit ccci_cfg_file:dir create_dir_perms;
+allow ccci_mdinit ccci_cfg_file:file create_file_perms;
+allow ccci_mdinit block_device:dir search;
+
+allow ccci_mdinit preloader_device:chr_file rw_file_perms;
+allow ccci_mdinit misc_sd_device:chr_file { read open };
+allow ccci_mdinit sec_ro_device:chr_file { read open };
+
+allow ccci_mdinit custom_file:dir { search };
+allow ccci_mdinit custom_file:file { open read getattr };
+allow ccci_mdinit mtk_tele_prop:property_service set;