aboutsummaryrefslogtreecommitdiff
path: root/sepolicy/dm_agent_binder.te
diff options
context:
space:
mode:
Diffstat (limited to 'sepolicy/dm_agent_binder.te')
-rw-r--r--sepolicy/dm_agent_binder.te99
1 files changed, 99 insertions, 0 deletions
diff --git a/sepolicy/dm_agent_binder.te b/sepolicy/dm_agent_binder.te
new file mode 100644
index 0000000..1218e1f
--- /dev/null
+++ b/sepolicy/dm_agent_binder.te
@@ -0,0 +1,99 @@
+# ==============================================
+# Policy File of /system/bin/dm_agent_binder Executable File
+
+
+# ==============================================
+# Type Declaration
+# ==============================================
+
+type dm_agent_binder_exec , exec_type, file_type;
+type dm_agent_binder ,domain;
+
+# ==============================================
+# Android Policy Rule
+# ==============================================
+
+# ==============================================
+# NSA Policy Rule
+# ==============================================
+
+# ==============================================
+# MTK Policy Rule
+# ==============================================
+
+init_daemon_domain(dm_agent_binder)
+
+# Date : WK14.37
+# Operation : access DmAgent by binder
+# Purpose : ensure can access DmAgent api normally.
+allow dm_agent_binder dm_agent_binder_service:service_manager add;
+
+# Date : WK14.37
+# Operation : access DmAgent by binder
+# Purpose : ensure can access DmAgent api normally.
+binder_use(dm_agent_binder)
+binder_service(dm_agent_binder)
+
+# Date : WK14.42
+# Operation : Migration
+# Purpose : Allow DmAgent access nvram_data_file.
+allow dm_agent_binder nvram_data_file:dir { rw_dir_perms };
+allow dm_agent_binder nvdata_file:dir { rw_dir_perms };
+
+# Date : WK14.42
+# Operation : Basic UT
+# Purpose : Allow DmAgent access nvram_data_file.
+allow dm_agent_binder nvram_data_file:file { create_file_perms };
+allow dm_agent_binder nvram_data_file:lnk_file read;
+allow dm_agent_binder nvdata_file:file { create_file_perms };
+
+# Date : WK14.42
+# Operation : Basic UT
+# Purpose : Allow DmAgent access block_device.
+allow dm_agent_binder block_device:dir search;
+
+# Date : WK14.42
+# Operation : Basic UT
+# Purpose : Allow DmAgent access platformblk_device.
+allow dm_agent_binder platformblk_device:dir search;
+
+# Date : WK14.42
+# Operation : Basic UT
+# Purpose : Allow DmAgent access misc_device.
+allow dm_agent_binder misc_device:chr_file { rw_file_perms };
+
+# Date : WK14.42
+# Operation : Basic UT
+# Purpose : Allow DmAgent write sock_file.
+allow dm_agent_binder property_socket:sock_file write;
+
+# Date : WK14.42
+# Operation : Basic UT
+# Purpose : Allow DmAgent connectto unix_stream_socket.
+allow dm_agent_binder init:unix_stream_socket connectto;
+
+# Date : 2014/10/17
+# Operation : QC
+# Purpose : [Privacy protection lock][dm_agent_binder call FileOp_BackupToBinRegionForDM to do nvram backup]
+allow dm_agent_binder mmcblk_device:blk_file rw_file_perms;
+allow dm_agent_binder platformblk_device:blk_file rw_file_perms;
+
+# Date : WK14.42
+# Operation : Basic UT
+# Purpose : Allow DmAgent to set properties.
+allow dm_agent_binder persist_dm_prop:property_service set;
+
+# Date : WK14.43
+# Operation : Basic UT
+# Purpose : Allow DmAgent to access cache_file.
+allow dm_agent_binder cache_file:dir { w_dir_perms create };
+
+# Date : WK14.43
+# Operation : Basic UT
+# Purpose : Allow DmAgent to access cache_file.
+allow dm_agent_binder cache_file:file { create_file_perms };
+
+# Date : WK14.44
+# Operation : Basic UT
+# Purpose : Allow DmAgent to access nvram_device.
+allow dm_agent_binder nvram_device:chr_file { rw_file_perms };