mirror of
https://github.com/AetherDroid/android_device_samsung_universal7570-common.git
synced 2025-09-07 00:38:06 -04:00
universal7870: update sepolicy (wip)
This commit is contained in:
parent
841f56ecbf
commit
4cd64b76bd
46 changed files with 515 additions and 184 deletions
|
@ -1,11 +1,11 @@
|
|||
# modem daemon sec label
|
||||
type cpboot-daemon, domain;
|
||||
type cpboot-daemon_exec, exec_type, file_type;
|
||||
type cpboot-daemon, domain, coredomain;
|
||||
type cpboot-daemon_exec, exec_type, file_type, system_file_type;
|
||||
|
||||
net_domain(cpboot-daemon)
|
||||
init_daemon_domain(cpboot-daemon)
|
||||
wakelock_use(cpboot-daemon)
|
||||
#unix_socket_connect(cpboot-daemon, property, init)
|
||||
set_prop(cpboot-daemon, modemloader_prop)
|
||||
|
||||
allow cpboot-daemon self:capability { setuid setgid };
|
||||
|
||||
|
@ -14,22 +14,23 @@ allow cpboot-daemon self:capability { setuid setgid };
|
|||
allow cpboot-daemon kernel:system syslog_read;
|
||||
allow cpboot-daemon cgroup:dir create_dir_perms;
|
||||
|
||||
# /dev/log/*
|
||||
#allow cpboot-daemon log_device:dir r_dir_perms;
|
||||
#allow cpboot-daemon log_device:chr_file rw_file_perms;
|
||||
# /dev/kmsg (write to kernel log)
|
||||
allow cpboot-daemon kmsg_device:chr_file rw_file_perms;
|
||||
|
||||
# /dev/umts_boot0
|
||||
allow cpboot-daemon mif_device:chr_file rw_file_perms;
|
||||
|
||||
# /dev/mbin0
|
||||
allow cpboot-daemon emmcblk_device:blk_file r_file_perms;
|
||||
|
||||
# /dev/spi_boot_link
|
||||
allow cpboot-daemon radio_device:chr_file rw_file_perms;
|
||||
|
||||
# /dev/block/mmcblk0p13
|
||||
allow cpboot-daemon block_device:dir r_dir_perms;
|
||||
allow cpboot-daemon radio_block_device:blk_file r_file_perms;
|
||||
|
||||
# /dev/mipi-lli/lli_control
|
||||
allow cpboot-daemon sysfs_mipi:file rw_file_perms;
|
||||
|
||||
# /efs
|
||||
allow cpboot-daemon efs_file:dir r_dir_perms;
|
||||
|
||||
|
@ -40,7 +41,7 @@ allow cpboot-daemon bin_nv_data_efs_file:file rw_file_perms;
|
|||
allow cpboot-daemon sysfs:file r_file_perms;
|
||||
|
||||
# /proc/cmdline
|
||||
allow cpboot-daemon proc:file r_file_perms;
|
||||
allow cpboot-daemon proc_cmdline:file r_file_perms;
|
||||
|
||||
# set properties on boot
|
||||
set_prop(cpboot-daemon, cpboot-daemon_prop)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue