mirror of
https://github.com/AetherDroid/android_device_samsung_universal7570-common.git
synced 2025-09-08 01:08:05 -04:00
universal7570: import sepolicy from 7870
The sepolicy before seems to be broken Change-Id: I890a28429f03e47a183a0a0b755987f3495994c3
This commit is contained in:
parent
f22a0e7cdd
commit
f0e4521a9f
53 changed files with 1095 additions and 58 deletions
51
sepolicy/cpboot-daemon.te
Normal file
51
sepolicy/cpboot-daemon.te
Normal file
|
@ -0,0 +1,51 @@
|
|||
# modem daemon sec label
|
||||
type cpboot-daemon, domain;
|
||||
type cpboot-daemon_exec, exec_type, file_type, vendor_file_type;
|
||||
|
||||
net_domain(cpboot-daemon)
|
||||
init_daemon_domain(cpboot-daemon)
|
||||
wakelock_use(cpboot-daemon)
|
||||
set_prop(cpboot-daemon, modemloader_prop)
|
||||
|
||||
allow cpboot-daemon self:capability { setuid setgid };
|
||||
|
||||
# FIXME neverallow rule
|
||||
# allow cpboot-daemon self:capability mknod;
|
||||
allow cpboot-daemon kernel:system syslog_read;
|
||||
allow cpboot-daemon cgroup:dir create_dir_perms;
|
||||
|
||||
# /dev/log/*
|
||||
#allow cpboot-daemon log_device:dir r_dir_perms;
|
||||
#allow cpboot-daemon log_device:chr_file rw_file_perms;
|
||||
# /dev/kmsg (write to kernel log)
|
||||
allow cpboot-daemon kmsg_device:chr_file rw_file_perms;
|
||||
|
||||
# /dev/umts_boot0
|
||||
allow cpboot-daemon mif_device:chr_file rw_file_perms;
|
||||
# /dev/mbin0
|
||||
allow cpboot-daemon emmcblk_device:blk_file r_file_perms;
|
||||
# /dev/spi_boot_link
|
||||
allow cpboot-daemon radio_device:chr_file rw_file_perms;
|
||||
# /dev/block/mmcblk0p13
|
||||
allow cpboot-daemon block_device:dir r_dir_perms;
|
||||
allow cpboot-daemon radio_block_device:blk_file r_file_perms;
|
||||
|
||||
# /dev/mipi-lli/lli_control
|
||||
allow cpboot-daemon sysfs_mipi:file rw_file_perms;
|
||||
|
||||
# /efs
|
||||
allow cpboot-daemon efs_file:dir r_dir_perms;
|
||||
|
||||
# /efs/nv_data.bin
|
||||
allow cpboot-daemon bin_nv_data_efs_file:file rw_file_perms;
|
||||
allow cpboot-daemon efs_file:file rw_file_perms;
|
||||
|
||||
# /proc permissions
|
||||
allow cpboot-daemon proc_cmdline:file r_file_perms;
|
||||
allow cpboot-daemon proc_dt_firmware:dir search;
|
||||
allow cpboot-daemon proc_dt_firmware:file { open read };
|
||||
|
||||
# set properties on boot
|
||||
set_prop(cpboot-daemon, cpboot-daemon_prop)
|
||||
set_prop(cpboot-daemon, radio_prop)
|
||||
set_prop(cpboot-daemon, system_prop)
|
Loading…
Add table
Add a link
Reference in a new issue