39 lines
1.6 KiB
Plaintext
39 lines
1.6 KiB
Plaintext
|
# ==============================================
|
||
|
# Policy File of /system/bin/factory Executable File
|
||
|
|
||
|
# ==============================================
|
||
|
# Type Declaration
|
||
|
# ==============================================
|
||
|
type factory_exec , exec_type, file_type;
|
||
|
typeattribute factory coredomain;
|
||
|
|
||
|
# ==============================================
|
||
|
# MTK Policy Rule
|
||
|
# ==============================================
|
||
|
init_daemon_domain(factory)
|
||
|
|
||
|
|
||
|
allow factory property_socket:sock_file write;
|
||
|
allow factory init:unix_stream_socket connectto;
|
||
|
allow factory kernel:system module_request;
|
||
|
allow factory node:tcp_socket node_bind;
|
||
|
allow factory userdata_block_device:blk_file rw_file_perms;
|
||
|
allow factory port:tcp_socket { name_bind name_connect };
|
||
|
allow factory self:capability { sys_module ipc_lock sys_nice dac_override net_raw fsetid net_admin sys_time sys_boot sys_admin };
|
||
|
allow factory sdcard_type:dir r_dir_perms;
|
||
|
### TBD, neverallowxperm on line 177 of system/sepolicy/public/domain.te
|
||
|
#allow factory self:netlink_route_socket create_socket_perms;
|
||
|
allow factory self:netlink_route_socket { bind create getattr write nlmsg_read read nlmsg_write };
|
||
|
allow factory proc_net:file { read getattr open };
|
||
|
allowxperm factory self:udp_socket ioctl priv_sock_ioctls;
|
||
|
allowxperm factory self:udp_socket ioctl {SIOCGIFFLAGS SIOCGIWNWID};
|
||
|
|
||
|
allow factory self:process execmem;
|
||
|
allow factory self:tcp_socket create_stream_socket_perms;
|
||
|
allow factory self:udp_socket create_socket_perms;
|
||
|
|
||
|
allow factory sysfs_wake_lock:file rw_file_perms;
|
||
|
allow factory system_data_file:dir w_dir_perms;
|
||
|
allow factory system_data_file:sock_file create_file_perms;
|
||
|
allow factory system_file:file x_file_perms;
|