Aayush Gupta c07ec24c97 non_plat: Label bip binary and grant required permissions
- SELinux rules are obtained fro stock SEpolicy

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Ie262a1a2a93aabc1cfa6e1cbdadf647058caec31
2021-01-03 10:08:25 +05:30

26 lines
894 B
Plaintext

type bip, domain, mtkimsmddomain;
type bip_exec, exec_type, file_type, vendor_file_type;
init_daemon_domain(bip)
allow bip self:netlink_route_socket read;
allow bip self:tcp_socket { create_socket_perms listen accept };
allow bip self:udp_socket create_socket_perms;
allow bip self:rawip_socket { read write create getattr bind setopt };
allow bip socket_device:dir { write add_name remove_name };
allow bip socket_device:sock_file { write create unlink };
allow bip { node port netd }:udp_socket node_bind;
allow bip { fwmarkd_socket property_socket }:sock_file write;
allow bip init:unix_stream_socket connectto;
allow bip port:tcp_socket { name_connect };
allow bip rootfs:lnk_file getattr;
allow bip ccci_device:chr_file rw_file_perms;
allow bip node:rawip_socket node_bind;
set_prop(bip, ril_mux_report_case_prop)
set_prop(bip, ctl_muxreport-daemon_prop)
get_prop(bip, net_dns_prop)