[Detail] when ccci_fsd create mdlpm,sepolicy issue happen [Solution] add sysfs_mmcblk&vendor_data_file permission to solve sepolicy issue MTK-Commit-Id: 874b0398d34d3186af1e2e496480c5f74797fdb0 Change-Id: I84681b5d372580fc31baad10cfa43ae4804b6e9c Signed-off-by: mtk13858 <derong.liu@mediatek.com> CR-Id: ALPS04004689 Feature: Modem Interface Driver (cherry picked from commit 6eb34cdbba937a22bbce794d932d3cbc99f56729) (cherry picked from commit 702f6a7ad67b2b89d5a884a03a1abf92b990ef22)
70 lines
2.8 KiB
Plaintext
70 lines
2.8 KiB
Plaintext
# ==============================================
|
|
# Policy File of /system/bin/ccci_fsd Executable File
|
|
|
|
# ==============================================
|
|
# Type Declaration
|
|
# ==============================================
|
|
type ccci_fsd_exec, exec_type, file_type, vendor_file_type;
|
|
type ccci_fsd, domain;
|
|
|
|
# ==============================================
|
|
# MTK Policy Rule
|
|
# ==============================================
|
|
init_daemon_domain(ccci_fsd)
|
|
|
|
wakelock_use(ccci_fsd)
|
|
|
|
#============= ccci_fsd MD NVRAM==============
|
|
allow ccci_fsd nvram_data_file:dir create_dir_perms;
|
|
allow ccci_fsd nvram_data_file:file create_file_perms;
|
|
allow ccci_fsd nvram_data_file:lnk_file read;
|
|
allow ccci_fsd nvdata_file:lnk_file read;
|
|
allow ccci_fsd nvdata_file:dir create_dir_perms;
|
|
allow ccci_fsd nvdata_file:file create_file_perms;
|
|
allow ccci_fsd nvram_device:chr_file rw_file_perms;
|
|
allow ccci_fsd system_data_file:lnk_file read;
|
|
allow ccci_fsd vendor_configs_file:file r_file_perms;
|
|
allow ccci_fsd vendor_configs_file:dir r_dir_perms;
|
|
|
|
#============= ccci_fsd device/path/data access==============
|
|
allow ccci_fsd ccci_device:chr_file rw_file_perms;
|
|
allow ccci_fsd ccci_cfg_file:dir create_dir_perms;
|
|
allow ccci_fsd ccci_cfg_file:file create_file_perms;
|
|
#============= ccci_fsd MD Data==============
|
|
allow ccci_fsd protect_f_data_file:dir create_dir_perms;
|
|
allow ccci_fsd protect_f_data_file:file create_file_perms;
|
|
|
|
allow ccci_fsd protect_s_data_file:dir create_dir_perms;
|
|
allow ccci_fsd protect_s_data_file:file create_file_perms;
|
|
#============= ccci_fsd MD3 related==============
|
|
allow ccci_fsd c2k_file:dir create_dir_perms;
|
|
allow ccci_fsd c2k_file:file create_file_perms;
|
|
allow ccci_fsd otp_part_block_device:blk_file rw_file_perms;
|
|
allow ccci_fsd otp_device:chr_file rw_file_perms;
|
|
allow ccci_fsd sysfs:file r_file_perms;
|
|
allow ccci_fsd sysfs_boot_type:file { read open };
|
|
#============= ccci_fsd MD block data==============
|
|
allow ccci_fsd block_device:dir search;
|
|
allow ccci_fsd nvram_device:blk_file rw_file_perms;
|
|
allow ccci_fsd bootdevice_block_device:blk_file rw_file_perms;
|
|
allow ccci_fsd nvdata_device:blk_file rw_file_perms;
|
|
#============= ccci_fsd cryption related ==============
|
|
allow ccci_fsd rawfs:dir create_dir_perms;
|
|
allow ccci_fsd rawfs:file create_file_perms;
|
|
#============= ccci_fsd sysfs related ==============
|
|
allow ccci_fsd sysfs_ccci:dir search;
|
|
allow ccci_fsd sysfs_ccci:file r_file_perms;
|
|
|
|
#============= ccci_fsd ==============
|
|
allow ccci_fsd mnt_vendor_file:dir search;
|
|
|
|
# Purpose: for fstab parser
|
|
allow ccci_fsd kmsg_device:chr_file w_file_perms;
|
|
allow ccci_fsd proc_lk_env:file rw_file_perms;
|
|
|
|
#============= ccci_fsd MD Low Power Monitor Related ==============
|
|
allow ccci_fsd vendor_data_file:dir create_dir_perms;
|
|
allow ccci_fsd vendor_data_file:file create_file_perms;
|
|
allow ccci_fsd sysfs_mmcblk:dir search;
|
|
allow ccci_fsd sysfs_mmcblk:file { read getattr open };
|