[Detail] 1. Change type name from sysfs_boot to sysfs_boot_mode 2. Add type name sysfs_boot_type MTK-Commit-Id: 54d5bb31fc8ad1d9ac2e931fe5dc01ef4c1083cf Change-Id: I445ecdf5a5e334a49ccc1d747daa87f6be351d20 Signed-off-by: Peter Wang <peter.wang@mediatek.com> CR-Id: ALPS03901606 Feature: UFS Booting
59 lines
2.4 KiB
Plaintext
59 lines
2.4 KiB
Plaintext
# ==============================================
|
|
# Policy File of /system/bin/ccci_fsd Executable File
|
|
|
|
# ==============================================
|
|
# Type Declaration
|
|
# ==============================================
|
|
type ccci_fsd_exec, exec_type, file_type, vendor_file_type;
|
|
type ccci_fsd, domain;
|
|
|
|
# ==============================================
|
|
# MTK Policy Rule
|
|
# ==============================================
|
|
init_daemon_domain(ccci_fsd)
|
|
|
|
wakelock_use(ccci_fsd)
|
|
|
|
#============= ccci_fsd MD NVRAM==============
|
|
allow ccci_fsd nvram_data_file:dir create_dir_perms;
|
|
allow ccci_fsd nvram_data_file:file create_file_perms;
|
|
allow ccci_fsd nvram_data_file:lnk_file read;
|
|
allow ccci_fsd nvdata_file:lnk_file read;
|
|
allow ccci_fsd nvdata_file:dir create_dir_perms;
|
|
allow ccci_fsd nvdata_file:file create_file_perms;
|
|
allow ccci_fsd nvram_device:chr_file rw_file_perms;
|
|
allow ccci_fsd system_data_file:lnk_file read;
|
|
|
|
#============= ccci_fsd device/path/data access==============
|
|
allow ccci_fsd ccci_device:chr_file rw_file_perms;
|
|
allow ccci_fsd ccci_cfg_file:dir create_dir_perms;
|
|
allow ccci_fsd ccci_cfg_file:file create_file_perms;
|
|
#============= ccci_fsd MD Data==============
|
|
allow ccci_fsd protect_f_data_file:dir create_dir_perms;
|
|
allow ccci_fsd protect_f_data_file:file create_file_perms;
|
|
|
|
allow ccci_fsd protect_s_data_file:dir create_dir_perms;
|
|
allow ccci_fsd protect_s_data_file:file create_file_perms;
|
|
#============= ccci_fsd MD3 related==============
|
|
allow ccci_fsd c2k_file:dir create_dir_perms;
|
|
allow ccci_fsd c2k_file:file create_file_perms;
|
|
allow ccci_fsd otp_part_block_device:blk_file rw_file_perms;
|
|
allow ccci_fsd otp_device:chr_file rw_file_perms;
|
|
allow ccci_fsd sysfs:file r_file_perms;
|
|
allow ccci_fsd sysfs_boot_type:file { read open };
|
|
#============= ccci_fsd MD block data==============
|
|
allow ccci_fsd block_device:dir search;
|
|
allow ccci_fsd nvram_device:blk_file rw_file_perms;
|
|
allow ccci_fsd bootdevice_block_device:blk_file rw_file_perms;
|
|
allow ccci_fsd nvdata_device:blk_file rw_file_perms;
|
|
#============= ccci_fsd cryption related ==============
|
|
allow ccci_fsd rawfs:dir create_dir_perms;
|
|
allow ccci_fsd rawfs:file create_file_perms;
|
|
#============= ccci_fsd sysfs related ==============
|
|
allow ccci_fsd sysfs_ccci:dir search;
|
|
allow ccci_fsd sysfs_ccci:file r_file_perms;
|
|
|
|
# Purpose: for fstab parser
|
|
allow ccci_fsd kmsg_device:chr_file w_file_perms;
|
|
allow ccci_fsd proc_lk_env:file rw_file_perms;
|