[Detail]ccci_fsd cannot open nvdata for selinux rule [Solution]add selinux rules MTK-Commit-Id: 187a7abec272b2e4201d7897d6608e5fafbc9070 Change-Id: Idd88dfc3d27d68584ca32be1e0128f21a29a7524 Signed-off-by: mtk13799 <xin.huang@mediatek.com> CR-Id: ALPS03936313 Feature: Modem Interface Driver
62 lines
2.5 KiB
Plaintext
62 lines
2.5 KiB
Plaintext
# ==============================================
|
|
# Policy File of /system/bin/ccci_fsd Executable File
|
|
|
|
# ==============================================
|
|
# Type Declaration
|
|
# ==============================================
|
|
type ccci_fsd_exec, exec_type, file_type, vendor_file_type;
|
|
type ccci_fsd, domain;
|
|
|
|
# ==============================================
|
|
# MTK Policy Rule
|
|
# ==============================================
|
|
init_daemon_domain(ccci_fsd)
|
|
|
|
wakelock_use(ccci_fsd)
|
|
|
|
#============= ccci_fsd MD NVRAM==============
|
|
allow ccci_fsd nvram_data_file:dir create_dir_perms;
|
|
allow ccci_fsd nvram_data_file:file create_file_perms;
|
|
allow ccci_fsd nvram_data_file:lnk_file read;
|
|
allow ccci_fsd nvdata_file:lnk_file read;
|
|
allow ccci_fsd nvdata_file:dir create_dir_perms;
|
|
allow ccci_fsd nvdata_file:file create_file_perms;
|
|
allow ccci_fsd nvram_device:chr_file rw_file_perms;
|
|
allow ccci_fsd system_data_file:lnk_file read;
|
|
|
|
#============= ccci_fsd device/path/data access==============
|
|
allow ccci_fsd ccci_device:chr_file rw_file_perms;
|
|
allow ccci_fsd ccci_cfg_file:dir create_dir_perms;
|
|
allow ccci_fsd ccci_cfg_file:file create_file_perms;
|
|
#============= ccci_fsd MD Data==============
|
|
allow ccci_fsd protect_f_data_file:dir create_dir_perms;
|
|
allow ccci_fsd protect_f_data_file:file create_file_perms;
|
|
|
|
allow ccci_fsd protect_s_data_file:dir create_dir_perms;
|
|
allow ccci_fsd protect_s_data_file:file create_file_perms;
|
|
#============= ccci_fsd MD3 related==============
|
|
allow ccci_fsd c2k_file:dir create_dir_perms;
|
|
allow ccci_fsd c2k_file:file create_file_perms;
|
|
allow ccci_fsd otp_part_block_device:blk_file rw_file_perms;
|
|
allow ccci_fsd otp_device:chr_file rw_file_perms;
|
|
allow ccci_fsd sysfs:file r_file_perms;
|
|
allow ccci_fsd sysfs_boot_type:file { read open };
|
|
#============= ccci_fsd MD block data==============
|
|
allow ccci_fsd block_device:dir search;
|
|
allow ccci_fsd nvram_device:blk_file rw_file_perms;
|
|
allow ccci_fsd bootdevice_block_device:blk_file rw_file_perms;
|
|
allow ccci_fsd nvdata_device:blk_file rw_file_perms;
|
|
#============= ccci_fsd cryption related ==============
|
|
allow ccci_fsd rawfs:dir create_dir_perms;
|
|
allow ccci_fsd rawfs:file create_file_perms;
|
|
#============= ccci_fsd sysfs related ==============
|
|
allow ccci_fsd sysfs_ccci:dir search;
|
|
allow ccci_fsd sysfs_ccci:file r_file_perms;
|
|
|
|
#============= ccci_fsd ==============
|
|
allow ccci_fsd mnt_vendor_file:dir search;
|
|
|
|
# Purpose: for fstab parser
|
|
allow ccci_fsd kmsg_device:chr_file w_file_perms;
|
|
allow ccci_fsd proc_lk_env:file rw_file_perms;
|