hal_mtdservice.te 3.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. type hal_mtdservice_default, domain;
  2. type hal_mtdservice_default_exec, exec_type, file_type, vendor_file_type;
  3. type hal_mtdservice_hwservice, hwservice_manager_type;
  4. hal_attribute(mtdservice)
  5. allow hal_mtdservice_client hal_mtdservice_server:binder { call transfer };
  6. allow hal_mtdservice_client hal_mtdservice_server:binder transfer;
  7. allow hal_mtdservice_client hal_mtdservice_server:fd *;
  8. allow hal_mtdservice_server hal_mtdservice_client:binder transfer;
  9. allow hal_mtdservice_server hal_mtdservice_client:binder { call transfer };
  10. allow hal_mtdservice_server hal_mtdservice_client:fd *;
  11. allow hal_mtdservice_default hal_mlipay_default:binder { call transfer };
  12. allow hal_mtdservice_default hal_mlipay_default:fd *;
  13. allow hal_mtdservice_default hal_mfidoca_default:binder { call transfer };
  14. allow hal_mtdservice_default hal_mfidoca_default:fd *;
  15. allow hal_mtdservice_default hal_mtdservice_hwservice:hwservice_manager add;
  16. allow hal_mtdservice_default firmware_file:dir r_dir_perms;
  17. allow hal_mtdservice_default firmware_file:file r_file_perms;
  18. allow hal_mtdservice_default ion_device:chr_file rw_file_perms;
  19. allow hal_mtdservice_default vendor_persist_drm_file:dir { create_dir_perms relabelto };
  20. allow hal_mtdservice_default vendor_persist_drm_file:file { create_file_perms relabelto };
  21. allow hal_mtdservice_default vendor_persist_file:dir r_dir_perms;
  22. allow hal_mtdservice_default mnt_vendor_file:dir { create_dir_perms relabelfrom };
  23. allow hal_mtdservice_default proc:file r_file_perms;
  24. allow hal_mtdservice_default tee_device:chr_file rw_file_perms;
  25. allow hal_mtdservice_default system_data_file:dir getattr;
  26. allow hal_mtdservice_default hal_mlipay_hwservice:hwservice_manager find;
  27. allow hal_mtdservice_default hal_mfidoca_hwservice:hwservice_manager find;
  28. allow hal_mtdservice_default platform_app:binder transfer;
  29. allow hal_mtdservice_default system_app:binder transfer;
  30. allow hal_mtdservice_default ta_data_file:file create_file_perms;
  31. allow hal_mtdservice_default ta_data_file:dir rw_dir_perms;
  32. allow hal_mtdservice_default vendor_hal_tui_comm_hwservice:hwservice_manager find;
  33. allow hal_mtdservice_default vendor_hal_tui_comm_hwservice:binder { call transfer };
  34. allow hal_mtdservice_default vendor_hal_tui_comm_qti:binder { call transfer };
  35. allow hal_mtdservice_default sysfs:dir { open read };
  36. allow hal_mtdservice_default sysfs:file { open read write };
  37. allow hal_mtdservice_default vendor_qce_device:chr_file rw_file_perms;
  38. allow hal_mtdservice_default vendor_sg_device:chr_file { open read };
  39. allow hal_mtdservice_default vendor_sg_device:chr_file { ioctl write };
  40. allow hal_mtdservice_default vendor_persist_data_file:dir getattr;
  41. allow hal_mtdservice_default vendor_smcinvoke_device:chr_file { ioctl open read write };
  42. allow hal_mtdservice_default system_server:binder transfer;
  43. allow hal_mtdservice_default block_device:dir r_dir_perms;
  44. allow hal_mtdservice_default vendor_dmabuf_qseecom_heap_device:chr_file { ioctl open read };
  45. allow hal_mtdservice_default vendor_dmabuf_qseecom_ta_heap_device:chr_file { ioctl open read };
  46. allow hal_mtdservice_default hal_tidaservice_default:binder transfer;
  47. allow hal_mtdservice_default hal_secure_element_default:binder transfer;
  48. type_transition hal_mtdservice mnt_vendor_file:dir vendor_persist_drm_file "fdsd";
  49. init_daemon_domain(hal_mtdservice_default)
  50. get_prop(hal_mtdservice_default, vendor_system_prop)
  51. get_prop(hal_mtdservice_default, vendor_cpuid_prop)
  52. set_prop(hal_mtdservice_default, vendor_payment_security_prop)
  53. hwbinder_use(hal_mtdservice_default)
  54. hal_server_domain(hal_mtdservice_default, hal_mtdservice)
  55. add_hwservice(hal_mtdservice_server, hal_mtdservice_hwservice)