12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455 |
- type hal_mtdservice_default, domain;
- type hal_mtdservice_default_exec, exec_type, file_type, vendor_file_type;
- type hal_mtdservice_hwservice, hwservice_manager_type;
- hal_attribute(mtdservice)
- allow hal_mtdservice_client hal_mtdservice_server:binder { call transfer };
- allow hal_mtdservice_client hal_mtdservice_server:binder transfer;
- allow hal_mtdservice_client hal_mtdservice_server:fd *;
- allow hal_mtdservice_server hal_mtdservice_client:binder transfer;
- allow hal_mtdservice_server hal_mtdservice_client:binder { call transfer };
- allow hal_mtdservice_server hal_mtdservice_client:fd *;
- allow hal_mtdservice_default hal_mlipay_default:binder { call transfer };
- allow hal_mtdservice_default hal_mlipay_default:fd *;
- allow hal_mtdservice_default hal_mfidoca_default:binder { call transfer };
- allow hal_mtdservice_default hal_mfidoca_default:fd *;
- allow hal_mtdservice_default hal_mtdservice_hwservice:hwservice_manager add;
- allow hal_mtdservice_default firmware_file:dir r_dir_perms;
- allow hal_mtdservice_default firmware_file:file r_file_perms;
- allow hal_mtdservice_default ion_device:chr_file rw_file_perms;
- allow hal_mtdservice_default vendor_persist_drm_file:dir { create_dir_perms relabelto };
- allow hal_mtdservice_default vendor_persist_drm_file:file { create_file_perms relabelto };
- allow hal_mtdservice_default vendor_persist_file:dir r_dir_perms;
- allow hal_mtdservice_default mnt_vendor_file:dir { create_dir_perms relabelfrom };
- allow hal_mtdservice_default proc:file r_file_perms;
- allow hal_mtdservice_default tee_device:chr_file rw_file_perms;
- allow hal_mtdservice_default system_data_file:dir getattr;
- allow hal_mtdservice_default hal_mlipay_hwservice:hwservice_manager find;
- allow hal_mtdservice_default hal_mfidoca_hwservice:hwservice_manager find;
- allow hal_mtdservice_default platform_app:binder transfer;
- allow hal_mtdservice_default system_app:binder transfer;
- allow hal_mtdservice_default ta_data_file:file create_file_perms;
- allow hal_mtdservice_default ta_data_file:dir rw_dir_perms;
- allow hal_mtdservice_default vendor_hal_tui_comm_hwservice:hwservice_manager find;
- allow hal_mtdservice_default vendor_hal_tui_comm_hwservice:binder { call transfer };
- allow hal_mtdservice_default vendor_hal_tui_comm_qti:binder { call transfer };
- allow hal_mtdservice_default sysfs:dir { open read };
- allow hal_mtdservice_default sysfs:file { open read write };
- allow hal_mtdservice_default vendor_qce_device:chr_file rw_file_perms;
- allow hal_mtdservice_default vendor_sg_device:chr_file { open read };
- allow hal_mtdservice_default vendor_sg_device:chr_file { ioctl write };
- allow hal_mtdservice_default vendor_persist_data_file:dir getattr;
- allow hal_mtdservice_default vendor_smcinvoke_device:chr_file { ioctl open read write };
- allow hal_mtdservice_default system_server:binder transfer;
- allow hal_mtdservice_default block_device:dir r_dir_perms;
- allow hal_mtdservice_default vendor_dmabuf_qseecom_heap_device:chr_file { ioctl open read };
- allow hal_mtdservice_default vendor_dmabuf_qseecom_ta_heap_device:chr_file { ioctl open read };
- allow hal_mtdservice_default hal_tidaservice_default:binder transfer;
- allow hal_mtdservice_default hal_secure_element_default:binder transfer;
- type_transition hal_mtdservice mnt_vendor_file:dir vendor_persist_drm_file "fdsd";
- init_daemon_domain(hal_mtdservice_default)
- get_prop(hal_mtdservice_default, vendor_system_prop)
- get_prop(hal_mtdservice_default, vendor_cpuid_prop)
- set_prop(hal_mtdservice_default, vendor_payment_security_prop)
- hwbinder_use(hal_mtdservice_default)
- hal_server_domain(hal_mtdservice_default, hal_mtdservice)
- add_hwservice(hal_mtdservice_server, hal_mtdservice_hwservice)
|