touchreport.te 1.7 KB

1234567891011121314151617181920212223242526272829303132333435
  1. type touchreport, domain;
  2. type touchreport_exec, exec_type, file_type, vendor_file_type;
  3. init_daemon_domain(touchreport)
  4. allow touchreport input_device:chr_file rw_file_perms;
  5. allow touchreport input_device:dir r_dir_perms;
  6. allow touchreport proc_tp_file:file { open read write };
  7. allow touchreport proc_tp_lockdown:file { open read write };
  8. allow touchreport self:cap_userns sys_nice;
  9. allow touchreport self:capability sys_nice;
  10. allow touchreport self:tcp_socket { create getattr getopt read setopt write };
  11. allow touchreport self:udp_socket { create getattr getopt read setopt write };
  12. allow touchreport sysfs_touch_hostprocess:file rw_file_perms;
  13. allow touchreport sysfs_touch_hostprocess:file { open read write };
  14. allow touchreport sysfs_touch_suspend:file rw_file_perms;
  15. allow touchreport sysfs_touch_suspend:file { open read write };
  16. allow touchreport sysfs_tp_virtual_prox:file rw_file_perms;
  17. allow touchreport sysfs_tp_virtual_prox:file { open read write };
  18. allow touchreport touchfeature_device:chr_file rw_file_perms;
  19. allow touchreport touchfeature_device:file { getattr map read };
  20. allow touchreport touchreport_exec:file entrypoint;
  21. allow touchreport uhid_device:chr_file rw_file_perms;
  22. allow touchreport vendor_data_touchreport_file:dir { add_name read remove_name search watch write };
  23. allow touchreport vendor_data_touchreport_file:file { create getattr open read rename setattr unlink write };
  24. allow touchreport vendor_firmware_file:dir r_dir_perms;
  25. allow touchreport vendor_firmware_file:dir search;
  26. allow touchreport vendor_firmware_file:file r_file_perms;
  27. allow touchreport vendor_sysfs_graphics:file { open read };
  28. recovery_only(`
  29. userdebug_or_eng(`
  30. permissive touchreport;
  31. ')
  32. ')