blob: 222c22da27062f20b1e3c257c3e7c536e1a1a721 [file] [log] [blame]
# ==============================================
# Common SEPolicy Rule
# ==============================================
type mtk_hal_omadm_exec, exec_type, vendor_file_type, file_type;
typeattribute mtk_hal_omadm hal_mtk_omadm_server;
typeattribute mtk_hal_omadm hal_mtk_omadm;
net_domain(mtk_hal_omadm)
init_daemon_domain(mtk_hal_omadm)
hwbinder_use(mtk_hal_omadm)
get_prop(mtk_hal_omadm, hwservicemanager_prop)
allow mtk_hal_omadm omadm_data_file:file create_file_perms;
allow mtk_hal_omadm omadm_data_file:dir create_dir_perms;
allow mtk_hal_omadm self:udp_socket create_socket_perms_no_ioctl;
allow mtk_hal_omadm self:tcp_socket create_socket_perms_no_ioctl;
allow mtk_hal_omadm self:capability net_raw;
allow mtk_hal_omadm fwmarkd_socket:sock_file write;
allow mtk_hal_omadm netd:unix_stream_socket connectto;
allow mtk_hal_omadm port:tcp_socket { name_bind name_connect };
allow mtk_hal_omadm protect_f_data_file:dir create_dir_perms;
allow mtk_hal_omadm protect_f_data_file:file create_file_perms;
allow mtk_hal_omadm mnt_vendor_file:dir create_dir_perms;
allow mtk_hal_omadm mnt_vendor_file:file create_file_perms;
allow mtk_hal_omadm omadm_misc_file:file create_file_perms;
allow mtk_hal_omadm omadm_misc_file:dir create_dir_perms;