platform_device_qcom_sepoli.../qmuxd.te
Subash Abhinov Kasiviswanathan 44889b9b68 sepolicy: Modify domain transitions for qmuxd and netmgrd
Allow domain transitions from shell, su and adbd for qmuxd and
netmgrd in case of engineering and user debug builds only

CRs-fixed: 590265
Change-Id: Ibaad1d0d547dca13fa17f7c909c6347e59a24d97
2014-07-24 02:24:49 -07:00

34 lines
1.4 KiB
Text

type qmuxd, domain;
type qmuxd_exec, exec_type, file_type;
net_domain(qmuxd)
init_daemon_domain(qmuxd)
userdebug_or_eng(`
domain_auto_trans(shell, qmuxd_exec, qmuxd)
domain_auto_trans(su, qmuxd_exec, qmuxd)
domain_auto_trans(adbd, qmuxd_exec, qmuxd)
')
#Allow qmuxd to operate on various qmux device sockets
allow qmuxd qmux_radio_socket:dir { write add_name remove_name search };
allow qmuxd qmux_radio_socket:sock_file { create setattr getattr write unlink };
allow qmuxd qmux_audio_socket:dir { write add_name remove_name search };
allow qmuxd qmux_audio_socket:sock_file { create setattr getattr write unlink };
allow qmuxd qmux_gps_socket:dir { write add_name remove_name search };
allow qmuxd qmux_gps_socket:sock_file { create setattr getattr write unlink };
allow qmuxd qmux_bluetooth_socket:dir { write add_name remove_name search };
allow qmuxd qmux_bluetooth_socket:sock_file { create setattr getattr write unlink };
#Allow logging
allow qmuxd diag_device:chr_file { rw_file_perms };
#Allow operation in platform specific transports
#allow qmuxd smd_device:chr_file { rw_file_perms };
allow qmuxd hsic_device:chr_file { rw_file_perms };
#Allow qmuxd to operate in platform specific transports
allow qmuxd sysfs_smd_open_timeout:file { append write };
allow qmuxd sysfs_wake_lock:file { append open };
#Allow qmuxd to write in hsic specific transport
allow qmuxd sysfs:file { write };