37eea61587
Change-Id: Ia21793576649e8518e79e4680e0b79b6a9331720
55 lines
3.6 KiB
Text
55 lines
3.6 KiB
Text
type hal_mtdservice_default, domain;
|
|
type hal_mtdservice_default_exec, exec_type, file_type, vendor_file_type;
|
|
type hal_mtdservice_hwservice, hwservice_manager_type;
|
|
hal_attribute(mtdservice)
|
|
allow hal_mtdservice_client hal_mtdservice_server:binder { call transfer };
|
|
allow hal_mtdservice_client hal_mtdservice_server:binder transfer;
|
|
allow hal_mtdservice_client hal_mtdservice_server:fd *;
|
|
allow hal_mtdservice_server hal_mtdservice_client:binder transfer;
|
|
allow hal_mtdservice_server hal_mtdservice_client:binder { call transfer };
|
|
allow hal_mtdservice_server hal_mtdservice_client:fd *;
|
|
allow hal_mtdservice_default hal_mlipay_default:binder { call transfer };
|
|
allow hal_mtdservice_default hal_mlipay_default:fd *;
|
|
allow hal_mtdservice_default hal_mfidoca_default:binder { call transfer };
|
|
allow hal_mtdservice_default hal_mfidoca_default:fd *;
|
|
allow hal_mtdservice_default hal_mtdservice_hwservice:hwservice_manager add;
|
|
allow hal_mtdservice_default firmware_file:dir r_dir_perms;
|
|
allow hal_mtdservice_default firmware_file:file r_file_perms;
|
|
allow hal_mtdservice_default ion_device:chr_file rw_file_perms;
|
|
allow hal_mtdservice_default vendor_persist_drm_file:dir { create_dir_perms relabelto };
|
|
allow hal_mtdservice_default vendor_persist_drm_file:file { create_file_perms relabelto };
|
|
allow hal_mtdservice_default vendor_persist_file:dir r_dir_perms;
|
|
allow hal_mtdservice_default mnt_vendor_file:dir { create_dir_perms relabelfrom };
|
|
allow hal_mtdservice_default proc:file r_file_perms;
|
|
allow hal_mtdservice_default tee_device:chr_file rw_file_perms;
|
|
allow hal_mtdservice_default system_data_file:dir getattr;
|
|
allow hal_mtdservice_default hal_mlipay_hwservice:hwservice_manager find;
|
|
allow hal_mtdservice_default hal_mfidoca_hwservice:hwservice_manager find;
|
|
allow hal_mtdservice_default platform_app:binder transfer;
|
|
allow hal_mtdservice_default system_app:binder transfer;
|
|
allow hal_mtdservice_default ta_data_file:file create_file_perms;
|
|
allow hal_mtdservice_default ta_data_file:dir rw_dir_perms;
|
|
allow hal_mtdservice_default vendor_hal_tui_comm_hwservice:hwservice_manager find;
|
|
allow hal_mtdservice_default vendor_hal_tui_comm_hwservice:binder { call transfer };
|
|
allow hal_mtdservice_default vendor_hal_tui_comm_qti:binder { call transfer };
|
|
allow hal_mtdservice_default sysfs:dir { open read };
|
|
allow hal_mtdservice_default sysfs:file { open read write };
|
|
allow hal_mtdservice_default vendor_qce_device:chr_file rw_file_perms;
|
|
allow hal_mtdservice_default vendor_sg_device:chr_file { open read };
|
|
allow hal_mtdservice_default vendor_sg_device:chr_file { ioctl write };
|
|
allow hal_mtdservice_default vendor_persist_data_file:dir getattr;
|
|
allow hal_mtdservice_default vendor_smcinvoke_device:chr_file { ioctl open read write };
|
|
allow hal_mtdservice_default system_server:binder transfer;
|
|
allow hal_mtdservice_default block_device:dir r_dir_perms;
|
|
allow hal_mtdservice_default vendor_dmabuf_qseecom_heap_device:chr_file { ioctl open read };
|
|
allow hal_mtdservice_default vendor_dmabuf_qseecom_ta_heap_device:chr_file { ioctl open read };
|
|
allow hal_mtdservice_default hal_tidaservice_default:binder transfer;
|
|
allow hal_mtdservice_default hal_secure_element_default:binder transfer;
|
|
type_transition hal_mtdservice mnt_vendor_file:dir vendor_persist_drm_file "fdsd";
|
|
init_daemon_domain(hal_mtdservice_default)
|
|
get_prop(hal_mtdservice_default, vendor_system_prop)
|
|
get_prop(hal_mtdservice_default, vendor_cpuid_prop)
|
|
set_prop(hal_mtdservice_default, vendor_payment_security_prop)
|
|
hwbinder_use(hal_mtdservice_default)
|
|
hal_server_domain(hal_mtdservice_default, hal_mtdservice)
|
|
add_hwservice(hal_mtdservice_server, hal_mtdservice_hwservice)
|