blob: a393a89ef46589853bb76331e24466406ffff9f4 [file] [log] [blame]
Susheel Yadagirid0927c62014-10-14 16:01:45 -07001#dpmd as domain
2type dpmd, domain;
3type dpmd_exec, exec_type, file_type;
Bhavya Sokke Mallikarjunappa1224bdc2014-11-03 13:33:33 -08004file_type_auto_trans(dpmd, socket_device, dpmwrapper_socket);
Susheel Yadagirid0927c62014-10-14 16:01:45 -07005init_daemon_domain(dpmd)
Bhavya Sokke Mallikarjunappa1224bdc2014-11-03 13:33:33 -08006net_domain(dpmd)
Susheel Yadagirid0927c62014-10-14 16:01:45 -07007allow dpmd dpmd_exec:file execute_no_trans;
8
Bhavya Sokke Mallikarjunappa1224bdc2014-11-03 13:33:33 -08009#allow dpmd to access dpm_data_file
10allow dpmd dpmd_data_file:file create_file_perms;
11allow dpmd dpmd_data_file:dir create_dir_perms;
Susheel Yadagirid0927c62014-10-14 16:01:45 -070012
13#allow dpmd to access qmux radio socket
14qmux_socket(dpmd);
15
16#self capability
Bhavya Sokke Mallikarjunappa1224bdc2014-11-03 13:33:33 -080017allow dpmd sysfs_wake_lock:file rw_file_perms;
Susheel Yadagirid0927c62014-10-14 16:01:45 -070018allow dpmd self:socket rw_socket_perms;
19allow dpmd self:netlink_socket rw_socket_perms;
Bhavya Sokke Mallikarjunappa1224bdc2014-11-03 13:33:33 -080020allow dpmd self:capability { setuid setgid dac_override net_raw chown fsetid net_admin sys_module };
Susheel Yadagirid0927c62014-10-14 16:01:45 -070021
Bhavya Sokke Mallikarjunappa1224bdc2014-11-03 13:33:33 -080022#socket, self
23allow dpmd smem_log_device:chr_file rw_file_perms;
24unix_socket_connect(dpmd, property, init)
Susheel Yadagirid0927c62014-10-14 16:01:45 -070025allow dpmd self:capability2 block_suspend;
26allow dpmd system_prop:property_service set;
Bhavya Sokke Mallikarjunappa1224bdc2014-11-03 13:33:33 -080027allow dpmd ctl_default_prop:property_service set;
Susheel Yadagirid0927c62014-10-14 16:01:45 -070028
Bhavya Sokke Mallikarjunappa1224bdc2014-11-03 13:33:33 -080029#misc.
Susheel Yadagirid0927c62014-10-14 16:01:45 -070030allow dpmd shell_exec:file { read execute open execute_no_trans };
31allow dpmd system_file:file execute_no_trans;
32
33#kernel
34allow dpmd kernel:system module_request;
Bhavya Sokke Mallikarjunappa1224bdc2014-11-03 13:33:33 -080035
36#appdomain
37allow dpmd appdomain:fd use;
38allow dpmd appdomain:tcp_socket { read write getopt };