Files
device_google_wahoo/sepolicy/vendor/hal_imsrtp.te
Jayachandran C 25591f24ea Update IMS and radio SE policies based on AU 194 drop
Permissive to enforce for ims and cnd domains
Introduce new CNE HIDL service
Remove CNE talking to cnd via socket and move to HIDL
Allow IMS to access sysfs data and diag files
Allow radio to access telephony monitor property

Bug: 38043081

Change-Id: I1775d6aea4de9843fdbedd06ebd71ec213f38189
2017-06-16 09:21:30 -07:00

33 lines
960 B
Plaintext

#ims rtp service
type hal_imsrtp, domain;
type hal_imsrtp_exec, exec_type, vendor_file_type, file_type;
# Started by init
init_daemon_domain(hal_imsrtp)
net_domain(hal_imsrtp)
hwbinder_use(hal_imsrtp)
get_prop(hal_imsrtp, hwservicemanager_prop)
add_hwservice(hal_imsrtp, hal_imsrtp_hwservice)
allow hal_imsrtp self:socket create_socket_perms;
unix_socket_connect(hal_imsrtp, ims, ims)
allow hal_imsrtp sysfs_timestamp_switch:file r_file_perms;
# ioctlcmd=c302
allowxperm hal_imsrtp self:socket ioctl msm_sock_ipc_ioctls;
allow hal_imsrtp self:capability net_bind_service;
allow hal_imsrtp sysfs_timestamp_switch:file r_file_perms;
allow hal_imsrtp ion_device:chr_file r_file_perms;
allow hal_imsrtp sysfs_data:file r_file_perms;
r_dir_file(hal_imsrtp, sysfs_msm_subsys)
r_dir_file(hal_imsrtp, sysfs_diag)
r_dir_file(hal_imsrtp, sysfs_soc)
allow hal_imsrtp ion_device:chr_file r_file_perms;
get_prop(hal_imsrtp, ims_prop)
binder_call(hal_imsrtp, radio)