mirror of
https://github.com/Evolution-X-Devices/device_google_wahoo
synced 2026-02-01 07:50:47 +00:00
Permissive to enforce for ims and cnd domains Introduce new CNE HIDL service Remove CNE talking to cnd via socket and move to HIDL Allow IMS to access sysfs data and diag files Allow radio to access telephony monitor property Bug: 38043081 Change-Id: I1775d6aea4de9843fdbedd06ebd71ec213f38189
36 lines
975 B
Plaintext
36 lines
975 B
Plaintext
type ims, domain;
|
|
type ims_exec, exec_type, vendor_file_type, file_type;
|
|
|
|
init_daemon_domain(ims)
|
|
net_domain(ims)
|
|
|
|
get_prop(ims, hwservicemanager_prop)
|
|
set_prop(ims, ims_prop)
|
|
|
|
unix_socket_connect(ims, netmgrd, netmgrd)
|
|
|
|
allow ims sysfs_soc:dir search;
|
|
allow ims sysfs_soc:file r_file_perms;
|
|
allow ims sysfs_timestamp_switch:file r_file_perms;
|
|
|
|
allow ims self:capability net_bind_service;
|
|
|
|
allow ims ion_device:chr_file r_file_perms;
|
|
|
|
unix_socket_connect(ims, cnd, cnd)
|
|
|
|
allow ims self:socket create_socket_perms;
|
|
allow ims ims_socket:sock_file write;
|
|
allow ims self:netlink_generic_socket create_socket_perms_no_ioctl;
|
|
allow ims netmgrd_socket:dir search;
|
|
allow ims netmgrd_socket:sock_file w_file_perms;
|
|
allowxperm ims self:socket ioctl msm_sock_ipc_ioctls;
|
|
allowxperm ims self:udp_socket ioctl RMNET_IOCTL_EXTENDED;
|
|
|
|
r_dir_file(ims, sysfs_msm_subsys)
|
|
r_dir_file(ims, sysfs_diag)
|
|
|
|
hwbinder_use(ims)
|
|
allow ims hal_cne_hwservice:hwservice_manager find;
|
|
binder_call(ims, cnd)
|